| Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, and S. Sajama
The paper provides a comprehensive survey of the state-of-the-art in ad hoc networking technology, focusing on four key areas: routing, medium access control (MAC), multicasting, and security. Ad hoc networks are characterized by their ability to rapidly deploy without relying on pre-existing infrastructure, with nodes dynamically joining and leaving the network. The authors discuss the challenges of these networks, such as rapid node movement, intermittent connectivity, and the lack of centralized entities, which necessitate distributed algorithms for routing and MAC control.
In the MAC layer, the paper reviews various protocols designed to address the hidden terminal and exposed terminal problems, including RTS/CTS, MACA, MACAW, FAMA, and DBTMA. Each protocol aims to reduce collisions and improve network efficiency, but they all face limitations, such as the need for continuous notifications and the potential for false detection.
For routing, the paper categorizes protocols into proactive, reactive, and hybrid approaches. Proactive protocols continuously learn the network topology, while reactive protocols use query-reply dialogs for route discovery. Hybrid protocols combine elements of both. Examples of routing protocols include AODV, DSR, TORA, DSDV, WRP, ZRP, OLSR, FSR, CEDAR, ZHLS, and LANMAR. Each protocol has its advantages and disadvantages in terms of complexity, scalability, and resource management.
The paper also discusses multicasting protocols, which are crucial for efficient communication in multi-point applications. It highlights the challenges of multicasting in ad hoc networks, such as limited battery power, scarce wireless resources, and rapidly changing topologies. Early approaches adapted existing Internet multicasting protocols, but more recent solutions are specifically designed for ad hoc networks, aiming to optimize resource usage and maintain network efficiency.
Overall, the paper provides a detailed overview of the current state of ad hoc networking technology, offering insights into the design and implementation of key protocols and addressing the ongoing challenges in this field.The paper provides a comprehensive survey of the state-of-the-art in ad hoc networking technology, focusing on four key areas: routing, medium access control (MAC), multicasting, and security. Ad hoc networks are characterized by their ability to rapidly deploy without relying on pre-existing infrastructure, with nodes dynamically joining and leaving the network. The authors discuss the challenges of these networks, such as rapid node movement, intermittent connectivity, and the lack of centralized entities, which necessitate distributed algorithms for routing and MAC control.
In the MAC layer, the paper reviews various protocols designed to address the hidden terminal and exposed terminal problems, including RTS/CTS, MACA, MACAW, FAMA, and DBTMA. Each protocol aims to reduce collisions and improve network efficiency, but they all face limitations, such as the need for continuous notifications and the potential for false detection.
For routing, the paper categorizes protocols into proactive, reactive, and hybrid approaches. Proactive protocols continuously learn the network topology, while reactive protocols use query-reply dialogs for route discovery. Hybrid protocols combine elements of both. Examples of routing protocols include AODV, DSR, TORA, DSDV, WRP, ZRP, OLSR, FSR, CEDAR, ZHLS, and LANMAR. Each protocol has its advantages and disadvantages in terms of complexity, scalability, and resource management.
The paper also discusses multicasting protocols, which are crucial for efficient communication in multi-point applications. It highlights the challenges of multicasting in ad hoc networks, such as limited battery power, scarce wireless resources, and rapidly changing topologies. Early approaches adapted existing Internet multicasting protocols, but more recent solutions are specifically designed for ad hoc networks, aiming to optimize resource usage and maintain network efficiency.
Overall, the paper provides a detailed overview of the current state of ad hoc networking technology, offering insights into the design and implementation of key protocols and addressing the ongoing challenges in this field.