SlideShare a Scribd company logo
1 of 27
AD HOC AND WIRELESS
SENSOR NETWORKS
 ELEMENTS OF AD HOC WIRELESS NETWORKS
 ISSUES IN AD HOC WIRELESS NETWORKS
Infrastructure Network
AD HOC Network
o Range of communication 100m (Bluetooth is a typical ad-hoc
network)
Elements Of AD HOC Wireless Networks
o The word “ad hoc” comes from Latin Language, which means ‘for this purpose only‘,
Ad hoc Networks are the small area networks, especially designed with
Wireless/Temporary connections to the different computer assisted nodes.
o A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built
spontaneously to enable two or more wireless devices to be connected to each other
without requiring a central device, such as a router or access point. When Wi- Fi
networks are in ad-hoc mode, each device in the network forwards data to the others.
o Since the devices in the ad-hoc network can access each other's resources directly
through a basic point-to-point wireless connection, central servers are unnecessary for
functions such as file shares or printers.
o In a wireless ad-hoc network, a collection of devices (or nodes) is responsible for
network operations, such as routing, security, addressing and key management.
multi-hop wireless ad hoc networks, it defined as a collection of nodes that
communicate with each other wirelessly by using radio signals with a shared common
channel.
Types of Wireless Ad Hoc Networks
o Mobile ad hoc network (MANET): An ad hoc network of mobile devices.
o Vehicular ad hoc network (VANET): Used for communication between vehicles. Intelligent
VANETs use artificial intelligence and ad hoc technologies to communicate what should
happen during accidents.
o Smartphone ad hoc network (SPAN): Wireless ad hoc network created on smartphones via
existing technologies like Wi-Fi and Bluetooth.
o Wireless mesh network: A mesh network is an ad hoc network where the various nodes are in
communication directly with each other to relay information throughout the total network.
o Army tactical MENT: Used in the army for "on-the-move" communication, a wireless tactical
ad hoc network relies on range and instant operation to establish networks when needed.
o Wireless sensor network: Wireless sensors that collect everything from temperature and
pressure readings to noise and humidity levels, can form an ad hoc network to deliver
information to a home base without needing to connect directly to it.
o Disaster rescue ad hoc network: Ad hoc networks are important when disaster strikes and
established communication hardware isn't functioning properly.
Advantages of Ad Hoc Networks
o Ad-hoc networks can have more flexibility.
o It is better in mobility.
o It can be turn up and turn down in a very short time.
o More economical
o It considered as a robust network because of its non-hierarchical distributed control and management
mechanisms.
Disadvantages of Ad Hoc Networks
o Unpredictable Topology
o Limited Bandwidth
o Lose of data
o Interference
o Limited Security
o Energy Constraints
Issues in Ad hoc wireless networks
The major issues that affect the design, deployment, and performance of an ad hoc
wireless system are as follows:
o Medium Access Control (MAC)
o Routing
o Multicasting
o Transport layer protocol
o Quality of Service (QOS)
o Self-organization
o Security
o Energy management
o Addressing and service discovery
o Scalability
o Deployment considerations
1.Medium Access Control
The purpose of this protocol is to achieve a distributed FIFO schedule among multiple
nodes in an ad hoc network. When a node transmits a packet, it adds the information about
the arrival time of queued packets. It provide fair access to shared broadcast radio channel.
The major issues in MAC protocol are as follows:
o Distributed Operation: The MAC protocol design should be fully distributed involving
minimum control overhead, because it need to operate in environment without
centralized device.
o Synchronization: The synchronization is mandatory for TDMA-based systems for
management of transmission and reception slots.
o Hidden Terminals Problem: Hidden terminals are nodes that are hidden (or not
reachable) from the sender of a data transmission session, but are reachable to the
receiver of the session.
o Collisions at receiver node -> inefficient bandwidth utilization, reduce throughput.
o Exposed Terminals Problem: The nodes that are in the transmission range of the sender of an on-
going session, are prevented from making a transmission. The exposed nodes should be allowed to
transmit in a controlled fashion without causing collision to the on-going data transfer.
o Throughput: The MAC protocol employed in ad hoc wireless networks should attempt to maximize
the throughput of the system. The important considerations for throughput enhancement are
a) Minimizing the occurrence of collisions.
b) Maximizing channel utilization
c) Minimizing control overhead.
o Access delay: The average delay that any packet experiences to get transmitted. The MAC protocol
should attempt to minimize the delay.
o Fairness: Fairness refers to the ability of the MAC protocol to provide an equal share or weighted
share of the bandwidth to all competing nodes. Fairness can be either node-based or flow-based.
o Real-time Traffic support: In a contention-based channel access environment, without any central
coordination, with limited bandwidth, and with location dependent contention, supporting time-
sensitive traffic such as voice, video, real-time data requires explicit support from the MAC protocol.
o Resource reservation: The provisioning of QoS defined by parameters such as
bandwidth, delay, and jitter requires reservation of resources such as bandwidth,
buffer space, and processing power.
o Ability to measure resource availability: In order to handle the resources such as
bandwidth efficiently and perform call admission control based on their availability,
the MAC protocol should be able to provide an estimation of resource availability at
every node. This can also be used for making congestion control decisions.
o Capability for power control: The transmission power control reduces the energy
consumption at the nodes, causes a decrease in interference at neighboring nodes,
and increases frequency reuse.
o Adaptive rate control: This refers to the variation in the data bit rate achieved over a
channel. A MAC protocol that has adaptive rate control can make use of a high data
rate when the sender and receiver are nearby & adaptively reduce the data rate as
they move away from each other.
2.Routing :
The responsibilities of a routing protocol include exchanging the route information;
finding a feasible path to a destination. The major challenges that a routing protocol faces
are as follows:
o Mobility: The Mobility of nodes results in frequent path breaks, packet collisions,
transient loops, stale routing information, and difficulty in resource reservation.
o Bandwidth constraint: Since the channel is shared by all nodes in the broadcast region,
the bandwidth available per wireless link depends on the number of nodes & traffic they
handle.
o Error-prone and shared channel: The Bit Error Rate (BER) in a wireless channel is very
high [10^-5 to 10^ -3 ] compared to that in its wired counterparts [10^-12 to 10^-9 ].
o Location-dependent contention: The load on the wireless channel varies with the number
of nodes present in a given geographical region. This makes the contention for the
channel high when the number of nodes increases. The high contention for the channel
results in a high number of collisions & a subsequent wastage of bandwidth.
o Other resource constraints:
The constraints on resources such as computing power, battery power, and buffer
storage also limit the capability of a routing protocol. The major requirements of a routing
protocol in ad hoc wireless networks are the following.
a. Minimum route acquisition delay
b. Quick route reconfiguration
c. Loop-free routing
d. Distributed routing approach
e. Minimum control overhead
f. Scalability
g. Provisioning of QoS
h. Support for time-sensitive traffic
i. Security and privacy
3.Multicasting:
It plays important role in emergency search & rescue operations & in military
communication. Use of single link connectivity among the nodes in a multicast group results in
a tree-shaped multicast routing topology. Such a tree-shaped topology provides high multicast
efficiency, with low packet delivery ratio due to the frequency tree breaks.
The major issues in designing multicast routing protocols are as follows:
o Robustness: The multicast routing protocol must be able to recover & reconfigure quickly
from potential mobility-induced link breaks thus making it suitable for use in high dynamic
environments.
o Efficiency: A multicast protocol should make a minimum number of transmissions to
deliver a data packet to all the group members.
o Control overhead: The scarce bandwidth availability in ad hoc wireless networks demands
minimal control overhead for the multicast session.
o Quality of Service : QoS support is essential in multicast routing
because, in most cases, the data transferred in a multicast session is
time-sensitive.
o Efficient group management: Group management refers to the
process of accepting multicast session members and maintaining the
connectivity among them until the session expires.
o Scalability: The multicast routing protocol should be able to scale
for a network with a large number of node
o Security: Authentication of session members and prevention of non-
members from gaining unauthorized information play a major role in
military communications.
4.Transport Layer Protocol
The main objectives of the transport layer protocols include :
o Setting up & maintaining end-to-end connections,
o Reliable end-to-end delivery of packets,
o Flow control & Congestion control.
Examples of some transport layers protocols are,
a) UDP ( User Datagram Protocol ) : It is an unreliable connectionless transport layer
protocol. It neither performs flow control & congestion control. It do not take into account
the current network status such as congestion at the intermediate links, the rate of
collision, or other similar factors affecting the network throughput.
b) TCP (Transmission Control Protocol): It is a reliable connection-oriented transport layer
protocol. It performs flow control & congestion control. Here performance degradation
arises due to frequent path breaks, presence of stale routing information, high channel
error rate, and frequent network partitions.
5.Quality of Service (QoS)
o QoS is the performance level of services offered by a service provider or a network
to the user.
o QoS provisioning often requires,
o Negotiation between host & the network.
o Resource reservation schemes.
o Priority scheduling &
o Call admission control.
Application Corresponding QoS parameter
1.Multimedia application 1.Bandwidth and delay
2.Military application 2.Security & Reliability
3.Defence application 3. Finding trustworthy intermediate host &
routing
4.Emergency search and rescue operations 4.Availability
5.Hybrid wireless network 5. Maximum available link life , delay ,
bandwidth & channel utilization
6.Communication among the nodes in a sensor
network
6.Minimum energy consumption , battery life
and energy conservation
QoS-aware routing :
o Finding the path is the first step toward a QoS-aware routing protocol.
o The parameters that can be considered for routing decisions are,
