0% found this document useful (0 votes)
6 views9 pages

WN Unit35

Mobile Ad hoc Networks (MANETs) are decentralized wireless networks consisting of mobile nodes that communicate without fixed infrastructure, characterized by dynamic topologies and autonomous behavior. They have advantages like self-configuration and scalability, but face challenges such as limited resources and security vulnerabilities. Various routing protocols like DSDV, DSR, and AODV are used to manage data transmission in these networks, while advancements in wireless communication technologies like LTE, 4G, and 5G enhance connectivity and performance.

Uploaded by

Ganesh Gaitonde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views9 pages

WN Unit35

Mobile Ad hoc Networks (MANETs) are decentralized wireless networks consisting of mobile nodes that communicate without fixed infrastructure, characterized by dynamic topologies and autonomous behavior. They have advantages like self-configuration and scalability, but face challenges such as limited resources and security vulnerabilities. Various routing protocols like DSDV, DSR, and AODV are used to manage data transmission in these networks, while advancements in wireless communication technologies like LTE, 4G, and 5G enhance connectivity and performance.

Uploaded by

Ganesh Gaitonde
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Introduction of Mobile Ad hoc Network (MANET)

MANET stands for Mobile Adhoc Network also called a wireless adhoc network or Adhoc wireless network
that usually has a routable networking environment on top of a Link Layer ad hoc network. They consist of
a set of mobile nodes connected wirelessly in a self-configured, self-healing network without having a fixed
infrastructure. MANET nodes are free to move randomly as the network topology changes frequently. Each
node behaves as a router as it forwards traffic to other specified nodes in the network.

What is MANET?

A MANET is a decentralized wireless network consisting of mobile devices (nodes) that communicate with
each other without relying on a fixed infrastructure. MANET forms a highly dynamic autonomous topology
with the presence of one or multiple different transceivers between nodes. MANETs consist of a peer-to-
peer, self-forming, self-healing network MANETs circa 2000-2015 typically communicate at radio
frequencies (30MHz-5GHz). This can be used in road safety, ranging from sensors for the environment,
home, health, disaster rescue operations, air/land/navy defense, weapons, robots, etc.

Characteristics of MANET

• Dynamic Topologies: Network topology which is typically multihop may change randomly and
rapidly with time, it can form unidirectional or bi-directional links.

• Bandwidth constrained, variable capacity links: Wireless links usually have lower reliability,
efficiency, stability, and capacity as compared to a wired network

• Autonomous Behavior: Each node can act as a host and router, which shows its autonomous
behavior.

• Energy Constrained Operation: As some or all the nodes rely on batteries or other exhaustible
means for their energy. Mobile nodes are characterized by less memory, power, and lightweight
features.

• Limited Security: Wireless networks are more prone to security threats. A centralized firewall is
absent due to the distributed nature of the operation for security, routing, and host configuration.

• Less Human Intervention: They require minimum human intervention to configure the network,
therefore they are dynamically autonomous in nature.

Advantages of MANET

• Separation from central network administration.

• Each node can play both the roles ie. of router and host showing autonomous nature.

• Self-configuring and self-healing nodes do not require human intervention.

• Highly scalable and suits the expansion of more network hub.

Disadvantages of MANET

• Resources are limited due to various constraints like noise, interference conditions, etc.

• Lack of authorization facilities.


• More prone to attacks due to limited physical security.

• High latency i.e. There is a huge delay in the transfer of data between two sleeping nodes.

Destination Sequenced Distance Vector Routing Protocol (DSDV):

It is a pro-active/table driven routing protocol. It actually extends the distance vector routing protocol of
the wired networks as the name suggests. It is based on the Bellman-ford routing algorithm. Distance
vector routing protocol was not suited for mobile ad-hoc networks due to count-to-infinity problem. Hence,
as a solution Destination Sequenced Distance Vector Routing Protocol (DSDV) came into picture.
Destination sequence number is added with every routing entry in the routing table maintained by each
node. A node will include the new update in the table only if the entry consists of the new updated route to
the destination with higher sequence number.

These are also known as table-driven routing protocols. Each mobile node maintains a separate routing
table which contains the information of the routes to all the possible destination mobile nodes.

Dynamic Source Routing protocol (DSR):

It is a reactive/on-demand routing protocol. In this type of routing, the route is discovered only when it is
required/needed. The process of route discovery occurs by flooding the route request packets throughout
the mobile network. In this protocol, Source node stores the complete path information and intermediate
nodes do not need to maintain routing information. It consists of two phases:

Route Discovery: This phase determines the most optimal path for the transmission of data packets
between the source and the destination mobile nodes.

