Why mesh? Why ad-hoc?
|
|
- Stanley Haynes
- 6 years ago
- Views:
Transcription
1 Ad-hoc Networking
2 Why mesh? Why ad-hoc? Requires no central authority (no access points); extreme flexibility Self-organizing into local micronetworks based on the population of users rather than the availability of pre-deployed infrastructure Good for network applications driven by personal proximity rules
3 What is wrong with popular commercial solutions? First of all, they don t really work: Bluetooth is mostly for building small personal hubs: arcane pairing rules and no flexible multi-hoping make true ad-hoc impossible WiFi is essentially AP-oriented; as an ad-hoc solution, it is too costly, too cumbersome, power hungry, and unsuitable for most of the applications we have in mind ZigBee has been mostly used in one-hop networks; it doesn t scale very well to true adhoc
4 What is wrong with popular commercial solutions? Second of all, they are isolated networking solutions (design layers) trying to provide standards and cater to unknown applications (that somebody else must build) Complete and rigid application-independent networking stack cannot be effective and small at the same time Being devised by committees and consortia, they try to accommodate too much and tend to be large and messy
5 Ad-hoc networks built around the popular commercial solutions are all based on point-to-point forwarding i.e., setting up hop-by-hop paths in the network Unfortunately, there are no such things as paths in wireless one can only pretend
6 How do they work? Here is a network
7 How do they work? Suppose that some two nodes, call them A and B, want to exchange packets B A
8 How do they work? The network must identify a path, i.e., an exact sequence of intermediate nodes to forward those packets B A
9 How do they work? This involves lots of distributed negotiations, evaluations, and bookkeeping B A
10 Details depend on the scheme Reactive: only look for a path when a specific connection is required Proactive: constantly negotiate paths for all possible (or anticipated) connections to be ready in advance These two generic approaches trade complexity (overhead) for responsiveness
11 Once the path has been established B A
12 Once the path has been established B A
13 Once the path has been established the packet will be addressed on each hop to the single, specific, pre-determined, next node B A
14 Why is this bad? The procedure for discovering the path(s) is tricky and complex The nodes must remember some descriptions of all active (pro-active?) paths passing through them If one node on a path fails, the path becomes broken (its fixing may be as complex as finding a new path) Mind you: we are wireless (possibly mobile); nodes come and go
15 This approach is a legacy of wired networking People like to think in terms of simple connections, like wires
16 This approach is a legacy of wired networking and, if the links are in fact wires, and the nodes don t move, that idea works quite well (see the stationary Internet) B A
17 But there are no wires in the wireless world! B A
18 But there are no wires in the wireless world! You never send your packet to the precisely one next hop node (you only think you do!) B A
19 Also, the illusory links are not as reliable as wires Which path is better? The one with fewer hops appears more attractive, but longer hops are less reliable B A
20 Then, as we have already noticed, the nodes are not nailed down and may disappear (or fail for many legitimate reasons) B A
21 Broken paths must be detected and recovered from B A
22 Broken paths must be detected and recovered from which takes effort and time, possibly traded for space and bandwidth (if you prefer to be proactive) B A
23 Broken paths must be detected and recovered from Note that the new best path may be drastically different from the previous one, e.g., B A
24 The problem is inherent and laden with tradeoffs If you are proactive, your objective is to maintain up to date information about all or anticipated possible paths If you are reactive, you should expect longish hiccups while your paths are being discovered and/or recovered Wisdom requires memory in proportion to the number of paths the node may be involved in (its amount scales more than linearly to the total number of nodes) Timely (up-to-date) wisdom requires traffic, which wastes bandwidth and power
25 Such schemes do not fit the poor reliability model of ad-hoc systems P-P paths are contrived and brittle: you either have a (full) path, or have no path at all (note that the remnants of a broken path may be completely useless) Nodes are inherently unreliable. Don t whine about it! This is OK! This is their charm! Just learn to avoid contrived and fragile solutions, i.e., ones whose global integrity depends on the reliability of a single component!
26 The wireless medium is broadcast
27 The wireless medium is broadcast so the point-to-point links are purely imaginary B A
28 The wireless medium is broadcast so when a node sends something (intended to the single next hop neighbor), all its neighbors will hear that B A
29 The P-P schemes view this as a nuisance that must be fought through various collision avoidance techniques that isolate uninterested neighbors from the one supposedly linked to the sender Those techniques only work (somewhat) if data packets are long; they are useless when sending small amounts of data and, of course, they complicate the messy scheme even more
30 The notorious 4-way handshake A B C D A RTS B CTS E DATA ACK What if the packet you have to send is comparable in size to RTS/CTS/ACK? Then, we have the exposed terminal problem Then, we have the RTS chain problem
31 Here s a scheme that does away with the superstition: TARP The broadcast nature of the medium is a feature, not a flaw! No wires! Deal with it! Instead of wasting time, memory, and bandwidth on discovering and recovering the illusory paths, you should be sending the damn packets! Wisdom will emerge as the regular, useful, packets propagate and are overheard by all the nodes than can rightfully hear them No single item of that wisdom is critical (in the sense that the fate of an elaborate connection would entirely depend upon it)
32 The simple idea: I am A and I have a packet addressed to B; never heard of B before; what to do? A P-P scheme would say: hey, let s send some queries around and wait until everybody learns exactly how to go TARP says: let s send the packet right away I do have to send it eventually, right? no matter where I think it goes, all my neighbors will hear it anyway, right? so why bother with the queries?
33 This is a difference in paradigm; the forwarder s dilemma:? P-P Where should I forward the packet? How can I learn the identity of the next node on the path? How do I make sure to know that identity at all times? TARP Should I transmit (broadcast) the packet? Will I help when I do that? Won t my assistance be redundant?
34 TARP is extremely proactive in the cheapest, most natural sense:? P-P TARP I cannot forward unless I know exactly how and when: I must explicitly receive the packet first Then I must know where to send it next I cannot stop forwarding unless I am sure my help is not needed: Nobody tells me what to receive: I receive what I hear I forward packets by default Unless I have learned that I am not helpful
35 In simple words: P-P is obsessive about learning how to help It has to be obsessive, because it cannot forward at all unless it has the knowledge The knowledge is brittle and elaborate (it relates to a volatile path within the mesh) The knowledge must be complete to be of value
36 In simple words: TARP is not so obsessive about learning when not to help It doesn t have to be obsessive, because the lack of knowledge is not as harmful Partial knowledge is meaningful! A better informed node will use less bandwidth which means that any node can help, according to its means
37 In its vanilla version, this approach amounts to flooding A broadcasts its packet If the node receiving the packet is B, the packet has made it Otherwise, the node re-broadcasts the packet (to all its neighbors) Well, this one is scary indeed: it never stops and does flood the network. Here are two easy fixes: Do not re-broadcast a packet that you have already handled a short while ago Do not re-broadcast stray packets (ones that have made too many hops)
38 TARP does connote with flooding (boo!), but don t let them fool you! There is no way to get something for nothing! All those complicated P-P schemes need flooding at least for path discovery! When TARP knows nothing, it starts by naive flooding; when they know nothing, they are down to (necessarily naive) flooding, too; so we are even there But we can do much better than that!
39 TARP is driven by a chain of rules Received packet rule 1 ignore don t know Am I the recipient? Yes No rule 2 don t know ignore rule N ignore Receive don t know Rebroadcast Ignore
40 TARP is driven by a chain of rules Received packet seen already? rule 1 don t know ignore Am I the recipient? Yes No too many hops? ignore rule 2 don t know ignore rule N Receive don t know other, smarter rules Rebroadcast Ignore
41 TARP is driven by a chain of rules Received packet seen already? rule 1 don t know ignore Am I the recipient? Yes No too many hops? ignore rule 2 don t know ignore rule N Receive don t know their role is to make sure that the packet is only rebroadcast by those nodes that can actually (efficiently, constructively) Rebroadcast help Ignore
42 One of the essential rules: SPD A K h B h AB B h BA h A K has been seeing some packets sent by A and B. It keeps track of: the smallest recently noted number of hops from A (h A ) the smallest recently noted number of hops from B (h B ) When B receives a packet from A, it notes the total number of hops h AB made by it. This number will be conveyed towards A in the header of a next packet going in the opposite direction, i.e., from B to A. And, of course, it works the same way for A receiving a packet from B.
43 One of the essential rules: SPD A h BA K h A h B h AB B h, h BA Suppose K receives a packet sent by A and going to B. K sees that the packet has made h hops so far. The rule has to decide between ignore and don t know. K compares h + h B to h BA. Note that if h + h B > h BA, the node has grounds to believe that there are better forwarders than itself (so the rule may say ignore). A dampening parameter (slack) is usually applied; the rule says ignore if h + h B > h BA + slack. The role of slack is to provide for controllable intentional redundancy.
44 All rules of TARP follow a certain important philosophy They are driven by cached information collected and stored by the node If the node has no room to store all the information, the rule may not know what to do, so it says don t know This means that the packet will not be ignored; it will be rebroadcast! This way we smoothly trade the node s footprint for the redundancy of routes (try this with a P-P scheme )
45 The SPD (Suboptimal Path Discard) rule makes sure that: An un-informed node will not ignore the packet on its account (the node will rebroadcast, thus trying to help) A node that has seen some traffic involving the A-B pair, will tend to help only if its help matters With time, the population of helpers will tend to converge to a stripe of nodes along the best path (its width depends on slack) This will happen without an explicit discovery or recovery phase, while the network is doing its actual job of getting packets delivered
46 No hiccups, no critical nodes A B
47 No hiccups, no critical nodes A B eliminates duplicates primary helpers slack = 1 secondary helpers (also forwarding)
48 No hiccups, no critical nodes A X B Suppose one of the primary helpers disappears
49 No hiccups, no critical nodes A B what was previously removed as a duplicate, has no competition now The secondary helpers take over (without even realizing that)
50 No hiccups, no critical nodes A B No disruption, no need for desperate recovery
51 There is a bit more e.g., more rules and more tricks; they all follow the principles of noncontrivance and auto-scalability TARP is part of a complete, powerful platform for rapid development of networked applications (praxes) The platform has been designed with the premise of self-scalable, ad-hoc oriented collaboration of small and generally unreliable nodes
52 Owing to its open-ended, ruledriven nature... TARP is a meta-protocol: its final shape is determined in the context of the specific application Applications can easily add their own rules, if required, and/or remove some of the standard rules This is in blatant contrast to present commercial solutions, which strive to provide standards of complete network functionality: one size does not fit all!
Network Routing - II Failures, Recovery, and Change
MIT 6.02 DRAFT Lecture Notes Spring 2009 (Last update: April 27, 2009) Comments, questions or bug reports? Please contact Hari Balakrishnan (hari@mit.edu) or 6.02-staff@mit.edu LECTURE 21 Network Routing
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationOccasionally, a network or a gateway will go down, and the sequence. of hops which the packet takes from source to destination must change.
RFC: 816 FAULT ISOLATION AND RECOVERY David D. Clark MIT Laboratory for Computer Science Computer Systems and Communications Group July, 1982 1. Introduction Occasionally, a network or a gateway will go
More informationA local area network that employs either a full mesh topology or partial mesh topology
and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationTaking ad-hoc literally: route-less routing in multi-hop wireless networks
SFU, February 20, 2006 1 Taking ad-hoc literally: route-less routing in multi-hop wireless networks Pawel Gburzynski Department of University of Alberta & Olsonet Communications SFU, February 20, 2006
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationDraft Notes 1 : Scaling in Ad hoc Routing Protocols
Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationLecture 10: Link layer multicast. Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday
Lecture 10: Link layer multicast Mythili Vutukuru CS 653 Spring 2014 Feb 6, Thursday Unicast and broadcast Usually, link layer is used to send data over a single hop between source and destination. This
More informationWi.232DTS and Mesh Networking for short range applications in the US market
Date: 1/2/2004 Written by: Steve Montgomery 1. Introduction Mesh networking has created quite a buzz in the embedded wireless community. It promises self-healing, multi-hop networking capability that lowers
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.6: Wireless Networks - MAC Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationP2P. 1 Introduction. 2 Napster. Alex S. 2.1 Client/Server. 2.2 Problems
P2P Alex S. 1 Introduction The systems we will examine are known as Peer-To-Peer, or P2P systems, meaning that in the network, the primary mode of communication is between equally capable peers. Basically
More informationComputer Network Protocols: Myths, Missteps, and Mysteries. Dr. Radia Perlman, Intel Fellow
Computer Network Protocols: Myths, Missteps, and Mysteries Dr. Radia Perlman, Intel Fellow It s not what you don t know that s the problem. It s what you do know that ain t true.mark Twain (?) 2 Network
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationLecture 16: Wireless Networks
&6( *UDGXDWH1HWZRUNLQJ :LQWHU Lecture 16: Wireless Networks Geoffrey M. Voelker :LUHOHVV1HWZRUNLQJ Many topics in wireless networking Transport optimizations, ad hoc routing, MAC algorithms, QoS, mobility,
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationWireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO
Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationCS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)
CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to
More informationAn Introduction to Business Disaster Recovery
An Introduction to Business Disaster Recovery Martin Hynes - Commercial Director Sounds scary right? When the words disaster and recovery are mentioned our primal survival instincts kick in. Business Disaster
More informationECE 158A: Lecture 13. Fall 2015
ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationMissing Pieces of the Puzzle
Missing Pieces of the Puzzle EE122 Fall 2011 Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ Materials with thanks to Jennifer Rexford, Ion Stoica, Vern Paxson and other colleagues at Princeton and
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More informationLink Layer: Retransmissions
Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability
More informationCSC8223 Wireless Sensor Networks. Chapter 3 Network Architecture
CSC8223 Wireless Sensor Networks Chapter 3 Network Architecture Goals of this chapter General principles and architectures: how to put the nodes together to form a meaningful network Design approaches:
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationDYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET
DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Goals of this chapter Having looked at the individual nodes in the previous chapter, we look at general principles and architectures how to put
More informationCSE 461: Wireless Networks
CSE 461: Wireless Networks Wireless IEEE 802.11 A physical and multiple access layer standard for wireless local area networks (WLAN) Ad Hoc Network: no servers or access points Infrastructure Network
More informationIPv6 Neighbor Discovery (ND) Problems with Layer-2 Multicast State
DRAFT IPv6 Neighbor Discovery (ND) Problems with Layer-2 Multicast State Jeff Wheeler jsw@inconcepts.biz The Problem MLD-snooping is much like IGMP-snooping but for IPv6 It keeps unnecessary multicast
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationWireless TCP Performance Issues
Wireless TCP Performance Issues Issues, transport layer protocols Set up and maintain end-to-end connections Reliable end-to-end delivery of data Flow control Congestion control Udp? Assume TCP for the
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationClient Code - the code that uses the classes under discussion. Coupling - code in one module depends on code in another module
Basic Class Design Goal of OOP: Reduce complexity of software development by keeping details, and especially changes to details, from spreading throughout the entire program. Actually, the same goal as
More information1 GSW Bridging and Switching
1 Sandwiched between the physical and media access layers of local area networking (such as Ethernet) and the routeing of the Internet layer of the IP protocol, lies the thorny subject of bridges. Bridges
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationExtension Web Publishing 3 Lecture # 1. Chapter 6 Site Types and Architectures
Chapter 6 Site Types and Architectures Site Types Definition: A public Web site, an Internet Web site, an external Web site or simply a Web site is one that is not explicitly restricted to a particular
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationInternet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016
Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationAP Bridges and MSTP
802.11 A Bridges and MST Two MST problems are encountered when non-a 802.11 s can be bridges Rev. 1 Norman Finn nfinn@cisco.com 1 References This presentation is available at: http://www.ieee802.org/1/files/public/docs2008/new-nfinnap-bridge-mstp-1108-v1
More informationAN ABSTRACT OF THE THESIS OF
AN ABSTRACT OF THE THESIS OF Richard Edgecombe for the degree of Master of Science in Computer Science presented on March 17, 2008. Title: An Implementation of a Reliable Broadcast Scheme for 802.11 using
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl, Andreas Willig, "Protocols and Architectures for Wireless Sensor Networks," Wiley 2005 Goals of this chapter Having looked at the
More informationMultiple Access in Cellular and Systems
Multiple Access in Cellular and 802.11 Systems 1 GSM The total bandwidth is divided into many narrowband channels. (200 khz in GSM) Users are given time slots in a narrowband channel (8 users) A channel
More informationGetting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg
Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing
More informationG.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Enhancing DSR Protocol Performance in Mobile Ad Hoc Networks
More informationChapter 1 - Introduction
Chapter 1-lntroduction Chapter 1 - Introduction The aim of this chapter is to provide a background to topics which are relevant to the subject of this thesis. The motivation for writing a thesis regarding
More informationAN exam March
AN exam March 29 2018 Dear student This exam consists of 7 questions. The total number of points is 100. Read the questions carefully. Be precise and concise. Write in a readable way. Q1. UDP and TCP (25
More informationAd Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols
d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationDistributed Routing. EECS 228 Abhay Parekh
Distributed Routing EECS 228 Abhay Parekh parekh@eecs.berkeley.edu he Network is a Distributed System Nodes are local processors Messages are exchanged over various kinds of links Nodes contain sensors
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationChapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.
Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 343-396 1 5.1. NETWORK LAYER DESIGN ISSUES 5.2. ROUTING ALGORITHMS 5.3. CONGESTION CONTROL ALGORITHMS 5.4.
More information1.7 Limit of a Function
1.7 Limit of a Function We will discuss the following in this section: 1. Limit Notation 2. Finding a it numerically 3. Right and Left Hand Limits 4. Infinite Limits Consider the following graph Notation:
More informationWireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 20 UAV Networks- Part- III So we come to finally,
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems
More informationPerformance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 5: The 802.11 Standard October 7, 2004 2004 Matt Welsh Harvard University 1 All about 802.11 Today's Lecture CSMA/CD MAC and DCF WEP
More informationComputer Networks. Sándor Laki ELTE-Ericsson Communication Networks Laboratory
Computer Networks Sándor Laki ELTE-Ericsson Communication Networks Laboratory ELTE FI Department Of Information Systems lakis@elte.hu http://lakis.web.elte.hu Based on the slides of Laurent Vanbever. Further
More informationTelematics I. Chapter 6 Internetworking. (Acknowledement: These slides have been compiled from H. Karl s set of slides)
Telematics I Chapter 6 Internetworking (Acknowledement: These slides have been compiled from H. Karl s set of slides) 1 Goals of This Chapter So far: we can communicate between nodes all connected directly
More informationAdministrivia CSC458 Lecture 4 Bridging LANs and IP. Last Time. This Time -- Switching (a.k.a. Bridging)
Administrivia CSC458 Lecture 4 Bridging LANs and IP Homework: # 1 due today # 2 out today and due in two weeks Readings: Chapters 3 and 4 Project: # 2 due next week Tutorial today: Joe Lim on project 2
More informationCS 3640: Introduction to Networks and Their Applications
CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 7: The Link Layer II Medium Access Control Protocols Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You
More informationThere are 10 questions in total. Please write your SID on each page.
Name: SID: Department of EECS - University of California at Berkeley EECS122 - Introduction to Communication Networks - Spring 2005 to the Final: 5/20/2005 There are 10 questions in total. Please write
More informationIn this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more
In this lecture we cover a number of networking issues pertinent to the support of distributed computing. Much of the material is covered in more detail in CS 168, and many slides are taken from there.
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationSome portions courtesy Srini Seshan or David Wetherall
CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationInternet Technology 3/2/2016
Question 1 Defend or contradict this statement: for maximum efficiency, at the expense of reliability, an application should bypass TCP or UDP and use IP directly for communication. Internet Technology
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationAbstract 1.1. OVERVIEW
Operation of Dynamic Source Routing in Wireless Mobile Ad Hoc Networks Kestina Rai 1, Rubinder Kaur 2, Kanchan Aggarwal CSE/IT Department, PTU Chandigarh Engineering College, Landran(Punjab) cupids2@rediffmail.com,rubykhokhar@gmail.com
More informationBasic Reliable Transport Protocols
Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they
More informationMobile Ad-Hoc Networks & Routing Algorithms
Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationDatabase management system Prof. D. Janakiram Department of Computer Science and Engineering Indian Institute of Technology, Madras
Database management system Prof. D. Janakiram Department of Computer Science and Engineering Indian Institute of Technology, Madras Lecture 25 Basic 2-phase & 3-phase Commit protocol In the last lecture,
More information