Unit 1
Unit 1
The current cellular wireless networks are classified as the infrastructure dependent network. The path setup
for a call between two nodes, say, node C to E, is completed through base station as illustrated in figure below.
Emergency Operations
Ad hoc wireless networks are very useful in emergency operations such as search and rescue, crowd
control and command operations
The major factors that favour ad hoc wireless networks for such tasks are self-configuration of the
system with minimal overhead, independent of fixed or centralized infrastructure, the freedom and
flexibility of mobility, and unavailability of conventional communication infrastructure.
In environments, where the conventional infrastructure based communication facilities are destroyed
due to a war or due to natural calamities, immediate deployment of adhoc wireless networks would be
a good solution for co-ordinating rescue activities.
They require minimum initial network configuration with very little or no delay
Density of deployment:
The density of nodes in a sensor network varies with the domain of application.
For example, Military applications require high availability of the network, making redundancy a
high priority.
Power constraints:
The power constraints in sensor networks are much more stringent than those in ad hoc wireless
networks. This is mainly because the sensor nodes are expected to operate in harsh environmental
or geographical conditions, with minimum or no human supervision and maintenance.
In certain case, the recharging of the energy source is impossible.
Running such a network, with nodes powered by a battery source with limited energy, demands
very efficient protocol at network, data link, and physical layer.
The power sources used in sensor networks can be classified in to the following 3 categories:
- Replenishable Power source: The power source can be replaced when the existing source is
fully drained.
- Non-replenishable Power source: The power source cannot be replenished once the network
has been deployed. The replacement of sensor node is the only solution.
- Regenerative Power source: Here, Power source employed in sensor network have the
capability of regenerating power from the physical parameter under measurement.
Traffic Distribution:
The communication traffic pattern varies with the domain of application in sensor networks.
For example, the environmental sensing application generates short periodic packets indicating the
status of the environmental parameter under observation to a central monitoring station.
This kind of traffic requires low bandwidth.
Ad hoc wireless networks generally carry user traffic such as digitized & packetized voice stream or
data traffic, which demands higher bandwidth.
Routing
The responsibilities of a routing protocol include exchanging the route information; finding a feasible path to a
destination. The major challenges that a routing protocol faces are as follows:
1. Mobility:
The Mobility of nodes results in frequent path breaks, packet collisions, transient loops, stale
routing information, and difficulty in resource reservation.
2. Bandwidth constraint:
Since the channel is shared by all nodes in the broadcast region, the bandwidth available
per wireless link depends on the number of nodes & traffic they handle.
3. Error-prone and shared channel:
The Bit Error Rate (BER) in a wireless channel is very high [10-5 to 10 -3 ] compared to that in its
wired counterparts [ 10-12 to 10-9 ].
Consideration of the state of the wireless link, signal-to-noise ratio, and path loss for routing in ad
hoc wireless networks can improve the efficiency of the routing protocol.
4. Location-dependent contention:
The load on the wireless channel varies with the number of nodes present in a given geographical
region.
This makes the contention for the channel high when the number of nodes increases.
The high contention for the channel results in a high number of collisions & a subsequent wastage of
bandwidth.
5. Other resource constraints:
The constraints on resources such as computing power, battery power, and buffer storage also limit
the capability of a routing protocol.
The major requirements of a routing protocol in adhoc wireless networks are the following.
1. Minimum route acquisition delay:
The route acquisition delay for a node that does not have a route to a particular destination node
should be as minimal as possible.
The delay may vary with the size of the network and the network load.
2. Quick route reconfiguration:
The unpredictable changes in the topology of the network require that the routing protocol be
able to quickly perform route reconfiguration in order to handle path breaks and subsequent
packet losses.
3. Loop-free routing:
This is a fundamental requirement to avoid unnecessary wastage of network bandwidth.
In adhoc wireless networks, due to the random movement of nodes, transient loops may form in the
route thus established.
A routing protocol should detect such transient routing loops & take corrective actions.
4. Distributed routing approach:
An adhoc wireless network is a fully distributed wireless network & the use of centralized routing
approaches in such a network may consume a large amount of bandwidth.
5. Minimum control overhead:
The control packets exchanged for finding a new route, and maintaining existing routes should be
kept as minimal as possible.
