Published online by Cambridge University Press: 05 May 2015
Introduction
Wireless networks can be broadly classified into two categories: centralized and de-centralized. A canonical example of a centralized network is a cellular network, where all operations are controlled by basestations, for example, when should each user transmit or receive, thereby avoiding simultaneous transmission (interference) by closely located nodes. Prominent examples of de-centralized or ad hoc networks include sensor or military networks. Sensor network is deployed in a large physical area to either monitor physical parameters, such as temperature, rainfall, and animal census, or intrusion detection. In a military network, a large number of disparate military equipment, e.g., battle tanks, helicopters, ground forces, is connected in a decentralized manner to form a robust and high throughput network. Ad hoc networks are attractive because of their scalability, self-configurability, robustness, etc.
Vehicular network is a more modern example of an ad hoc wireless network, where a large number of sensors are deployed on the highways as well as mounted on vehicles that are used for traffic management, congestion control, and quick accident information exchange. Many other applications of ad hoc wireless networks are also envisaged such as deploying large number of sensors in large building for helping fire fighters in case of fire emergency and in case of earthquakes.
The key feature that distinguishes centralized and ad hoc wireless networks is interference. With centralized control, interference can be avoided in contrast to ad hoc networks, where there is no mechanism of inhibiting multiple transmitters from being active simultaneously. Thus, ad hoc networks give rise to complicated signal interaction at all receiver nodes. As compared to additive noise, interference is structured, and treating interference as noise is known to be sub-optimal. Thus, performance analysis of ad hoc wireless networks is far more complicated than centralized wireless networks.
In this book, we are interested in studying the physical layer issues of ad hoc wireless networks, such as finding the limits on the reliable rate of information transfer and ensuring connectivity among all nodes of the network.
To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.