Introduction To Ad Hoc Networks

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 90

Introduction to

Ad hoc Networks

1-1
Access Point

• A WLAN device that can act as the center


point of a stand-alone wireless network or be
used as the connection point between wireless
and wired networks
• Central communication point for wireless
network user.
• Can link wired and wireless network together.
• Act as a central transmitter and receiver of
WLAN radio signal.
Basic Infrastructure Network
• Infrastructure mode
⮚Associates with an access point
⮚All communication goes through the access point
⮚Used for wireless access at a company or campus

• Access Points:
⮚Provide infrastructure access to mobile users
⮚Cover a fixed area
⮚Wired into LAN
Why Ad Hoc Networks ?
❒ Ease of deployment

❒ Speed of deployment

❒ Decreased dependence on infrastructure

1-6
A BSS without an AP is called an ad hoc network;
a BSS with an AP is called an infrastructure network.
Ad hoc
networks
⮚ Temporary network composed of mobile nodes without
preexisting communication infrastructure, such as
Access Point (AP) and Base Station (BS).
⮚ Each node plays the role of router for multi-hop routing.

⮚ Self-organizing network without infrastructure networks


⮚ Started from DARPA PRNet in 1970

⮚ Cooperative nodes (wireless)


⮚ Each node decode-and-forward packets for other
nodes

⮚ Multi-hop packet forwarding through wireless links


⮚ Proactive/reactive/hybrid routing protocols

⮚ Most work based on CSMA/CA to solve the interference


What Is an Ad Hoc Network?

Collection of two or more devices equipped with wireless


communications and networking capability.

Communicate with another node that is immediately within


their radio range or one that is outside their radio range.

An intermediate node is used to relay or forward the packet from


the source toward the destination.

No need for any fixed radio base stations, no wires or fixed routers.

9
(cont…)
 An ad hoc wireless network is self-organizing and adaptive.

 The term "ad hoc" tends to imply "can take different


forms" and "can be mobile, standalone, or
networked.“

 Handshaking ------sharing of information and services.

10
Wireless Ad-hoc Network(WANET)

❖ Decentralized network.

❖ Ad hoc because it does not rely on a pre-existing


infrastructure

❖ Each node participates in routing dynamically.

❖ Can use flooding for forwarding the data.

11
Mobile Ad Hoc Networks (MANET)

Backbon
e
Mobile
nodes

Access
points

MANE
T
Wireless Mobile
Network

12
Mobile Ad-hoc Network
 Self-configuringnetwork of mobile routers connected by
wireless links

 Random topology

 Routers move randomly free

 Topology changes rapidly and unpredictably

 Standalone fashion or connected to the larger Internet

 While MANETs are self contained, they can also be tied to an


IP-based global or local network – Hybrid MANETs
Cellular and ad hoc wireless networks
Comparison of wireless cellular and wireless ad-hoc network
concepts
MANET Application
Applications Descriptions/Services
Tactical Networks • Military communication, operations
•Coordination of military object moving at high speeds such as fleets of
airplanes or ships
• Automated battlefields

Sensor networks •Collection of embedded sensor devices used to collect real time data to
automate everyday functions. Data highly correlated in time and space,
e.g., remote sensors for weather, earth activities; sensors for
manufacturing equipments.
•Can have between 1000 -100,000 nodes, each node collecting sample
data, then forwarding data to centralized host for processing using low
homogeneous rates.

Emergency •Search, rescue, crowd control, and commando operations as well as


services disaster recovery
• for e.g. Early retrieval and transmission of patient data ( record,
status, diagnosis ) from /to the hospital
•Replacement of a fixed infrastructure in case of earthquakes,
hurricanes, fire etc.
MANET Application
Applications Descriptions/Services
Commercial • E-commerce, e.g., electronic payments from anywhere (i.e., in taxi).
environments • Business:
dynamic access to customer files stored in a central location
on the fly provide consistent databases for all agents
Mobile office
• Vehicular services:
transmission of news ,road conditions ,weather, music
local ad hoc network with nearby vehicles for road/accident
guidance

Home and •Home/office wireless networking(WLAN), e.g., shared whiteboard


enterprise application, use PDA to print anywhere, trade shows
networking • Personal area network (PAN)

