Professional Documents
Culture Documents
•Introduction:
Wireless networking stands out as the rapidly expanding and most pervasive technology
within the realm of communications. It entails the transmission of information from one
location to another without the need for physical connections like wires or cables.
In communication systems, information typically travels from a transmitter to a receiver
within a confined range. Wireless communication revolutionizes this by enabling transmitters
and receivers to be positioned anywhere, ranging from a few meters (as seen in TV remote
controls) to spanning thousands of kilometres (as in satellite communications).
1.MANET
An ad hoc network like MANET, which stands for Mobile Ad Hoc Network, is also referred
to as a wireless ad-hoc network or ad-hoc wireless network. It operates through a self-
connecting process and seeks out a conversational environment. This network is
characterized by a multitude of mobile devices that connect wirelessly in a self-configuring
and self-adjusting manner, obviating the need for permanent installations . Due to the
frequent changes in network topology, wireless sensor nodes have the freedom to move in an
unrestricted and random manner. Each node within the network acts as a router, facilitating
the routing of traffic to different parts of the network.
2.VANET
Vehicle Ad Hoc Network (VANET) comprises a cluster of vehicles or stations linked through
a wireless network. Initially, VANETs were primarily designed to enhance safety and
convenience for drivers in traffic settings. However, this perception has evolved. Presently,
VANETs are recognized as the backbone of intelligent transportation systems, facilitating the
advancement of autonomous vehicles and supporting businesses that rely on network
connectivity within smart cities. Moreover, VANETs enable computers in stationary vehicles,
like those in airport parking lots, to transform into mobile computing resources with minimal
reliance on internet infrastructure.
3.WSN
Wireless Sensor Network (WSN) is a wireless network that operates without the need for
wired connections. It involves the temporary deployment of numerous wireless sensors to
monitor various systems, the human body, or the surrounding environment.
WSNs utilize sensor nodes equipped with embedded processors to oversee and manage the
conditions within a specific area. These nodes establish connections with the base station,
which functions within the WSN system. Stations within the WSN are also capable of
connecting to the Internet for the purpose of sharing data.
• Limited Processing and Storage Capabilities: Sensor nodes in WSNs are typically compact
with constrained processing and storage capabilities. This limitation hinders the execution of
complex tasks or the storage of large volumes of data.
• Heterogeneity: WSNs commonly incorporate diverse sensor types and nodes with varying
functionalities. This diversity complicates the task of ensuring effective and efficient network
operation.
• Security: WSNs are susceptible to various forms of attacks, including eavesdropping,
jamming, and spoofing. Ensuring robust security for both the network and the stored
information is a formidable challenge.
• Scalability: WSNs must have the capacity to accommodate numerous sensor nodes and
manage substantial data volumes. Guaranteeing that networks can scale to meet this demand
presents a significant challenge.
• Interference: WSNs are often deployed in environments with interference from numerous
other wireless devices. This interference can impede seamless communication between sensor
nodes.
2. Limited Processing Power: WSNs utilize low-power devices that may have restricted
processing capabilities and memory. This can hinder the execution of complex computations
or the support of advanced applications.
3. Data Security: WSNs are susceptible to security risks like eavesdropping, tampering, and
denial of service attacks. These threats can potentially compromise sensitive data, justice, and
other critical matters.
5. Challenges: Deploying WSNs can be a complex process, involving tasks such as proper
sensor placement, effective power management, and network configuration. This can demand
a significant investment of time and resources.
It's important to recognize that while wireless sensor networks offer numerous advantages,
they also come with limitations and potential issues that must be taken into account during
their actual deployment and utilization.
IMANET
The Internet-based mobile private network (IMANET) supports standard Internet protocols
like TCP/IP (Transmission Control Protocol/Internet Protocol) and User Datagram Protocol
(UDP). IMANET employs the TCP/IP network layer routing protocol on all connected
devices, allowing them to reach mobile nodes and configure distributed routing
automatically. Additionally, IMANET can be utilized for gathering sensor data in various
applications, including weather monitoring.
SPAN
Smartphone private networks utilize pre-existing hardware (e.g., Wi-Fi and Bluetooth) and
software protocols integrated into the smartphone's operating system (OS) to establish a peer-
to-peer (P2P) network. This is achieved without dependence on mobile phones, wireless
access points, or other conventional network devices. Unlike conventional hub-and-spoke
networks like Wi-Fi Direct, SPAN supports multi-hop relays. Multi-hop relaying enables
traffic to be sent from device A to device C via an intermediary device B. Consequently,
devices A and C do not need to establish a direct P2P connection in order to communicate
with each other. Since SPAN operates in a completely dynamic manner, participants can join
or leave the network without disrupting its functionality, as there is no group leader within the
application.
WMN
A wireless mesh network (WMN) is composed of radio networks arranged in a specific
network topology, typically consisting of network clients, network routers, and routing tables.
In a mesh network, devices (or nodes) are interconnected to ensure that at least some, if not
all, devices have multiple pathways to other nodes. This results in numerous information
routes between pairs of users, thereby enhancing the network's resilience in the event of a
node or link failure. WMN finds utility in scenarios necessitating a temporary wireless
network or in more permanent situations where laying network cables for an infrastructure-
based wireless network is impractical.
ODMRP
The Optional Multicast Routing Protocol (ODMRP) is a multicast routing protocol designed
for ad-hoc networks featuring mobile hosts. Unlike tree-based multicast schemes, ODMRP
employs a network-based multicast approach. It introduces the concept of group routing,
where only a group of nodes forwards multicast packets originating from various flood
sources. ODMRP incorporates optional methods to optimize routing and manage multicast
group membership. It proves particularly well-suited for ad-hoc wireless networks with
mobile hosts characterized by limited bandwidth, frequent and rapid topology changes, and
constrained power resources.
