Mobile ad hoc network
A mobile ad hoc network (MANET), also known as wireless ad hoc network or ad hoc wireless network, is a continuously self-configuring, infrastructure-less network of mobile devices connected wirelessly.
Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. They may contain one or multiple and different transceivers between nodes. This results in a highly dynamic, autonomous topology.
MANETs are a kind of wireless ad hoc network (WANET) that usually has a routable networking environment on top of a Link Layer ad hoc network. MANETs consist of a peer-to-peer, self-forming, self-healing network. MANETs circa 2000–2015 typically communicate at radio frequencies (30 MHz – 5 GHz).
The growth of laptops and 802.11/Wi-Fi wireless networking have made MANETs a popular research topic since the mid-1990s. Many academic papers evaluate protocols and their abilities, assuming varying degrees of mobility within a bounded space, usually with all nodes within a few hops of each other. Different protocols are then evaluated based on measures such as the packet drop rate, the overhead introduced by the routing protocol, end-to-end packet delays, network throughput, ability to scale, etc.
- Vehicular ad hoc networks (VANETs) are used for communication between vehicles and roadside equipment. Intelligent vehicular ad hoc networks (InVANETs) are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents.
- Smart phone ad hoc networks (SPANs) leverage the existing hardware (primarily Bluetooth and Wi-Fi) in commercially available smart phones to create peer-to-peer networks without relying on cellular carrier networks, wireless access points, or traditional network infrastructure. SPANs differ from traditional hub and spoke networks, such as Wi-Fi Direct, in that they support multi-hop relays and there is no notion of a group leader so peers can join and leave at will without destroying the network.
- Internet-based mobile ad-hoc networks (iMANETs) is a type of wireless ad hoc network that supports Internet protocols such as TCP/UDP and IP. The network uses a network-layer routing protocol to link mobile nodes and establish routes distributedly and automatically.
- Hub-Spoke MANET – Multiple sub-MANETs may be connected in a classic Hub-Spoke VPN to create a geographically distributed MANET. In such type of networks normal ad hoc routing algorithms does not apply directly. One implementation of this is Persistent System's CloudRelay.
- Military or tactical MANETs are used by military units with emphasis on data rate, real-time requirement, fast re-routing during mobility, data security, radio range, and integration with existing systems. Common radio waveforms include the US Army's JTRS SRW and Persistent System's WaveRelay.
- Flying ad hoc networks (FANETs) are composed of unmanned aerial vehicles, allowing great mobility and providing connectivity to remote areas.
Advantages and disadvantages in wireless communication networks
The obvious appeal of MANETs is that the network is decentralised and nodes/devices are mobile, that is to say there is no fixed infrastructure which provides the possibility for numerous applications in different areas such as environmental monitoring , , disaster relief – and military communications . Since the early 2000s interest in MANETs has greatly increased which, in part, is due to the fact mobility can improve network capacity, shown by Grossglauser and Tse along with the introduction of new technologies.
One main advantage to a decentralised network is that they are typically more robust than centralised networks due to the multi-hop fashion in which information is relayed. For example, in the cellular network setting, a drop in coverage occurs if a base station stops working, however the chance of a single point of failure in a MANET is reduced significantly since the data can take multiple paths. Since the MANET architecture evolves with time it has the potential to resolve issues such as isolation/disconnection from the network. Further advantages of MANETS over networks with a fixed topology include flexibility (an ad hoc network can be created anywhere with mobile devices), scalability (you can easily add more nodes to the network) and lower administration costs (no need to build an infrastructure first).
With these positives follow some obvious draw backs in network performance. With a time evolving network it is clear we should expect variations in network performance due to no fixed architecture (no fixed connections). Furthermore, since network topology determines interference and thus connectivity, the mobility pattern of devices within the network will impact on network performance, possibly resulting in data having to be resent a lot of times (increased delay) and finally allocation of network resources such as power remains unclear. Finally, finding a model that accurately represents human mobility whilst remaining mathematically tractable remains an open problem due to the large range of factors that influence it. Some typical models used include the random walk, random waypoint and levy flight models. 
Mobile ad hoc networks can be used in many applications, ranging from sensors for environment, vehicular ad hoc communications, road safety, health, home, peer-to-peer messaging, disaster rescue operations, air/land/navy defense, weapons, robots, etc. See the application section in wireless ad hoc networks.
There are several ways to study MANETs. One solution is the use of simulation tools like OPNET, NetSim, ns2, OMNeT++ and NS3. A comparative study of various simulators for VANETs reveal that factors such as constrained road topology, multi-path fading and roadside obstacles, traffic flow models, trip models, varying vehicular speed and mobility, traffic lights, traffic congestion, drivers' behavior, etc., have to be taken into consideration in the simulation process to reflect realistic conditions.
In 2009, the U.S. Army Research Laboratory (ARL) and Naval Research Laboratory (NRL) developed a Mobile Ad-Hoc Network emulation testbed, where algorithms and applications were subjected to representative wireless network conditions. The testbed was based on a version of the "MANE" (Mobile Ad hoc Network Emulator) software originally developed by NRL.
ARL, NRL and Consulting & Engineering Next Generation Networks (CENGN) later expanded the original testbed to form eMANE, which provided a system capable of modeling network systems with complex, heterogeneous connectivity (i.e. multiple, different radio interfaces).
Data monitoring and mining
MANETS can be used for facilitating the collection of sensor data for data mining for a variety of applications such as air pollution monitoring and different types of architectures can be used for such applications. It should be noted that a key characteristic of such applications is that nearby sensor nodes monitoring an environmental feature typically register similar values. This kind of data redundancy due to the spatial correlation between sensor observations inspires the techniques for in-network data aggregation and mining. By measuring the spatial correlation between data sampled by different sensors, a wide class of specialized algorithms can be developed to develop more efficient spatial data mining algorithms as well as more efficient routing strategies. Also, researchers have developed performance models for MANET to apply queueing theory.
Trust establishment and management in MANETs face challenges due to resource constraints and the complex interdependency of networks. Managing trust in a MANET needs to consider the interactions between the composite cognitive, social, information and communication networks, and take into account the resource constraints (e.g., computing power, energy, bandwidth, time), and dynamics (e.g., topology changes, node mobility, node failure, propagation channel conditions).
Researchers of trust management in MANET suggested that such complex interactions require a composite trust metric that captures aspects of communications and social networks, and corresponding trust measurement, trust distribution, and trust management schemes.
- AmbientTalk, an experimental programming language for MANETs
- Backpressure routing
- Delay-tolerant networking
- List of ad hoc routing protocols
- Mobile wireless sensor network
- Smart meter
- Wireless community network
- Wireless mesh network
- Wireless sensor networks
- "Wireless ATM & Ad Hoc Networks". Kluwer Academic Press. 1997.
- Morteza M. Zanjireh; Hadi Larijani (May 2015). A Survey on Centralised and Distributed Clustering Routing Algorithms for WSNs (PDF). Conference: IEEE 81st Vehicular Technology Conference: VTC2015-Spring. Glasgow, Scotland. pp. 1–6. doi:10.1109/VTCSpring.2015.7145650.
- Chai Keong Toh (2002). "Ad Hoc Mobile Wireless Networks: Protocols and Systems 1st Edition". Prentice Hall PTR. Retrieved 2016-04-20.
- Zanjireh, M. M.; Shahrabi, A.; Larijani, H. (1 March 2013). "ANCH: A New Clustering Algorithm for Wireless Sensor Networks": 450–455. doi:10.1109/WAINA.2013.242.
- Martinez; Toh; Cano; Calafate; Manzoni (2010). "Emergency Services in Future Intelligent Transportation Systems Based on Vehicular Communication Networks". IEEE Intelligent Transportation Systems Magazine.
- Toh; Lee; Ramos (2002). "Next Generation Tactical Ad Hoc Mobile Wireless Networks". TRW Systems Technology Journal.
- Antonio Guillen-Perez; Ramon Sanchez-Iborra; Maria-Dolores Cano; Juan Carlos Sanchez-Aarnoutse; Joan Garcia-Haro (2016). "WiFi networks on drones". ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT). doi:10.1109/ITU-WT.2016.7805730.
- Grossglauser, M; Tse, D (2001). Mobility increases the capacity of ad-hoc wireless networks. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. 3. IEEE Proceedings. pp. 1360–1369.
- Helen, D; Arivazhagan, D (2014). "Applications, advantages and challenges of ad hoc networks". JAIR. 2 (8): 453–457.
- Giordano, S (2002). "Mobile ad hoc networks". Handbook of wireless networks and mobile computing. pp. 325–346.
- Gonzalez, Marta C; Hidalgo, Cesar A; Barabasi, Albert-Laszlo (2008). "Understanding individual human mobility patterns". Nature. 453 (7196): 779–782. arXiv: . Bibcode:2008Natur.453..779G. doi:10.1038/nature06958.
- Brockmann, Dirk; Hufnagel, Lars; Geisel, Theo (2006). "The scaling laws of human travel". Nature. 439 (7075): 462–465. arXiv: . Bibcode:2006Natur.439..462B. doi:10.1038/nature04292.
- Bettstetter, C; Resta, G; Santi, P (2003). "The node distribution of the random waypoint mobility model for wireless ad hoc networks". IEEE Transactions on mobile computing. 2 (3): 257–269. doi:10.1109/tmc.2003.1233531.
- Hyytia, E; Lassila, P; Virtamo, J (2006). "Spatial node distribution of the random waypoint mobility model with applications". IEEE Transactions on mobile computing. 5 (6): 680–694. doi:10.1109/tmc.2006.86.
- Figueiredo, A; Gleria, I; Matsushita, R (2003). "On the origins of truncated Lévy flights". Physics Letters A. 315 (1): 51–60. Bibcode:2003PhLA..315...51F. doi:10.1016/s0375-9601(03)00976-9.
- Martinez; Toh; Cano; et al. (2009). "A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)". Wireless Communications Journal. 11 (7): 813–828. doi:10.1002/wcm.859.
- "Mobile Ad Hoc Network emulation environment - IEEE Conference Publication". ieeexplore.ieee.org. Retrieved 2018-08-28.
- Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based on Sensor Grid in London". Sensors. 8 (6): 3601. doi:10.3390/s8063601.
- Ma, Y.; Guo, Y.; Tian, X.; Ghanem, M. (2011). "Distributed Clustering-Based Aggregation Algorithm for Spatial Correlated Sensor Networks". IEEE Sensors Journal. 11 (3): 641. Bibcode:2011ISenJ..11..641M. doi:10.1109/JSEN.2010.2056916.
- Kleinrock, Leonard (1975). "Packet Switching in Radio Channels: Part I--Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics".
- Shi, Zhefu; Beard, Cory; Mitchell, Ken (2008). "Tunable traffic control for multihop CSMA networks".
- "A Survey on Trust Management for Mobile Ad Hoc Networks - IEEE Journals & Magazine". ieeexplore.ieee.org. Retrieved 2018-08-28.
- Satyajeet, D.; Deshmukh, A. R.; Dorle, S. S. (January 2016). "Article: Heterogeneous Approaches for Cluster based Routing Protocol in Vehicular Ad Hoc Network (VANET)" (PDF). International Journal of Computer Applications, Published by Foundation of Computer Science (FCS), New York, USA. 134 (12): 1–8. Bibcode:2016IJCA..134l...1S. doi:10.5120/ijca2016908080.
- Royer, E.; Chai Keong Toh (April 1999). "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks". IEEE Personal Communications. 6 (2): 46–55. doi:10.1109/98.760423.
- Mauve, M.; Widmer, J.; Hartenstein, H. (December 2001). "A Survey on Position-Based Routing in Mobile Ad Hoc Networks". IEEE Network. 1 (6): 30–39. doi:10.1109/65.967595.
- Djenouri, D.; Kheladi, L.; Badache, N. (October 2005). "A Survey of Security Issues in Mobile Ad hoc and Sensor Networks". IEEE Communications Surveys and Tutorials. 7 (4).
- Maihöfer, C. (April 2004). "A Survey on Geocast Routing Protocols". IEEE Communications Surveys and Tutorials. 6 (2).
- Jhaveri, Rutvij H.; Patel, Narendra M. (2015). "A Sequence Number Based Bait Detection Scheme to Thwart Grayhole Attack in Mobile Ad-hoc Networks". Wireless Networks-The Journal of Mobile Communication, Computation and Information. 21 (8): 2781–2798. doi:10.1007/s11276-015-0945-9.
- Jhaveri, Rutvij H.; Patel, Narendra M. (2017). "Attack-pattern discovery based enhanced trust model for secure routing in mobile ad-hoc networks". International Journal of Communication Systems. 30 (7): e3148. doi:10.1002/dac.3148.
- Cano, Jose; Cano, Juan-Carlos; Toh, Chai-Keong; Calafate, Carlos T.; Manzoni, Pietro (2010). "EasyMANET: an extensible and configurable platform for service provisioning in MANET environments". IEEE Communications Magazine. 48 (12): 159–167. doi:10.1109/mcom.2010.5673087.
- Jubin, J.; Tornow, J. D. (January 1987). "The DARPA Packet Radio Network Protocols". Proceedings of the IEEE. 75 (1): 21–32. doi:10.1109/proc.1987.13702.
- Schacham, N.; Westcott, J. (January 1987). "Future directions in packet radio architectures and protocols". Proceedings of the IEEE. 75 (1): 83–99. doi:10.1109/PROC.1987.13707.