Professional Documents
Culture Documents
Submitted by:
Sachin Tyagi 2808332 B.tech(IT)-Final year
AD-HOC NETWORKS
TABLE OF CONTENT TOPIC Computer networks Computer network properties Ad hoc networks characteristics Limitations Types of Ad hoc network MANET Wireless Sensor Network Applications Performance Issues Refrences Page No. 3 5 8 12 13 15 15 18 20 21 22
AD-HOC NETWORKS
COMPUTER NETWORKS
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information. Where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Networks may be classified according to a wide variety of characteristics such as the medium used to transport the data, communications protocol used, scale, topology, and organizational scope. Communications protocols define the rules and data formats for exchanging information in a computer network, and provide the basis for network programming. Well-known communications protocols are Ethernet, a hardware and link layer standard that is ubiquitous in local area networks, and the internet protocol suite, which defines a set of protocols for internetworking, i.e. for data communication between multiple networks, as well as host-tohost data transfer, and application-specific data transmission formats. Simplified but worthwhile description of the uses of computer networks might be as follows: Sharing of hardware: For example, several PCs might be networked together in a wired or wireless local area network (LAN) to share a printer. Sharing of information: Distributed databases, e-mail, the World Wide Web and so on are examples of this. Here the sharing involves both LANs and wide area networks (WANs).
AD-HOC NETWORKS
Computer Network Purpose of computer networks: The primary purpose of a computer network is to share resources:
You can access data from one computer while sitting on another computer You may have a computer that doesnt have a dvd player. In this case, you can place a movie disc on the computer that has the player, and then view the movie on a computer that lacks the player
You may have a computer with a backup system but the other computer doesnt have it. In this case, you can burn discs or make backups on a computer that has one of these but using data from a computer that doesnt have a backup system
You can connect a printer (or a scanner, or a fax machine) to one computer and let
other computers of the network print (or scan, or fax) to that printer.
You can create files and store them in one computer, then access those files from the
AD-HOC NETWORKS
Facilitate communications Using a network, people can communicate efficiently and easily via email, instant
messaging, chat rooms, telephone, video telephone calls, and video conferencing.
Permit sharing of files, data, and other types of information In a network environment, authorized users may access data and information stored
on other computers on the network. The capability of providing access to data and information on shared storage devices is an important feature of many networks.
Share network and computing resources In a networked environment, each computer on a network may access and use
resources provided by devices on the network, such as printing a document on a shared network printer. Distributed computing uses computing resources across a network to accomplish tasks.
May be insecure A computer network may be used by computer hackers to deploy computer viruses or
computer worms on devices connected to the network, or to prevent these devices from normally accessing the network (denial of service).
May interfere with other technologies Power line communication strongly disturbs certain forms of radio communication, A complex computer network may be difficult to set up. It may also be very costly to
AD-HOC NETWORKS
Different views of network: Users and network administrators typically have different views of their networks. Users can share printers and some servers from a workgroup, which usually means they are in the same geographic location and are on the same LAN, whereas a Network Administrator is responsible to keep that network up and running. A community of interest has less of a connection of being in a local area, and should be thought of as a set of arbitrarily located users who share a set of servers, and possibly also communicate via peer-to-peer technologies. Network administrators can see networks from both physical and logical perspectives. The physical perspective involves geographic locations, physical cabling, and the network elements (e.g., routers, bridges and application layer gateways) that interconnect the physical media. Logical networks, called, in the TCP/IP architecture, subnets, map onto one or more physical media. For example, a common practice in a campus of buildings is to make a set of LAN cables in each building appear to be a common subnet, using virtual LAN (VLAN) technology. Both users and administrators will be aware, to varying extents, of the trust and scope characteristics of a network. Again using TCP/IP architectural terminology, an intranet is a community of interest under private administration usually by an enterprise, and is only accessible by authorized users (e.g. employees). Intranets do not have to be connected to the Internet, but generally have a limited connection. An extranet is an extension of an intranet that allows secure communications to users outside of the intranet (e.g. business partners, customers).
AD-HOC NETWORKS
Unofficially, the Internet is the set of users, enterprises, and content providers that are interconnected by Internet Service Providers (ISP). From an engineering viewpoint, the Internet is the set of subnets, and aggregates of subnets, which share the registered IP address space and exchange information about the reachability of those IP addresses using the Border Gateway Protocol. Typically, the human-readable names of servers are translated to IP addresses, transparently to users, via the directory function of the Domain Name System (DNS) Hosts are sometimes further divided into two categories: clients and servers. Informally, clients often tend to be desktop PCs or workstations, whereas servers are more powerful machines. But there is a more precise meaning of a client and a server in computer networking. In the so-called client/server model, a client program running on one end system requests and receives information from a server running on another end system. This client/server model is undoubtedly the most prevalent structure for Internet applications. The Web, e-mail, file transfer, remote login (for example, Telnet), newsgroups, and many other popular applications adopt the client/server model.
AD-HOC NETWORKS
AD HOC NETWORKS
Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station. An ad hoc network is a type of peer to peer wireless network mode where wireless devices communicate with each other directly, without the aid of a Wireless Access Point (WAP) device. Wireless networks typically depend on a base station or WAP device to manage and direct the stream of data between wireless devices. In an ad hoc setup, the network is built spontaneously as and when devices communicate with each other. These devices should ideally be within close range of each other; however quality of connection and speed of the network will suffer as more devices are added to the network. The security of an ad hoc network is non-existent, as wireless security norms such as WAP2, WAP, and WEP are not permitted in such direct networking. For example, if you need to transfer a file to your friend's laptop, you might create an ad hoc network between your computer and his laptop to transfer the file. This may be done using an Ethernet crossover cable, or the computers' wireless cards to communicate with each other. If you need to share files with more than one computer, you could set up a mutli-hop ad hoc network, which can transfer data over multiple nodes. Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). If the network is set up for a longer period of time, it is just a plain old local area network.
AD-HOC NETWORKS
An ad-hoc or short-live network is the network of two or more mobile devices connected to each other without the help of intervening infrastructure. In contrast to a fixed wireless network, an ad-hoc network can be deployed in remote geographical locations and requires minimum setup and administration costs. Moreover, the integration of an ad-hoc network with a bigger network-such as the Internet-or a wireless infrastructure network increases the coverage area and application domain of the ad-hoc network. However, communication in an ad-hoc network between different hosts that are not directly linked is an issue not only for search and rescue operations, but also for educational and business purposes. In the Windows operating system, ad-hoc is a communication mode (setting) that allows computers to directly communicate with each other without a router.
Ad hoc networks
AD-HOC NETWORKS
Ad-Hoc Mode in Wireless Networking: On wireless computer networks, ad-hoc mode is a method for wireless devices to directly communicate with each other. Operating in ad-hoc mode allows all wireless devices within range of each other to discover and communicate in peer-to-peer fashion without involving central access points (including those built in to broadband wireless routers). To set up an ad-hoc wireless network, each wireless adapter must be configured for ad-hoc mode versus the alternative infrastructure mode. In addition, all wireless adapters on the adhoc network must use the same SSID and the same channel number. An ad-hoc network tends to feature a small group of devices all in very close proximity to each other. Performance suffers as the number of devices grows, and a large ad-hoc network quickly becomes difficult to manage. Ad-hoc networks cannot bridge to wired LANs or to the Internet without installing a special-purpose gateway. Ad hoc networks make sense when needing to build a small, all-wireless LAN quickly and spend the minimum amount of money on equipment. Ad hoc networks also work well as a temporary fallback mechanism if normally-available infrastructure mode gear (access points or routers) stop functioning.
10
AD-HOC NETWORKS
This diagram illustrates use of a so-called ad hoc wireless setup in a home network. Key Considerations - Using ad hoc Wi-Fi mode eliminates the need for a network router or access point in a wireless home network. With ad hoc wireless, you can network computers together as needed without needing to be in reach of one central location. Most people use ad hoc Wi-Fi only in temporary situations to avoid potential security issues. Optional Components - Networking an ad hoc layout for Internet access, printers, or game consoles and other entertainment devices is not required for the rest of the home network to function. Simply omit any of these components shown that do not exist in your layout.
11
AD-HOC NETWORKS
12
AD-HOC NETWORKS
Limitations
All devices connecting via ad hoc wireless must possess a working Wi-Fi network adapter. These adapters must be configured for "ad hoc" mode instead of the more typical "infrastructure" mode. Because of their more flexible design, ad hoc Wi-Fi networks are also more difficult to keep secure than those using central wireless routers / access points. Ad hoc Wi-Fi networks support a maximum of 11 Mbps bandwidth, while other WiFi networks may support 54 Mbps or higher.
Security challenges:
Lack of Infrastructure or centralized control Key management becomes difficult Dynamic topology Challenging to design sophisticated & secure routing protocols Communication through Radio Waves Difficult to prevent eavesdropping Vulnerabilities of routing mechanism Non-cooperation of nodes Vulnerabilities of nodes.
13
AD-HOC NETWORKS
Network Tab. 5. 6. 7. Click the Add button present under the Preferred networks section. The Wireless Network Properties window appears. Type a name for your network in the text field Network Name (SSID), present under
the tab Association. 8. Check both the The key is provided for me automatically and This is a computer-to-
computer (ad hoc) network check boxes. 9. Click Ok to save the made changes. The Ad hoc network is now set up.
14
AD-HOC NETWORKS
15
AD-HOC NETWORKS
All the nodes or devises responsible to organize themselves dynamically the communication between the each other and to provide the necessary network functionality in the absence of fixed infrastructure or we can call it ventral administration, It implies that maintenance, routing and management, etc. have to be done between all the nodes.
Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each
16
AD-HOC NETWORKS
device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. MANETs are a kind of wireless ad hoc networks that usually has a routable networking environment on top of a Link Layer ad hoc network. The growth of laptops and wireless networking have made MANETs a popular research topic since the mid 1990s. Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other. Different protocols are then evaluated based on measure such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput etc.
Types of MANET:
Vehicular Ad-hoc Networks (VANETs) are used for communication among vehicles
and between vehicles and roadside equipment. For example, a university bus system, if the buses are connected. The buses travel to different parts of a city to pick up or drop off students, and make an ad-hoc network.
intelligence that helps vehicles to behave in an intelligent manner during vehicle-to-vehicle collisions, accidents, drunken driving etc.
Internet Based Mobile Ad-hoc Networks (iMANET) are ad-hoc networks that link
mobile nodes and fixed Internet-gateway nodes. In such type of networks normal adhoc routing algorithms don't apply directly.
17
AD-HOC NETWORKS
Wireless sensor network The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and
18
AD-HOC NETWORKS
an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. The propagation technique between the hops of the network can be routing or flooding. There are many benefits of this network, it includes: Use to build a large-scale networks Implementing sophisticated protocols Reduce the amount of communication (wireless) required to perform tasks by distributed and/or local precipitations. Implementation of complex power saving modes of operation depending on the environment and the state of the network
19
AD-HOC NETWORKS
2. Commercial sector: Ad hoc network can be applied in emergency or rescue operations for disaster relief efforts for example in fire, flood, or earthquake and so on. Emergency rescue operations will go to places where communications are impermissible. Therefore proper infrastructure and rapid deployment of a communication network is badly needed. Information is relayed from one rescue team member to another over a small handheld device. Other commercial application includes for instance ship to ship Ad Hoc Mobile communication and so on. 3 Local level: Ad hoc networks can autonomously link immediate and temporary multimedia network by using notebook or palmtop computers to distribute and allocate information among conference or classroom participants. Besides, it can also be applied for home networks where devices can be link. Another example includes taxicab, sports stadium, boat and small aircraft.
20
AD-HOC NETWORKS
Personal
Area
Network
(PAN):
Short-range
MANET
can
simplify the
intercommunication between a lot of mobile devices such as a PDA, a laptop, and a cellular phone and there are a lot of new devices in this for MANETs. Wired cables can easily be replaced with wireless connections.
21
AD-HOC NETWORKS
REFRENCES
Integrating Wireless Technology by Williams Wheeler, Elsevier Digital Press. Wikipedia www.functionx.com Toh. C.K., 2002. Ad Hoc Mobile Wireless Networks Protocols and Systems. Prentice
22