Ad-Hoc Wireless
Networks
Yunus Khan
Assistant Professor
Jawaharlal Institute of Technology Borawan Khargone
Wireless Network
 Wireless Network uses electromagnetic radio waves for
communication(Exchange Information).
 Spectrum Allocation Methods:
 Comparative Bidding
 Lottery System
 Auctioning Method
 Radio Propagation Mechanism :
 Reflection
 Diffraction
 Scattering
Radio Propagation Mechanisms
 Reflection: When a propagation radio waves hits an object which is
very large compared to its wavelength (such as surface of the earth
or a tall building) the wave gets reflected by that object.
 Diffraction: When a wave is hits on an impenetrable object, the
wave bends at the edge of the object so the propagating in
different directions.
 Scattering: When a wave travels through a medium which contains
many object with dimension small when compared to its
wavelength scattering is occurred.
Characteristics of Wireless
Channel
 Path Loss: Path loss is the ratio of the power of the transmitted
signal to the power of the same signal received by the receiver on a
given path.
 Fading: Fading refers to the fluctuation in signal strength when
receive at the receiver. Such as fast fading and Small fading.
 Interference: Interference is the attack in wireless communication
to jam the network by creating a wide spectrum noise.
 Doppler shift: Doppler shift is defined as the change/shift in the
frequency of the received signal when transmitter and receiver are
mobile with respect to each other.
Cellular Network
 Cellular Networks are the infrastructure based or dependent
network.
 Path Setup b/w two nodes such as C to E is completed through the
base station.
 Cellular Network have single hope wireless link.
 Cellular Network used centralized routing protocol.
 Cellular Network have guaranteed bandwidth.
 Circuit switchingTechnique is used in Cellular Network.
 Cellular Networks are High Cost andTime Deployment.
 Easier to achieve time synchronization.
 High cost of Network and Maintenance.
 Application areas are civilian and commercial sectors.
Ad Hoc Network
 Ad hoc n/w is the category of wireless network that utilize multi-hop
radio relaying capable of operating without any fixed infrastructure.
 Ad hoc is also called infrastructure less network.
 Path setup b/w two nodes is completed trough the intermediate
mobile node.
 Wireless mesh network and wireless sensor network are the
example of ad hoc network.
 Routing and resource management is done in distributed manner.
 Packet switching technique is used in ad hoc.
 Ad hoc is Cost effective network.
 Time synchronization is difficult and consume bandwidth.
 Application domains are emergency search, rescue operations and
collaborative computing.
Application of Ad Hoc Wireless
Network
 Military Application: .
 Useful in communication among a group of soldiers for tactical operations.
 For example leader of the soldiers want to give any order to all soldiers OR set of selected persons
are involved in the operation.
 Collaborative and Distributed Computing:
 To give information in a group of peoples using conference.
 For example group of researchers want to share their research among group of peoples.
 Sharing of a file among network.
 Emergency Operations:
 Ad hoc is used in search and rescue operations, crowd control and commando operations.
 Due to the natural disaster like earthquake conventional communication facilities are destroyed
in that case ad hoc network is used for rescue activities.
Wireless Mesh Network
 Wireless Mesh Network are the ad hoc wireless network that
provide the many alternate path from source to destination when
existing paths fails.
 Mesh Networks are used in residential zones, business zones,
important civilian zones and university campus.
 Mesh Network support high data rate, quick and low cost
deployment, enhanced services, high scalability and high
availability.
Wireless Sensor Network
 A sensor network is a collection of large number of sensor nodes
that are deployed in particular region.
 As we know that the sensor are the tiny devices that have
capability to sensing parameter, processing the data and
communicate over the network.
 A sensing can be periodic or sporadic.
 Military, Health Care, Home security and environmental
monitoring are the application areas of wireless sensor network.
Issues in Wireless Sensor Network
 Mobility of the Nodes.
 Size of the network.
 Density of the deployment.
 Power Constraint.
 Data/ Information fusion.
 Traffic Distribution.
Classification of Wireless Sensor
Network
 Architecture:
 Layered-UNPF(Unified network protocol framework)
 Clustered-LEACH (Low energy adaptive clustering hierarchy)
 Data handling:
 Data Dissemination.
 Data Gathering.
 Medium Access Control:
 SMACS(Self organizing MAC for sensor network)
 HybridTDMA/FDMA
 CSMA
 Location Discovery:
 Indoor Localization
 Multi Lateration.
 Miscellaneous:
 Quality of N/W Coverage
- Breach path
-Maximum Support Path
Classification of Wireless Sensor
Network(Contd.)
 Security
- LEAP
- INSENS
- SPINS
 RealTime Communication
- Speed
- RAP
 Other solutions
- Energy efficient H/W design
- Synchronization.
- Transport Layer.
 Data Dissemination(Data handling)
 Flooding, Gossiping, Roumor Routing, SAR, Directed Diffusion, SPIN, Cost
field approach, geographic hash table, SMECN.
 Data Gathering (Data Handling)
 Direct Transmission, PEGASIS, Binary scheme, Chain based tree level
scheme.
Hybrid Wireless Network
 Hybrid wireless networks are the combination of multi-hop
cellular network and integrated cellular ad hoc relay network.
 Hybrid network have the higher capacity than the cellular
network.
 Increased flexibility and reliability in routing.
 Better coverage and connectivity in holes.
