Part I. Wireless Communication

Similar documents
UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Mobile Ad-Hoc Networks & Routing Algorithms

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Wireless Networking & Mobile Computing

Ad Hoc Networks: Introduction

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Overview (Advantages and Routing Protocols) of MANET

Wireless Ad-Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Outline. CS5984 Mobile Computing. Dr. Ayman Abdel-Hamid, CS5984. Wireless Sensor Networks 1/2. Wireless Sensor Networks 2/2

Routing protocols in WSN

UNIT 1 Questions & Solutions

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

ECS-087: Mobile Computing

Ad Hoc Networks: Issues and Routing

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Introduction to Networks and the Internet

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

Introduction to Mobile Ad hoc Networks (MANETs)

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Wireless Sensor Networks (WSN)

ITRAINONLINE MMTK BASIC WIRELESS INFRASTRUCTURE AND TOPOLOGIES HANDOUT

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Subject: Adhoc Networks

Ad hoc and Sensor Networks Chapter 1: Motivation & Applications. Holger Karl

Survey on Multicast Routing Protocols in MANETs

References. The vision of ambient intelligence. The missing component...

Wireless Security Background

IEEE s ESS Mesh Networking

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology. Mobile Communication

WSN Routing Protocols

Last Lecture: Data Link Layer

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Lecture 8 Wireless Sensor Networks: Overview

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

CSMA based Medium Access Control for Wireless Sensor Network

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

ECE 586 Advanced Topics: Wireless Networking

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

IEEE s Multihop MAC. Mateusz Wielgosz

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

ECE 4450:427/527 - Computer Networks Spring 2017

LECTURE 9. Ad hoc Networks and Routing

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

Mobile Communications. Ad-hoc and Mesh Networks

Multihop Mobile and Vehicular Networks

Announcements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

SUMMERY, CONCLUSIONS AND FUTURE WORK

Introduction. Computer Networks Term B10

CHAPTER 1 INTRODUCTION

Wireless Ad Hoc and Sensor Networks Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A Survey - Energy Efficient Routing Protocols in MANET

Performance Evaluation of MANET through NS2 Simulation

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

DOWNLOAD PDF INFRASTRUCTURE AND AD HOC MODES

An Introduction to Cyber-Physical Systems INF5910/INF9910

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Active source routing for ad-hoc network: seamless integration of wireless environment

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

CS551 Ad-hoc Routing

Wireless Sensor Networks --- Concepts and Challenges

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless networks: from cellular to ad hoc

Ad Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks

Introduction to Networking Devices

CEN 538 Wireless LAN & MAN Networks

Wireless Sensor Networks --- Concepts and Challenges

Wireless Sensor Networks (WSN) Tanyar Pooyeh Intelligent Robotics - winter semester 2013/14 Nov 11, 2013

Topic 2b Wireless MAC. Chapter 7. Wireless and Mobile Networks. Computer Networking: A Top Down Approach

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India

An Energy Efficient Cluster based Load Balance Routing for Wireless Sensor Network

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Announcements: ECE/CS 372 introduction to computer networks. Assign 4 is due this Thursday Lab 4 is due next Tuesday Assignment 5 posted soon

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

15-441: Computer Networking. Wireless Networking

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Wireless and WiFi. Daniel Zappala. CS 460 Computer Networking Brigham Young University

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Mobile Ad Hoc Networks

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Resource management issues in mobile ad hoc networks (MANET)

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

Modeling Wireless Sensor Network for forest temperature and relative humidity monitoring in Usambara mountain - A review

Transcription:

1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks

2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable people to stay connected with the world from almost anywhere and everywhere, even while on the move. A typical cellular network connects different mobile users to one another via a fixed, i.e. stationary Base Station (BS). In this sense, all present day cellular radio links are mobile at one end only - the user end, while the service provider end is stationary. Wireless communication & mobile computing AAU

3 Cont In contrast, ad-hoc networks are envisioned to eliminate the need for central BSs by directly connecting mobile users to one another. they are also referred to as \mobile-to-mobile" or \doubly mobile" networks. In such networks, all the nodes are mobile and data is routed by relaying from one node to another. Wireless communication & mobile computing AAU

