Unit 1
Unit 1
Unit 1
Year :2015-2016
IV Year B.Tech (CSE) II Sem
Text Books:
1. Ad Hoc and Sensor Networks Theory and Applications, Carlos Corderio
Dharma P.Aggarwal, World Scientific Publications, March 2006, ISBN 981
- 256-681-3
2.Wireless Sensor Networks: An Information Processing Approach,
Feng Zhao, Leonidas Guibas, Elsevier Science, ISBN 978-1-55860914-3 ( Morgan Kauffman)
Table of Contents
Chapters:
1. Introduction
2. Routing in Ad hoc Networks
3. Broadcasting, Multicasting and Geocasting
4. Wireless LANs
5. Wireless PANs
6. Directional Antenna Systems
7. TCP over Ad Hoc Networks
8. Wireless Sensor Networks
9. Data Retrieval in Sensor Networks
10.Security
11. Integrating
MANETs,
Networks
WLANs
and
Cellular
Chapter 1: Introduction
Introduction
The Communication Puzzle
Applications of MANETs
Challenges
Scalability
Quality of Service
Client-Server Model Shift
Security
Interoperation with the Internet
Energy Conservation
Node (MH) Cooperation
Interoperation
Book Organization
Conclusions and Future Directions
Homework Questions/Simulation Projects
References
MH2
MH2
MH4
Asymmetric link
MH3
MH5
MH7
Symmetric link
MH1
MH6
Characteristics of a MANET
Characteristic Description
Dynamic
Topologies
Nodes are free to move arbitrarily with different speeds; thus, the
network topology may change randomly and at unpredictable times.
Energy- constrained
Operation
Some or all of the nodes in an ad hoc network may rely on batteries or other
exhaustible means for their energy. For these nodes, the most important system
design optimization criteria may be energy conservation.
Limited Bandwidth
Security
Mobile wireless networks are generally more prone to physical security threats than
fixed-cable nets. The increased possibility of eavesdropping, spoofing, and
minimization of denial-of-service type attacks should be carefully considered.
Threats
Applications of MANETs
Collaborative Work
Crisis-management Applications
Nodes could be attached to someones cell phone, pulse watch, belt, etc.
Bluetooth is an example
Eliminates need of wires between devices such as printers, cell phones, PDAs, laptop
computers, headsets, etc.
IEEE 802.15 standard working group
N
Short-range Throughput per node decreases at at a rate 1/
, where N is
the number of nodes
This cannot be fixed except by physical layer improvements, such as directional
antennas
Quality of service
Need to provide best-effort service only for Voice, live video and file transfer
Client server model shift
There is no server, but demand for basic services still exists.
Address allocation, name resolution, authentication and service location are just
examples of very basic services which are needed
Security
Lack of any centralized network management or certification authority
Networks are particularly prone to malicious behavior
Interoperation with the Internet
Networks require some Internet connection
Interface between the two are very different
Energy conservation
Lifetime of a single battery and the whole network.
Node cooperation
Why anyone should relay other peoples data
Interoperation
What happens when two autonomous ad hoc networks move into same area
Book Organization
LL
MA
A
CN
Tr
P
p
et
a
h
p
w
Lin
n
ys
li
Dat
or
k
s
icc
ak
p
ala
or
ti
t
o
n
All chapters
Chapters 7,
9 and 11
Chapters 2, 3, 6,
8, 9, 10,and 11
Chapters 4, 5, 6,
8, 9, and 11
Chapters 4,
5, 6, and 11