Ec8702-Adhoc and Wireless Sensor Networks-Unit Notes
Ec8702-Adhoc and Wireless Sensor Networks-Unit Notes
• Gamma radiation
• X-ray radiation
• Ultraviolet radiation
• Visible radiation
• Infrared radiation
• Microwave radiation
• Radio waves
Electromagnetic spectrum
Frequency bands in electromagnetic
spectrum
• Defined by International Telecommunication
Union
Low frequency bands
• Radio waves
• Micro waves
• Infrared waves
• Visible light portions
Radio waves
• Wavelength : <0.01nm
• Highest frequency
• Medical applications - treat the cancer patient
• Produced by atomic nucleus
Ultraviolet radiation
Pr = Pt Gt Gr (λ/4π)2 (1/dγ)
Fading
• Fluctuations in signal strength when received
by the receiver.
Fast fading/ Small scale fading
Slow fading/Large scale fading
Fast fading
(different version of tx-ed signal)
• Fast fluctuations in amp, phase and delay of the received
signal.
• Fluctuations due to ?
• Interference between multiple copies of the same transmitted
signal reaching the receiver at a little different times.
• Occurs due to three propagation mechanisms
Slow fading (object blockings)
• Shadow fading
• Receiver inside the building or transmitted signal pass through
the wall
• Little variation in received power
Interference
• Interaction of waves that are correlated with each
other.
• Either they travel from the same source
• Or they have same frequency.
• This incident occurs when two waves meet at a point
while traveling along the same transmission medium.
– Adjacent channel interference
– Co-channel interference
– Inter symbol interference
Adjacent channel interference
• Near by freq interfere with on-going
transmission signal
• Avoided by using guard band
Co-channel interference
• Narrow band interference
• Same frequency can be
reused by nearby systems
• Avoided by multiuser
detection mechanism,
directional antennas and
dynamic channel allocation
mechanisms
Inter symbol interference
• Distortion in telecommunication
• One or more symbols interfere with other
symbol
• Due to multipath propagation and consequent
overlapping of individual pulses – blur or
mixture of signal
• Adaptive equalization – allocate the time to
each pulses
Doppler shift
• Transmitter and receiver moves :
– Towards – high freq
– Away – low freq
• Doppler shift
fd =v/λ
• Nyquist’s theorem
• Shannon’s theorem
Nyquist’s theorem
• Distributed operation
• Synchronization
• Hidden terminal problem
• Exposed terminal problem
• Throughput
Access delay
• Real time traffic support
• Resource reservation
• Ability to measure resource
availability
• Capability for power control
• Adaptive rate control
• Use of directional antennas
Routing
• Route selected based on hop
count
Requirements of routing
Minimum delay
Quick route configuration
Loop free routing
Distributed routing approach
Minimum control overhead
Scalability
QoS
Time sensitive traffic and security
Major design issues
Mobility
Bandwidth constraint
shared channel
Battery power
Storage capacity
Multicasting
• What is Multicasting ?
Transmission of Same
message
• To ?
A group of mobile nodes
• In ?
Single transmission.
Major design issues
• Efficiency
• Control overhead
• QoS
• Scalability and security
Transport layer protocol
• Protocols are used to Set up and maintain ?
End-to-end connection.
• Focus on?
Flow control and congestion control
• What is TCP ?
• Transfer Control Protocol.
• It is a connection oriented protocol.
• Used in ?
• Wired Networks.
• Performance in TCP is degraded due to
frequent path breaks
High mobility
Bandwidth
Power
Channel error rate
Frequent network partitions
• TCP is divided into two – More packet loss
• Performance in TCP is
degraded due to
frequent path breaks
High mobility
Bandwidth
Power
Channel error rate
Frequent network
partitions
Pricing scheme
• 1 (sender node)-5(receiver node)
• 2(power off)
• 1-2-5 (optimal path) – not effective
QoS
• If there is a better coordination and cooperation between ?
- Service provider and the user
- then high QoS can be achieved.
QOS can differ from application to application.
• Bandwidth and delay are important parameters for ?
• Multimedia applications
• Identifying trusty nodes and routing packets through them are
key parameters of ?
• Defense applications.
• Multiple link disjoint paths and availability are the key
parameters of ?
• Emergency and rescue operations related applications.
Self-organization
• Self – configure
• Self Organization includes ?
- Neighbour discovery.
- Topology organization.
- reorganization
• Topology can be varied – high mobility, node
failures and frequent N/W partitioning
• Every node maintain the updated information
• Beacon signals – transferred to all nodes
Security
• Passive attack :
• Caused by ?
• Malicious nodes present in the network.
• To obtain ?
• Information being exchanged in network.
• This type of attacks would not disturb network operation.
• Active attack - disturb the N/W operation
Internal attack –attackers within the network
External attack - attackers external the network.
• Some other security threats are ?
-DoS (Denial of service)
- Information disclosure and interference.
Addressing and service discovery
• Address of mobile node is ?
Globally unique identifier
• Used for ?
Communication in Adhoc network.
• Since nodes join into a ?
new network and leave from the current network any time
• Any auto configuration scheme is required to ?
Allocate non duplicate addresses to the nodes.
• Adhoc n/w also requires ?
A duplicate address-detection mechanism
• In order to maintain ?
Unique addressing throughout the network.
Energy management
• In a node,
• It is the process of managing ?
- the sources and consumers
• Of ?
- energy
• To ?
- boost up the lifetime of the node in the network.
Four categories.
• Transmission power management
• Battery energy management
• Processor power management
• Device power management
• Architecture Types:
– Layered
– Clustured.
Layered Architecture
• UNIFIED NETWORK PROTOCOL FRAMEWORK.
(UNPF)
• UNPF:
• It integrates 3 operations in its structure:
-Network initialization and Maintenance
protocol
- MAC
- Routing protocols
Network initialization and
Maintenance protocol
• BS Can communicate with all • As a response message:
nodes • Each sensor node sends its ID at
• Using ? lowest power level.
One hop communication • This can be listened by BS at layer
• Over ? one
Shared media. • Because ?
• BS broadcasts its identifier (ID) • All the nodes are single hop
• To ? distance away from BS.
Sensor nodes using CDMA . • Now, the BS broadcasts control
message to all the layer one
Sensor nodes which receive the
nodes with their ID.
ID of BS will store the ID.
• All sensor nodes send a beacon
message again.
• Layer 1 nodes form layer two
• With ?
• Nodes which are one hop away from layer one nodes
• And records its ID’s.
• Layer -1 node inform this to ?
• BS of Layer-2 nodes
• Which in turn will broadcast to all the nodes.
• In this manner, the layered architecture can be built by BS and
Sensor nodes.
MAC Protocol
• For the data transmission,
• Distributed TDMA Receiver Oriented Channel
(DTROC) assignment MAC protocol is used.
• Two operations of DTROC protocol are:
– Channel allocating
– Channel scheduling
• Channel allocation: • Channel Scheduling:
- What it is? • Sharing of ?
It is the process • Reception channel
of ? • With ?
Assigning reception • Neighbours.
channel • DTROC uses suitable
to ? channel allocating
every node. algorithms.
•
• Separate receiving channel is
assigned
• for ?
• each node
• by ?
• BS.
• Each node make ?
• transmission slot schedule and
broadcast to ?
• its neighbours
• thereby enabling ?
• collision free transmission and
saves energy.
UNPF - R
• It makes the sensor nodes
• To ?
• Vary their communication range
• To ?
• Improve performance.
• Small transmission range would make many network
partitions
• Whereas, large Covered area may reduce spatial reuse of
frequencies.
Clustured Architecture
• It organized the nodes in n/w into clusters.
• Each cluster contains – Cluster head
• Nodes in each cluster would Exchange
message within the cluster.
• Each cluster head can also communicate with
the BS which is an access point and connected
to a wired network.
Clustered architecture
• Used in ?
• Sensor networks to achieve data fusion.
• Clustering can be extended to various numbers of depths
hierarchically.
• Data collected by all the cluster members can be fused to
cluster head and the resulting information can be
communicated to BS.
• The cluster formation and the selection of cluster heads are
fully autonomous and distributed process.
• This could be achieved through network layer protocols such
as Low-Energy Adaptive Clustering Hierarchy.
• What is LEACH ?
