40. Unstructured and/or time-varying network topology: Because of the nodes mobility, that makes the network topology usually unstructured and makes the optimizing process a difficult task.
41.
42.
43. The wireless channel is weak, unreliable, and unprotected from outside interferences.
46. Ad-Hoc Networks Technical Challenges and Issues (6): Exposed-node problem: Blocked By The Transmitter Transmitter Exposed Node Receiver
47.
48. If we give the node the freedom to send at any time, then that could result in a contention.
49. We can't have a central controller to manage the transmission process, because every node can move at any time.Therefore, we will choose from the medium access control (MAC) protocols in order to use the shred medium in the most efficient way.
50. Ad-Hoc Networks Ad-Hoc Wireless Media Access Protocols (2): MAC Protocols Synchronous Asynchronous MAC Protocols Sender-Initiated Receiver-Initiated
51. Ad-Hoc Networks Ad-Hoc Wireless Media Access Protocols (3): Sender-Initiated MAC Protocols: RTS 1 CTS 2 Receiver Sender Data 3
52. Ad-Hoc Networks Ad-Hoc Wireless Media Access Protocols (4): Receiver-Initiated MAC Protocols: RTR 1 Receiver Sender Data 2
53.
54. It has the ability to control the transmitter power for each packet.
58. In MACA-BI, there is no way that the receiver will know whether the transmitter has a data to transmit or not, which will affect the communication performance, because of the waiting time for the RTR messages.
59.
60. It reduces the powerconsumption by turning off all nodes that are not actively transmitting or receiving.
61.
62.
63. In BTMA, when node is receiving data, it sends a busy tone signal to its neighbors. After the hidden terminals sense the busy tone they refrain from transmitting.
64. The DBTMA (Dual Busy Tone Multiple Access) is a customization of BTMA for the Ad-Hoc networks.
65.
66. Ad-Hoc Networks Ad-Hoc Routing Protocols (1): There are lots of routing protocols which have been developed for Ad-Hoc networks. When these protocols have been developed, it has been taken in the consideration the limitations of this type of network. Ad-Hoc Mobile Routing Protocols Table Driven / Proactive Hybrid On-Demand-Driven / Reactive
67.
68. In this type of routing protocol, each node should maintain at least one table to store the routing information.
69.
70. Each node here maintains a routing table of all destinations within the non-partitioned network and the number of hops to these destinations.
71. A sequence numbering system is used in order to be able to distinguish between the old and bad routes from the new ones.
77. Each route is labeled with a sequence number and the route with the highest sequence number will be used.
78.
79. The WRP is classified as one of the path-finding algorithms, but here the count-to-infinity problem has been avoided by making each node check the consistency of the predecessor information reported by its neighbors.
90. List of all nodes who should acknowledge the update.
91.
92. Each time a cluster head moves away, a new cluster head is selected.
93. By using the least cluster change (LCC) algorithm, the cluster head will be changed either if two cluster heads come into contact or if the node moves away from all other cluster heads.
94.
95.
96. Routing table: is used to determine the next hop to reach the destination.
130. The routing zone in ZRP is similar to the routing zone in CSGR, but in ZRP, every node acts as a cluster head and a member of other clusters, and zones can be overlapped.
131. The ZRP can be subdivided into three sub-protocols:
138. Each node in STAR knows about its adjacent links and the source trees of its neighbors, and after it aggregates the adjacent links with the source trees, it will get a partial topology graph.