6. Scalability:
Scalability is the ability of the routing protocol to scale well in a network with a large number of
nodes.
This requires minimization of control overhead & adaptation of the routing protocol to the network
size.
7. Provisioning of QoS:
The routing protocol should be able to provide a certain level of QoS as demanded by the nodes or
the category of calls.
The QoS parameters can be bandwidth, delay, jitter, packet delivery ratio, & throughput.
8. Support for time-sensitive traffic:
Tactical communications & similar applications require support for time-sensitive traffic.
The routing protocol should be able to support both hard real-time & soft real-time traffic.
9. Security and privacy:
The routing protocol in adhoc wireless networks must be resilient to threats and vulnerabilities.
It must have inbuilt capability to avoid resource consumption, denial-of-service, impersonation, and
similar attacks possible against an ad hoc wireless network.
Multicasting
It plays important role in emergency search & rescue operations & in military communication. Use of single- link
connectivity among the nodes in a multicast group results in a tree-shaped multicast routing topology. Such a
tree-shaped topology provides high multicast efficiency, with low packet delivery ratio due to the frequency
tree breaks. The major issues in designing multicast routing protocols are as follows:
1. Robustness:
• The multicast routing protocol must be able to recover & reconfigure quickly from potential
mobility-induced link breaks thus making it suitable for use in high dynamic environments.
2. Efficiency:
• A multicast protocol should make a minimum number of transmissions to deliver a data packet to all
the group members.
3. Control overhead:
• The scarce bandwidth availability in ad hoc wireless networks demands minimal control overhead
for the multicast session.
4. Quality of Service:
• QoS support is essential in multicast routing because, in most cases, the data transferred in a
multicast session is time-sensitive.
5. Efficient group management:
• Group management refers to the process of accepting multicast session members and maintaining
the connectivity among them until the session expires.
6. Scalability:
• The multicast routing protocol should be able to scale for a network with a large number of node
7. Security:
• Authentication of session members and prevention of non-members from gaining unauthorized
information play a major role in military communications.
Pricing Scheme
• Assume that an optimal route from node A to node B passes through node C, & node C is not
powered on.
• Then node A will have to set up a costlier & non-optimal route to B.
• The non-optimal path consumes more resources & affects the throughput of the system.
• As the intermediate nodes in a path that relay the data packets expend their resources such as
battery charge & computing power, they should be properly compensated.
• Hence, pricing schemes that incorporate service compensation or service reimbursement are
required.
5.Hybrid wireless network 5. Maximum available link life, delay, bandwidth & channel
utilization.
6.communication among the nodes in a sensor 6. Minimum energy consumption, battery life & energy
network conservation
QoS-aware routing :
i. Finding the path is the first step toward a QoS-aware routing protocol.
ii. The parameters that can be considered for routing decisions are,
Network throughput.
Packet delivery ratio.
Reliability.
Delay.
Delay jitter.
Packet loss rate.
Bit error rate.
Path loss.
QoS framework :
I. A framework for QoS is a complete system that attempts to provide the promised servicesto
each user or application.
II. The key component of QoS framework is a QoS service model which defines the way user
requirements are served.
Self-Organization
• One very important property that an ad hoc wireless network should exhibit is organizing &
maintaining the network by itself.
• The major activities that an ad hoc wireless network is required to perform for self-organization are,
Neighbor discovery.
Topology organization &
Topology reorganization (updating topology information)
Security
1) Security is an important issue in ad hoc wireless network as the information can be hacked.
2) Attacks against network are of 2 types :
I. Passive attack → Made by malicious node to obtain information transacted in the network without
disrupting the operation.
II. Active attack → They disrupt the operation of network.
Further active attacks are of 2 types :
o External attack: The active attacks that are executed by nodes outside the network.
o Internal attack: The active attacks that are performed by nodes belonging to the same network.
3) The major security threats that exist in ad hoc wireless networks are as follows :
Denial of service – The attack affected by making the network resource unavailable for service to
othernodes, either by consuming the bandwidth or by overloading the system.
Resource consumption – The scarce availability of resources in ad hoc wireless network makes it an
easy target for internal attacks, particularly aiming at consuming resources available in the network.
The major types of resource consumption attacks are,
Energy depletion :
- Highly constrained by the energy source
- Aimed at depleting the battery power of critical nodes.
