Escolar Documentos
Profissional Documentos
Cultura Documentos
Networks (MANETS)
Agenda
Introduction
Ad Hoc wireless networks
Challenges for Ad Hoc networks
Media Access and related issues
Routing protocols for Ad Hoc networks
Comparison of few routing protocols
Conclusion
Introduction
Mobile Ad Hoc networks and Wireless sensor networks
are the two special categories of wireless networks that
are attracting attention of industry and academia for quite
some time.
Low cost, low power, low bandwidth, multi-functional
networks
Design and implementation issues
New algorithms for media access and routing are
being designed to optimize the performance
Introduction
Many wireless networks of today need an infrastructure
network, which not only provides access to other
networks, but also include forwarding functions, medium
access control (MAC) etc.
In these infrastructure-based networks, communication
typically takes place only between the wireless nodes
and the access point but not directly between the
wireless nodes.
MANETS use multi-hop radio relaying and are
capable of operating without the support of any fixed
infrastructure.
International Institute of Information Technology, Pune
Introduction to VANETs
Vehicular Ad Hoc networks (VANETs) are a form of
MANETs used for communication among vehicles and
between vehicles and roadside equipment.
Intelligent vehicular ad hoc network (InVANET) is a
kind of Intelligence in vehicle(s) which provide multiple
autonomic intelligent solutions to make automotive
vehicles to behave in intelligent manner during vehicleto-vehicle collisions, accidents etc.
InVANET uses WiFi IEEE 802.11 b/802.11g/802.11p
and WiMAX (IEEE 802.16) for providing easy,
accurate, effective communication between multiple
vehicles with dynamic mobility.
6
Introduction to VANETs
Effective measures to track the automotive vehicles,
media download /upload, conference between vehicles
are also preferred.
InVANET can also be applied for artillery vehicles during
warfare, battlefield, and peace-time operations.
Mesh networking in mobile applications have been
demonstrated in multiple military scenarios.
Cellular networks:
Cellular networks are classified as the infrastructure
dependent networks. The path set-up for a call
between two nodes is completed through the base
station in a centralized manner.
These networks offer single hop wireless links and
guaranteed bandwidth for real time (voice) traffic.
This simplifies routing and resource management,
since the routing decisions are made centrally
at the base station with more information about the
destination node.
9
Cellular Networks
B
A
Path from C to E
E
D
Switching center
+
Gateway
10
B
A
C
Path from C to E
E
D
12
Emergency operations:
Search and rescue operations
Crowd control
Earthquake hit areas
15
18
20
21
Distributed operation:
Polling may be required at regular intervals, but with minimum
overheads
Synchronization:
Time synchronization is required, but with optimum usage of
bandwidth and battery power.
Resource constraints:
Constraints such as computing power, battery power, buffer
storage etc. also limit the capability of a routing protocol.
Challenges in routing
Issues to be considered for while designing routing
protocols for Ad Hoc networks:
Mobility of nodes
Frequent path breaks
Disruption due to movement of nodes
Resource constraints
Bandwidth constraints
Less control overheads
Battery life and processing power
Error prone channel
Shared broadcast radio channel, interference, fading
Hidden & Exposed terminal problems
24
Robustness:
Multicasting protocol should be able to recover and reconfigure
quickly from the potential mobility induced link breaks, thus making
it suitable for dynamic environments.
Efficiency:
Should have minimum number of transmissions to deliver a
packet to all group members.
25
Other challenges
Self organization:
Ad Hoc networks should organize and maintain the network by
itself. The major activities in this are neighbor discovery,
transmitting beacons to detect the neighbor activities, topology
organization and re-organization.
Security:
For military networks, this is an important aspect. Lack of
central control and shared wireless medium makes them more
vulnerable to attacks. Main security threats are Denial of
Service, Resource consumption, Information disclosure and
Interference.
26
Other challenges
Scalability:
Due to the constraints mentioned earlier, scalability will be
limited for Ad Hoc networks.
Deployment considerations:
Low cost of deployment
Incremental deployment
Short deployment time
Ability to Reconfigure
Area of coverage
Operational integration with other infrastructure
Choice of protocols
27
28
MAC protocols
Contention based
protocols
Contention based
protocols with
reservation
mechanisms
Sender
Initiated
protocols
Single
channel
protocols
DPS
Receiver
Initiated
protocols
Multi
channel
protocols
MACAW
BTMA
FAMA
DBTMA
ICSMA
Contention
based protocols
with scheduling
mechanisms
DWOP
DLPS
Synchronous
RI -BTMA protocols
MACA-BI
MARCH
Other MAC
protocols
Protocols
using
Directional
antennas
MMAC
MCSMA
PCM
Asynchronous
protocols
D -PRMA
MACA/PR
CATA
RTMAC
RBAR
HRMA
SRMA/PA
FPRP
30
31
Synchronous protocols:
They require time synchronization among all nodes in the
network, so that reservations made by a node are known
to other nodes in the neighborhood.
Asynchronous protocols:
These protocols use relative time information for effecting
reservations.
32
33
34
35
On-demand (reactive):
Dynamic Source Routing Protocol (DSR)
36
37
38
39
Network topology
Destination node
15
14
13
12
11
10
8
7
4
3
2
1
Source node
41
Disadvantages:
Updates due to broken links are propagated to the whole
network, hence more control overheads.
Even a small network with high mobility of nodes, or a
large network with low mobility can choke the network.
43
44
Dynamic Source Routing (DSR) protocol is an ondemand protocol designed to restrict the bandwidth
consumed by periodic update packets in the tabledriven approach.
DSR does not require any periodic Hello packets
(beacons).
The route to the destination is established by flooding the
RouteRequest packets in the network. The destination
node (upon receiving the RouteRequest packet) responds
by sending a RouteReply packet back to the source,
which carries the route information through which the
packet has traversed.
45
RouteRequest
14
13
RouteReply
12
11
Network link
10
8
7
4
3
2
Path-1: 1-2-3-7-9-13-15
Path-2: 1-5-4-12-15
Path-3: 1-6-10-11-14-15
1
Source ID
48
Advantages:
No periodic updates required, saving of network bandwidth
Route is established only when it is required.
Control overhead is reduced since intermediate nodes
can use their cache information effectively
49
Disadvantages:
Route construction mechanism can not repair the
broken link locally.
Stale route cache information could result in
inconsistencies during route reconstruction phase.
Higher connection set-up delay.
Performance degrades due to mobility of nodes
Routing overhead is proportional to the path length.
50
RouteRequest
14
13
RouteReply
12
11
Network link
10
8
7
4
Path-1: 1-5-10-14-15
Path-2: 1-5-4-12-15
2
1
Source ID
54
Advantages:
Since destination sequence number is used, the
connection set up delay is less.
Disadvantages:
Intermediate nodes can lead to inconsistent routes if
the source sequence number is very old and the
intermediate nodes have the higher (but not the latest
DestSeqNum), thereby having stale entries.
Multiple RouteReply packets in response to a single
RouteRequest packet can lead to heavy control
overheads.
55
56
57
DSDV throughput
59
60
Conclusion
61
62