SlideShare a Scribd company logo
1 of 13
Download to read offline
WIRELESS SENSORWIRELESS SENSOR
NETWORKS
UNIT 2
Easy n Inspire
WIRELESS SENSOR
Easy n Inspire
UNIT-2
Networking Technologies
 Physical layer and transceiver design considerations in WSNs:
Physical layer: The functions and components of a sensor node that mediate between the transmission and
reception of wireless signals and processing of data, including the higher – level protocol processing.
 The physical (PHY) layer is responsible for the conversion of bit streams into signals that are best
suited for communication across the wireless channel.
 It provides an overview of RF communication, which is most frequently used in WSNs.
 The main concern of the physical layer is modulation and demodulation of digital data, i.e.
transmission and reception of the data.
 The physical layer in wireless networked sensors has to be designed with sensor networking
requirements in mind.
 In particular, The Communication device must be containable in a small size, since the sensor
nodes are small.
 So cheaper, slightly larger antennas may be acceptable in those cases. The Communication devices
must be cheap, since the sensors will be used in large numbers in redundant fashion
For all the above reasons, the physical layer cannot be too complex. Therefore, the nature and complexity
of the physical layer processing is an important consideration in selecting a physical layer technology for
wireless networked sensors
Important parameters which are to be considered while designing Physical layer in wireless sensor
networks are (i.e. Design considerations)
1. Low Power Consumption
2. Error free transmission
3. Low Transmission and Reception range
4. Interference from other systems, working in the same band.
5. Low complexity.
6. Low duty cycle, i.e. most of the time sensor nodes are switched off.
7. Low data rates most of the time and high data rate only for a short period of time.
8. Routing between nodes
9. Modulation schemes (The most common form of modulation is the band pass modulation)
The physical layer is mostly concerned with modulation and demodulation of digital data; this task is
carried out by so-called transceivers. In sensor networks, the challenge is to find modulation schemes and
transceiver architectures that are simple, low cost, but still robust enough to provide the desired service. In
this section, we discuss some of the implications of these requirements
1. Energy usage profile
2. Choice of modulation scheme
3. Antenna considerations
1. Energy usage profile:
 The choices of a small transmit power leads to an energy consumption profile different from other
wireless devices like cell phones.
 If the radiated energy is small, transceiver consumes much more energy than is actually radiated.
 It is even possible that reception requires more power than transmission depending on the
transceiver architecture
 The idle mode’s power consumption can be less or in the same range as the receive power.
 To reduce average power consumption in a low-traffic wireless sensor network, keeping the
transceiver in idle mode all the time would consume significant amounts of energy.
2. Choice of modulation scheme:
 A crucial point is the choice of modulation scheme. Several factors have to be balanced here.
 They are required and desirable data rate, symbol rate, the implementation complexity, the
relationship between radiated power and target BER
 A second important observation is that the power consumption of a modulation scheme depends
much more on the symbol rate than on the data rate
 Obviously, the desire for “high” data rates at “low” symbol rates calls for m-ary modulation scheme
3. Antenna considerations:
 The desired small form factor of the overall sensor nodes restricts the size and the number of
antennas
 If the antenna is much smaller than the carrier’s wavelength, it is hard to achieve good antenna
efficiency so one must spend more transmit energy to obtain the same radiated energy.
 Secondly, with small sensor node cases, it will be hard to place two antennas with suitable distance
to achieve receive diversity.
*** *** *** *** *** *** *** ***
 PAN (PERSONAL AREA NETWORK):
o The communication network established for the purpose of connecting computer devices of
personal use is known as the personal area network PAN.
o When a network is established by connecting phone lines to PDAs (Personal Digital Assistants),
this communication is known as PAN
o PANs can be wired (USB or FireWire) or wireless
o Wireless Personal Area Network (WPAN) can perform really efficient operations if we connect
them with specialized devices.
o The range of a PAN typically is a few meters. PAN often covers an area of 30 feet.
o Examples of wireless PAN, or WPAN, devices include
* cell phone headsets, * wireless keyboards,
* wireless mic, * printers,
* bar code scanners and * game consoles.
o The basic purpose of establishing PAN (Personal Area Network) is providing a communication
channel to the individuals, who want to carry their own digital devices.
o However at the same time they want to stay in contact with the network.
o Personal computer devices may include palm tops mobile phones, potable media players,
play stations and net books.
o There are many wireless technologies which are helpful in developing wireless personal area
network.
 Blue tooth wireless PAN
 ZigBee
 Ultra-Wide Band(UWB)
 Wi-Fi or WiMAX
Wired PAN
Wireless digital devices work twenty four hours a day and seven days a week. This enables you to
stay in communication circle always.
PAN (Personal Area Network) network has enabled the transfer of data within the small geographical
areas with the help of many small and portable carrying devices.
Wireless PAN
*** *** *** *** *** *** *** ***
 PAN Topologies:
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver
is referred as network topology.
The various network topologies are:
1. Bus topology
2. Star topology
3. Ring topology
4. Tree topology
5. Mesh topology
1. Bus topology:
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.
Advantages of this topology:
 If N devices are connected to each other in bus topology, then the number of cables required to
connect them is 1 which is known as backbone cable and N drop lines are required.
 Cost of the cable is less as compared to other topology, but it is used to build small networks.
Problems with this topology:
 If the common cable fails, then the whole system will crash down.
 If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols
are used
2. Star topology:
All the devices are connected to a single hub through a cable. This hub is the central node and all
others nodes are connected to the central node.
Advantages of this topology:
 If N devices are connected to each other in star topology, then the number of cables required to
connect them is N. So, it is easy to set up.
 Each device requires only 1 port i.e. to connect to the hub.
Problems with this topology:
 If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down.
 Cost of installation is high.
 Performance is based on the single concentrator i.e. hub.
3. Ring topology:
 In this topology, it forms a ring connecting devices with its exactly two neighbouring devices.
 A number of repeaters are used for Ring topology with large number of nodes, because if someone
wants to send some data to the last node in the ring topology with 10 nodes, then the data will have to
pass through 9 nodes to reach the 10th node.
 Hence to prevent data loss repeaters are used in the network
 The transmission is unidirectional, but it can be made bidirectional by having 2 connections between
each Network Node, it is called Dual Ring Topology
Advantages of this topology:
 The possibility of collision is minimum in this type of topology.
 Cheap to install and expand.
Problems with this topology:
 Troubleshooting is difficult in this topology.
 Addition of stations in between or removal of stations can disturb the whole topology.
4. Tree topology:
It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.
Advantages of Tree Topology:
 Expansion of nodes is possible and easy.
 Easily managed and maintained.
 Error detection is easily done.
Disadvantages of Tree Topology:
 Heavily cabled.
 If more nodes are added maintenance is difficult.
 Central hub fails, network fails.
5. Mesh Topology:
In mesh topology, every device is connected to another device via particular channel.
It is also called as complete topology
If suppose, N number of devices are connected with each other in mesh topology, then total
number of ports that is required by each device is N-1.
Advantages of Mesh Topology:
 Each connection can carry its own data load.
 It is robust.
 Fault is diagnosed easily
 Provides security and privacy
Disadvantages of Mesh Topology:
 Installation and configuration is difficult.
 Cabling cost is more.
*** *** *** *** *** *** *** ***
 Hidden node and Exposed node Problem:
In WSN, to exchange data two exchange control frames are used before transmitting data
1. Request to Send(RTS)
2. Clear to Send(CTS)
These control frames duty includes
 If sender sees CTS, transmits data.
 If other node sees CTS, will idle for specified period.
 If other node sees RTS but not CTS, free to send
Hidden node problem:
In wireless networking, the hidden node problem or hidden terminal problem occurs when a node is visible
to a wireless access point (AP) or hub, but not to other nodes while communicating with that hub. This
leads to difficulties in media access control sub layer. (or)
The hidden terminal problem is a transmission problem that arises when two or more stations who are out
of range of each other transmit simultaneously to a common recipient.
Consider, a node A is from the access point range and another node C from outside of the range want to
send the data to a same node B. There occur collision between A and C
Because the transmission range of A reaches B but not C. Similarly, the range of C reaches B but not A.
Also the range of B reaches both A and C.
To solve the hidden node problem, the 802.11 MAC protocol includes an optional channel reservation
scheme to help avoid collisions. This scheme is implemented through a technique using the four-way
handshake.
Another way to solve hidden node problem is by using RTS/CTS signals
We can observe that transmitters T1 and T2 can’t see each other, both send to receiver R.
Then RTS/CTS can help
 Both T1 and T2 would send RTS that R would see first.
 R only responds with one CTS (say, for T1’s RTS).
 T2 detects that CTS doesn’t match and won’t send.
 Because, the T2 node postpones the transmission to R until it detects the medium to be free.
 Then only one transmission (from T1 to R) occurs without any collision.
Exposed node Problem:
In wireless networks, the exposed node problem occurs when a node is prevented from sending packets to
other nodes because of a neighbouring transmitter. The exposed node problem is not an issue in cellular
networks as the power and distance between cells is controlled to avoid it.
 Consider the below wireless network having four nodes labelled A, B, C, and D, where the two
receivers (A, D) are out of range of each other
 But the two transmitters (B, C) in the middle are in the same range of each other.
 Here, if a transmission between A and B is taking place, then node C is prevented from transmitting
to D because it is effected by the transmission of B. (both B and C share same media to transmit the
data)
 However note that node D could still receive the transmission of C without interference because it is
out of range from B.
 This problem is solved by,
We can observe that T1 sending to R1, T2 wants to send to R2. Then RTS/CTS signals can help
 T2 hears RTS from T1, but not CTS from R1 ( i.e. R1 is not ready to receive)
 Now T2 knows that its transmission will not interfere at T1’s receiver then it can transmit the data to
R2 node.
 T2 is safe to transmit to R2.
Similarly
If T1 hears CTS from R1 then it sends data to R1 only after checking T2 transmission.
*** *** *** *** *** *** *** ***
 WANET:
Wireless ad hoc network (WANET) is a decentralized technology designed for the establishment of a
network anywhere and anytime without any fixed infrastructure to support the mobility of the users in the
network.
The network is ad-hoc because each node is willing to forward data for other nodes.
Wireless ad-hoc networks can be further classified by their application:
1. Mobile ad hoc networks (MANETs): MANET is a continuously self-configuring, infrastructure-less
network of mobile devices connected without wires.
2. Vehicular ad hoc networks (VANETs): VANETs are used for communication between vehicles and
roadside equipment.
3. Intelligent vehicular ad hoc networks: Intelligent VANETs are a kind of artificial intelligence networks
that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents. Vehicles
are using radio waves to communicate with each other.
4. Smart-Phone Ad-hoc networks (SPANs): SPANs influence the existing hardware (primarily Bluetooth
and Wi-Fi) in commercially available smart phones to create networks without depending on cellular
carrier networks, wireless access points, or traditional network infrastructure.
5. Internet-based Mobile Ad-hoc networks (iMANETs): iMANETs are ad hoc networks that link mobile
nodes and fixed Internet-gateway nodes
In computer networking, an ad hoc network refers to a network connection established for a single session
and does not require a router or a wireless base station.
For example, if you need to transfer a file to your friend's laptop, you might create an ad hoc network
between your computer and his laptop to transfer the file.
.
Here are the key features:
 Infrastructure-less, self-configuring, self-forming, self-healing network
 Nodes are static, network is connected (exist end-to-end path)
 Transmission through multiple hops
 The decentralized nature improves the scalability.
*** *** *** *** *** *** *** ***
 MANET:
MANET stands for Mobile adhoc Network also called as wireless adhoc network or adhoc wireless
network that usually has a routable networking environment on top of a Link Layer ad hoc network. They
consist of set of mobile nodes connected wirelessly in a self configured, self healing network without
having a fixed infrastructure.
MANET nodes are free to move randomly as the network topology changes frequently.
Each node behaves as a router as they forward traffic to other specified node in the network.
Here are the key features:
 A highly dynamic, autonomous topology
 The primary challenge in building a MANET is equipping each device to continuously maintain the
information required to properly route traffic.
The ad hoc routing protocol for MANET can be classified as:
 Table-driven (proactive) routing
 On-demand (reactive) routing
 Hybrid (both proactive and reactive) routing
Characteristics of MANET:
 Dynamic Topologies: Network topology which is typically multichip may change randomly and
rapidly with time, it can form unidirectional or bi-directional links.
 Bandwidth constrained, variable capacity links: Wireless links usually have lower reliability,
efficiency, stability and capacity as compared to wired network. The throughput of wireless
communication is even less than a radio’s maximum transmission rate after dealing with the
constraints like multiple access, noise, interference conditions, etc.
 Autonomous Behaviour: Each node can act as a host and router, which shows its autonomous
behaviour.
 Energy Constrained Operation: As some or all the nodes rely on batteries or other exhaustible means
for their energy. Mobile nodes are characterized with less memory, power and light weight features.
 Limited Security: Wireless network are more prone to security threats. A centralized firewall is
absent due to its distributed nature of operation for security, routing and host configuration.
 Less Human Intervention: They require minimum human intervention to configure the network;
therefore they are dynamically autonomous in nature.
Pros and Cons of MANET –
Pros:
1. Seperation from central network administration.
2. Each nodes can play both the roles i.e. if router and host showing autonomous nature.
3. Self configuring and self healing nodes, does not require human intervention.
Cons:
1. Resources are limited due to various constraints like noise, interference conditions, etc.
2. Lack of authorization facilities.
3. More prone to attacks due to limited physical security.
*** *** *** *** *** *** *** ***
Easy n Inspire…..
Find More Materials at: https://www.slideshare.net/Easyn/edit_my_uploads
https://easyninspire.blogspot.com/
YouTube link:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber

More Related Content

What's hot

Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent NetworksFaraz Shahid
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor networkVrince Vimal
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)rahuldaredia21
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)Hamdamboy (함담보이)
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALASaikiran Panjala
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?mahipal9
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor networkA. Shamel
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 

What's hot (20)

Intelligent Networks
Intelligent NetworksIntelligent Networks
Intelligent Networks
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Intro to wireless sensor network
Intro to wireless sensor networkIntro to wireless sensor network
Intro to wireless sensor network
 
Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)Pstn (Public Switched Telephone Networks)
Pstn (Public Switched Telephone Networks)
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
The constrained application protocol (CoAP)
The constrained application protocol (CoAP)The constrained application protocol (CoAP)
The constrained application protocol (CoAP)
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Nb iot presentation
Nb iot presentationNb iot presentation
Nb iot presentation
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
WIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALAWIRELESS ATM BY SAIKIRAN PANJALA
WIRELESS ATM BY SAIKIRAN PANJALA
 
How PSTN phone works?
How PSTN phone works?How PSTN phone works?
How PSTN phone works?
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Smart grid communications and measurement technology
Smart grid communications and measurement technologySmart grid communications and measurement technology
Smart grid communications and measurement technology
 

Similar to Wireless Sensor Networks UNIT-2

Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of ComputerAfsanaAkterRubi
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communicationRahul Tanwar
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYPRINCE KUMAR
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernetSamit Singh
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Comm. & net. concepts
Comm. & net. conceptsComm. & net. concepts
Comm. & net. conceptsAshwin Kumar
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction fullaneebkmct
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...IOSR Journals
 

Similar to Wireless Sensor Networks UNIT-2 (20)

Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Classification of Computer
Classification of ComputerClassification of Computer
Classification of Computer
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communication
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
7 topology ethernet
7 topology ethernet7 topology ethernet
7 topology ethernet
 
Network -Lecture Notes
Network -Lecture NotesNetwork -Lecture Notes
Network -Lecture Notes
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
Comm. & net. concepts
Comm. & net. conceptsComm. & net. concepts
Comm. & net. concepts
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
Networks
NetworksNetworks
Networks
 
01 - networking basics notes
01 - networking basics notes01 - networking basics notes
01 - networking basics notes
 
basic networking
basic networkingbasic networking
basic networking
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
 

More from Easy n Inspire L

JK flip flop in Digital electronics
JK flip flop in Digital electronicsJK flip flop in Digital electronics
JK flip flop in Digital electronicsEasy n Inspire L
 
Rs flipflop or SR flipFlop
Rs flipflop or SR flipFlop Rs flipflop or SR flipFlop
Rs flipflop or SR flipFlop Easy n Inspire L
 
D flip flop in Digital electronics
D flip flop in Digital electronicsD flip flop in Digital electronics
D flip flop in Digital electronicsEasy n Inspire L
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Easy n Inspire L
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Encoders and types of encodrs
Encoders and types of encodrs Encoders and types of encodrs
Encoders and types of encodrs Easy n Inspire L
 
Magnitude Comparator and types of MC
Magnitude Comparator and types of MCMagnitude Comparator and types of MC
Magnitude Comparator and types of MCEasy n Inspire L
 
B.Tech Document Preparation tips
B.Tech Document Preparation tips B.Tech Document Preparation tips
B.Tech Document Preparation tips Easy n Inspire L
 
Decoders in digital electronics
Decoders in digital electronicsDecoders in digital electronics
Decoders in digital electronicsEasy n Inspire L
 
Working on the B.Tech/ M.Tech Project
Working on the B.Tech/ M.Tech ProjectWorking on the B.Tech/ M.Tech Project
Working on the B.Tech/ M.Tech ProjectEasy n Inspire L
 
Latch Introduction & RS Latch
Latch Introduction &  RS LatchLatch Introduction &  RS Latch
Latch Introduction & RS LatchEasy n Inspire L
 
SEQUENTIAL CIRCUITS INTRODUCTION
SEQUENTIAL CIRCUITS INTRODUCTIONSEQUENTIAL CIRCUITS INTRODUCTION
SEQUENTIAL CIRCUITS INTRODUCTIONEasy n Inspire L
 

More from Easy n Inspire L (13)

JK flip flop in Digital electronics
JK flip flop in Digital electronicsJK flip flop in Digital electronics
JK flip flop in Digital electronics
 
Rs flipflop or SR flipFlop
Rs flipflop or SR flipFlop Rs flipflop or SR flipFlop
Rs flipflop or SR flipFlop
 
D flip flop in Digital electronics
D flip flop in Digital electronicsD flip flop in Digital electronics
D flip flop in Digital electronics
 
Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3Wireless Sensor Networks UNIT-3
Wireless Sensor Networks UNIT-3
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Encoders and types of encodrs
Encoders and types of encodrs Encoders and types of encodrs
Encoders and types of encodrs
 
Magnitude Comparator and types of MC
Magnitude Comparator and types of MCMagnitude Comparator and types of MC
Magnitude Comparator and types of MC
 
B.Tech Document Preparation tips
B.Tech Document Preparation tips B.Tech Document Preparation tips
B.Tech Document Preparation tips
 
Decoders in digital electronics
Decoders in digital electronicsDecoders in digital electronics
Decoders in digital electronics
 
Working on the B.Tech/ M.Tech Project
Working on the B.Tech/ M.Tech ProjectWorking on the B.Tech/ M.Tech Project
Working on the B.Tech/ M.Tech Project
 
D latch
D latchD latch
D latch
 
Latch Introduction & RS Latch
Latch Introduction &  RS LatchLatch Introduction &  RS Latch
Latch Introduction & RS Latch
 
SEQUENTIAL CIRCUITS INTRODUCTION
SEQUENTIAL CIRCUITS INTRODUCTIONSEQUENTIAL CIRCUITS INTRODUCTION
SEQUENTIAL CIRCUITS INTRODUCTION
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Wireless Sensor Networks UNIT-2

