Views: 162 Author: Site Editor Publish Time: 2020-07-09 Origin: Site
(1) Network autonomy
Compared with the conventional communication network, the wireless ad hoc network has the biggest difference that it can not need the existing information infrastructure at any time and any place. This is also a form of personal communication.
(2) Dynamic topology
Nodes have arbitrary mobility. In addition, the rapid changes in wireless propagation conditions have also caused the network topology to change arbitrarily and quickly in an unpredictable way.
(3) Bandwidth limitation and changing link capacity
The wireless ad hoc network uses wireless transmission technology as the underlying communication method, which has a lower capacity than the wired channel; and due to multiple factors such as multi-access, multi-path fading, noise and signal interference, the actual bandwidth of the mobile node is less than The theoretical maximum bandwidth value.
(4) Energy limiting node
The mobile node relies on batteries to provide the energy required for operation. Reducing power consumption will be a very important factor affecting network protocol design.
(5) Multi-hop communication
Due to the limited signal propagation range of wireless transceivers, ad hoc networks are required to support multi-hop communication. This multi-hop communication also brings hidden terminal, exposed terminal and fairness issues.
(6) Distributed control
The user nodes in the wireless ad hoc network have both independent routing and host functions. There is no network center control point. The status of the user nodes is equal. The network routing protocol usually uses a distributed control method, so it has strong robustness. Stickiness and invulnerability. In conventional communication networks, due to the existence of centralized control equipment such as base stations, network control centers, or routers, user terminals and their positions are not equal.
(7) Limited security
In general, mobile wireless networks are more vulnerable to security threats than wired networks due to the use of wireless channels, limited power supplies, distributed control, and other reasons. These security attacks include eavesdropping, spoofing, and denial of service.