Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk



Similar documents
Propsim enabled Mobile Ad-hoc Network Testing

Portable Wireless Mesh Networks: Competitive Differentiation

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council

Making Route Diversity Affordable, 4G/LTE is for Any Size Business

Satellite Basics. Benefits of Satellite

> SOTAS The world class multimedia vehicle intercom system.

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Satellite Solutions for Emergency Relief and Disaster Recovery Management. May 2009

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

Technology White Paper Capacity Constrained Smart Grid Design

Wireless Technologies in Industrial Markets

EPL 657 Wireless Networks

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Portable High-Speed Mobile Networks

Security Threats in Mobile Ad Hoc Networks

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Live Training. Full-spectrum Range Instrumentation and Tactical Engagement Simulation Systems (TESS)

Problems of Security in Ad Hoc Sensor Network

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Telecommunications, Networks, and Wireless Computing

AeroVironment, Inc. Unmanned Aircraft Systems Overview Background

Mobile and Wireless ATM (WATM)

MetroNet6 - Homeland Security IPv6 R&D over Wireless

Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks

NEXIUM SAT. Satcom systems solutions

Business Continuity and. Wireless World. Presented by: Tom Serio Manager BC/DR Verizon Wireless

Prediction of DDoS Attack Scheme


LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

Demystifying Wireless for Real-World Measurement Applications

Research Projects in the Mobile Computing and Networking (MCN) Lab

Mobile Phone Location Tracking by the Combination of GPS, Wi-Fi and Cell Location Technology

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Introduction Chapter 1. Uses of Computer Networks

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Motorola Wireless Broadband. Point-to-Multipoint (PMP) Access Network Solutions

Study of Impact of Mobile Ad Hoc Networking and its Future Applications

High-Speed Internet from U.S. Cellular. Positioning and Overcoming Objections

Topology Control and Mobility Strategy for UAV Ad-hoc Networks: A Survey

Computers Are Your Future Prentice-Hall, Inc.

CAPABILITY FOR DEFENCE IN TURKEY

Mobile Phone Terminology Simplifying telecoms management

Capacity Management in Multimedia Networks. Presented at SCTE Emerging Technologies 2005

MPLS: Key Factors to Consider When Selecting Your MPLS Provider Whitepaper

Telecommunications, the Internet, and Wireless Technology

Written Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Security in Ad Hoc Network

CHAPTER 1 INTRODUCTION

Messaging and Voice Conferencing through Wi-Fi Network

IT Data Communication and Networks (Optional)

Tactical Targeting Network Technology and Connectivity. Provided by Rockwell Collins

Security Threats on National Defense ICT based on IoT

"#$%&'#!()*&+%,-! ./01#2! 3"4!5!677!! 3,!89#)9%#:!!!

How GPS works? WHAT IS GPS? HOW TRACKING WORKS?

Utilizing IP & Data Services to provide Secure Global Push To Talk Communications

Cisco Mobile Network Solutions for Commercial Transit Agencies

Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem

MSRC Best Practices. Communications Infrastructure Security, Access & Restoration Working Group

Network Systems Integration

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

GPS Vehicle Tracking. The Complete Reference Guide

Business Continuity Planning at Financial Institutions

OPNET Network Simulator

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Protocols and Architectures for Wireless Sensor Netwoks. by Holger Karl and Andreas Willig

SECURITY. SITUATIONAL AWARENESS. INTERAGENCY CONNECTIVITY.

Introduction. Mobile GIS emerged in the mid-1990s to meet the needs of field work such as surveying and utility maintenance.

Technologies Supporting Smart Meter Networks

ASTRO 25 SYSTEM FOR MISSION CRITICAL DATA LEVERAGE YOUR ASTRO 25 SYSTEM INVESTMENT FOR MISSION CRITICAL DATA

920MHz Band Multi-hop Wireless Network System

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

Computer Networking: A Survey

FPGAs in Next Generation Wireless Networks

ADVANTAGES OF AV OVER IP. EMCORE Corporation

Professional Mobile radio. NEXIUM Wireless Mission-Critical LTE

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Customer Specific Wireless Network Solutions Based on Standard IEEE

DESIGNED FOR EFFICIENT EMERGENCY RESPONSE

The 7 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 15 th 2012

Municipal Mesh Network Design

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

TECHNICAL OPERATIONS DIVISION LESSON PLAN

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

Discovering Computers Chapter 9 Communications and Networks


A Network Management Framework for Emerging Telecommunications Network.

Considerations for Hybrid Communications Network Technology for Pipeline Monitoring

How To Create A Converged Network For Public Safety

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Transcription:

Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:humayunbakht@yahoo.co.uk

Continue from history of mobile adhoc networks There is current and future need for dynamic ad-hoc networking technology Mobile ad-hoc networks are of increasing interest for a distributed set of applications Future mobile ad-hoc networks will use mobile routers to provide Internet connectivity to mobile ad-hoc users A mobile router will also allow mobility of an ad-hoc network, where mobile users may use an Internet access within an ad-hoc network domain In summary Ad-hoc networks are suited for use in situations where an infrastructure is unavailable or to deploy one is not cost effective.

Classifications Applications of mobile ad-hoc networks at present could broadly be classified as Commercial application (that are third generation mobile ad-hoc networks) Military applications (that involved second and the third generation mobile ad-hoc networks

Application of mobile ad-hoc networks To understand their application we have to see what they offer and how they establish Establishing this type of networks requires mobile devices with the right communicating chip on. While they could ideally be deployed at any where or in other words instantaneous deployment.

Instantaneous deployment and application of mobile ad-hoc networks When it comes to instantaneous network deployment Possible areas could be some business environments where the need for collaborative computing might be more important outside the office environment than inside, such as in a business meeting outside the office to brief clients on a given assignment. Game theory Originates from economics and has been applied in various fields. Game theory deals with multi-person decision making, in which each decision maker tries to maximize his utility.

Applications of mobile ad-hoc networks 1 The cooperation of the users is necessary to the operation of ad-hoc networks; therefore, game theory provides a good basis to analyze the networks. Work has been going on to introduce the fundamental concepts of game theory and its applications in telecommunications. Crisis management services applications A mobile ad-hoc network can also be used to provide crisis management services applications

Applications of mobile ad-hoc networks 2 As for example in a disaster recoverywhere the entire communication infrastructure is destroyed and resorting communication quickly is crucial. By using a mobile ad-hoc network, an infrastructure could be set up in hours instead of weeks, as is required in the case of wired line communication. Another application example of a mobile ad-hoc network is Bluetooth, which is designed to support a personal area network by eliminating the need of wires between various devices, such as printers and personal digital assistants. Could be hospitals ( by the way I am thinking of developing some theoretical model on this aspect) Security i.e. law enforcement agencies etc

Applications of mobile ad-hoc networks 3 In conclusion mobile ad-hoc networks allow the construction of flexible and adaptive networks with no fixed infrastructure. These networks are expected to play an important role in the future wireless generation. Future wireless technology will require highlyadaptive mobile networking technology to effectively manage multi-hop ad-hoc network clusters, which will not only operate autonomously but also will be able to attach at some point to the fixed networks.

Military applications Combat operations Some of the essentials requirements of a combat operations include network deployability, network security, end to end IP, high mobile connectivity and anti jamming mechanisms. In most of the cases, military operations are often spontaneous i.e. with little or no fixed network infrastructure. these operations require a communications solution which is spontaneous too. In other words, the soldiers should be able to form a network when and where it is needed;

Combat operations 1 Geographical location is one of the important factors of any military operation which makes the current geographical positioning systems less efficient to support such operations. As the soldiers in a combat operation cannot afford exposing themselves in a battlefield to acquire GPS coordinates. One of the other limitations of the current geographical positioning system is that the satellite signals cannot penetrate through caves, underground bunkers or inside shielded buildings.

Combat operations 2 In comparison with geographical positioning systems, mobile ad-hoc networks can support the built-in geographical location by using an extremely accurate form of triangulation. This feature enables soldiers in a military operation to triangulate its position based on the mobile enabled vehicles or other devices. In mobile ad hoc networks, readings are faster than the geographical positioning systems because the soldiers don't have to wait for multiple satellites to acquire a centralized security. The devices use in combat operations must be able to address both communications security and a way to secure the network from unauthorized use. Mobile ad hoc networks also allow devices to transmit at a lower output power to the neighbors which benefits the over all network by lowering the probability of detection and by increasing the battery Therefore if the device is captured, the soldiers can list that device to maintain the integrity of the network.

Combat operations 3 Through anti-jamming mechanism the soldiers in a military operation are neither dependent on a single frequency nor are constrained to any military band. Mobile ad hoc networks are best suited to jamming because noise can now be routed around problem areas. These self-forming will have the ability to reduce the probability of jamming. High-mobility connectivity communications devices must operate while vehicles or soldiers are mobile.

Combat operations 4 Moreover, soldiers can receive real-time streaming video from aircraft flying over a battlefield. Modern soldiers grow up with computers and will demand the same applications and user interfaces available to the civilians. The soldiers using instant messaging can then send photos of enemy positions back to the central command and use voice over IP to communicate with the non-military personnel s in an occupied area

Combat operations 5 Most of the above discussed scenarios are based on the various theoretical aspects of mobile ad hoc networks. Some of the unresolved issues of mobile ad hoc networks in the context of their usage for military operations are channel access mechanisms which must be able to combine different directional elements how can one initiate and maintain a network topology in directional mobile ad-hoc networks environments? At last but not least are the routing algorithms that are required to achieve standard, highly efficient multipoint data delivery services.

Combat operations 6 In conclusion, we need a high directional communication mechanism; dramatically higher data rates; low detection portability and resistance to jamming in high networks to support future military operations. At present mobile ad hoc networks neither embraces directionality nor supports the qualities of services which are required in different combat operations.

Some other military applications Packet radio network designed to conduct a feasibility report on the usage of packet-switched radio communications to provide reliable computer communications. The DARPA PACKET RADIO NETWORK, PRNET has evolved through the years (1973-1987) to be a robust, reliable, operational experimental network. Survivable adaptive radio networks program provides packet switched networking to the mobile battlefield elements in infrastructure- less environments. It is proved to be beneficial in improving radios performance by making them smaller, cheaper and power-thrifty.

Some other military applications 1 GloMo (Global Mobile Information Systems) project The goal of the project is to make the mobile environment a first-class citizen in the Defense Information Infrastructure by providing user friendly connectivity and access to services for wireless mobile users. GloMo technologies are applicable to Wide-Area Information Systems, Information Systems for Dismounted Forces, and Information System for Rapid Deployment of Forces.

Some other military applications 2 The NTDR system is a DA-directed, experimental, mobile packet data radio network that links Tactical Operations Centers in a brigade area. The NTDR provides a self-organizing, self-healing, network capability. Radio network management is provided by a Network Management Terminal. The primary purpose of the NTDR is to provide data transport for the Army Battle Command System automated systems to units at brigade and below Lessons learned from this experimental fielding provide a portion of the technical baseline for radios being designed for future fielding

Question Please drop me email at humayunbakht@yahoo.co.uk; These slides can be downloadable from http://www.geocities.com/humayunbakht presentations Thanks