请输入您要查询的百科知识:

 

词条 Mobile ad hoc network
释义

  1. Types

  2. Advantages and disadvantages in wireless communication networks

  3. Applications

  4. Simulations

      Emulation testbed  

  5. Data monitoring and mining

  6. Trust management

  7. See also

  8. References

  9. Further reading

  10. External links

{{merge to|Wireless ad hoc network|date=January 2018|discuss=Talk:Wireless_ad_hoc_network#Merge_Mobile_ad_hoc_network}}

A mobile ad hoc network (MANET), also known as wireless ad hoc network [1] or ad hoc wireless network, is a continuously self-configuring, infrastructure-less network of mobile devices connected wirelessly.[2][3]

Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic.[4] Such networks may operate by themselves or may be connected to the larger Internet. They may contain one or multiple and different transceivers between nodes. This results in a highly dynamic, autonomous topology.[4]

MANETs are a kind of wireless ad hoc network (WANET) that usually has a routable networking environment on top of a Link Layer ad hoc network. MANETs consist of a peer-to-peer, self-forming, self-healing network. MANETs circa 2000–2015 typically communicate at radio frequencies (30 MHz – 5 GHz).

The growth of laptops and 802.11/Wi-Fi wireless networking have made MANETs a popular research topic since the mid-1990s. Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc.

Types

  • Vehicular ad hoc networks (VANETs) are used for communication between vehicles and roadside equipment.[5] Intelligent vehicular ad hoc networks (InVANETs) are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents.
  • Smart phone ad hoc networks (SPANs) leverage the existing hardware (primarily Bluetooth and Wi-Fi) in commercially available smart phones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. SPANs differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop relays and there is no notion of a group leader so peers can join and leave at will without destroying the network.
  • {{anchor|iMANET}} Internet-based mobile ad-hoc networks (iMANETs) is a type of wireless ad hoc network that supports Internet protocols such as TCP/UDP and IP. The network uses a network-layer routing protocol to link mobile nodes and establish routes distributedly and automatically.
  • Hub-Spoke MANET – Multiple sub-MANETs may be connected in a classic Hub-Spoke VPN to create a geographically distributed MANET. In such type of networks normal ad hoc routing algorithms does not apply directly. One implementation of this is Persistent System's CloudRelay.
  • Military or tactical MANETs are used by military units with emphasis on data rate, real-time requirement, fast re-routing during mobility, data security, radio range, and integration with existing systems.[6] Common radio waveforms include the US Army's JTRS SRW and Persistent System's WaveRelay.
  • Flying ad hoc networks (FANETs) are composed of unmanned aerial vehicles, allowing great mobility and providing connectivity to remote areas.[7]

Advantages and disadvantages in wireless communication networks

The obvious appeal of MANETs is that the network is decentralised and nodes/devices are mobile, that is to say there is no fixed infrastructure which provides the possibility for numerous applications in different areas such as environmental monitoring [1], [2], disaster relief [3]–[5] and military communications [3].

Since the early 2000s interest in MANETs has greatly increased which, in part, is due to the fact mobility can improve network capacity, shown by Grossglauser and Tse along with the introduction of new technologies.[8]

One main advantage to a decentralised network is that they are typically more robust than centralised networks due to the multi-hop fashion in which information is relayed. For example, in the cellular network setting, a drop in coverage occurs if a base station stops working, however the chance of a single point of failure in a MANET is reduced significantly since the data can take multiple paths. Since the MANET architecture evolves with time it has the potential to resolve issues such as

isolation/disconnection from the network. Further advantages of MANETS over networks with a fixed topology include flexibility (an ad hoc network can be created anywhere with mobile devices), scalability (you can easily add more nodes to the network) and lower administration costs (no need to build an infrastructure first).[9][10]