• One of the clustering based protocols
• What it do ?
• It minimizes energy dissipation
• In ?
• Sensor networks.
UNIT-II
• Radio techniques:
- 2.4 GHz ISM band.
- Increases reliability & throughput
Physical Layer divided into?
• Two sublayers:
• Physical Medium Dependent sublayer (PMD)
• Physical layer convergence protocol sublayer (PLCP)
• PMD Performs:
-Encoding, Decoding , Modulation and Demodulation of
signals.
• PLCP provides:
-Service access point and a clear channel assignment carrier
sense signal to the MAC Layer of WLAN.
MAC Layer
• 2 MAC Protocols used in WLAN.
• 1) Point Coordination Function (PCF)
• 2) Distributed Coordination Function (DCF)
• PCF:
- Centralized scheme
- Polling scheme
• DCF:
- Distributed scheme.
- Based on CSMA/CA
15
16
ISSUES IN DESIGNING ROUTING PROTOCALS FOR
AD HOC NETWORKS.
• Mobility
• Bandwidth constraint
• Error prone shared broadcast radio channel
• Hidden and exposed terminal problems
• Resource constraints
• Security issues
17
Mobility
18
• Mobility cause frequent
path break.
19
Bandwidth Constraint
20
Error Prone Shared
• Collision occur at node because of ?
• Hidden and exposed terminal problem.
21
Types of ad hoc routing protocol
• Proactive or table driven routing protocols
• Reactive or on demand routing protocols
• Hybrid routing protocols
22
Proactive
• Other name table driven routing Tables – Updated periodically.
protocol To ?
• Each node maintains a routing Maintain the current stable/
table. available paths.
• Routing table contains up to date This can be achieved by ?
routing information of the entire Exchanging or broadcasting the
network. periodic beacon signals between
• Whenever a node wants to send nodes.
a packet to the receiver node, So that,
- it looks up in own routing table
Each node can have the knowledge
To ? about the complete network
Find the routing table topology.
To ? Hence,
Find the routing path Each node can update its routing
From ? table based on beacon signal it
Itself to receiver. has received from its negihbours.
23
Reactive routing protocol
• On demand routing protocols
• Mixed:
• Best features of two.
24
Proactive Routing Protocols
• Protocols which use the concept of Proactive
routing
– Destination sequenced distance vector routing
protocol
– Wireless routing protocol
– Cluster –head gateway switch routing protocol
– Fisheye state routing
25
Destination sequenced distance
vector routing protocol
• @ DSDV Protocol in adhoc.
• One of the Popular proactive routing protocols
• DSDV-each node keeps record of route
information- form of routing table
26
Each node contains....
• ID of destination node
• Details of next hop
• Metric
• Sequence number
• Time to live parameter
27
Cond...
• Each route broadcast message includes
• List of ID of Destination node
• No of hop required
• Next hop
• Recent sequence number
• Metric parameter
28
29
• Each node updated its routing table with each
other
• Updation of routing in two ways
*Full dump update--node sends
whole routing table to neighbours-increases
network over head.
*Incremental update—recent
update only sent-suitable-large n/w &stable-
avoid heavy traffic.
30
Table maintenance in DSDV
• Each node receives the route
information with most sequence
number from other nodes
• Updates its table
• Nodes looks –table –to find
shortest path
• According to path information-
each node construct another
routing table
• New table will broadcast
• On receipt of these messages –
neighbour node updates its table
31
32
33
Maintaining metric field
• All nodes are moving
• Topology changes dynamically
• Each node sent routing table update packet to its neighbours
• Procedure:
- Routing table update packet starts with a metric one.
-Neighbour node increment this metric by 1 & rebroadcast the
updated packet to neighbours.
-This will be continued until all node receives update copy
message
- Receives more than 1 packet-select smallest metric value
34
Significance of sequence number
• When node receives an update packet from its
neighbour node
• Sequence number = or > than the sequence
no.-routing packet will be updated in the table
35
Wireless routing protocol
• It is one of the Proactive routing protocol
• When compare with DSDV , WRP differs-table
maintenance & procedures in updating
routing tables.
• WRP- maintains 4 tables
– Distance table
– Routing table
– Link cost table
– Message re-transmission list
36
37
38
39
Fisheye state routing
• Each node broadcasts and exchanges the
details
• of ?
• farthest node
• Rather than ?
• broadcasting neighbours information
frequently in order to reduce the control
overhead.
40
3 PHASES
• Neighbour discovery
• Information dissemination
• Route Computation
41
42
Reactive Routing Protocols
• Dynamic source routing protocol
• Ad hoc On-demand routing protocol
• Temporarily ordered routing algorithm
• Location aided routing
• Associativity based routing
• Signal stability based routing protocol
• Flow oriented routing protocol.
43
• Dynamic Source Routing (DSR) Protocol.
• It discover a route between ?
• Sender and destination when required.
• Operation is based on source routing.
• Sender knows complete route to reach the
destination.
• Each data packet carries the Source route in
the packet header.
44
• Since each packet carries the complete route
information in the packet.,
• The intermediate nodes do not maintain
routing information to route the packets to
the destination.
• Nodes which use reactive routing protocol
does not maintain routing table.
• Hence, number of messages exchanges
between nodes is very low and hence leads to
less network overhead.
45
Advantage of DSR
• Bandwidth usage is limited
• How ?
• By avoiding the periodic table updates.
• However,
• At the time of route discovery:
• The sender node has to exchange control messages
to establish a path between source and destination.
• DSR protocol comprises two phases
• Route discovery and Route maintenance.
46
47
48
49
50
51
52
Route maintenance phase:
53
54
AODV Protocol
• Ad hoc on demand routing protocols
• Used in MANET.
• Like DSR (Dynamic Source Routing) AODV Works in
two phases.
- Route discovery
- Route maintenance.
Only difference between DSR & AODV is:
Source will not carry the complete path.
Each node only knows its previous hop and next hop
information of the established path. 55
56
57
58
59
Temporarily Ordered routing Algorithm.
(TORA)
• Reactive Routing protocol.
• Works on ‘link reversal algorithm’
• Main motive of TORA ?
• Reduce
• the transmission of ?
• Control messages in mobile environment.
• Performs ?
- Route discovery
- Route maintenance
- Removing route if not valid.
• Every node maintains local topology based on ?
• Information received from its neighbours.
• In TORA, nodes have an ability to discover the network the partitions. 60
61
62
63
64
65
LAR-Location aided routing
• @ Geographical Routing Protocol
66
67
68
69
70
71
ABR-Associative Based Routing
72
73
74
SSA
75
76
FORP
77
Hybrid Routing Protocol
• Advantages of both
• Nodes are grouped into zones(region).
80
81
82
83
84
85
86
87
TCP Over ADHOC n/w
• Why TCP ?
- reliable end-end connection
- single connection b/w sender and receiver
- error control
- flow control
Adhoc provides dynamic topology ,
88
Feedback based TCP
89
90
91
TCP Explicit link failure notification
92
93
94
95
96
UNIT - IV
SENSOR NETWORK SECURITY
• Single Node Architecture:
– Hardware Subsystems of sensor node.
– Software Subsystems of sensor node.
Sensor node architecture
• Sensor node is a device used in sensor
network for performing
Data gathering
Processing
Communicating with other sensor nodes
• Sensing Unit
• Processing Unit
• Communication Unit
• Battery
Architecture of a sensor node
Sensing unit
• Measure the physical quantities (temperature,
pressure etc..)
• Produce analog signals.
• ADC: Convert analog to digital signal
• Sensor node is small size, so it consumes
energy during operation.
Processing unit
• It perform specific task, processing data and
control the operation of other components in
the sensor node
• External memory – store the collected
information
• Flash memory – low cost and high storage
capacity
Communication unit
• Communication media are
Radio frequency
Optical communication
Power supply unit
• Consumes power for sensing, data gathering,
communicating and data processing
• Sensor nodes consumes more power for data
communication
• Changing the sensor node can be costly
• Ensure to take Adequate energy
Hardware subsystems of a sensor node
• Computing subsystem
• Power supply subsystem
• Communication subsystem
• Sensing subsystem
Computing subsystem
• S-MAC
• T-MAC
• D-MAC
• B-MAC
• X-MAC
• Wise - MAC