Final Report Adhoc
Transcript of Final Report Adhoc
-
7/31/2019 Final Report Adhoc
1/22
AD-HOC NETWORKS
1
Seminar Report
On
Ad Hoc
Networks
Submitted by:
Sachin Tyagi
2808332
B.tech(IT)-Final year
-
7/31/2019 Final Report Adhoc
2/22
AD-HOC NETWORKS
2
TABLE OF CONTENT
TOPIC Page No.
Computer networks 3
Computer network properties 5
Ad hoc networks 8
characteristics 12
Limitations 13
Types of Ad hoc network 15
MANET 15
Wireless Sensor Network 18
Applications 20
Performance Issues 21
Refrences 22
-
7/31/2019 Final Report Adhoc
3/22
AD-HOC NETWORKS
3
COMPUTER NETWORKS
A computer network, often simply referred to as a network, is a collection of hardware
components and computers interconnected by communication channels that allow sharing of
resources and information. Where at least one process in one device is able to send/receive
data to/from at least one process residing in a remote device, then the two devices are said to
be in a network. Networks may be classified according to a wide variety of characteristics
such as the medium used to transport the data, communications protocol used, scale,
topology, and organizational scope.
Communications protocols define the rules and data formats for exchanging information in a
computer network, and provide the basis for network programming. Well-known
communications protocols are Ethernet, a hardware and link layer standard that is ubiquitous
in local area networks, and the internet protocol suite, which defines a set of protocols for
internetworking, i.e. for data communication between multiple networks, as well as host-to-
host data transfer, and application-specific data transmission formats.
Simplified but worthwhile description of the uses of computer networks might be as follows:
Sharing of hardware: For example, several PCs might be networked together in a wired or
wireless local area network (LAN) to share a printer.
Sharing of information: Distributed databases, e-mail, the World Wide Web and so on are
examples of this. Here the sharing involves both LANs and wide area networks (WANs).
-
7/31/2019 Final Report Adhoc
4/22
AD-HOC NETWORKS
4
Computer Network
Purpose of computer networks:
The primary purpose of a computer network is to share resources:
You can access data from one computer while sitting on another computer
You may have a computer that doesnt have a dvd player. In this case, you can place amovie disc on the computer that has the player, and then view the movie on a
computer that lacks the player
You may have a computer with a backup system but the other computer doesnt haveit. In this case, you can burn discs or make backups on a computer that has one of
these but using data from a computer that doesnt have a backup system
You can connect a printer (or a scanner, or a fax machine) to one computer and letother computers of the network print (or scan, or fax) to that printer.
You can create files and store them in one computer, then access those files from theother computer(s) connected to it.
-
7/31/2019 Final Report Adhoc
5/22
AD-HOC NETWORKS
5
Computer networks properties:
Facilitate communications
Using a network, people can communicate efficiently and easily via email, instantmessaging, chat rooms, telephone, video telephone calls, and video conferencing.
Permit sharing of files, data, and other types of information
In a network environment, authorized users may access data and information stored
on other computers on the network. The capability of providing access to data and
information on shared storage devices is an important feature of many networks.
Share network and computing resources
In a networked environment, each computer on a network may access and useresources provided by devices on the network, such as printing a document on a shared
network printer. Distributed computing uses computing resources across a network to
accomplish tasks.
May be insecure
A computer network may be used by computer hackers to deploy computer viruses orcomputer worms on devices connected to the network, or to prevent these devices from
normally accessing the network (denial of service).
May interfere with other technologies
Power line communication strongly disturbs certain forms of radio communication,
A complex computer network may be difficult to set up. It may also be very costly toset up an effective computer network in a large organization or company.
-
7/31/2019 Final Report Adhoc
6/22
AD-HOC NETWORKS
6
Different views of network:
Users and network administrators typically have different views of their networks. Users can
share printers and some servers from a workgroup, which usually means they are in the same
geographic location and are on the same LAN, whereas a Network Administrator is
responsible to keep that network up and running. A community of interest has less of a
connection of being in a local area, and should be thought of as a set of arbitrarily located
users who share a set of servers, and possibly also communicate via peer-to-peer
technologies.
Network administrators can see networks from both physical and logical perspectives. The
physical perspective involves geographic locations, physical cabling, and the network
elements (e.g., routers, bridges and application layer gateways) that interconnect the physical
media. Logical networks, called, in the TCP/IP architecture, subnets, map onto one or more
physical media. For example, a common practice in a campus of buildings is to make a set of
LAN cables in each building appear to be a common subnet, using virtual LAN (VLAN)
technology.
