Documente Academic
Documente Profesional
Documente Cultură
network
Applications
The decentralized nature of wireless ad-
hoc networks makes them suitable for a
variety of applications where central nodes
can't be relied on and may improve the
scalability of networks compared to
wireless managed networks, though
theoretical and practical limits to the
overall capacity of such networks have
been identified. Minimal configuration and
quick deployment make ad hoc networks
suitable for emergency situations like
natural disasters or military conflicts. The
presence of dynamic and adaptive routing
protocols enables ad hoc networks to be
formed quickly. Wireless ad-hoc networks
can be further classified by their
applications:
Challenges
Several books[3][39] and works have
revealed the technical and research
challenges[40][41] facing wireless ad hoc
networks or MANETs. The advantages and
challenges (cons) can be briefly
summarized below:
Advantages
Disadvantages
Protocol stack
The challenges[3][43] affecting MANETs
span from various layers of the OSI
protocol stack. The media access layer
(MAC) has to be improved to resolve
collisions and hidden terminal problems.
The network layer routing protocol has to
be improved to resolve dynamically
changing network topologies and broken
routes. The transport layer protocol has to
be improved to handle lost or broken
connections. The session layer protocol
has to deal with discovery of servers and
services.
Routing
Routing[45] in wireless ad hoc networks or
MANETs generally falls into three
categories, namely: (a) proactive routing,
(b) reacting routing, and (c) hybrid routing.
Proactive routing
Reactive routing
Flooding
Hybrid routing
Position-based routing
Medium-access control
In most wireless ad hoc networks, the
nodes compete for access to shared
wireless medium, often resulting in
collisions (interference).[49] Collisions can
be handled using centralized scheduling or
distributed contention access
protocols.[49] Using cooperative wireless
communications improves immunity to
interference by having the destination
node combine self-interference and other-
node interference to improve decoding of
the desired signals.
Software reprogramming
Large-scale ad hoc wireless networks may
be deployed for long periods of time.
During this time the requirements from the
network or the environment in which the
nodes are deployed may change. This can
require modifying the application
executing on the sensor nodes, or
providing the application with a different
set of parameters. It may be very difficult
to manually reprogram the nodes because
of the scale (possibly hundreds of nodes)
and the embedded nature of the
deployment, since the nodes may be
located in places that are difficult to
access physically. Therefore, the most
relevant form of reprogramming is remote
multihop reprogramming using the wireless
medium which reprograms the nodes as
they are embedded in their sensing
environment. Specialized protocols have
been developed for the embedded nodes
which minimize the energy consumption
of the process as well as reaching the
entire network with high probability in as
short a time as possible.[44][50]
Mathematical models
The traditional model is the random
geometric graph. Early work included
simulating ad hoc mobile networks on
sparse and densely connected topologies.
Nodes are firstly scattered in a
constrained physical space randomly.
Each node then has a predefined fixed cell
size (radio range). A node is said to be
connected to another node if this neighbor
is within its radio range. Nodes are then
moved (migrated away) based on a
random model, using random walk or
brownian motion. Different mobility and
number of nodes present yield different
route length and hence different number of
multi-hops.
Security
Most wireless ad hoc networks do not
implement any network access control,
leaving these networks vulnerable to
resource consumption attacks where a
malicious node injects packets into the
network with the goal of depleting the
resources of the nodes relaying the
packets.[54]
Simulation
One key problem in wireless ad hoc
networks is foreseeing the variety of
possible situations that can occur. As a
result, modeling and simulation (M&S)
using extensive parameter sweeping and
what-if analysis becomes an extremely
important paradigm for use in ad hoc
networks. Traditional M&S tools include
OPNET, and NetSim.
See also
Independent basic service set (IBSS)
Mobile wireless sensor network
List of ad hoc routing protocols
Personal area network (PAN)
Wi-Fi Direct
Wireless mesh network
References
1. Toh, C. K. (1997). Wireless ATM & Ad
Hoc Networks, 1997, Kluwer Academic
Press . ISBN 9780792398226.
2. Chai Keong Toh Ad Hoc Mobile
Wireless Networks, Prentice Hall
Publishers, 2002. ISBN 978-0-13-
007817-9
3. C. Siva Ram Murthy and B. S. Manoj,
Ad hoc Wireless Networks:
Architectures and Protocols, Prentice
Hall PTR, May 2004. ISBN 978-0-13-
300706-0
4. Morteza M. Zanjireh; Hadi Larijani
(May 2015). A Survey on Centralised
and Distributed Clustering Routing
Algorithms for WSNs . IEEE 81st
Vehicular Technology Conference.
Glasgow, Scotland.
doi:10.1109/VTCSpring.2015.714565
0.
5. Morteza M. Zanjireh; Ali Shahrabi; Hadi
Larijani (2013). ANCH: A New
Clustering Algorithm for Wireless
Sensor Networks . 27th International
Conference on Advanced Information
Networking and Applications
Workshops. WAINA 2013.
doi:10.1109/WAINA.2013.242 .
6. Chai Keong Toh. Ad Hoc Mobile
Wireless Networks. United States:
Prentice Hall Publishers, 2002.
7. "Robert ("Bob") Elliot Kahn" . A.M.
Turing Award. Association for
Computing Machinery.
8. J. Burchfiel; R. Tomlinson; M. Beeler
(May 1975). Functions and structure
of a packet radio station (PDF).
National Computer Conference and
Exhibition. pp. 245–251.
doi:10.1145/1499949.1499989 .
9. Beyer, Dave (October 1990).
"Accomplishments of the DARPA
SURAN Program - IEEE Conference
Publication" . ieeexplore.ieee.org.
Retrieved 2017-10-15.
10. American Radio Relay League. "ARRL's
VHF Digital Handbook", p 1-2,
American Radio Relay League,2008
11. Chai Keong Toh Associativity-Based
Routing for Ad Hoc Mobile Networks,
Wireless Personal Communications
Journal, 1997.
12. Chai Keong Toh IETF MANET DRAFT:
Long-lived Ad Hoc Routing based on
the Concept of Associativity
13. "Experimenting with an Ad Hoc
Wireless Network on Campus: Insights
& Experiences", ACM SIGMETRICS
Performance Evaluation Review, Vol.
28, No. 3, 2001" .
14. Toh, Chai K. (2001-12-03).
"Implementation of Ad Hoc Mobile
Networks", Chapter 7 of BOOK: Ad Hoc
Mobile Wireless Networks, Prentice
Hall, 2001, ISBN 0-13-007817-4 .
ISBN 9780132442046.
15. "AODV Implementation Design and
Performance Evaluation" by Ian D.
Chakeres
16. The Dynamic Source Routing Protocol
(DSR) for Mobile Ad Hoc Networks for
IPv4
17. "Ad Hoc Mobile Wireless
Networks:Protocols and Systems,
2001" .
18. "Spontaneous Networking by Laura
Feeney, IEEE Communications, 2001".
CiteSeerX 10.1.1.960.8621 .
19. "MultipeerConnectivity from Apple" .
20. "How an Underappreciated iOS 7
Feature Will Change the World by Mike
Elgan" . 2014-03-22.
21. " "Everyone is a node: How Wi-Fi Mesh
Networking Works by Jerry
Hildenbrand, 2016" . 2016-10-13.
22. "Apple's AirPort in the age of mesh
networking by Rene Ritchie, 2016" .
2016-10-17.
23. "Soldier Link System (SLS) using Ad
hoc networks by Northrop Grumman" .
24. "DARPA Hopping Mines using Ad Hoc
Networking Technology" .
25. "The future is here: Five applications of
UAV technology" . 2013-12-06.
26. "U.S. Air Force Chief Scientist: Stealth
Drones and Killer Swarms Could Be
Coming Soon" . 2017-02-23.
27. "We connect your naval forces by
Rohde & schwartz" (PDF).
28. "The first fully mobile, cross-platform
ad hoc IP network utilizing legacy
radio systems" .
29. "A Study on Smart Dust Networks,
Linkoping University, 2011" .
30. "Mesh Networking, the Critical Open
Sesame for Smart Lighting Success,
2016" .
31. "Smart Street Lights Wireless Mesh
Networks" ., Telensa, UK
32. "Smart Street Lights from Maven" .
33. "Protocols and Applications of Ad-hoc
Robot Wireless Communication
Networks: An Overview" (PDF).
34. "Ad-hoc Wireless Network Coverage
with Networked Robots that cannot
Localize, 2009" (PDF).
35. "GoTenna Militrary-Grade Mesh
Networking" (PDF).
36. "GoTenna Pro meshing radio aspires
to deploy next to rescue, fire and
security teams" .
37. Bader, Roland; Pinto, Michele;
Spenrath, Felix; Wollmann, Philipp;
Kargl, Frank (2006). "BigNurse: A
Wireless Ad Hoc Network for Patient
Monitoring". BigNurse: A Wireless Ad
Hoc Network for Patient Monitoring,
2006. pp. 1–4.
CiteSeerX 10.1.1.397.7540 .
doi:10.1109/PCTHEALTH.2006.36169
1 . ISBN 978-1-4244-1085-9.
38. Toshiyo Tamura; Takahiro Kawada;
Masaki Sekine (2007). "The home
health care with the ad-hoc network
system". The home health care with
the ad-hoc network system, 2007.
pp. 307–310.
doi:10.1109/SICE.2007.4420997 .
ISBN 978-4-907764-27-2.
39. Toh, C. K. (1997). Wireless ATM & Ad
Hoc Networks, 1997, Kluwer Academic
Press . ISBN 9780792398226.
40. "Research Challenges for Ad hoc
mobile wireless networks, University of
Essex, 2005" .
41. "An Overview of Mobile Ad Hoc
Networks: Applications and
Challenges" (PDF).
42. "Making Sense on what's happening
on Wi-Fi" .
43. Toh, C. K. (1997). Wireless ATM & Ad
Hoc Networks, 1997, Kluwer Academic
Press . ISBN 9780792398226.
44. Panta, Rajesh Krishna; Bagchi,
Saurabh; Midkiff, Samuel P. (February
2011). "Efficient Incremental Code
Update for Sensor Networks". ACM
Transactions on Sensor Networks. 7
(4): 30:1–30:32.
doi:10.1145/1921621.1921624 .
ISSN 1550-4859 .
45. Royer, E.M.; Chai-Keong Toh (1999). "A
review of current routing protocols for
ad hoc mobile wireless networks by
EM Royer, CK Toh in IEEE Personal
Communications, 1999". IEEE
Personal Communications. 6 (2): 46–
55. CiteSeerX 10.1.1.11.8637 .
doi:10.1109/98.760423 .
46. C. Perkins, E. Royer and S. Das: Ad hoc
On-demand Distance Vector (AODV)
Routing, RFC 3561
47. Roger Wattenhofer. Algorithms for Ad
Hoc Networks.
48. Wu S.L., Tseng Y.C., "Wireless Ad Hoc
Networking, Auerbach Publications",
2007 ISBN 978-0-8493-9254-2
49. Guowang Miao; Guocong Song (2014).
Energy and spectrum efficient wireless
network design. Cambridge University
Press. ISBN 978-1107039889.
50. Hui, Jonathan W.; Culler, David (2004).
The Dynamic Behavior of a Data
Dissemination Protocol for Network
Programming at Scale. Proceedings of
the 2nd International Conference on
Embedded Networked Sensor
Systems. SenSys '04. New York, NY,
USA: ACM. pp. 81–94.
CiteSeerX 10.1.1.379.9058 .
doi:10.1145/1031495.1031506 .
ISBN 978-1581138795.
51. M.D. Penrose (2016). "Connectivity of
Soft Random Geometric Graphs". The
Annals of Applied Probability. 26 (2):
986–1028. arXiv:1311.3897 .
doi:10.1214/15-AAP1110 .
52. A.P. Giles; O. Georgiou; C.P. Dettmann
(2015). Betweenness Centrality in
Dense Random Geometric Networks.
2015 IEEE International Conference on
Communications (ICC). pp. 6450–
6455. arXiv:1410.8521 .
doi:10.1109/ICC.2015.7249352 .
ISBN 978-1-4673-6432-4.
53. M.D. Penrose (2003). "Random
Geometric Graphs". Oxford University
Press.
54. Stajano, Frank; Anderson, Ross (2000).
"The Resurrecting Duckling: Security
Issues for Ad-hoc Wireless Networks".
The Resurrecting Duckling: Security
Issues for Ad-hoc Wireless Networks
by Stajano and Anderson, International
Workshop on Security Protocols, 1999.
Lecture Notes in Computer Science.
1796. pp. 172–182.
CiteSeerX 10.1.1.13.1450 .
doi:10.1007/10720107_24 . ISBN 978-
3-540-67381-1.
55. Sencun Zhu; Shouhuai Xu; Sanjeev
Setia; Sushil Jajodia (2003). 23rd
International Conference on
Distributed Computing Systems
Workshops, 2003. Proceedings (PDF).
pp. 749–755.
CiteSeerX 10.1.1.11.4621 .
doi:10.1109/ICDCSW.2003.1203642 .
ISBN 978-0-7695-1921-0.
Retrieved from
"https://en.wikipedia.org/w/index.php?
title=Wireless_ad_hoc_network&oldid=910117282"