WN Unit35
WN Unit35
MANET stands for Mobile Adhoc Network also called a wireless adhoc network or Adhoc wireless network
that usually has a routable networking environment on top of a Link Layer ad hoc network. They consist of
a set of mobile nodes connected wirelessly in a self-configured, self-healing network without having a fixed
infrastructure. MANET nodes are free to move randomly as the network topology changes frequently. Each
node behaves as a router as it forwards traffic to other specified nodes in the network.
What is MANET?
A MANET is a decentralized wireless network consisting of mobile devices (nodes) that communicate with
each other without relying on a fixed infrastructure. MANET forms a highly dynamic autonomous topology
with the presence of one or multiple different transceivers between nodes. MANETs consist of a peer-to-
peer, self-forming, self-healing network MANETs circa 2000-2015 typically communicate at radio
frequencies (30MHz-5GHz). This can be used in road safety, ranging from sensors for the environment,
home, health, disaster rescue operations, air/land/navy defense, weapons, robots, etc.
Characteristics of MANET
• Dynamic Topologies: Network topology which is typically multihop may change randomly and
rapidly with time, it can form unidirectional or bi-directional links.
• Bandwidth constrained, variable capacity links: Wireless links usually have lower reliability,
efficiency, stability, and capacity as compared to a wired network
• Autonomous Behavior: Each node can act as a host and router, which shows its autonomous
behavior.
• Energy Constrained Operation: As some or all the nodes rely on batteries or other exhaustible
means for their energy. Mobile nodes are characterized by less memory, power, and lightweight
features.
• Limited Security: Wireless networks are more prone to security threats. A centralized firewall is
absent due to the distributed nature of the operation for security, routing, and host configuration.
• Less Human Intervention: They require minimum human intervention to configure the network,
therefore they are dynamically autonomous in nature.
Advantages of MANET
• Each node can play both the roles ie. of router and host showing autonomous nature.
Disadvantages of MANET
• Resources are limited due to various constraints like noise, interference conditions, etc.
• High latency i.e. There is a huge delay in the transfer of data between two sleeping nodes.
It is a pro-active/table driven routing protocol. It actually extends the distance vector routing protocol of
the wired networks as the name suggests. It is based on the Bellman-ford routing algorithm. Distance
vector routing protocol was not suited for mobile ad-hoc networks due to count-to-infinity problem. Hence,
as a solution Destination Sequenced Distance Vector Routing Protocol (DSDV) came into picture.
Destination sequence number is added with every routing entry in the routing table maintained by each
node. A node will include the new update in the table only if the entry consists of the new updated route to
the destination with higher sequence number.
These are also known as table-driven routing protocols. Each mobile node maintains a separate routing
table which contains the information of the routes to all the possible destination mobile nodes.
It is a reactive/on-demand routing protocol. In this type of routing, the route is discovered only when it is
required/needed. The process of route discovery occurs by flooding the route request packets throughout
the mobile network. In this protocol, Source node stores the complete path information and intermediate
nodes do not need to maintain routing information. It consists of two phases:
Route Discovery: This phase determines the most optimal path for the transmission of data packets
between the source and the destination mobile nodes.
Route Maintenance: This phase performs the maintenance work of the route as the topology in the
mobile ad-hoc network is dynamic in nature and hence, there are many cases of link breakage
resulting in the network failure between the mobile nodes.
These are also known as on-demand routing protocol. In this type of routing, the route is discovered only
when it is required/needed. The process of route discovery occurs by flooding the route request packets
throughout the mobile network.
• LTE stands for Long Term Evolution and is a standard for high-speed wireless communication.
• It is part of the 4G technology family and was developed by the 3rd Generation Partnership Project
(3GPP).
• Supports high data rates, offering up to 100 Mbps for downloads and 50 Mbps for uploads.
• Provides low latency, making it suitable for real-time applications like video calls and online gaming.
• Operates as an all-IP network, using Internet Protocol for both voice and data transmission.
• Designed to support high mobility, allowing reliable communication even in fast-moving vehicles.
• Increases network capacity, efficiently handling more users and higher data traffic.
