23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ad Hoc Networks 7-3<br />

FIGURE 7.2<br />

Vehicular ad hoc networks.<br />

rapid deployment of these <strong>systems</strong> at a lower cost, without having to lay cables to each sensor. To sum up,<br />

ad hoc networks and alternative technologies are enabling direct intelligent <strong>communication</strong> between entities.<br />

This new paradigm is poised to change the way we interact with the world and perform different tasks.<br />

7.1.3 ad Hoc Network Characteristic<br />

One of the key characteristics of ad hoc networks is mobility due to rapid repositioning of nodes. These<br />

nodes can either move independently or are grouped together while their movement can be random<br />

or along preplanned routes. These mobility models can have major impact on selecting an appropriate<br />

routing scheme, which may influence the performance of the network. Another characteristic of ad hoc<br />

networks is multihopping where the path from the source to destination includes several other intermediate<br />

nodes. Wide-area ad hoc networks often exhibit multiple hops for obstacle negotiation, spectrum<br />

reuse, and energy conservation. Besides, an ad hoc network must effectively handle problems pertaining<br />

to addressing, routing, clustering, position identification, and power control, just to name a few.<br />

Another important feature of the ad hoc networks is energy conservation. Designing energy-efficient<br />

protocol is critical for prolonged operation since most ad hoc nodes have limited power. The ad hoc<br />

networks can sometimes grow up to several thousand nodes, all moving in an unpredictable manner.<br />

Although it may be possible to find an ad hoc solution for a few fast nodes or for a very large number<br />

of static nodes, the problem arises when a large number of heterogeneous nodes move in random<br />

direction with different speed over an unpredictable terrain. Thus, multihop, mobility, and large network<br />

size combined with varying device characteristics (heterogeneity, bandwidth, and battery power<br />

constraints) make the design of adequate routing protocol a major challenge. Besides, ad hoc network<br />

should be able to prevent any attempt from intruders to eavesdrop and jam the channel. Due to open<br />

P2P network architecture, the ad hoc networks are more vulnerable against malicious attacks than the<br />

infrastructured counterparts. These attacks can be active or passive; either an attacker actively disrupts<br />

network operations or simply monitors data, controls traffic patterns, and relays this information to<br />

the enemy headquarters. The security for ad hoc networks, therefore, involves key establishment, trust<br />

setup, secure routing, authentication, data aggression, etc., and is therefore a lot more challenging than<br />

in conventional networks.<br />

7.1.4 Enabling Technologies<br />

IEEE 802.11 WLAN [802.11] is the most popular technology for ad hoc networks. There are various<br />

working groups for the standards offering highest data rate up to 54.Mbps and enhancing<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!