  • 1. WIRELESS SENSORWIRELESS SENSOR NETWORKS UNIT 2 Easy n Inspire WIRELESS SENSOR Easy n Inspire
  • 2. UNIT-2 Networking Technologies  Physical layer and transceiver design considerations in WSNs: Physical layer: The functions and components of a sensor node that mediate between the transmission and reception of wireless signals and processing of data, including the higher – level protocol processing.  The physical (PHY) layer is responsible for the conversion of bit streams into signals that are best suited for communication across the wireless channel.  It provides an overview of RF communication, which is most frequently used in WSNs.  The main concern of the physical layer is modulation and demodulation of digital data, i.e. transmission and reception of the data.  The physical layer in wireless networked sensors has to be designed with sensor networking requirements in mind.  In particular, The Communication device must be containable in a small size, since the sensor nodes are small.  So cheaper, slightly larger antennas may be acceptable in those cases. The Communication devices must be cheap, since the sensors will be used in large numbers in redundant fashion For all the above reasons, the physical layer cannot be too complex. Therefore, the nature and complexity of the physical layer processing is an important consideration in selecting a physical layer technology for wireless networked sensors Important parameters which are to be considered while designing Physical layer in wireless sensor networks are (i.e. Design considerations) 1. Low Power Consumption 2. Error free transmission 3. Low Transmission and Reception range 4. Interference from other systems, working in the same band. 5. Low complexity. 6. Low duty cycle, i.e. most of the time sensor nodes are switched off. 7. Low data rates most of the time and high data rate only for a short period of time. 8. Routing between nodes 9. Modulation schemes (The most common form of modulation is the band pass modulation) The physical layer is mostly concerned with modulation and demodulation of digital data; this task is carried out by so-called transceivers. In sensor networks, the challenge is to find modulation schemes and transceiver architectures that are simple, low cost, but still robust enough to provide the desired service. In this section, we discuss some of the implications of these requirements 1. Energy usage profile 2. Choice of modulation scheme 3. Antenna considerations
  • 3. 1. Energy usage profile:  The choices of a small transmit power leads to an energy consumption profile different from other wireless devices like cell phones.  If the radiated energy is small, transceiver consumes much more energy than is actually radiated.  It is even possible that reception requires more power than transmission depending on the transceiver architecture  The idle mode’s power consumption can be less or in the same range as the receive power.  To reduce average power consumption in a low-traffic wireless sensor network, keeping the transceiver in idle mode all the time would consume significant amounts of energy. 2. Choice of modulation scheme:  A crucial point is the choice of modulation scheme. Several factors have to be balanced here.  They are required and desirable data rate, symbol rate, the implementation complexity, the relationship between radiated power and target BER  A second important observation is that the power consumption of a modulation scheme depends much more on the symbol rate than on the data rate  Obviously, the desire for “high” data rates at “low” symbol rates calls for m-ary modulation scheme 3. Antenna considerations:  The desired small form factor of the overall sensor nodes restricts the size and the number of antennas  If the antenna is much smaller than the carrier’s wavelength, it is hard to achieve good antenna efficiency so one must spend more transmit energy to obtain the same radiated energy.  Secondly, with small sensor node cases, it will be hard to place two antennas with suitable distance to achieve receive diversity. *** *** *** *** *** *** *** ***  PAN (PERSONAL AREA NETWORK): o The communication network established for the purpose of connecting computer devices of personal use is known as the personal area network PAN. o When a network is established by connecting phone lines to PDAs (Personal Digital Assistants), this communication is known as PAN o PANs can be wired (USB or FireWire) or wireless o Wireless Personal Area Network (WPAN) can perform really efficient operations if we connect them with specialized devices. o The range of a PAN typically is a few meters. PAN often covers an area of 30 feet. o Examples of wireless PAN, or WPAN, devices include * cell phone headsets, * wireless keyboards, * wireless mic, * printers, * bar code scanners and * game consoles.
  • 4. o The basic purpose of establishing PAN (Personal Area Network) is providing a communication channel to the individuals, who want to carry their own digital devices. o However at the same time they want to stay in contact with the network. o Personal computer devices may include palm tops mobile phones, potable media players, play stations and net books. o There are many wireless technologies which are helpful in developing wireless personal area network.  Blue tooth wireless PAN  ZigBee  Ultra-Wide Band(UWB)  Wi-Fi or WiMAX Wired PAN Wireless digital devices work twenty four hours a day and seven days a week. This enables you to stay in communication circle always. PAN (Personal Area Network) network has enabled the transfer of data within the small geographical areas with the help of many small and portable carrying devices. Wireless PAN *** *** *** *** *** *** *** ***
  • 5.  PAN Topologies: The arrangement of a network which comprises of nodes and connecting lines via sender and receiver is referred as network topology. The various network topologies are: 1. Bus topology 2. Star topology 3. Ring topology 4. Tree topology 5. Mesh topology 1. Bus topology: Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two endpoints, then it is called Linear Bus topology. Advantages of this topology:  If N devices are connected to each other in bus topology, then the number of cables required to connect them is 1 which is known as backbone cable and N drop lines are required.  Cost of the cable is less as compared to other topology, but it is used to build small networks. Problems with this topology:  If the common cable fails, then the whole system will crash down.  If the network traffic is heavy, it increases collisions in the network. To avoid this, various protocols are used 2. Star topology: All the devices are connected to a single hub through a cable. This hub is the central node and all others nodes are connected to the central node. Advantages of this topology:  If N devices are connected to each other in star topology, then the number of cables required to connect them is N. So, it is easy to set up.
  • 6.  Each device requires only 1 port i.e. to connect to the hub. Problems with this topology:  If the concentrator (hub) on which the whole topology relies fails, the whole system will crash down.  Cost of installation is high.  Performance is based on the single concentrator i.e. hub. 3. Ring topology:  In this topology, it forms a ring connecting devices with its exactly two neighbouring devices.  A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology with 10 nodes, then the data will have to pass through 9 nodes to reach the 10th node.  Hence to prevent data loss repeaters are used in the network  The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology Advantages of this topology:  The possibility of collision is minimum in this type of topology.  Cheap to install and expand. Problems with this topology:  Troubleshooting is difficult in this topology.  Addition of stations in between or removal of stations can disturb the whole topology. 4. Tree topology: It has a root node and all other nodes are connected to it forming a hierarchy. It is also called hierarchical topology. It should at least have three levels to the hierarchy.
  • 7. Advantages of Tree Topology:  Expansion of nodes is possible and easy.  Easily managed and maintained.  Error detection is easily done. Disadvantages of Tree Topology:  Heavily cabled.  If more nodes are added maintenance is difficult.  Central hub fails, network fails. 5. Mesh Topology: In mesh topology, every device is connected to another device via particular channel. It is also called as complete topology If suppose, N number of devices are connected with each other in mesh topology, then total number of ports that is required by each device is N-1. Advantages of Mesh Topology:  Each connection can carry its own data load.  It is robust.  Fault is diagnosed easily  Provides security and privacy Disadvantages of Mesh Topology:  Installation and configuration is difficult.  Cabling cost is more. *** *** *** *** *** *** *** ***  Hidden node and Exposed node Problem: In WSN, to exchange data two exchange control frames are used before transmitting data 1. Request to Send(RTS) 2. Clear to Send(CTS) These control frames duty includes  If sender sees CTS, transmits data.  If other node sees CTS, will idle for specified period.  If other node sees RTS but not CTS, free to send
  • 8. Hidden node problem: In wireless networking, the hidden node problem or hidden terminal problem occurs when a node is visible to a wireless access point (AP) or hub, but not to other nodes while communicating with that hub. This leads to difficulties in media access control sub layer. (or) The hidden terminal problem is a transmission problem that arises when two or more stations who are out of range of each other transmit simultaneously to a common recipient. Consider, a node A is from the access point range and another node C from outside of the range want to send the data to a same node B. There occur collision between A and C Because the transmission range of A reaches B but not C. Similarly, the range of C reaches B but not A. Also the range of B reaches both A and C. To solve the hidden node problem, the 802.11 MAC protocol includes an optional channel reservation scheme to help avoid collisions. This scheme is implemented through a technique using the four-way handshake. Another way to solve hidden node problem is by using RTS/CTS signals We can observe that transmitters T1 and T2 can’t see each other, both send to receiver R. Then RTS/CTS can help  Both T1 and T2 would send RTS that R would see first.  R only responds with one CTS (say, for T1’s RTS).  T2 detects that CTS doesn’t match and won’t send.  Because, the T2 node postpones the transmission to R until it detects the medium to be free.  Then only one transmission (from T1 to R) occurs without any collision.
  • 9. Exposed node Problem: In wireless networks, the exposed node problem occurs when a node is prevented from sending packets to other nodes because of a neighbouring transmitter. The exposed node problem is not an issue in cellular networks as the power and distance between cells is controlled to avoid it.  Consider the below wireless network having four nodes labelled A, B, C, and D, where the two receivers (A, D) are out of range of each other  But the two transmitters (B, C) in the middle are in the same range of each other.  Here, if a transmission between A and B is taking place, then node C is prevented from transmitting to D because it is effected by the transmission of B. (both B and C share same media to transmit the data)  However note that node D could still receive the transmission of C without interference because it is out of range from B.  This problem is solved by, We can observe that T1 sending to R1, T2 wants to send to R2. Then RTS/CTS signals can help  T2 hears RTS from T1, but not CTS from R1 ( i.e. R1 is not ready to receive)  Now T2 knows that its transmission will not interfere at T1’s receiver then it can transmit the data to R2 node.  T2 is safe to transmit to R2. Similarly If T1 hears CTS from R1 then it sends data to R1 only after checking T2 transmission. *** *** *** *** *** *** *** ***
  • 10.  WANET: Wireless ad hoc network (WANET) is a decentralized technology designed for the establishment of a network anywhere and anytime without any fixed infrastructure to support the mobility of the users in the network. The network is ad-hoc because each node is willing to forward data for other nodes. Wireless ad-hoc networks can be further classified by their application: 1. Mobile ad hoc networks (MANETs): MANET is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. 2. Vehicular ad hoc networks (VANETs): VANETs are used for communication between vehicles and roadside equipment. 3. Intelligent vehicular ad hoc networks: Intelligent VANETs are a kind of artificial intelligence networks that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents. Vehicles are using radio waves to communicate with each other. 4. Smart-Phone Ad-hoc networks (SPANs): SPANs influence the existing hardware (primarily Bluetooth and Wi-Fi) in commercially available smart phones to create networks without depending on cellular carrier networks, wireless access points, or traditional network infrastructure. 5. Internet-based Mobile Ad-hoc networks (iMANETs): iMANETs are ad hoc networks that link mobile nodes and fixed Internet-gateway nodes In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station. For example, if you need to transfer a file to your friend's laptop, you might create an ad hoc network between your computer and his laptop to transfer the file. . Here are the key features:  Infrastructure-less, self-configuring, self-forming, self-healing network  Nodes are static, network is connected (exist end-to-end path)  Transmission through multiple hops  The decentralized nature improves the scalability.
  • 11. *** *** *** *** *** *** *** ***  MANET: MANET stands for Mobile adhoc Network also called as wireless adhoc network or adhoc wireless network that usually has a routable networking environment on top of a Link Layer ad hoc network. They consist of set of mobile nodes connected wirelessly in a self configured, self healing network without having a fixed infrastructure. MANET nodes are free to move randomly as the network topology changes frequently. Each node behaves as a router as they forward traffic to other specified node in the network. Here are the key features:  A highly dynamic, autonomous topology  The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. The ad hoc routing protocol for MANET can be classified as:  Table-driven (proactive) routing  On-demand (reactive) routing  Hybrid (both proactive and reactive) routing Characteristics of MANET:  Dynamic Topologies: Network topology which is typically multichip may change randomly and rapidly with time, it can form unidirectional or bi-directional links.  Bandwidth constrained, variable capacity links: Wireless links usually have lower reliability, efficiency, stability and capacity as compared to wired network. The throughput of wireless communication is even less than a radio’s maximum transmission rate after dealing with the constraints like multiple access, noise, interference conditions, etc.  Autonomous Behaviour: Each node can act as a host and router, which shows its autonomous behaviour.
  • 12.  Energy Constrained Operation: As some or all the nodes rely on batteries or other exhaustible means for their energy. Mobile nodes are characterized with less memory, power and light weight features.  Limited Security: Wireless network are more prone to security threats. A centralized firewall is absent due to its distributed nature of operation for security, routing and host configuration.  Less Human Intervention: They require minimum human intervention to configure the network; therefore they are dynamically autonomous in nature. Pros and Cons of MANET – Pros: 1. Seperation from central network administration. 2. Each nodes can play both the roles i.e. if router and host showing autonomous nature. 3. Self configuring and self healing nodes, does not require human intervention. Cons: 1. Resources are limited due to various constraints like noise, interference conditions, etc. 2. Lack of authorization facilities. 3. More prone to attacks due to limited physical security. *** *** *** *** *** *** *** ***
  • 13. Easy n Inspire….. Find More Materials at: https://www.slideshare.net/Easyn/edit_my_uploads https://easyninspire.blogspot.com/ YouTube link: https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber