You are on page 1of 17

Recent Applications and Development in Wireless ad hoc

and sensor network


The term "personal association" lacks a universally accepted definition. It pertains to the
capacity of network members to establish connections between devices. Interpersonal
collaboration holds significance in specific network structures as well as in the social,
political, and economic realms of supporting organizations. This necessitates the integration
of software and hardware to construct a peer-to-peer infrastructure facilitating access to
temporary information, along with processes for network structure and regulations. Over
time, these can evolve into regional shares. An example of a private network is an ad hoc
cryptocurrency business, such as a self-governing organization, that facilitates online and in-
person connections among people, information, and resources for a specific purpose.
Wireless Sensor Networks (WSN) encompass numerous physically dispersed electronic
devices employed for assessing and supervising physical and/or environmental conditions.
WSN employs gateways to furnish wireless connectivity to wired networks. There exist
several unresolved issues with ad hoc networks and their applications. By focusing on the
expansion of mobile networks, Ad-hoc networks are poised to underpin the fourth generation
of wireless technology, embodying the new paradigm of "communication anytime,
anywhere." The primary hurdle to surmount is ensuring the security, authorization, and
management of large wireless sensor networks.
This book provides a comprehensive overview of WSN, delving into various chapters
covering multi-channel wireless sensor networks, their coverage, connections, and
deployment. It also encompasses a comparative analysis of diverse communication protocols
and algorithms, such as MANNET, ODMRP, and ADMR protocols for ad-hoc multicast, as
well as token-based approaches like location-based unified routing protocols and group local
mutual classification algorithms. Additionally, the book addresses the Extended Ad-hoc
Optional Distance Vector (EAODV) routing protocol based on Decentralized Minimum
Transmission Multicast Routing (DMTMR). It dedicates one section to OCDMA and its
prospective applications, while another section is dedicated to the advancement of home
electronics using SWN.

•Introduction:
Wireless networking stands out as the rapidly expanding and most pervasive technology
within the realm of communications. It entails the transmission of information from one
location to another without the need for physical connections like wires or cables.
In communication systems, information typically travels from a transmitter to a receiver
within a confined range. Wireless communication revolutionizes this by enabling transmitters
and receivers to be positioned anywhere, ranging from a few meters (as seen in TV remote
controls) to spanning thousands of kilometres (as in satellite communications).

Our contemporary world is thoroughly steeped in communication, with wireless


communication constituting a fundamental facet of our daily lives. Devices like mobile
phones, GPS receivers, remote controls, Bluetooth audio, and WIFI have become integral
components of our routine interactions.
In terms of definition, a wireless ad hoc network (WANET) is an independent local area
network (LAN) that facilitates the interconnection of two or more wireless networks without
necessitating network infrastructure such as wireless routers or access points.

Ad-hoc Sensor Network


"Ad hoc" originates from the Latin term meaning "for this purpose." It signifies the ability of
network members to establish connections between devices. Personal collaboration
encompasses not only the technological dimension but also the social, political, and economic
aspects of personal organization. It adheres to standards of skills, management, and policy in
most contexts.
An ad-hoc network is self-contained and operates independently of pre-existing systems,
unless it connects to an external service like an Internet gateway. This characteristic typically
pertains to decentralized networks without a central controlling authority. Instead, peers
within the network serve as nodes, transmitting packets to one another.
To establish ad-hoc communications, a blend of software and hardware tools is necessary to
create a peer-to-peer infrastructure. Modern smartphone applications can facilitate ad hoc
communications through built-in Bluetooth or Wi-Fi features. This enables access to and
integration with new network architectures via digital infrastructure. Over time, these
architectures can evolve into regional shares.
An ad hoc network comprises multiple wireless autonomous hosts, where each host can act as
a router to forward traffic from other nodes. It encompasses various network scenarios,
including wireless ad hoc networks, sensors, mobile ad hoc networks, personal sites, and
rooftop/mesh networks. Sensors serve as monitoring stations, while specialized mobile
devices are occasionally used to connect laptops, PDAs, cell phones, or other devices in
problem-solving, communication, healthcare, educational, and military settings.
Rooftop/mesh networks furnish high-speed wireless network access to homes and offices.
Research in the domain of sensor networks encompasses topics like sensor deployment,
secure face placement within the sensor area, product localization, intelligent coordination
via decision-making on sensor placement, energy-efficient advertising and event handling,
routing strategies, connectivity, information gathering and dissemination, sensor-centric
routing quality, path accuracy, tree reconstruction, and topology management.

Problems faced by ad hoc networks:


Ad hoc networks face many problems –
• Limited wireless range
• Packet loss
• Energy saving due to less light.
• Poor communication.
• The issue of privacy arises when two devices attempt to communicate with the same
receiver.

• Problems occur in the node.


• Lack of security
• Address and discovery assistance
• Multicast
• Routing decisions

Ad hoc networks can be categorized based on their applications:


- Mobile ad hoc networks (MANET) are self-configuring mobile networks that communicate
within a remote network.
- Vehicular Ad Hoc Network (VANET) employs vehicles as nodes in the network to establish
mobile networks.
- Wireless Sensor Network (WSN) is comprised of autonomous sensors and is utilized for
monitoring social events.

1.MANET
An ad hoc network like MANET, which stands for Mobile Ad Hoc Network, is also referred
to as a wireless ad-hoc network or ad-hoc wireless network. It operates through a self-
connecting process and seeks out a conversational environment. This network is
characterized by a multitude of mobile devices that connect wirelessly in a self-configuring
and self-adjusting manner, obviating the need for permanent installations . Due to the
frequent changes in network topology, wireless sensor nodes have the freedom to move in an
unrestricted and random manner. Each node within the network acts as a router, facilitating
the routing of traffic to different parts of the network.

The provided diagram illustrates a model of a self-organizing network, comprising point-to-


point, self-forming, and self-regulating networks. The majority of communication occurs
over radio frequencies ranging from 30MHz to 5GHz.

2.VANET
Vehicle Ad Hoc Network (VANET) comprises a cluster of vehicles or stations linked through
a wireless network. Initially, VANETs were primarily designed to enhance safety and
convenience for drivers in traffic settings. However, this perception has evolved. Presently,
VANETs are recognized as the backbone of intelligent transportation systems, facilitating the
advancement of autonomous vehicles and supporting businesses that rely on network
connectivity within smart cities. Moreover, VANETs enable computers in stationary vehicles,
like those in airport parking lots, to transform into mobile computing resources with minimal
reliance on internet infrastructure.

3.WSN
Wireless Sensor Network (WSN) is a wireless network that operates without the need for
wired connections. It involves the temporary deployment of numerous wireless sensors to
monitor various systems, the human body, or the surrounding environment.
WSNs utilize sensor nodes equipped with embedded processors to oversee and manage the
conditions within a specific area. These nodes establish connections with the base station,
which functions within the WSN system. Stations within the WSN are also capable of
connecting to the Internet for the purpose of sharing data.

Applications of wireless sensor networks include:


1. Internet of Things (IoT)
2. Security analysis and threat detection
3. Monitoring ambient temperature, humidity, and air pressure
4. Measuring ambient noise levels
5. Enhancing medical practices, particularly in patient care
6. Agriculture
7. Conducting soil testing

Challenges in Wireless Sensor Networks (WSN) include:


1. Ensuring high-quality service delivery
2. Addressing security concerns
3. Enhancing energy efficiency
4. Maximizing network throughput
5. Optimizing overall performance
6. Managing node failures effectively
7. Implementing cross-layer optimization
8. Facilitating large-scale expansion

Modern Wireless Sensor Networks (WSNs) encounter various challenges:


•Low Energy and Power: WSNs often rely on lightweight, energy-efficient materials,
resulting in limited power resources. This poses a challenge in maintaining prolonged
network operation without frequent battery replacements.

• Limited Processing and Storage Capabilities: Sensor nodes in WSNs are typically compact
with constrained processing and storage capabilities. This limitation hinders the execution of
complex tasks or the storage of large volumes of data.

• Heterogeneity: WSNs commonly incorporate diverse sensor types and nodes with varying
functionalities. This diversity complicates the task of ensuring effective and efficient network
operation.
• Security: WSNs are susceptible to various forms of attacks, including eavesdropping,
jamming, and spoofing. Ensuring robust security for both the network and the stored
information is a formidable challenge.

• Scalability: WSNs must have the capacity to accommodate numerous sensor nodes and
manage substantial data volumes. Guaranteeing that networks can scale to meet this demand
presents a significant challenge.

• Interference: WSNs are often deployed in environments with interference from numerous
other wireless devices. This interference can impede seamless communication between sensor
nodes.

• Reliability: WSNs are frequently employed in critical applications such as environmental


monitoring and business process control. Ensuring consistent and efficient network
performance across all scenarios is a demanding task.