Educational • Set up virtual classrooms or conference rooms


applications •Set up ad hoc communication during conferences, meetings, or
lectures
MANET Application
Applications Descriptions/Services

Entertainment Multiuser games


Robotic pets
outdoor internet access

Location- aware Follow- on services, e.g., automatic call forwarding, transmission of the
Services actual workspace to the current location

Information services
push, e.g., advertise location-specific services, like gas stations
pull, e.g., location-dependent travel guide; services( printer, fax,
phone, server, gas stations) availability information; caches,
intermediate results, state information, etc.
Issues in Ad-Hoc

❖ The computation, storage, and communications


capabilities and interoperability

❖ Detection of the presence of connectivity with


neighboring nodes

❖ Routing information

❖ Battery capacity

15
Heterogeneity in Mobile Devices

(a) Heterogeneous mobile device ad hoc networks, and (b) homogeneous ad hoc
16 network comprising powerful laptop computers.
Heterogeneity in Mobile Devices

 The presence of heterogeneity implies that some devices are


more powerful than others, and some can be servers while
others can only be clients.

 Size, computational power, memory, disk, and battery


capacity.

21
Characteristics of some
existing mobile devices

22
Heterogeneity in Mobile Devices
Come in different favors:

• Sensor Network

• Personal Area Network

• Traditional Mobile Ad Hoc


Network 23
WIRELESS SENSOR NETWORK

24
INTRODUCTION TO WSN

 One form of an ad hoc wireless network.

 Collection of a large number of sensor nodes that are


deployed in a particular region

 Wirelessly connected

 There are a variety of sensors, including acoustic(sound related) ,


seismic (Subject to an earthquake or earth vibration), image, heat,
direction, smoke, and temperature sensors.

25
Basic features of sensor networks
 Low-cost, low-power, multifunctional, and small sensor nodes

 Sensor node consists of sensing, data processing, and communicating


components

 A sensor network is composed of a large number of sensor nodes,


 which are densely deployed either inside the phenomenon or very close
to it.

 The position of sensor nodes need not be engineered or pre-determined.


 sensor network protocols and algorithms must possess self-organizing
capabilities.

26
Basic features of sensor networks
 Self-organizing capabilities

 Short-range broadcast communication and multihop


routing

 Dense deployment and cooperative effort of sensor


nodes

 Frequently changing topology due to fading and


node failures

 Limitations in energy, transmit power, memory, and


27
Wireless Sensor Networks
 A sort of ad-hoc
networks
 A network of low cost, Ad Hoc Net
densely deployed,
untethered sensor nodes Wireless
 Application areas: Sensor
heath, military, and home Network
 Placed in inaccessible terrains or disaster areas
 It may be impossible to recharge batteries
 Different Node Characteristics from Traditional nodes
 No of nodes in a sensor network can be several orders of magnitude higher than the
nodes in an Ad Hoc network (100s to 1000s nodes)
 Densely deployed (20 nodes/m3)
 Mobility of nodes is not mendatory
 Prone to failures
 Topology changes very frequently
 Mainly use a broadcast communication, whereas most Ad Hoc networks are based on
point-to-point
 Limited in power, computing capacities, and memory
 May not have global ID because of the large amount of overhead and large number of
sensors
Existing Wireless Net vs. Sensor Net
Cellular system Bluetooth, MANET Sensor Network

Single Hop Multi-hop Multi-hop

High QOS High QOS Power conservation


Bandwidth efficiency

Limited bandwidth
Large number of node
Narrow radio range
Frequent topology change

Station to Base station Peer to peer Peer to multi node


Peer to multi node

29
Factors influencing sensor network
design✔ Fault tolerance
✔ Scalability

✔ Production costs

✔ Operating environment

✔ Sensor network topology

✔ Hardware constraints

✔ Transmission media

✔ Power consumption.
30
Sensor Network Model

Sink

Stimulus Source Sink

31
Sensor Networks Architecture
• Sensor node
✔ Made up of four basic components
✔ Sensing unit, Processing unit, Transceiver unit, and Power unit

✔ Additional application-dependent components


✔ Location finding system, power generator, and mobilizer

✔ Scattered in a sensor field

✔ Collect data and route data back to the sink

• Sink
• Communicate with the task manager node (user) via Internet
32
or satellite
Components of Sensor Node
A sensor node is made up of four basic components

sensing unit
 usually composed of two subunits: sensors and analog to digital
converters
(ADCs).

processing unit
 Manages the procedures that make the sensor node collaborate with
the other
nodes to carry out the assigned sensing tasks.

Transceiver unit
 Connects the node to the network.
33

Power units (the most important unit)


Sensor network topology
• Pre-deployment and deployment phase

✔ Sensor nodes can be either thrown in mass or placed one by


one in the sensor field.

• Post-deployment phase

✔ Sensor network topologies are prone to frequent


changes after deployment.

• Re-deployment of additional nodes phase

✔ Addition of new nodes poses a need to re-organize the


35
DEPLOYMENT OF NODES IN
WSN

Sensors
Deploy

36
Environment
 Sensor nodes may be working
✔ in busy intersections,
✔ in the interior of a large machinery,
✔ at the bottom of an ocean,
✔ inside a twister,
✔ in a battlefield beyond the enemy lines,
✔ in a home or a large building

Transmission media
 Industrial, scientific and medical (ISM) bands
✔ offer license-free communication in most countries.

 Infrared
37
✔ License-free and robust to interference
Micro-sensors----USES
✔ In military: surveillance and target tracing

✔ Health-care industry: allow continuous monitoring of life-


critical information.

✔ Food industry: biosensor technology applied to quality control


can help prevent rejected products from being shipped out

✔ Agriculture: help to determine the quality of soil and moisture


level; they can also detect other bio-related compounds.

✔ Sensors are also widely used for environmental and weather


information gathering.They enable us to make preparations in
times of bad weather and natural disaster. 38
APPLICATIONS OF
WSN

39
Wireless Mesh Networks

Mesh networking is the holy grail of


wireless networking. “Mesh” refers to
many types of technology that enable
wireless systems to automatically find
each other and self- configure
themselves to route information amongst
themselves.
40
Wireless Mesh Networks

 Mesh network implemented over


WLAN
 Industrial standards
Activities

IEEE 802.11, IEEE
802.15,
IEEE801.16 have established
sub-working groups to focus on new
standards for WMNs

3
6
 In a wireless mesh network, the network connection is spread out
among dozens or even hundreds of wireless mesh nodes that
"talk" to each other to share the network connection across a large
area.
 Mesh nodes are small radio transmitters that function in the same
way as a
wireless router.
 In a wireless mesh network, only one node needs to be physically
wired to a network connection like a DSL Internet modem.That
one wired node then shares its Internet connection wirelessly with
all other nodes in its vicinity.Those nodes then share the connection
wirelessly with the nodes closest to them. The more nodes, the
further the connection spreads, creating a wireless "cloud of
connectivity" that can serve a small office or a city of millions.
Wireless Mesh Networks
 Possible deployment scenarios:
Residential zone : where broadband connectivity is
required
Highway: where a communication facility for moving
automobiles is required
Business zones: where an alternative communication
system to cellular network is required
Important civilian regions: where a high degree of
service availability is required
University campus: where inexpensive campus wide
network coverage can be provided.
Operates at license-free ISM band -2.4 GHz and 5
38 GHz.
44
Benefits
 Using fewer wires means it costs less to set up a network, particularly for large areas of
coverage.
 The more nodes you install, the bigger and faster your wireless network becomes.
 They rely on the same WiFi standards (802.11a, b and g) already in place for most
wireless
networks.
 They are convenient where Ethernet wall connections are lacking -- for
instance, in outdoor concert venues, warehouses or transportation settings.
 They are useful for Non-Line-of-Sight (NLoS) network configurations where
wireless signals are intermittently blocked. For example, in an amusement park a
Ferris wheel occasionally blocks the signal from a wireless access point.
 Wireless mesh configurations allow local networks to run faster, because local
packets don't have to travel back to a central server.
 Wireless mesh nodes are easy to install and uninstall, making the network extremely
adaptable and expandable as more or less coverage is needed.
45
 Electric meters now being deployed on residences transfer their
readings from one to another and eventually to the central office for
billing without the need for human meter readers or the need to
connect the meters with cables.
 Mesh networks are "self configuring;" the network automatically
incorporates a new node into the existing structure without needing
any adjustments by a network administrator.
 Mesh networks are "self healing," since the network automatically
finds the fastest and most reliable paths to send data, even if nodes
are blocked or lose their signal.

