0% found this document useful (0 votes)
36 views1 page

3.2.2 Service Discovery and Resource Selection

Ad hoc networks have no base stations or terminals, so all devices serve as both routers and hosts. Routing algorithms must directly handle mobility due to the dynamic topology. Security issues include creating trusted relationships without certification and denial of service attacks from battery exhaustion. Personal area networks like Bluetooth are well suited for ad hoc networking, though security may be better due to restricted range and different mobility than wide area networks. Future applications of ad hoc networking will likely focus on connecting personal devices for local or internet access and enabling interconnection between users' devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views1 page

3.2.2 Service Discovery and Resource Selection

Ad hoc networks have no base stations or terminals, so all devices serve as both routers and hosts. Routing algorithms must directly handle mobility due to the dynamic topology. Security issues include creating trusted relationships without certification and denial of service attacks from battery exhaustion. Personal area networks like Bluetooth are well suited for ad hoc networking, though security may be better due to restricted range and different mobility than wide area networks. Future applications of ad hoc networking will likely focus on connecting personal devices for local or internet access and enabling interconnection between users' devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

immediately obvious in ad hoc networking because in truly ad hoc systems, there is

no difference between radio units; that is, there are no distinctive base stations or
terminals. Stated in terms of routing, the whole network is based on the idea that
devices serve both as routers and hosts at the same time. Due to the dynamic and
volatile nature of the topology defined by such nodes, the routing algorithms
directly handle the mobility.
Security issues in ad hoc networking are discussed in [11, 12]. The main security
problem is to create trusted relationships between the cryptographic public keys
without the aid of a trusted third-party certification. In addition, there are other
security issues specific to ad hoc networking, for example, the “battery exhaustion
attack” as a special form of denial of service attack.
The PAN technology, especially Bluetooth, is probably the first commercial
real-world network where ad hoc networking concepts fit very well and could help
to create robust and flexible network connectivity. The ad hoc networking approach
in investigating WPANs should result from the instantiation of the general ad hoc
approach with WPAN-specific attributes. Thus, the restricted radio coverage area
can be beneficial from the security viewpoint; the mobility of nodes and the topology
dynamics are different in WPAN ad hoc networks compared to the wide area ad hoc
networks.
Although the concepts of ad hoc networking are much broader than the WPAN
scenarios (e.g., wide area ad hoc networks), the products that apply those concepts
will most likely see light in the short, personal area range [13]. These products will
mainly focus on facilitating communication between a user’s personal devices, either
for local traffic or as gateways to the Internet. The ad hoc network functionality will
also enable the interconnection of different users’ devices—for instance, to facilitate
larger ad hoc WGs. The intrinsic ability to create generic, small-scale, ad hoc networks
in portable devices represents an entirely new area for future ad hoc-based
applications.
3.2.2 Service Discovery and Resource Selection
Service discovery is in fact a part of distributed computing. In its simplest variant,
the service discovery enables a computing device to have access to the service
that is available within its communication range. For example, a PDA finds
a printer within its proximity, recognizes it as an available computer resource
(provided that certain security conditions are satisfied), and uses it as if the
printer were installed in the PDA’s software. Generally stated, service discovery
refers to the process of establishing an on-demand connection at higher protocol
stack levels (ultimately with seamless connection at the application level) with hardware
that is physically available. With service discovery, devices may automatically
discover network services including their properties, and services may advertise their
existence in a dynamic way. In a generalized case, the service sought might not be
within physical communication range of the entity that initiates the service discovery
(one-hop service discovery). Nevertheless, it should eventually be possible to access
the service, provided that there is still network connection between the entity and the
service. In this case, the network connection may be a multihop ad hoc connection

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy