SlideShare a Scribd company logo
AD-HOC WIRELESS NETWORK
BY
R.HARIN
12011J6079
CONTENTS
WHAT IS AD-HOC NETWORK?
WIRELESS MESH NETWORK
WHAT IS WSN?
HYBRID WIRELESS NETWORKS
APPLICATIONS
FUTURE SCOPE
REFERENCE
WHAT IS AD-HOC NETWORK
Ad Hoc Networks: multi-hop radio relaying and without support of
infrastructure and without support of infrastructure
 Wireless Mesh Networks
 Wireless Sensor Networks
CELLULAR AND AD HOC WIRELESS NETWORKS
WIRELESS MESH NETWORK
An alternate communication infrastructure for mobile or fixed nodes/users
Provides many alternate paths for a data transfer session between a source and
transfer session between a source and destination
Advantages of Wireless Mesh Networks
High data rate, quick and low cost of deployment,
enhanced services, high scalability, easy
extendibility, high availability, and low cost per bit
WIRELESS MESH NETWORKS OPERATING
WHAT IS WSN ?
A WSN typically has little or no infrastructure. It consists of a number of sensor
nodes (few tens to thousands) working together to monitor a region to obtain
data.
There are two types of WSNs:
1.Structured
2.unstructured.
An unstructured WSN is one that contains a dense collection of
sensor nodes. Sensor nodes may be deployed in an ad hoc
manner into the field.
In a structured WSN, all or some of the sensor nodes are deployed
in a pre-planned manner.
The advantage of a structured
network is that fewer nodes can be deployed with lower network
maintenance and management cost. Fewer nodes can be
deployed now since nodes are placed at specific locations to
provide coverage while ad hoc deployment can have uncovered
regions.
TYPES OF SENSOR NETWORKS
Current WSNs are deployed on
• land
• Underground and
• underwater.
Depending on the environment, a sensor network faces different challenges and
constraints.
There are five types of WSNs:
terrestrial WSN
underground WSN
underwater WSN
multi-media WSN and
mobile WSN
A cellular networks
An ad hoc wireless networks
HYBRID WIRELESS NETWORKS
HYBRID WIRELESS NETWORKS
HWN such as Multi-hop cellular networks and integrated cellular ad hoc
relay networks
The base station maintains the information about the topology of the
network for efficient routing
The capacity of a cellular network can be increased if the network
incorporates the properties of multi-hop relaying network incorporates
the properties of multi-hop relaying along with the support of existing
fixed infrastructure
Advantages:
Higher capacity than cellular networks due to better channel reuse
Increased flexibility and reliability in routing
Better coverage and connectivity in holes
Differences between cellular networks and ad-hoc
wireless networks
APPLICATIONS
AD HOC WIRELESS NETWORK applications can be classified
into two categories:
• monitoring and tracking (include indoor/outdoor environmental
monitoring)
• health and wellness monitoring, power monitoring, inventory
• location monitoring, factory and process automation,and seismic and
structural monitoring.
• Tracking applications include tracking objects, animals, humans, and
vehicles.
OVERVIEW OF SENSOR APPLICATIONS.
AD HOC WIRELESS INTERNET
FUTURE SCOPE
• * Everything on Internet
• * Everybody on Internet
• -Technology to
*Blend and interconnect individual smart devices
*Enable access to information about the real world
*Interact and influence the real world
*Connected Consumer Electronics
*Intelligent transport, industry and society, smart utilities
REFERENCE
Ad hoc wireless networks Architectures and protocols By C.Siva Ram Murthy and
B.S.Manoj
A Secure Routing Protocol for Ad Hoc network By Kimaya Sanzgir
Mobile Communications By Jochen H. Schiller

More Related Content

What's hot

Ad hoc Wireless Network
Ad hoc Wireless NetworkAd hoc Wireless Network
Ad hoc Wireless Network
Malik Zaib
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
telecomsutra
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
shashi712
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
 
MANET
MANETMANET
MANET
Teja Babu
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
Prof. Dr. Noman Islam
 
Manet
ManetManet
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
YunusKhan38
 
Wifi adhoc and infrastructure mode
Wifi adhoc and infrastructure modeWifi adhoc and infrastructure mode
Wifi adhoc and infrastructure modesandhilu
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
Çãñdál Lïght
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7Ramesh Babu
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
mdfarhanh1
 

What's hot (20)

Ad hoc Wireless Network
Ad hoc Wireless NetworkAd hoc Wireless Network
Ad hoc Wireless Network
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Adhoc technologies
Adhoc technologiesAdhoc technologies
Adhoc technologies
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
 
MANET
MANETMANET
MANET
 
Adhoc network
Adhoc networkAdhoc network
Adhoc network
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Ad hoc networks introduction
Ad hoc networks   introductionAd hoc networks   introduction
Ad hoc networks introduction
 
Manet
ManetManet
Manet
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Wifi adhoc and infrastructure mode
Wifi adhoc and infrastructure modeWifi adhoc and infrastructure mode
Wifi adhoc and infrastructure mode
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Mobile Computing UNIT-7
Mobile Computing UNIT-7Mobile Computing UNIT-7
Mobile Computing UNIT-7
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 

Viewers also liked

Meixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent AdvancesMeixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent Advancesmelvincabatuan
 
Ad hoc wireless network final
Ad hoc wireless network finalAd hoc wireless network final
Ad hoc wireless network final
Shiza Kokab
 
ANRG Research Overview - April 2015
ANRG Research Overview - April 2015ANRG Research Overview - April 2015
ANRG Research Overview - April 2015
bhaskark2
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
drboon
 
Quality of service in wireless communication
Quality of service in wireless communicationQuality of service in wireless communication
Quality of service in wireless communicationPRADEEP Cheekatla
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtuchempa
 
Wireless traffic theory and handoff
Wireless traffic theory and handoffWireless traffic theory and handoff
Wireless traffic theory and handoff
Munaf Rashid
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
Ali Habeeb
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
Sajid Marwat
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
ateeq ateeq
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Technical Overview of LTE ( Hyung G. Myung)
Technical Overview of LTE ( Hyung G. Myung)Technical Overview of LTE ( Hyung G. Myung)
Technical Overview of LTE ( Hyung G. Myung)
Going LTE
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
shashi712
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
Vicky Kumar
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routingphanleson
 

Viewers also liked (20)

Meixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent AdvancesMeixia Tao Introduction To Wireless Communications And Recent Advances
Meixia Tao Introduction To Wireless Communications And Recent Advances
 
Ad hoc wireless network final
Ad hoc wireless network finalAd hoc wireless network final
Ad hoc wireless network final
 
ANRG Research Overview - April 2015
ANRG Research Overview - April 2015ANRG Research Overview - April 2015
ANRG Research Overview - April 2015
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
Quality of service in wireless communication
Quality of service in wireless communicationQuality of service in wireless communication
Quality of service in wireless communication
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Unit vi and vii vtu
Unit vi and vii vtuUnit vi and vii vtu
Unit vi and vii vtu
 
Wireless traffic theory and handoff
Wireless traffic theory and handoffWireless traffic theory and handoff
Wireless traffic theory and handoff
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Technical Overview of LTE ( Hyung G. Myung)
Technical Overview of LTE ( Hyung G. Myung)Technical Overview of LTE ( Hyung G. Myung)
Technical Overview of LTE ( Hyung G. Myung)
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
 
Chapter 06 - Routing
Chapter 06 - RoutingChapter 06 - Routing
Chapter 06 - Routing
 

Similar to AD-HOC NETWORK

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
Kathirvel Ayyaswamy
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
Ameer Sameer
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Nishant Bhardwaj
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
ArunChokkalingam
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
Ganesh Khadsan
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
devika g
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasmpgarciam
 
Manet
ManetManet
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
ShubhamTakkar
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
mpgarciam
 
Top schools in gudgao
Top schools in gudgaoTop schools in gudgao
Top schools in gudgao
Edhole.com
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary Applications
ControlEng
 
Presentation seminar shubham
Presentation seminar shubhamPresentation seminar shubham
Presentation seminar shubham
ShubhamPal80
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
KamakshiMB1
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
Rajesh Karumanchi
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
Edhole.com
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
Prof Ansari
 

Similar to AD-HOC NETWORK (20)

Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...Cognitive radio wireless sensor networks applications, challenges and researc...
Cognitive radio wireless sensor networks applications, challenges and researc...
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
 
Manet
ManetManet
Manet
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
 
Top schools in gudgao
Top schools in gudgaoTop schools in gudgao
Top schools in gudgao
 
Wireless for Stationary Applications
Wireless for Stationary ApplicationsWireless for Stationary Applications
Wireless for Stationary Applications
 
Presentation seminar shubham
Presentation seminar shubhamPresentation seminar shubham
Presentation seminar shubham
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Top schools in noida
Top schools in noidaTop schools in noida
Top schools in noida
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 

Recently uploaded

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

AD-HOC NETWORK

  • 2. CONTENTS WHAT IS AD-HOC NETWORK? WIRELESS MESH NETWORK WHAT IS WSN? HYBRID WIRELESS NETWORKS APPLICATIONS FUTURE SCOPE REFERENCE
  • 3. WHAT IS AD-HOC NETWORK Ad Hoc Networks: multi-hop radio relaying and without support of infrastructure and without support of infrastructure  Wireless Mesh Networks  Wireless Sensor Networks
  • 4. CELLULAR AND AD HOC WIRELESS NETWORKS
  • 5. WIRELESS MESH NETWORK An alternate communication infrastructure for mobile or fixed nodes/users Provides many alternate paths for a data transfer session between a source and transfer session between a source and destination Advantages of Wireless Mesh Networks High data rate, quick and low cost of deployment, enhanced services, high scalability, easy extendibility, high availability, and low cost per bit
  • 7. WHAT IS WSN ? A WSN typically has little or no infrastructure. It consists of a number of sensor nodes (few tens to thousands) working together to monitor a region to obtain data. There are two types of WSNs: 1.Structured 2.unstructured.
  • 8. An unstructured WSN is one that contains a dense collection of sensor nodes. Sensor nodes may be deployed in an ad hoc manner into the field. In a structured WSN, all or some of the sensor nodes are deployed in a pre-planned manner. The advantage of a structured network is that fewer nodes can be deployed with lower network maintenance and management cost. Fewer nodes can be deployed now since nodes are placed at specific locations to provide coverage while ad hoc deployment can have uncovered regions.
  • 9. TYPES OF SENSOR NETWORKS Current WSNs are deployed on • land • Underground and • underwater. Depending on the environment, a sensor network faces different challenges and constraints. There are five types of WSNs: terrestrial WSN underground WSN underwater WSN multi-media WSN and mobile WSN
  • 11. An ad hoc wireless networks
  • 13. HYBRID WIRELESS NETWORKS HWN such as Multi-hop cellular networks and integrated cellular ad hoc relay networks The base station maintains the information about the topology of the network for efficient routing The capacity of a cellular network can be increased if the network incorporates the properties of multi-hop relaying network incorporates the properties of multi-hop relaying along with the support of existing fixed infrastructure Advantages: Higher capacity than cellular networks due to better channel reuse Increased flexibility and reliability in routing Better coverage and connectivity in holes
  • 14. Differences between cellular networks and ad-hoc wireless networks
  • 15. APPLICATIONS AD HOC WIRELESS NETWORK applications can be classified into two categories: • monitoring and tracking (include indoor/outdoor environmental monitoring) • health and wellness monitoring, power monitoring, inventory • location monitoring, factory and process automation,and seismic and structural monitoring. • Tracking applications include tracking objects, animals, humans, and vehicles.
  • 16. OVERVIEW OF SENSOR APPLICATIONS.
  • 17. AD HOC WIRELESS INTERNET
  • 18. FUTURE SCOPE • * Everything on Internet • * Everybody on Internet • -Technology to *Blend and interconnect individual smart devices *Enable access to information about the real world *Interact and influence the real world *Connected Consumer Electronics *Intelligent transport, industry and society, smart utilities
  • 19.
  • 20. REFERENCE Ad hoc wireless networks Architectures and protocols By C.Siva Ram Murthy and B.S.Manoj A Secure Routing Protocol for Ad Hoc network By Kimaya Sanzgir Mobile Communications By Jochen H. Schiller