46
Taxonomy
Wireless
Networking

Single
Multi-hop
Hop

Infrastructure- Infrastructure-less Infrastructure- Infrastructure-


based (ad-hoc) based (Hybrid) less (MANET)
(hub&spoke)

802.11 802.16 Bluetooth


802.11
Cellular Car-to-car
Networks Wireless Sensor Wireless Mesh Networks
Networks Networks
(VANETs)
47
Mesh vs. Ad-Hoc
Networks
►Wireless Mesh Networks

⮚ Multihop
⮚ Nodes are wireless, some mobile,
some fixed
⮚ It relies on infrastructure
⮚ Most traffic is user- to-gateway

48
Mesh vs. Sensor Networks
Wireless Sensor Networks Wireless Mesh Networks
⮚ Bandwidth is limited (tens of kbps) ⮚ Bandwidth is generous (>1Mbps)
⮚ In most applications, fixed nodes ⮚ Some nodes mobile, some fixed
⮚ Energy efficiency is an issue ⮚ Normally not energy limited
⮚ Resource constrained ⮚ Resources are not an issue
⮚ Most traffic is user-to-gateway ⮚ Most traffic is user-to-gateway

49
Broadband Internet Access

50
Extend WLAN Coverage

Source: www.meshdynamics.com

Source: www.belair.com

51
WMN Architecture
 WMNs (Wireless Mesh Networks) consist of:
 mesh routers and mesh clients
 Mesh routers
 Conventional wireless AP (Access Point) functions
 Additional mesh routing functions to support multi-hop
communications
 Usually multiple wireless interfaces built on either the same or
different
radio technologies
 Mesh clients
 Can also work as a router for client WMN
 Usually one wireless interface
 Classification of WMN architecture
 Infrastructure/Backbone WMNs
52
 Client WMNs
Infrastructure/backbone
WMNs Internet

Wireless Mesh
Backbone

Wired Clients
Mesh Router Mesh Router Mesh Router
with Gateway with Gateway

Mesh Router
Mesh Router
with Gateway/Bridge
with Gateway/Bridge
Wireless Clients
Mesh Router Mesh Router
with Gateway/Bridge with Gateway/Bridge

Sink node
Access Point Sensor

Wi-Fi Sensor
Networks Base Station Networks
Base Station
Cellular
Networks WiMAX
Networks

53
Client
WMNs

Mesh Client

Mesh Client

Mesh Client

54
Hybrid
WMNs Internet

Wireless Mesh
Backbone

Mesh Router Mesh Router Mesh Router


with Gateway with Gateway

Mesh Router
Mesh Router
with Gateway/Bridge
with Gateway/Bridge

Mesh Router Mesh Router Mesh Router

Wi-Fi, Wi-MAX,
Sensor Networks, Conventional Clients
Cellular Networks, etc.

Wireless Mesh Clients

55
Types of Ad Hoc Mobile
Communications
 Mobile hosts in an ad hoc mobile network can
communicate with their immediate peers (peer-to-
peer) that are a single radio hop away.
 If three or more nodes are within range of each
other (but not necessarily a single hop away from
one another), then remote-to-remote mobile node
communications exist.
 Remote-to-remote communications are
associated with group migrations.

56
Types of traffic patterns in Adhoc
Ad hoc wireless communications can occur in several
different forms.
1) Peer-to-peer communication
Mobile host communicates in pair
For a pair of ad hoc wireless nodes, communications
will occur between them over a period of time until the
session is finished or one of the nodes has moved away.
2) Remote-to-remote communication
when two or more devices are communicating
among themselves and they are migrating in
groups.
The traffic pattern is, therefore, one where
57

communications occur over a longer period of time.


Types of traffic patterns in Adhoc
3) Hybrid Communication
 have a scenario where devices communicate in a
non- coherent fashion and their communication
sessions are, therefore, short, abrupt, and
undeterministic.

