| Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitriatos, and S. Sajama
This paper presents a survey of techniques used to establish communications in Mobile Ad Hoc Networks (MANETs). It focuses on four areas: medium access control (MAC) schemes, routing protocols, multicasting protocols, and security schemes. MANETs are networks that can be rapidly deployed without relying on pre-existing infrastructure. They are characterized by rapidly changing network topologies, influenced by network size and node mobility. Nodes in a MANET can be highly mobile, leading to frequent changes in node constellation and link presence. Examples of MANET applications include military communication, rescue missions, national security, law enforcement, commercial use, education, and sensor networks.
The communication environment in MANETs is characterized by the lack of a centralized entity, potential for rapid node movement, and the fact that all communication is carried over the wireless medium. This leads to intermittent and sporadic connectivity between adjacent nodes. The main challenges in the design and operation of MANETs, compared to traditional wireless networks, stem from the lack of a centralized entity, the potential for rapid node movement, and the fact that all communication is carried over the wireless medium.
The paper discusses various MAC-layer protocols for ad hoc networks, including the Multiple Access Collision Avoidance (MACA) scheme, the MACAW scheme, the Floor Acquisition Multiple Access (FAMA) schemes, and the Dual Busy Tone Multiple Access (DBTMA) scheme. These protocols aim to address the hidden terminal and exposed terminal problems in wireless networks.
The paper also discusses routing protocols for ad hoc networks, including single-scope and multi-scope routing protocols. Single-scope routing protocols are simpler but may not scale well as the network size increases. Multi-scope routing protocols are more complex but offer better scalability. The paper discusses various routing protocols, including reactive (on-demand) and proactive (table-driven) protocols, as well as hybrid protocols that combine aspects of both.
The paper also discusses multicasting protocols for ad hoc networks, which are more challenging than in traditional networks due to the need to optimize the use of several resources simultaneously. The paper concludes with a discussion of security schemes for ad hoc networks, which are essential for ensuring the reliability and survivability of the network.This paper presents a survey of techniques used to establish communications in Mobile Ad Hoc Networks (MANETs). It focuses on four areas: medium access control (MAC) schemes, routing protocols, multicasting protocols, and security schemes. MANETs are networks that can be rapidly deployed without relying on pre-existing infrastructure. They are characterized by rapidly changing network topologies, influenced by network size and node mobility. Nodes in a MANET can be highly mobile, leading to frequent changes in node constellation and link presence. Examples of MANET applications include military communication, rescue missions, national security, law enforcement, commercial use, education, and sensor networks.
The communication environment in MANETs is characterized by the lack of a centralized entity, potential for rapid node movement, and the fact that all communication is carried over the wireless medium. This leads to intermittent and sporadic connectivity between adjacent nodes. The main challenges in the design and operation of MANETs, compared to traditional wireless networks, stem from the lack of a centralized entity, the potential for rapid node movement, and the fact that all communication is carried over the wireless medium.
The paper discusses various MAC-layer protocols for ad hoc networks, including the Multiple Access Collision Avoidance (MACA) scheme, the MACAW scheme, the Floor Acquisition Multiple Access (FAMA) schemes, and the Dual Busy Tone Multiple Access (DBTMA) scheme. These protocols aim to address the hidden terminal and exposed terminal problems in wireless networks.
The paper also discusses routing protocols for ad hoc networks, including single-scope and multi-scope routing protocols. Single-scope routing protocols are simpler but may not scale well as the network size increases. Multi-scope routing protocols are more complex but offer better scalability. The paper discusses various routing protocols, including reactive (on-demand) and proactive (table-driven) protocols, as well as hybrid protocols that combine aspects of both.
The paper also discusses multicasting protocols for ad hoc networks, which are more challenging than in traditional networks due to the need to optimize the use of several resources simultaneously. The paper concludes with a discussion of security schemes for ad hoc networks, which are essential for ensuring the reliability and survivability of the network.