Buffer overflow :
- Carried out either by filling the routing table with unwanted routing entries or by
consuming the data packet buffer space with unwanted data.
- Lead to a large number of data packets being dropped, leading to the loss of
critical information.
Host impersonation – A compromised internal node can act as another node and respond with
appropriate control packets to create wrong route entries, and can terminate the traffic meant for the
intended destination node.
Information disclosure – A compromised node can act as an informer by deliberate disclosure of
confidential information to unauthorized nodes.
Interference – A common attack in defense applications to jam the wireless communication by creating
a wide spectrum noise.
Energy Management
Energy management is defined as the process of managing the sources & consumers of energy in a node or in
the network for enhancing the lifetime of a network.
Features of energy management are :
→Shaping the energy discharge pattern of a node’s battery to enhance battery life.
→Finding routes that consumes minimum energy.
→Using distributed scheduling schemes to improve battery life.
→Handling the processor & interface devices to minimize power consumption.
Energy management can be classified into the following categories :
a. Transmission power management:
o The power consumed by the Radio Frequency (RF) module of a mobile node is determined by
several factors such as
* The state of operation.
*The transmission power and
*The technology used for the RF circuitry.
o The state of operation refers to transmit, receive, and sleep modes of the operation.
o The transmission power is determined by
* Reachability requirement of the network.
* Routing protocol and
* MAC protocol employed.
b. Battery energy management:
o The battery management is aimed at extending the battery life of a node by taking advantage of
its chemical properties, discharge patterns, and by the selection of a battery from a set of
batteries that is available for redundancy.
c. Processor power management:
o The clock speed and the number of instructions executed per unit time are some of the
processorparameters that affect power consumption.
o The CPU can be put into different power saving modes during low processing load conditions.
o The CPU power can be completely turned off if the machines is idle for a long time. In such a cases,
interrupts can be used to turn on the CPU upon detection of user interaction or other events.
d. Devices power management:
o Intelligent device management can reduce power consumption of a mobile node significantly.
o This can be done by the operating system( OS) by selectively powering down interface devices
that are not used or by putting devices into different power saving modes, depending on their
usage.
Scalability
Scalability is the ability of the routing protocol to scale well in a network with a large number of nodes.
It requires minimization of control overhead & adaptation of the routing protocol to the network size.
Deployment Considerations
The deployment of a commercial ad hoc wireless network has the following benefits when compared to wired
networks
a) Low cost of deployment :
o The use of multi-hop wireless relaying eliminates the requirement of cables & maintenance
indeployment of communication infrastructure.
o The cost involved is much lower than that of wired networks.
b) Incremental deployment :
o Deployment can be performed increment all over geographical regions of the city.
o The deployed part of the network starts functioning immediately after the minimum configuration
is done.
c) Short deployment time :
o Compared to wired networks, the deployment time is considerably less due to the absence of
anywired links.
d) Re-configurability :
o The cost involved in reconfiguring a wired network covering a Metropolitan Area Network(MAN) is
very high compared to that of an ad hoc wireless network covering the same service area.
The following are the major issues to be considered in deploying an ad hoc wireless network :
a) Scenario of deployment :
The scenario of deployment has significance because the capability required for a mobile node varies
with the environment in which it is used.
The following are some of the different scenarios in which the deployment issues vary widely :
- Military deployment :
It can be either,
Data-centric network : Handle a different pattern of data traffic & can be partially comprised of
static nodes.
Eg : a wireless sensor network.
User-centric network: Consists of highly mobile nodes with or without any support from any
infrastructure.
Eg :soldiers or armored vehicles carrying soldiers equipped with wireless
communication devices.
- Emergency operations deployment :
o Demands a quick deployment of rescue personnel equipped with hand-held communication
equipment.
o The network should provide support for time-sensitive traffic such as voice & video.
o Short data messaging can be used in case the resource constraints do not permit voice
communication.
- Commercial wide-area deployment :
o Eg : wireless mesh networks.
o The aim of the deployment is to provide an alternate communication infrastructure for
wireless communication in urban areas & areas where a traditional cellular base station
cannot handle the traffic volume.
