SlideShare a Scribd company logo
1 of 48
Ad-Hoc Wireless
Networks
Yunus Khan
Assistant Professor
Jawaharlal Institute of Technology Borawan Khargone
Wireless Network
 Wireless Network uses electromagnetic radio waves for
communication(Exchange Information).
 Spectrum Allocation Methods:
 Comparative Bidding
 Lottery System
 Auctioning Method
 Radio Propagation Mechanism :
 Reflection
 Diffraction
 Scattering
Radio Propagation Mechanisms
 Reflection: When a propagation radio waves hits an object which is
very large compared to its wavelength (such as surface of the earth
or a tall building) the wave gets reflected by that object.
 Diffraction: When a wave is hits on an impenetrable object, the
wave bends at the edge of the object so the propagating in
different directions.
 Scattering: When a wave travels through a medium which contains
many object with dimension small when compared to its
wavelength scattering is occurred.
Characteristics of Wireless
Channel
 Path Loss: Path loss is the ratio of the power of the transmitted
signal to the power of the same signal received by the receiver on a
given path.
 Fading: Fading refers to the fluctuation in signal strength when
receive at the receiver. Such as fast fading and Small fading.
 Interference: Interference is the attack in wireless communication
to jam the network by creating a wide spectrum noise.
 Doppler shift: Doppler shift is defined as the change/shift in the
frequency of the received signal when transmitter and receiver are
mobile with respect to each other.
Cellular Network
 Cellular Networks are the infrastructure based or dependent
network.
 Path Setup b/w two nodes such as C to E is completed through the
base station.
 Cellular Network have single hope wireless link.
 Cellular Network used centralized routing protocol.
 Cellular Network have guaranteed bandwidth.
 Circuit switchingTechnique is used in Cellular Network.
 Cellular Networks are High Cost andTime Deployment.
 Easier to achieve time synchronization.
 High cost of Network and Maintenance.
 Application areas are civilian and commercial sectors.
Ad Hoc Network
 Ad hoc n/w is the category of wireless network that utilize multi-hop
radio relaying capable of operating without any fixed infrastructure.
 Ad hoc is also called infrastructure less network.
 Path setup b/w two nodes is completed trough the intermediate
mobile node.
 Wireless mesh network and wireless sensor network are the
example of ad hoc network.
 Routing and resource management is done in distributed manner.
 Packet switching technique is used in ad hoc.
 Ad hoc is Cost effective network.
 Time synchronization is difficult and consume bandwidth.
 Application domains are emergency search, rescue operations and
collaborative computing.
Application of Ad Hoc Wireless
Network
 Military Application: .
 Useful in communication among a group of soldiers for tactical operations.
 For example leader of the soldiers want to give any order to all soldiers OR set of selected persons
are involved in the operation.
 Collaborative and Distributed Computing:
 To give information in a group of peoples using conference.
 For example group of researchers want to share their research among group of peoples.
 Sharing of a file among network.
 Emergency Operations:
 Ad hoc is used in search and rescue operations, crowd control and commando operations.
 Due to the natural disaster like earthquake conventional communication facilities are destroyed
in that case ad hoc network is used for rescue activities.
Wireless Mesh Network
 Wireless Mesh Network are the ad hoc wireless network that
provide the many alternate path from source to destination when
existing paths fails.
 Mesh Networks are used in residential zones, business zones,
important civilian zones and university campus.
 Mesh Network support high data rate, quick and low cost
deployment, enhanced services, high scalability and high
availability.
Wireless Sensor Network
 A sensor network is a collection of large number of sensor nodes
that are deployed in particular region.
 As we know that the sensor are the tiny devices that have
capability to sensing parameter, processing the data and
communicate over the network.
 A sensing can be periodic or sporadic.
 Military, Health Care, Home security and environmental
monitoring are the application areas of wireless sensor network.
Issues in Wireless Sensor Network
 Mobility of the Nodes.
 Size of the network.
 Density of the deployment.
 Power Constraint.
 Data/ Information fusion.
 Traffic Distribution.
Classification of Wireless Sensor
Network
 Architecture:
 Layered-UNPF(Unified network protocol framework)
 Clustered-LEACH (Low energy adaptive clustering hierarchy)
 Data handling:
 Data Dissemination.
 Data Gathering.
 Medium Access Control:
 SMACS(Self organizing MAC for sensor network)
 HybridTDMA/FDMA
 CSMA
 Location Discovery:
 Indoor Localization
 Multi Lateration.
 Miscellaneous:
 Quality of N/W Coverage
- Breach path
-Maximum Support Path
Classification of Wireless Sensor
Network(Contd.)
 Security
- LEAP
- INSENS
- SPINS
 RealTime Communication
- Speed
- RAP
 Other solutions
- Energy efficient H/W design
- Synchronization.
- Transport Layer.
 Data Dissemination(Data handling)
 Flooding, Gossiping, Roumor Routing, SAR, Directed Diffusion, SPIN, Cost
field approach, geographic hash table, SMECN.
 Data Gathering (Data Handling)
 Direct Transmission, PEGASIS, Binary scheme, Chain based tree level
scheme.
Hybrid Wireless Network
 Hybrid wireless networks are the combination of multi-hop
cellular network and integrated cellular ad hoc relay network.
 Hybrid network have the higher capacity than the cellular
network.
 Increased flexibility and reliability in routing.
 Better coverage and connectivity in holes.
Classification of Hybrid Wireless
