0% found this document useful (0 votes)
11 views22 pages

1advance Wireless Networks-Introduction

Uploaded by

khansanadeem44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views22 pages

1advance Wireless Networks-Introduction

Uploaded by

khansanadeem44
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Advance Wireless Networks

Dr. Zara Hamid


Goal of this course
• Broad coverage of key areas
• Very brief coverage of Physical Layer
• Emphasis on 2nd and 3rd layer
• Emphasis on current and future/upcoming wireless networks
▫ Students should have selected their research area by the end of this
course
• Less reliance on text book and more on independent reading and
reviewing research papers
• Read ,write, read, write and write…….. (you cannot escape writing at
graduate level)
• Build research techniques
Course Outline
• Introduction to wireless networks
• Medium Access Control Layer
▫ 802.11
▫ 802.15
• Ad hoc networks
▫ Routing protocols for ad hoc networks
• Wireless Sensor Networks
▫ Routing and MAC protocols for sensor networks
• Cross-layer protocols for sensor networks
• Information Centric Networks
Grading

• Project (Review paper) 20%


• Presentations 05%
• Mid Term 50%
Text Books
• Will not follow a particular text book.
• All research papers, book and other tutorials
discussed in lecture will be available on drop box
Project Requirements
• Recent developments – last 5 years
• Comprehensive surveys, technical papers, Industrial
Standards…..
• No plagiarism or copyright violations
▫ Redraw figure
▫ Express/summarize all ideas in your own words
• The paper needs to include the following sections
▫ Introduction
▫ Requirements & Challenges
▫ Literature Review
 Detailed description of each protocol/scheme
 Tables summarizing the parameters/features and requirements
that existing protocols fulfill
▫ Discussion
▫ Conclusion & Future Work
Top cited articles
• A survey on security issues in service delivery models of cloud
computing
• A survey on coverage and connectivity issues in wireless sensor
networks
• Trust mechanisms in wireless sensor networks: Attack analysis and
countermeasures
• A survey on routing techniques in underwater wireless sensor
networks
• A systematic review on clustering and routing techniques based
upon LEACH protocol for wireless sensor networks
• A survey on vehicular cloud computing
• Real-time data management on wireless sensor networks: A survey
• Security, privacy and trust in Internet of Things: The road ahead
• Software-Defined Networking: Challenges and research
opportunities for Future Internet
• SoftAir: A software defined networking architecture for 5G wireless
systems
Top Wireless Research Area Today
• Information Centric Networks (Future Internet)
• Internet of Things
• Vehicular Networks
• Sensor and Actuator Networks
▫ Under water sensor networks
• Cognitive Sensor Networks
• Software Defined Networks
• Delay Tolerant Networks
Task 1
• Select an area of interest
• Choose 3 recent survey/review papers in the
selected area.
Introduction
• Wireless stations, or nodes, communicate over a wireless medium
▫ Networks operating under infrastructure mode e.g., 802.11, 802.16,
Cellular networks
▫ Networks operating with limited or no infrastructural support e.g., ad
hoc networks in AODV mode
• Security threats are imminent due to the open nature of
communication
▫ Two main issues: authentication and privacy
▫ Other serious issues: denial-of-service
• A categorization is required to understand the issues in each
situation.
Why use wireless communication

• Provides mobility
▫ A user can send or receive a message no matter where he or
she is located
• Added convenience/reduced cost
• Enables communication without installing an expensive
infrastructure
• Can easily set-up temporary LANs
▫ Disaster situations
􀂄

▫ Office moves
• Developing nations utilize cellular telephony rather than
laying twisted-pair wires to each home
• Only use resources when sending or receiving a signal
How is wireless different from wired

• Noisy, time-varying channel


▫ BER varies by orders of magnitude
▫ Environmental conditions affect transmission
• Shared medium
▫ Other users create interference
▫ Must develop ways to share the channel
• Bandwidth is limited
Introduction

• Fixed Infrastructure
▫ Base stations that are typically not resource
constrained.
▫ Examples: sensor networks, and cellular networks.
▫ Mobility of nodes but not of base stations.
Introduction

• Ad hoc wireless networks Image from


www.microsoft.com
▫ No infrastructural support.
▫ Nodes also double up as routers.
▫ Mobility of nodes.
▫ Examples laptops/cellphones operating in ad hoc
mode.
17

Scenario #1: Infrastructure Mode


Infrastructure mode
• Base station connects
mobiles into wired network
• Network provides services
(addressing, routing, DNS)
network • Handoff: mobile changes
infrastructure base station providing
connection to wired network
18

Scenario #2: Ad-Hoc Networks


Ad hoc mode
• No base stations
• Nodes can only transmit to other
nodes within link coverage
• Nodes self-organize and route
among themselves
19

Infrastructure vs. Ad Hoc


• Infrastructure mode
▫ Wireless hosts are associated with a base station
▫ Traditional services provided by the connected
network
▫ E.g., address assignment, routing, and DNS resolution
• Ad hoc networks
▫ Wireless hosts have no infrastructure to connect to
▫ Hosts themselves must provide network services
• Similar in spirit to the difference between
▫ Client-server communication
▫ Peer-to-peer communication
Various Layers of Interest – MAC Layer

• MAC Layer
▫ Medium access control is an important
requirement.
▫ Collision detection (CSMA/CD) not possible
unlike wired networks.
 Hence using Collision avoidance (CSMA/CA)
▫ Functions of MAC
 Scanning, RTS/CTS, Power Save options,
Fragmentation
Various Layers of Interest – MAC Layer

DATA DATA

• 802.11 MAC
▫ Use Physical Carrier Sensing to sense for a free
medium.
▫ Explicit ACKs to indicate reception of packet.
▫ Results in the problem of hidden node.
▫ Use Virtual Carrier Sensing using RTS/CTS.
Various Layers – Network Layer
• Route packets in the network.
• Routing in infrastructure based networks is similar
to IP routing
• All the base stations have a wired IP interface which
is used by the routers/switches to forward data
• Issues like handoffs are handled through techniques
like Mobile IP or Cellular Handoffs or Soft-handoffs
as done in Mobile WiMAX
• Now, for network without infrastructure the
problem is difficult as the routes are transient
Various Layers – Network Layer
• Ad hoc networks
▫ No easy solutions but different proposals exist.
▫ Two kinds: proactive and reactive
▫ Proactive: Maintain lot of state, proactive updates.
 Example: DSDV, DSR
▫ Reactive: Minimal state, react to changes.
 Example: AODV
Other Important Layers
• Transport layer
▫ This is important layer especially since the wireless
medium suffers from high bit-error rate and
collisions.
▫ To offset this wireless technologies rely less on TCP’s
reliability mechanism
▫ This is mostly handled at physical layer through
techniques like FEC and other error correcting codes
• Application Layer
▫ Notion of an application layer protocol
▫ Email/Web/Games/SMS/MMS

You might also like