- Home network deployment :
o Deployment needs to consider the limited range of the devices that are to be connected
by the network.
o Eg : short transmission range avoid network partitions.
o This problem is worse here as the nodes operate over multiple wireless hops.
o Solution such as Mobile IP can provide temporary alternative.
Routing :
o It is a major problem in ad hoc wireless internet, due to dynamic topological changes, the presence
of gateways, multi-hop relaying, & the hybrid character of the network.
o Possible solution is to use separate routing protocol for the wireless part of ad hoc
wirelessinternet.
Transport layer protocol :
o Several factors are to be considered here, the major one being the state maintenance overhead at the
gateway nodes.
Load balancing :
o They are essential to distribute the load so as to avoid the situation where the gateway nodes
become bottleneck nodes.
Pricing / Billing:
o Since internet bandwidth is expensive, it becomes very important to introduce pricing/billing
strategies for the ad hoc wireless internet.
Provisioning of security:
o Security is a prime concern since the end users can utilize the ad hoc wireless internet infrastructure
to make e-commerce transaction.
QoS support :
With the widespread use of voice over IP (VOIP) & growing multimedia applications over the
internet, provisioning of QoS support in the ad hoc wireless internet becomes a very important issue.
Service, address & location discovery:
o Service discovery refers to the activity of discovering or identifying the party which provides service or
resource.
o Address discovery refers to the services such as those provided by Address Resolution Protocol (ARP)
or Domain Name Service (DNS) operating within the wireless domain.
o Location discovery refers to different activities such as detecting the location of a particular mobile
node in the network or detecting the geographical location of nodes.
Resource Constraints
Two essential and limited resources are battery life and processing power.
Devices used in adhoc wireless networks require portability, and hence they also have size and weight
constraints along with the restrictions on the power source.
Increasing the battery power and processing ability makes the nodes bulky and less portable.
The routing protocol for adhoc wireless networks can be broadly classified into 4 categories based on
Routing information update mechanism.
Use of temporal information for routing
Routing topology
Utilization of specific resources.
Based on the routing information update mechanism
Ad hoc wireless network routing protocols can be classified into 3 major categories based on the routing
information update mechanism. They are:
Proactive or table-driven routing protocols :
o Every node maintains the network topology information in the form of routing tables by
periodically exchanging routing information.
o Routing information is generally flooded in the whole network.
o Whenever a node requires a path to a destination, it runs an appropriate path-finding algorithm
on the topology information it maintains.
Reactive or on-demand routing protocols:
o Do not maintain the network topology information.
o Obtain the necessary path when it is required, by using a connection establishment process.
Hybrid routing protocols:
o Combine the best features of the above two categories.
o Nodes within a certain distance from the node concerned, or within a particular geographical
region, are said to be within the routing zone of the given node.
o For routing within this zone, a table-driven approaches used.
o For nodes that are located beyond this zone, an on-demand approach is used.
Consider the example as shown in figure (a). Here node 1 is the source node and node 15 is the
destination. As all the nodes maintain global topology information, the route is already available as shown
in figure (b).
Here the routing table node 1 indicates that the shortest route to the destination node is available
through node 5 and the distance to it is 4 hops, as depicted in figure (b)
The reconfiguration of a path used by an on-going data transfer session is handled by the protocol in the
following way.
The end node of the broken link initiates a table update message with the broken link’s weight assigned
to infinity (∞) and with a sequence number greater than the stored sequence number for that
destination.
Each node upon receiving an update with weight ∞, quickly disseminates it to its neighbors in order to
propagate the broken-link information to the whole network.
A node always assign an odd number to the link break update to differentiate it from the even sequence
number generated by the destination.
Figure 7.6 shows the case when node 11 moves from its current position.
Advantages
Less delay involved in the route setup process.
Mechanism of incremental update with sequence number tags makes the existing wired network
protocols adaptable to ad hoc wireless networks.
The updates are propagated throughout the network in order to maintain an up-to-date view of the
network topology at all nodes.
Disadvantages
The updates due to broken links lead to a heavy control overhead during high mobility.
Even a small network with high mobility or a large network with low mobility can completely choke the
available bandwidth.
Suffers from excessive control overhead.
In order to obtain information about a particular destination node, a node has to wait for a table update
message initiated by the same destination node.
This delay could result in state routing information at nodes.