Network
 System with Host cum relay station
 Single Mode System
 MCM(Multi hop cellular Network)
 MWLAN (Multi hop wireless LAN)
 SMCN(Single interface multi hop cellular network)
 Multi Mode System
 High Mobility System
- HWN (Hybrid wireless network)
- MuPAC (Multi power architecture for cellular network)
- MADF(Mobile assisted data forwarding)
- A-GSM(Ad hoc GSM)
- UCAN(Unified cellular and ad hoc network)
 Limited Mobility System
-TWiLL(Throughput enhanced wireless in local loop architecture)
- DWiLL(Directional throughput enhanced wireless in local loop)
 System with Dedicated relay station
 Single Mode System
 SOPRANO(Self organizing packet radio ad hoc network with overlay )
 Multi Mode System
 iCAR (Integrated cellular and ad hoc relaying system)
Issues and challenges in Ad-Hoc
wireless Network
 Medium Access Scheme
 Routing
 Multicasting
 Transport Layer Protocol
 Pricing Scheme
 Quality of Service Provisioning
 Self Organization
 Security
 Energy Management
 Addressing and Service Discovery
 Scalability
 Deployment Consideration
Medium Access Control
 MAC protocol in ad hoc wireless network is distributed and shared
channel for the transmission of packets. Design issues of MAC for
Ad Hoc wireless Network:
 Distributed Operation: The design of MAC protocol should be fully
distributed with minimum control overhead.
 Synchronization: MAC protocol should be synchronized with time.
 Hidden Terminal: The presence of hidden terminal reduced the throughput
of MAC protocol. Hence MAC protocol should be able to handle the effects of
hidden terminal.
 Exposed Terminal: To improve the efficiency of MAC protocol the exposed
nodes should be allowed to transmit without causing collision to the on going
data transfer.
 Throughput: MAC protocol should maximize the throughput with
minimizing the occurrence of collision, maximizing channel utilization and
minimizing control overhead.
Medium Access Control(Contd.)
 Access Delay: Access delay refers to the average delay that any packet
experiences to get transmitted. The MAC protocol should attempt to
minimize the delay.
 Fairness: Fairness refers to the ability of the MAC protocol to provide equal
bandwidth to all competing nodes.
 Some Other Issues of MAC
 Real time traffic support
 Resource reservation
 Ability to measure resource availability
 Capability for power control
 Adaptive rate control
 Use of directional antennas
Classification of Medium Access
Control
 Contention Based Protocol
 Sender Initiated Protocols
 Receiver Initiated Protocols
 Contention Based Protocols with Reservation mechanism
 Synchronous Protocol
 Asynchronous Protocols
 Contention Based Protocols with Scheduling mechanism
 DPS(Distributed priority scheduling)
 DWOP(Distributed wireless ordering protocol)
 DLPS(Distributed Laxity Based priority scheduling)
 Other MAC Protocols
 Protocol using directional antennas
 MMAC(Multichannel MAC)
 MCAMA(Multichannel CSMA MAC protocol)
 PCM(Power control MAC protocol)
 RBAR(Receiver based auto rate protocol)
Sender & Receiver Initiated Protocol
 Single Channel protocol
 MACAW(Multiple access collision avoidance for wireless LAN’s)
 FAMA(Floor acquisition multiple access protocols)
 Multi Channel protocol
 BTMAC(Busy tone MAC)
 DBTMAC( Dual Busy tone MAC)
 ICAMA(Interleaved CSMA)
 Receiver Initiated Protocol
 RI-BTMAC
 MACA-BI( MACA by invitation)
 MARCH(Media access with reduced handshake)
Synchronous and Asynchronous Protocol
 Synchronous Protocols
 DPRMA(Distributed packet reservation multiple access protocol)
 CATA(Collision avoidance time allocation protocol)
 HRMA(Hop reservation multiple access protocol)
 SRMA/PA(Soft reservation multiple access with priority assignment)
 FPRP(Five phase reservation protocol)
 Asynchronous Protocols
 MACA/PR(MACA with piggy backed reservation)
 RTMAC(Real time medium access control protocol)
Routing in Ad-Hoc Network
 Routing refers to the exchanging the route information and finding
feasible and appropriate path to destination based on the criteria
such as minimum power required, hop length and utilizing
minimum bandwidth. The major challenges of routing protocol
are:
 Mobility: Due to the mobility frequent path breaks, packet collision,
transient loops are occur in the network. Routing protocol should be able to
solve all these problems in efficient manner.
 Bandwidth Constraint: Bandwidth is equally distributed or shared between
all the nodes in the broadcast region.
 Location Dependent Contention: A good routing protocol should have built
in mechanism for distributing the network load uniformly across the network
which is dependent on the number of nodes in the network.
 Other Resource Constraints: Routing protocol should be able to handle
issues related with computing power, battery power and buffer storage.
Requirement of Routing in Ad-Hoc
Network
 Minimum route acquisition delay
 Quick route reconfiguration
 Loop free routing
 Distributed routing approach
 Minimum control overhead
 Scalability
 Provisioning of Quality of Services(QoS)
 Security and Privacy
All these requirement are discussed in upcoming slides.
Requirement of Routing in Ad-Hoc
Network
 Minimum route acquisition delay: Delay is dependent on the size of the network
and network load.
 Quick Route Reconfiguration: If any change is occur in the network due to the path
breaks and packet loss, routing protocol be able to quick reconfigure the network.
 Loop Free Routing: Looping waste the network bandwidth , routing protocol
should be able to detect such transient routing loops and take corrective actions.
 Distributed Routing Approach: Ad hoc wireless network uses distributed routing
approach between mobile nodes.
 Minimum control overhead: Control Packet exchanging is done with minimum
control overhead as possible.
