Professional Documents
Culture Documents
WMN 5TH CHP
WMN 5TH CHP
Ad hoc network is a kind of Wireless Network which can be designed for fulfilling particular
purposes that is served by establishment of the whole set up on the fly. Example types of an Ad
hoc network are -
Mobile Ad hoc Networks are autonomous systems which comprise a collection of mobile nodes
that use wireless transmission for communication. They are self-organized, self-configured, and
self-controlled infrastructure-less networks. This type of network can be set up or deployed
anywhere and anytime because it poses very simple infrastructure setup and no or minimal
central administration. These networks are mainly used by community users such as military,
researchers, business, students, and emergency services. Nodes are using Internet Protocol and IP
addresses are assigned to each of the nodes. Individual nodes discover dynamically which other
nodes they can communicate with.
2.1 Features / Characteristics of MANETs
• Rapidly deployable, self-organized, self-configured, and self-controlled infrastructure-
less networks
• Wireless links
• Every computer or device (node) is a router as well as end host
• Nodes are mobile, topology can be very dynamic
• Nodes must be able to relay traffic since communicating nodes might be out of range
• Can be a standalone network or it can be connected to external networks(Internet)
• Radio communication – shared medium
Military networks are designed to maintain a low probability of intercept and/or a low
probability of detection. Hence, nodes prefer to radiate as little power as necessary and transmit
as infrequently as possible, thus decreasing the probability of detection or interception. A lapse
in any of these requirements may degrade the performance and dependability of the network.
2.2.2 Home Networking
Home networking is the collection of electronic products and systems, enabling remote access
and control of those products and systems, and any available contents such as music, video or
data. In home networks, a user wants to accomplish data communication in ways that are
affordable, reliable, easy to learn, and easy to use.
Vehicular Ad hoc Network (VANET) is a subset of mobile ad hoc network, which supports data
communications among nearby vehicles and between vehicles and nearby fixed infrastructure,
and generally represented as roadside entities. Depending on the range of data communications,
nodes in VANET communicate among themselves in type of short-range (vehicle-to-vehicle) or
medium-range (vehicle-to-roadside) communications.
In addition, the major application view of VANETs includes real-time and safety applications.
Non-safety applications include real-time traffic congestion and routing information, high-speed
tolling, mobile infotainment, traffic condition monitoring, and many others. Vehicular safety
applications include emergency, collision, car accident, and other safety warnings.
2.2.4 Sensor network
Sensor networks are composed of a large number of small nodes with sensing, computation, and
wireless communication capabilities. In sensor networks, sensor nodes are usually scattered and
the position of sensor nodes needs not be predetermined. It means that sensor network protocols
and algorithms must provide self-organizing capabilities. The features of sensor networks
provide a wide range of applications such as health, military, and home. The realization of these
and other sensor network applications require wireless ad hoc networking techniques.
2.2.5 Conferencing
Ad hoc network is widely used to create a network in place like Conferences, where for a short
time of period the network is formed. One main pc is wired to which the internet facility is given
and the rest of the computers or laptops are connectionless. One main computer forms the Ad
hoc network and tries to connect with all the rest of the computers to make communication and
data transfer possible.
However, a flat routing algorithm does not have good scalability. The routing overhead increases
rapidly when the network becomes larger. Hence, to control channel reuse spatially (in terms of
frequency, time, or spreading code) and reduce routing information overhead, some form of
hierarchical scheme should be employed. Clustering is the most common technique employed in
hierarchiical routing architectures
a s. The idea behind
b hieraarchical routiing is to divide the hostss of a
self-orgaanized netwoork into a nuumber of oveerlapping orr disjoint cluusters. One nnode is electted as
clusterheead for eachh cluster. Thhis clusterheead maintainns the mem mbership infformation foor the
cluster.
3.2 Cllassificatio
on of Routting Protoccols
One of the
t most po opular metho ods to distin
nguish mobiile ad hoc nnetwork rouuting protocools is
based onn how routing informattion is acqu uired and m maintained bby mobile nnodes. Usingg this
method, mobile ad hoc networrk routing protocols
p cann be divideed, as discuussed above,, into
proactivee routing, reaactive routin
ng, and hybriid routing.
3.2.1 Proactive
P orr Table-driiven Routing Protocool
A proacttive routing protocol is also called a “table-drivven” routingg protocol. UUsing a proaactive
routing protocol,
p noddes in a mob
bile ad hoc network
n conttinuously evvaluate routees to all reachhable
nodes annd attempt to maintain consistent, up-to-date
u rrouting inforrmation. Theerefore, a soource
node cann get a routin
ng path imm
mediately if itt needs one. In proactivee routing prootocols, all nnodes
need to maintain a consistent view of the network topology. When a network topology change
occurs, respective updates must be propagated throughout the network to notify the change. Most
proactive routing protocols proposed for mobile ad hoc networks have inherited properties from
algorithms used in wired networks.
To adapt to the dynamic features of mobile ad hoc networks, necessary modifications have been
made on traditional wired network routing protocols. Using proactive routing algorithms, mobile
nodes proactively update the network state and maintain a route regardless of whether data traffic
exists or not, and the overhead to maintain up-to-date network topology information is high.
Examples are -
Compared to the proactive routing protocols for mobile ad hoc networks, less control overhead is
a distinct advantage of the reactive routing protocols. Thus, reactive routing protocols have better
scalability than proactive routing protocols in mobile ad hoc networks. However, when using
reactive routing protocols, source nodes may suffer from long delays for route searching before
they can forward data packets.
Examples are -
Examples are -