Professional Documents
Culture Documents
Ad Hoc and Wireless Sensor Networks: Faculty: R.Rajaganapathi
Ad Hoc and Wireless Sensor Networks: Faculty: R.Rajaganapathi
Faculty : R.Rajaganapathi
1-2 NETWORKS
1.2
Figure 1.4 Categories of topology
1.3
Figure 1.5 A fully connected mesh topology (five devices)
1.4
Figure 1.7 A bus topology connecting three stations
1.5
Figure 1.8 A ring topology connecting six stations
1.6
What is a wireless network?
A technology that enables two or more entities to
communicate without network cabling
Cellular and Ad Hoc Wireless Networks
– Algorithm at router
• Receive packet
• Check packet
• Forward packet
• Store-and-forward packet switching
– Algorithm at router
• Receive packet
• Check packet (e.g. checksum)
• Forward packet
frame check sequence (FCS)
ISSUES IN AD HOC WIRELESS NETWORKS
The major issues that affect the design ,
deployment, and performance of an ad hoc
wireless system are as follows:
4.Pricing scheme
5.Quality of service provisioning
6.Self-organization
7.Security
8.Energy management
9.Addressing and service discovery
10.Scalability
11.Deployment considerations
1.a.Medium Access Scheme
The primary responsibility of a medium access
control (MAC) protocol in ad hoc wireless
networks is to chose the channel from the
shared channel for transmission of packets
d.Hidden terminals:
E
silenced
M silenced
A
F Y
C silenced
S silenced silenced
Data D
silenced
ACK
G
X silenced
silenced K
B D
silenced
silenced silenced
By Beam forming Antennas
A M
F Y
C
S
D
G
X
D K
B
To Beamforming Antennas
A M
F Y
C
S
D
G
X
D K
B
2.Routing
Mobility:
One of the most important properties of ad hoc
wireless networks is the mobility of the nodes.
C
Node B knows of the broken link and tries to
reach node C via node A, thus sending the
original data back to node A. Furthermore,
node A receives the data that it originated back
from node B and consults its routing table.
Node A's routing table will say that it can reach
node C via node B (because it still has not been
informed of the break) thus sending its data
back to node B creating an infinite loop. This
routing loop problem is also called as 'two-
node loop'.
Minimum control overhead:
Stale-----பழையது
Due to the mobility of nodes and limited
transmission range, an existing path get break.
Malicious -
தீங்கிழைக்கும்
Those active attacks that are executed by
nodes outside the network are called external
attacks,
Denial of service:
The attack effected by making the network
resource unavailable for service to other nodes,
either by consuming the bandwidth or by
overloading the system, is known as denial of
service (DoS).
Impersonation -----ஆள்மாறாட்டம்
Information disclosure:
A compromised node can act as an informer by
deliberate disclosure of confidential information
to unauthorized nodes.
Interference:
A common attack in defence applications is to
jam the wireless communication by creating a
wide-spectrum noise.
This can be done by using a single wide-band
jammer,
The MAC and the physical layer technologies
should be able to handle such external threats.
Addressing and Service Discovery
Addressing and service discovery assume
significance in ad hoc wireless networks due to the
absence of any centralized coordinator.
Scenario of deployment:
The scenario of deployment becomes
significance because the capability required for a
mobile node varies with the environment in
which it is used.
following are some of the different scenarios in
which the deployment issues vary widely.
Military deployment:
The military deployment of an ad hoc wireless
network may be data centric (e.g., a wireless
sensor network) or user-centric (e.g., soldiers or
armored vehicles equipped with wireless
communication devices).
Bandwidth Constraint
More bandwidth is available in wired networks
due to the advent of fiber optics and due to the
wavelength division multiplexing (WDM)
technologies.
But in a wireless network, the radio band is
limited, and hence the data rates it can offer are
much less than wired network.
Power-aware routing: