Application Scenarios

Ad-hoc applications

  • Personal area networking.

    • Cell phone, laptop, earphone, wristwatch.

  • Military environments.

    • Soldiers, tanks, planes.

  • Civilian environments.

    • Taxi cab network.

    • Meeting rooms.

    • Sports stadiums.

    • Boats, small aircraft.

  • Emergency operations.

    • Search-and-rescue.

    • Policing and firefighting.

Usage scenarios

Setting up fixed access points and backbone infrastructure is not always viable.

  • Infrastructure may not be present in a disaster area or war zone.

  • Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m).

Ad-hoc networks.

  • Do not need backbone infrastructure support.

  • Are easy to deploy.

  • Useful when infrastructure is absent, destroyed, or impractical.

Or when the objective is to have.

  • Self-adapting and self-sufficient networks.

  • Networks with constant changes.

  • Networks that require mobility.

  • Moving networks.

  • The requirement to absent any external configuration and management process.

Civilian environments

  • Computer science classroom.

    • An ad-hoc network between student laptops.

  • Conference.

    • Users in different rooms access services through other users.

  • Shopping malls, restaurants, and coffee shops.

    • Customers spend part of the day in a networked mall of specialty shops, coffee shops, and restaurants.

  • Large campus.

    • Employees of a company moving within a large campus with laptops, and cellphones.

  • Traffic networks (smart cars and smart roads).

  • Board systems talk with the road.

    • Map delays and blocks.

    • Obtain maps.

    • Inform the road about its actions.

  • Finding out empty parking lots in a city, without asking a server.

  • Car-to-car communication.

Military environments

Combat regiment in the field.

  • Around 4000-8000, objects are in constant and unpredictable movement.

Force intercommunication.

  • Proximity, function, battle plan.

Moving soldiers with wearable computers.

  • Eavesdropping, denial-of-service, and impersonation attacks can be launched.

Advantages.

  • Low detection probability.

  • Random topology and association between nodes.

Last updated