53
MH: Mobile
Types of Mobile Host Movements
□ Movements by Nodes in a Route

□ Movements by Subnet-Bridging
Nodes

□ Concurrent Node Movements

59
Movements by Nodes in a Route

Source Intermediat Destinatio


nodes e nodes n
nodes
Downstrea Upstrea
m link m
link
60
Cont
…hoc route comprises the source (SRC), destination (DEST),
An ad
and/or a number of intermediate nodes (INs).
 Movement by any of these nodes will affect the validity of the route.
 An SRC node
 has a downstream link, and
 when moves out of its downstream neighbour's radio coverage range,
the existing route will immediately become invalid.
 all downstream nodes may have to be informed so they can erase their
invalid route entries.
 DEST node
 moves out of the radio coverage of its upstream neighbour, the route
becomes
invalid.
 The upsteam nodes will have to be informed so they can erase their
invalid route entries.
56 IN node : any movement by an IN supporting an existing route may
 Movements cause many conventional distributed
routing protocols to respond in sympathy with the
link changes.
 Need to update all the remaining nodes within the
network so that consistent routing information can
be maintained.
 Updating process involves broadcasting over the
wireless medium, which results in wasteful
bandwidth and an increase in overall network control
traffic. Hence, new routing protocols are needed.

62
Movements by Subnet-Bridging Nodes
□ Subnet-bridging node
movement
between two mobile subnets
can fragment the mobile
smaller
subnet
subnets
into
□ Movements by certain nodes can
result in subnets merging
(yielding bigger subnets) while
sometimes subnet is partitioned
by some subnet- bridging mobile
nodes
□ Updating all the nodes' routing
tables
□ Choose to update only the
affected nodes' association
tables. 63
Concurrent Node Movements
□ Concurrent movements by nodes (SRC,
DEST, or INs)
□ Ensure there is consistency when multiple
route reconfiguration or repair processes
are invoked.
□ Ultimately converge where the most
appropriate route reconfiguration is
performed.
64
Challenges in Ad Hoc Networks
 Limited wireless transmission range
 Broadcast nature of the wireless medium
 Packet losses due to transmission errors
 Mobility-induced route changes
 Mobility-induced packet losses
 Battery constraints
 Potentially frequent network partitions
 Ease of snooping on wireless transmissions (security
hazard)

65
Issues in Ad Hoc Networks
1. Spectrum Allocation and
Purchase
2. Medium access scheme
3. Routing
4. Multicasting
5. Transport layer protocol
Performance
6. Pricing shceme
7. QoS provisioning
8. Security
9. Energy management
61 10. Addressing and service discovery
1. Spectrum Allocation and Purchase
 FCC control the regulations regarding the use of
radio spectrum.
 Who regulates the use of radio spectrum in
INDIA??
 To prevent interference, ad hoc networks operate
over
some form of allowed or specified spectrum range.
 Most microwave ovens operate in the 2.4GHz band,
which can therefore interfere with wireless LAN
systems.
 Frequency spectrum is not only tightly
62 controlled and allocated, but it also needs to be
purchased.
2.Medium Access Scheme
 Distributed operation
 Synchronization
 Hidden terminal problem
 Exposed terminal problem
 Throughput
 Access delay
 Fairness: especially for relaying
nodes
 Real-time traffic support
 Resource reservation
 Ability to measure resource
availability
 Capability for power control
 Adaptive rate control 6
3

Media Access
 TDMA and FDMA schemes are not suitable.
 Many MAC (Media Access Control) protocols do not deal
with host mobility.
 The scheduling of frames for timely transmission to support QoS is
difficult.
 In ad hoc wireless networks, since the same media are shared by
multiple mobile ad hoc nodes, access to the common channel
must be made in a distributed fashion, through the presence of a
MAC protocol.
 There are no static nodes, nodes cannot rely on a centralized
coordinator.
The MAC protocol must contend for access to the channel while at
the same time avoiding possible collisions with neighboring nodes.
 The presence of mobility, hidden terminals, and exposed nodes
problems must be accounted for when it comes to designing
MAC protocols for ad hoc wireless networks.
Difference Between Wired
and Wireless
Ethernet LAN Wireless LAN
B
A B C
A C

 If both A and C sense the channel to be idle at the same time,


they send
at the same time.
 Collision can be detected at sender in Ethernet.
 Half-duplex radios in wireless cannot detect collision at
70 sender.
802.11 - Carrier Sensing

IEEE has defined the specifications for a wireless LAN, called IEEE
802.11, which covers the physical and data link layers.

