0% found this document useful (0 votes)
23 views

AWSN _Unit1 part2

Uploaded by

vutukuru.varsha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

AWSN _Unit1 part2

Uploaded by

vutukuru.varsha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Ad Hoc Wireless Network

Introduction
• Ad Hoc Network is a multi-hop relaying
network
• ALOHAnet developed in 1970
• Ethernet developed in 1980
• In 1994, Bluetooth proposed by Ericsson to
develop a short-range, low-power, low-
complexity, and inexpensive radio inteface
• WLAN 802.11 spec. is proposed in 1997
2
Cellular and Ad Hoc Wireless Networks

• Cellular Wireless Networks: infrastructure


dependent network
• Ad Hoc Networks: multi-hop radio relaying and
without support of infrastructure
– Wireless Mesh Networks
– Wireless Sensor Networks

3
Wireless Mesh
Networks

Cellular Wireless Networks Hybrid Wireless


Networks
Wireless Sensor
Networks

Infrastructure Dependent Ad Hoc Wireless Networks


(Single-Hop Wireless Networks) (Multi-Hop Wireless Networks)

Figure Cellular and ad hoc wireless networks.

4
B
A

D
E

Switching Center
+
Gateway

Base Station Mobile Node Path from C to E


5
Figure A cellular networks.
B
A

C
F

E D

Mobile Node Wireless Link Path from C to E


6
Figure. An ad hoc wireless networks
Differences between cellular networks and ad hoc
wireless networks
Cellular Networks Ad Hoc Wireless Networks

Fixed infrastructure-based Infrastructure-less

Single-hop wireless links Multi-hop wireless links

Guaranteed bandwidth Shared radio channel


(more suitable for best-effort data traffic)
(designed for voice traffic)
Centralized routing Distributed routing

Circuit-switched Packet-switched
(evolving toward packet switching) (evolving toward emulation of circuit
switching)
Seamless connectivity Frequency path break
(low call drops during handoffs)
due to mobility
High cost and time of deployment Quick and cost-effective deployment

Reuse of frequency spectrum through Dynamic frequency reuse based on carrier


geographical channel reuse sense mechanism
7
7
Differences between cellular networks and ad hoc
wireless networks (cont.)

Easier to achieve time synchronization Time synchronization is difficult and


consumes bandwidth
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols
Application domains include mainly civilian Application domains include battlefields,
and commercial sector emergency search and rescue operation, and
collaborative computing

High cost of network maintenance Self-organization and maintenance properties


are built into the network
(backup power source, staffing, etc.)
Mobile hosts are of relatively low complexity Mobile hosts require more intelligence
(should have a transceiver as well as
routing/switching capacity)
Major goals of routing and call admission are Man aim of routing is to find paths with
to maximize the call acceptance ratio and minimum overhead and also quick
minimize the call drop ratio reconfiguration of broken paths

Widely deployed and currently in the third Several issues are to be addressed for
generation successful commercial deployment even
though widespread use exists in 8
defense 8
Applications of Ad Hoc Wireless Networks
• Military Applications
– Establishing communication among a group of soldiers for
tactical operations
– Coordination of military object moving at high
speeds such as fleets of airplanes or ships
– Requirements: reliability, efficiency, secure communication,
and multicasting routing,
• Collaborative and Distributed Computing
– Conference, distributed files sharing
• Emergency Operations
– Search, rescue, crowd control, and commando operations
– Support real-time and fault-tolerant communication paths
9
Wireless Mesh Networks
• An alternate communication infrastructure for
mobile or fixed nodes/users
• Provides many alternate paths for a data
transfer session between a source and
destination
• Advantages of Wireless Mesh Networks
– High data rate, quick and low cost of deployment,
enhanced services, high scalability, easy
extendability, high availability, and low cost per bit

10
Wired Network

Gateway node

Transmission range
A house with rooftop transceiver Wired link to the Internet
Wireless link

Figure 5.4. Wireless mesh networks operating in a residential zone

11
Internet

Radio relay node

Multi-hop radio relay Lamp


link
Wired link to the Internet Coverage area

Figure 5.5 Wireless mesh network covering a highway

12
Wireless Sensor Networks
• A collection of a large number of sensor nodes
that are deployed in a particular region
• Applications:
– military, health care, home security, and
environmental monitoring
• Differences with the ad hoc wireless networks:
– Mobility of nodes, size of network, density
of deployment, power constraints,
data/information fusion, traffic distribution

13
1
4
1
5
Hybrid Wireless Networks
• HWN such as Multi-hop cellular networks and
integrated cellular ad hoc relay networks
– The base station maintains the information about the
topology of the network for efficient routing
– The capacity of a cellular network can be increased if the
network incorporates the properties of multi-hop relaying
along with the support of existing fixed infrastructure
• Advantages:
– Higher capacity than cellular networks due to better
channel reuse
– Increased flexibility and reliability in routing
– Better coverage and connectivity in holes
16
1
7
1
8
B
A

E Switching Center
+
Gateway

Base Station Mobile Node MCN communication

Figure 5.6. MCN architecture.


19
Issues in Ad Hoc Wireless Networks

• Medium access scheme


• Routing, Multicasting, TPC protocol
• Pricing scheme, QoS, Self-organization
• Security, Energy management
• Addressing and service discovery
• Deployment considerations

20
Medium Access Scheme
• Distributed operation
– fully distributed involving minimum control overhead
• Synchronization
– Mandatory for TDMA-based systems
• Hidden terminals
– Can significantly reduce the throughput of a MAC protocol
• Exposed terminals
– To improve the efficiency of the MAC protocol, the exposed
nodes should be allowed to transmit in a controlled
fashion without causing collision to the on-going data
transfer
• Access delay
21
The Major Issues of MAC Scheme
• Throughput and access delay
– To minimize the occurrence of collision, maximize
channel utilization, and minimize controloverhead
• Fairness
– Equal share or weighted share of the bandwidth to all
competing nodes
• Real-time traffic support
• Resource reservation
– Such as BW, buffer space, and processing power
• Capability for power control
• Adaptive rate control
• Use of directional antennas
1
8
The Major Challenge of Routing Protocol

• Mobility result in frequent path break, packet


collision, and difficulty in resource reservation
• Bandwidth constraint: BW is shared by every node
• Error-prone and share channel: high bit error rate
• Location-dependent contention: distributing the
network load uniformly across the network
• Other resource constraint: computing power, battery
power, and buffer storage

23
The Major Requirement of Routing
Protocol
• Minimum route acquisition delay
• Quick route reconfiguration: to handle path breaks
• Loop-free routing
• Distributed routing approach
• Minimum control overhead
• Scalability
• Provisioning of QoS:
• supporting differentiated classes of services
• Support for time-sensitive traffic
• Security and privacy
24
The Major Issues in Multicast Routing
Protocols
• Robustness
– recover and reconfigure quickly from link breaks
• Efficiency
– minimum number of transmissions to deliver a data packet
to all the group members
• Minimal Control overhead
• QoS support
• Efficient group management
• Scalability
• Security
25
Transport Layer Protocols
• Objectives: setting up and maintaining
– End-to-end connections, reliable end-to-end data
delivery, flow control, and congestion control
• Major performance degradation:
– Frequent path breaks, presence of old routing
information, high channel error rate, and frequent
network partitions

26
Quality of Service Provisioning
• QoS often requires negotiation between the host and
the network, resource reservation schemes, priority
scheduling and call admission control
• QoS in Ad hoc wireless networks can be on a per
flow, per link, or per node
• Qos Parameters: different applications have different
requirements
– Multimedia: bandwidth and delay are the key parameters
– Military: BW, delay, security and reliability
– Emergency search –and-rescue: availability is the key
parameters, multiple link disjoint paths
– WSN: battery life, minimum energy consumption
27
Quality of Service Provisioning
• QoS-aware routing:
– To have the routing use QoS parameters for finding a path
– The parameters are network through put, packet delivery
ratio, reliability, delay, delay jitter, packet lost rate, bit error
rate, and path loss
• QoS framework:
– A frame work for QoS is a complete system that attempts
to provide the promised service
– The QoS modules such as routing protocol, signaling
protocol, and resource management should react
promptly according to changes in the network state

28
Self-Organization
• An important property that an ad hoc wireless
network should exhibit is organizing and maintaining
the network by itself
• Major activities: neighbor discovery, topology
organization, and topology reorganization
• Ad hoc wireless networks should be able to perform
self-organization quickly and efficiently

29
Security
• The attack against ad hoc wireless networks are
classified into two types: passive and active attacks
• Passive attack: malicious nodes to observe the
nature of activities and to obtain information in the
network without disrupting the operation
• Active attack: disrupt the operation of the network
– Internal attack: nodes belong to the same network
– External attack: nodes outside the network

30
References
⮚ “Ad Hoc Wireless Networks Architectures and Protocols” By Shiva Ram Murthi.
Prof Pranali Deshmukh
Information Technology Department
I2TT,Hinjewadi

3
2

You might also like