Classification of Hybrid Wireless
Network
 System with Host cum relay station
 Single Mode System
 MCM(Multi hop cellular Network)
 MWLAN (Multi hop wireless LAN)
 SMCN(Single interface multi hop cellular network)
 Multi Mode System
 High Mobility System
- HWN (Hybrid wireless network)
- MuPAC (Multi power architecture for cellular network)
- MADF(Mobile assisted data forwarding)
- A-GSM(Ad hoc GSM)
- UCAN(Unified cellular and ad hoc network)
 Limited Mobility System
-TWiLL(Throughput enhanced wireless in local loop architecture)
- DWiLL(Directional throughput enhanced wireless in local loop)
 System with Dedicated relay station
 Single Mode System
 SOPRANO(Self organizing packet radio ad hoc network with overlay )
 Multi Mode System
 iCAR (Integrated cellular and ad hoc relaying system)
Issues and challenges in Ad-Hoc
wireless Network
 Medium Access Scheme
 Routing
 Multicasting
 Transport Layer Protocol
 Pricing Scheme
 Quality of Service Provisioning
 Self Organization
 Security
 Energy Management
 Addressing and Service Discovery
 Scalability
 Deployment Consideration
Medium Access Control
 MAC protocol in ad hoc wireless network is distributed and shared
channel for the transmission of packets. Design issues of MAC for
Ad Hoc wireless Network:
 Distributed Operation: The design of MAC protocol should be fully
distributed with minimum control overhead.
 Synchronization: MAC protocol should be synchronized with time.
 Hidden Terminal: The presence of hidden terminal reduced the throughput
of MAC protocol. Hence MAC protocol should be able to handle the effects of
hidden terminal.
 Exposed Terminal: To improve the efficiency of MAC protocol the exposed
nodes should be allowed to transmit without causing collision to the on going
data transfer.
 Throughput: MAC protocol should maximize the throughput with
minimizing the occurrence of collision, maximizing channel utilization and
minimizing control overhead.
Medium Access Control(Contd.)
 Access Delay: Access delay refers to the average delay that any packet
experiences to get transmitted. The MAC protocol should attempt to
minimize the delay.
 Fairness: Fairness refers to the ability of the MAC protocol to provide equal
bandwidth to all competing nodes.
 Some Other Issues of MAC
 Real time traffic support
 Resource reservation
 Ability to measure resource availability
 Capability for power control
 Adaptive rate control
 Use of directional antennas
Classification of Medium Access
Control
 Contention Based Protocol
 Sender Initiated Protocols
 Receiver Initiated Protocols
 Contention Based Protocols with Reservation mechanism
 Synchronous Protocol
 Asynchronous Protocols
 Contention Based Protocols with Scheduling mechanism
 DPS(Distributed priority scheduling)
 DWOP(Distributed wireless ordering protocol)
 DLPS(Distributed Laxity Based priority scheduling)
 Other MAC Protocols
 Protocol using directional antennas
 MMAC(Multichannel MAC)
 MCAMA(Multichannel CSMA MAC protocol)
 PCM(Power control MAC protocol)
 RBAR(Receiver based auto rate protocol)
Sender & Receiver Initiated Protocol
 Single Channel protocol
 MACAW(Multiple access collision avoidance for wireless LAN’s)
 FAMA(Floor acquisition multiple access protocols)
 Multi Channel protocol
 BTMAC(Busy tone MAC)
 DBTMAC( Dual Busy tone MAC)
 ICAMA(Interleaved CSMA)
 Receiver Initiated Protocol
 RI-BTMAC
 MACA-BI( MACA by invitation)
 MARCH(Media access with reduced handshake)
Synchronous and Asynchronous Protocol
 Synchronous Protocols
 DPRMA(Distributed packet reservation multiple access protocol)
 CATA(Collision avoidance time allocation protocol)
 HRMA(Hop reservation multiple access protocol)
 SRMA/PA(Soft reservation multiple access with priority assignment)
 FPRP(Five phase reservation protocol)
 Asynchronous Protocols
 MACA/PR(MACA with piggy backed reservation)
 RTMAC(Real time medium access control protocol)
Routing in Ad-Hoc Network
 Routing refers to the exchanging the route information and finding
feasible and appropriate path to destination based on the criteria
such as minimum power required, hop length and utilizing
minimum bandwidth. The major challenges of routing protocol
are:
 Mobility: Due to the mobility frequent path breaks, packet collision,
transient loops are occur in the network. Routing protocol should be able to
solve all these problems in efficient manner.
 Bandwidth Constraint: Bandwidth is equally distributed or shared between
all the nodes in the broadcast region.
 Location Dependent Contention: A good routing protocol should have built
in mechanism for distributing the network load uniformly across the network
which is dependent on the number of nodes in the network.
 Other Resource Constraints: Routing protocol should be able to handle
issues related with computing power, battery power and buffer storage.
Requirement of Routing in Ad-Hoc
Network
 Minimum route acquisition delay
 Quick route reconfiguration
 Loop free routing
 Distributed routing approach
 Minimum control overhead
 Scalability
 Provisioning of Quality of Services(QoS)
 Security and Privacy
All these requirement are discussed in upcoming slides.
Requirement of Routing in Ad-Hoc
Network
 Minimum route acquisition delay: Delay is dependent on the size of the network
and network load.
 Quick Route Reconfiguration: If any change is occur in the network due to the path
breaks and packet loss, routing protocol be able to quick reconfigure the network.
 Loop Free Routing: Looping waste the network bandwidth , routing protocol
should be able to detect such transient routing loops and take corrective actions.
 Distributed Routing Approach: Ad hoc wireless network uses distributed routing
approach between mobile nodes.
 Minimum control overhead: Control Packet exchanging is done with minimum
control overhead as possible.