Route Maintenance: This phase performs the maintenance work of the route as the topology in the
mobile ad-hoc network is dynamic in nature and hence, there are many cases of link breakage
resulting in the network failure between the mobile nodes.

These are also known as on-demand routing protocol. In this type of routing, the route is discovered only
when it is required/needed. The process of route discovery occurs by flooding the route request packets
throughout the mobile network.

Ad-Hoc On Demand Vector Routing protocol (AODV):


It is a reactive/on-demand routing protocol. It is an extension of dynamic source routing protocol (DSR)
and it helps to remove the disadvantage of dynamic source routing protocol. In DSR, after route
discovery, when the source mobile node sends the data packet to the destination mobile node, it also
contains the complete path in its header. Hence, as the network size increases, the length of the
complete path also increases and the data packet’s header size also increases which makes the whole
network slow.
Hence, Ad-Hoc On Demand Vector Routing protocol came as solution to it. The main difference lies in
the way of storing the path, in AODV Source node does not stores complete path information, instead of
that each not stores information of its previous and next node. It also operates in two phases: Route
discovery and Route maintenance.
LTE

• LTE stands for Long Term Evolution and is a standard for high-speed wireless communication.
• It is part of the 4G technology family and was developed by the 3rd Generation Partnership Project
(3GPP).
• Supports high data rates, offering up to 100 Mbps for downloads and 50 Mbps for uploads.
• Provides low latency, making it suitable for real-time applications like video calls and online gaming.
• Operates as an all-IP network, using Internet Protocol for both voice and data transmission.
• Designed to support high mobility, allowing reliable communication even in fast-moving vehicles.
• Increases network capacity, efficiently handling more users and higher data traffic.
• Offers flexible bandwidth options, ranging from 1.4 MHz to 20 MHz, adaptable to various frequency
ranges.
• Incorporates strong security features, including encryption and user authentication.
• Uses MIMO (Multiple Input Multiple Output) technology with multiple antennas to enhance data
speed and reliability.
• Ensures seamless handover between LTE cells and fallback to older networks like 3G when needed.
4G (Fourth Generation):

• Offers download speeds up to 100 Mbps (theoretical) under ideal conditions.

• Latency is typically around 30–50 milliseconds.

• Uses LTE (Long Term Evolution) as its main technology.

• Designed mainly for mobile broadband (faster internet, HD streaming, VoIP).

• Supports limited IoT and machine-to-machine communication.

• Has broader coverage and is widely deployed across the globe.

• Operates on lower frequency bands, providing good range and penetration.

• Suitable for most current smartphone and internet use cases.

• Relatively mature and stable with strong infrastructure support.

• Can experience congestion in densely populated areas.

5G (Fifth Generation):

• Offers extremely high download speeds, up to 10 Gbps or more (theoretical).

• Ultra-low latency, as low as 1 millisecond, enabling near real-time communication.

• Uses new technologies like millimeter waves, massive MIMO, and beamforming.

• Designed for enhanced mobile broadband, ultra-reliable low-latency communication, and massive
IoT.

• Supports a much higher number of devices per square kilometer.

• Still under global rollout; availability is limited compared to 4G.

• Operates on higher frequency bands, which allow faster data but shorter range.

• Enables new applications like autonomous vehicles, smart factories, and remote surgeries.

• Offers better energy efficiency and network slicing capabilities.

• Requires more base stations due to reduced range of high-frequency signals.

LTE Challenges:

1. Spectrum scarcity leads to congestion in crowded areas.

2. Interference from neighboring cells impacts performance.

3. Higher latency compared to emerging technologies like 5G.

4. High energy consumption in both base stations and devices.

5. Network congestion during peak usage times reduces speeds.


4G Challenges:

1. Limited global coverage, especially in rural areas.

2. Speed bottlenecks due to network congestion.

3. Compatibility issues with older technologies like 2G/3G.

4. Higher latency for real-time applications like AR/VR.

5. Complex network management across different technologies.

5G Challenges:

1. High infrastructure costs for new network components.

2. Difficulty in managing spectrum across various frequency bands.

3. Interoperability issues with existing LTE networks.

4. Increased security risks and data privacy concerns.

5. Achieving low latency and reliability for critical applications.

Multicarrier modulation

It is a technique used in communication systems where the data is transmitted over multiple frequency
channels (carriers) simultaneously, instead of using a single carrier. This method helps improve bandwidth
efficiency, robustness against interference, and overall system performance.

In multicarrier modulation, the data is split into multiple streams and each stream is transmitted on a
separate subcarrier. The two most common types of multicarrier modulation are:

1. Orthogonal Frequency Division Multiplexing (OFDM):

o It divides the available bandwidth into many narrow subcarriers that are orthogonal to each
other, minimizing interference between them.

o Used in systems like LTE, Wi-Fi, and 5G.

2. Code Division Multiple Access (CDMA):

o Each user is assigned a unique code to modulate their signal, and the signals from different
users are transmitted simultaneously over the same frequency band.

o Used in 3G networks.

Advanced Broadband Wireless Access (ABWA)

It refers to the next-generation technologies and techniques used to provide high-speed wireless internet
access, offering improved data rates, larger coverage areas, and more efficient spectrum usage compared
to earlier wireless broadband technologies.

Some key components and advancements in ABWA include:

1. 5G Networks:
o The advent of 5G technology plays a significant role in ABWA by offering ultra-high-speed
data transmission, low latency, and massive device connectivity. It uses higher frequency
bands (including mmWave) and technologies like Massive MIMO and beamforming to
improve signal quality and coverage.

2. Millimeter-Wave (mmWave) Communications:

o Using mmWave frequencies (24 GHz and above), ABWA can achieve extremely high data
rates, enabling applications like 4K/8K video streaming, virtual reality, and more.

3. Small Cells and Dense Network Deployment:

o Small cell networks, with more dense base stations, help improve coverage and capacity,
especially in urban areas where there is high demand for bandwidth.

4. Dynamic Spectrum Access:

o ABWA uses techniques like Dynamic Spectrum Sharing (DSS), which allows for more
efficient use of spectrum by dynamically allocating it based on network demand and
conditions. This is essential for supporting large-scale wireless systems like 5G.

5. Network Slicing:

o A critical aspect of 5G, network slicing allows the creation of virtual networks with
customized characteristics. This means different services (e.g., IoT, high-speed video) can be
provided with their own optimized network slices, improving both efficiency and quality of
service.

6. Carrier Aggregation (CA):

o CA combines multiple frequency bands to increase the overall data throughput, allowing for
faster speeds and more efficient use of available bandwidth.

IoT

(Internet of Things) refers to the network of physical objects, devices, and sensors that are embedded with
software, sensors, and other technologies, allowing them to collect, exchange, and share data over the
internet or other networks. These devices can range from everyday household items to sophisticated
industrial tools.

Key Points:

• Connectivity: Devices communicate via the internet to share and receive data.

• Data Collection: IoT devices gather data (e.g., temperature, location) via sensors.

• Automation: Devices can automatically perform tasks or be remotely controlled.

• Integration: IoT works with technologies like AI for smarter decision-making.

Examples:
• Smart Home: Devices like thermostats, lights, and security cameras.

• Wearables: Fitness trackers and smartwatches.

• Industrial IoT: Sensors for machine monitoring in factories.

• Smart Cities: Traffic and waste management systems.

Benefits:

• Efficiency: Automates tasks and improves decision-making.

• Convenience: Simplifies daily activities.

• Cost Savings: Reduces operational costs and increases efficiency.

Challenges:

• Security: Increased risk of data breaches.

• Interoperability: Devices may not work well together.

• Data Management: Large volumes of data can be overwhelming.

WSN

(Wireless Sensor Network) is a network of spatially distributed, wirelessly connected sensor nodes that
collect and transmit data about the environment or physical conditions (like temperature, humidity,
motion, etc.) to a central system for analysis.

Key Points:

• Sensor Nodes: Small devices with sensors, processors, and wireless communication capabilities.

• Data Collection: Nodes gather data from the environment (e.g., temperature, light, pressure).

• Wireless Communication: Nodes communicate wirelessly, often using low-power protocols like
Zigbee, Bluetooth, or Wi-Fi.

• Centralized Control: Data from all sensor nodes is sent to a central system for processing,
monitoring, and decision-making.

Examples of WSN Applications:

• Environmental Monitoring: Monitoring weather, pollution, or soil conditions.

• Industrial Automation: Monitoring equipment performance or factory environments.

• Health Care: Remote patient monitoring with wearable sensors.

• Smart Cities: Traffic or infrastructure monitoring using sensor networks.

Benefits:

• Remote Monitoring: Can monitor areas that are difficult to access.

• Real-Time Data: Provides immediate insights for better decision-making.


• Scalability: Can scale from small setups to large networks.

Challenges:

• Energy Consumption: Nodes often rely on batteries, which limit their operational lifetime.

• Network Reliability: Wireless communication can be unreliable, leading to potential data loss.

• Security: Ensuring the security of the network and data can be challenging.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy