Introduction To Ad Hoc Networks
Introduction To Ad Hoc Networks
Introduction To Ad Hoc Networks
Ad hoc Networks
1-1
Access Point
• Access Points:
⮚Provide infrastructure access to mobile users
⮚Cover a fixed area
⮚Wired into LAN
Why Ad Hoc Networks ?
❒ Ease of deployment
❒ Speed of deployment
1-6
A BSS without an AP is called an ad hoc network;
a BSS with an AP is called an infrastructure network.
Ad hoc
networks
⮚ Temporary network composed of mobile nodes without
preexisting communication infrastructure, such as
Access Point (AP) and Base Station (BS).
⮚ Each node plays the role of router for multi-hop routing.
No need for any fixed radio base stations, no wires or fixed routers.
9
(cont…)
An ad hoc wireless network is self-organizing and adaptive.
10
Wireless Ad-hoc Network(WANET)
❖ Decentralized network.
11
Mobile Ad Hoc Networks (MANET)
Backbon
e
Mobile
nodes
Access
points
MANE
T
Wireless Mobile
Network
12
Mobile Ad-hoc Network
Self-configuringnetwork of mobile routers connected by
wireless links
Random topology
Sensor networks •Collection of embedded sensor devices used to collect real time data to
automate everyday functions. Data highly correlated in time and space,
e.g., remote sensors for weather, earth activities; sensors for
manufacturing equipments.
•Can have between 1000 -100,000 nodes, each node collecting sample
data, then forwarding data to centralized host for processing using low
homogeneous rates.
Location- aware Follow- on services, e.g., automatic call forwarding, transmission of the
Services actual workspace to the current location
Information services
push, e.g., advertise location-specific services, like gas stations
pull, e.g., location-dependent travel guide; services( printer, fax,
phone, server, gas stations) availability information; caches,
intermediate results, state information, etc.
Issues in Ad-Hoc
❖ Routing information
❖ Battery capacity
15
Heterogeneity in Mobile Devices
(a) Heterogeneous mobile device ad hoc networks, and (b) homogeneous ad hoc
16 network comprising powerful laptop computers.
Heterogeneity in Mobile Devices
21
Characteristics of some
existing mobile devices
22
Heterogeneity in Mobile Devices
Come in different favors:
• Sensor Network
24
INTRODUCTION TO WSN
Wirelessly connected
25
Basic features of sensor networks
Low-cost, low-power, multifunctional, and small sensor nodes
26
Basic features of sensor networks
Self-organizing capabilities
Limited bandwidth
Large number of node
Narrow radio range
Frequent topology change
29
Factors influencing sensor network
design✔ Fault tolerance
✔ Scalability
✔ Production costs
✔ Operating environment
✔ Hardware constraints
✔ Transmission media
✔ Power consumption.
30
Sensor Network Model
Sink
31
Sensor Networks Architecture
• Sensor node
✔ Made up of four basic components
✔ Sensing unit, Processing unit, Transceiver unit, and Power unit
• Sink
• Communicate with the task manager node (user) via Internet
32
or satellite
Components of Sensor Node
A sensor node is made up of four basic components
sensing unit
usually composed of two subunits: sensors and analog to digital
converters
(ADCs).
processing unit
Manages the procedures that make the sensor node collaborate with
the other
nodes to carry out the assigned sensing tasks.
Transceiver unit
Connects the node to the network.
33
• Post-deployment phase
Sensors
Deploy
36
Environment
Sensor nodes may be working
✔ in busy intersections,
✔ in the interior of a large machinery,
✔ at the bottom of an ocean,
✔ inside a twister,
✔ in a battlefield beyond the enemy lines,
✔ in a home or a large building
Transmission media
Industrial, scientific and medical (ISM) bands
✔ offer license-free communication in most countries.
Infrared
37
✔ License-free and robust to interference
Micro-sensors----USES
✔ In military: surveillance and target tracing
39
Wireless Mesh Networks
3
6
In a wireless mesh network, the network connection is spread out
among dozens or even hundreds of wireless mesh nodes that
"talk" to each other to share the network connection across a large
area.
Mesh nodes are small radio transmitters that function in the same
way as a
wireless router.
In a wireless mesh network, only one node needs to be physically
wired to a network connection like a DSL Internet modem.That
one wired node then shares its Internet connection wirelessly with
all other nodes in its vicinity.Those nodes then share the connection
wirelessly with the nodes closest to them. The more nodes, the
further the connection spreads, creating a wireless "cloud of
connectivity" that can serve a small office or a city of millions.