Both users and administrators will be aware, to varying extents, of the trust and scope
characteristics of a network. Again using TCP/IP architectural terminology, an intranet is a
community of interest under private administration usually by an enterprise, and is only
accessible by authorized users (e.g. employees). Intranets do not have to be connected to the
Internet, but generally have a limited connection. An extranet is an extension of an intranet
that allows secure communications to users outside of the intranet (e.g. business partners,
customers).
-
7/31/2019 Final Report Adhoc
7/22
AD-HOC NETWORKS
7
Unofficially, the Internet is the set of users, enterprises, and content providers that are
interconnected by Internet Service Providers (ISP). From an engineering viewpoint, the
Internet is the set of subnets, and aggregates of subnets, which share the registered IP address
space and exchange information about the reachability of those IP addresses using the Border
Gateway Protocol. Typically, the human-readable names of servers are translated to IP
addresses, transparently to users, via the directory function of the Domain Name System
(DNS)
Hosts are sometimes further divided into two categories: clients and servers. Informally,
clients often tend to be desktop PCs or workstations, whereas servers are more powerful
machines. But there is a more precise meaning of a client and a server in computer
networking. In the so-called client/server model, a client program running on one end system
requests and receives information from a server running on another end system. This
client/server model is undoubtedly the most prevalent structure for Internet applications.
The Web, e-mail, file transfer, remote login (for example, Telnet), newsgroups, and many
other popular applications adopt the client/server model.
-
7/31/2019 Final Report Adhoc
8/22
AD-HOC NETWORKS
8
AD HOC NETWORKS
Ad Hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe
solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad
hoc network refers to a network connection established for a single session and does not
require a router or a wireless base station.
An ad hoc network is a type of peer to peer wireless network mode where wireless devices
communicate with each other directly, without the aid of a Wireless Access Point (WAP)
device. Wireless networks typically depend on a base station or WAP device to manage and
direct the stream of data between wireless devices.
In an ad hoc setup, the network is built spontaneously as and when devices communicate with
each other. These devices should ideally be within close range of each other; however quality
of connection and speed of the network will suffer as more devices are added to the network.
The security of an ad hoc network is non-existent, as wireless security norms such as WAP2,
WAP, and WEP are not permitted in such direct networking.
For example, if you need to transfer a file to your friend's laptop, you might create an ad hoc
network between your computer and his laptop to transfer the file. This may be done using an
Ethernet crossover cable, or the computers' wireless cards to communicate with each other. If
you need to share files with more than one computer, you could set up a mutli-hop ad hoc
network, which can transfer data over multiple nodes.
Basically, an ad hoc network is a temporary network connection created for a specific
purpose (such as transferring data from one computer to another). If the network is set up for
a longer period of time, it is just a plain old local area network.
-
7/31/2019 Final Report Adhoc
9/22
AD-HOC NETWORKS
9
An ad-hoc or short-live network is the network of two or more mobile devices connected to
each other without the help of intervening infrastructure. In contrast to a fixed wireless
network, an ad-hoc network can be deployed in remote geographical locations and requires
minimum setup and administration costs. Moreover, the integration of an ad-hoc network
with a bigger network-such as the Internet-or a wireless infrastructure network increases the
coverage area and application domain of the ad-hoc network. However, communication in an
ad-hoc network between different hosts that are not directly linked is an issue not only for
search and rescue operations, but also for educational and business purposes.
In the Windows operating system, ad-hoc is a communication mode (setting) that allows
computers to directly communicate with each other without a router.
Ad hoc networks
-
7/31/2019 Final Report Adhoc
10/22
-
7/31/2019 Final Report Adhoc
11/22
AD-HOC NETWORKS
11
Adhoc wireless network
This diagram illustrates use of a so-called ad hoc wireless setup in a home network.
Key Considerations - Using ad hoc Wi-Fi mode eliminates the need for a network router or
access point in a wireless home network. With ad hoc wireless, you can network computers
together as needed without needing to be in reach of one central location. Most people use ad
hoc Wi-Fi only in temporary situations to avoid potential security issues.
Optional Components - Networking an ad hoc layout for Internet access, printers, or game
consoles and other entertainment devices is not required for the rest of the home network to
function. Simply omit any of these components shown that do not exist in your layout.
-
7/31/2019 Final Report Adhoc
12/22
AD-HOC NETWORKS
12
Why Adhoc wireless networking:
Technical side: wireless devices need to be connected. increased performance/cost ratio on devices . Internet compatible standards-based wireless systems.
Market side: mobile computing; wearable computing; military applications; disaster
recovery; robot data acquisition.
Characteristics of Ad-hoc network:
Autonomous (no infrastructure !). Wireless link based; (bandwidth constraint) Dynamic topology; (Due to movement or entering sleep mode). Rely on batteries for energy; (Power-constraint). Limited physical security. Dynamic topologies. Limited channel bandwidth. Variable capacity links.
-
7/31/2019 Final Report Adhoc
13/22
AD-HOC NETWORKS
13
Limitations
All devices connecting via ad hoc wireless must possess a working Wi-Fi networkadapter. These adapters must be configured for "ad hoc" mode instead of the more
typical "infrastructure" mode.
Because of their more flexible design, ad hoc Wi-Fi networks are also more difficultto keep secure than those using central wireless routers / access points.
Ad hoc Wi-Fi networks support a maximum of 11 Mbps bandwidth, while other Wi-Fi networks may support 54 Mbps or higher.
Security challenges:
Lack of Infrastructure or centralized control Key management becomes difficult
Dynamic topology Challenging to design sophisticated & secure routing protocols
Communication through Radio Waves
Difficult to prevent eavesdropping
Vulnerabilities of routing mechanism Non-cooperation of nodes
Vulnerabilities of nodes.
-
7/31/2019 Final Report Adhoc
14/22
AD-HOC NETWORKS
14
How to set up an ad hoc network at home:
In order to establish an ad hoc connection, you must have two or more personal computers or
laptops with wireless network interface cards. To establish an ad hoc connection on a home
computer, perform the following steps:
1. Click Start and then click Control Panel.2. Double-click the Network Connections icon.
3. Right-click your wireless network connection, and click Properties.4. The Wireless Network Connection Properties window appears. Click the WirelessNetwork Tab.
5. Click the Add button present under the Preferred networks section.6. The Wireless Network Properties window appears.7. Type a name for your network in the text field Network Name (SSID), present underthe tab Association.
8. Check both the The key is provided for me automatically and This is a computer-to-computer (ad hoc) network check boxes.
9. Click Ok to save the made changes. The Ad hoc network is now set up.
-
7/31/2019 Final Report Adhoc
15/22
AD-HOC NETWORKS
15
TYPES OF AD HOC NETWORKS:
mobile ad-hoc networks (MANET)
wireless mesh networks (WMN)
MOBILE AD-HOC NETWORKS (MANET):
MANET is a collection of two or more devices or nodes or terminals with wireless
communications and networking capability that communicate with each other without the aid
of any centralized administrator also the wireless nodes that can dynamically form a network
to exchange information without using any existing fixed network infrastructure. And its an
autonomous system in which mobile hosts connected by wireless links are free to be
dynamically and some time act as routers at the same time. All nodes in a wireless ad hoc
network act as a router and host as well as the network topology is in dynamically, because
the connectivity between the nodes may vary with time due to some of the node departures
and new node arrivals. The special features of Mobile Ad Hoc Network (MANET) bring this
technology great opportunity together with severe challenge.
The set of application for MANETs can be ranged from small, static networks that are limited
by power sources, to large-scale, mobile, highly dynamic networks. On top of that, the design
of network protocols for these types of networks is face with multifaceted issue. Apart from
of the application, MANETs need well-organized distributed algorithms to determine
network organization, link scheduling, and routing.
-
7/31/2019 Final Report Adhoc
16/22
AD-HOC NETWORKS
16
All the nodes or devises responsible to organize themselves dynamically the communication
between the each other and to provide the necessary network functionality in the absence of
fixed infrastructure or we can call it ventral administration, It implies that maintenance,
routing and management, etc. have to be done between all the nodes.
Mobile Ad hoc Network
Each device in a MANET is free to move independently in any direction, and will therefore
change its links to other devices frequently. Each must forward traffic unrelated to its own
use, and therefore be a router. The primary challenge in building a MANET is equipping each
-
7/31/2019 Final Report Adhoc
17/22
AD-HOC NETWORKS
17
device to continuously maintain the information required to properly route traffic. Such
networks may operate by themselves or may be connected to the larger Internet.
MANETs are a kind of wireless ad hoc networks that usually has a routable networking
environment on top of a Link Layer ad hoc network.
The growth of laptops and wireless networking have made MANETs a popular research topic
since the mid 1990s. Many academic papers evaluate protocols and their abilities, assuming
varying degrees of mobility within a bounded space, usually with all nodes within a few hops
of each other. Different protocols are then evaluated based on measure such as the packet
drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network
throughput etc.
Types of MANET:
Vehicular Ad-hoc Networks (VANETs) are used for communication among vehiclesand between vehicles and roadside equipment. For example, a university bus system, if the
buses are connected. The buses travel to different parts of a city to pick up or drop off
students, and make an ad-hoc network.
Intelligent vehicular ad-hoc networks (InVANETs) are a kind of artificialintelligence that helps vehicles to behave in an intelligent manner during vehicle-to-vehicle
collisions, accidents, drunken driving etc.
Internet Based Mobile Ad-hoc Networks (iMANET) are ad-hoc networks that linkmobile nodes and fixed Internet-gateway nodes. In such type of networks normal adhoc
routing algorithms don't apply directly.
-
7/31/2019 Final Report Adhoc
18/22
AD-HOC NETWORKS
18
WIRELESS SENSOR NETWORK:
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to
monitor physical or environmental conditions, such as temperature, sound, vibration,
pressure, humidity, motion or pollutants and to cooperatively pass their data through the
network to a main location. The more modern networks are bi-directional, also enabling
control of sensor activity. The development of wireless sensor networks was motivated by
military applications such as battlefield surveillance; today such networks are used in many
industrial and consumer applications, such as industrial process monitoring and control,
machine health monitoring, and so on.
Wireless sensor network
The WSN is built of "nodes"from a few to several hundreds or even thousands, where each
node is connected to one (or sometimes several) sensors. Each such sensor network node has
typically several parts: a radio transceiver with an internal antenna or connection to an
external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and
http://en.wikipedia.org/wiki/File:WSN.svg -
7/31/2019 Final Report Adhoc
19/22
AD-HOC NETWORKS
19
an energy source, usually a battery or an embedded form of energy harvesting. A sensor node
might vary in size from that of a shoebox down to the size of a grain of dust, although
functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of
sensor nodes is similarly variable, ranging from a few to hundreds of dollars, depending on
the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes
result in corresponding constraints on resources such as energy, memory, computational
speed and communications bandwidth. The topology of the WSNs can vary from a simple
star network to an advanced multi-hop wireless mesh network. The propagation technique
between the hops of the network can be routing or flooding.
There are many benefits of this network, it includes:
Use to build a large-scale networks
Implementing sophisticated protocols
Reduce the amount of communication (wireless) required to perform tasks by distributed
and/or local precipitations.
Implementation of complex power saving modes of operation depending on the
environment and the state of the network
-
7/31/2019 Final Report Adhoc
20/22
AD-HOC NETWORKS
20
APPLICATION OF AD HOC NETWORK:
1.Military battlefield. Military equipment currently is equipped with the state of the art
computer equipment. Ad hoc networking help the military with the commonplace network
technology to maintain information network between military personnels, vehicles, and
military information head quarters. The basic techniques of ad hoc network originated from
this field.
2. Commercial sector: Ad hoc network can be applied in emergency or rescue operations for
disaster relief efforts for example in fire, flood, or earthquake and so on. Emergency rescue
operations will go to places where communications are impermissible. Therefore proper
infrastructure and rapid deployment of a communication network is badly needed.
Information is relayed from one rescue team member to another over a small handheld
device. Other commercial application includes for instance ship to ship Ad Hoc Mobile
communication and so on.
3 Local level: Ad hoc networks can autonomously link immediate and temporary multimedia
network by using notebook or palmtop computers to distribute and allocate information
among conference or classroom participants. Besides, it can also be applied for home
networks where devices can be link. Another example includes taxicab, sports stadium, boat
and small aircraft.
-
7/31/2019 Final Report Adhoc
21/22
AD-HOC NETWORKS
21
4 Personal Area Network (PAN): Short-range MANET can simplify the
intercommunication between a lot of mobile devices such as a PDA, a laptop, and a cellular
phone and there are a lot of new devices in this for MANETs. Wired cables can easily be
replaced with wireless connections.
Ad Hoc Network Performance Issues:
1.Distribution operation: due to the existence of MANET where there is no prerequisite for
the construction of the underlying network, so routing cannot rely on a particular node to
operate.
2 Loop-freedom: all the routing protocol should be consistent with the characteristics; we
must ensure the normal work in order to avoid waste of bandwidth.
3Demand-based operation: In order to reduce the burden on each node, if the link is not so
much the demand should be considered when using On-demand approach to the
establishment of the path, and only when the need for a particular path query, the
establishment of the path.
4 Proactive operation: with the On-demand concept of the contrary, if the network resources
fairly adequate, proactive table-driven approach could speed up the path to the establishment
of speed.
5 Security: Because it is the wireless environment, to how to ensure the security of the
connection cannot be ignored will be part of network security is also a MANET from theory
to implementation of the key challenges.
-
7/31/2019 Final Report Adhoc
22/22
AD-HOC NETWORKS
22
REFRENCES
Integrating Wireless Technology by Williams Wheeler, Elsevier Digital Press. Wikipedia www.functionx.com Toh. C.K., 2002. Ad Hoc Mobile Wireless Networks Protocols and Systems. PrenticeHall,Inc
IETF MANET Working Group.http:// www.ietf.org/html.charters/manetcharter. html