o Network throughput.
o Packet delivery ratio.
o Reliability.
o Delay.
o Delay jitter.
o Packet loss rate.
o Bit error rate.
6.Self-Organization:
One very important property that an ad hoc wireless network should exhibit is
organizing & maintaining the network by itself.
The major activities that an ad hoc wireless network is required to perform for self
organization are
o Neighbour discovery.
o Topology organization &
o Topology reorganization (updating topology information)
7.Security:
Security is an important issue in ad hoc wireless network as the information can be
hacked.
Attacks against network are two types
o Passive attack → Made by malicious node to obtain information transacted in the
network without disrupting the operation.
o Active attack → They disrupt the operation of network.
Further active attacks are two types
o External attack : The active attacks that are executed by nodes outside the network.
o Internal attack : The active attacks that are performed by nodes belonging to the
same network.
The major security threats that exist in ad hoc wireless networks are as follows :
o Denial of service – The attack affected by making the network resource unavailable for service
to other nodes, either by consuming the bandwidth or by overloading the system.
o Resource consumption – The scarce availability of resources in ad hoc wireless network makes
it an easy target for internal attacks, particularly aiming at consuming resources available in the
network.
The major types of resource consumption attacks are,
a. Energy depletion
b. Highly constrained by the energy source
c. Aimed at depleting the battery power of critical nodes.
d. Buffer overflow
e. Carried out either by filling the routing table with unwanted routing entries or by
consuming the data packet buffer space with unwanted data.
f. Lead to a large number of data packets being dropped, leading to the loss of critical
information.
o Host impersonation – A compromised internal node can act as another node and respond
with appropriate control packets to create wrong route entries, and can terminate the traffic
meant for the intended destination node.
o Information disclosure – A compromised node can act as an informer by deliberate
disclosure of confidential information to unauthorized nodes.
o Interference – A common attack in defense applications to jam the wireless communication
by creating a wide spectrum noise.
8.Addressing and Service Discovery:
o Addressing & service discovery assume significance in ad hoc wireless network due
to the absence of any centralized coordinator.
o An address that is globally unique in the connected part of the ad hoc wireless
network is required for a node in order to participate in communication.
o Auto-configuration of addresses is required to allocate non-duplicate addresses to the nodes.
9.Energy Management:
Energy management is defined as the process of managing the sources & consumers of
energy in a node or in the network for enhancing the lifetime of a network.
Features of energy management are:
o Shaping the energy discharge pattern of a node’s battery to enhance battery life.
o Finding routes that consumes minimum energy.
o Using distributed scheduling schemes to improve battery life.
o Handling the processor & interface devices to minimize power consumption.
Energy management can be classified into the following categories:
o Transmission power management
o The power consumed by the Radio Frequency (RF) module of a mobile node is determined
by several factors such as
a) The state of operation.
b) The transmission power and
c) The technology used for the RF circuitry.
Battery energy management :
o The battery management is aimed at extending the battery life of a node by taking advantage
of its chemical properties, discharge patterns, and by the selection of a battery from a set of
batteries that is available for redundancy.
Processor power management :
o The clock speed and the number of instructions executed per unit time are some of the
processor parameters that affect power consumption.
o The CPU can be put into different power saving modes during low processing load
conditions.
o The CPU power can be completely turned off if the machines is idle for a long time.
Devices power management :
o Intelligent device management can reduce power consumption of a mobile node significantly.
o This can be done by the operating system (OS) by selectively powering down interface devices
that are not used or by putting devices into different power saving modes, depending on their
usage.
10.Scalability
o Scalability is the ability of the routing protocol to scale well in a network with a large
number of nodes.
o It requires minimization of control overhead & adaptation of the routing protocol to
the network size.
11.Deployment Considerations
o The deployment of a commercial ad hoc wireless network has the following benefits
when compared to wired networks
a) Low cost of deployment :
i. The use of multi-hop wireless relaying eliminates the requirement of cables &
maintenance in deployment of communication infrastructure.
ii. The cost involved is much lower than that of wired networks.
b) Incremental deployment :
i. Deployment can be performed incrementally over geographical regions of the city.
ii. The deployed part of the network starts functioning immediately after the
minimum configuration is done.
c) Short deployment time :
Compared to wired networks, the deployment time is considerably less due to the
absence of any wired links.
d) Re-configurability :
The cost involved in reconfiguring a wired network covering a Metropolitan Area
Network (MAN) is very high compared to that of an ad hoc wireless network covering
the same service area.
Thank You