 Scalability: Scalability is the ability of a routing protocol to scal well or perform
efficiently in a network with a large number of nodes.
 Provisioning of QoS: Routing protocol should be able to provide certain level of
Quality of Services. QoS Parameter are:
 Bandwidth, Delay, Jitter, Packet Delivery Ratio, Throughput.
 Security and Privacy: The routing protocol should be able to handle Denial-of-
Service attacks.
Classification of Routing Protocols
of Ad-Hoc Network
 Based on routing information update mechanism
 Table Driven(Proactive)
 On Demand(Reactive)
 Hybrid
 Based on the use of temporal information for routing
 Path Selection Using Path History
 Path Selection Using Prediction
 Based OnTopology Information
 Flat Routing
 Hierarchical Routing
 Miscellaneous Classification Based on Utilization of specific
resources:
 Power aware routing
 Routing Using Geographical information
 Routing with efficient flooding
Routing Protocols of Ad-Hoc Network
 Table Driven routing(Proactive):
 DSDV(Destination sequenced distance vector routing protocol)
 WRP(Wireless Routing Protocol)
 CGSR(Cluster head gateway switch routing protocol)
 STAR(Source Tree Adaptive routing protocol)
 OLSR(Optimized link State routing)
 FSR(Fisheye State Routing)
 HSR(Hierarchical State Routing
 On Demand Routing:
 DSR(Dynamic Source Routing)
 AODV(Adhoc on demand distance vector routing)
 ABR(Associativity based routing)
 TORA(Temporal Ordered routing)
 LAR(Location aided routing)
 SSA(Signal stability based routing
 FORP(Flow oriented routing protocol)
 PLBR(Preffered link based routing)
Routing Protocols of Ad-Hoc
Network(Contd.)
 Hybrid
 CEDAR(Core Extraction Distributed Ad-Hoc routing)
 ZRP(Zone routing protocol)
 ZHLS(Zone based hierarchical link state routing protocol)
 Hierarchical routing Protocol
 HSR(Hierarchical State Routing Protocol)
 FSR(Fisheye state routing protocol)
 Routing protocol with Efficient Flooding Mechanism
 PLBR(Preffered Link based routing protocol)
 OLSR(Optimized link state protocol)
Multicasting
 Multicasting plays an important role in application of Ad-Hoc
wireless network , namely emergency search , rescue
operation and military communication.
 Design Issues of Multicast Routing Protocol:
 Robustness
 Efficiency
 Control Overhead
 Quality of Service(QoS)
 Efficient Group Management
 Scalability
 Security
Classification of Ad Hoc Multicasting
Routing Protocol
 Application Independent/Generic Multicast Protocol
 Nature of MulticastTopology
 Tree Based
 Mesh Based
 InitializationApproach
 Source Initiated
 Receiver Initiated
 Topology MaintenanceApproach
 Soft State
 Hard State
 Application Dependent Multicast Routing Protocol
 RBM(Role Based Multicast)
 CBM(Content Based Multicast)
 LBM( Location Based Multicast)
Tree Based Multicasting Routing
Protocol
 SourceTree Based
 BEMRP(Bandwidth Efficient Multicast routing protocol)
 MZRP(Multicast routing protocol based on zone routing)
 MCEDAR(MulticastCore extraction Distributed Ad-Hoc Routing)
 ABAM(Assoicativity based Adhoc multicast routing)
 DDM(Diffrential destination multicast routing protocol)
 WBM(Weight based multicast protocol
 PLBM(Preffered link based multicast protocol)
 SharedTree Based
 MAODV(MulticastAd hoc on demand distance vector routing protocol)
 AMRIS(Ad hoc multicast routing protocol utilizing increasing ID numbers.
 AMRoute(Ad hoc multicast routing protocol)
Mesh Based Multicasting Routing
Protocol
 ODMRP(On demand Multicast routing protocol)
 DCMP(Dynamic core based multicast routing protocol)
 FGMP-RA(Fording group multicast protocol –receiver
advertisement)
 NSMP(Neighbour supporting adhoc multicast routing
protocol)
 CAMP(Core Assisted mesh Protocol)
Transport Layer Protocol
 The main objective of transport layer protocol is establish and
maintain end-to-end connection , reliable end-to-end delivery of
packets, flow control, and congestion control.
 Classification ofTransport Layer Protocol for Adhoc Network:
 TCO over Adhoc wireless network
 Split approach
 End –to-End approach
 TCP-ELFN(TCP with explicit link failure notification)
 TCP-F(Feedback based TCP)
 TCP-BUS(TCP with buffering capacity and sequenced information)
 OtherTransport Layer protocols:
 ACTP( Application controlled transport protocol)
 ATP(Ad Hoc transport protocol)
Quality of Service Provisioning
 QoS is the performance level of services offered by service
provider or a network to the user.
 QoS would be measure on per flow, per link, per node basis. QoS
have following important terms:
 QoS Parameters
 Bandwidth, Delay, Security, Reliability,Throughput, Packet delivery ratio.
 QoS Aware Routing: QoS aware routing means routing with QoS
parameters.
 QoS Framework: A framework for a QoS is a complete system that attempts
to provide promised services to each user or application. The QoS service
model is the important component of QoS framework which describe how
services are served to the user.
Classification of Quality of Service
 Based on interaction b/w routing protocol and QoS Provisioning
Mechanism
 Coupled
 Decoupled
 Based on interaction b/w network and MAC Layers
 Independent
 Dependent
 Based on routing information update mechanism emloyed
 On Demand
 Table Driven
 Hybrid
Quality of Service Routing Protocols
 TBP(Ticket Based QoS Routing)
 PLBQR(Predictive Location based QoS Routing Protocol)
 TDR(Trigger based Distributed QoS Routing Protocol)
 QoSAODV (QoS enabled Ad hoc on demand distance vector
routing protocol)
 BR(Bandwidth Routing protocol)
 OQR(On Demand QoS Routing protocol)
 OLMQR(On Demand link state multipath QoS routing
protocol)
 AQR(Asynchronous QoS Routing)
Self Organization
 Self organization is the important property of Ad hoc wireless
network in which organizing and maintaining the network by itself.
Activities of self organization in Ad-Hoc wireless networks are :
 Neighbor Discovery: In neighbor discovery phase every node in
the network gather information about its neighbor and maintain
this information in appropriate data structure.
 Topology Organization: If any change is occur in the network
topology due the mobility or failure of nodes this is
automatically organized.
 Topology Re-Organization: Means Recovery from the major
topological changes in the network.
Security in Ad hoc Wireless
Network
 Security is important in Ad hoc wireless network especially in
military application. There are two types of attacks in Ad hoc
Wireless network:
 Passive Attack(Don’t distrusts operation of the N/W)
 Active Attack(Disrupts the operation of the network)
Major Security Threats in Ad hoc
Wireless Network
 Denial of Service: Due to this attack network resources are unavailable to
other nodes by consuming bandwidth or overloading the system.
 Resource Consumption: Resource consumption is done by energy
depletion battery power of nodes using heavy traffic and buffer overflow. In case
of buffer overflow attack filling the routing table with unwanted entries or
packet data.
 Host Impersonation: A fake node act as a actual node and respond as a
actual or original node and create wrong entries in routing table.
 Information Discloser: A compromised node can act as a informer by
disclose confidential information to unauthorized nodes.
 Interference: A common attach in defense application is to jam the wireless
communication by creating a wide spectrum noise.
Addressing and Service Discovery
 Every node which is participated in communication have its own
unique global address.
 Auto configuration technique is used to allocate the addresses to
the nodes.
 Service Discovery protocols are used in authentication , billing
and privacy services.
Energy Management
 Energy management is the process of managing energy resources
for improving the lifetime of the network.
 Energy management is deals with managing energy resources by
means of controlling the battery discharge, adjusting the
transmission power and scheduling of power sources.
 Energy Management is classified into :
 Battery Energy Management: Battery energy management is used to
improve the battery lifetime with its chemical properties.
 Processor Power Management
 Clock Speed
 No. of instruction per unit time
 Device Power Management
Battery Management Schemes
 Device Dependent Schemes
 Modeling and shipping of battery discharge patterns.
 Battery Scheduling
 Data link layer
 Lazy packet Scheduling
 BAMAC(Battery Aware MAC Protocol)
 Network Layer
 Traffic Shaping
 BEE(Battery Energy efficient routing)
 Routing based on battery status
Transmission Power Management Schemes
 Data Link Layer
 Dynamic PowerAdjustment
 Distributed topology control
 Distributed power control loop
 Centralized topology control
 Network Layer
 COMPOW(Common Power Protocol)
 Globalized power aware routing
 Localized power aware routing
 Determination of critical transmission range
 Higher Layer
 Congestion control and transmission policies atTCP/IP layer
 OS/Middilware approach
System Power Management Schemes
 Processor Power Management schemes
 Power Saving Modes
 PAMAS
 Device Management Schemes
 Low power design of Hardware
Recent Advances in Wireless Network
 UltraWide Band Radio Communication
 Wireless Fidelity System (Wi-Fi)
 Optical Wireless Networks
 The Multimode 802.11-IEEE 802.11 a/b/g
 The Meghdoot architecture
Conclusion:
 In this presentation discussed about Ad Hoc wireless network
from ground level. In this journey I cover:
 The comparative study of cellular network and ad hoc Network
 Applications areas of Ad hoc wireless network
 Wireless Mesh Network
 Wireless Sensor Network
 Hybrid Wireless Network
 Medium Access Scheme of Ad hocWireless Network
 Routing inAd hoc wireless network
 Multicasting in Ad hoc wireless network
 Transport Layer protocols of Ad hoc wireless network
 Pricing Scheme of Ad hoc wireless network
 Quality of Service of Ad hoc wireless network
 Self Organization
 Security
 Energy Management inAd hoc wireless network
 Recent Advances inWireless Networks
Future Work in Ad-Hoc Network
 Routing: We design a routing protocols that works best among all mobility
ranges. That means, how can we do a routing protocol that can do well in
stationary network, moderately mobile networks, and highly mobile networks?
 Multicasting: We suggest a unified protocol for multicasting and uni-casting
that can offer end-to-end reliability without having high control overhead. Can
we design a stateless multicast routing protocol? How do we scale multicasting
to a very large network?
 MAC Protocols: We design a MAC protocols for simultaneous communication
among the nodes in a neighborhood.
 We can design a MAC protocols for a full-duplex radio interface?
 We can suggest a MAC protocol for effective use of spatial multiplexing Vs spatial diversity
tradeoffs in a MIMO system.
 We can design a MAC for UWB ad hoc networks? What kind of MAC works best in very high
speed (aerial ad hoc networks) MAC protocols?
Future Work in Ad-Hoc Network
 Energy Management: There are many open problems in this area too. Low
power operation of nodes is still a major problem. Is it possible to operate with
minimal energy spending for certain idle time slots. Is it possible to find out an
energy aware cross-layer protocol design? How far we can save energy without
affecting throughput?
 Security: There are many open problems in security area in ad hoc networks.
There exists many solutions. However, it has been found that most of them are
either not realizable or inadequate.
 In every area, we have open problems that can be worked on.Of all the above
areas, the most challenging areas are energy management and security.You
may choose an area where you will be most productive.

Queries
ThankYou

More Related Content

What's hot

Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stackstuimrozsm
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsDarwin Nesakumar
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 

What's hot (20)

Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Bluetooth protocol stack
Bluetooth protocol stackBluetooth protocol stack
Bluetooth protocol stack
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
WLAN
WLANWLAN
WLAN
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
GSM ARCHITECTURE
GSM ARCHITECTUREGSM ARCHITECTURE
GSM ARCHITECTURE
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to Adhoc Wireless Network

Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksparuvathavardhinipra
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
Ad hoc wireless networks-Overview
 Ad hoc wireless networks-Overview Ad hoc wireless networks-Overview
Ad hoc wireless networks-Overviewparuvathavardhinipra
 
overview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptxoverview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptxparuvathavardhinij
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsnGOWTHAMMS6
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Networksheenammiddha
 
Introduction to Advance Network By Bilal Azam
Introduction to Advance Network By Bilal AzamIntroduction to Advance Network By Bilal Azam
Introduction to Advance Network By Bilal Azambilalazam34
 

Similar to Adhoc Wireless Network (20)

Applications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networksApplications of ad hoc and wireless sensor networks
Applications of ad hoc and wireless sensor networks
 
adhoc applications.pptx
adhoc applications.pptxadhoc applications.pptx
adhoc applications.pptx
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Ad hoc wireless networks-Overview
 Ad hoc wireless networks-Overview Ad hoc wireless networks-Overview
Ad hoc wireless networks-Overview
 
overview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptxoverview of adhoc wireless networks.pptx
overview of adhoc wireless networks.pptx
 
Ad hoc and wsn
Ad hoc and wsnAd hoc and wsn
Ad hoc and wsn
 
Improvement Of DSR Protocol
Improvement Of DSR ProtocolImprovement Of DSR Protocol
Improvement Of DSR Protocol
 
Advanced Networking on GloMoSim
Advanced Networking on GloMoSimAdvanced Networking on GloMoSim
Advanced Networking on GloMoSim
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Ad-hoc.pdf
Ad-hoc.pdfAd-hoc.pdf
Ad-hoc.pdf
 
Wireless Mesh Network
Wireless Mesh NetworkWireless Mesh Network
Wireless Mesh Network
 
Ad Hoc.pptx
Ad Hoc.pptxAd Hoc.pptx
Ad Hoc.pptx
 
Introduction to Advance Network By Bilal Azam
Introduction to Advance Network By Bilal AzamIntroduction to Advance Network By Bilal Azam
Introduction to Advance Network By Bilal Azam
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Manet
ManetManet
Manet
 
Networking
NetworkingNetworking
Networking
 

Recently uploaded

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 

Adhoc Wireless Network

  • 1. Ad-Hoc Wireless Networks Yunus Khan Assistant Professor Jawaharlal Institute of Technology Borawan Khargone
  • 2. Wireless Network  Wireless Network uses electromagnetic radio waves for communication(Exchange Information).  Spectrum Allocation Methods:  Comparative Bidding  Lottery System  Auctioning Method  Radio Propagation Mechanism :  Reflection  Diffraction  Scattering
  • 3. Radio Propagation Mechanisms  Reflection: When a propagation radio waves hits an object which is very large compared to its wavelength (such as surface of the earth or a tall building) the wave gets reflected by that object.  Diffraction: When a wave is hits on an impenetrable object, the wave bends at the edge of the object so the propagating in different directions.  Scattering: When a wave travels through a medium which contains many object with dimension small when compared to its wavelength scattering is occurred.
  • 4. Characteristics of Wireless Channel  Path Loss: Path loss is the ratio of the power of the transmitted signal to the power of the same signal received by the receiver on a given path.  Fading: Fading refers to the fluctuation in signal strength when receive at the receiver. Such as fast fading and Small fading.  Interference: Interference is the attack in wireless communication to jam the network by creating a wide spectrum noise.  Doppler shift: Doppler shift is defined as the change/shift in the frequency of the received signal when transmitter and receiver are mobile with respect to each other.
  • 5. Cellular Network  Cellular Networks are the infrastructure based or dependent network.  Path Setup b/w two nodes such as C to E is completed through the base station.  Cellular Network have single hope wireless link.  Cellular Network used centralized routing protocol.  Cellular Network have guaranteed bandwidth.  Circuit switchingTechnique is used in Cellular Network.  Cellular Networks are High Cost andTime Deployment.  Easier to achieve time synchronization.  High cost of Network and Maintenance.  Application areas are civilian and commercial sectors.
  • 6. Ad Hoc Network  Ad hoc n/w is the category of wireless network that utilize multi-hop radio relaying capable of operating without any fixed infrastructure.  Ad hoc is also called infrastructure less network.  Path setup b/w two nodes is completed trough the intermediate mobile node.  Wireless mesh network and wireless sensor network are the example of ad hoc network.  Routing and resource management is done in distributed manner.  Packet switching technique is used in ad hoc.  Ad hoc is Cost effective network.  Time synchronization is difficult and consume bandwidth.  Application domains are emergency search, rescue operations and collaborative computing.
  • 7. Application of Ad Hoc Wireless Network  Military Application: .  Useful in communication among a group of soldiers for tactical operations.  For example leader of the soldiers want to give any order to all soldiers OR set of selected persons are involved in the operation.  Collaborative and Distributed Computing:  To give information in a group of peoples using conference.  For example group of researchers want to share their research among group of peoples.  Sharing of a file among network.  Emergency Operations:  Ad hoc is used in search and rescue operations, crowd control and commando operations.  Due to the natural disaster like earthquake conventional communication facilities are destroyed in that case ad hoc network is used for rescue activities.
  • 8. Wireless Mesh Network  Wireless Mesh Network are the ad hoc wireless network that provide the many alternate path from source to destination when existing paths fails.  Mesh Networks are used in residential zones, business zones, important civilian zones and university campus.  Mesh Network support high data rate, quick and low cost deployment, enhanced services, high scalability and high availability.
  • 9. Wireless Sensor Network  A sensor network is a collection of large number of sensor nodes that are deployed in particular region.  As we know that the sensor are the tiny devices that have capability to sensing parameter, processing the data and communicate over the network.  A sensing can be periodic or sporadic.  Military, Health Care, Home security and environmental monitoring are the application areas of wireless sensor network.
  • 10. Issues in Wireless Sensor Network  Mobility of the Nodes.  Size of the network.  Density of the deployment.  Power Constraint.  Data/ Information fusion.  Traffic Distribution.
  • 11. Classification of Wireless Sensor Network  Architecture:  Layered-UNPF(Unified network protocol framework)  Clustered-LEACH (Low energy adaptive clustering hierarchy)  Data handling:  Data Dissemination.  Data Gathering.  Medium Access Control:  SMACS(Self organizing MAC for sensor network)  HybridTDMA/FDMA  CSMA  Location Discovery:  Indoor Localization  Multi Lateration.  Miscellaneous:  Quality of N/W Coverage - Breach path -Maximum Support Path
  • 12. Classification of Wireless Sensor Network(Contd.)  Security - LEAP - INSENS - SPINS  RealTime Communication - Speed - RAP  Other solutions - Energy efficient H/W design - Synchronization. - Transport Layer.  Data Dissemination(Data handling)  Flooding, Gossiping, Roumor Routing, SAR, Directed Diffusion, SPIN, Cost field approach, geographic hash table, SMECN.  Data Gathering (Data Handling)  Direct Transmission, PEGASIS, Binary scheme, Chain based tree level scheme.
  • 13. Hybrid Wireless Network  Hybrid wireless networks are the combination of multi-hop cellular network and integrated cellular ad hoc relay network.  Hybrid network have the higher capacity than the cellular network.  Increased flexibility and reliability in routing.  Better coverage and connectivity in holes.
  • 14. Classification of Hybrid Wireless Network  System with Host cum relay station  Single Mode System  MCM(Multi hop cellular Network)  MWLAN (Multi hop wireless LAN)  SMCN(Single interface multi hop cellular network)  Multi Mode System  High Mobility System - HWN (Hybrid wireless network) - MuPAC (Multi power architecture for cellular network) - MADF(Mobile assisted data forwarding) - A-GSM(Ad hoc GSM) - UCAN(Unified cellular and ad hoc network)  Limited Mobility System -TWiLL(Throughput enhanced wireless in local loop architecture) - DWiLL(Directional throughput enhanced wireless in local loop)  System with Dedicated relay station  Single Mode System  SOPRANO(Self organizing packet radio ad hoc network with overlay )  Multi Mode System  iCAR (Integrated cellular and ad hoc relaying system)
  • 15. Issues and challenges in Ad-Hoc wireless Network  Medium Access Scheme  Routing  Multicasting  Transport Layer Protocol  Pricing Scheme  Quality of Service Provisioning  Self Organization  Security  Energy Management  Addressing and Service Discovery  Scalability  Deployment Consideration
  • 16. Medium Access Control  MAC protocol in ad hoc wireless network is distributed and shared channel for the transmission of packets. Design issues of MAC for Ad Hoc wireless Network:  Distributed Operation: The design of MAC protocol should be fully distributed with minimum control overhead.  Synchronization: MAC protocol should be synchronized with time.  Hidden Terminal: The presence of hidden terminal reduced the throughput of MAC protocol. Hence MAC protocol should be able to handle the effects of hidden terminal.  Exposed Terminal: To improve the efficiency of MAC protocol the exposed nodes should be allowed to transmit without causing collision to the on going data transfer.  Throughput: MAC protocol should maximize the throughput with minimizing the occurrence of collision, maximizing channel utilization and minimizing control overhead.
  • 17. Medium Access Control(Contd.)  Access Delay: Access delay refers to the average delay that any packet experiences to get transmitted. The MAC protocol should attempt to minimize the delay.  Fairness: Fairness refers to the ability of the MAC protocol to provide equal bandwidth to all competing nodes.  Some Other Issues of MAC  Real time traffic support  Resource reservation  Ability to measure resource availability  Capability for power control  Adaptive rate control  Use of directional antennas
  • 18. Classification of Medium Access Control  Contention Based Protocol  Sender Initiated Protocols  Receiver Initiated Protocols  Contention Based Protocols with Reservation mechanism  Synchronous Protocol  Asynchronous Protocols  Contention Based Protocols with Scheduling mechanism  DPS(Distributed priority scheduling)  DWOP(Distributed wireless ordering protocol)  DLPS(Distributed Laxity Based priority scheduling)  Other MAC Protocols  Protocol using directional antennas  MMAC(Multichannel MAC)  MCAMA(Multichannel CSMA MAC protocol)  PCM(Power control MAC protocol)  RBAR(Receiver based auto rate protocol)
  • 19. Sender & Receiver Initiated Protocol  Single Channel protocol  MACAW(Multiple access collision avoidance for wireless LAN’s)  FAMA(Floor acquisition multiple access protocols)  Multi Channel protocol  BTMAC(Busy tone MAC)  DBTMAC( Dual Busy tone MAC)  ICAMA(Interleaved CSMA)  Receiver Initiated Protocol  RI-BTMAC  MACA-BI( MACA by invitation)  MARCH(Media access with reduced handshake)
  • 20. Synchronous and Asynchronous Protocol  Synchronous Protocols  DPRMA(Distributed packet reservation multiple access protocol)  CATA(Collision avoidance time allocation protocol)  HRMA(Hop reservation multiple access protocol)  SRMA/PA(Soft reservation multiple access with priority assignment)  FPRP(Five phase reservation protocol)  Asynchronous Protocols  MACA/PR(MACA with piggy backed reservation)  RTMAC(Real time medium access control protocol)
  • 21. Routing in Ad-Hoc Network  Routing refers to the exchanging the route information and finding feasible and appropriate path to destination based on the criteria such as minimum power required, hop length and utilizing minimum bandwidth. The major challenges of routing protocol are:  Mobility: Due to the mobility frequent path breaks, packet collision, transient loops are occur in the network. Routing protocol should be able to solve all these problems in efficient manner.  Bandwidth Constraint: Bandwidth is equally distributed or shared between all the nodes in the broadcast region.  Location Dependent Contention: A good routing protocol should have built in mechanism for distributing the network load uniformly across the network which is dependent on the number of nodes in the network.  Other Resource Constraints: Routing protocol should be able to handle issues related with computing power, battery power and buffer storage.
  • 22. Requirement of Routing in Ad-Hoc Network  Minimum route acquisition delay  Quick route reconfiguration  Loop free routing  Distributed routing approach  Minimum control overhead  Scalability  Provisioning of Quality of Services(QoS)  Security and Privacy All these requirement are discussed in upcoming slides.
  • 23. Requirement of Routing in Ad-Hoc Network  Minimum route acquisition delay: Delay is dependent on the size of the network and network load.  Quick Route Reconfiguration: If any change is occur in the network due to the path breaks and packet loss, routing protocol be able to quick reconfigure the network.  Loop Free Routing: Looping waste the network bandwidth , routing protocol should be able to detect such transient routing loops and take corrective actions.  Distributed Routing Approach: Ad hoc wireless network uses distributed routing approach between mobile nodes.  Minimum control overhead: Control Packet exchanging is done with minimum control overhead as possible.  Scalability: Scalability is the ability of a routing protocol to scal well or perform efficiently in a network with a large number of nodes.  Provisioning of QoS: Routing protocol should be able to provide certain level of Quality of Services. QoS Parameter are:  Bandwidth, Delay, Jitter, Packet Delivery Ratio, Throughput.  Security and Privacy: The routing protocol should be able to handle Denial-of- Service attacks.
  • 24. Classification of Routing Protocols of Ad-Hoc Network  Based on routing information update mechanism  Table Driven(Proactive)  On Demand(Reactive)  Hybrid  Based on the use of temporal information for routing  Path Selection Using Path History  Path Selection Using Prediction  Based OnTopology Information  Flat Routing  Hierarchical Routing  Miscellaneous Classification Based on Utilization of specific resources:  Power aware routing  Routing Using Geographical information  Routing with efficient flooding
  • 25. Routing Protocols of Ad-Hoc Network  Table Driven routing(Proactive):  DSDV(Destination sequenced distance vector routing protocol)  WRP(Wireless Routing Protocol)  CGSR(Cluster head gateway switch routing protocol)  STAR(Source Tree Adaptive routing protocol)  OLSR(Optimized link State routing)  FSR(Fisheye State Routing)  HSR(Hierarchical State Routing  On Demand Routing:  DSR(Dynamic Source Routing)  AODV(Adhoc on demand distance vector routing)  ABR(Associativity based routing)  TORA(Temporal Ordered routing)  LAR(Location aided routing)  SSA(Signal stability based routing  FORP(Flow oriented routing protocol)  PLBR(Preffered link based routing)
  • 26. Routing Protocols of Ad-Hoc Network(Contd.)  Hybrid  CEDAR(Core Extraction Distributed Ad-Hoc routing)  ZRP(Zone routing protocol)  ZHLS(Zone based hierarchical link state routing protocol)  Hierarchical routing Protocol  HSR(Hierarchical State Routing Protocol)  FSR(Fisheye state routing protocol)  Routing protocol with Efficient Flooding Mechanism  PLBR(Preffered Link based routing protocol)  OLSR(Optimized link state protocol)
  • 27. Multicasting  Multicasting plays an important role in application of Ad-Hoc wireless network , namely emergency search , rescue operation and military communication.  Design Issues of Multicast Routing Protocol:  Robustness  Efficiency  Control Overhead  Quality of Service(QoS)  Efficient Group Management  Scalability  Security
  • 28. Classification of Ad Hoc Multicasting Routing Protocol  Application Independent/Generic Multicast Protocol  Nature of MulticastTopology  Tree Based  Mesh Based  InitializationApproach  Source Initiated  Receiver Initiated  Topology MaintenanceApproach  Soft State  Hard State  Application Dependent Multicast Routing Protocol  RBM(Role Based Multicast)  CBM(Content Based Multicast)  LBM( Location Based Multicast)
  • 29. Tree Based Multicasting Routing Protocol  SourceTree Based  BEMRP(Bandwidth Efficient Multicast routing protocol)  MZRP(Multicast routing protocol based on zone routing)  MCEDAR(MulticastCore extraction Distributed Ad-Hoc Routing)  ABAM(Assoicativity based Adhoc multicast routing)  DDM(Diffrential destination multicast routing protocol)  WBM(Weight based multicast protocol  PLBM(Preffered link based multicast protocol)  SharedTree Based  MAODV(MulticastAd hoc on demand distance vector routing protocol)  AMRIS(Ad hoc multicast routing protocol utilizing increasing ID numbers.  AMRoute(Ad hoc multicast routing protocol)
  • 30. Mesh Based Multicasting Routing Protocol  ODMRP(On demand Multicast routing protocol)  DCMP(Dynamic core based multicast routing protocol)  FGMP-RA(Fording group multicast protocol –receiver advertisement)  NSMP(Neighbour supporting adhoc multicast routing protocol)  CAMP(Core Assisted mesh Protocol)
  • 31. Transport Layer Protocol  The main objective of transport layer protocol is establish and maintain end-to-end connection , reliable end-to-end delivery of packets, flow control, and congestion control.  Classification ofTransport Layer Protocol for Adhoc Network:  TCO over Adhoc wireless network  Split approach  End –to-End approach  TCP-ELFN(TCP with explicit link failure notification)  TCP-F(Feedback based TCP)  TCP-BUS(TCP with buffering capacity and sequenced information)  OtherTransport Layer protocols:  ACTP( Application controlled transport protocol)  ATP(Ad Hoc transport protocol)
  • 32. Quality of Service Provisioning  QoS is the performance level of services offered by service provider or a network to the user.  QoS would be measure on per flow, per link, per node basis. QoS have following important terms:  QoS Parameters  Bandwidth, Delay, Security, Reliability,Throughput, Packet delivery ratio.  QoS Aware Routing: QoS aware routing means routing with QoS parameters.  QoS Framework: A framework for a QoS is a complete system that attempts to provide promised services to each user or application. The QoS service model is the important component of QoS framework which describe how services are served to the user.
  • 33. Classification of Quality of Service  Based on interaction b/w routing protocol and QoS Provisioning Mechanism  Coupled  Decoupled  Based on interaction b/w network and MAC Layers  Independent  Dependent  Based on routing information update mechanism emloyed  On Demand  Table Driven  Hybrid
  • 34. Quality of Service Routing Protocols  TBP(Ticket Based QoS Routing)  PLBQR(Predictive Location based QoS Routing Protocol)  TDR(Trigger based Distributed QoS Routing Protocol)  QoSAODV (QoS enabled Ad hoc on demand distance vector routing protocol)  BR(Bandwidth Routing protocol)  OQR(On Demand QoS Routing protocol)  OLMQR(On Demand link state multipath QoS routing protocol)  AQR(Asynchronous QoS Routing)
  • 35. Self Organization  Self organization is the important property of Ad hoc wireless network in which organizing and maintaining the network by itself. Activities of self organization in Ad-Hoc wireless networks are :  Neighbor Discovery: In neighbor discovery phase every node in the network gather information about its neighbor and maintain this information in appropriate data structure.  Topology Organization: If any change is occur in the network topology due the mobility or failure of nodes this is automatically organized.  Topology Re-Organization: Means Recovery from the major topological changes in the network.
  • 36. Security in Ad hoc Wireless Network  Security is important in Ad hoc wireless network especially in military application. There are two types of attacks in Ad hoc Wireless network:  Passive Attack(Don’t distrusts operation of the N/W)  Active Attack(Disrupts the operation of the network)
  • 37. Major Security Threats in Ad hoc Wireless Network  Denial of Service: Due to this attack network resources are unavailable to other nodes by consuming bandwidth or overloading the system.  Resource Consumption: Resource consumption is done by energy depletion battery power of nodes using heavy traffic and buffer overflow. In case of buffer overflow attack filling the routing table with unwanted entries or packet data.  Host Impersonation: A fake node act as a actual node and respond as a actual or original node and create wrong entries in routing table.  Information Discloser: A compromised node can act as a informer by disclose confidential information to unauthorized nodes.  Interference: A common attach in defense application is to jam the wireless communication by creating a wide spectrum noise.
  • 38. Addressing and Service Discovery  Every node which is participated in communication have its own unique global address.  Auto configuration technique is used to allocate the addresses to the nodes.  Service Discovery protocols are used in authentication , billing and privacy services.
  • 39. Energy Management  Energy management is the process of managing energy resources for improving the lifetime of the network.  Energy management is deals with managing energy resources by means of controlling the battery discharge, adjusting the transmission power and scheduling of power sources.  Energy Management is classified into :  Battery Energy Management: Battery energy management is used to improve the battery lifetime with its chemical properties.  Processor Power Management  Clock Speed  No. of instruction per unit time  Device Power Management
  • 40. Battery Management Schemes  Device Dependent Schemes  Modeling and shipping of battery discharge patterns.  Battery Scheduling  Data link layer  Lazy packet Scheduling  BAMAC(Battery Aware MAC Protocol)  Network Layer  Traffic Shaping  BEE(Battery Energy efficient routing)  Routing based on battery status
  • 41. Transmission Power Management Schemes  Data Link Layer  Dynamic PowerAdjustment  Distributed topology control  Distributed power control loop  Centralized topology control  Network Layer  COMPOW(Common Power Protocol)  Globalized power aware routing  Localized power aware routing  Determination of critical transmission range  Higher Layer  Congestion control and transmission policies atTCP/IP layer  OS/Middilware approach
  • 42. System Power Management Schemes  Processor Power Management schemes  Power Saving Modes  PAMAS  Device Management Schemes  Low power design of Hardware
  • 43. Recent Advances in Wireless Network  UltraWide Band Radio Communication  Wireless Fidelity System (Wi-Fi)  Optical Wireless Networks  The Multimode 802.11-IEEE 802.11 a/b/g  The Meghdoot architecture
  • 44. Conclusion:  In this presentation discussed about Ad Hoc wireless network from ground level. In this journey I cover:  The comparative study of cellular network and ad hoc Network  Applications areas of Ad hoc wireless network  Wireless Mesh Network  Wireless Sensor Network  Hybrid Wireless Network  Medium Access Scheme of Ad hocWireless Network  Routing inAd hoc wireless network  Multicasting in Ad hoc wireless network  Transport Layer protocols of Ad hoc wireless network  Pricing Scheme of Ad hoc wireless network  Quality of Service of Ad hoc wireless network  Self Organization  Security  Energy Management inAd hoc wireless network  Recent Advances inWireless Networks
  • 45. Future Work in Ad-Hoc Network  Routing: We design a routing protocols that works best among all mobility ranges. That means, how can we do a routing protocol that can do well in stationary network, moderately mobile networks, and highly mobile networks?  Multicasting: We suggest a unified protocol for multicasting and uni-casting that can offer end-to-end reliability without having high control overhead. Can we design a stateless multicast routing protocol? How do we scale multicasting to a very large network?  MAC Protocols: We design a MAC protocols for simultaneous communication among the nodes in a neighborhood.  We can design a MAC protocols for a full-duplex radio interface?  We can suggest a MAC protocol for effective use of spatial multiplexing Vs spatial diversity tradeoffs in a MIMO system.  We can design a MAC for UWB ad hoc networks? What kind of MAC works best in very high speed (aerial ad hoc networks) MAC protocols?
  • 46. Future Work in Ad-Hoc Network  Energy Management: There are many open problems in this area too. Low power operation of nodes is still a major problem. Is it possible to operate with minimal energy spending for certain idle time slots. Is it possible to find out an energy aware cross-layer protocol design? How far we can save energy without affecting throughput?  Security: There are many open problems in security area in ad hoc networks. There exists many solutions. However, it has been found that most of them are either not realizable or inadequate.  In every area, we have open problems that can be worked on.Of all the above areas, the most challenging areas are energy management and security.You may choose an area where you will be most productive. 