1 Introduction
2 Taxonomy of Wireless Network
3 Bibliometrics Analysis
Description | Results |
---|---|
MAIN INFORMATION ABOUT DATA | |
Timespan | 1996:2022 |
Sources (Journals, Books, etc.) | 2 |
Documents | 2000 |
Average years from publication | 8.06 |
Average citations per document | 20.85 |
Average citations per year per doc | 2.092 |
References | 61,727 |
DOCUMENT TYPES | |
article | 2000 |
DOCUMENT CONTENTS | |
Keywords Plus (ID) | 9530 |
Author’s Keywords (DE) | 4914 |
AUTHORS | |
Authors | 4403 |
Author Appearances | 6427 |
Authors of single-authored documents | 100 |
Authors of multi-authored documents | 4303 |
AUTHORS COLLABORATION | |
Single-authored documents | 112 |
Documents per Author | 0.454 |
Authors per Document | 2.2 |
Co-Authors per Documents | 3.21 |
Collaboration Index | 2.28 |
3.1 Article and Countries Bibliometrics Analysis
3.2 Citation Analysis of Author Keywords and Researchers
3.3 Citation Analysis of Sources, Word Growth, and 3-D Plot
4 Wireless Networks
4.1 Mobile Ad-hoc Network (MANET)
S. No | Features | Strength | Weakness | Applications |
---|---|---|---|---|
1 | Bounded Security: Security services, routing procedures, and host configuration process are done in a distributed manner, due to not having a centralized firewall. | Each node is working as a router and doesn’t follow any kind of centralized administration | Not able to provide high security and reliability during communication in the network. Data broadcast errors, hidden terminal problems, mobility-induced packet losses, etc., problems are introduced due to the broadcast feature of this network | At Local-level: By using mobile phones, laptops, palmtop computers, and- etc.; Instant ad-hoc networks can be formed by autonomous links and information can be shared and broadcast. |
2 | Negligible Human Interruption: This network permits minimum human intervention for network configuration because of the dynamic autonomous nature of MANET. | This network is robust and flexible. The router-free operation, high speed, fault tolerance, fast installation, and low cost. | Due to random changes in the topology of a network; the MANET network can’t provide the high Quality of Service (QoS). | Military Battlefield: This network can work efficiently in ad-hoc networks with soldiers, headquarters of military information, and vehicles. The military tool can keep computer equipment so that ad-hoc networks can form. |
3 | Autonomous Nature of Node: Every node in MANET can work as a host or router in the ad-hoc network. | This network can form as a fly, i.e., because of the mobility of nodes, nodes can move at any time and any place. | Managing the power resources during communication in an ad-hoc network is also a complex task. | In Commercial Area: For relief in a disaster area like flood, earthquake, or fire, where rescue and emergency operations are a priority task. Where infrastructure-based communication is damaged, an ad-hoc network can work reliably. |
4 | Flexible Topology: The network topology may change frequently and at random periods because of the movability nature of mobile nodes with unidirectional or multidirectional connections. | It can provide communication in a wider area and with dense mobile nodes. | Communication between ad-hoc networks and fixed networks like IP-based is such difficult work. | |
5 | Operation with limited energy: In MANET; Few or all mobile nodes are depending either on the batteries or other exhaustible sources for their energy. | Without considering the geographical location of nodes, MANET permits the authority to share information and services in the network. | ------- |
4.2 Vehicular Ad-hoc Network (VANET)
S. No | Features | Strength | Weakness | Applications |
---|---|---|---|---|
1 | Negligible Consumption of Energy: This network utilises very little energy when providing services in a network. | Vehicle nodes may change their location with high relative velocity so that communication among nodes in a very short period. | Identification of suspicious vehicle nodes in VANET is not a simple task. | Enhancement of Vision: This network can provide information to the drivers, about obstacles in the path and bad weather. |
2 | Security: It is the most secure network, due to nodes in this network are physically more secure than other wireless networks. It also minimizes the risk of infrastructure attacks. | Mixed vehicles nodes, specialized vehicles nodes, and fixed deployed vehicles nodes can work together in VANET. | A high level of vehicle movability gives frequent changes in network topology, therefore, maintaining reliable and good QoS is such complicated work. | Broadcasting of Warning Message: Prior warning messages can be forwarded to the vehicle’s node about any danger ahead in the route. So, they can change their route. |
3 | Limitless Size Network: This network is highly scalable; therefore, it can connect one city to many cities or also link one country to more countries. | This network supports multi-hop communication in a wireless network like MANET. | Frequent changes in the velocity and density of vehicle nodes make communication difficult in VANET. | Message Transfer Operation: Slow-moving and stand-by vehicles can exchange or forward messages with the cooperation of nodes in a network. |
4 | Variable Topology: Because of the high movability of vehicle nodes in the environment, VANET’s topology changes very frequently. Whenever the speed of vehicle nodes increases their communication time decreases. | VANET eliminates the constraint of processing power, low battery, and bounded storage capability of nodes, which are applicable in MANET. | In a Cluster network, choosing a cluster head (CH) is a challenging task. | |
5 | Defined Pattern of Mobility: The special feature of VANET is, the availability of pre-existing paths for vehicle nodes. Therefore, the movability pattern in the environment can easily be forecasted by the network designer. | This network works efficiently in both safety (including navigation, speed limit, collision alert, pedestrian crossing, lane changing, and work zone) and non-safety applications (road congestion, weather information, route navigation, dangers on the road, chatting, gas station, file sharing). | A minimum level of distribution of vehicle nodes in a particular location leads to a low level of communication among nodes in VANET [17]. | ----- |
4.3 Wireless Sensor Network (WSN)
The collection of hundreds or thousands of sensor nodes is known as Wireless Sensor Network. Radio, power, processing, and sensing units are the primary parts of each sensor node. This network works efficiently in a smaller area. Atmosphere pressure, temperature, humidity, etc. parameters are sensed by the sensor node. This information is disseminated to the destination node or sink node in WSN [18].
S. No | Features | Strength | Weakness | Applications |
---|---|---|---|---|
1 | It works on two kinds of structure layered network architecture and clustered structure. In the network, structures are the integration of five layers (application, transport, network, data link, and physical) and three cross-layers (power, mobility, and task management plane). | This network can work reliably without infrastructure. | At regular periods sensor nodes are required to charge because of their low battery life. | Traffic Monitoring: To detect a congested area in a city or town for the smooth functioning of vehicles on the road sensor nodes are utilised. Google Maps provides services to people to reach their destination within a minimum time and distance. |
2 | This network works with the topology named, star, mesh, and hybrid star. | Centralized monitoring may be used, if necessary, in a network. | Compared to the wired communication network, WSNs communicate at a low speed. | Weather Forecasting and Analysis: Diverse factors are sensed by the sensor node, in the environment such as the velocity of air, pressure, moisture in soil/air, forecasting of rainfall, and weather. |
3 | The sensor node can work with bounded exhaustible power resources like batteries. | WSN is easily applicable in non-reachable locations like mountains, deep forests, rural places, overseas, etc. | Security is a major concern during communication in a wireless network, but WSN is highly vulnerable to attack. | WSN in Healthcare: To monitor the internal changes in a human being; sensor nodes are used in healthcare. Due to its simple use, low cost, small size, and patient mobility; the heartbeat sensor node is applicable. |
4 | Nodes in WSN are highly movable and heterogeneous. | Any gadget such as a sensor node can join and leave the network at any place and at any time. | Produces resistance error, and long response time in commercial applications in the house. | WSN as IoT: Sensor nodes can be used as in-built in the things which can communicate through the internet. |
5 | WSN is highly scalable and able to handle node failure. Efficiently applicable to environmental constraints. | Low cost of installation due to no use of wiring. | Position sensors which are used in gaming applications are easily affected by the change in atmosphere, not very accurate in dark locations, and bounded working areas. | Detection and tracking of Suspicious nodes: In a military battlefield, sensor nodes are used to identify, track, and classify the suspicious or intrusion activity done by either vehicles or persons [18]. |
4.4 Opportunistic Network (OppNet)
S. No | Features | Strength | Weakness | Applications |
---|---|---|---|---|
1 | Fixed and Dynamic Nodes: In this network, nodes are either mobile or fixed. Kind of opportunistic nodes are applicable in this network. | Delay Tolerance: This wireless network works on the principle of a store-carry-forward approach. So, the broadcast of a message directly depends on the node contact opportunity. | Congestion in the Network: Due to the non-existence of an end-to-end route in OppNet, it is difficult to identify and control the congestion by using a feedback loop. | Wildlife Preserving: For the preservation of animals and birds in the forest or wildlife; OppNet contacts can be utilised to count them. The animal/bird is assumed to be dead when that animal/bird is not in contact with other animals/birds for many days. |
2 | Recurrent Connectivity: Due to no end-to-end route existing from the source node to the destination node, there is an intermittent link in the routing of OppNet. | Low Cost & Infrastructures: The set-up and installation costs are not high. Due to the self-organised nature of this network, doesn’t require any kind of infrastructure. OppNet can work with a single-hop wireless connection. | Delay of Message Transfer: This network works on high delay tolerance; this causes high transfer time from a source node to a receiver node. | Forecasting and Communication in Disaster areas: The areas that are badly affected by a manmade or natural disaster like an earthquake, flood, etc. OppNet can work efficiently and reliably. |
3 | Occasional node contact: There is no fixed interval of contact among nodes, therefore Opportunistic network is based on the principle of occasional contacts among nodes. | Data forwarding and data flooding are two types of message broadcast methods in OppNet. Data forwarding method, the source node first chooses the intermediate node to transfer the message by using some rules. However, in data flooding, the source node disseminates the packet directly and produces many duplicate copies of the message. | Ordering of Message Transfer: Nodes’ contact time is unpredictable because of nodes’ movability in the wireless network. Therefore, it is complex to manage the sequence of message packets during communication in a network. | Communication in Terrains like Mountain or Deserts: OppNet can be used to provide communication services to the area, where wired or wireless networks are not applicable. DTN can be easily established in terrain areas like the Himalayas, Thar desert in Rajasthan, etc. |
4 | Limited Energy Resources: All the opportunistic nodes in OppNet work with the constraint of bounded power resources. For predicting natural disasters like cyclones, an underwater oceanic network is used. This network helps to find the current and speed of water in the ocean. | Applicability: This network is applicable in various applications like; opportunistic computing, pervasive and urban sensing, mobile social networking, IoT, and many more areas [19]. | Security of Biosphere: Plants and trees in the forest can be protected by using an opportunistic network. Therefore, it helps to preserve the biosphere. | |
5 | Store-Carry-Forward: This is the primary principle for OppNet, nodes in this network are associated with a bundle layer and due to intermittent connectivity among nodes, each node carries the message in their buffer and forwards this message to the appropriate next reliable node. | ---- | ---- |