With these positives follow some obvious draw backs in network performance. With a time evolving network it is clear we should expect variations in network performance due to no fixed architecture (no fixed connections). Furthermore, since network topology determines interference and thus connectivity, the mobility pattern of devices within the network will impact on network performance, possibly resulting in data having to be resent a lot of times (increased delay) and finally allocation of network resources such as power remains unclear.[8]

Finally, finding a model that accurately represents human mobility whilst remaining mathematically tractable remains an open problem due to the large range of factors that influence it.[11]

Some typical models used include the random walk, random waypoint and levy flight models.[12][13]

[14][15]

Applications

Mobile ad hoc networks can be used in many applications, ranging from sensors for environment, vehicular ad hoc communications, road safety, health, home, peer-to-peer messaging, disaster rescue operations, air/land/navy defense, weapons, robots, etc. See the application section in wireless ad hoc networks.

Simulations

There are several ways to study MANETs. One solution is the use of simulation tools like OPNET, NetSim or ns2.

A comparative study of various simulators for VANETs reveal that factors such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion, drivers' behavior, etc., have to be taken into consideration in the simulation process to reflect realistic conditions.[16]

Emulation testbed

In 2009, the U.S. Army Research Laboratory (ARL) and Naval Research Laboratory (NRL) developed a Mobile Ad-Hoc Network emulation testbed, where algorithms and applications were subjected to representative wireless network conditions. The testbed was based on a version of the "MANE" (Mobile Ad hoc Network Emulator) software originally developed by NRL.[17]

ARL, NRL and Consulting & Engineering Next Generation Networks (CENGN) later expanded the original testbed to form eMANE, which provided a system capable of modeling network systems with complex, heterogeneous connectivity (i.e. multiple, different radio interfaces).[17]

Data monitoring and mining

MANETS can be used for facilitating the collection of sensor data for data mining for a variety of applications such as air pollution monitoring and different types of architectures can be used for such applications.[18] It should be noted that a key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as more efficient routing strategies.[19] Also, researchers have developed performance models for MANET to apply queueing theory.[20][21]

Trust management

Trust establishment and management in MANETs face challenges due to resource constraints and the complex interdependency of networks. Managing trust in a MANET needs to consider the interactions between the composite cognitive, social, information and communication networks, and take into account the resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions).[22]

Researchers of trust management in MANET suggested that such complex interactions require a composite trust metric that captures aspects of communications and social networks, and corresponding trust measurement, trust distribution, and trust management schemes.[22]

See also

  • Wireless ad hoc network
  • AmbientTalk, an experimental programming language for MANETs
  • Backpressure routing
  • Cross-layer interaction and service mapping
  • Delay-tolerant networking
  • List of ad hoc routing protocols
  • Mobile wireless sensor network
  • Smart meter
  • Wireless community network
  • Wireless mesh network
  • Wireless sensor networks

References

1. ^{{cite book|url=https://books.google.com/?id=0hMfAQAAIAAJ |title=Wireless ATM & Ad Hoc Networks|year=1997|publisher=Kluwer Academic Press|isbn=9780792398226}}
2. ^{{cite conference|title=A Survey on Centralised and Distributed Clustering Routing Algorithms for WSNs|date=May 2015|publisher=|pages=1–6|doi=10.1109/VTCSpring.2015.7145650|url=https://www.researchgate.net/profile/Morteza_Mohammadi_Zanjireh/publication/274638337_A_Survey_on_Centralised_and_Distributed_Clustering_Routing_Algorithms_for_WSNs/links/552444b80cf2b123c5173968/A-Survey-on-Centralised-and-Distributed-Clustering-Routing-Algorithms-for-WSNs.pdf|author=Morteza M. Zanjireh|author2=Hadi Larijani|conference=Conference: IEEE 81st Vehicular Technology Conference: VTC2015-Spring|location=Glasgow, Scotland}}
3. ^{{Cite book| title = Ad Hoc Mobile Wireless Networks: Protocols and Systems 1st Edition| work = Prentice Hall PTR.| author = Chai Keong Toh| date = 2002| isbn = 978-0130078179}}
4. ^{{cite book|url=https://www.researchgate.net/publication/257373717|first1=M. M.|title=2013 27th International Conference on Advanced Information Networking and Applications Workshops|last1=Zanjireh|first2=A.|last2=Shahrabi|first3=H.|last3=Larijani|date=1 March 2013|publisher=|pages=450–455|doi=10.1109/WAINA.2013.242|isbn=978-1-4673-6239-9}}
5. ^{{cite journal|title=Emergency Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks|last=Martinez|last2=Toh|last3=Cano|last4=Calafate|last5=Manzoni|journal=IEEE Intelligent Transportation Systems Magazine|volume=2|issue=2|pages=6–20|year=2010|doi=10.1109/MITS.2010.938166}}
6. ^{{cite journal|url=https://www.researchgate.net/publication/228887934 |title=Next Generation Tactical Ad Hoc Mobile Wireless Networks|last=Toh|last2=Lee|last3=Ramos|journal=TRW Systems Technology Journal|year=2002}}
7. ^{{cite book |author1= Antonio Guillen-Perez |author2=Ramon Sanchez-Iborra |author3=Maria-Dolores Cano |author4=Juan Carlos Sanchez-Aarnoutse |author5= Joan Garcia-Haro|title=WiFi networks on drones |journal=ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT) |pages=1–8 |year=2016 |doi=10.1109/ITU-WT.2016.7805730|isbn=978-9-2612-0451-8 }}
8. ^{{cite conference|last1=Grossglauser|first1=M|last2=Tse|first2=D|title=Mobility increases the capacity of ad-hoc wireless networks|conference=Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies|publisher=IEEE Proceedings|date=2001|volume=3|pages=1360–1369}}
9. ^{{cite journal|last1=Helen|first1=D|last2=Arivazhagan|first2=D|title=Applications, advantages and challenges of ad hoc networks|journal=JAIR|date=2014|volume=2|issue=8|pages=453–457}}
10. ^{{cite book|last1=Giordano|first1=S|chapter=Mobile ad hoc networks|title=Handbook of wireless networks and mobile computing|date=2002|pages=325–346}}
11. ^{{cite journal|last1=Gonzalez|first1=Marta C|last2=Hidalgo|first2=Cesar A|last3=Barabasi|first3=Albert-Laszlo|title=Understanding individual human mobility patterns|journal=Nature|date=2008|volume=453|issue=7196|pages=779–782|doi=10.1038/nature06958|pmid=18528393|arxiv=0806.1256|bibcode=2008Natur.453..779G}}
12. ^{{cite journal|last1=Brockmann|first1=Dirk|last2=Hufnagel|first2=Lars|last3=Geisel|first3=Theo|title=The scaling laws of human travel|journal=Nature|date=2006|volume=439|issue=7075|pages=462–465|doi=10.1038/nature04292|pmid=16437114|arxiv=cond-mat/0605511|bibcode=2006Natur.439..462B}}
