AWSN _Unit1 part2
AWSN _Unit1 part2
Introduction
• Ad Hoc Network is a multi-hop relaying
network
• ALOHAnet developed in 1970
• Ethernet developed in 1980
• In 1994, Bluetooth proposed by Ericsson to
develop a short-range, low-power, low-
complexity, and inexpensive radio inteface
• WLAN 802.11 spec. is proposed in 1997
2
Cellular and Ad Hoc Wireless Networks
3
Wireless Mesh
Networks
4
B
A
D
E
Switching Center
+
Gateway
C
F
E D
Circuit-switched Packet-switched
(evolving toward packet switching) (evolving toward emulation of circuit
switching)
Seamless connectivity Frequency path break
(low call drops during handoffs)
due to mobility
High cost and time of deployment Quick and cost-effective deployment
Widely deployed and currently in the third Several issues are to be addressed for
generation successful commercial deployment even
though widespread use exists in 8
defense 8
Applications of Ad Hoc Wireless Networks
• Military Applications
– Establishing communication among a group of soldiers for
tactical operations
– Coordination of military object moving at high
speeds such as fleets of airplanes or ships
– Requirements: reliability, efficiency, secure communication,
and multicasting routing,
• Collaborative and Distributed Computing
– Conference, distributed files sharing
• Emergency Operations
– Search, rescue, crowd control, and commando operations
– Support real-time and fault-tolerant communication paths
9
Wireless Mesh Networks
• An alternate communication infrastructure for
mobile or fixed nodes/users
• Provides many alternate paths for a data
transfer session between a source and
destination
• Advantages of Wireless Mesh Networks
– High data rate, quick and low cost of deployment,
enhanced services, high scalability, easy
extendability, high availability, and low cost per bit
10
Wired Network
Gateway node
Transmission range
A house with rooftop transceiver Wired link to the Internet
Wireless link
11
Internet
12
Wireless Sensor Networks
• A collection of a large number of sensor nodes
that are deployed in a particular region
• Applications:
– military, health care, home security, and
environmental monitoring
• Differences with the ad hoc wireless networks:
– Mobility of nodes, size of network, density
of deployment, power constraints,
data/information fusion, traffic distribution
13
1
4
1
5
Hybrid Wireless Networks
• HWN such as Multi-hop cellular networks and
integrated cellular ad hoc relay networks
– The base station maintains the information about the
topology of the network for efficient routing
– The capacity of a cellular network can be increased if the
network incorporates the properties of multi-hop relaying
along with the support of existing fixed infrastructure
• Advantages:
– Higher capacity than cellular networks due to better
channel reuse
– Increased flexibility and reliability in routing
– Better coverage and connectivity in holes
16
1
7
1
8
B
A
E Switching Center
+
Gateway
20
Medium Access Scheme
• Distributed operation
– fully distributed involving minimum control overhead
• Synchronization
– Mandatory for TDMA-based systems
• Hidden terminals
– Can significantly reduce the throughput of a MAC protocol
• Exposed terminals
– To improve the efficiency of the MAC protocol, the exposed
nodes should be allowed to transmit in a controlled
fashion without causing collision to the on-going data
transfer
• Access delay
21
The Major Issues of MAC Scheme
• Throughput and access delay
– To minimize the occurrence of collision, maximize
channel utilization, and minimize controloverhead
• Fairness
– Equal share or weighted share of the bandwidth to all
competing nodes
• Real-time traffic support
• Resource reservation
– Such as BW, buffer space, and processing power
• Capability for power control
• Adaptive rate control
• Use of directional antennas
1
8
The Major Challenge of Routing Protocol
23
The Major Requirement of Routing
Protocol
• Minimum route acquisition delay
• Quick route reconfiguration: to handle path breaks
• Loop-free routing
• Distributed routing approach
• Minimum control overhead
• Scalability
• Provisioning of QoS:
• supporting differentiated classes of services
• Support for time-sensitive traffic
• Security and privacy
24
The Major Issues in Multicast Routing
Protocols
• Robustness
– recover and reconfigure quickly from link breaks
• Efficiency
– minimum number of transmissions to deliver a data packet
to all the group members
• Minimal Control overhead
• QoS support
• Efficient group management
• Scalability
• Security
25
Transport Layer Protocols
• Objectives: setting up and maintaining
– End-to-end connections, reliable end-to-end data
delivery, flow control, and congestion control
• Major performance degradation:
– Frequent path breaks, presence of old routing
information, high channel error rate, and frequent
network partitions
26
Quality of Service Provisioning
• QoS often requires negotiation between the host and
the network, resource reservation schemes, priority
scheduling and call admission control
• QoS in Ad hoc wireless networks can be on a per
flow, per link, or per node
• Qos Parameters: different applications have different
requirements
– Multimedia: bandwidth and delay are the key parameters
– Military: BW, delay, security and reliability
– Emergency search –and-rescue: availability is the key
parameters, multiple link disjoint paths
– WSN: battery life, minimum energy consumption
27
Quality of Service Provisioning
• QoS-aware routing:
– To have the routing use QoS parameters for finding a path
– The parameters are network through put, packet delivery
ratio, reliability, delay, delay jitter, packet lost rate, bit error
rate, and path loss
• QoS framework:
– A frame work for QoS is a complete system that attempts
to provide the promised service
– The QoS modules such as routing protocol, signaling
protocol, and resource management should react
promptly according to changes in the network state
28
Self-Organization
• An important property that an ad hoc wireless
network should exhibit is organizing and maintaining
the network by itself
• Major activities: neighbor discovery, topology
organization, and topology reorganization
• Ad hoc wireless networks should be able to perform
self-organization quickly and efficiently
29
Security
• The attack against ad hoc wireless networks are
classified into two types: passive and active attacks
• Passive attack: malicious nodes to observe the
nature of activities and to obtain information in the
network without disrupting the operation
• Active attack: disrupt the operation of the network
– Internal attack: nodes belong to the same network
– External attack: nodes outside the network
30
References
⮚ “Ad Hoc Wireless Networks Architectures and Protocols” By Shiva Ram Murthi.
Prof Pranali Deshmukh
Information Technology Department
I2TT,Hinjewadi
3
2