More Related Content

Similar to Ad Hoc.pptx

Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.pptrakesh132809
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptxSelfUse
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptunnipb1
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .pptPawanKayande1
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...ssuser036308
 

Similar to Ad Hoc.pptx (20)

Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
vnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.pptvnd.ms-powerpoint&rendition=1.ppt
vnd.ms-powerpoint&rendition=1.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
 

More from Mathavan N

cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...Mathavan N
 
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...Mathavan N
 
rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...Mathavan N
 
Presentation of Software Defined Radio.ppt
Presentation of Software Defined Radio.pptPresentation of Software Defined Radio.ppt
Presentation of Software Defined Radio.pptMathavan N
 
Engineering Presentation.ppt
Engineering Presentation.pptEngineering Presentation.ppt
Engineering Presentation.pptMathavan N
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxMathavan N
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfMathavan N
 
Unit_II_ppt.pdf.pdf
Unit_II_ppt.pdf.pdfUnit_II_ppt.pdf.pdf
Unit_II_ppt.pdf.pdfMathavan N
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfMathavan N
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfMathavan N
 
Bio potentials.pdf
Bio potentials.pdfBio potentials.pdf
Bio potentials.pdfMathavan N
 
ECG Recording Method.pdf
ECG Recording Method.pdfECG Recording Method.pdf
ECG Recording Method.pdfMathavan N
 
Bio Amplifiers.pdf
Bio Amplifiers.pdfBio Amplifiers.pdf
Bio Amplifiers.pdfMathavan N
 
Surgical diathermy - EC8073 Medical Electronics - Hints for Slow Learner
Surgical diathermy -  EC8073 Medical Electronics - Hints for Slow LearnerSurgical diathermy -  EC8073 Medical Electronics - Hints for Slow Learner
Surgical diathermy - EC8073 Medical Electronics - Hints for Slow LearnerMathavan N
 
Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...
Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...
Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...Mathavan N
 
Pacemaker - EC8073 Medical Electronics - Hints for Slow Learner
Pacemaker - EC8073 Medical Electronics - Hints for Slow LearnerPacemaker - EC8073 Medical Electronics - Hints for Slow Learner
Pacemaker - EC8073 Medical Electronics - Hints for Slow LearnerMathavan N
 
Electrode with image - EC8073 Medical Electronics - Hints for Slow Learner
Electrode with image - EC8073 Medical Electronics - Hints for Slow LearnerElectrode with image - EC8073 Medical Electronics - Hints for Slow Learner
Electrode with image - EC8073 Medical Electronics - Hints for Slow LearnerMathavan N
 

More from Mathavan N (20)

cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
cznamjwyr36wfmgtmdzc-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
 
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
1fbciobmrrqmnlyjl1he-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
 
rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
rafkwnshru2ocnal9ta1-signature-a1b6820cbe628a2a167a0a81f2762fc8f340dd4b93d47a...
 