Advantages of Wireless Sensor Networks (WSN):


1. Cost-effectiveness: WSN employs small, cost-effective, and easy-to-install devices,
rendering them versatile for numerous applications.
2. Wireless Communication: These networks obviate the necessity for expensive and complex
installations. Wireless communication also enables straightforward deployment and
reconfiguration of networks.
3. Energy Efficiency: WSN utilizes energy-saving technologies and methods, ensuring
prolonged operation without the frequent need for battery replacement.
4. Scalability: Wireless sensor networks can be effortlessly expanded or reduced by adding or
removing sensors, making them suitable for a wide array of applications and environments.
5. Real-time Monitoring: WSNs have the capability to monitor physical events and the
environment in real-time, offering timely information for decision-making and control.

Disadvantages of Wireless Sensor Networks (WSNs):


1. Limited Range: Wireless communication in WSNs is constrained by a limited range, which
can be problematic in large deployments or in areas with high ambient light levels. This issue
is known as the radio blocking problem.

2. Limited Processing Power: WSNs utilize low-power devices that may have restricted
processing capabilities and memory. This can hinder the execution of complex computations
or the support of advanced applications.
3. Data Security: WSNs are susceptible to security risks like eavesdropping, tampering, and
denial of service attacks. These threats can potentially compromise sensitive data, justice, and
other critical matters.

4. Interference: The wireless communications within a WSN may be subject to signal


interference from other wireless devices or radios, leading to a degradation in the quality of
data transmission.

5. Challenges: Deploying WSNs can be a complex process, involving tasks such as proper
sensor placement, effective power management, and network configuration. This can demand
a significant investment of time and resources.

It's important to recognize that while wireless sensor networks offer numerous advantages,
they also come with limitations and potential issues that must be taken into account during
their actual deployment and utilization.

IMANET
The Internet-based mobile private network (IMANET) supports standard Internet protocols
like TCP/IP (Transmission Control Protocol/Internet Protocol) and User Datagram Protocol
(UDP). IMANET employs the TCP/IP network layer routing protocol on all connected
devices, allowing them to reach mobile nodes and configure distributed routing
automatically. Additionally, IMANET can be utilized for gathering sensor data in various
applications, including weather monitoring.

SPAN
Smartphone private networks utilize pre-existing hardware (e.g., Wi-Fi and Bluetooth) and
software protocols integrated into the smartphone's operating system (OS) to establish a peer-
to-peer (P2P) network. This is achieved without dependence on mobile phones, wireless
access points, or other conventional network devices. Unlike conventional hub-and-spoke
networks like Wi-Fi Direct, SPAN supports multi-hop relays. Multi-hop relaying enables
traffic to be sent from device A to device C via an intermediary device B. Consequently,
devices A and C do not need to establish a direct P2P connection in order to communicate
with each other. Since SPAN operates in a completely dynamic manner, participants can join
or leave the network without disrupting its functionality, as there is no group leader within the
application.

WMN
A wireless mesh network (WMN) is composed of radio networks arranged in a specific
network topology, typically consisting of network clients, network routers, and routing tables.
In a mesh network, devices (or nodes) are interconnected to ensure that at least some, if not
all, devices have multiple pathways to other nodes. This results in numerous information
routes between pairs of users, thereby enhancing the network's resilience in the event of a
node or link failure. WMN finds utility in scenarios necessitating a temporary wireless
network or in more permanent situations where laying network cables for an infrastructure-
based wireless network is impractical.

ODMRP
The Optional Multicast Routing Protocol (ODMRP) is a multicast routing protocol designed
for ad-hoc networks featuring mobile hosts. Unlike tree-based multicast schemes, ODMRP
employs a network-based multicast approach. It introduces the concept of group routing,
where only a group of nodes forwards multicast packets originating from various flood
sources. ODMRP incorporates optional methods to optimize routing and manage multicast
group membership. It proves particularly well-suited for ad-hoc wireless networks with
mobile hosts characterized by limited bandwidth, frequent and rapid topology changes, and
constrained power resources.

Fig: ODMRP

ADMR
ADMR, which stands for Adaptive Demand-Driven Multicast Routing Protocol, introduces a
novel demand-driven approach to network multicast routing. This approach effectively
minimizes the dissemination of unwanted content. The multicast routing state is dynamically
generated and managed exclusively for active groups and nodes situated between multicast
senders and receivers. Every multicast packet is transmitted from the sender to the receiver
along the path with the shortest delay, as determined by the multicast routing state.
Furthermore, the receiver dynamically adjusts to the sender's mode, thereby striking a
balance between overhead and ensuring the upkeep of the multicast routing state, even as
conditions in the network undergo changes.

A comprehensive description of the ADMR protocol's functioning is provided, along with an


initial evaluation of its performance based on meticulous simulations within an ad hoc
network comprising 50 mobile nodes. The results demonstrate that ADMR achieves a
remarkable 1% packet delivery in comparison to flooding techniques, all while incurring only
half to one-third of the associated overhead.

