Adhoc and Wireless Sensor Networks
Adhoc and Wireless Sensor Networks
AD HOC NETWORKS
Unit - I
INTRODUCTION AND ROUTING
PROTOCOLS
Elements of Ad hoc Wireless Networks, Issues in Ad hoc wireless
networks, Example commercial applications of Ad hoc networking, Ad
hoc wireless Internet, Issues in Designing a Routing Protocol for Ad Hoc
Wireless Networks, Classifications of Routing Protocols, Table Driven
Routing Protocols – Destination Sequenced Distance Vector (DSDV),
On–Demand Routing protocols –Ad hoc On–Demand Distance Vector
Routing (AODV).
TABLE OF CONTENTS
1.1 Introduction
1.1 Introduction
A computer network is the interconnection of multiple nodes through links. A node can
be computer, printer, or any other device capable of sending or receiving the data. The
AD HOC and Wireless Sensor Networks 1.2
links connecting the nodes are known as communication channels.
The computer network uses distributed processing in which task is divided among several
computers. Instead, a single computer handles an entire task, each separate computer
handles a subset
Security: It provides limited interaction that a user can have with the entire system. For
example, a bank allows the users to access their own accounts through an ATM without
allowing them to access the bank's entire database.
Faster problem solving: Multiple computers can solve the problem faster than a single
machine working alone.
Security through redundancy: Multiple computers running the same program at the
same time can provide the security through redundancy. For example, if four computers
run the same program and any computer has a hardware error, then other computers can
override it.
E-mail
Banking, etc.,
Communication medium refers to the physical channel through which data is sent and
received. Data is sent in the form of voltage levels which make up the digital signal. A
digital signal consists of 0s and 1s. There are basically two types of networks:
Wired network
Wireless network
Wired Network
Twisted Pair
Coaxial Cable
Fiber Optic
Wireless Network
A wireless network uses radio waves as the sole medium for transmitting and receiving
data. There are no wires involved.
Radio waves are electromagnetic waves which are transverse in nature and they have the
longest wavelength on the electromagnetic spectrum.
Since the devices in the ad-hoc network can access each other's resources directly through
a basic point-to-point wireless connection, central servers are unnecessary for functions
such as file shares or printers.
In a wireless ad-hoc network, a collection of devices (or nodes) is responsible for network
operations, such as routing, security, addressing and key management. Figure
1.1 shows, multi-hop wireless ad hoc networks, it defined as a collection of nodes that
communicate with each other wirelessly by using radio signals with a shared common
channel.
Source : Ad Hoc Wireless Networks Architectures and Protocol by C. Siva Ram Murthy
and B. S. Manoj
AD HOC and Wireless Sensor Networks 1.4
Types of Wireless Ad Hoc Networks
Wireless ad hoc networks are categorized into different classes. They are:
Wireless mesh network: A mesh network is an ad hoc network where the various
nodes are in communication directly with each other to relay information throughout
the total network.
Wireless sensor network: Wireless sensors that collect everything from temperature
and pressure readings to noise and humidity levels, can form an ad hoc network to
deliver information to a home base without needing to connect directly to it.
Disaster rescue ad hoc network: Ad hoc networks are important when disaster
strikes and established communication hardware isn't functioning properly.
Source : Ad Hoc Wireless Networks Architectures and Protocol by C. Siva Ram Murthy
and B. S. Manoj
Collisions at receiver node -> inefficient bandwidth utilization, reduce
throughput.
Exposed Terminals Problem: The nodes that are in the transmission range of the
sender of an on-going session, are prevented from making a transmission. The
exposed nodes should be allowed to transmit in a controlled fashion without causing
collision to the on-going data transfer. (Figure 1.3)
Access delay: The average delay that any packet experiences to get transmitted. The
MAC protocol should attempt to minimize the delay.
Fairness: Fairness refers to the ability of the MAC protocol to provide an equal share
or weighted share of the bandwidth to all competing nodes. Fairness can be either
node-based or flow-based.
Capability for power control: The transmission power control reduces the energy
consumption at the nodes, causes a decrease in interference at neighboring nodes, and
increases frequency reuse.
Adaptive rate control: This refers to the variation in the data bit rate achieved over
a channel. A MAC protocol that has adaptive rate control can make use of a high data
rate when the sender and receiver are nearby & adaptively reduce the data rate as
they move away from each other.
1.3.2 Routing
Mobility: The Mobility of nodes results in frequent path breaks, packet collisions,
transient loops, stale routing information, and difficulty in resource reservation.
