Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Similar documents
UNIT 1 Questions & Solutions

Subject: Adhoc Networks

ADHOC NETWORKS. Sub Code : 10IS841/10CS841 IA Marks : 25 Hrs/Week : 04 Exam Hours : 03 Total Hrs : 52 Exam Marks : 100 PART A

R N S INSTITUTE OF TECHNOLOGY CHANNASANDRA, BANGALORE - 98 AD HOC NETWORKS SUBJECT CODE: 06IS841 PREPARED BY

Ad Hoc Networks: Issues and Routing

Part I. Wireless Communication

Resource management issues in mobile ad hoc networks (MANET)

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

IPv6-based Beyond-3G Networking

Routing protocols in WSN

Ad Hoc Networks: Introduction

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Wireless Networks (CSC-7602) Lecture 1 (27 Aug 2007)

SUMMERY, CONCLUSIONS AND FUTURE WORK

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CSMA based Medium Access Control for Wireless Sensor Network

ADHOC NETWORKS (JUNE-2014, DECEMBER-2014 & JUNE-2015)

Introduction to Mobile Ad hoc Networks (MANETs)

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Issue 2, Volume 2 (February 2015)

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

What is an Ad Hoc Network?

Mobile Ad Hoc Networks Summary and Further Reading

Lecture 8 Wireless Sensor Networks: Overview

Lecture 9. Quality of Service in ad hoc wireless networks

Wireless Sensor Networks --- Concepts and Challenges

DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM

CEN 538 Wireless LAN & MAN Networks

GENI Experimental Infrastructure Wireless & Sensor Networks Aug 8, 2005

WSN Routing Protocols

ECE 586 Advanced Topics: Wireless Networking

Wireless Sensor Networks --- Concepts and Challenges

4G Wireless Systems. Outlines. Data Rates of Wireless Networks. Wireless Networks. Wireless Networks Throughput versus Range

Wireless networks: from cellular to ad hoc

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

ARPA Mobile Information Systems Applications Workshop December 7-8, Mobile Networking

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Survey on Multicast Routing Protocols in MANETs

Wireless networks. Wireless Network Taxonomy

WP-PD Wirepas Mesh Overview

AN ANTENNA SELECTION FOR MANET NODES AND CLUSTER HEAD GATEWAY IN INTEGRATED MOBILE ADHOC NETWORK

Wireless# Guide to Wireless Communications. Objectives

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks

Wireless Sensor Networks

IEEE s ESS Mesh Networking

Optimizing IP Networks for Acquisition. Presented by Henry Quintana, Director of Solutions TVU Networks

Wireless Ad-Hoc Networks

Mobile self-organizing networks. Vilmos Simon BME Dept. of Networked Systems and Services

3. Quality of Service

Active source routing for ad-hoc network: seamless integration of wireless environment

The Y-Comm Framework. A new way

Wireless Sensor Networks CS742

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

Admission Control in Time-Slotted Multihop Mobile Networks

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

Protection Schemes for 4G Multihop wireless Networks

Topology Control from Bottom to Top

High-Performance Multipath Routing Algorithm Using CPEGASIS Protocol in Wireless Sensor Cloud Environment

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

Chapter 7 CONCLUSION

CS551 Ad-hoc Routing

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Wireless Networking: An Introduction. Hongwei Zhang

WiFi Networks: IEEE b Wireless LANs. Carey Williamson Department of Computer Science University of Calgary Winter 2018

Mobile Communications. Ad-hoc and Mesh Networks

RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar

IMPLEMENTING MOBILE AD HOC NETWORKING (MANET) OVER LEGACY TACTICAL RADIO LINKS. Presented at MILCOM 2007 October 29, 2007

Ad Hoc Networks - Applications and System Design

Chapter 16 Networking

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

MAC protocols. Lecturer: Dmitri A. Moltchanov

Transport layer issues

Running Reports. Choosing a Report CHAPTER

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Wireless Sensor Networks (WSN)

15-441: Computer Networking. Wireless Networking

Computation of Multiple Node Disjoint Paths

CHAPTER 1 INTRODUCTION

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

CIS 5373 Systems Security

A POLYCOM WHITEPAPER Deploying Enterprise-Grade Wi-Fi Telephony : Coverage, Capacity, Quality of Service, and Security Considerations for Delivering

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Addressing Unique M2M Challenges with Converged Gateways

Strategies and Guidelines for Improving Wireless Local Area Network Performance

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

ISSN: (Online) Volume 2, Issue 3, March 2014 International Journal of Advance Research in Computer Science and Management Studies

CONCLUSIONS AND SCOPE FOR FUTURE WORK

Transcription:

Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu

Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson to develop a short-range, low-power, lowcomplexity, and inexpensive radio inteface WLAN 802.11 spec. is proposed in 1997 2009/11/2 2

Cellular and Ad Hoc Wireless Networks Cellular Wireless Networks: infrastructure dependent network Ad Hoc Networks: multi-hop radio relaying and without support of infrastructure Wireless Mesh Networks Wireless Sensor Networks The major differences between cellular networks and ad hoc networks as summarized in Table 5.1 2009/11/2 3

Wireless Mesh Networks Cellular Wireless Networks Hybrid Wireless Networks Wireless Sensor Networks Infrastructure Dependent (Single-Hop Wireless Networks) Ad Hoc Wireless Networks (Multi-Hop Wireless Networks) Figure 5.1. Cellular and ad hoc wireless networks. 2009/11/2 4

A B C E D Switching Center + Gateway Base Station Mobile Node Path from C to E 2009/11/2 5 Figure 5.2. A cellular networks.

A B F C E D Mobile Node Wireless Link Path from C to E 2009/11/2 6 Figure 5.3. An ad hoc wireless networks

Table 5.1 Differences between cellular networks and ad hoc wireless networks Cellular Networks Ad Hoc Wireless Networks Fixed infrastructure-based Single-hop wireless links Guaranteed bandwidth (designed for voice traffic) Centralized routing Infrastructure-less Multi-hop wireless links Shared radio channel (more suitable for best-effort data traffic) Distributed routing Circuit-switched (evolving toward packet switching) Seamless connectivity (low call drops during handoffs) High cost and time of deployment Reuse of frequency spectrum through geographical channel reuse Packet-switched (evolving toward emulation of circuit switching) Frequency path break due to mobility Quick and cost-effective deployment Dynamic frequency reuse based on carrier sense mechanism 2009/11/2 7

Table 5.1 Differences between cellular networks and ad hoc wireless networks (cont.) Easier to achieve time synchronization Easier to employ bandwidth reservation Application domains include mainly civilian and commercial sector High cost of network maintenance (backup power source, staffing, etc.) Mobile hosts are of relatively low complexity Major goals of routing and call admission are to maximize the call acceptance ratio and minimize the call drop ratio Time synchronization is difficult and consumes bandwidth Bandwidth reservation requires complex medium access control protocols Application domains include battlefields, emergency search and rescue operation, and collaborative computing Self-organization and maintenance properties are built into the network Mobile hosts require more intelligence (should have a transceiver as well as routing/switching capacity) Man aim of routing is to find paths with minimum overhead and also quick reconfiguration of broken paths Widely deployed and currently in the third generation Several issues are to be addressed for successful commercial deployment even though widespread use exists in defense 2009/11/2 8

Applications of Ad Hoc Wireless Networks Military Applications Establishing communication among a group of soldiers for tactical operations Coordination of military object moving at high speeds such as fleets of airplanes or ships Requirements: reliability, efficiency, secure communication, and multicasting routing, Collaborative and Distributed Computing Conference, distributed files sharing Emergency Operations 2009/11/2 Search, rescue, crowd control, and commando operations Support real-time and fault-tolerant communication paths 9

Wireless Mesh Networks An alternate communication infrastructure for mobile or fixed nodes/users Provides many alternate paths for a data transfer session between a source and destination Advantages of Wireless Mesh Networks High data rate, quick and low cost of deployment, enhanced services, high scalability, easy extendability, high availability, and low cost per bit 2009/11/2 10

Wired Network Gateway node Transmission range A house with rooftop transceiver Wired link to the Internet Wireless link Figure 5.4. Wireless mesh networks operating in a residential zone 2009/11/2 11

Internet Radio relay node Multi-hop radio relay link Wired link to the Internet Lamp Coverage area Figure 5.5 Wireless mesh network covering a highway 2009/11/2 12

Wireless Sensor Networks A collection of a large number of sensor nodes that are deployed in a particular region Applications: military, health care, home security, and environmental monitoring Differences with the ad hoc wireless networks: Mobility of nodes, size of network, density of deployment, power constraints, data/information fusion, traffic distribution 2009/11/2 13

Hybrid Wireless Networks HWN such as Multi-hop cellular networks and integrated cellular ad hoc relay networks The base station maintains the information about the topology of the network for efficient routing The capacity of a cellular network can be increased if the network incorporates the properties of multi-hop relaying along with the support of existing fixed infrastructure Advantages: Higher capacity than cellular networks due to better channel reuse Increased flexibility and reliability in routing Better coverage and connectivity in holes 2009/11/2 14

A B C D E Switching Center + Gateway Base Station Mobile Node MCN communication Figure 5.6. MCN architecture. 2009/11/2 15

Issues in Ad Hoc Wireless Networks Medium access scheme Routing, Multicasting, TPC protocol Pricing scheme, QoS, Self-organization Security, Energy management Addressing and service discovery Deployment considerations 2009/11/2 16

Medium Access Scheme Distributed operation fully distributed involving minimum control overhead Synchronization Mandatory for TDMA-based systems Hidden terminals Can significantly reduce the throughput of a MAC protocol Exposed terminals To improve the efficiency of the MAC protocol, the exposed nodes should be allowed to transmit in a controlled fashion without causing collision to the on-going data transfer Access delay 2009/11/2 17

The Major Issues of MAC Scheme Throughput and access delay To minimize the occurrence of collision, maximize channel utilization, and minimize controloverhead Fairness Equal share or weighted share of the bandwidth to all competing nodes Real-time traffic support Resource reservation Such as BW, buffer space, and processing power Capability for power control Adaptive rate control Use of directional antennas 2009/11/2 18

The Major Challenge of Routing Protocol Mobility result in frequent path break, packet collision, and difficulty in resource reservation Bandwidth constraint: BW is shared by every node Error-prone and share channel: high bit error rate Location-dependent contention: distributing the network load uniformly across the network Other resource constraint: computing power, battery power, and buffer storage 2009/11/2 19

The Major Requirement of Routing Protocol Minimum route acquisition delay Quick route reconfiguration: to handle path breaks Loop-free routing Distributed routing approach Minimum control overhead Scalability Provisioning of QoS: supporting differentiated classes of services Support for time-sensitive traffic Security and privacy 2009/11/2 20

The Major Issues in Multicast Routing Robustness Protocols recover and reconfigure quickly from link breaks Efficiency minimum number of transmissions to deliver a data packet to all the group members Minimal Control overhead QoS support Efficient group management Scalability Security 2009/11/2 21

Transport Layer Protocols Objectives: setting up and maintaining End-to-end connections, reliable end-to-end data delivery, flow control, and congestion control Major performance degradation: Frequent path breaks, presence of old routing information, high channel error rate, and frequent network partitions 2009/11/2 22

Quality of Service Provisioning QoS often requires negotiation between the host and the network, resource reservation schemes, priority scheduling and call admission control QoS in Ad hoc wireless networks can be on a per flow, per link, or per node Qos Parameters: different applications have different requirements Multimedia: bandwidth and delay are the key parameters Military: BW, delay, security and reliability Emergency search and-rescue: availability is the key parameters, multiple link disjoint paths WSN: battery life, minimum energy consumption 2009/11/2 23

Quality of Service Provisioning QoS-aware routing: To have the routing use QoS parameters for finding a path The parameters are network through put, packet delivery ratio, reliability, delay, delay jitter, packet lost rate, bit error rate, and path loss QoS framework: A frame work for QoS is a complete system that attempts to provide the promised service The QoS modules such as routing protocol, signaling protocol, and resource management should react promptly according to changes in the network state 2009/11/2 24

Self-Organization An important property that an ad hoc wireless network should exhibit is organizing and maintaining the network by itself Major activities: neighbor discovery, topology organization, and topology reorganization Ad hoc wireless networks should be able to perform self-organization quickly and efficiently 2009/11/2 25

Security The attack against ad hoc wireless networks are classified into two types: passive and active attacks Passive attack: malicious nodes to observe the nature of activities and to obtain information in the network without disrupting the operation Active attack: disrupt the operation of the network Internal attack: nodes belong to the same network External attack: nodes outside the network 2009/11/2 26

Major Security Threats Denial of service: either consume the network BW or overloading the system Resource consumption Energy depletion: by directing unnecessary traffic through nodes Buffer overflow: filling unwanted data, routing table attack (filling nonexistent destinations) Host impersonation: A compromised node can act as another node and respond control packets to create wrong route entries and terminate the traffic Information disclosure: support useful traffic pattern Interference: create wide-spectrum noise 2009/11/2 27

Addressing and Service Discovery An address that is globally unique is required for a node to participate communication Auto-configuration of address is required to allocate nonduplicate address to the nodes In networks frequent partitioning and merging of network components require duplicate address detection mechanisms Nodes in the network should be able to locate services that other nodes provide 2009/11/2 28

Energy Management Transmission power management: RF hardware design ensure minimum power consumption Uses variable power MAC protocol Load balance in network layer Reducing the number of retransmissions at the transport layer Application software developed for mobile computers 2009/11/2 29

Energy Management (cont.) Battery energy management: extending the battery life by taking chemical properties, discharge patterns, and by the selection of a battery from a set of batteries that is available for redundancy Processor power management: CPU can be put into different power saving modes during low processing load conditions Devices power management: can be done by OS by selectively powering down interface devices that are not used or by putting devices into different powersaving modes 2009/11/2 30

Scalability The latency of path-finding involved with an on-demand routing protocol in a large ad hoc wireless network may be unacceptably high A hierarchical topology-based system and addressing may be more suitable for large ad hoc wireless networks 2009/11/2 31

Deployment Considerations The deployment of a commercial ad hoc wireless network has the following benefits Low cost of deployment Incremental deployment Short deployment time Re-configurability 2009/11/2 32

Major Issues for Deployment Scenario of deployment Military deployment Data-centric (e.g. WSN) User-centric (soldiers or vehicles carrying with wireless communication devices) Emergency operations deployment Commercial wide-area deployment Home network deployment Required longevity of network: regenerative power source can be deployed when the connectivityis required for a longer duration of time Area of coverage 2009/11/2 33

Major Issues for Deployment Service availability: redundant nodes can be deployed to against nodes failure Operational integrationwith other infrastructure: can be considered for improve the performance or gathering additional information, or for providing better QoS Choice of protocols: the choices of protocols at different layers of the protocol stack is to be done taking into consideration the deployment scenario 2009/11/2 34

Ad Hoc Wireless in Internet Similar to wireless internet, the ad hoc wireless internet extends the service of the Internet to the end user over an ad hoc wireless network Gateways: entry points to the wired Internet Address mobility: similar to the Mobile IP Routing: major problem in ad hoc wireless Internet Transport layer protocol Load balancing, pricing/billing, security, QoS Service, address, and location discovery 2009/11/2 35

TCP/IP protocol stack Application Layer (HTTP, TELNET, SMTP, etc.) Transport Layer (TCP/UDP) TCP/IP protocol stack Application Layer (HTTP, TELNET, SMTP, etc.) Transport Layer (TCP/UDP) TCP/IP protocol stack Application Layer (HTTP, TELNET, SMTP, etc.) Transport Layer (TCP/UDP) Network Layer (IPv4/IPv6) Network Layer (IPv4/IPv6) Network Layer (IPv4/IPv6) Network Layer (IPv4/IPv6) 802.11/HIPERLAN 802.11/HIPERLAN 802.11 HIPERLAN 802.3/802.4/80 2.5 802.3/802.4/802.5 Mobile node that can be connected to any AP running ad hoc wireless routing protocol Mobile node that can relay packets to any mobile node running ad hoc wireless routing protocol Multi-hop wireless part of ad hoc wireless Internet Ad hoc wireless Internet gateway connected to a subnet of the Internet Internet Traditional wired Internet Flow of an IP packet from the wired Internet to a mobile node Transceiver antenna 2009/11/2 36 Figure 5.7. A schematic diagram of the ad hoc wireless Internet

A Internet Gateway Node A house with rooftop transceiver Path 1 Path 2 Transmission range Wired link to the Internet Wireless link Figure 5.8. An illustration of the ad hoc wireless Internet implemented by a wireless mesh network 2009/11/2 37

Home Work 4, 8, 11, 13 2009/11/2 38