Fig: ADMR

Applications of Ad Hoc Networks:


1. Military Field: Ad-Hoc networking offers the military the ability to maintain a reliable
information network among vehicles, troops, and command centres, leveraging established
network expertise.

2. Cooperative Work: In commercial settings, the need for collaborative computing outside
the office environment is crucial. People often require meetings outside the office to
exchange information and collaborate on assigned tasks.

3. Confined Environments: Ad-Hoc networks can easily establish immediate, temporary


hypermedia networks using devices like laptops, facilitating information sharing in
environments like classrooms and conferences. Additionally, they find applications in
domestic networks where devices can directly exchange information.

4. Personal Area Networks (PAN) and Bluetooth: PANs are localized, small-range networks
consisting of devices typically owned by a single individual. Limited-range MANETs like
Bluetooth simplify communication between various portable devices such as laptops and cell
phones.

5. Business Sector: Ad-hoc networks are invaluable in rescue and emergency operations,
particularly in natural disasters like floods, fires, or earthquakes. They are crucial in situations
where the existing communication infrastructure is damaged or nonexistent, requiring a rapid
deployment of a new communication network.

6. Sensor Networks: Ad-Hoc networks are used for managing home appliances both in close
proximity and remotely. They can monitor live elements and gather weather-related data.
7. Backup Services: Ad-Hoc networks provide independent operation, recovery, diagnosis, or
replacement of cases or records in fixed systems.

8. Ministry of Education: Communication infrastructure is established in computer


laboratories, classrooms, and laboratories to support educational activities.

Environmental Protection Features:


1. Autonomy: The weather station's battery should have the capacity to sustain the station
throughout its deployment.

2. Reliability: Networks should operate smoothly and predictably to prevent accidents.

3. Durability: The network must address various challenges, such as weak radio connections
(e.g., during snowfall) or hardware malfunctions.

4. Flexibility: Users should have the ability to swiftly add, relocate, or remove fields as per
the application's needs.

Industrial Control:
With the advancements in wireless communications, microelectronics, digital electronics, and
communication technology, experts are actively researching the development of well-
controlled electronic systems due to the high integration of electronic products.

Smart Buildings:
Wireless Sensor Networks (WSNs) play a pivotal role in realizing smart buildings, serving as
valuable tools to enhance residential environments for various applications.

Military Applications:
WSNs are composed of numerous compact sensor nodes, which not only cost less but also
offer increased versatility. Given the constant threat of enemy attacks and security concerns
in military operations, employing smaller, cost-effective packages more frequently can help
mitigate losses.
The provided diagram illustrates a wireless sensor network designed for military purposes.
This application deploys sensors tailored for top-secret missions. These sensors are capable of
detecting and classifying objects, distinguishing between armoured vehicles and pedestrians,
and identifying the type of weapons they carry. This information is processed in real-time,
providing crucial insights and a clearer situational understanding for combat scenarios.
Usages of Ad-Hoc Networks:
1. Military: Ad hoc networks provide a means for the military to establish communication
among soldiers, vehicles, and headquarters in the field.
2. Personal Area Network (PAN): A PAN is a local network with a short range, where each
node is typically within a limited distance of one another.
3. Crisis Conditions: Ad hoc networks are easily deployable in times of crisis to send
emergency signals and facilitate communication.
4. Medical Applications: They can be utilized to monitor patients in healthcare settings.
5. Environmental Applications: Ad hoc networks find use in monitoring weather conditions,
forest fires, tsunamis, and similar environmental events.

Advantages of Ad Hoc Networks:


1. Simplicity of Setup: Ad hoc mode is straightforward to establish, especially when
connecting a small number of devices without the need for a centralized access point. This is
useful in scenarios were setting up a router might not be feasible.

2. Cost-Effectiveness: As they don't require additional infrastructure like access points or


wireless routers, ad hoc networks offer a low-cost solution for direct client-to-client or client-
to-internet communication.

3. Ease of Configuration: Ad hoc networks are easy to configure, providing an efficient


means of communication with nearby devices, particularly in time-sensitive situations where
laying cables is impractical.

4. Security Advantages: The impromptu nature of ad hoc networks can make them less
susceptible to certain types of security threats.

5. Practicality in Small-Scale Scenarios: In situations involving a small number of devices, an


ad hoc network may be more practical than a traditional infrastructure-based network, which
is designed to connect a larger number of devices.