Presentation of Software Defined Radio.ppt
Presentation of Software Defined Radio.pptPresentation of Software Defined Radio.ppt
Presentation of Software Defined Radio.ppt
 
Engineering Presentation.ppt
Engineering Presentation.pptEngineering Presentation.ppt
Engineering Presentation.ppt
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
UNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdfUNIT_III_FULL_PPT.pdf.pdf
UNIT_III_FULL_PPT.pdf.pdf
 
Unit_II_ppt.pdf.pdf
Unit_II_ppt.pdf.pdfUnit_II_ppt.pdf.pdf
Unit_II_ppt.pdf.pdf
 
Unit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdfUnit_4_Full_pdf.pdf.pdf
Unit_4_Full_pdf.pdf.pdf
 
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdfDigital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
 
EMG.pdf
EMG.pdfEMG.pdf
EMG.pdf
 
EEG.pdf
EEG.pdfEEG.pdf
EEG.pdf
 
PCG.pdf
PCG.pdfPCG.pdf
PCG.pdf
 
Bio potentials.pdf
Bio potentials.pdfBio potentials.pdf
Bio potentials.pdf
 
ECG Recording Method.pdf
ECG Recording Method.pdfECG Recording Method.pdf
ECG Recording Method.pdf
 
Bio Amplifiers.pdf
Bio Amplifiers.pdfBio Amplifiers.pdf
Bio Amplifiers.pdf
 
Surgical diathermy - EC8073 Medical Electronics - Hints for Slow Learner
Surgical diathermy -  EC8073 Medical Electronics - Hints for Slow LearnerSurgical diathermy -  EC8073 Medical Electronics - Hints for Slow Learner
Surgical diathermy - EC8073 Medical Electronics - Hints for Slow Learner
 
Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...
Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...
Electrode Potential with image - EC8073 Medical Electronics - Hints for Slow ...
 
Pacemaker - EC8073 Medical Electronics - Hints for Slow Learner
Pacemaker - EC8073 Medical Electronics - Hints for Slow LearnerPacemaker - EC8073 Medical Electronics - Hints for Slow Learner
Pacemaker - EC8073 Medical Electronics - Hints for Slow Learner
 
Electrode with image - EC8073 Medical Electronics - Hints for Slow Learner
Electrode with image - EC8073 Medical Electronics - Hints for Slow LearnerElectrode with image - EC8073 Medical Electronics - Hints for Slow Learner
Electrode with image - EC8073 Medical Electronics - Hints for Slow Learner
 