Bandwidth constraint: Since the channel is shared by all nodes in the broadcast
region, the bandwidth available per wireless link depends on the number of nodes &
traffic they handle.
Error-prone and shared channel: The Bit Error Rate (BER) in a wireless channel
is very high [10-5 to 10 -3] compared to that in its wired counterparts [10-12 to 10-9].
Location-dependent contention: The load on the wireless channel varies with the
number of nodes present in a given geographical region. This makes the contention
for the channel high when the number of nodes increases. The high contention for the
channel results in a high number of collisions & a subsequent wastage of bandwidth.
AD HOC and Wireless Sensor Networks 1.8
The major requirements of a routing protocol in ad hoc wireless networks are the
following.
Loop-free routing
Scalability
Provisioning of QoS
1.3.3 Multicasting
It plays important role in emergency search & rescue operations & in military
communication. Use of single link connectivity among the nodes in a multicast group
results in a tree-shaped multicast routing topology. Such a tree-shaped topology provides
high multicast efficiency, with low packet delivery ratio due to the frequency tree breaks.
The major issues in designing multicast routing protocols are as follows:
Robustness: The multicast routing protocol must be able to recover & reconfigure
quickly from potential mobility-induced link breaks thus making it suitable for use in
high dynamic environments.
Scalability: The multicast routing protocol should be able to scale for a network with
a large number of node
Congestion control.
It do not take into account the current network status such as congestion at the
intermediate links, the rate of collision, or other similar factors affecting the
network throughput.
QoS parameters
QoS-aware routing
Finding the path is the first step toward a QoS-aware routing protocol.
Network throughput.
Reliability.
Delay.
Delay jitter.
1.3.6 Self-Organization
One very important property that an ad hoc wireless network should exhibit is
organizing & maintaining the network by itself.
The major activities that an ad hoc wireless network is required to perform for self-
organization are,
AD HOC and Wireless Sensor Networks 1.11
Neighbour discovery.
1.3.7 Security
Security is an important issue in ad hoc wireless network as the information can be
hacked.
External attack: The active attacks that are executed by nodes outside the network.
Internal attack: The active attacks that are performed by nodes belonging to the same
network.
The major security threats that exist in ad hoc wireless networks are as follows :
Denial of service – The attack affected by making the network resource unavailable
for service to other nodes, either by consuming the bandwidth or by overloading the
system.
Energy depletion
Buffer overflow
Carried out either by filling the routing table with unwanted routing entries
or by consuming the data packet buffer space with unwanted data.
AD HOC and Wireless Sensor Networks 1.12
Lead to a large number of data packets being dropped, leading to the loss of
critical information.
Host impersonation – A compromised internal node can act as another node and
respond with appropriate control packets to create wrong route entries, and can
terminate the traffic meant for the intended destination node.
Shaping the energy discharge pattern of a node’s battery to enhance battery life.
The battery management is aimed at extending the battery life of a node by taking
advantage of its chemical properties, discharge patterns, and by the selection of
a battery from a set of batteries that is available for redundancy.
The clock speed and the number of instructions executed per unit time are some
of the processor parameters that affect power consumption.
The CPU can be put into different power saving modes during low processing
load conditions.
The CPU power can be completely turned off if the machines is idle for a long
time.
This can be done by the operating system (OS) by selectively powering down
interface devices that are not used or by putting devices into different power
saving modes, depending on their usage.
1.3.10 Scalability
Scalability is the ability of the routing protocol to scale well in a network with a large
number of nodes.
The deployment of a commercial ad hoc wireless network has the following benefits
when compared to wired networks
The use of multi-hop wireless relaying eliminates the requirement of cables &
maintenance in deployment of communication infrastructure.
Incremental deployment
The deployed part of the network starts functioning immediately after the
minimum configuration is done.
Reconfigurability
Military Applications
Energy Operations
Source : Ad Hoc Wireless Networks Architectures and Protocol by C. Siva Ram Murthy
and B. S. Manoj
Devices used for such applications could typically be laptops with add -on wireless
interface cards, enhanced personal digital assistants (PDAs) or mobile devices with high
processing power
It provides many alternate paths for a data transfer session between a source & destination,
resulting in quick reconfiguration of the path when the existing path fails due to node
failure.
Since the infrastructure built is in the form of small radio relaying devices, the investment
required in wireless mesh networks is much less than what is required for the cellular
network counterpart.
The possible deployment scenarios of wireless mesh networks include: residential zones,
highways, business zones, important civilian regions and university campuses
Major advantage is the support for a high data rate, quick & low cost of deployment,
enhanced services, high scalability, easy extendibility, high availability & low cost per
bit.
