Notes - MIECT
Redes E Sistemas Autónomos
Notes - MIECT
Redes E Sistemas Autónomos
  • Redes e Sistemas Autónomos
  • Peer-to-Peer Systems and Networks
    • Content Distribution Networks
    • Peer-to-peer networks
      • Types
    • Structured vs Unstructured
    • Fully Decentralized Information System
    • FastTrack/KaZaA
    • OpenNAP/Napster
    • BitTorrent
  • InterPlanetary File System (IPFS)
    • IPFS
      • Bitswap
    • Connecting an IPFS node to the P2P network
    • Searching in DHTs (Structured)
    • File Search
    • Security
  • Ad-Hoc Networks
    • Mobile Ad-hoc networks
    • Application Scenarios
    • Routing
      • AODV - Ad Hoc On-Demand Distance Vector Routing
      • OLSR - Optimized Link State Routing Protocol
      • LAR – Location Aided Routing
      • Batman
    • IP Address Assignment
  • Self-organized systems: Data, learning and decisions
    • Use Cases and Data
    • Machine Learning
      • Supervised Learning
      • Neural Networks
      • Reinforcement Learning
      • Unsupervised Learning: K-means
    • Learning
  • Vehicular Networks
    • Vehicular Ad Hoc Networks
    • How do they work?
    • SPAT: Signal Phase And Timing
    • MAP: MAP
    • Manoeuvre Coordination Message (MCM)
    • Communication Technologies
  • QoS and Security
    • TCP- and UDP-based applications
      • TCP-Cubic
    • QUIC
    • TCP-Vegas
    • Classification of Transport protocols
    • Exploiting Buffering Capabilities
    • QoS in UDP: trade-offs
    • Transmission Quality (Batman v.3)
    • QoS-OLSR
    • Security
      • Key Management
      • RSA (Rivest-Shamir-Adleman) Key
      • Key Management in ad-hoc networks
      • Self-organized public key management (SOPKM)
      • Self-securing ad-hoc wireless networks (SSAWN)
Powered by GitBook
On this page
  • Ad-hoc applications
  • Usage scenarios
  • Civilian environments
  • Military environments
  1. Ad-Hoc Networks

Application Scenarios

Ad-hoc applications

  • Personal area networking.

    • Cell phone, laptop, earphone, wristwatch.

  • Military environments.

    • Soldiers, tanks, planes.

  • Civilian environments.

    • Taxi cab network.

    • Meeting rooms.

    • Sports stadiums.

    • Boats, small aircraft.

  • Emergency operations.

    • Search-and-rescue.

    • Policing and firefighting.

Usage scenarios

Setting up fixed access points and backbone infrastructure is not always viable.

  • Infrastructure may not be present in a disaster area or war zone.

  • Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m).

Ad-hoc networks.

  • Do not need backbone infrastructure support.

  • Are easy to deploy.

  • Useful when infrastructure is absent, destroyed, or impractical.

Or when the objective is to have.

  • Self-adapting and self-sufficient networks.

  • Networks with constant changes.

  • Networks that require mobility.

  • Moving networks.

  • The requirement to absent any external configuration and management process.

Civilian environments

  • Computer science classroom.

    • An ad-hoc network between student laptops.

  • Conference.

    • Users in different rooms access services through other users.

  • Shopping malls, restaurants, and coffee shops.

    • Customers spend part of the day in a networked mall of specialty shops, coffee shops, and restaurants.

  • Large campus.

    • Employees of a company moving within a large campus with laptops, and cellphones.

  • Traffic networks (smart cars and smart roads).

  • Board systems talk with the road.

    • Map delays and blocks.

    • Obtain maps.

    • Inform the road about its actions.

  • Finding out empty parking lots in a city, without asking a server.

  • Car-to-car communication.

Military environments

Combat regiment in the field.

  • Around 4000-8000, objects are in constant and unpredictable movement.

Force intercommunication.

  • Proximity, function, battle plan.

Moving soldiers with wearable computers.

  • Eavesdropping, denial-of-service, and impersonation attacks can be launched.

Advantages.

  • Low detection probability.

  • Random topology and association between nodes.

PreviousMobile Ad-hoc networksNextRouting

Last updated 2 years ago