10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C
|
|
- Florence Perkins
- 6 years ago
- Views:
Transcription
1 obile ad hoc networks Standard obile needs an infrastructure ome gent/oreign gent in the fixed network S, routing, etc., are not designed for mobility Sometimes there is no infrastructure! remote areas, ad-hoc meetings, disaster areas cost can also be an argument against an infrastructure! ain topic: routing no default router available every node should be able to forward Solution: Wireless ad-hoc networks etwork without infrastructure Use components of participants for networking xamples Single-hop: ll partners max. one hop apart luetooth piconet, s in a room, gaming devices ulti-hop: over larger distances, circumvent obstacles luetooth scatternet, TT police network, car-to-car networks, mesh networks, nternet: T (obile d-hoc etworking) group T: obile d-hoc etworking obile outer anet obile evices obile, ixed etwork outer nd system 1
2 roblem o. 1: outing ighly dynamic network topology evice mobility plus varying channel quality Separation and merging of networks possible symmetric connections possible time = t 1 time = t 2 good link weak link Traditional routing algorithms istance Vector periodic exchange of messages with all physical neighbors that contain information about who can be reached at what distance selection of the shortest path if several paths available ink State periodic notification of all routers about the current state of all physical links routers get a complete picture of the network xample packet radio network (1973), V-outing every 7.5s exchange of routing tables including link quality updating of tables also by reception of packets routing problems solved with limited flooding outing in ad-hoc networks T big topic in many research projects 100+ proposals exist The most simplest one: looding! easons lassical approaches from fixed networks fail Very slow convergence, large overhead ighly dynamic, low bandwidth, low computing power etrics for routing inimal umber of nodes, loss rate, delay, congestion, interference aximal Stability of the logical network, battery run-time, time of connectivity 2
3 roblems of traditional routing algorithms ynamic of the topology frequent changes of connections, connection quality, participants hallenges periodic updates of routing tables need energy without contributing to the transmission of user data, sleep modes difficult to realize limited bandwidth of the system is reduced even more due to the exchange of routing information links can be asymmetric, i.e., they can have a direction dependent transmission quality may need knowledge from other layers (e.g., interference, connectivity) centralized approaches won t work well limited energy of nodes notion of connection may not work SV (estination Sequenced istance Vector) arly work on demand version: V xpansion of distance vector routing Sequence numbers for all routing updates assures in-order execution of all updates avoids loops and inconsistencies ecrease of update frequency store time between first and best announcement of a path inhibit update if it seems to be unstable (based on the stored time values) ynamic source routing Split routing into discovering a path and maintaining a path iscover a path only if a path for sending packets to a certain destination is needed and no path is currently available aintaining a path only while the path is in use one has to make sure that it can be used continuously o periodic updates needed! 3
4 ynamic source routing ath discovery broadcast a packet with destination address and unique if a station receives a broadcast packet if the station is the receiver (i.e., has the correct destination address) then return the packet to the sender (path was collected in the packet) if the packet has already been received earlier (identified via ) then discard the packet otherwise, append own address and broadcast packet sender receives packet with the current path (address list) ptimizations limit broadcasting if maximum diameter of the network is known caching of address lists (i.e., paths) with help of passing packets stations can use the cached information for path discovery (own paths or paths for other hosts) S: oute iscovery Sending from to S: oute iscovery roadcast [,,4711] [,,4711] 4
5 5 S: oute iscovery [,/,4711] [,/,4711] [,/,4711] [,/,4711] S: oute iscovery [,//,4711] [,//,4711] [,//,4711] [,//,4711] (alternatively: [,//,4711]) S: oute iscovery [,///,4711] [,///,4711] [,///,4711]
6 6 S: oute iscovery [,////,4711] (alternatively: [,////,4711]) [,////,4711] S: oute iscovery [,/////,4711] S: oute iscovery ath:,,,
7 ynamic Source outing aintaining paths after sending a packet wait for a layer 2 acknowledgement (if applicable) listen into the medium to detect if other stations forward the packet (if possible) request an explicit acknowledgement if a station encounters problems it can inform the sender of a packet or look-up a new path locally nterference-based routing () outing based on assumptions about interference between signals S S 2 neighbors (i.e. within radio range) xamples for interference based routing east nterference outing () calculate the cost of a path based on the number of stations that can receive a transmission ax-in esidual apacity outing () calculate the cost of a path based on a probability function of successful transmissions and interference east esistance outing () calculate the cost of a path based on interference, jamming, and other transmissions is very simple to implement, only information from direct neighbors is necessary 7
8 plethora of ad-hoc routing protocols lat proactive SS uzzy Sighted ink State S isheye State outing S ptimized ink State outing rotocol T Topology roadcast ased on everse ath orwarding reactive V d hoc n demand istance Vector S ynamic Source outing ierarchical S lusterhead-ateway Switch outing S ierarchical State outing Z Zone outing rotocol eographic position assisted istance outing ffect lgorithm for obility eoast eographic ddressing and outing S reedy erimeter Stateless outing ocation-ided outing lustering of ad-hoc networks ase station nternet luster head luster Super cluster urther difficulties and research areas uto-onfiguration ssignment of addresses, function, profile, program, Service discovery iscovery of services and service providers ulticast Transmission to a selected group of receivers uality-of-service aintenance of a certain transmission quality ower control inimizing interference, energy conservation mechanisms Security ata integrity, protection from attacks (e.g., enial of Service) Scalability 10 nodes? 100 nodes? 1000 nodes? nodes? ntegration with fixed networks 8
9 10/29/08 The next step: Wireless Sensor etworks s ommonalities with Ts Self-organization, multi-hop Typically wireless, should be energy efficient xample: ifferences to Ts pplications: T more powerful, more general W more specific evices: T more powerful, higher data rates, more resources W rather limited, embedded, interacting with environment Scale: T rather small (some dozen devices) W can be large (thousands) asic paradigms: T individual node important, centric W network important, individual node may be dispensable, data centric obility patterns, uality-of Service, nergy, ost per node typical W ntegration of Sensor odes () and ateways (W) W W luetooth W S W et ern th W xample: ScatterWeb Sensor odes mbedded Sensor oard Sensors icrophone/speaker, camera, display, sender/receiver, precise timing ommunication using 868 z radio transceiver Software uminosity, noise detection, gas, vibration, movement detection, pressure ange up to 2 km S, 500 m indoor Simple programming ( interface) ptional: operating systems TinyS, ontiki ptional: T/, web server outing, management, urther information: mbedded Sensor oard odular Sensor ode 9
10 10/29/08 xample: ScatterWeb ateways US Simple ntegration world nables over-the-air programming either point-to-point or broadcast including reliable multi-hop thernet 45 dapter for 10/100 bit/s ower-over-thernet (802.3af) Standard nternet protocols (, T, TT, TTS,, ) ntegrated Web server providing applets for sensor net control Secure access of ScatterWeb from any browser on the net ll-in-one W, thernet, luetooth, S, S/S, US, serial hallenges and esearch reas ong-lived, autonomous networks Use environmental energy sources mbed and forget Self-healing Self-configuring networks outing ata aggregation ocalization anaging wireless sensor networks Tools for access and programming Update distribution Scalability, uality of Service outing in Ws is different o addressing, but simple, locally valid s xample: directed diffusion nterest essages ata essages nterest in sensor data: ttribute/value pair radient: remember direction of interested node Send back data using gradients op count guarantees shortest path Sink 10
11 10/29/08 nergy-aware routing nly sensors with sufficient energy forward data for other nodes xample: outing via nodes with enough solar power is considered for free Solar-aware routing Solar-powered node Send status updates to neighbors ave neighbor nodes reroute the traffic ither proactive or when sniffing ongoing traffic Today s Ws irst generation of Ws is available iverse sensor nodes, several gateways ven with special sensors: cameras, body temperature asic software outing, energy conservation, management Several prototypes for different applications nvironmental monitoring, industrial automation, wildlife monitoring any see new possibilities for monitoring, surveillance, protection Sensor networks as a cheap and flexible new means for surveillance onitoring and protection of goods arge application area besides military hemicals, food, vehicles, machines, containers, aw enforcement, disaster recovery, industry, private homes, 11
Mobile Communications Chapter 8: Routing Protocols
Mobile Communications Chapter 8: Routing Protocols Ad-hoc networks Routing protocols Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS05 8.1 Mobile ad hoc networks Standard Mobile IP
More informationMobile Ad-hoc Networks. Computer Networks
Mobile Ad-hoc Networks Computer Networks Mobile ad hoc networks Standard Mobile IP needs an infrastructure Home Agent/Foreign Agent in the fixed network DNS, routing etc. are not designed for mobility
More informationRouting in Ad-hoc Networks
0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in
More informationUnicast Routing in Mobile Ad Hoc Networks
Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain
More informationWireless Internet Routing
Wireless nternet Routing Wireless Routing in the eginning 1 Wireless nternet Routing This course: routing in T/ad hoc networks and mesh networks o nternet? = ateway(s) wireless/wired 2 1 Outline Review
More informationRouting In Ad Hoc Networks
Routing n d oc Networks ontents 1. ntroduction to ad-hoc networks 2. Proactive routing protocols OLR 3. Reactive routing protocols R, OV 4. Non-uniform routing protocols ZRP, R 5. Other approaches eographical
More informationPage 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)
173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)
More informationDynamic Source Routing (DSR) [Johnson96]
ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom
More informationPage 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)
173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationThe Basics of Wireless Communication Octav Chipara
The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationPage 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols
173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationDynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5
ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom
More informationAd Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols
d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationWhat is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats
What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern
More informationPart I. Wireless Communication
1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable
More informationOutline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2
CS5984 Mobile Computing Outline : a Survey Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech An Introduction to 1 2 1/2 Advances in micro-electro-mechanical systems technology, wireless communications,
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationAODV Route Requests (RREQ) are forwarded in a manner similar to DSR
d oc On-emand istance Vector (OV) R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationRouting in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services
Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services Spring 05. IoT challenges IoT nodes are heterogeneous Some have important resources Smart phones, cars, coke machines
More informationCEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni
3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides
More informationAdaptive routing for mobile ad hoc networks
RSRH Open ccess daptive routing for mobile ad hoc networks Jeroen Hoebeke *, Ingrid Moerman and Piet emeester bstract eveloping efficient routing protocols for mobile ad hoc networks remains a challenging
More informationLower Layers PART 3: RPL layer in Contiki with the Z1
Slide ower ayers PRT 3: RP layer in ontiki with the Z Kris Steenhaut - Jacques Tiberghien Remark: all numerical data refer to the parameters defined in 802..4 for 32. Kbytes/s transmission in the 2.4 z
More informationWireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 20 UAV Networks- Part- III So we come to finally,
More informationSetup Ad Hoc Routing Protocol over On-Demand Backup Node
etup d oc Routing Protocol over On-emand ackup ode Ying-ong Wang, hi ing hung, hih-hieh huang epartment of omputer cience and nformation ngineering, Tamang University 151 Ying-chuan Road, Tamsui 25137,
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationAd Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationDynamic Source Routing in Ad Hoc Wireless Networks
Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213-3891 dbj@cs.cmu.edu Abstract
More informationDSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016
estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric
More informationAd Hoc Networks: Introduction
Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2
More informationDiscussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich
iscussion 8: Link State Routing S : omputer Networks Marti Motoyama & hris Kanich Schedule Project Questions: mail hris, post to moodle, or attend his OH Homework Questions? Link State iscussion S iscussion
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationThird Generation Routers
IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry
More informationCSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)
S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access
More informationAd Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Mobile Communication Networks (RCSE) Winter Semester 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) Routing
More informationQUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi
QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,
More informationOutline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols
Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University
More informationPage 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols
173/S152, Winter 2006 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV Hybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and
More informationNomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:
Nomadic ommunications Wireless Mesh Networks Renato Lo igno Loigno@disi.unitn.it - Tel: 2026 Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications opyright Quest operaèprotettadallalicenza:
More informationMobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2
Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive
More informationMobile Ad-Hoc Networks & Routing Algorithms
Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationAdvanced Computer Networks
istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of
More informationDynamic Source Routing in ad hoc wireless networks
Dynamic Source Routing in ad hoc wireless networks David B. Johnson David A. Maltz Computer Science Department Carnegie Mellon University In Mobile Computing, vol. 353, chapter 5, T. Imielinski and H.
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationAd hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl
Ad hoc and Sensor Networks Chapter 1: Motivation & Applications Holger Karl Goals of this chapter ad hoc & sensor networks are good What their intended application areas are Commonalities and differences
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationA Survey on Path Weight Based routing Over Wireless Mesh Networks
A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi
More informationVehicle Networks. Networking Layer: Routing. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl
Vehicle Networks Networking Layer: Routing Univ.-Prof. r. Thomas Strang, ipl.-inform. Matthias Röckl Outline Introduction Lecture Vehicle Networks, Thomas Strang and Matthias Röckl, WS 008/009 Classical
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationPart I: Introduction to Wireless Sensor Networks. Xenofon Fafoutis
Part I: Introduction to Wireless Sensor Networks Xenofon Fafoutis Sensors 2 DTU Informatics, Technical University of Denmark Wireless Sensor Networks Sink Sensor Sensed Area 3 DTU Informatics,
More informationRouting Basics ISP/IXP Workshops
Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationUnit 2. Signaling and Single Area OSPF
nit ignaling and ingle rea PF elecommunications ignaling ignaling g sed to provide all of the set up, tare down and call processing information such as: ff hook notification alling party number alled party
More informationWT-4000 Wireless System
WT-4000 Wireless System Best Practices WT-BAC-IP Code No. LIT-12012551 Issued July 2017 Background and Wireless Network Components Refer to the QuickLIT website for the most up-to-date version of this
More informationRouting Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols
Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationWireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) Introduction M. Schölzel Difference to existing wireless networks Infrastructure-based networks e.g., GSM, UMTS, Base stations connected to a wired backbone network Mobile
More informationSecure Routing in Wireless Sensor Networks: Attacks and Countermeasures
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures By Chris Karlof and David Wagner Lukas Wirne Anton Widera 23.11.2017 Table of content 1. Background 2. Sensor Networks vs. Ad-hoc
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationRouting Basics ISP/IXP Workshops
Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to
More informationMANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.
MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationDynamic Routing. Lecturer: Carlos Rey-Moreno Networking Course Honors on Computer Science University of the Western Cape
Dynamic Routing Lecturer: Carlos Rey-Moreno carlos.reymoreno@gmail.com Networking Course Honors on Computer Science University of the Western Cape 18 Feb - 2013 Static vs Dynamic Routing Static Routing
More informationIP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing
IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationElements of a wireless network. Elements of a wireless network. Some wireless link standards. Elements of a wireless network
Elements of a wireless Elements of a wireless wireless hosts laptop, D, I phone run applications may be stationary (non-mobile) or mobile wireless does not always mean mobility base station typically connected
More informationAd hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7
d hoc On-demand istance Vector Routing (OV) [Perkins99] 6811 : Lecture 7 d Hoc On-emand istance Vector Routing (OV) R includes source routes in packet headers G ata. Header Large headers can sometimes
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationMobile Ad-hoc Networks
Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples
More informationRouting Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing
Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)
ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor
More informationDetection of Attacks on Application and Routing Layer in Tactical MANETs
communication systems group Detection of Attacks on Application and Routing Layer in Tactical MANETs Elmar Gerhards-Padilla, Nils Aschenbruck 1 Structure Mobile Ad-hoc Network (MANET) Tactical MANET Reference
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationEnergy Efficiency and Latency Improving In Wireless Sensor Networks
Energy Efficiency and Latency Improving In Wireless Sensor Networks Vivekchandran K. C 1, Nikesh Narayan.P 2 1 PG Scholar, Department of Computer Science & Engineering, Malabar Institute of Technology,
More informationOverview (Advantages and Routing Protocols) of MANET
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 855-861 Research India Publications http://www.ripublication.com Overview (Advantages and Routing Protocols)
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationUnit 8. Spanning Tree protocol, Virtual LANs (VLANs) and Access Networks
nit 8 panning ree protocol, Virtual s (Vs) and ccess etworks panning ree Protocol (P) Designed to prevent bridging loops ach bridge has unique D consisting of Priority + address n power up the bridge or
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationSENSOR-MAC CASE STUDY
SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle
More informationPerformance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
More informationWireless Sensor Networks --- Concepts and Challenges
Wireless Sensor Networks --- Concepts and Challenges Outline Basic Concepts Applications Characteristics and Challenges 2 1 Basic Concepts Traditional Sensing Method Wired/Wireless Object Signal analysis
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More information