1. P R E P A R E D B Y ,
MS.J.PARUVATHAVARDHINI,AP /ECE
MS.S.MENAGA,AP /ECE
JAI SHRIRAM ENGINEERING
COLLEGE,TIRUPUR
EC 8702- Adhoc and
Wireless Sensor Network
2. Points to be re-collected
Wireless communication
-Propagation mechanisms
-Multiple access techniques
-Modulation techniques
Router
It is a networking device that forwards data packets
between computer networks
Routing algorithm
Used for deciding which route an incoming data packet
needs has to choose
3. Continued….
Protocol
-Set of rules
Data packet
-Header and a pay load
Circuit switching
-Direct connection to and other
Eg: telephone
Packet switching
-Data sent in packets, by choosing an optimal route
to the destination
4. Single hop
- Has only two endpoints (i.e. source and destination)
Multihop
-to reach the destination a source node can use other
nodes as relays.
Unicast
-one to one transmission, sender and receiver known to
each other by the n/w address of each other
Broad cast
-one to many model
Multicast
-one to many or many to many
5. WANET or MANET
It is an infrastructure less network
Also, called as decentralized type of wireless n/w
Consists of nodes which are both the sender and receiver
Each node participates in routing by forwarding data to
other nodes(node selection is done dynamically)
6. In-short, ad-hoc is
A communication mode that allows computer to
directly communicate with each other without a
router
Networks are self configuring
Dynamic networks in which nodes are free to move
7. Advantages:
Lack of complexities of infrastructure setup and
administration
It enables devices to create and join n/ws, “on the fly” any
time, anywhere.
Each node forwards traffic unrelated to its own use(ie) every
node acts as a router
The MANETs should be carefully designed
Each device should be equipped to continuously maintain the
information required to properly route the traffic.
8. Features
The desire to route packets to/through every other
node
The percentage of overhead traffic needed to
maintain real-time routing status
Each node has its own goodput to route independent
and unaware of others needs,
All must share limited communication bandwidth,
such as a slice of radio spectrum.
9. The earliest wireless data network was called PRNET,
the packet radio network, and was sponsored by Defense
Advanced Research Projects Agency (DARPA) in the early
1970s.
A Stanford Research Institute's Packet Radio
Van, site of the first three-
way internetworked transmission
10. These early packet radio systems predated the Internet, and
indeed were part of the motivation of the original Internet
Protocol suite.
Later DARPA experiments included the Survivable Radio
Network (SURAN) project.
The growth of laptops and 802.11/Wi-Fi wireless
networking have made MANETs a popular research topic
since the mid-1990s.
11. Many academic papers evaluate protocols and their
abilities, assuming varying degrees of mobility within a
bounded space, usually with all nodes within a few hops of
each other.
Different protocols are then evaluated based on measures
such as the packet drop rate, the overhead introduced by
the routing protocol, end-to-end packet delays, network
throughput, ability to scale, etc.
13. Types of Ad hoc network
1. Wireless mesh network
Formed to provide an alternate communication infrastructure for
mobile or fixed nodes/users, without the spectrum reuse constraints
and the requirements of network planning of cellular networks.
14. Types of Ad hoc network
2. Wireless sensor network
Used to provide a wireless communication infrastructure
among the sensors deployed in a specific application
domain.
15. 3. Hybrid wireless network
when two nodes in the same cell want to communicate with each other,
the connection is routed through multiple wireless hops over the
intermediate nodes. the base station maintains the information about
the topology of the network for efficient routing.
16. Difference between…
Cellular network Ad hoc network
• Fixed infrastructure No infrastructure
• Single hop wireless link Multi hop wireless link
• Centralized routing Distributed routing
• High cost Low cost
• Seamless connectivity Frequent path breaks
due to mobility
•
18. Protocol stack
The challenges affecting MANETs span from various
layers of the OSI protocol stack.
The media access layer (MAC) has to be improved to
resolve collisions and hidden terminal problems.
The network layer routing protocol has to be improved
to resolve dynamically changing network topologies
and broken routes.
The transport layer protocol has to be improved to
handle lost or broken connections.
The session layer protocol has to deal with discovery of
servers and services
19. Limitations
Have high mobility, causing links to be frequently
broken and reestablished.
Moreover, the bandwidth of a wireless channel is
also limited, and
Nodes operate on limited battery power, which will
eventually be exhausted
20. Routing
There are three types of routing
-Proactive routing
-Reactive routing
-Hybrid routing
21. Proactive routing
This type of protocols maintains fresh lists of
destinations and their routes by periodically
distributing routing tables throughout the network
Disadvantages
Respective amount of data for maintenance.
Slow reaction on restructuring and failures
- Distance vector routing-based on calculating the
direction and distance to any link in a network
22. Reactive routing
This type of protocol finds a route based on user
and traffic demand by flooding the network with
Route Request or Discovery packets
Disadvantages:
High latency time in route finding.
Excessive flooding can lead to network clogging.
Flooding- a simple routing algorithm in which
every incoming packet is sent through every
outgoing link except the one it arrived on.
Eg: OSPF, DVMRP
23. Hybrid routing
This type of protocol combines the advantages
of proactive and reactive routing. The routing is
initially established with some proactively prospected
routes and then serves the demand from additionally
activated nodes through reactive flooding.
The choice of one or the other method requires
predetermination for typical cases.
Diadvantages:
Advantage depends on number of other nodes activated.
Reaction to traffic demand depends on gradient of traffic
volume
24. Position-based routing
Position-based routing methods use information
on the exact locations of the nodes. This
information is obtained for example via
a GPS receiver. Based on the exact location the best
path between source and destination nodes can be
determined.
Eg:"Location-Aided Routing in mobile ad hoc
networks" (LAR)
26. IEEE 802.11
IEEE 802.11 is part of the IEEE 802 set of LAN protocols,
and specifies the set of media access control (MAC)
and physical layer (PHY) protocols for
implementing wireless local area network (WLAN) Wi-
Fi computer communication in various frequencies,
including but not limited to 2.4 GHz, 5 GHz, and 60 GHz
frequency bands.
27. They are the world's most widely used wireless computer
networking standards, used in most home and office
networks to allow laptops, printers, and smartphones to
talk to each other and access the Internet without
connecting wires.
They are created and maintained by the Institute of
Electrical and Electronics
Engineers (IEEE) LAN/MAN Standards Committee (IEEE
802).
28. The standard and amendments provide the basis for
wireless network products using the Wi- Fi brand.
While each amendment is officially revoked when it is
incorporated in the latest version of the standard
The corporate world tends to market to the revisions
because they concisely denote capabilities of their products
29. The protocols are typically used in conjunction with IEEE
802.2, and are designed to interwork seamlessly
with Ethernet, and are very often used to carry Internet
Protocol traffic.
Although IEEE 802.11 specifications list channels that
might be used, the radio frequency spectrum availability
allowed varies significantly by regulatory domain.