The Wireless Sensor Networks (WSN) are special category of Adhoc wireless network
that are used to provide a wireless communication infrastructure among the sensors
deployed in a specific application domain.(Figure 1.5)
Sensor nodes are tiny devices that have capability of sensing physical parameters
processing the data gathered, & communication to the monitoring system.
The issue that make sensor network a distinct category of adhoc wireless network are the
following:
Mobility of nodes
For example, the nodes used for periodic monitoring of soil properties are not
required to be mobile & the nodes that are fitted on the bodies of patients in a post-
surgery ward of a hospital are designed to support limited or partial mobility.
In general, sensor networks need not in all cases be designed to support mobility of
sensor nodes.
AD HOC and Wireless Sensor Networks 1.18
The number of nodes in sensor network can be much larger than that in a typical ad
hoc wireless network.
Density of deployment
The density of nodes in a sensor network varies with the domain of application.
For example, Military applications require high availability of the network, making
redundancy a high priority.
Power constraints
The power constraints in sensor networks are much more stringent than those in ad
hoc wireless networks. This is mainly because the sensor nodes are expected to
operate in harsh environmental or geographical conditions, with minimum or no
human supervision and maintenance.
Running such a network, with nodes powered by a battery source with limited energy,
demands very efficient protocol at network, data link, and physical layer.
The power sources used in sensor networks can be classified into the following 3
categories:
Replenishable Power source: The power source can be replaced when the
existing source is fully drained.
Data fusion refers to the aggregation of multiple packets into one before relaying it.
AD HOC and Wireless Sensor Networks 1.19
Data fusion mainly aims at reducing the bandwidth consumed by redundant headers
of the packets and reducing the media access delay involved in transmitting multiple
packets.
Information fusion aims at processing the sensed data at the intermediate nodes and
relaying the outcome to the monitor node.
Traffic Distribution
The communication traffic pattern varies with the domain of application in sensor
networks.
For example, the environmental sensing application generates short periodic packets
indicating the status of the environmental parameter under observation to a central
monitoring station.
Ad hoc wireless networks generally carry user traffic such as digitized & packetized voice
stream or data traffic, which demands higher bandwidth.
One of the major application area of ad hoc wireless network is in the hybrid wireless
architecture such as Multi-hop Cellular Network [MCN] & Integrated Cellular Adhoc
Relay [iCAR].
Several techniques like cell sectoring, cell resizing and multi-tier cells increase the
capacity of cellular networks.
MCNs combine the reliability & support of fixed base station of cellular network with
flexibility & multi - hop relaying adhoc wireless networks.
Higher capacity than cellular networks due to the better channel reuse.
Sports venues.
Battlefields
The major issues to be considered for a successful ad hoc wireless internet are the
following :
Gateway
They are the entry points to the wired internet.
Bandwidth management.
Load balancing.
Traffic shaping.
Packet filtering.
Address mobility
This problem is worse here as the nodes operate over multiple wireless hops.
Routing
Possible solution is to use separate routing protocol for the wireless part of ad
hoc wireless internet.
Several factors are to be considered here, the major one being the state
maintenance overhead at the gateway nodes.
Load balancing
They are essential to distribute the load so as to avoid the situation where the
gateway nodes become bottleneck nodes.
Pricing / Billing
Since internet bandwidth is expensive, it becomes very important to
introduce pricing/billing strategies for the ad hoc wireless internet.
AD HOC and Wireless Sensor Networks 1.22
Provisioning of security
Security is a prime concern since the end users can utilize the ad hoc wireless
internet infrastructure to make e-commerce transaction.
QoS support
With the widespread use of Voice Over IP (VOIP) & growing multimedia
applications over the internet, provisioning of QoS support in the ad hoc wireless
internet becomes a very important issue.
An ad hoc routing protocol is a convention, or standard, that controls how nodes decide
which way to route packets between computing devices in a mobile ad hoc network.
An ad hoc wireless network consists of a set of mobile nodes (hosts) that are connected
by wireless links. The network topology (the physical connectivity of the communication
network) in such a network may keep changing randomly.
Routing protocols that find a path to be followed by data packets from a source node to
a destination node used in traditional wired networks cannot be directly applied in ad
hoc wireless networks due to their highly dynamic topology absence of established
infrastructure for centralized administration (e.g., base stations or access points),
bandwidth-constrained wireless links, and resource (energy)-constrained nodes.