SlideShare a Scribd company logo
1 of 25
EC8702-Ad Hoc and Wireless
Sensor Networks
Prepared by,
Ms.J.Paruvathavardhini(AP/ECE)
Ms.S.Menaga(AP/ECE)
Jai Shriram Engineering College,Tirupur
contents
•Commercial Applications
• AD hoc wireless internet
• Issues in designing routing protocol
Military Application:
 Useful in communication among a group of soldiers for tactical
operations.
 Useful in the coordination of military objects(air planes or warships)
moving at high speeds.
 For example leader of the soldiers want to give any order to all
soldiers or to a set of selected persons are involved in the operation.
 Used in other services such as location tracking /other satellite
based services.
Collaborative and Distributed Computing:
 To give information in a group of peoples using conference.
For example:
 Group of researchers want to share their research among group of
peoples.
 Lecturer distributing notes to the class.
 Sharing of a file among network.
Emergency Operations:
 Ad hoc is used in search and rescue operations, crowd control and
commando operations.
 Used in coordinating rescue activities during war or the natural
disaster like earthquakes.
 Conventional communication facilities are destroyed in that case ad
hoc network is used for rescue activities.
Wireless Mesh Network:
 Wireless Mesh Network are the ad hoc wireless network that provide
the many alternate path (to reach the destination) for mobile or fixed
nodes/users.
 Quick reconfiguration of the path when the existing path fails due to
node failures.
 Making cost for wireless mesh networks is much less than cellular
networks.
 Possible deployment scenarios are:
 Residential zones
 Highways
 Business Zones
 Important civilian regions
 University campuses
 Mesh Network support high data rate, quick and low cost deployment,
enhanced services, high scalability and high availability.
 Deployment and data transfer rate is less.
 Services for smart environment like updating information about the
environment and updating digital map.
 A sensor network is a collection of large number of sensor nodes that
are deployed in particular region.
 As we know that the sensor are the tiny devices that have capability to
sensing parameter, processing the data and communicate over the
network.
 A sensing can be periodic or sporadic.
Periodic example- Sensing of environmental factors for the
measurement of parameters such as temperature, humidity and
nuclear radiation.
Sporadic example-Detecting border intrusion , measuring the stress on
critical structures.
 Military, Health Care, Home security and environmental monitoring
are the application areas of wireless sensor network.
 Cellular networks – geographical channel reuse.
 Incorporating multi-hop relaying with existing fixed infrastructure
increase the capacity of a cellular network.
 MCNs provide reliability and flexibility.
 Advantages:
Higher capacity due to better channel reuse
Increased flexibility and reliability in routing
Better coverage and connectivity in holes of a cell.
AD HOC wireless
Internet
 The ad hoc wireless Internet extends the services of the
Internet to the end users over an ad hoc wireless network.
 Some of the applications of the ad hoc wireless Internet are
 wireless mesh networks
 provisioning of temporary Internet services to major
conference venues
 sports venues
 temporary military settlements
 battlefields and
 broadband Internet services in rural regions
 The major issues to be considered for a successful ad hoc wireless Internet
are the following:
 Gateways
-Gateway nodes in the ad hoc wireless Internet are the entry points to the
wired Internet, owned and operated by a service provider
-The major part of the service provisioning lies with the gateway nodes.
- Gateways perform the following tasks:
 keeping track of the end users,
 bandwidth management,
 load balancing,
 traffic shaping,
 packet filtering,
 bandwidth fairness, and address,
 service, and location discovery.
 Address mobility
-The ad hoc wireless Internet faces the challenge of address mobility.
-This problem is worse here as the nodes operate over multiple wireless
hops.
-Mobile IP can provide temporary alternatives for this
 Routing
-Causes major issue due to dynamic changes in the topology, the presence
of gateways, multi-hop relaying, and the hybrid character of the network.
-The solution for this is to use a separate routing protocol, exploit the
presence of gateway nodes in the wireless part of the ad hoc wireless
Internet
 Transport layer protocol
-Solutions for transport layer depends on the in the TCP’S extension.
-Split approaches that use traditional wired TCP can be used for the
wired part and
- A specialized protocol where the gateways act as the intermediate nodes
at which the connections are split can be used for the ad hoc wireless
networks
-The state maintenance overhead at the gateway nodes has to be done
correctly
 Load balancing
- Load balancing techniques are essential to distribute the load so as to
avoid the situation where the gateway nodes become bottleneck nodes
 Pricing/billing
-Gateway is the preferred choice for charging the traffic to and from the
Internet.
-Pricing schemes can be used for this purpose.
-Pricing the local traffic
(ie)traffic within the wireless part, that is, it originated and terminated
within the wireless part without passing through the gateway nodes
- It is necessary to have a dedicated, secure, and lightweight
pricing/billing infrastructure installed at every node.
 Provisioning of security
-To avoid potential hackers, who snoop the information sent in air,
security mechanisms should be used.
-Security is a prime factor to perform e-commerce transactions
 QoS support
- With the widespread use of voice over IP (VoIP) and growing multimedia
applications over the Internet, provisioning of QoS support in the ad hoc
wireless Internet becomes a very important issue.
 Service, address, and location discovery
- Service discovery in any network refers to the activity of discovering or
identifying the party which provides a particular service or resource.
- Address discovery refers to the services such as those provided by address
resolution protocol (ARP) or domain name service (DNS) operating
within the wireless domain.
- Location discovery refers to different activities such as detecting the
location of a particular mobile node in the network or detecting the
geographical location of nodes
-LD can provide enhanced services such as routing of packets, location-
based services, and selective region-wide broadcasts.
The major challenges that a routing protocol designed for ad hoc
wireless networks faces are as follows
 Mobility
- The network topology in an ad hoc wireless network is highly dynamic
due to the movement of nodes, hence an on-going session suffers
frequent path breaks.
- Routing protocols for ad hoc wireless networks must be able to perform
efficient and effective mobility management.
 Bandwidth constraint
- In a wireless network, the radio band is limited, and hence the data
rates it can offer are much less than what a wired network can offer.
- This requires that the routing protocols use the bandwidth optimally by
keeping the overhead as low as possible
 Error-Prone Shared Broadcast Radio Channel
- The wireless links have time-varying characteristics in terms of link
capacity and link-error probability.
- This requires that the ad hoc wireless network routing protocol
interacts with the MAC layer to find alternate routes through better-
quality links.
 Hidden and Exposed Terminal Problems
- The hidden terminal problem refers to the collision of packets at a
receiving node due to the simultaneous transmission of those nodes
that are not within the direct transmission range of the sender, but are
within the transmission range of the receiver.
- Collision occurs when both nodes transmit packets at the same time
without knowing about the transmission of each other.
- The exposed terminal problem refers to the inability of a node which is
blocked due to transmission by a nearby transmitting node to transmit
to another node.
 Resource Constraints
- Two essential and limited resources that form the major constraint for
the nodes in an ad hoc wireless network are battery life and processing
power.
- Devices used in ad hoc wireless networks in most cases require
portability, and hence they also have size and weight constraints along
with the restrictions on the power source.
 Characteristics of an Ideal Routing Protocol for Ad Hoc
Wireless Networks
-A routing protocol for ad hoc wireless networks should have the
following characteristics:
1.Fully distributed routing, no centralized routing
2.Must adapt to frequent topology changes
3. Minimum connection set up time is desired
4. Local maintenance
5. Minimum packet collision
6. Convergence must be quick
7. Must be loop-free and free from stale routes
8. It must optimally use scarce resources such as bandwidth, computing
power, memory, and battery power.
9. It must cover all the optimal routes in the network topology
10. It should provide good QoS.
adhoc applications.pptx

More Related Content

Similar to adhoc applications.pptx

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Umang Singh
 
Ad hoc wireless networks-Overview
 Ad hoc wireless networks-Overview Ad hoc wireless networks-Overview
Ad hoc wireless networks-Overviewparuvathavardhinipra
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444IJRAT
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noidaEdhole.com
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocolijceronline
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...IOSR Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to adhoc applications.pptx (20)

Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Ad Hoc.pptx
Ad Hoc.pptxAd Hoc.pptx
Ad Hoc.pptx
 
Ad hoc wireless networks-Overview
 Ad hoc wireless networks-Overview Ad hoc wireless networks-Overview
Ad hoc wireless networks-Overview
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)Mobile computing Mobile Adhoc Networks (MANETs)
Mobile computing Mobile Adhoc Networks (MANETs)
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
Mane ts
Mane tsMane ts
Mane ts
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
H010524049
H010524049H010524049
H010524049
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Quick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing ProtocolQuick Routing for Communication in MANET using Zone Routing Protocol
Quick Routing for Communication in MANET using Zone Routing Protocol
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Et24912915
Et24912915Et24912915
Et24912915
 
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsA Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNs
 
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

adhoc applications.pptx

  • 1. EC8702-Ad Hoc and Wireless Sensor Networks Prepared by, Ms.J.Paruvathavardhini(AP/ECE) Ms.S.Menaga(AP/ECE) Jai Shriram Engineering College,Tirupur
  • 2. contents •Commercial Applications • AD hoc wireless internet • Issues in designing routing protocol
  • 3. Military Application:  Useful in communication among a group of soldiers for tactical operations.  Useful in the coordination of military objects(air planes or warships) moving at high speeds.  For example leader of the soldiers want to give any order to all soldiers or to a set of selected persons are involved in the operation.  Used in other services such as location tracking /other satellite based services.
  • 4. Collaborative and Distributed Computing:  To give information in a group of peoples using conference. For example:  Group of researchers want to share their research among group of peoples.  Lecturer distributing notes to the class.  Sharing of a file among network.
  • 5. Emergency Operations:  Ad hoc is used in search and rescue operations, crowd control and commando operations.  Used in coordinating rescue activities during war or the natural disaster like earthquakes.  Conventional communication facilities are destroyed in that case ad hoc network is used for rescue activities.
  • 6. Wireless Mesh Network:  Wireless Mesh Network are the ad hoc wireless network that provide the many alternate path (to reach the destination) for mobile or fixed nodes/users.  Quick reconfiguration of the path when the existing path fails due to node failures.  Making cost for wireless mesh networks is much less than cellular networks.  Possible deployment scenarios are:  Residential zones  Highways  Business Zones  Important civilian regions  University campuses
  • 7.
  • 8.
  • 9.  Mesh Network support high data rate, quick and low cost deployment, enhanced services, high scalability and high availability.  Deployment and data transfer rate is less.  Services for smart environment like updating information about the environment and updating digital map.
  • 10.  A sensor network is a collection of large number of sensor nodes that are deployed in particular region.  As we know that the sensor are the tiny devices that have capability to sensing parameter, processing the data and communicate over the network.  A sensing can be periodic or sporadic. Periodic example- Sensing of environmental factors for the measurement of parameters such as temperature, humidity and nuclear radiation. Sporadic example-Detecting border intrusion , measuring the stress on critical structures.  Military, Health Care, Home security and environmental monitoring are the application areas of wireless sensor network.
  • 11.  Cellular networks – geographical channel reuse.  Incorporating multi-hop relaying with existing fixed infrastructure increase the capacity of a cellular network.  MCNs provide reliability and flexibility.  Advantages: Higher capacity due to better channel reuse Increased flexibility and reliability in routing Better coverage and connectivity in holes of a cell.
  • 13.  The ad hoc wireless Internet extends the services of the Internet to the end users over an ad hoc wireless network.  Some of the applications of the ad hoc wireless Internet are  wireless mesh networks  provisioning of temporary Internet services to major conference venues  sports venues  temporary military settlements  battlefields and  broadband Internet services in rural regions
  • 14.
  • 15.  The major issues to be considered for a successful ad hoc wireless Internet are the following:  Gateways -Gateway nodes in the ad hoc wireless Internet are the entry points to the wired Internet, owned and operated by a service provider -The major part of the service provisioning lies with the gateway nodes. - Gateways perform the following tasks:  keeping track of the end users,  bandwidth management,  load balancing,  traffic shaping,  packet filtering,  bandwidth fairness, and address,  service, and location discovery.
  • 16.  Address mobility -The ad hoc wireless Internet faces the challenge of address mobility. -This problem is worse here as the nodes operate over multiple wireless hops. -Mobile IP can provide temporary alternatives for this  Routing -Causes major issue due to dynamic changes in the topology, the presence of gateways, multi-hop relaying, and the hybrid character of the network. -The solution for this is to use a separate routing protocol, exploit the presence of gateway nodes in the wireless part of the ad hoc wireless Internet
  • 17.  Transport layer protocol -Solutions for transport layer depends on the in the TCP’S extension. -Split approaches that use traditional wired TCP can be used for the wired part and - A specialized protocol where the gateways act as the intermediate nodes at which the connections are split can be used for the ad hoc wireless networks -The state maintenance overhead at the gateway nodes has to be done correctly  Load balancing - Load balancing techniques are essential to distribute the load so as to avoid the situation where the gateway nodes become bottleneck nodes
  • 18.  Pricing/billing -Gateway is the preferred choice for charging the traffic to and from the Internet. -Pricing schemes can be used for this purpose. -Pricing the local traffic (ie)traffic within the wireless part, that is, it originated and terminated within the wireless part without passing through the gateway nodes - It is necessary to have a dedicated, secure, and lightweight pricing/billing infrastructure installed at every node.  Provisioning of security -To avoid potential hackers, who snoop the information sent in air, security mechanisms should be used. -Security is a prime factor to perform e-commerce transactions
  • 19.  QoS support - With the widespread use of voice over IP (VoIP) and growing multimedia applications over the Internet, provisioning of QoS support in the ad hoc wireless Internet becomes a very important issue.  Service, address, and location discovery - Service discovery in any network refers to the activity of discovering or identifying the party which provides a particular service or resource. - Address discovery refers to the services such as those provided by address resolution protocol (ARP) or domain name service (DNS) operating within the wireless domain.
  • 20. - Location discovery refers to different activities such as detecting the location of a particular mobile node in the network or detecting the geographical location of nodes -LD can provide enhanced services such as routing of packets, location- based services, and selective region-wide broadcasts.
  • 21. The major challenges that a routing protocol designed for ad hoc wireless networks faces are as follows  Mobility - The network topology in an ad hoc wireless network is highly dynamic due to the movement of nodes, hence an on-going session suffers frequent path breaks. - Routing protocols for ad hoc wireless networks must be able to perform efficient and effective mobility management.  Bandwidth constraint - In a wireless network, the radio band is limited, and hence the data rates it can offer are much less than what a wired network can offer. - This requires that the routing protocols use the bandwidth optimally by keeping the overhead as low as possible
  • 22.  Error-Prone Shared Broadcast Radio Channel - The wireless links have time-varying characteristics in terms of link capacity and link-error probability. - This requires that the ad hoc wireless network routing protocol interacts with the MAC layer to find alternate routes through better- quality links.  Hidden and Exposed Terminal Problems - The hidden terminal problem refers to the collision of packets at a receiving node due to the simultaneous transmission of those nodes that are not within the direct transmission range of the sender, but are within the transmission range of the receiver. - Collision occurs when both nodes transmit packets at the same time without knowing about the transmission of each other.
  • 23. - The exposed terminal problem refers to the inability of a node which is blocked due to transmission by a nearby transmitting node to transmit to another node.  Resource Constraints - Two essential and limited resources that form the major constraint for the nodes in an ad hoc wireless network are battery life and processing power. - Devices used in ad hoc wireless networks in most cases require portability, and hence they also have size and weight constraints along with the restrictions on the power source.
  • 24.  Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless Networks -A routing protocol for ad hoc wireless networks should have the following characteristics: 1.Fully distributed routing, no centralized routing 2.Must adapt to frequent topology changes 3. Minimum connection set up time is desired 4. Local maintenance 5. Minimum packet collision 6. Convergence must be quick 7. Must be loop-free and free from stale routes 8. It must optimally use scarce resources such as bandwidth, computing power, memory, and battery power. 9. It must cover all the optimal routes in the network topology 10. It should provide good QoS.