• Offers flexible bandwidth options, ranging from 1.4 MHz to 20 MHz, adaptable to various frequency
ranges.
• Incorporates strong security features, including encryption and user authentication.
• Uses MIMO (Multiple Input Multiple Output) technology with multiple antennas to enhance data
speed and reliability.
• Ensures seamless handover between LTE cells and fallback to older networks like 3G when needed.
4G (Fourth Generation):
5G (Fifth Generation):
• Uses new technologies like millimeter waves, massive MIMO, and beamforming.
• Designed for enhanced mobile broadband, ultra-reliable low-latency communication, and massive
IoT.
• Operates on higher frequency bands, which allow faster data but shorter range.
• Enables new applications like autonomous vehicles, smart factories, and remote surgeries.
LTE Challenges:
5G Challenges:
Multicarrier modulation
It is a technique used in communication systems where the data is transmitted over multiple frequency
channels (carriers) simultaneously, instead of using a single carrier. This method helps improve bandwidth
efficiency, robustness against interference, and overall system performance.
In multicarrier modulation, the data is split into multiple streams and each stream is transmitted on a
separate subcarrier. The two most common types of multicarrier modulation are:
o It divides the available bandwidth into many narrow subcarriers that are orthogonal to each
other, minimizing interference between them.
o Each user is assigned a unique code to modulate their signal, and the signals from different
users are transmitted simultaneously over the same frequency band.
o Used in 3G networks.
It refers to the next-generation technologies and techniques used to provide high-speed wireless internet
access, offering improved data rates, larger coverage areas, and more efficient spectrum usage compared
to earlier wireless broadband technologies.
1. 5G Networks:
o The advent of 5G technology plays a significant role in ABWA by offering ultra-high-speed
data transmission, low latency, and massive device connectivity. It uses higher frequency
bands (including mmWave) and technologies like Massive MIMO and beamforming to
improve signal quality and coverage.
o Using mmWave frequencies (24 GHz and above), ABWA can achieve extremely high data
rates, enabling applications like 4K/8K video streaming, virtual reality, and more.
o Small cell networks, with more dense base stations, help improve coverage and capacity,
especially in urban areas where there is high demand for bandwidth.
o ABWA uses techniques like Dynamic Spectrum Sharing (DSS), which allows for more
efficient use of spectrum by dynamically allocating it based on network demand and
conditions. This is essential for supporting large-scale wireless systems like 5G.
5. Network Slicing:
o A critical aspect of 5G, network slicing allows the creation of virtual networks with
customized characteristics. This means different services (e.g., IoT, high-speed video) can be
provided with their own optimized network slices, improving both efficiency and quality of
service.
o CA combines multiple frequency bands to increase the overall data throughput, allowing for
faster speeds and more efficient use of available bandwidth.
IoT
(Internet of Things) refers to the network of physical objects, devices, and sensors that are embedded with
software, sensors, and other technologies, allowing them to collect, exchange, and share data over the
internet or other networks. These devices can range from everyday household items to sophisticated
industrial tools.
Key Points:
• Connectivity: Devices communicate via the internet to share and receive data.
• Data Collection: IoT devices gather data (e.g., temperature, location) via sensors.
Examples:
• Smart Home: Devices like thermostats, lights, and security cameras.
Benefits:
Challenges:
WSN
(Wireless Sensor Network) is a network of spatially distributed, wirelessly connected sensor nodes that
collect and transmit data about the environment or physical conditions (like temperature, humidity,
motion, etc.) to a central system for analysis.
Key Points:
• Sensor Nodes: Small devices with sensors, processors, and wireless communication capabilities.
• Data Collection: Nodes gather data from the environment (e.g., temperature, light, pressure).
• Wireless Communication: Nodes communicate wirelessly, often using low-power protocols like
Zigbee, Bluetooth, or Wi-Fi.
• Centralized Control: Data from all sensor nodes is sent to a central system for processing,
monitoring, and decision-making.
Benefits:
Challenges:
• Energy Consumption: Nodes often rely on batteries, which limit their operational lifetime.
• Network Reliability: Wireless communication can be unreliable, leading to potential data loss.
• Security: Ensuring the security of the network and data can be challenging.