4 Basic Wireless Infrastructure and Topologies

5 Basic Network Topologies 4/18/2018

6 Topologies Relevant for Wireless Networking Star Yes, standard wireless topology Tree Yes (a combination of star and Bus) Line Yes, with two or more elements (PtP) Mesh Yes, mainly partial mesh Ring Possible, but rarely found Bus Not applicable. Why? 4/18/2018

7 Wireless components Access Point Wireless transmitter/receiver that bridges between wireless nodes and a wired network IEEE 802.11 + Wired Ethernet connection Wireless clients Any computer with a wireless network adapter card that transmits and receives RF signals Laptop, PDA, surveillance equipment, VoIP phone

8 Some General Remarks Wireless communication needs no medium EM waves travel through nothing The line in a network diagram is the connection that is being made Wireless communication is always 2way Except for passive sniffing Applies to transmitters/receivers, clients/masters

9 Wireless Network Operates in 2 different modes: Infrastructure mode Associates with an access point All communication goes through the access point Used for wireless access at a company or campus Peer-to-Peer Ad Hoc Mode If two nodes are within range of each other they can communicate directly with no access point A few users in a room could quickly exchange files with no access point required

10 Infrastructure Access Access Points: Provide infrastructure access to mobile users Cover a fixed area Wired into LAN a wireless access point(ap) is a device that allows wireless devices to connect to a wired network using Wi-Fi, or related standards. The AP usually connects to a router (via a wired network) as a standalone device, but it can also be an integral component of the router itself.

11 Infrastructure Access

12

13 Problems Access Point placement depends on wired network availability. Obstructions make it difficult to provide total coverage of an area. Site surveys are performed to determine coverage areas. Security Concerns: rogue access points in companies etc.. Each Access Point has limited range.

14 Peer to Peer Ad Hoc Mode 4/18/2018

15 Peer to Peer Ad Hoc Mode X 4/18/2018

16 Problems Communication is only possible between nodes which are directly in range of each other.

17 Problems for both Infrastructure and Ad hoc Mode If nodes move out of range of the access point (Infrastructure Mode) OR nodes are not in direct range of each other (Ad Hoc Mode) Then communication is not possible!!

18 What if?? Multi-hop Infrastructure Access Multi-hop Ad Hoc Network OR 4/18/2018

19 Multi-hop Infrastructure Access Nodes might be out of range of the access point, BUT in range of other nodes. The nodes in range of the access point could relay packets to allow out of range nodes to communicate.

20 Multi-hop Ad Hoc Network If communication is required between two nodes which are out of range of each other, intermediary nodes can forward the packets. Source Destination 4/18/2018

21 Mobile Ad Hoc Networks (MANET) Formed by wireless hosts which may be mobile. Without (necessarily) using a pre-existing infrastructure Routes between nodes may potentially contain multiple hops. 4/18/2018

22 Cont. May need to traverse multiple links to reach a destination

23 Cont. Mobility causes route changes

24 Why Ad Hoc Networks? Ease of deployment Speed of deployment Decreased dependence on infrastructure 4/18/2018

25 Many Applications Personal area networking cell phone, laptop, ear phone, wrist watch Military environments soldiers, tanks, planes Civilian environments taxi cab network

26 Cont meeting rooms sports stadiums boats, small aircraft Emergency operations search-and-rescue policing and fire fighting

27 Challenges Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard)

Unicast Routing in Mobile Ad Hoc Networks 28 4/18/2018

29 Why is Routing in MANET different? Host mobility link failure/repair due to mobility may have different characteristics than those due to other causes. Rate of link failure/repair may be high when nodes move fast New performance criteria may be used route stability despite mobility energy consumption

30 Unicast Routing Protocols Many protocols have been proposed Some have been invented specifically for MANET Others are adapted from previously proposed protocols for wired networks No single protocol works well in all environments some attempts made to develop adaptive protocols

31 Routing Protocols Proactive protocols Determine routes independent of traffic pattern Traditional link-state and distance-vector routing protocols are proactive Reactive protocols Maintain routes only if needed Hybrid protocols More

32 Trade-Off Latency of route discovery Proactive protocols may have lower latency since routes are maintained at all times Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y Overhead of route discovery/maintenance Reactive protocols may have lower overhead since routes are determined only if needed

33 Cont Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating. Which approach achieves a better trade-off depends on the traffic and mobility patterns.

Overview of Unicast Routing Protocols 34

35 Flooding for Data Delivery Sender S broadcasts data packet P to all its neighbors Each node receiving P forwards P to its neighbors Sequence numbers used to avoid the possibility of forwarding the same packet more than once Packet P reaches destination D provided that D is reachable from sender S Node D does not forward the packet

36 Flooding for Data Delivery Y Z A B H S C I E G F K J D M N L Represents a node that broadcast packet P Represents that connected nodes are within each other s transmission range

37 Flooding for Data Delivery Broadcast transmission Y Z A B H S C I E G F K J D M N L Represents a node that receives packet P for the first time Represents transmission of packet P

38 Flooding for Data Delivery Y Z A B H S C I E G F K J D M N L Node H receives packet P from two neighbors: potential for collision

39 Flooding for Data Delivery Y Z A B H S C I E G F K J D M N L Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P once

40 Flooding for Data Delivery Y Z A B H S C I E G F K J D M N L Nodes J and K both broadcast packet P to node D Since nodes J and K are hidden from each other, their transmissions may collide Wireless => communication Packet & mobile P may Computing not be Addis delivered Ababa University to node D at all, despite the use of flooding

41 Flooding for Data Delivery Y Z A B H S C I E G F K J D M N L Node D does not forward packet P, because node D is the intended destination of packet P

42 Flooding for Data Delivery Y Z B A H Flooding completed S C I E G F K J D M N L Nodes unreachable from S do not receive packet P (e.g., node Z) Nodes for which all paths from S go through the destination D also do not receive packet P (example: node N)

43 Flooding for Data Delivery Y Z A B H S C I E G F K J D M N L Flooding may deliver packets to too many nodes (in the worst case, all nodes reachable from sender may receive the packet)

44 Flooding for Data Delivery: Advantages Simplicity May be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher this scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions Potentially higher reliability of data delivery Because packets may be delivered to the destination on multiple paths

45 Flooding for Data Delivery: Disadvantages Potentially, very high overhead Data packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery Flooding uses broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead Broadcasting in IEEE 802.11 MAC is unreliable In our example, nodes J and K may transmit to node D simultaneously, resulting in loss of the packet in this case, destination would not receive the packet at all

46 Wireless Sensor Networks/WSN Wireless Sensor Networks (WSNs): Highly distributed networks of small, lightweight wireless nodes, Deployed in large numbers, Monitors the environment or system by measuring physical parameters such as temperature, pressure, humidity. Node: sensing + processing + communication

47 WSN: A Wireless Sensor Network (WSN) consists of base stations and a number of wireless sensors (nodes).

48 Cont Large number of heterogeneous sensor devices Ad Hoc Network Sophisticated sensor devices communication, processing, memory capabilities

49 Applications of WSNs Constant monitoring & detection of specific events Military, battlefield surveillance Forest fire & flood detection Habitat exploration of animals Patient monitoring Home appliances

50 Comparison with Ad Hoc Wireless Networks Both consist of wireless nodes but they are different. In WSN: The number of nodes is very large Being more prone to failure, energy drain Not having unique global IDs Resource limitations: memory, power, processing

51 Design Issues & Challenges Random deployment autonomous setup & maintenance Infrastructure-less networks distributed routing Energy, the major constraint trading off network lifetime for fault tolerance or accuracy of results Hardware energy efficiency Distributed synchronization Adapting to changes in connectivity Real-time communication Security

52 Design Factors Scalability Fault tolerance Power consumption Sensor network architectures: Layered Clustered