In IEEE 802.11, carrier sensing is performed


at the air interface (physical carrier sensing), and
at the MAC layer (virtual carrier sensing)
Physical carrier sensing
detects presence of other users by analyzing all detected packets
Detects activity in the channel via relative signal strength from other
sources
Virtual carrier sensing is done by sending MPDU duration information in
the header of RTS/CTS and data frames
Channel is busy if either mechanisms indicate it to be
Duration field indicates the amount of time (in microseconds) required to
complete frame transmission
Stations in the BSS use the information in the duration field to adjust their
71
network allocation vector (NAV)
Hidden Terminal Problem

A B C
A and C cannot hear each other.
A sends to B, C cannot receive A.
C wants to send to B, C senses a “free”
medium.
Collision occurs at B.
A cannot receive the collision.
A is “hidden” for C.

72
Exposed Terminal Problem

 A starts sending to B.
 C senses carrier, finds
medium in use and has to
wait for A->B to end.
 D is outside the range of A, A B
therefore waiting is not D
C
necessary.
 A and C are “exposed”
terminals

73
3. Routing
 Challeng
es
Mobility
 results in path breaks, packet collisions, transient loops, stale
routing information, and difficulty in resource reservation
BW constraints
Error-prone and shred channel
 Bit error rate BER: 10-5 ~ 10-3 wireless vs. 10-12 ~ 10-9 wired
Location-dependent contention
 Distribute load uniformly

6
9
Routing
 The presence of mobility implies that links make and break often
and in an indeterministic fashion.
 Classical distributed Bellman-Ford routing algorithm is used to
maintain and update routing information in a packet radio network.
 Yet distance-vector-based routing not designed for wireless
networks, still applicable to packet radio networks since the rate of
mobility is not high.
 Mobile devices are now small, portable, and highly integrated.
 Ad hoc mobile networks are different from packet radio networks
since nodes can move more freely, resulting in a dynamically
changing topology.
 Existing distance-vector and link-state-based routing
protocols are unable to catch up with such frequent link changes
70 in ad hoc wireless networks, resulting in poor route convergence
and very low communication throughput. Hence, new routing
Routing protocols
Routing protocols
Purpose is to dynamically communicate information
about all network paths used to reach a destination and
to select the from those paths, the best path to reach a
destination network.
Types of routing protocol
Distance –vector Routing Protocol
 Distance vector protocols use a distance calculation (distance
metric) plus an outgoing network interface (a vector) to choose
the best path to a destination network.
 The network protocol (IPX, SPX, IP, Appletalk, DECnet etc.) will
forward data using the best paths selected
 Well Supported Protocols such as RIP have been around 76
a long
time and most, if not all devices that perform routing will
understand RIP.
 Link state based
Selects the best routing path by calculating the state of
each link in a path and finding the path that has the
lowest total metric to reach the destination.
Link State protocols track the status and connection type
of each link and produces a calculated metric based on
these and other factors, including some set by the
network administrator.
Link state protocols know whether a link is up or
down and how fast it is and calculates a cost to 'get
there'.
Link State protocols will take a path which has more
hops, but that uses a faster medium over a path using a
77

slower medium with fewer hops.


Difference

 If all routers were running a Distance


Vector protocol, the path or 'route' chosen
would be from A B directly over the ISDN
serial link, even though that link is about
10 times slower than the indirect route
from A C D B.
 A Link State protocol would choose the A
C D B path because it's using a
faster medium (100 Mb ethernet).
 In this example, it would be better to run a
Link State routing protocol, but if all the
links in the network are the same speed, 78

then a Distance Vector protocol is better.


Routing (2)
 Requirements
Minimum route acquisition
delay
Quick route reconfiguration
Loop-free routing
Distributed routing approach
Minimum control overhead
Scalability
QoS provisioning
Support for time-sensitive
traffic
Security and privacy
7
4
4. Multicasting
 Multiparty communcations are enabled through
the presence of multicast routing protocols.
 The multicast backbone (MBone) comprises an
interconnection of multicast routers that are capable
of tunnelling multicast packets through non-
multicast routers.
 Some multicast protocols use a broadcast-and-
prune approach to build a multicast tree rooted
at the source.Others use core nodes where the
multicast tree originates.
 All such methods rely on the fact that routers are
75
static, and once the multicast tree is formed, tree
nodes will not move. However, this is not the case in
Multicasting
 Robusteness
recover and reconfigure quickly from potential
mobility- induced link breaks
Efficiency
Min control overhead
QoS support
Efficient group management
Scalability
security

7
6
5. Energy Efficiency
 Mobile devices today are mostly operated by batteries.
Battery technology is still lagging behind
microprocessor technology.
 The lifetime of an Li-ion battery today is only 2-3 hours.
Such a limitation in the operating hours of a device
implies the need for power conservation.
 For ad hoc mobile networks, mobile devices must perform
both the role of an end system (where the user interacts and
where user applications are executed) and that of an
intermediate system (packet forwarding).
 Hence, forwarding packets on the behalf of others
will consume power, and this can be quite significant for
77
nodes in an ad hoc wireless network.
Energy Management
 Tx power mgmt
MAC: sleep mode
Routing: consider battery life time: load balancing
Transport: reduce ReTx
App
 Battery energy mgmt
Extend battery life by taking adv of chemical
properties, discharge patterns, and by the selection of a
battery from a set of batteries
 Processor power mgmt
 Device power mgmt
7
8
6. TCP Performance

 TCP is an end-to-end protocol designed to provide flow


and congestion control in a network. TCP is a
connection- oriented protocol; hence, there is a
connection establishment phase prior to data
transmission.The connection is removed when data
transmission is completed.
 TCP (Transmission Control Protocol) assumes that
nodes in the route are static, and only performs flow
and congestion activities at the SRC and DEST nodes.

79
 TCP relies on measuring the round-trip time (RTT) and packet
loss to conclude if congestion has occurred in the network.
 In telecommunications, the round-trip delay time
(RTD) or round-trip time (RTT) is the length of time it takes
for a signal to be sent plus the length of time it takes for an
acknowledgment of that signal to be received. This time delay
therefore consists of the transmission times between the two
points of a signal.
 TCP is unable to distinguish the presence of mobility
and network congestion.
 Mobility by nodes in a connection can result in packet loss and
long
RTT.
 Enhancements needed to ensure that the transport protocol
80
performs properly without affecting the end-to-end
7. Service Location,
Provision, andcomprise
 Ad hoc networks Access heterogeneous devices
and machines and not every one is capable of
being a server.
 The concept of a client initiating task requests to a
server for execution and awaiting results to be
returned may not be attractive due to limitations in
bandwidth and power.
 Concept of remote programming as used in mobile
agents is more applicable since this can reduce the
interactions exchanged between the client and server
over the wireless media.
81
 Also, how can a mobile device access a remote
service in an ad hoc network? How can a device that
8. Security & Privacy
 Ad hoc networks are intranets and remain as intranets
unless connected to Internet.
 Such confined communications have already
isolated attackers who are not local in the
area.
 Through neighbor identity authenication, a user can
know if neighboring users are friendly or hostile.
 Information sent in an ad hoc route can be protected in
some way but since multiple nodes are involved, the
relaying of packets has to be authenicated by
recognizing the originator of the paket and the flow
82
ID or label.
Security
 DoS attack
 Resource
consumption
Energy depletion
Buffer overflow
 Host impersonation
 Information
disclosure
 Interference

88
9. Deployment Consideration (1)
 Adv. in ad hoc net
Low cont of deployment
Incremental deplyment
Short deplyment time
Reconfigurablity
 Scenario of deployment
Military deployment: data-centric or user-centric
Emergency operation deployment: hend-held,
voice/data,
< 100 nodes
Commercial wide-area deployment: e.g.WMN
Home network deplyment
89
Deployment Consideration (2)
 Required longevity of network
 Area of coverage
 Service availability: redundancy
 Operational integration with other
infrastructure
 Satellite network, UAV(unmanned aerial
vehicles), GPS
 Cellular network
 Choice of protocols
 TDMA or CSMA-based MAC?
 Geographical routing (using GPS)
 Power-saving routing ?
 TCP extension ?
90

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy