SlideShare a Scribd company logo
1 of 31
P R E P A R E D B Y ,
MS.J.PARUVATHAVARDHINI,AP /ECE
MS.S.MENAGA,AP /ECE
JAI SHRIRAM ENGINEERING
COLLEGE,TIRUPUR
EC 8702- Adhoc and
Wireless Sensor Network
Points to be re-collected
 Wireless communication
-Propagation mechanisms
-Multiple access techniques
-Modulation techniques
 Router
It is a networking device that forwards data packets
between computer networks
 Routing algorithm
Used for deciding which route an incoming data packet
needs has to choose
Continued….
 Protocol
-Set of rules
 Data packet
-Header and a pay load
 Circuit switching
-Direct connection to and other
Eg: telephone
 Packet switching
-Data sent in packets, by choosing an optimal route
to the destination
 Single hop
- Has only two endpoints (i.e. source and destination)
 Multihop
-to reach the destination a source node can use other
nodes as relays.
 Unicast
-one to one transmission, sender and receiver known to
each other by the n/w address of each other
 Broad cast
-one to many model
 Multicast
-one to many or many to many
WANET or MANET
 It is an infrastructure less network
 Also, called as decentralized type of wireless n/w
 Consists of nodes which are both the sender and receiver
 Each node participates in routing by forwarding data to
other nodes(node selection is done dynamically)
In-short, ad-hoc is
 A communication mode that allows computer to
directly communicate with each other without a
router
 Networks are self configuring
 Dynamic networks in which nodes are free to move
Advantages:
 Lack of complexities of infrastructure setup and
administration
 It enables devices to create and join n/ws, “on the fly” any
time, anywhere.
 Each node forwards traffic unrelated to its own use(ie) every
node acts as a router
 The MANETs should be carefully designed
 Each device should be equipped to continuously maintain the
information required to properly route the traffic.
Features
 The desire to route packets to/through every other
node
 The percentage of overhead traffic needed to
maintain real-time routing status
 Each node has its own goodput to route independent
and unaware of others needs,
 All must share limited communication bandwidth,
such as a slice of radio spectrum.
 The earliest wireless data network was called PRNET,
the packet radio network, and was sponsored by Defense
Advanced Research Projects Agency (DARPA) in the early
1970s.
A Stanford Research Institute's Packet Radio
Van, site of the first three-
way internetworked transmission
 These early packet radio systems predated the Internet, and
indeed were part of the motivation of the original Internet
Protocol suite.
 Later DARPA experiments included the Survivable Radio
Network (SURAN) project.
 The growth of laptops and 802.11/Wi-Fi wireless
networking have made MANETs a popular research topic
since the mid-1990s.
 Many academic papers evaluate protocols and their
abilities, assuming varying degrees of mobility within a
bounded space, usually with all nodes within a few hops of
each other.
 Different protocols are then evaluated based on measures
such as the packet drop rate, the overhead introduced by
the routing protocol, end-to-end packet delays, network
throughput, ability to scale, etc.
Types of Ad hoc networks
Types of Ad hoc network
1. Wireless mesh network
 Formed to provide an alternate communication infrastructure for
mobile or fixed nodes/users, without the spectrum reuse constraints
and the requirements of network planning of cellular networks.
Types of Ad hoc network
2. Wireless sensor network
 Used to provide a wireless communication infrastructure
among the sensors deployed in a specific application
domain.
3. Hybrid wireless network
 when two nodes in the same cell want to communicate with each other,
the connection is routed through multiple wireless hops over the
intermediate nodes. the base station maintains the information about
the topology of the network for efficient routing.
Difference between…
Cellular network Ad hoc network
• Fixed infrastructure No infrastructure
• Single hop wireless link Multi hop wireless link
• Centralized routing Distributed routing
• High cost Low cost
• Seamless connectivity Frequent path breaks
due to mobility
•
Applications
 Military applications
 Collaborative computing
 Emergency rescue
 Mesh networks
 Wireless sensor networks
 Multi-hop cellular networks
 Wireless Community Network
Protocol stack
 The challenges affecting MANETs span from various
layers of the OSI protocol stack.
 The media access layer (MAC) has to be improved to
resolve collisions and hidden terminal problems.
 The network layer routing protocol has to be improved
to resolve dynamically changing network topologies
and broken routes.
 The transport layer protocol has to be improved to
handle lost or broken connections.
 The session layer protocol has to deal with discovery of
servers and services
Limitations
 Have high mobility, causing links to be frequently
broken and reestablished.
 Moreover, the bandwidth of a wireless channel is
also limited, and
 Nodes operate on limited battery power, which will
eventually be exhausted
Routing
 There are three types of routing
-Proactive routing
-Reactive routing
-Hybrid routing
Proactive routing
 This type of protocols maintains fresh lists of
destinations and their routes by periodically
distributing routing tables throughout the network
Disadvantages
 Respective amount of data for maintenance.
 Slow reaction on restructuring and failures
- Distance vector routing-based on calculating the
direction and distance to any link in a network
Reactive routing
 This type of protocol finds a route based on user
and traffic demand by flooding the network with
Route Request or Discovery packets
Disadvantages:
 High latency time in route finding.
 Excessive flooding can lead to network clogging.
Flooding- a simple routing algorithm in which
every incoming packet is sent through every
outgoing link except the one it arrived on.
Eg: OSPF, DVMRP
Hybrid routing
 This type of protocol combines the advantages
of proactive and reactive routing. The routing is
initially established with some proactively prospected
routes and then serves the demand from additionally
activated nodes through reactive flooding.
 The choice of one or the other method requires
predetermination for typical cases.
Diadvantages:
 Advantage depends on number of other nodes activated.
 Reaction to traffic demand depends on gradient of traffic
volume
Position-based routing
 Position-based routing methods use information
on the exact locations of the nodes. This
information is obtained for example via
a GPS receiver. Based on the exact location the best
path between source and destination nodes can be
determined.
Eg:"Location-Aided Routing in mobile ad hoc
networks" (LAR)
Routers
IEEE 802.11
 IEEE 802.11 is part of the IEEE 802 set of LAN protocols,
and specifies the set of media access control (MAC)
and physical layer (PHY) protocols for
implementing wireless local area network (WLAN) Wi-
Fi computer communication in various frequencies,
including but not limited to 2.4 GHz, 5 GHz, and 60 GHz
frequency bands.
 They are the world's most widely used wireless computer
networking standards, used in most home and office
networks to allow laptops, printers, and smartphones to
talk to each other and access the Internet without
connecting wires.
 They are created and maintained by the Institute of
Electrical and Electronics
Engineers (IEEE) LAN/MAN Standards Committee (IEEE
802).
 The standard and amendments provide the basis for
wireless network products using the Wi- Fi brand.
 While each amendment is officially revoked when it is
incorporated in the latest version of the standard
 The corporate world tends to market to the revisions
because they concisely denote capabilities of their products
 The protocols are typically used in conjunction with IEEE
802.2, and are designed to interwork seamlessly
with Ethernet, and are very often used to carry Internet
Protocol traffic.
 Although IEEE 802.11 specifications list channels that
might be used, the radio frequency spectrum availability
allowed varies significantly by regulatory domain.
IEEE 802.11 amendments
Thank you

More Related Content

What's hot

Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Text compression
Text compressionText compression
Text compressionkrishnagd22
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologiesshashi712
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETtelecomsutra
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAshok Panwar
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.Mangesh Vasu
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesBisrat Girma
 

What's hot (20)

Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Text compression
Text compressionText compression
Text compression
 
AD-HOC NETWORK
AD-HOC NETWORKAD-HOC NETWORK
AD-HOC NETWORK
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.ADhoc- network overview,application,issues.
ADhoc- network overview,application,issues.
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Computer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN TechnologiesComputer Networking: LAN and WAN Technologies
Computer Networking: LAN and WAN Technologies
 

Similar to Ad hoc wireless networks-Overview

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environmentijsrd.com
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsnGOWTHAMMS6
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...IJERA Editor
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
adhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdfadhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdfparuvathavardhinij
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETIOSR Journals
 

Similar to Ad hoc wireless networks-Overview (20)

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
 
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc EnvironmentComparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
Comparatively analysis of AODV and DSR in MAC layer for Ad Hoc Environment
 
Mane ts
Mane tsMane ts
Mane ts
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Hd3612761280
Hd3612761280Hd3612761280
Hd3612761280
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
PERFORMANCE COMPARISON OF AODV AND DSDV ROUTING PROTOCOLS IN WIRELESS AD HOC ...
 
adhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdfadhoc wireless networks and its issues.pdf
adhoc wireless networks and its issues.pdf
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Survey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANETSurvey of Reactive Routing Protocols for MANET
Survey of Reactive Routing Protocols for MANET
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 

Ad hoc wireless networks-Overview

  • 1. P R E P A R E D B Y , MS.J.PARUVATHAVARDHINI,AP /ECE MS.S.MENAGA,AP /ECE JAI SHRIRAM ENGINEERING COLLEGE,TIRUPUR EC 8702- Adhoc and Wireless Sensor Network
  • 2. Points to be re-collected  Wireless communication -Propagation mechanisms -Multiple access techniques -Modulation techniques  Router It is a networking device that forwards data packets between computer networks  Routing algorithm Used for deciding which route an incoming data packet needs has to choose
  • 3. Continued….  Protocol -Set of rules  Data packet -Header and a pay load  Circuit switching -Direct connection to and other Eg: telephone  Packet switching -Data sent in packets, by choosing an optimal route to the destination
  • 4.  Single hop - Has only two endpoints (i.e. source and destination)  Multihop -to reach the destination a source node can use other nodes as relays.  Unicast -one to one transmission, sender and receiver known to each other by the n/w address of each other  Broad cast -one to many model  Multicast -one to many or many to many
  • 5. WANET or MANET  It is an infrastructure less network  Also, called as decentralized type of wireless n/w  Consists of nodes which are both the sender and receiver  Each node participates in routing by forwarding data to other nodes(node selection is done dynamically)
  • 6. In-short, ad-hoc is  A communication mode that allows computer to directly communicate with each other without a router  Networks are self configuring  Dynamic networks in which nodes are free to move
  • 7. Advantages:  Lack of complexities of infrastructure setup and administration  It enables devices to create and join n/ws, “on the fly” any time, anywhere.  Each node forwards traffic unrelated to its own use(ie) every node acts as a router  The MANETs should be carefully designed  Each device should be equipped to continuously maintain the information required to properly route the traffic.
  • 8. Features  The desire to route packets to/through every other node  The percentage of overhead traffic needed to maintain real-time routing status  Each node has its own goodput to route independent and unaware of others needs,  All must share limited communication bandwidth, such as a slice of radio spectrum.
  • 9.  The earliest wireless data network was called PRNET, the packet radio network, and was sponsored by Defense Advanced Research Projects Agency (DARPA) in the early 1970s. A Stanford Research Institute's Packet Radio Van, site of the first three- way internetworked transmission
  • 10.  These early packet radio systems predated the Internet, and indeed were part of the motivation of the original Internet Protocol suite.  Later DARPA experiments included the Survivable Radio Network (SURAN) project.  The growth of laptops and 802.11/Wi-Fi wireless networking have made MANETs a popular research topic since the mid-1990s.
  • 11.  Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other.  Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc.
  • 12. Types of Ad hoc networks
  • 13. Types of Ad hoc network 1. Wireless mesh network  Formed to provide an alternate communication infrastructure for mobile or fixed nodes/users, without the spectrum reuse constraints and the requirements of network planning of cellular networks.
  • 14. Types of Ad hoc network 2. Wireless sensor network  Used to provide a wireless communication infrastructure among the sensors deployed in a specific application domain.
  • 15. 3. Hybrid wireless network  when two nodes in the same cell want to communicate with each other, the connection is routed through multiple wireless hops over the intermediate nodes. the base station maintains the information about the topology of the network for efficient routing.
  • 16. Difference between… Cellular network Ad hoc network • Fixed infrastructure No infrastructure • Single hop wireless link Multi hop wireless link • Centralized routing Distributed routing • High cost Low cost • Seamless connectivity Frequent path breaks due to mobility •
  • 17. Applications  Military applications  Collaborative computing  Emergency rescue  Mesh networks  Wireless sensor networks  Multi-hop cellular networks  Wireless Community Network
  • 18. Protocol stack  The challenges affecting MANETs span from various layers of the OSI protocol stack.  The media access layer (MAC) has to be improved to resolve collisions and hidden terminal problems.  The network layer routing protocol has to be improved to resolve dynamically changing network topologies and broken routes.  The transport layer protocol has to be improved to handle lost or broken connections.  The session layer protocol has to deal with discovery of servers and services
  • 19. Limitations  Have high mobility, causing links to be frequently broken and reestablished.  Moreover, the bandwidth of a wireless channel is also limited, and  Nodes operate on limited battery power, which will eventually be exhausted
  • 20. Routing  There are three types of routing -Proactive routing -Reactive routing -Hybrid routing
  • 21. Proactive routing  This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network Disadvantages  Respective amount of data for maintenance.  Slow reaction on restructuring and failures - Distance vector routing-based on calculating the direction and distance to any link in a network
  • 22. Reactive routing  This type of protocol finds a route based on user and traffic demand by flooding the network with Route Request or Discovery packets Disadvantages:  High latency time in route finding.  Excessive flooding can lead to network clogging. Flooding- a simple routing algorithm in which every incoming packet is sent through every outgoing link except the one it arrived on. Eg: OSPF, DVMRP
  • 23. Hybrid routing  This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding.  The choice of one or the other method requires predetermination for typical cases. Diadvantages:  Advantage depends on number of other nodes activated.  Reaction to traffic demand depends on gradient of traffic volume
  • 24. Position-based routing  Position-based routing methods use information on the exact locations of the nodes. This information is obtained for example via a GPS receiver. Based on the exact location the best path between source and destination nodes can be determined. Eg:"Location-Aided Routing in mobile ad hoc networks" (LAR)
  • 26. IEEE 802.11  IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) Wi- Fi computer communication in various frequencies, including but not limited to 2.4 GHz, 5 GHz, and 60 GHz frequency bands.
  • 27.  They are the world's most widely used wireless computer networking standards, used in most home and office networks to allow laptops, printers, and smartphones to talk to each other and access the Internet without connecting wires.  They are created and maintained by the Institute of Electrical and Electronics Engineers (IEEE) LAN/MAN Standards Committee (IEEE 802).
  • 28.  The standard and amendments provide the basis for wireless network products using the Wi- Fi brand.  While each amendment is officially revoked when it is incorporated in the latest version of the standard  The corporate world tends to market to the revisions because they concisely denote capabilities of their products
  • 29.  The protocols are typically used in conjunction with IEEE 802.2, and are designed to interwork seamlessly with Ethernet, and are very often used to carry Internet Protocol traffic.  Although IEEE 802.11 specifications list channels that might be used, the radio frequency spectrum availability allowed varies significantly by regulatory domain.