Ad Hoc Unit - 1
Ad Hoc Unit - 1
Ad Hoc Unit - 1
An ad hoc wireless network is a temporary network that is created when two or more
wireless devices come within range of each other. These devices can then
communicate with each other directly, without the need for a central access point. Ad
hoc networks are often used in situations where there is no existing infrastructure, or
where the infrastructure is damaged or unavailable.
Ad hoc networks are self-organizing and self-healing, meaning that they can
automatically configure themselves and repair themselves if a node is lost. They are
also decentralized, meaning that there is no single point of failure. This makes them
very resilient and scalable.
• Sensor networks: Ad hoc networks are often used to collect data from sensors in
remote locations.
• Emergency communications: Ad hoc networks can be used to provide
communication in the aftermath of a disaster.
• Military applications: Ad hoc networks can be used to share data between soldiers
on the battlefield.
• Gaming: Ad hoc networks can be used to connect gaming consoles together.
• Limited range: Ad hoc networks typically have a limited range, as each node can
only communicate with nodes that are within its range.
• Security: Ad hoc networks are more vulnerable to security attacks than traditional
wireless networks.
• Power consumption: Ad hoc networks can consume more power than traditional
wireless networks, as each node must act as a router.
Despite these disadvantages, ad hoc networks are a valuable technology with a wide
range of applications. As wireless technology continues to develop, ad hoc networks
are likely to become even more common and widely used.
Dynamic topology:
Ad hoc networks are dynamic in nature, meaning that the network topology can
change frequently as nodes join, leave, or move around. This makes routing a
challenge in ad hoc networks, as the routes must be constantly updated to reflect the
changes in the network topology.
Ad hoc networks are self-organizing and self-healing, meaning that they can
automatically configure themselves and repair themselves if a node is lost or
becomes unavailable. This is due to the distributed nature of ad hoc networks, where
each node is responsible for routing its own traffic and maintaining the network
connectivity.
• Decentralized:
Ad hoc networks are decentralized, meaning that there is no single point of failure.
This makes them very resilient, as the network can continue to operate even if some
nodes become unavailable.
• Scalable:
Ad hoc networks are scalable, meaning that they can easily be expanded to
accommodate new nodes. This makes them well-suited for applications where the
number of nodes can vary, such as sensor networks and emergency
communications.
• Limited range:
Ad hoc networks typically have a limited range, as each node can only communicate
with nodes that are within its range. This can be a limitation for applications that
require large-scale coverage.
• Security:
Ad hoc networks are more vulnerable to security attacks than traditional wireless
networks. This is due to the open nature of ad hoc networks, where nodes can join
and leave the network freely.
• Power consumption:
Ad hoc networks can consume more power than traditional wireless networks, as
each node must act as a router. This can be a limitation for battery-powered devices.
The hidden node problem occurs when two nodes within a network are unable to
communicate directly with each other due to the presence of an intermediate node
that blocks their transmissions. This can result in data collisions and packet loss,
hindering network performance.
To mitigate the hidden node problem, techniques such as carrier sensing multiple
access (CSMA) and request-to-send/clear-to-send (RTS/CTS) are employed. CSMA
requires nodes to listen for transmissions before initiating their own, while RTS/CTS
involves exchanging control signals to coordinate transmissions and avoid collisions.
Exposed Node Problem
The exposed node problem arises when a node successfully transmits data to a
destination node, but the transmission cannot be directly heard by another node that
is also within range of the destination. This exposed node may attempt to transmit
simultaneously, leading to interference and packet loss.
To address the exposed node problem, mechanisms such as virtual carrier sensing
(VCS) and network allocation vector (NAV) are implemented. VCS extends the
carrier sensing range to include the exposed node, while NAV ensures that the
exposed node refrains from transmitting during the ongoing transmission.
Routing Challenges
In AWNs, routing is a crucial task as nodes continuously join, leave, and move
around, making the network topology dynamic and unpredictable. Traditional routing
protocols may not be well-suited for such dynamic environments, leading to routing
inefficiencies and packet delivery issues.
Several routing protocols have been specifically designed for AWNs, such as Ad hoc
On-demand Distance Vector (AODV) and Dynamic Source Routing (DSR). These
protocols adapt to the dynamic nature of AWNs and maintain efficient routing paths
for data delivery.
Security Vulnerabilities
Due to their decentralized and open nature, AWNs are more susceptible to security
attacks compared to traditional infrastructure-based networks. Attacks such as
eavesdropping, man-in-the-middle attacks, and denial-of-service attacks can
compromise the confidentiality, integrity, and availability of data in AWNs.
Power-aware protocols and techniques, such as duty cycling and low-power modes,
can help reduce power consumption and extend the network's operational time.