Consider the example shown in figure below, where the source of the route is node 1 and destination is
node 15. As WRP proactively maintains the route to all destinations, the route to any destination node is
readily available at the source node.
From the routing table shown, the route from node 1 to node 15 has the next node as node 2. The
predecessor node of 15 corresponding to this route is route 12. The predecessor information helps WRP
to converge quickly during link breaks.
When a node detects a link break, it sends an update message to its neighbors with the link cost of the
broken link set to ∞. After receiving the update message; all affected nodes update their minimum
distances to the corresponding nodes. The node that initiated the update message then finds an
alternative route, if available from its DT. Figure 7.8 shows route maintenance in WRP.
Advantages
WRP has the same advantages as that of DSDV.
It has faster convergence and involves fewer table updates.
Disadvantages
The complexity of maintenance of multiple tables demands a larger memory and greater processing
power from nodes in the adhoc wireless network.
It is not suitable for highly dynamic and also for very large ad hoc wireless networks.
Advantages
Very low communication overhead
Reduces the average control overhead
Disadvantages
Route maintenancemechanismdoes not locally repair a broken link
Stale route cache information could resultin inconsistencies duringroute construction phase
Connection set up delay is higher
Performance degrades rapidly with increasingmobility
Routing overhead is more & directly proportional topath length
Advantage
Routes are established on demand and DestSeqNum are used tofind latest route tothe destination
Connection setup delay is less
Disadvantages
Intermediate nodes can lead toinconsistentroutes if the source sequence numberis very old
Multiple RouteReply packets tosingle RouteRequest packet can lead toheavy control overhead
Periodic beaconing leads tounnecessary bandwidthconsumption
Disadvantages
Temporary oscillations and transient loops
Local reconfiguration of paths result in non-optimal routes
In the LAR1 algorithm (fig 7.16), the source node explicitly specifies the RequestZone in the
RouteRequest packet whichis broadcast toits neighbors
These nodes verify their own geographical locations tocheckwhether they belong tothe ExpectedZone
Finally, when the RouteRequest reaches the destination node, it originates a RouteReply that contains
the current location and current time of the node
In LAR2 algorithm (fig 7.17), the source node includes the distance between itself and the destination
node
When the intermediatenode receives this RouteRequest packet, it computesthe distance tothe node D
A RouteRequest packet is forwarded only once and the distance between the forwarding node and Dis
updated in the RouteRequest packet for further relaying
In order to compensate for the location error, a larger RequestZone that can accommodate the amount
of error that occurred is considered
Advantage
LAR reduces the control overhead by limitingthe searcharea for finding a path
Efficient use of geographical position information
Reduced control overhead
Increased utilization of bandwidth
Disadvantage
Depends heavily on the availability of GPS infrastructure.
Hence, cannot be used in situations where there is noaccess tosuch information
In figure 7.18, source node initiates the RouteRequest to the flooded for finding a route to the
destination node
Solid lines represent stablelinks
Dotted lines represent unstablelinks
ABR uses stability information only during theroute selection process at the destination node
If a link break occurs at an intermediate node, the node closer to the source, which detects the break,
initiates a local route repair process
In this process, the node locally broadcasts a route repair packet, termed the local query (LQ)
broadcast, with a limited time tolive (TTL), as shown in figure 7.19
This way a broken link is bypassed locally without flooding a new RouteRequest packet in the whole
network.
Advantage
Stable routes have a higher preferencecomparedtoshorter routes
They result in fewer path breaks which, in turn, reduces the extent of flooding due to reconfiguration of
paths in the network
Disadvantage
Chosen path may be longer than the shortest path between the source and destination because of the
preference given tostable paths
Repetitive LQ broadcasts may result in high delays during route repairs
Disadvantage
It puts a strong RouteRequest forwarding condition which results in RouteRequestfailures
Multiple flooding of RouteRequest packets consumes significant amount of bandwidth
Increases the path setuptime
Strong linkcriterion increases the path length
Advantage
Use of LET and RET estimates reduces pathbreaks
Reduces the reduction in packetdelivery
Reduces number of out-of-order packets
Reduces non-optimal paths
Disadvantage
Works well when topology is highly dynamic
Requirements of time synchronization increases the control overhead
Dependency on GPS infrastructure affects the operability of this protocol wherever it is not available