You are on page 1of 13

Adhoc and Sensor Networks

Year :2012-2013
IV Year B.Tech (CSE) II Sem
Unit-I PPT Slides
Text Books:
1. Ad Hoc and Sensor Networks Theory and Applications, Carlos Corderio
Dharma P.Aggarwal, World Scientific Publications, March 2006, ISBN 981
- 256-681-3
2.Wireless Sensor Networks: An Information Processing Approach, Feng
Zhao, Leonidas Guibas, Elsevier Science, ISBN 978-1-55860-914-3
( Morgan Kauffman)

Table of Contents
Chapters:
1. Introduction
2. Routing in Ad hoc Networks
3. Broadcasting, Multicasting and Geocasting
4. Wireless LANs
5. Wireless PANs
6. Directional Antenna Systems
7. TCP over Ad Hoc Networks
8. Wireless Sensor Networks
9. Data Retrieval in Sensor Networks
10. Security
11. Integrating MANETs, WLANs and Cellular
Networks

Chapter 1: Introduction

Introduction
The Communication Puzzle
Applications of MANETs
Challenges

Scalability
Quality of Service
Client-Server Model Shift
Security
Interoperation with the Internet
Energy Conservation
Node (MH) Cooperation
Interoperation

Book Organization
Conclusions and Future Directions
Homework Questions/Simulation Projects
References

A Mobile Ad Hoc Network


(MANET)
MH2
MH2
MH4

Asymmetric link

MH3

MH5
MH7

Symmetric link
MH1

MH6

Characteristics of a MANET

An autonomous system of nodes (Mobile Hosts:


MHs) connected by wireless links
Same channel used by all nodes
Lack of fixed infrastructure
Absence of centralized authority
Peer-to-peer connectivity
Multi-hop forwarding to ensure network
connectivity
Topology may change dynamically
Random Multi-hop Graph
Energy-constrained
Bandwidth-constrained, variable capacity links

Characteristi
c

Important
characteristics of a
DescriptionMANET

Dynamic
Topologies

Nodes are free to move arbitrarily with different


speeds; thus, the network topology may change
randomly and at unpredictable times.

Energyconstrained
Operation

Some or all of the nodes in an ad hoc network


may rely on batteries or other exhaustible means
for their energy. For these nodes, the most
important system design optimization criteria
may be energy conservation.

Limited
Bandwidth

Wireless links continue to have significantly


lower capacity than infrastructured networks. In
addition, the realized throughput of wireless
communications after accounting for the effects
of multiple access, fading, noise, and
interference conditions, etc., is often much less
than a radios maximum transmission rate.

Security
Threats

Mobile wireless networks are generally more


prone to physical security threats than fixedcable nets. The increased possibility of
eavesdropping, spoofing, and minimization of

The envisioned
communication puzzle
of 4G and beyond

The scope of various wireless


technologies

Applications of MANETs

Collaborative Work

Crisis-management Applications

Collaborative computing might be important outside office


environments
Natural disasters with entire communications infrastructure
in disarray
Restoring communications quickly is essential
Infrastructure could be set up in hours instead of
days/weeks

Personal Area Networking

Short-range, localized network of nodes associated with a


person
Nodes could be attached to someones cell phone, pulse
watch, belt, etc.
Bluetooth is an example
Eliminates need of wires between devices such as printers,
cell phones, PDAs, laptop computers, headsets, etc.
IEEE 802.15 standard working group

Scalability

Future Challenges
in Ad hoc and
Sensor Networks

Short-range Throughput per node decreasesN


at a rate 1/
, where N is the
number of nodes
This cannot be fixed except by physical layer improvements, such as
directional antennas

Quality of service

Need to provide best-effort service only for Voice, live video and file transfer

Client server model shift


There is no server, but demand for basic services still exists.
Address allocation, name resolution, authentication and service location are
just examples of very basic services which are needed

Security

Lack of any centralized network management or certification authority


Networks are particularly prone to malicious behavior

Interoperation with the Internet


Networks require some Internet connection
Interface between the two are very different

Energy conservation

Lifetime of a single battery and the whole network.

Node cooperation

Why anyone should relay other peoples data

Interoperation

What happens when two autonomous ad hoc networks move into same area

Book outline
Chapter 2: Unicast routing over ad hoc networks
Chapter 3: Multicasting, Broadcasting and

geocasting in ad hoc networks


Chapters 4 and 5: Most widely used MAC and
physical layers for ad hoc networks
Chapter 6: Use of directional antenna for
increasing capacity, connectivity, and covertness of
ad hoc networks
Chapter 7: The issue of TCP (Transmission Control
Protocol) over ad hoc networks
Chapter 8: Introduction to sensor networks
Chapter 9: Data retrieval in sensor networks
Chapter 10: Security in ad hoc networks
Chapter 11: Integration of heterogeneous wireless
technologies in the context of ad hoc and sensor
networks

Book Organization
Application

Transport

Network
LLC

Data
MAC Link

Physical

All chapters

Chapters 7,
9 and 11
Chapters 2, 3, 6,
8, 9, 10, and 11
Chapters 4, 5, 6,
8, 9, and 11
Chapters 4,
5, 6, and 11

You might also like