13. ^{{cite journal|last1=Bettstetter|first1=C|last2=Resta|first2=G|last3=Santi|first3=P|title=The node distribution of the random waypoint mobility model for wireless ad hoc networks|journal=IEEE Transactions on Mobile Computing|date=2003|volume=2|issue=3|pages=257–269|doi=10.1109/tmc.2003.1233531|citeseerx=10.1.1.576.3842}}
14. ^{{cite journal|last1=Hyytia|first1=E|last2=Lassila|first2=P|last3=Virtamo|first3=J|title=Spatial node distribution of the random waypoint mobility model with applications|journal=IEEE Transactions on Mobile Computing|date=2006|volume=5|issue=6|pages=680–694|doi=10.1109/tmc.2006.86|citeseerx=10.1.1.59.3414}}
15. ^{{cite journal|last1=Figueiredo|first1=A|last2=Gleria|first2=I|last3=Matsushita|first3=R|title=On the origins of truncated Lévy flights|journal=Physics Letters A|date=2003|volume=315|issue=1|pages=51–60|doi=10.1016/s0375-9601(03)00976-9|bibcode=2003PhLA..315...51F|citeseerx=10.1.1.563.4078}}
16. ^{{cite journal|title=A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)|last1=Martinez| last2 = Toh| last3 = Cano|displayauthors=etal|journal=Wireless Communications Journal|year=2009|volume=11|issue=7|pages=813–828|doi=10.1002/wcm.859}}
17. ^{{Cite book|chapter-url=https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5379781|title=Mobile Ad Hoc Network emulation environment - IEEE Conference Publication|pages=1–6|language=en-US|doi=10.1109/MILCOM.2009.5379781|chapter=Mobile Ad Hoc Network emulation environment|year=2009|last1=Ivanic|first1=Natalie|last2=Rivera|first2=Brian|last3=Adamson|first3=Brian|isbn=978-1-4244-5238-5|citeseerx=10.1.1.414.4950}}
18. ^{{Cite journal | last1 = Ma | first1 = Y. | last2 = Richards | first2 = M. | last3 = Ghanem | first3 = M. | last4 = Guo | first4 = Y. | last5 = Hassard | first5 = J. | title = Air Pollution Monitoring and Mining Based on Sensor Grid in London | doi = 10.3390/s8063601 | journal = Sensors | volume = 8 | issue = 6 | pages = 3601 | year = 2008 | pmid = | pmc = }}
19. ^{{Cite journal | last1 = Ma | first1 = Y. | last2 = Guo | first2 = Y. | last3 = Tian | first3 = X. | last4 = Ghanem | first4 = M. | title = Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks | doi = 10.1109/JSEN.2010.2056916 | journal = IEEE Sensors Journal | volume = 11 | issue = 3 | pages = 641 | year = 2011 | pmid = | pmc = | bibcode = 2011ISenJ..11..641M | citeseerx = 10.1.1.724.1158 }}
20. ^{{cite journal|url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1092768&tag=1|title=Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics|journal=IEEE Transactions on Communications|volume=23|issue=12|pages=1400–1416|last1=Kleinrock|first1=Leonard|year=1975|doi=10.1109/TCOM.1975.1092768|citeseerx=10.1.1.475.2016}}
21. ^{{cite book|chapter-url=http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4753376&tag=1|chapter=Tunable traffic control for multihop CSMA networks |last1=Shi|first1=Zhefu|title=MILCOM 2008 - 2008 IEEE Military Communications Conference |pages=1–7 |last2=Beard|first2=Cory|last3=Mitchell|first3=Ken|year=2008|doi=10.1109/MILCOM.2008.4753376 |isbn=978-1-4244-2676-8 }}
22. ^{{Cite journal|title=A Survey on Trust Management for Mobile Ad Hoc Networks - IEEE Journals & Magazine|journal=IEEE Communications Surveys & Tutorials|volume=13|issue=4|pages=562–583|language=en-US|doi=10.1109/SURV.2011.092110.00088|year=2011|last1=Cho|first1=Jin-Hee|last2=Swami|first2=Ananthram|last3=Chen|first3=Ing-Ray|citeseerx = 10.1.1.409.2078}}

Further reading

  • {{cite journal

| first1=D.|last1=Satyajeet|first2=A. R.|last2=Deshmukh|first3=S. S.|last3=Dorle
| title=Article: Heterogeneous Approaches for Cluster based Routing Protocol in Vehicular Ad Hoc Network (VANET)
| journal=International Journal of Computer Applications, Published by Foundation of Computer Science (FCS), New York, USA
| volume=134
| number=12
| pages=1–8
| date=January 2016
| url=http://www.ijcaonline.org/research/volume134/number12/satyajeet-2016-ijca-908080.pdf|doi=10.5120/ijca2016908080
|bibcode=2016IJCA..134l...1S}}
  • {{cite journal

| last1= Royer|first1=E.|author2=Chai Keong Toh
| title= A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
| journal= IEEE Personal Communications
|date=April 1999
| volume = 6
| issue = 2
| pages= 46–55
| doi= 10.1109/98.760423
|citeseerx=10.1.1.11.8637}}
  • {{cite journal

| last1= Mauve|first1=M.|last2=Widmer|first2=J.|last3=Hartenstein|first3=H.
| title= A Survey on Position-Based Routing in Mobile Ad Hoc Networks
| journal= IEEE Network
|date=December 2001
| volume = 1
| issue = 6
| pages= 30–39
| doi= 10.1109/65.967595
|citeseerx=10.1.1.25.2774}}
  • {{cite journal

| first1= D.|last1=Djenouri|first2=L.|last2=Kheladi|first3=N.|last3=Badache
| title= A Survey of Security Issues in Mobile Ad hoc and Sensor Networks
| journal= IEEE Communications Surveys and Tutorials
| date=October 2005
| volume = 7
| issue = 4
| url=http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=1593277
}}
  • {{cite journal

| last= Maihöfer|first=C.
| title= A Survey on Geocast Routing Protocols
| journal= IEEE Communications Surveys and Tutorials
| date=April 2004
| volume = 6
| issue = 2
| url=http://www.comsoc.org/livepubs/surveys/public/2004/apr/maihofer.html
}}
  • {{cite journal

| first1= Rutvij H.|last1=Jhaveri|first2=Narendra M.|last2=Patel
| title= A Sequence Number Based Bait Detection Scheme to Thwart Grayhole Attack in Mobile Ad-hoc Networks
| journal= Wireless Networks-The Journal of Mobile Communication, Computation and Information
|date=2015
| volume= 21
| issue= 8
| pages= 2781–2798
| doi=10.1007/s11276-015-0945-9
}}
  • {{cite journal

| first1= Rutvij H.|last1=Jhaveri|first2=Narendra M.|last2=Patel
| title= Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks
| journal= International Journal of Communication Systems
|date=2017
| volume= 30
| issue= 7
| doi=10.1002/dac.3148
| page=e3148
}}
  • {{cite journal

| first1= Jose|last1=Cano|first2=Juan-Carlos|last2=Cano|first3=Chai-Keong|last3=Toh|first4=Carlos T.|last4=Calafate|first5=Pietro|last5=Manzoni
| title= EasyMANET: an extensible and configurable platform for service provisioning in MANET environments
| journal= IEEE Communications Magazine
|date=2010
| volume= 48
| issue= 12
| pages= 159–167
| doi=10.1109/mcom.2010.5673087
}}{{cite journal
| first=Robert E.|last=Kahn|authorlink= Bob Kahn
| title= The Organization of Computer Resources into a Packet Radio Network
| journal= IEEE Transactions on Communications
|date=January 1977
| volume= COM-25
| issue= 1
| pages= 169–178
| doi=10.1109/tcom.1977.1093714
}}
  • {{cite journal

| last1= Jubin|first1=J.|last2=Tornow|first2=J. D.
| title= The DARPA Packet Radio Network Protocols
| journal= Proceedings of the IEEE
|date=January 1987
| volume= 75
| issue= 1
| doi = 10.1109/proc.1987.13702
| pages=21–32
}}
  • {{cite journal

| first1= N.|last1=Schacham|first2=J.|last2=Westcott
| title= Future directions in packet radio architectures and protocols
| journal= Proceedings of the IEEE
|date=January 1987
| volume= 75
| issue= 1
| pages= 83–99
| doi= 10.1109/PROC.1987.13707
}}

External links

  • [https://datatracker.ietf.org/wg/manet/about/ IETF MANET group]
{{Channel access methods}}

2 : Radio resource management|Wireless networking

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/24 9:21:40