You are on page 1of 20

COLLEGE OF TECHNOLOGY AND

ENGINEERING,
UDAIPUR

A Seminar report
on
AD-HOC NETWORK

Submitted toDr.P.C.Bapna
(H.O.D.)

Submitted bySandeep Kumar Poonia


B.tech. final year (E.C.E.)

CONTENTS
Introduction
Advantages and applications
Cellular VS ad-hoc network
Technical challenges and issues
Wireless MAC protocols
references

INTRODUCTION
It is defined as a collection of nodes that

communicate with each other wirelessly by using


radio signals with a shared common channel.
nodes

Path, chain or route

INTRODUCTION
It is a part of multi hop wireless network which is

also known as packet radio network.


Most of the Ad-Hoc networks use the allocated
frequencies for the Industrial, Scientific and
Medical (ISM) band.
The wireless hosts in such networks, communicate
with each other without the existing of a fixed
infrastructure and without a central control.

INTRODUCTION

o A mobile ad-hoc network can be connected to

other fixed networks or to the Internet.


o The nodes here could be named stations or radio
transmitters and receivers.
o Nodes in this network are mobiles in general.

ADVANTAGES AND APPLICATIONS


Ad-hoc networks can have more flexibility.
It is better in mobility.
It can be turn up and turn down in a very short

time.
It can be more economical.
It considered a robust network because of its nonhierarchical distributed control and management
mechanisms.

ADVANTAGES AND APPLICATIONS


Group of people with laptops and they want to

exchange files and data without having an access


point.

Sharing the internet

Connected to the internet

ADVANTAGES AND APPLICATIONS


Incase if we need to exchange information and the

network's infrastructure has been destroyed.


It is suitable for military communications at
battlefield where there is no network
infrastructure.

CELLULAR VS AD-HOC NETWORKS


Cellular network

Ad-hoc network

Infrastructure networks.

Infrastructure less networks.

Fixed, pre-located cell sites and

No base station, and rapid

base station.
Static backbone network
topology.
Relatively caring environment
and stable connectivity.
Detailed planning before base
station can be installed.
High setup costs.
Large setup time.

deployment.
Highly dynamic network
topologies.
Hostile environment and
irregular connectivity.
Ad-Hoc network automatically
forms and adapts to changes.
Cost-effective.
Less setup time.

TECHNICAL CHALLENGES AND ISSUES

Unstructured and/or time-varying network

topology: Because of the nodes mobility, that


makes the network topology usually unstructured
and makes the optimizing process a difficult task.
Energy conservation: Nodes in Ad-Hoc
networks are equipped with limited batteries.
Scalability: In some cases, there will be a huge
number of nodes.

TECHNICAL CHALLENGES AND ISSUES


Low-quality communications: In general,

wireless networks are less reliable than the wired


networks. In addition to that, the quality of the
network can be affected by the environmental
factors.
Resource-constrained computation: The
resources in Ad-Hoc networks such as energy and
network bandwidth are available in limited amounts.
Hidden-node and exposed-node problems may
occur.

TECHNICAL CHALLENGES AND ISSUES


Hidden-node problem:

Collision

Sender 1

Sender 2
Receiver

TECHNICAL CHALLENGES AND ISSUES


Exposed-node problem:

Blocked
By The
Transmitter

Receiver

Transmitter Exposed Node

AD-HOC WIRELESS MEDIA ACCESS PROTOCOLS

Why do we need MAC protocol?


If we give the node the freedom to send at any
time, then that could result in a contention.
We can't have a central controller to manage the
transmission process, because every node can
move at any time.
MAC
Protocols
SenderInitiated

ReceiverInitiated

Sender-Initiated MAC Protocols:

RTS

CTS
Receiver

Sender

Data

Multiple Access with Collision Avoidance (MACA):


It has the ability to control the transmitter power

for each packet.


It was proposed as a solution for both hidden
terminal and exposed node problems.
It uses a three-way handshake, RTS-CTS-Data.

Receiver initiated MAC protocols:

RTR

Receiver

Sender

Data

MACA-BI (By Invitation):


In MACA-BI, there is no way that the receiver will know

whether the transmitter has a data to transmit or not,


which will affect the communication performance, because
of the waiting time for the RTR messages.
MACA-BI is less likely to have a control packets collision

because it uses half as many control packets as MACA.

REFERENCE
http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?a

rnumber=4622710&abstractAccess=no&userType=inst
Www.ccs-labs.org/teaching/wsn/2011w/04-mac
.pdf
http://www.journals.elsevier.com/ad-hoc-networks/
www.it.iitb.ac.in/~sri/talks/manet.pdf

THANK YOU

You might also like