 Scalability: Scalability is the ability of a routing protocol to scal well or perform
efficiently in a network with a large number of nodes.
 Provisioning of QoS: Routing protocol should be able to provide certain level of
Quality of Services. QoS Parameter are:
 Bandwidth, Delay, Jitter, Packet Delivery Ratio, Throughput.
 Security and Privacy: The routing protocol should be able to handle Denial-of-
Service attacks.
Classification of Routing Protocols
of Ad-Hoc Network
 Based on routing information update mechanism
 Table Driven(Proactive)
 On Demand(Reactive)
 Hybrid
 Based on the use of temporal information for routing
 Path Selection Using Path History
 Path Selection Using Prediction
 Based OnTopology Information
 Flat Routing
 Hierarchical Routing
 Miscellaneous Classification Based on Utilization of specific
resources:
 Power aware routing
 Routing Using Geographical information
 Routing with efficient flooding
Routing Protocols of Ad-Hoc Network
 Table Driven routing(Proactive):
 DSDV(Destination sequenced distance vector routing protocol)
 WRP(Wireless Routing Protocol)
 CGSR(Cluster head gateway switch routing protocol)
 STAR(Source Tree Adaptive routing protocol)
 OLSR(Optimized link State routing)
 FSR(Fisheye State Routing)
 HSR(Hierarchical State Routing
 On Demand Routing:
 DSR(Dynamic Source Routing)
 AODV(Adhoc on demand distance vector routing)
 ABR(Associativity based routing)
 TORA(Temporal Ordered routing)
 LAR(Location aided routing)
 SSA(Signal stability based routing
 FORP(Flow oriented routing protocol)
 PLBR(Preffered link based routing)
Routing Protocols of Ad-Hoc
Network(Contd.)
 Hybrid
 CEDAR(Core Extraction Distributed Ad-Hoc routing)
 ZRP(Zone routing protocol)
 ZHLS(Zone based hierarchical link state routing protocol)
 Hierarchical routing Protocol
 HSR(Hierarchical State Routing Protocol)
 FSR(Fisheye state routing protocol)
 Routing protocol with Efficient Flooding Mechanism
 PLBR(Preffered Link based routing protocol)
 OLSR(Optimized link state protocol)
Multicasting
 Multicasting plays an important role in application of Ad-Hoc
wireless network , namely emergency search , rescue
operation and military communication.
 Design Issues of Multicast Routing Protocol:
 Robustness
 Efficiency
 Control Overhead
 Quality of Service(QoS)
 Efficient Group Management
 Scalability
 Security
Classification of Ad Hoc Multicasting
Routing Protocol
 Application Independent/Generic Multicast Protocol
 Nature of MulticastTopology
 Tree Based
 Mesh Based
 InitializationApproach
 Source Initiated
 Receiver Initiated
 Topology MaintenanceApproach
 Soft State
 Hard State
 Application Dependent Multicast Routing Protocol
 RBM(Role Based Multicast)
 CBM(Content Based Multicast)
 LBM( Location Based Multicast)
Tree Based Multicasting Routing
Protocol
 SourceTree Based
 BEMRP(Bandwidth Efficient Multicast routing protocol)
 MZRP(Multicast routing protocol based on zone routing)
 MCEDAR(MulticastCore extraction Distributed Ad-Hoc Routing)
 ABAM(Assoicativity based Adhoc multicast routing)
 DDM(Diffrential destination multicast routing protocol)
 WBM(Weight based multicast protocol
 PLBM(Preffered link based multicast protocol)
 SharedTree Based
 MAODV(MulticastAd hoc on demand distance vector routing protocol)
 AMRIS(Ad hoc multicast routing protocol utilizing increasing ID numbers.
 AMRoute(Ad hoc multicast routing protocol)
Mesh Based Multicasting Routing
Protocol
 ODMRP(On demand Multicast routing protocol)
 DCMP(Dynamic core based multicast routing protocol)
 FGMP-RA(Fording group multicast protocol –receiver
advertisement)
 NSMP(Neighbour supporting adhoc multicast routing
protocol)
 CAMP(Core Assisted mesh Protocol)
Transport Layer Protocol
 The main objective of transport layer protocol is establish and
maintain end-to-end connection , reliable end-to-end delivery of
packets, flow control, and congestion control.
 Classification ofTransport Layer Protocol for Adhoc Network:
 TCO over Adhoc wireless network
 Split approach
 End –to-End approach
 TCP-ELFN(TCP with explicit link failure notification)
 TCP-F(Feedback based TCP)
 TCP-BUS(TCP with buffering capacity and sequenced information)
 OtherTransport Layer protocols:
 ACTP( Application controlled transport protocol)
 ATP(Ad Hoc transport protocol)
Quality of Service Provisioning
 QoS is the performance level of services offered by service
provider or a network to the user.
 QoS would be measure on per flow, per link, per node basis. QoS
have following important terms:
 QoS Parameters
 Bandwidth, Delay, Security, Reliability,Throughput, Packet delivery ratio.
 QoS Aware Routing: QoS aware routing means routing with QoS
parameters.
 QoS Framework: A framework for a QoS is a complete system that attempts
to provide promised services to each user or application. The QoS service
model is the important component of QoS framework which describe how
services are served to the user.
Classification of Quality of Service
 Based on interaction b/w routing protocol and QoS Provisioning
Mechanism
 Coupled
 Decoupled
 Based on interaction b/w network and MAC Layers
 Independent
 Dependent
 Based on routing information update mechanism emloyed
 On Demand
 Table Driven
 Hybrid
Quality of Service Routing Protocols
 TBP(Ticket Based QoS Routing)
 PLBQR(Predictive Location based QoS Routing Protocol)
 TDR(Trigger based Distributed QoS Routing Protocol)
 QoSAODV (QoS enabled Ad hoc on demand distance vector
routing protocol)
 BR(Bandwidth Routing protocol)
 OQR(On Demand QoS Routing protocol)
 OLMQR(On Demand link state multipath QoS routing
protocol)
 AQR(Asynchronous QoS Routing)
Self Organization
 Self organization is the important property of Ad hoc wireless
network in which organizing and maintaining the network by itself.
Activities of self organization in Ad-Hoc wireless networks are :
 Neighbor Discovery: In neighbor discovery phase every node in
the network gather information about its neighbor and maintain
this information in appropriate data structure.
 Topology Organization: If any change is occur in the network
topology due the mobility or failure of nodes this is
automatically organized.
 Topology Re-Organization: Means Recovery from the major
topological changes in the network.
Security in Ad hoc Wireless
Network
 Security is important in Ad hoc wireless network especially in
military application. There are two types of attacks in Ad hoc
Wireless network:
 Passive Attack(Don’t distrusts operation of the N/W)
 Active Attack(Disrupts the operation of the network)
Major Security Threats in Ad hoc
Wireless Network
 Denial of Service: Due to this attack network resources are unavailable to
other nodes by consuming bandwidth or overloading the system.
 Resource Consumption: Resource consumption is done by energy
depletion battery power of nodes using heavy traffic and buffer overflow. In case
of buffer overflow attack filling the routing table with unwanted entries or
packet data.
 Host Impersonation: A fake node act as a actual node and respond as a
actual or original node and create wrong entries in routing table.
 Information Discloser: A compromised node can act as a informer by
disclose confidential information to unauthorized nodes.
 Interference: A common attach in defense application is to jam the wireless
communication by creating a wide spectrum noise.
Addressing and Service Discovery
 Every node which is participated in communication have its own
unique global address.
 Auto configuration technique is used to allocate the addresses to
the nodes.
 Service Discovery protocols are used in authentication , billing
and privacy services.
Energy Management
 Energy management is the process of managing energy resources
for improving the lifetime of the network.
 Energy management is deals with managing energy resources by
means of controlling the battery discharge, adjusting the
transmission power and scheduling of power sources.
 Energy Management is classified into :
 Battery Energy Management: Battery energy management is used to
improve the battery lifetime with its chemical properties.
 Processor Power Management
 Clock Speed
 No. of instruction per unit time
 Device Power Management
Battery Management Schemes
 Device Dependent Schemes
 Modeling and shipping of battery discharge patterns.
 Battery Scheduling
 Data link layer
 Lazy packet Scheduling
 BAMAC(Battery Aware MAC Protocol)
 Network Layer
 Traffic Shaping
 BEE(Battery Energy efficient routing)
 Routing based on battery status
Transmission Power Management Schemes
 Data Link Layer
 Dynamic PowerAdjustment
 Distributed topology control
 Distributed power control loop
 Centralized topology control
 Network Layer
 COMPOW(Common Power Protocol)
 Globalized power aware routing
 Localized power aware routing
 Determination of critical transmission range
 Higher Layer
 Congestion control and transmission policies atTCP/IP layer
 OS/Middilware approach
System Power Management Schemes
 Processor Power Management schemes
 Power Saving Modes
 PAMAS
 Device Management Schemes
 Low power design of Hardware
Recent Advances in Wireless Network
 UltraWide Band Radio Communication
 Wireless Fidelity System (Wi-Fi)
 Optical Wireless Networks
 The Multimode 802.11-IEEE 802.11 a/b/g
 The Meghdoot architecture
Conclusion:
 In this presentation discussed about Ad Hoc wireless network
from ground level. In this journey I cover:
 The comparative study of cellular network and ad hoc Network
 Applications areas of Ad hoc wireless network
 Wireless Mesh Network
 Wireless Sensor Network
 Hybrid Wireless Network
 Medium Access Scheme of Ad hocWireless Network
 Routing inAd hoc wireless network
 Multicasting in Ad hoc wireless network
 Transport Layer protocols of Ad hoc wireless network
 Pricing Scheme of Ad hoc wireless network
 Quality of Service of Ad hoc wireless network
 Self Organization
 Security
 Energy Management inAd hoc wireless network
 Recent Advances inWireless Networks
Future Work in Ad-Hoc Network
 Routing: We design a routing protocols that works best among all mobility
ranges. That means, how can we do a routing protocol that can do well in
stationary network, moderately mobile networks, and highly mobile networks?
 Multicasting: We suggest a unified protocol for multicasting and uni-casting
that can offer end-to-end reliability without having high control overhead. Can
we design a stateless multicast routing protocol? How do we scale multicasting
to a very large network?
 MAC Protocols: We design a MAC protocols for simultaneous communication
among the nodes in a neighborhood.
 We can design a MAC protocols for a full-duplex radio interface?
 We can suggest a MAC protocol for effective use of spatial multiplexing Vs spatial diversity
tradeoffs in a MIMO system.
 We can design a MAC for UWB ad hoc networks? What kind of MAC works best in very high
speed (aerial ad hoc networks) MAC protocols?
Future Work in Ad-Hoc Network
 Energy Management: There are many open problems in this area too. Low
power operation of nodes is still a major problem. Is it possible to operate with
minimal energy spending for certain idle time slots. Is it possible to find out an
energy aware cross-layer protocol design? How far we can save energy without
affecting throughput?
 Security: There are many open problems in security area in ad hoc networks.
There exists many solutions. However, it has been found that most of them are
either not realizable or inadequate.
 In every area, we have open problems that can be worked on.Of all the above
areas, the most challenging areas are energy management and security.You
may choose an area where you will be most productive.

Queries
ThankYou

Adhoc Wireless Network

  • 1.
    Ad-Hoc Wireless Networks Yunus Khan AssistantProfessor Jawaharlal Institute of Technology Borawan Khargone
  • 2.
    Wireless Network  WirelessNetwork uses electromagnetic radio waves for communication(Exchange Information).  Spectrum Allocation Methods:  Comparative Bidding  Lottery System  Auctioning Method  Radio Propagation Mechanism :  Reflection  Diffraction  Scattering
  • 3.
    Radio Propagation Mechanisms Reflection: When a propagation radio waves hits an object which is very large compared to its wavelength (such as surface of the earth or a tall building) the wave gets reflected by that object.  Diffraction: When a wave is hits on an impenetrable object, the wave bends at the edge of the object so the propagating in different directions.  Scattering: When a wave travels through a medium which contains many object with dimension small when compared to its wavelength scattering is occurred.
  • 4.
    Characteristics of Wireless Channel Path Loss: Path loss is the ratio of the power of the transmitted signal to the power of the same signal received by the receiver on a given path.  Fading: Fading refers to the fluctuation in signal strength when receive at the receiver. Such as fast fading and Small fading.  Interference: Interference is the attack in wireless communication to jam the network by creating a wide spectrum noise.  Doppler shift: Doppler shift is defined as the change/shift in the frequency of the received signal when transmitter and receiver are mobile with respect to each other.
  • 5.
    Cellular Network  CellularNetworks are the infrastructure based or dependent network.  Path Setup b/w two nodes such as C to E is completed through the base station.  Cellular Network have single hope wireless link.  Cellular Network used centralized routing protocol.  Cellular Network have guaranteed bandwidth.  Circuit switchingTechnique is used in Cellular Network.  Cellular Networks are High Cost andTime Deployment.  Easier to achieve time synchronization.  High cost of Network and Maintenance.  Application areas are civilian and commercial sectors.
  • 6.
    Ad Hoc Network Ad hoc n/w is the category of wireless network that utilize multi-hop radio relaying capable of operating without any fixed infrastructure.  Ad hoc is also called infrastructure less network.  Path setup b/w two nodes is completed trough the intermediate mobile node.  Wireless mesh network and wireless sensor network are the example of ad hoc network.  Routing and resource management is done in distributed manner.  Packet switching technique is used in ad hoc.  Ad hoc is Cost effective network.  Time synchronization is difficult and consume bandwidth.  Application domains are emergency search, rescue operations and collaborative computing.
  • 7.
    Application of AdHoc Wireless Network  Military Application: .  Useful in communication among a group of soldiers for tactical operations.  For example leader of the soldiers want to give any order to all soldiers OR set of selected persons are involved in the operation.  Collaborative and Distributed Computing:  To give information in a group of peoples using conference.  For example group of researchers want to share their research among group of peoples.  Sharing of a file among network.  Emergency Operations:  Ad hoc is used in search and rescue operations, crowd control and commando operations.  Due to the natural disaster like earthquake conventional communication facilities are destroyed in that case ad hoc network is used for rescue activities.
  • 8.
    Wireless Mesh Network Wireless Mesh Network are the ad hoc wireless network that provide the many alternate path from source to destination when existing paths fails.  Mesh Networks are used in residential zones, business zones, important civilian zones and university campus.  Mesh Network support high data rate, quick and low cost deployment, enhanced services, high scalability and high availability.
  • 9.
    Wireless Sensor Network A sensor network is a collection of large number of sensor nodes that are deployed in particular region.  As we know that the sensor are the tiny devices that have capability to sensing parameter, processing the data and communicate over the network.  A sensing can be periodic or sporadic.  Military, Health Care, Home security and environmental monitoring are the application areas of wireless sensor network.
  • 10.
    Issues in WirelessSensor Network  Mobility of the Nodes.  Size of the network.  Density of the deployment.  Power Constraint.  Data/ Information fusion.  Traffic Distribution.
  • 11.
    Classification of WirelessSensor Network  Architecture:  Layered-UNPF(Unified network protocol framework)  Clustered-LEACH (Low energy adaptive clustering hierarchy)  Data handling:  Data Dissemination.  Data Gathering.  Medium Access Control:  SMACS(Self organizing MAC for sensor network)  HybridTDMA/FDMA  CSMA  Location Discovery:  Indoor Localization  Multi Lateration.  Miscellaneous:  Quality of N/W Coverage - Breach path -Maximum Support Path
  • 12.
    Classification of WirelessSensor Network(Contd.)  Security - LEAP - INSENS - SPINS  RealTime Communication - Speed - RAP  Other solutions - Energy efficient H/W design - Synchronization. - Transport Layer.  Data Dissemination(Data handling)  Flooding, Gossiping, Roumor Routing, SAR, Directed Diffusion, SPIN, Cost field approach, geographic hash table, SMECN.  Data Gathering (Data Handling)  Direct Transmission, PEGASIS, Binary scheme, Chain based tree level scheme.
  • 13.
    Hybrid Wireless Network Hybrid wireless networks are the combination of multi-hop cellular network and integrated cellular ad hoc relay network.  Hybrid network have the higher capacity than the cellular network.  Increased flexibility and reliability in routing.  Better coverage and connectivity in holes.
  • 14.