Fig: ODMRP
ADMR
ADMR, which stands for Adaptive Demand-Driven Multicast Routing Protocol, introduces a
novel demand-driven approach to network multicast routing. This approach effectively
minimizes the dissemination of unwanted content. The multicast routing state is dynamically
generated and managed exclusively for active groups and nodes situated between multicast
senders and receivers. Every multicast packet is transmitted from the sender to the receiver
along the path with the shortest delay, as determined by the multicast routing state.
Furthermore, the receiver dynamically adjusts to the sender's mode, thereby striking a
balance between overhead and ensuring the upkeep of the multicast routing state, even as
conditions in the network undergo changes.
Fig: ADMR
2. Cooperative Work: In commercial settings, the need for collaborative computing outside
the office environment is crucial. People often require meetings outside the office to
exchange information and collaborate on assigned tasks.
4. Personal Area Networks (PAN) and Bluetooth: PANs are localized, small-range networks
consisting of devices typically owned by a single individual. Limited-range MANETs like
Bluetooth simplify communication between various portable devices such as laptops and cell
phones.
5. Business Sector: Ad-hoc networks are invaluable in rescue and emergency operations,
particularly in natural disasters like floods, fires, or earthquakes. They are crucial in situations
where the existing communication infrastructure is damaged or nonexistent, requiring a rapid
deployment of a new communication network.
6. Sensor Networks: Ad-Hoc networks are used for managing home appliances both in close
proximity and remotely. They can monitor live elements and gather weather-related data.
7. Backup Services: Ad-Hoc networks provide independent operation, recovery, diagnosis, or
replacement of cases or records in fixed systems.
3. Durability: The network must address various challenges, such as weak radio connections
(e.g., during snowfall) or hardware malfunctions.
4. Flexibility: Users should have the ability to swiftly add, relocate, or remove fields as per
the application's needs.
Industrial Control:
With the advancements in wireless communications, microelectronics, digital electronics, and
communication technology, experts are actively researching the development of well-
controlled electronic systems due to the high integration of electronic products.
Smart Buildings:
Wireless Sensor Networks (WSNs) play a pivotal role in realizing smart buildings, serving as
valuable tools to enhance residential environments for various applications.
Military Applications:
WSNs are composed of numerous compact sensor nodes, which not only cost less but also
offer increased versatility. Given the constant threat of enemy attacks and security concerns
in military operations, employing smaller, cost-effective packages more frequently can help
mitigate losses.
The provided diagram illustrates a wireless sensor network designed for military purposes.
This application deploys sensors tailored for top-secret missions. These sensors are capable of
detecting and classifying objects, distinguishing between armoured vehicles and pedestrians,
and identifying the type of weapons they carry. This information is processed in real-time,
providing crucial insights and a clearer situational understanding for combat scenarios.
Usages of Ad-Hoc Networks:
1. Military: Ad hoc networks provide a means for the military to establish communication
among soldiers, vehicles, and headquarters in the field.
2. Personal Area Network (PAN): A PAN is a local network with a short range, where each
node is typically within a limited distance of one another.
3. Crisis Conditions: Ad hoc networks are easily deployable in times of crisis to send
emergency signals and facilitate communication.
4. Medical Applications: They can be utilized to monitor patients in healthcare settings.
5. Environmental Applications: Ad hoc networks find use in monitoring weather conditions,
forest fires, tsunamis, and similar environmental events.
4. Security Advantages: The impromptu nature of ad hoc networks can make them less
susceptible to certain types of security threats.
2. Scalability Issues: Ad hoc networks do not scale well. As the number of devices on the
network increases, management becomes more challenging because there is often no central
device to oversee all traffic. This can lead to wireless interference and reduced performance.
4. Lack of Network Infrastructure Services: Security options are limited in ad hoc networks
due to the absence of network infrastructure services, such as access to a RADIUS (remote
authentication dial-in user service) server for 802.1x authentication purposes.
5. SSID Broadcast Mode: Devices on ad hoc networks cannot disable SSID broadcast mode,
making them more vulnerable to attackers within signal range.
6. Internet Connectivity: Devices in an ad hoc network can only access the internet if one of
them is connected to it and sharing the connection. This is commonly done using a cellular-
connected smartphone in "hotspot" mode. However, this may lead to performance issues,
especially with a large number of interconnected devices.
7. Resource Intensiveness: Ad hoc mode requires more endpoint system resources, as the
physical network layout changes when devices are moved around. In contrast, an access point
in infrastructure mode typically remains stationary from an endpoint perspective.
In its most basic form, "ad-hoc networking" signifies the capacity of network members to
establish connections between devices. However, this capacity represents a broader social
phenomenon, as specialized organizations are embodiments of social structure and
organization. Achieving self-organization necessitates a community of individuals who share
software and hardware while adhering to standards, controls, and policies.
This article delves into the origin and evolution of "personal collaboration," introducing the
concept and its implications in computer science and social science. It further scrutinizes
current paradigms in technology development and application. Additionally, we delve into the
significance and implementation of integration, addressing challenges and constraints related
to access, maintenance, participation, and exclusion. Finally, we highlight how "ad hoc"
networks synergize with other technologies, offering novel social, economic, and political
opportunities for self-organization, including communication during emergencies, impromptu
transactions, and Decentralized Autonomous Organizations (DAOs).
A concise overview of the history and backdrop of self-organization reveals laws shaped by
societal norms, political necessities, and the aspiration for individual participation. This
demonstrates how the progression of network technologies is entwined with sociopolitical
dynamics, influencing the way people leverage technology and media for innovative
purposes.