Professional Documents
Culture Documents
Introduction
• Ad hoc comes from the Latin words meaning "for this.“-made
or done suddenly for a particular purpose.
• Ad Hoc Network is a multi-hop relaying network
• hop count refers to the number of network devices through
which data passes from source to destination
2
History
• Around 500 B.C, messages were communicated to distance place by line of shouting men
positioned on tall structures
• In 1970 Norman Abramson and research group at university of Hawaii invented ALOHA
net
• ALOHA net uses single hop wireless packet switching for sharing single channel
• Ethernet and PRNET(packet radio network)developed in 1980
• PRNET uses ALOHA and CSMA
• Aimed for infrastructure less networks applicable for civilian and military purpose
• During 1980 ‘s IETF working group termed MANET(mobile Ad hoc networks) was formed
to standardize the protocols and functional specifications of ad hoc wireless networks
• In 1994, Bluetooth proposed by Ericsson to develop a short-range, low-power, low-
complexity, and inexpensive radio interface
• WLAN 802.11 spec. is proposed in 1997
3
Hybrid networks:
Ad hoc wireless networks are expected to work without infrastructure
But recent advances in wireless network enables ad hoc nodes to work in
presence of infrastructure
Eg.
Multihop cellular networks (MCN)
Self organizing packet radion ad hoc networks with overlay (SOPRANO)
4
Cellular and Ad Hoc Wireless Networks
5
Wireless Mesh
Networks
6
B
A
E D
Switching Center
+
Gateway
C
F
E D
9
Differences between cellular networks and ad hoc
wireless networks
Cellular Networks Ad Hoc Wireless Networks
Circuit-switched Packet-switched
(evolving toward packet switching) (evolving toward emulation of circuit
switching)
Seamless connectivity Frequency path break
(low call drops during handoffs)
due to mobility
High cost and time of deployment Quick and cost-effective deployment
Widely deployed and currently in the third Several issues are to be addressed for
generation successful commercial deployment even
though widespread use exists in defense
1
1 8
Applications of Ad Hoc Wireless Networks
a) Military Applications
i)Establishing communication among a group of soldiers for tactical
operations
– Setting up fixed infrastructure for soldiers in enemy territories or
inhospitable terrains may not be possible
ii)Coordination of military objects moving at high speeds such
as fleets of airplanes or ships
-ad hoc provides quick and reliable communication
• Nodes in military applications should have multiple high
power transceivers, long life batteries
Requirements on adhoc wireless networks : reliability, efficiency,
secure communication, and multicasting routing
12
b) Collaborative and Distributed Computing
Eg: research groups to share material during conference, distribute
notes to the class
-distributed file sharing does not require much security but reliability
is required
-requires economical and portable devices usually powered by battery
sources.
Eg: laptops with add-on wireless interface cards, PDA, mobile devices
with high processing power
c) Emergency Operations
– Search, rescue, crowd control, and commando operations
- Ad hoc is suitable because of the
self configuration capability with minimal overhead
Infrastructure may be destroyed due to natural calamities
– Support real-time and fault-tolerant communication paths1
3
d) Wireless Mesh Networks
• An alternate communication infrastructure for
mobile or fixed nodes/users without spectrum
reuse constraints and network planning
requirements
• Provides many alternate paths for a data
transfer session between a source and
destination
14
Wired Network
Gateway node
Transmission range
A house with rooftop transceiver Wired link to the Internet
Wireless link
16
Wireless mesh deployment scenarios:
Residential areas(where broadband internet connectivity is required)
Highways(mobile vehicular communication)
Business zone(alternate system to cellular networks)
Important civilian regions (where high degree of service availability is
required)
University campuses (campus wide network coverage)
Wireless mesh networks operate at license free ISM 2.4 GHz and 5GHz
Data rate – 2 to 60 Mbps be supported
Eg. IEEE 802.11a supports 54Mbps
18
wireless sensor networks in comparison with typical ad hoc networks:
Mobility of nodes-fixed, partial or limited mobility
size of network- large no. of nodes required
density of deployment- depends on application
power constraints-very stringent, because sensor nodes will be operated
in harsh environmental or geographical conditions
Frequent recharging of power is difficult
Power sources can be divided into
o Replenishable power source –replacing power source when existing is
fully drained off eg: wearable sensors
o Non Replenishable power source-replacement of sensor node itself eg:
deployment of sensors in hazardous terrain
o Regenerative power source- regenerate power using transducers
1
9
data/information fusion
Data fusion refers to aggregation of multiple packets into
one before relaying it to reduce bandwidth
traffic distribution
-Depends on application
-eg: environmental sensing generates short periodic
packets and demands low bandwidth whereas in typical
ad hoc wireless networks higher bandwidth is required
2
0
f) Hybrid Wireless Networks
• HWN such as Multi-hop Cellular Networks (MCN)and
integrated cellular ad hoc relay networks (iCAR)
– The base station maintains the information about the
topology of the network for efficient routing
– The capacity of a cellular network can be increased if the network
incorporates the properties of multi-hop relaying along with the
support of existing fixed infrastructure
– MCN combine reliability and support of fixed base station with
flexibility and multi hop relaying of ad hoc wireless networks
21
B
A
E Switching Center
+
Gateway
23
Issues in Ad Hoc Wireless Networks
1. Medium access scheme 7.Self-organization
2. Routing 8. Security
3. Multicasting 9. Energy management
4. TCP 10. Addressing and service
discovery
5. Pricing scheme 11. Scalability
6. QoS 12. Deployment considerations
24
Open systems Interconnection(OSI) reference model
2
5
1.Medium Access Scheme
issues in designing MAC protocols for ad hoc wireless networks
• Distributed operation
– No centralized coordination is possible. fully distributed involving
minimum control overhead
• Synchronization
- requires time synchronization
– Mandatory for TDMA-based systems
• Hidden terminals
- terminals hidden (not reachable) from transmitter but
reachable by receiver
- may cause collisions at receiver node
– Can significantly reduce the throughput of a MAC protocol
26
• Exposed terminals
- nodes in the transmission range of the sender of on
ongoing session but prevented from making transmission
– To improve the efficiency of the MAC protocol, the exposed nodes
should be allowed to transmit in a controlled fashion without
causing collision to the on-going data transfer
• Access delay
- average delay that a packet experience.
- MAC protocol should minimize it
• Throughput
- defined as the amount of data successfully transferred from
one place to other
– minimize the occurrence of collision, maximize channel utilization,
and minimize control overhead to maximize throughput 2
7
• Fairness
– Equal share or weighted share of the bandwidth to all competing nodes
– Can be either node based or flow based
node based- equal bandwidth for all competing nodes
flow based- equal bandwidth for all competing data transfer sessions
- Unfairness relaying load may drain faster than other nodes
• Real-time traffic support
-Mac protocol should support limited bandwidth, time
synchronization and no central coordination for real time traffic with
voice, video and data
• Resource reservation
– Such as BW, buffer space, and processing power
18
• Capability for power control
-control in power transmission reduces energy consumption in nodes,
decrease interference with neighboring nodes and increase frequency reuse
• Adaptive rate control
-Mac protocol having adaptive data rate have high data rate when
transmitter and receiver are nearby otherwise lower data rate
• Use of directional antennas
-increases spectrum reuse, reduction in interference, reduced power
consumption
- Mostly omni directional antennas are used
2
9
2.Major Challenges of Routing Protocol
• Mobility result in frequent path break, packet
collision, and difficulty in resource reservation
• Bandwidth constraint: BW is shared by every
node
• Error-prone and share channel: high bit error
rate
• Location-dependent contention: distributing the
network load uniformly across the network
• Other resource constraint: computing power, battery
power, and buffer storage
30
Major Requirement of Routing Protocol
• Minimum route acquisition delay
• Quick route reconfiguration: to handle path breaks
• Loop-free routing
• Distributed routing approach
• Minimum control overhead
• Scalability
• Provisioning of QoS:
- QoS paramters are bandwidth, jitter,packet
delivery ratio, throughput
- supporting differentiated classes of services
• Support for time-sensitive traffic
• Security and privacy
31
3.Major Issues in Multicast Routing Protocols
• Robustness
– recover and reconfigure quickly from link breaks
• Efficiency
– minimum number of transmissions to deliver a data packet
to all the group members
• Minimal Control overhead
• QoS support
• Efficient group management
• Scalability
• Security
32
4.Transport Layer Protocols
33
6. Quality of Service Provisioning
• QoS is the performance level of service offered by service
provider to user.
• QoS often requires negotiation between the host and the
network, resource reservation schemes, priority scheduling
and call admission control
• QoS in Ad hoc wireless networks can be on a per flow,
per link, or per node
• Qos Parameters: different applications have different
requirements
– Multimedia: bandwidth and delay are the key parameters
– Military: BW, delay, security and reliability
– Emergency search –and-rescue: availability is the key
parameters, multiple link disjoint paths 34
37
Major security threats in adhoc wireless networks
1. Denial of service
2. resource consumption
3. Host impersonation
4. Information disclosure
5. Interference