SlideShare a Scribd company logo
Ad Hoc and Sensor Networks
Definition
“It is an autonomous system of mobile
hosts(MHs)(also serving as routers)
connected by wireless links.”
Ad Hoc networks do not need support from
any existing infrastructure, like Base
Station, Access Point, etc.
Ad Hoc Model
Infrastructure Vs Ad Hoc Network
Infrastructure networks Ad-hoc wireless networks
Fixed infrastructure No infrastructure
Single-hop wireless links Multi-hop wireless links
High cost and time of deployment Very quick and cost-effective
Reuse of frequency via channel reuse Dynamic frequency sharing
Nowadays applications: civilian, commercial Nowadays applications: military, rescue
High cost of network maintenance Maintenance operations are built-in
Low complexity of mobile devices Intelligent mobile devices are required
Widely deployed, evolves Still under development in commercial sector
What makes ad hoc so attractive:
• quick deployment;
• inexpensive deployment and operation.
Technical challenges
There are many challenges in design, deployment, and
performance of ad hoc:
1. Medium access scheme;
2. Routing and multicasting;
3. Transport layer protocol;
4. Quality of service provisioning;
5. Self Organizing
6. Security;
7. Energy management;
8. Addressing and service discovery;
9. Scalability;
10. Deployment considerations.
Note! no good solutions for these challenges.
mode of operation
Ad hoc networks are basically peer-to-peer multi-hop mobile
wireless networks where information packets are transmitted in
a store-and-forward manner from a source to an arbitrary
destination, via intermediate nodes as shown in Figure
Symmetric and asymmetric are related to radio range: some protocols concentrate on sy……
As the MHs move, the resulting change in network topology must
be made known to the other nodes so that outdated topology
information can be updated or removed.
For example, as the MH2 in the above Figure changes its point of
attachment from MH3 to MH4 other nodes part of the network
should use this new route to forward packets to MH2.
Important characteristics of a MANET
• Dynamic Topologies : nodes move randomly
with different speeds, network topology
changes
• Energy-constrained Operation: nodes also
involve in network management, system and
applications be designed to save the energy
• Limited Bandwidth: Transmission rate is low
• Security Threats: Mobile wireless networks are
generally more prone to physical security
threats than fixed-cable nets. Security services
be designed carefully
The Communication Puzzle
• There are different types of wireless networks
with different transmission speeds and ranges
• Personal Area Network (PAN)personal objects
• Local Area Network(LAN) single building or campus
• Metropolitan Area Networks (MAN) towns and cities
• Wide Area Network (WAN) states, countries, continents
• Regional Area Network (RAN) to provide coverage
ranges in the order of tens of kilometers with applications in rural
and remote areas
All these are differed by the physical distance
that the network spans
LAN, MAN and WAN were originally started as wired network, PANs and RANs, on the other
hand, have been introduced with wireless connectivity in mind
• Figure below compares various wireless networks in terms of the popular standards,
speeds, communication ranges and applications
• ad hoc networks are mostly within the framework of Wireless
LANs and Wireless PANs, a lot of movement is currently
undergoing as to integrate ad hoc networks with MANs and
WWANs
• With this it would be easy to connect the ad hoc network with
the outside world (e.g., Internet)
• While the mobile devices are equipped with dual mode and
dual band radio frequencies , heterogeneous networks will
become more and more common and the need to integrate
them will be of paramount importance
Applications of MANETs
Day-to-day applications like email and file transfer can be easily
deployable within an ad hoc network environment
Web Services: can also be implemented with ad hoc networks,
where any node in the network can serve as a gateway to the
outside world.
Military Applications: Ad Hoc networks were developed by
keeping in mind military applications. Infrastructure network
is almost impossible to establish or maintain in the battle field
in an unknown region. The ad hoc networks having self-
organizing capability can be effectively used in these
situations.
Crisis Management: In case of crisis management, infrastructure
may be destroyed, in such cases ad hoc networks are useful.
Personal Area Networking: managing personal things like
printers, cell phones, PDAs, laptops, headsets, and so on. (ad
hoc network can be replaced with bluetooth)
Challenges:
• Active research is going on in Adhoc, several aspects have
been explored, many problems have been arisen, still some
issues to be addressed.
• Major challenges are:
1.Scalability;
2.Quality of service;
3.Client server model shift;
4.Security;
5.Interoperation with the Internet;
6.Energy conservation;
7.Node cooperation;
8.Interoperation.
Scalability
• Ad hoc networks suffer, by nature, from the scalability
problems in capacity.
• In a non-cooperative network, where omni-directional
antennas are being used, the through put per node decreases
at a rate 1/(sqrt(N)),where N is the number of nodes.
• That is, in a network with100 nodes, a single device gets, at
most, approximately one tenth of the theoretical network
data rate. The problem fixed with bi directional antennas
• As the network size increases the problems like Route
acquisition, service location and encryption key exchanges
need to be solved.
Quality of Service
• There are many applications for transfer of Voice, live video,
and file transfer.
• QoS parameters such as delay, jitter, bandwidth, Packet loss
probability, and so on need to be addressed carefully.
• Issues of QoS robustness, QoS routing policies, algorithms and
protocols with multiple, including preemptive, priorities
remain to be addressed.
Client-Server Model Shift
• Address allocation, name resolution, authentication and the
Service location are just examples of the very basic services
which are done by the servers but in ad hoc some nodes do
all these and their location in the network is unknown and
possibly even changing over time.
• The issue of shift from the traditional client-sever model
remains to be appropriately addressed
Security
• Lack of any centralized network management or certification
authority makes these dynamically changing wireless structures
leads security threats like infiltration, eavesdropping,
interference, and so on.
• Security is indeed one of the most difficult problems to be
solved, but it has received only modest attention so far
Interoperation with the Internet
• It seems very likely that the most common applications of
adhoc networks require some Internet connection.
Energy Conservation
• There are two primary research topics: maximization of life time
of a single node and maximization of the life time of the whole
network.
• These goals can be achieved either by developing better
batteries, or by making the network terminals‘ operation more
energy efficient.
• The first approach is likely to give a 40% increase in battery life,
remaining 60% can be achieved though the design of energy
efficient protocols design

More Related Content

PPTX
Wsn unit-1-ppt
PPT
Wsn 08
PPTX
Congestion control, slow start, fast retransmit
PDF
Location Aided Routing (LAR)
PPT
Umts system architecture
PPTX
Network security model.pptx
PPTX
MANET VS VANET
ODP
UMTS, Introduction.
Wsn unit-1-ppt
Wsn 08
Congestion control, slow start, fast retransmit
Location Aided Routing (LAR)
Umts system architecture
Network security model.pptx
MANET VS VANET
UMTS, Introduction.

What's hot (20)

PPTX
Vehicular ad hoc network - VANET
PPTX
MOBILE COMMUNICATION
PPTX
Security issues and attacks in wireless sensor networks
PPTX
PPTX
Mobile computing
PPTX
Mobility Management
PPT
Wireless routing protocols
PDF
Data storage in cloud computing
PPTX
12. End user devices.pptx
PPTX
Localization & calling
PPT
Satellite communication Basics
PDF
Design Issues and Challenges in Wireless Sensor Networks
PPTX
Virtual Machine Migration & Hypervisors
PPTX
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
PPT
TCP Over Wireless
PPTX
VANET in Mobile Computing
PPTX
PPT
Error correction and detection th
PPTX
Wireless communication technologies
PPTX
wireless sensor network
Vehicular ad hoc network - VANET
MOBILE COMMUNICATION
Security issues and attacks in wireless sensor networks
Mobile computing
Mobility Management
Wireless routing protocols
Data storage in cloud computing
12. End user devices.pptx
Localization & calling
Satellite communication Basics
Design Issues and Challenges in Wireless Sensor Networks
Virtual Machine Migration & Hypervisors
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
TCP Over Wireless
VANET in Mobile Computing
Error correction and detection th
Wireless communication technologies
wireless sensor network
Ad

Viewers also liked (16)

PPTX
Chat con encriptación en java
ODT
POLS404 Final Paper - Taylor, Landers, Solmonsen
DOCX
Resume_Mahesha
DOCX
Introducción a la computación y la evolución de las computadoras a través del...
PDF
Passivation from Elecrtrosmog into your Homes.
PPTX
4J SS Fab Corp.
PDF
Aymvs 2013 1_20
PPTX
Presentation
PDF
Software Casos de Uso
PDF
Sureka-Resume
PDF
SRC company profile (1)
PDF
How Music Affects The Brain
PPTX
Outcome 4
PPTX
Tecnologia aplicada à la educacion
Chat con encriptación en java
POLS404 Final Paper - Taylor, Landers, Solmonsen
Resume_Mahesha
Introducción a la computación y la evolución de las computadoras a través del...
Passivation from Elecrtrosmog into your Homes.
4J SS Fab Corp.
Aymvs 2013 1_20
Presentation
Software Casos de Uso
Sureka-Resume
SRC company profile (1)
How Music Affects The Brain
Outcome 4
Tecnologia aplicada à la educacion
Ad

Similar to Asn unit 1 (20)

PDF
Mobile computing Mobile Adhoc Networks (MANETs)
PDF
Mobile adhoc networks
PDF
abnormal traffic detection based on attention and big step convolution ppt wi...
PPTX
MANET.pptx
PPTX
unit1 asnnnnnnnnnnnnnnnnnnnnnnnnnnnnn.pptx
PDF
Lecture 5 6 .ad hoc network
PPT
Lect_Intro-Unit-1-wirelessAdHocNetowrk.ppt
PDF
Manet overview
PDF
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
PDF
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
PDF
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
PDF
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
PPT
Adhoc wireless
PDF
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
PPT
Top schools in noida
PPT
MOBILE Ad-Hoc NETWORK (MANET)
PPSX
Adhoc and routing protocols
PPTX
Pranali_d-AWN.pptx a ppt on adhoc and wireless
PPTX
Pranali_d-AWN.pptx
PPTX
INTRODUCTION TO MANETS_cHARACTERISTICS AND APPLICATIONS.pptx
Mobile computing Mobile Adhoc Networks (MANETs)
Mobile adhoc networks
abnormal traffic detection based on attention and big step convolution ppt wi...
MANET.pptx
unit1 asnnnnnnnnnnnnnnnnnnnnnnnnnnnnn.pptx
Lecture 5 6 .ad hoc network
Lect_Intro-Unit-1-wirelessAdHocNetowrk.ppt
Manet overview
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Enhanced Quality of Service Based Routing Protocol Using Hybrid Ant Colony Op...
Adhoc wireless
An Overview of Mobile Ad hoc Network: Application, Challenges and Comparison ...
Top schools in noida
MOBILE Ad-Hoc NETWORK (MANET)
Adhoc and routing protocols
Pranali_d-AWN.pptx a ppt on adhoc and wireless
Pranali_d-AWN.pptx
INTRODUCTION TO MANETS_cHARACTERISTICS AND APPLICATIONS.pptx

Recently uploaded (20)

PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
737-MAX_SRG.pdf student reference guides
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Module 8- Technological and Communication Skills.pptx
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPT
Total quality management ppt for engineering students
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
Design Guidelines and solutions for Plastics parts
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
communication and presentation skills 01
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Fundamentals of safety and accident prevention -final (1).pptx
III.4.1.2_The_Space_Environment.p pdffdf
737-MAX_SRG.pdf student reference guides
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Module 8- Technological and Communication Skills.pptx
Categorization of Factors Affecting Classification Algorithms Selection
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Total quality management ppt for engineering students
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
Design Guidelines and solutions for Plastics parts
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
"Array and Linked List in Data Structures with Types, Operations, Implementat...
distributed database system" (DDBS) is often used to refer to both the distri...
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
communication and presentation skills 01
Exploratory_Data_Analysis_Fundamentals.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS

Asn unit 1

  • 1. Ad Hoc and Sensor Networks
  • 2. Definition “It is an autonomous system of mobile hosts(MHs)(also serving as routers) connected by wireless links.” Ad Hoc networks do not need support from any existing infrastructure, like Base Station, Access Point, etc.
  • 4. Infrastructure Vs Ad Hoc Network Infrastructure networks Ad-hoc wireless networks Fixed infrastructure No infrastructure Single-hop wireless links Multi-hop wireless links High cost and time of deployment Very quick and cost-effective Reuse of frequency via channel reuse Dynamic frequency sharing Nowadays applications: civilian, commercial Nowadays applications: military, rescue High cost of network maintenance Maintenance operations are built-in Low complexity of mobile devices Intelligent mobile devices are required Widely deployed, evolves Still under development in commercial sector
  • 5. What makes ad hoc so attractive: • quick deployment; • inexpensive deployment and operation.
  • 6. Technical challenges There are many challenges in design, deployment, and performance of ad hoc: 1. Medium access scheme; 2. Routing and multicasting; 3. Transport layer protocol; 4. Quality of service provisioning; 5. Self Organizing 6. Security; 7. Energy management; 8. Addressing and service discovery; 9. Scalability; 10. Deployment considerations. Note! no good solutions for these challenges.
  • 7. mode of operation Ad hoc networks are basically peer-to-peer multi-hop mobile wireless networks where information packets are transmitted in a store-and-forward manner from a source to an arbitrary destination, via intermediate nodes as shown in Figure Symmetric and asymmetric are related to radio range: some protocols concentrate on sy……
  • 8. As the MHs move, the resulting change in network topology must be made known to the other nodes so that outdated topology information can be updated or removed. For example, as the MH2 in the above Figure changes its point of attachment from MH3 to MH4 other nodes part of the network should use this new route to forward packets to MH2.
  • 9. Important characteristics of a MANET • Dynamic Topologies : nodes move randomly with different speeds, network topology changes • Energy-constrained Operation: nodes also involve in network management, system and applications be designed to save the energy • Limited Bandwidth: Transmission rate is low • Security Threats: Mobile wireless networks are generally more prone to physical security threats than fixed-cable nets. Security services be designed carefully
  • 10. The Communication Puzzle • There are different types of wireless networks with different transmission speeds and ranges • Personal Area Network (PAN)personal objects • Local Area Network(LAN) single building or campus • Metropolitan Area Networks (MAN) towns and cities • Wide Area Network (WAN) states, countries, continents • Regional Area Network (RAN) to provide coverage ranges in the order of tens of kilometers with applications in rural and remote areas All these are differed by the physical distance that the network spans
  • 11. LAN, MAN and WAN were originally started as wired network, PANs and RANs, on the other hand, have been introduced with wireless connectivity in mind • Figure below compares various wireless networks in terms of the popular standards, speeds, communication ranges and applications
  • 12. • ad hoc networks are mostly within the framework of Wireless LANs and Wireless PANs, a lot of movement is currently undergoing as to integrate ad hoc networks with MANs and WWANs • With this it would be easy to connect the ad hoc network with the outside world (e.g., Internet) • While the mobile devices are equipped with dual mode and dual band radio frequencies , heterogeneous networks will become more and more common and the need to integrate them will be of paramount importance
  • 13. Applications of MANETs Day-to-day applications like email and file transfer can be easily deployable within an ad hoc network environment Web Services: can also be implemented with ad hoc networks, where any node in the network can serve as a gateway to the outside world. Military Applications: Ad Hoc networks were developed by keeping in mind military applications. Infrastructure network is almost impossible to establish or maintain in the battle field in an unknown region. The ad hoc networks having self- organizing capability can be effectively used in these situations. Crisis Management: In case of crisis management, infrastructure may be destroyed, in such cases ad hoc networks are useful. Personal Area Networking: managing personal things like printers, cell phones, PDAs, laptops, headsets, and so on. (ad hoc network can be replaced with bluetooth)
  • 14. Challenges: • Active research is going on in Adhoc, several aspects have been explored, many problems have been arisen, still some issues to be addressed. • Major challenges are: 1.Scalability; 2.Quality of service; 3.Client server model shift; 4.Security; 5.Interoperation with the Internet; 6.Energy conservation; 7.Node cooperation; 8.Interoperation.
  • 15. Scalability • Ad hoc networks suffer, by nature, from the scalability problems in capacity. • In a non-cooperative network, where omni-directional antennas are being used, the through put per node decreases at a rate 1/(sqrt(N)),where N is the number of nodes. • That is, in a network with100 nodes, a single device gets, at most, approximately one tenth of the theoretical network data rate. The problem fixed with bi directional antennas • As the network size increases the problems like Route acquisition, service location and encryption key exchanges need to be solved.
  • 16. Quality of Service • There are many applications for transfer of Voice, live video, and file transfer. • QoS parameters such as delay, jitter, bandwidth, Packet loss probability, and so on need to be addressed carefully. • Issues of QoS robustness, QoS routing policies, algorithms and protocols with multiple, including preemptive, priorities remain to be addressed.
  • 17. Client-Server Model Shift • Address allocation, name resolution, authentication and the Service location are just examples of the very basic services which are done by the servers but in ad hoc some nodes do all these and their location in the network is unknown and possibly even changing over time. • The issue of shift from the traditional client-sever model remains to be appropriately addressed
  • 18. Security • Lack of any centralized network management or certification authority makes these dynamically changing wireless structures leads security threats like infiltration, eavesdropping, interference, and so on. • Security is indeed one of the most difficult problems to be solved, but it has received only modest attention so far
  • 19. Interoperation with the Internet • It seems very likely that the most common applications of adhoc networks require some Internet connection.
  • 20. Energy Conservation • There are two primary research topics: maximization of life time of a single node and maximization of the life time of the whole network. • These goals can be achieved either by developing better batteries, or by making the network terminals‘ operation more energy efficient. • The first approach is likely to give a 40% increase in battery life, remaining 60% can be achieved though the design of energy efficient protocols design