Recently uploaded

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Ad Hoc.pptx

  • 1. AD HOC AND WIRELESS SENSOR NETWORKS  ELEMENTS OF AD HOC WIRELESS NETWORKS  ISSUES IN AD HOC WIRELESS NETWORKS
  • 3. o Range of communication 100m (Bluetooth is a typical ad-hoc network)
  • 4. Elements Of AD HOC Wireless Networks o The word “ad hoc” comes from Latin Language, which means ‘for this purpose only‘, Ad hoc Networks are the small area networks, especially designed with Wireless/Temporary connections to the different computer assisted nodes. o A wireless ad-hoc network (WANET) is a type of local area network (LAN) that is built spontaneously to enable two or more wireless devices to be connected to each other without requiring a central device, such as a router or access point. When Wi- Fi networks are in ad-hoc mode, each device in the network forwards data to the others. o Since the devices in the ad-hoc network can access each other's resources directly through a basic point-to-point wireless connection, central servers are unnecessary for functions such as file shares or printers. o In a wireless ad-hoc network, a collection of devices (or nodes) is responsible for network operations, such as routing, security, addressing and key management. multi-hop wireless ad hoc networks, it defined as a collection of nodes that communicate with each other wirelessly by using radio signals with a shared common channel.
  • 5. Types of Wireless Ad Hoc Networks o Mobile ad hoc network (MANET): An ad hoc network of mobile devices. o Vehicular ad hoc network (VANET): Used for communication between vehicles. Intelligent VANETs use artificial intelligence and ad hoc technologies to communicate what should happen during accidents. o Smartphone ad hoc network (SPAN): Wireless ad hoc network created on smartphones via existing technologies like Wi-Fi and Bluetooth. o Wireless mesh network: A mesh network is an ad hoc network where the various nodes are in communication directly with each other to relay information throughout the total network. o Army tactical MENT: Used in the army for "on-the-move" communication, a wireless tactical ad hoc network relies on range and instant operation to establish networks when needed. o Wireless sensor network: Wireless sensors that collect everything from temperature and pressure readings to noise and humidity levels, can form an ad hoc network to deliver information to a home base without needing to connect directly to it. o Disaster rescue ad hoc network: Ad hoc networks are important when disaster strikes and established communication hardware isn't functioning properly.
  • 6. Advantages of Ad Hoc Networks o Ad-hoc networks can have more flexibility. o It is better in mobility. o It can be turn up and turn down in a very short time. o More economical o It considered as a robust network because of its non-hierarchical distributed control and management mechanisms. Disadvantages of Ad Hoc Networks o Unpredictable Topology o Limited Bandwidth o Lose of data o Interference o Limited Security o Energy Constraints
  • 7. Issues in Ad hoc wireless networks The major issues that affect the design, deployment, and performance of an ad hoc wireless system are as follows: o Medium Access Control (MAC) o Routing o Multicasting o Transport layer protocol o Quality of Service (QOS) o Self-organization o Security o Energy management o Addressing and service discovery o Scalability o Deployment considerations
  • 8. 1.Medium Access Control The purpose of this protocol is to achieve a distributed FIFO schedule among multiple nodes in an ad hoc network. When a node transmits a packet, it adds the information about the arrival time of queued packets. It provide fair access to shared broadcast radio channel. The major issues in MAC protocol are as follows: o Distributed Operation: The MAC protocol design should be fully distributed involving minimum control overhead, because it need to operate in environment without centralized device. o Synchronization: The synchronization is mandatory for TDMA-based systems for management of transmission and reception slots. o Hidden Terminals Problem: Hidden terminals are nodes that are hidden (or not reachable) from the sender of a data transmission session, but are reachable to the receiver of the session. o Collisions at receiver node -> inefficient bandwidth utilization, reduce throughput.
  • 9. o Exposed Terminals Problem: The nodes that are in the transmission range of the sender of an on- going session, are prevented from making a transmission. The exposed nodes should be allowed to transmit in a controlled fashion without causing collision to the on-going data transfer. o Throughput: The MAC protocol employed in ad hoc wireless networks should attempt to maximize the throughput of the system. The important considerations for throughput enhancement are a) Minimizing the occurrence of collisions. b) Maximizing channel utilization c) Minimizing control overhead. o Access delay: The average delay that any packet experiences to get transmitted. The MAC protocol should attempt to minimize the delay. o Fairness: Fairness refers to the ability of the MAC protocol to provide an equal share or weighted share of the bandwidth to all competing nodes. Fairness can be either node-based or flow-based. o Real-time Traffic support: In a contention-based channel access environment, without any central coordination, with limited bandwidth, and with location dependent contention, supporting time- sensitive traffic such as voice, video, real-time data requires explicit support from the MAC protocol.
  • 10. o Resource reservation: The provisioning of QoS defined by parameters such as bandwidth, delay, and jitter requires reservation of resources such as bandwidth, buffer space, and processing power. o Ability to measure resource availability: In order to handle the resources such as bandwidth efficiently and perform call admission control based on their availability, the MAC protocol should be able to provide an estimation of resource availability at every node. This can also be used for making congestion control decisions. o Capability for power control: The transmission power control reduces the energy consumption at the nodes, causes a decrease in interference at neighboring nodes, and increases frequency reuse. o Adaptive rate control: This refers to the variation in the data bit rate achieved over a channel. A MAC protocol that has adaptive rate control can make use of a high data rate when the sender and receiver are nearby & adaptively reduce the data rate as they move away from each other.
  • 11. 2.Routing : The responsibilities of a routing protocol include exchanging the route information; finding a feasible path to a destination. The major challenges that a routing protocol faces are as follows: o Mobility: The Mobility of nodes results in frequent path breaks, packet collisions, transient loops, stale routing information, and difficulty in resource reservation. o Bandwidth constraint: Since the channel is shared by all nodes in the broadcast region, the bandwidth available per wireless link depends on the number of nodes & traffic they handle. o Error-prone and shared channel: The Bit Error Rate (BER) in a wireless channel is very high [10^-5 to 10^ -3 ] compared to that in its wired counterparts [10^-12 to 10^-9 ]. o Location-dependent contention: The load on the wireless channel varies with the number of nodes present in a given geographical region. This makes the contention for the channel high when the number of nodes increases. The high contention for the channel results in a high number of collisions & a subsequent wastage of bandwidth.
  • 12. o Other resource constraints: The constraints on resources such as computing power, battery power, and buffer storage also limit the capability of a routing protocol. The major requirements of a routing protocol in ad hoc wireless networks are the following. a. Minimum route acquisition delay b. Quick route reconfiguration c. Loop-free routing d. Distributed routing approach e. Minimum control overhead f. Scalability g. Provisioning of QoS h. Support for time-sensitive traffic i. Security and privacy
  • 13. 3.Multicasting: It plays important role in emergency search & rescue operations & in military communication. Use of single link connectivity among the nodes in a multicast group results in a tree-shaped multicast routing topology. Such a tree-shaped topology provides high multicast efficiency, with low packet delivery ratio due to the frequency tree breaks. The major issues in designing multicast routing protocols are as follows: o Robustness: The multicast routing protocol must be able to recover & reconfigure quickly from potential mobility-induced link breaks thus making it suitable for use in high dynamic environments. o Efficiency: A multicast protocol should make a minimum number of transmissions to deliver a data packet to all the group members. o Control overhead: The scarce bandwidth availability in ad hoc wireless networks demands minimal control overhead for the multicast session.
  • 14. o Quality of Service : QoS support is essential in multicast routing because, in most cases, the data transferred in a multicast session is time-sensitive. o Efficient group management: Group management refers to the process of accepting multicast session members and maintaining the connectivity among them until the session expires. o Scalability: The multicast routing protocol should be able to scale for a network with a large number of node o Security: Authentication of session members and prevention of non- members from gaining unauthorized information play a major role in military communications.
  • 15. 4.Transport Layer Protocol The main objectives of the transport layer protocols include : o Setting up & maintaining end-to-end connections, o Reliable end-to-end delivery of packets, o Flow control & Congestion control. Examples of some transport layers protocols are, a) UDP ( User Datagram Protocol ) : It is an unreliable connectionless transport layer protocol. It neither performs flow control & congestion control. It do not take into account the current network status such as congestion at the intermediate links, the rate of collision, or other similar factors affecting the network throughput. b) TCP (Transmission Control Protocol): It is a reliable connection-oriented transport layer protocol. It performs flow control & congestion control. Here performance degradation arises due to frequent path breaks, presence of stale routing information, high channel error rate, and frequent network partitions.
  • 16. 5.Quality of Service (QoS) o QoS is the performance level of services offered by a service provider or a network to the user. o QoS provisioning often requires, o Negotiation between host & the network. o Resource reservation schemes. o Priority scheduling & o Call admission control.
  • 17. Application Corresponding QoS parameter 1.Multimedia application 1.Bandwidth and delay 2.Military application 2.Security & Reliability 3.Defence application 3. Finding trustworthy intermediate host & routing 4.Emergency search and rescue operations 4.Availability 5.Hybrid wireless network 5. Maximum available link life , delay , bandwidth & channel utilization 6.Communication among the nodes in a sensor network 6.Minimum energy consumption , battery life and energy conservation
  • 18. QoS-aware routing : o Finding the path is the first step toward a QoS-aware routing protocol. o The parameters that can be considered for routing decisions are, o Network throughput. o Packet delivery ratio. o Reliability. o Delay. o Delay jitter. o Packet loss rate. o Bit error rate.
  • 19. 6.Self-Organization: One very important property that an ad hoc wireless network should exhibit is organizing & maintaining the network by itself. The major activities that an ad hoc wireless network is required to perform for self organization are o Neighbour discovery. o Topology organization & o Topology reorganization (updating topology information)
  • 20. 7.Security: Security is an important issue in ad hoc wireless network as the information can be hacked. Attacks against network are two types o Passive attack → Made by malicious node to obtain information transacted in the network without disrupting the operation. o Active attack → They disrupt the operation of network. Further active attacks are two types o External attack : The active attacks that are executed by nodes outside the network. o Internal attack : The active attacks that are performed by nodes belonging to the same network.
  • 21. The major security threats that exist in ad hoc wireless networks are as follows : o Denial of service – The attack affected by making the network resource unavailable for service to other nodes, either by consuming the bandwidth or by overloading the system. o Resource consumption – The scarce availability of resources in ad hoc wireless network makes it an easy target for internal attacks, particularly aiming at consuming resources available in the network. The major types of resource consumption attacks are, a. Energy depletion b. Highly constrained by the energy source c. Aimed at depleting the battery power of critical nodes. d. Buffer overflow e. Carried out either by filling the routing table with unwanted routing entries or by consuming the data packet buffer space with unwanted data. f. Lead to a large number of data packets being dropped, leading to the loss of critical information.
  • 22. o Host impersonation – A compromised internal node can act as another node and respond with appropriate control packets to create wrong route entries, and can terminate the traffic meant for the intended destination node. o Information disclosure – A compromised node can act as an informer by deliberate disclosure of confidential information to unauthorized nodes. o Interference – A common attack in defense applications to jam the wireless communication by creating a wide spectrum noise. 8.Addressing and Service Discovery: o Addressing & service discovery assume significance in ad hoc wireless network due to the absence of any centralized coordinator. o An address that is globally unique in the connected part of the ad hoc wireless network is required for a node in order to participate in communication. o Auto-configuration of addresses is required to allocate non-duplicate addresses to the nodes.
  • 23. 9.Energy Management: Energy management is defined as the process of managing the sources & consumers of energy in a node or in the network for enhancing the lifetime of a network. Features of energy management are: o Shaping the energy discharge pattern of a node’s battery to enhance battery life. o Finding routes that consumes minimum energy. o Using distributed scheduling schemes to improve battery life. o Handling the processor & interface devices to minimize power consumption. Energy management can be classified into the following categories: o Transmission power management o The power consumed by the Radio Frequency (RF) module of a mobile node is determined by several factors such as a) The state of operation. b) The transmission power and c) The technology used for the RF circuitry.
  • 24. Battery energy management : o The battery management is aimed at extending the battery life of a node by taking advantage of its chemical properties, discharge patterns, and by the selection of a battery from a set of batteries that is available for redundancy. Processor power management : o The clock speed and the number of instructions executed per unit time are some of the processor parameters that affect power consumption. o The CPU can be put into different power saving modes during low processing load conditions. o The CPU power can be completely turned off if the machines is idle for a long time. Devices power management : o Intelligent device management can reduce power consumption of a mobile node significantly. o This can be done by the operating system (OS) by selectively powering down interface devices that are not used or by putting devices into different power saving modes, depending on their usage.
  • 25. 10.Scalability o Scalability is the ability of the routing protocol to scale well in a network with a large number of nodes. o It requires minimization of control overhead & adaptation of the routing protocol to the network size. 11.Deployment Considerations o The deployment of a commercial ad hoc wireless network has the following benefits when compared to wired networks a) Low cost of deployment : i. The use of multi-hop wireless relaying eliminates the requirement of cables & maintenance in deployment of communication infrastructure. ii. The cost involved is much lower than that of wired networks.
  • 26. b) Incremental deployment : i. Deployment can be performed incrementally over geographical regions of the city. ii. The deployed part of the network starts functioning immediately after the minimum configuration is done. c) Short deployment time : Compared to wired networks, the deployment time is considerably less due to the absence of any wired links. d) Re-configurability : The cost involved in reconfiguring a wired network covering a Metropolitan Area Network (MAN) is very high compared to that of an ad hoc wireless network covering the same service area.