    Classification of HybridWireless Network  System with Host cum relay station  Single Mode System  MCM(Multi hop cellular Network)  MWLAN (Multi hop wireless LAN)  SMCN(Single interface multi hop cellular network)  Multi Mode System  High Mobility System - HWN (Hybrid wireless network) - MuPAC (Multi power architecture for cellular network) - MADF(Mobile assisted data forwarding) - A-GSM(Ad hoc GSM) - UCAN(Unified cellular and ad hoc network)  Limited Mobility System -TWiLL(Throughput enhanced wireless in local loop architecture) - DWiLL(Directional throughput enhanced wireless in local loop)  System with Dedicated relay station  Single Mode System  SOPRANO(Self organizing packet radio ad hoc network with overlay )  Multi Mode System  iCAR (Integrated cellular and ad hoc relaying system)
  • 15.
    Issues and challengesin Ad-Hoc wireless Network  Medium Access Scheme  Routing  Multicasting  Transport Layer Protocol  Pricing Scheme  Quality of Service Provisioning  Self Organization  Security  Energy Management  Addressing and Service Discovery  Scalability  Deployment Consideration
  • 16.
    Medium Access Control MAC protocol in ad hoc wireless network is distributed and shared channel for the transmission of packets. Design issues of MAC for Ad Hoc wireless Network:  Distributed Operation: The design of MAC protocol should be fully distributed with minimum control overhead.  Synchronization: MAC protocol should be synchronized with time.  Hidden Terminal: The presence of hidden terminal reduced the throughput of MAC protocol. Hence MAC protocol should be able to handle the effects of hidden terminal.  Exposed Terminal: To improve the efficiency of MAC protocol the exposed nodes should be allowed to transmit without causing collision to the on going data transfer.  Throughput: MAC protocol should maximize the throughput with minimizing the occurrence of collision, maximizing channel utilization and minimizing control overhead.
  • 17.
    Medium Access Control(Contd.) Access Delay: Access delay refers to the average delay that any packet experiences to get transmitted. The MAC protocol should attempt to minimize the delay.  Fairness: Fairness refers to the ability of the MAC protocol to provide equal bandwidth to all competing nodes.  Some Other Issues of MAC  Real time traffic support  Resource reservation  Ability to measure resource availability  Capability for power control  Adaptive rate control  Use of directional antennas
  • 18.
    Classification of MediumAccess Control  Contention Based Protocol  Sender Initiated Protocols  Receiver Initiated Protocols  Contention Based Protocols with Reservation mechanism  Synchronous Protocol  Asynchronous Protocols  Contention Based Protocols with Scheduling mechanism  DPS(Distributed priority scheduling)  DWOP(Distributed wireless ordering protocol)  DLPS(Distributed Laxity Based priority scheduling)  Other MAC Protocols  Protocol using directional antennas  MMAC(Multichannel MAC)  MCAMA(Multichannel CSMA MAC protocol)  PCM(Power control MAC protocol)  RBAR(Receiver based auto rate protocol)
  • 19.
    Sender & ReceiverInitiated Protocol  Single Channel protocol  MACAW(Multiple access collision avoidance for wireless LAN’s)  FAMA(Floor acquisition multiple access protocols)  Multi Channel protocol  BTMAC(Busy tone MAC)  DBTMAC( Dual Busy tone MAC)  ICAMA(Interleaved CSMA)  Receiver Initiated Protocol  RI-BTMAC  MACA-BI( MACA by invitation)  MARCH(Media access with reduced handshake)
  • 20.
    Synchronous and AsynchronousProtocol  Synchronous Protocols  DPRMA(Distributed packet reservation multiple access protocol)  CATA(Collision avoidance time allocation protocol)  HRMA(Hop reservation multiple access protocol)  SRMA/PA(Soft reservation multiple access with priority assignment)  FPRP(Five phase reservation protocol)  Asynchronous Protocols  MACA/PR(MACA with piggy backed reservation)  RTMAC(Real time medium access control protocol)
  • 21.
    Routing in Ad-HocNetwork  Routing refers to the exchanging the route information and finding feasible and appropriate path to destination based on the criteria such as minimum power required, hop length and utilizing minimum bandwidth. The major challenges of routing protocol are:  Mobility: Due to the mobility frequent path breaks, packet collision, transient loops are occur in the network. Routing protocol should be able to solve all these problems in efficient manner.  Bandwidth Constraint: Bandwidth is equally distributed or shared between all the nodes in the broadcast region.  Location Dependent Contention: A good routing protocol should have built in mechanism for distributing the network load uniformly across the network which is dependent on the number of nodes in the network.  Other Resource Constraints: Routing protocol should be able to handle issues related with computing power, battery power and buffer storage.
  • 22.
    Requirement of Routingin Ad-Hoc Network  Minimum route acquisition delay  Quick route reconfiguration  Loop free routing  Distributed routing approach  Minimum control overhead  Scalability  Provisioning of Quality of Services(QoS)  Security and Privacy All these requirement are discussed in upcoming slides.
  • 23.
    Requirement of Routingin Ad-Hoc Network  Minimum route acquisition delay: Delay is dependent on the size of the network and network load.  Quick Route Reconfiguration: If any change is occur in the network due to the path breaks and packet loss, routing protocol be able to quick reconfigure the network.  Loop Free Routing: Looping waste the network bandwidth , routing protocol should be able to detect such transient routing loops and take corrective actions.  Distributed Routing Approach: Ad hoc wireless network uses distributed routing approach between mobile nodes.  Minimum control overhead: Control Packet exchanging is done with minimum control overhead as possible.  Scalability: Scalability is the ability of a routing protocol to scal well or perform efficiently in a network with a large number of nodes.  Provisioning of QoS: Routing protocol should be able to provide certain level of Quality of Services. QoS Parameter are:  Bandwidth, Delay, Jitter, Packet Delivery Ratio, Throughput.  Security and Privacy: The routing protocol should be able to handle Denial-of- Service attacks.
  • 24.
    Classification of RoutingProtocols of Ad-Hoc Network  Based on routing information update mechanism  Table Driven(Proactive)  On Demand(Reactive)  Hybrid  Based on the use of temporal information for routing  Path Selection Using Path History  Path Selection Using Prediction  Based OnTopology Information  Flat Routing  Hierarchical Routing  Miscellaneous Classification Based on Utilization of specific resources:  Power aware routing  Routing Using Geographical information  Routing with efficient flooding
  • 25.
    Routing Protocols ofAd-Hoc Network  Table Driven routing(Proactive):  DSDV(Destination sequenced distance vector routing protocol)  WRP(Wireless Routing Protocol)  CGSR(Cluster head gateway switch routing protocol)  STAR(Source Tree Adaptive routing protocol)  OLSR(Optimized link State routing)  FSR(Fisheye State Routing)  HSR(Hierarchical State Routing  On Demand Routing:  DSR(Dynamic Source Routing)  AODV(Adhoc on demand distance vector routing)  ABR(Associativity based routing)  TORA(Temporal Ordered routing)  LAR(Location aided routing)  SSA(Signal stability based routing  FORP(Flow oriented routing protocol)  PLBR(Preffered link based routing)
  • 26.
    Routing Protocols ofAd-Hoc Network(Contd.)  Hybrid  CEDAR(Core Extraction Distributed Ad-Hoc routing)  ZRP(Zone routing protocol)  ZHLS(Zone based hierarchical link state routing protocol)  Hierarchical routing Protocol  HSR(Hierarchical State Routing Protocol)  FSR(Fisheye state routing protocol)  Routing protocol with Efficient Flooding Mechanism  PLBR(Preffered Link based routing protocol)  OLSR(Optimized link state protocol)
  • 27.
    Multicasting  Multicasting playsan important role in application of Ad-Hoc wireless network , namely emergency search , rescue operation and military communication.  Design Issues of Multicast Routing Protocol:  Robustness  Efficiency  Control Overhead  Quality of Service(QoS)  Efficient Group Management  Scalability  Security
  • 28.
    Classification of AdHoc Multicasting Routing Protocol  Application Independent/Generic Multicast Protocol  Nature of MulticastTopology  Tree Based  Mesh Based  InitializationApproach  Source Initiated  Receiver Initiated  Topology MaintenanceApproach  Soft State  Hard State  Application Dependent Multicast Routing Protocol  RBM(Role Based Multicast)  CBM(Content Based Multicast)  LBM( Location Based Multicast)
  • 29.
    Tree Based MulticastingRouting Protocol  SourceTree Based  BEMRP(Bandwidth Efficient Multicast routing protocol)  MZRP(Multicast routing protocol based on zone routing)  MCEDAR(MulticastCore extraction Distributed Ad-Hoc Routing)  ABAM(Assoicativity based Adhoc multicast routing)  DDM(Diffrential destination multicast routing protocol)  WBM(Weight based multicast protocol  PLBM(Preffered link based multicast protocol)  SharedTree Based  MAODV(MulticastAd hoc on demand distance vector routing protocol)  AMRIS(Ad hoc multicast routing protocol utilizing increasing ID numbers.  AMRoute(Ad hoc multicast routing protocol)
  • 30.
    Mesh Based MulticastingRouting Protocol  ODMRP(On demand Multicast routing protocol)  DCMP(Dynamic core based multicast routing protocol)  FGMP-RA(Fording group multicast protocol –receiver advertisement)  NSMP(Neighbour supporting adhoc multicast routing protocol)  CAMP(Core Assisted mesh Protocol)
  • 31.
    Transport Layer Protocol The main objective of transport layer protocol is establish and maintain end-to-end connection , reliable end-to-end delivery of packets, flow control, and congestion control.  Classification ofTransport Layer Protocol for Adhoc Network:  TCO over Adhoc wireless network  Split approach  End –to-End approach  TCP-ELFN(TCP with explicit link failure notification)  TCP-F(Feedback based TCP)  TCP-BUS(TCP with buffering capacity and sequenced information)  OtherTransport Layer protocols:  ACTP( Application controlled transport protocol)  ATP(Ad Hoc transport protocol)
  • 32.
    Quality of ServiceProvisioning  QoS is the performance level of services offered by service provider or a network to the user.  QoS would be measure on per flow, per link, per node basis. QoS have following important terms:  QoS Parameters  Bandwidth, Delay, Security, Reliability,Throughput, Packet delivery ratio.  QoS Aware Routing: QoS aware routing means routing with QoS parameters.  QoS Framework: A framework for a QoS is a complete system that attempts to provide promised services to each user or application. The QoS service model is the important component of QoS framework which describe how services are served to the user.
  • 33.
    Classification of Qualityof Service  Based on interaction b/w routing protocol and QoS Provisioning Mechanism  Coupled  Decoupled  Based on interaction b/w network and MAC Layers  Independent  Dependent  Based on routing information update mechanism emloyed  On Demand  Table Driven  Hybrid
  • 34.
    Quality of ServiceRouting Protocols  TBP(Ticket Based QoS Routing)  PLBQR(Predictive Location based QoS Routing Protocol)  TDR(Trigger based Distributed QoS Routing Protocol)  QoSAODV (QoS enabled Ad hoc on demand distance vector routing protocol)  BR(Bandwidth Routing protocol)  OQR(On Demand QoS Routing protocol)  OLMQR(On Demand link state multipath QoS routing protocol)  AQR(Asynchronous QoS Routing)
  • 35.
    Self Organization  Selforganization is the important property of Ad hoc wireless network in which organizing and maintaining the network by itself. Activities of self organization in Ad-Hoc wireless networks are :  Neighbor Discovery: In neighbor discovery phase every node in the network gather information about its neighbor and maintain this information in appropriate data structure.  Topology Organization: If any change is occur in the network topology due the mobility or failure of nodes this is automatically organized.  Topology Re-Organization: Means Recovery from the major topological changes in the network.
  • 36.
    Security in Adhoc Wireless Network  Security is important in Ad hoc wireless network especially in military application. There are two types of attacks in Ad hoc Wireless network:  Passive Attack(Don’t distrusts operation of the N/W)  Active Attack(Disrupts the operation of the network)
  • 37.
    Major Security Threatsin Ad hoc Wireless Network  Denial of Service: Due to this attack network resources are unavailable to other nodes by consuming bandwidth or overloading the system.  Resource Consumption: Resource consumption is done by energy depletion battery power of nodes using heavy traffic and buffer overflow. In case of buffer overflow attack filling the routing table with unwanted entries or packet data.  Host Impersonation: A fake node act as a actual node and respond as a actual or original node and create wrong entries in routing table.  Information Discloser: A compromised node can act as a informer by disclose confidential information to unauthorized nodes.  Interference: A common attach in defense application is to jam the wireless communication by creating a wide spectrum noise.
  • 38.
    Addressing and ServiceDiscovery  Every node which is participated in communication have its own unique global address.  Auto configuration technique is used to allocate the addresses to the nodes.  Service Discovery protocols are used in authentication , billing and privacy services.
  • 39.
    Energy Management  Energymanagement is the process of managing energy resources for improving the lifetime of the network.  Energy management is deals with managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources.  Energy Management is classified into :  Battery Energy Management: Battery energy management is used to improve the battery lifetime with its chemical properties.  Processor Power Management  Clock Speed  No. of instruction per unit time  Device Power Management
  • 40.
    Battery Management Schemes Device Dependent Schemes  Modeling and shipping of battery discharge patterns.  Battery Scheduling  Data link layer  Lazy packet Scheduling  BAMAC(Battery Aware MAC Protocol)  Network Layer  Traffic Shaping  BEE(Battery Energy efficient routing)  Routing based on battery status
  • 41.
    Transmission Power ManagementSchemes  Data Link Layer  Dynamic PowerAdjustment  Distributed topology control  Distributed power control loop  Centralized topology control  Network Layer  COMPOW(Common Power Protocol)  Globalized power aware routing  Localized power aware routing  Determination of critical transmission range  Higher Layer  Congestion control and transmission policies atTCP/IP layer  OS/Middilware approach
  • 42.
    System Power ManagementSchemes  Processor Power Management schemes  Power Saving Modes  PAMAS  Device Management Schemes  Low power design of Hardware
  • 43.
    Recent Advances inWireless Network  UltraWide Band Radio Communication  Wireless Fidelity System (Wi-Fi)  Optical Wireless Networks  The Multimode 802.11-IEEE 802.11 a/b/g  The Meghdoot architecture
  • 44.
    Conclusion:  In thispresentation discussed about Ad Hoc wireless network from ground level. In this journey I cover:  The comparative study of cellular network and ad hoc Network  Applications areas of Ad hoc wireless network  Wireless Mesh Network  Wireless Sensor Network  Hybrid Wireless Network  Medium Access Scheme of Ad hocWireless Network  Routing inAd hoc wireless network  Multicasting in Ad hoc wireless network  Transport Layer protocols of Ad hoc wireless network  Pricing Scheme of Ad hoc wireless network  Quality of Service of Ad hoc wireless network  Self Organization  Security  Energy Management inAd hoc wireless network  Recent Advances inWireless Networks
  • 45.
    Future Work inAd-Hoc Network  Routing: We design a routing protocols that works best among all mobility ranges. That means, how can we do a routing protocol that can do well in stationary network, moderately mobile networks, and highly mobile networks?  Multicasting: We suggest a unified protocol for multicasting and uni-casting that can offer end-to-end reliability without having high control overhead. Can we design a stateless multicast routing protocol? How do we scale multicasting to a very large network?  MAC Protocols: We design a MAC protocols for simultaneous communication among the nodes in a neighborhood.  We can design a MAC protocols for a full-duplex radio interface?  We can suggest a MAC protocol for effective use of spatial multiplexing Vs spatial diversity tradeoffs in a MIMO system.  We can design a MAC for UWB ad hoc networks? What kind of MAC works best in very high speed (aerial ad hoc networks) MAC protocols?
  • 46.
    Future Work inAd-Hoc Network  Energy Management: There are many open problems in this area too. Low power operation of nodes is still a major problem. Is it possible to operate with minimal energy spending for certain idle time slots. Is it possible to find out an energy aware cross-layer protocol design? How far we can save energy without affecting throughput?  Security: There are many open problems in security area in ad hoc networks. There exists many solutions. However, it has been found that most of them are either not realizable or inadequate.  In every area, we have open problems that can be worked on.Of all the above areas, the most challenging areas are energy management and security.You may choose an area where you will be most productive. 
  • 47.
  • 48.