Disadvantages of ad hoc networks include:


1. Limited Device Support: Some Wi-Fi-enabled technology like certain Android devices,
wireless printers, and custom IoT sensors do not support ad hoc mode due to its limitations.
These devices typically only connect to networks in infrastructure mode by default. In some
cases, third-party software may need to be installed on endpoint devices to enable ad hoc
communications.

2. Scalability Issues: Ad hoc networks do not scale well. As the number of devices on the
network increases, management becomes more challenging because there is often no central
device to oversee all traffic. This can lead to wireless interference and reduced performance.

3. Poor Wireless Performance: Ad hoc networks often experience poorer wireless


performance compared to networks in infrastructure mode. This is because antennas placed at
endpoints are not designed to be as robust as those in wireless access points (WAPs).

4. Lack of Network Infrastructure Services: Security options are limited in ad hoc networks
due to the absence of network infrastructure services, such as access to a RADIUS (remote
authentication dial-in user service) server for 802.1x authentication purposes.
5. SSID Broadcast Mode: Devices on ad hoc networks cannot disable SSID broadcast mode,
making them more vulnerable to attackers within signal range.

6. Internet Connectivity: Devices in an ad hoc network can only access the internet if one of
them is connected to it and sharing the connection. This is commonly done using a cellular-
connected smartphone in "hotspot" mode. However, this may lead to performance issues,
especially with a large number of interconnected devices.

7. Resource Intensiveness: Ad hoc mode requires more endpoint system resources, as the
physical network layout changes when devices are moved around. In contrast, an access point
in infrastructure mode typically remains stationary from an endpoint perspective.

How does an ad hoc network work?


For devices to operate in ad hoc mode, they require a wireless network adapter or chip and
the capability to function as a wireless router when connected. When establishing a wireless
ad hoc network, each wireless adapter must be set to ad hoc mode instead of infrastructure
mode. All wireless devices connecting to an ad hoc network need to use the same service set
identifier (SSID) and wireless frequency channel number.

What is the future scope of wireless sensor networks?


Wireless Sensor Networks (WSN) are currently in high demand due to their widespread
applicability. They find application in diverse fields such as hydroacoustic sensor systems,
sensing and spectrum management, as well as security and self-management.

Is self-employment the right choice for you?


In spite of the limitations associated with infrastructure-based wireless networks, wireless
private networks remain a viable option for numerous personal and business scenarios. As
long as the network administrator comprehends the communication capabilities of a WANET
(and if those capabilities align with specific needs), setting up an ad hoc network is a
straightforward way to connect two or more devices.

How to Create an Ad Hoc Network?


One of the most straightforward and commonly used ad hoc networks allows Wi-Fi enabled
devices to link up with a smartphone, enabling shared access to the phone. This functionality
is often referred to as tethering or hotspot access.

Setting Up a Hotspot on Your iPhone:


1. Open the "Settings" on your Apple iPhone.
2. Select "Personal Hotspot."

Enabling Hotspot and Securing the Connection:


3. Turn on the option "Allow others to join."
4. Create a strong, unique shared key (Wi-Fi password) to prevent unauthorized access.

Using the Hotspot:


5. Once configured, your iPhone will broadcast the 802.11 SSID Wi-Fi signal.
6. The SSID will be the name of your iPhone.
7. Devices need to be in proximity to detect and connect to this advertised SSID.
8. Upon connection, users will be prompted to enter the shared key (Wi-Fi password).
9. After entering the correct key, your iPhone will assign a private IP address, subnet mask,
gateway, and DNS for the temporary connection.
10. With this information, the connected device can access your iPhone's cellular connection.
Conclusion

In its most basic form, "ad-hoc networking" signifies the capacity of network members to
establish connections between devices. However, this capacity represents a broader social
phenomenon, as specialized organizations are embodiments of social structure and
organization. Achieving self-organization necessitates a community of individuals who share
software and hardware while adhering to standards, controls, and policies.

This article delves into the origin and evolution of "personal collaboration," introducing the
concept and its implications in computer science and social science. It further scrutinizes
current paradigms in technology development and application. Additionally, we delve into the
significance and implementation of integration, addressing challenges and constraints related
to access, maintenance, participation, and exclusion. Finally, we highlight how "ad hoc"
networks synergize with other technologies, offering novel social, economic, and political
opportunities for self-organization, including communication during emergencies, impromptu
transactions, and Decentralized Autonomous Organizations (DAOs).

A concise overview of the history and backdrop of self-organization reveals laws shaped by
societal norms, political necessities, and the aspiration for individual participation. This
demonstrates how the progression of network technologies is entwined with sociopolitical
dynamics, influencing the way people leverage technology and media for innovative
purposes.

You might also like