Wireless Mesh Networks
Possible deployment scenarios:
Residential zone : where broadband connectivity is
required
Highway: where a communication facility for moving
automobiles is required
Business zones: where an alternative communication
system to cellular network is required
Important civilian regions: where a high degree of
service availability is required
University campus: where inexpensive campus wide
network coverage can be provided.
Operates at license-free ISM band -2.4 GHz and 5
38 GHz.
44
Benefits
Using fewer wires means it costs less to set up a network, particularly for large areas of
coverage.
The more nodes you install, the bigger and faster your wireless network becomes.
They rely on the same WiFi standards (802.11a, b and g) already in place for most
wireless
networks.
They are convenient where Ethernet wall connections are lacking -- for
instance, in outdoor concert venues, warehouses or transportation settings.
They are useful for Non-Line-of-Sight (NLoS) network configurations where
wireless signals are intermittently blocked. For example, in an amusement park a
Ferris wheel occasionally blocks the signal from a wireless access point.
Wireless mesh configurations allow local networks to run faster, because local
packets don't have to travel back to a central server.
Wireless mesh nodes are easy to install and uninstall, making the network extremely
adaptable and expandable as more or less coverage is needed.
45
Electric meters now being deployed on residences transfer their
readings from one to another and eventually to the central office for
billing without the need for human meter readers or the need to
connect the meters with cables.
Mesh networks are "self configuring;" the network automatically
incorporates a new node into the existing structure without needing
any adjustments by a network administrator.
Mesh networks are "self healing," since the network automatically
finds the fastest and most reliable paths to send data, even if nodes
are blocked or lose their signal.
46
Taxonomy
Wireless
Networking
Single
Multi-hop
Hop
⮚ Multihop
⮚ Nodes are wireless, some mobile,
some fixed
⮚ It relies on infrastructure
⮚ Most traffic is user- to-gateway
48
Mesh vs. Sensor Networks
Wireless Sensor Networks Wireless Mesh Networks
⮚ Bandwidth is limited (tens of kbps) ⮚ Bandwidth is generous (>1Mbps)
⮚ In most applications, fixed nodes ⮚ Some nodes mobile, some fixed
⮚ Energy efficiency is an issue ⮚ Normally not energy limited
⮚ Resource constrained ⮚ Resources are not an issue
⮚ Most traffic is user-to-gateway ⮚ Most traffic is user-to-gateway
49
Broadband Internet Access
50
Extend WLAN Coverage
Source: www.meshdynamics.com
Source: www.belair.com
51
WMN Architecture
WMNs (Wireless Mesh Networks) consist of:
mesh routers and mesh clients
Mesh routers
Conventional wireless AP (Access Point) functions
Additional mesh routing functions to support multi-hop
communications
Usually multiple wireless interfaces built on either the same or
different
radio technologies
Mesh clients
Can also work as a router for client WMN
Usually one wireless interface
Classification of WMN architecture
Infrastructure/Backbone WMNs
52
Client WMNs
Infrastructure/backbone
WMNs Internet
Wireless Mesh
Backbone
Wired Clients
Mesh Router Mesh Router Mesh Router
with Gateway with Gateway
Mesh Router
Mesh Router
with Gateway/Bridge
with Gateway/Bridge
Wireless Clients
Mesh Router Mesh Router
with Gateway/Bridge with Gateway/Bridge
Sink node
Access Point Sensor
Wi-Fi Sensor
Networks Base Station Networks
Base Station
Cellular
Networks WiMAX
Networks
53
Client
WMNs
Mesh Client
Mesh Client
Mesh Client
54
Hybrid
WMNs Internet
Wireless Mesh
Backbone
Mesh Router
Mesh Router
with Gateway/Bridge
with Gateway/Bridge
Wi-Fi, Wi-MAX,
Sensor Networks, Conventional Clients
Cellular Networks, etc.
55
Types of Ad Hoc Mobile
Communications
Mobile hosts in an ad hoc mobile network can
communicate with their immediate peers (peer-to-
peer) that are a single radio hop away.
If three or more nodes are within range of each
other (but not necessarily a single hop away from
one another), then remote-to-remote mobile node
communications exist.
Remote-to-remote communications are
associated with group migrations.
56
Types of traffic patterns in Adhoc
Ad hoc wireless communications can occur in several
different forms.
1) Peer-to-peer communication
Mobile host communicates in pair
For a pair of ad hoc wireless nodes, communications
will occur between them over a period of time until the
session is finished or one of the nodes has moved away.
2) Remote-to-remote communication
when two or more devices are communicating
among themselves and they are migrating in
groups.
The traffic pattern is, therefore, one where
57
53
MH: Mobile
Types of Mobile Host Movements
□ Movements by Nodes in a Route
□ Movements by Subnet-Bridging
Nodes
59
Movements by Nodes in a Route
62
Movements by Subnet-Bridging Nodes
□ Subnet-bridging node
movement
between two mobile subnets
can fragment the mobile
smaller
subnet
subnets
into
□ Movements by certain nodes can
result in subnets merging
(yielding bigger subnets) while
sometimes subnet is partitioned
by some subnet- bridging mobile
nodes
□ Updating all the nodes' routing
tables
□ Choose to update only the
affected nodes' association
tables. 63
Concurrent Node Movements
□ Concurrent movements by nodes (SRC,
DEST, or INs)
□ Ensure there is consistency when multiple
route reconfiguration or repair processes
are invoked.
□ Ultimately converge where the most
appropriate route reconfiguration is
performed.
64
Challenges in Ad Hoc Networks
Limited wireless transmission range
Broadcast nature of the wireless medium
Packet losses due to transmission errors
Mobility-induced route changes
Mobility-induced packet losses
Battery constraints
Potentially frequent network partitions
Ease of snooping on wireless transmissions (security
hazard)
65
Issues in Ad Hoc Networks
1. Spectrum Allocation and
Purchase
2. Medium access scheme
3. Routing
4. Multicasting
5. Transport layer protocol
Performance
6. Pricing shceme
7. QoS provisioning
8. Security
9. Energy management
61 10. Addressing and service discovery
1. Spectrum Allocation and Purchase
FCC control the regulations regarding the use of
radio spectrum.
Who regulates the use of radio spectrum in
INDIA??
To prevent interference, ad hoc networks operate
over
some form of allowed or specified spectrum range.
Most microwave ovens operate in the 2.4GHz band,
which can therefore interfere with wireless LAN
systems.
Frequency spectrum is not only tightly
62 controlled and allocated, but it also needs to be
purchased.
2.Medium Access Scheme
Distributed operation
Synchronization
Hidden terminal problem
Exposed terminal problem
Throughput
Access delay
Fairness: especially for relaying
nodes
Real-time traffic support
Resource reservation
Ability to measure resource
availability
Capability for power control
Adaptive rate control 6
3
Media Access
TDMA and FDMA schemes are not suitable.
Many MAC (Media Access Control) protocols do not deal
with host mobility.
The scheduling of frames for timely transmission to support QoS is
difficult.
In ad hoc wireless networks, since the same media are shared by
multiple mobile ad hoc nodes, access to the common channel
must be made in a distributed fashion, through the presence of a
MAC protocol.
There are no static nodes, nodes cannot rely on a centralized
coordinator.
The MAC protocol must contend for access to the channel while at
the same time avoiding possible collisions with neighboring nodes.
The presence of mobility, hidden terminals, and exposed nodes
problems must be accounted for when it comes to designing
MAC protocols for ad hoc wireless networks.
Difference Between Wired
and Wireless
Ethernet LAN Wireless LAN
B
A B C
A C
IEEE has defined the specifications for a wireless LAN, called IEEE
802.11, which covers the physical and data link layers.
A B C
A and C cannot hear each other.
A sends to B, C cannot receive A.
C wants to send to B, C senses a “free”
medium.
Collision occurs at B.
A cannot receive the collision.
A is “hidden” for C.
72
Exposed Terminal Problem
A starts sending to B.
C senses carrier, finds
medium in use and has to
wait for A->B to end.
D is outside the range of A, A B
therefore waiting is not D
C
necessary.
A and C are “exposed”
terminals
73
3. Routing
Challeng
es
Mobility
results in path breaks, packet collisions, transient loops, stale
routing information, and difficulty in resource reservation
BW constraints
Error-prone and shred channel
Bit error rate BER: 10-5 ~ 10-3 wireless vs. 10-12 ~ 10-9 wired
Location-dependent contention
Distribute load uniformly
6
9
Routing
The presence of mobility implies that links make and break often
and in an indeterministic fashion.
Classical distributed Bellman-Ford routing algorithm is used to
maintain and update routing information in a packet radio network.
Yet distance-vector-based routing not designed for wireless
networks, still applicable to packet radio networks since the rate of
mobility is not high.
Mobile devices are now small, portable, and highly integrated.
Ad hoc mobile networks are different from packet radio networks
since nodes can move more freely, resulting in a dynamically
changing topology.
Existing distance-vector and link-state-based routing
protocols are unable to catch up with such frequent link changes
70 in ad hoc wireless networks, resulting in poor route convergence
and very low communication throughput. Hence, new routing
Routing protocols
Routing protocols
Purpose is to dynamically communicate information
about all network paths used to reach a destination and
to select the from those paths, the best path to reach a
destination network.
Types of routing protocol
Distance –vector Routing Protocol
Distance vector protocols use a distance calculation (distance
metric) plus an outgoing network interface (a vector) to choose
the best path to a destination network.
The network protocol (IPX, SPX, IP, Appletalk, DECnet etc.) will
forward data using the best paths selected
Well Supported Protocols such as RIP have been around 76
a long
time and most, if not all devices that perform routing will
understand RIP.
Link state based
Selects the best routing path by calculating the state of
each link in a path and finding the path that has the
lowest total metric to reach the destination.
Link State protocols track the status and connection type
of each link and produces a calculated metric based on
these and other factors, including some set by the
network administrator.
Link state protocols know whether a link is up or
down and how fast it is and calculates a cost to 'get
there'.
Link State protocols will take a path which has more
hops, but that uses a faster medium over a path using a
77
7
6
5. Energy Efficiency
Mobile devices today are mostly operated by batteries.
Battery technology is still lagging behind
microprocessor technology.
The lifetime of an Li-ion battery today is only 2-3 hours.
Such a limitation in the operating hours of a device
implies the need for power conservation.
For ad hoc mobile networks, mobile devices must perform
both the role of an end system (where the user interacts and
where user applications are executed) and that of an
intermediate system (packet forwarding).
Hence, forwarding packets on the behalf of others
will consume power, and this can be quite significant for
77
nodes in an ad hoc wireless network.
Energy Management
Tx power mgmt
MAC: sleep mode
Routing: consider battery life time: load balancing
Transport: reduce ReTx
App
Battery energy mgmt
Extend battery life by taking adv of chemical
properties, discharge patterns, and by the selection of a
battery from a set of batteries
Processor power mgmt
Device power mgmt
7
8
6. TCP Performance
79
TCP relies on measuring the round-trip time (RTT) and packet
loss to conclude if congestion has occurred in the network.
In telecommunications, the round-trip delay time
(RTD) or round-trip time (RTT) is the length of time it takes
for a signal to be sent plus the length of time it takes for an
acknowledgment of that signal to be received. This time delay
therefore consists of the transmission times between the two
points of a signal.
TCP is unable to distinguish the presence of mobility
and network congestion.
Mobility by nodes in a connection can result in packet loss and
long
RTT.
Enhancements needed to ensure that the transport protocol
80
performs properly without affecting the end-to-end
7. Service Location,
Provision, andcomprise
Ad hoc networks Access heterogeneous devices
and machines and not every one is capable of
being a server.
The concept of a client initiating task requests to a
server for execution and awaiting results to be
returned may not be attractive due to limitations in
bandwidth and power.
Concept of remote programming as used in mobile
agents is more applicable since this can reduce the
interactions exchanged between the client and server
over the wireless media.
81
Also, how can a mobile device access a remote
service in an ad hoc network? How can a device that
8. Security & Privacy
Ad hoc networks are intranets and remain as intranets
unless connected to Internet.
Such confined communications have already
isolated attackers who are not local in the
area.
Through neighbor identity authenication, a user can
know if neighboring users are friendly or hostile.
Information sent in an ad hoc route can be protected in
some way but since multiple nodes are involved, the
relaying of packets has to be authenicated by
recognizing the originator of the paket and the flow
82
ID or label.
Security
DoS attack
Resource
consumption
Energy depletion
Buffer overflow
Host impersonation
Information
disclosure
Interference
88
9. Deployment Consideration (1)
Adv. in ad hoc net
Low cont of deployment
Incremental deplyment
Short deplyment time
Reconfigurablity
Scenario of deployment
Military deployment: data-centric or user-centric
Emergency operation deployment: hend-held,
voice/data,
< 100 nodes
Commercial wide-area deployment: e.g.WMN
Home network deplyment
89
Deployment Consideration (2)
Required longevity of network
Area of coverage
Service availability: redundancy
Operational integration with other
infrastructure
Satellite network, UAV(unmanned aerial
vehicles), GPS
Cellular network
Choice of protocols
TDMA or CSMA-based MAC?
Geographical routing (using GPS)
Power-saving routing ?
TCP extension ?
90