Scalability Limitations
Ad hoc networks are self-organizing and self-healing, meaning that they can
automatically configure themselves and repair themselves if a node is lost. They are
also decentralized, meaning that there is no single point of failure. This makes them
very resilient and scalable.
• Sensor networks: Ad hoc networks are often used to collect data from sensors in
remote locations.
• Emergency communications: Ad hoc networks can be used to provide
communication in the aftermath of a disaster.
• Military applications: Ad hoc networks can be used to share data between soldiers
on the battlefield.
• Gaming: Ad hoc networks can be used to connect gaming consoles together.
• Limited range: Ad hoc networks typically have a limited range, as each node can
only communicate with nodes that are within its range.
• Security: Ad hoc networks are more vulnerable to security attacks than traditional
wireless networks.
• Power consumption: Ad hoc networks can consume more power than traditional
wireless networks, as each node must act as a router.
Cellular networks are the most common type of wireless network, and they are used
for a variety of applications, including mobile phone calls, text messaging, and
internet access. They are also used for some more specialized applications, such as
machine-to-machine (M2M) communication and emergency services.
Fixed No fixed
Infrastructure
infrastructure infrastructure
Centrally
Routing Distributed
controlled
Mobility High High
Emergency communications
Disaster relief
Underwater communications
Vehicular networks
characteristics of MANETS
1. Dynamic Topology:
dynamic topology in MANET
The nodes in a MANET are constantly moving, causing the network topology
to change frequently. This dynamic nature necessitates routing protocols that
can adapt to the ever-changing connectivity patterns.
2. Distributed Operation:
3. Multi-hop Routing:
4. Limited Resources:
5. Security Vulnerabilities:
The open nature of wireless communication and the lack of centralized control
make MANETs susceptible to various security attacks, such as denial-of-
service attacks, eavesdropping, and impersonation.
6. Bandwidth Constraints:
bandwidth constraints in MANET
The shared wireless medium and unpredictable network topology can lead to
bandwidth limitations and congestion issues. Careful resource management
and interference mitigation techniques are crucial for ensuring efficient
communication in MANETs.
Applications of MANETS
1. Battlefield Communication:
2. Disaster Relief:
3. Vehicular Networks:
4. Sensor Networks:
sensor networks MANET
5. Community Networking:
6. Underwater Communication:
underwater communication MANET
7. Wearable Devices:
Dynamic Topology:
Limited Bandwidth:
Energy Constraints:
Mobile devices typically have limited battery power, which poses a significant
challenge for MANETs. Energy-efficient routing protocols and power-saving
mechanisms are essential to extend the network lifetime and ensure the
longevity of devices.
Security Vulnerabilities:
The open nature of wireless communication and the lack of centralized control
make MANETs susceptible to various security attacks, such as denial-of-
service attacks, eavesdropping, and impersonation. Robust security protocols
and authentication mechanisms are necessary to protect the network from
malicious activities.
Scalability:
Scalability in Manet
share
In the hidden terminal problem, a transmitter (Tx) is not within the direct range
of a receiver (Rx), but it is within the range of another node (H) that can hear
its transmissions. The receiver (Rx) is also within the range of the hidden node
(H), but it cannot hear its transmissions due to signal attenuation. When the
hidden node (H) also starts transmitting, its signal collides with the
transmitter's (Tx) signal, causing interference at the receiver (Rx).
3. Power Consumption:
4. Scalability:
Scalability in MANET
MANETs can grow to include a large number of devices, and MAC protocols
need to be scalable to handle the increasing traffic and network complexity.
Efficient routing protocols and resource management techniques are essential
to maintain performance as the network grows.
MAC protocols like MACA (Medium Access Control for Ad Hoc Networks) and
DBTMA (Distributed Binary Timed Medium Access) employ techniques like
Request-to-Send (RTS) and Clear-to-Send (CTS) to avoid collisions and
reduce the occurrence of hidden and exposed terminal problems.
Conclusion:
MANETs pose unique challenges for MAC protocols due to their dynamic
topology, limited resources, and lack of centralized control. Addressing these
challenges through innovative MAC protocol designs is crucial for the
advancement of MANET technology and its widespread adoption in various
applications.
2. Fairness: MAC protocols should ensure fair access to the channel for all
nodes, preventing any single node from dominating the channel.
3. Collision Avoidance: MAC protocols should employ mechanisms to avoid
collisions and ensure successful data transmission.
5. Power Efficiency: MAC protocols should minimize overhead and idle power
consumption to extend the network lifetime and conserve energy in battery-
powered devices.
b. CSMA (Carrier Sense Multiple Access): Nodes listen for the channel
before transmitting, reducing collisions.
a. TDMA (Time Division Multiple Access): Nodes are assigned time slots,
eliminating collisions.