Unit 4 Mobile Computing Notes by Amit Patils Engineering Classes
Unit 4 Mobile Computing Notes by Amit Patils Engineering Classes
UNIT 4…………………….
1. Zone formation: Each device knows its location (often obtained through
GPS) and defines a virtual zone around itself, typically circular. This zone
encompasses potential next-hop nodes for forwarding data packets. The size
of the zone can be adjusted based on network density and desired
transmission range.
2. Route discovery: When a device needs to send data to another device
(destination), it broadcasts a route request message only within its defined
zone. This significantly reduces the number of routing messages compared
to traditional flooding techniques used in MANETs.
3. Next-hop selection: Devices within the zone that receive the route request
message check their location relative to the destination. The node closest to
the destination in the direction of the destination becomes the chosen next
hop.
4. Data forwarding: The source device sends the data packet to the chosen
next hop, which then forwards it based on the same LAR principles until it
reaches the destination.
Benefits of LAR:
Example Zones:
• Sparse network: In a network with few devices, the zones can be larger to
ensure sufficient candidate next hops are available. Imagine a group of
hikers scattered across a mountain trail. Their zones might have a radius of
100 meters to account for the distance between them.
• Dense network: In a crowded environment like a conference hall, zones
might be smaller to avoid excessive overlap and interference. Each person's
zone could be just a few meters wide.
Additional considerations:
Data packets traversing a network like the internet or even your home network
need direction. Routing protocols provide that direction, acting like roadmaps for
digital information. Here's why routing is crucial:
protocols to exchange information about available paths and choose the best
route for each packet.
• Scalability and efficiency: Routing protocols allow networks to handle
large volumes of data by distributing traffic across multiple paths. This
prevents congestion and ensures efficient delivery.
• Resilience and flexibility: Networks constantly change due to link failures,
new connections, or traffic fluctuations. Routing protocols help routers adapt
to these changes by dynamically updating their routing tables, ensuring
uninterrupted data flow.
Choosing the right routing protocol depends on your specific network needs and
priorities. Here are some key goals to consider:
• Optimal routing: Finding the fastest, most reliable path for data packets
often involves factors like bandwidth, delay, cost, and congestion. Different
protocols prioritize different metrics, so choosing one aligned with your
network's priorities is crucial.
• Stability and convergence: Routing protocols should quickly adapt to
network changes to minimize disruptions and delays. Look for protocols
known for fast convergence times and stable routing tables.
• Scalability and efficiency: The chosen protocol should handle the volume
and complexity of your network without overwhelming resources. Consider
scalability as your network grows.
• Security and control: Some protocols offer features like authentication and
encryption to ensure data integrity and prevent unauthorized access. Choose
a protocol that aligns with your security requirements.
• Ease of management and configuration: Consider the complexity of
configuring and managing the protocol, especially for large networks.
2. Information Exchange:
3. Routing Process:
Benefits of CGSR:
Limitations of CGSR:
Despite their similarities, several key differences distinguish MANETs and sensor
networks:
1. Node functionality:
3. Mobility:
• MANETs: Nodes are typically mobile and can change their positions
dynamically.
• Sensor networks: Nodes are usually static or have limited mobility.
• MANETs: Nodes can handle various data types, including text, images, and
audio. Routing protocols prioritize factors like bandwidth, delay, and
reliability.
• Sensor networks: Nodes primarily deal with sensor data, often small and
time-sensitive. Routing protocols are optimized for energy efficiency and
data aggregation.
5. Applications:
Imagine you're sending a letter to a friend in another city. You put the address on
the envelope, but how does that letter actually get to its destination? That's where
routing comes in!
Routing is the process of directing data packets across a network from their
source (the sender) to their destination (the receiver). Think of it like a roadmap for
digital information, guiding packets through the intricate web of interconnected
devices.
1. Data packets: Information you send online, like emails, videos, or even this
chat message, is broken down into small, manageable units called data
packets. Each packet has a header containing the source and destination
addresses.
2. Routers: These are specialized devices that act as traffic cops, reading the
destination address on each packet and forwarding it towards the next hop in
its journey.
3. Routing tables: Routers maintain tables that map network addresses to
specific paths or other routers. Based on the destination address in the
packet's header, the router consults its table to find the best route to send it
on.
4. Hops: Each time a packet is forwarded to another router, it takes a "hop."
The goal is to find the route with the fewest hops to reach the destination
efficiently.
10
Now, let's delve into the specific world of MANET routing, which tackles the
unique challenges of mobile ad hoc networks:
Both cellular networks and ad hoc networks facilitate wireless communication, but
they differ significantly in their architecture, functionality, and applications:
Cellular Network:
Ad Hoc Network:
1. Energy efficiency: Sensor nodes are often battery-powered and have limited
capacity. Choosing energy-efficient protocols and minimizing unnecessary
communication are crucial to maximize network lifetime. Examples include duty
cycling (sleeping when not needed), data aggregation before transmission, and
multi-hop routing with fewer hops.
based approaches and dynamic routing protocols can help address scalability
challenges.
3. Data quality and reliability: Sensor data can be prone to noise, errors, and
inconsistencies. The network design should incorporate strategies for data
validation, error correction, and outlier detection to ensure reliable and accurate
data collection.
4. Security and privacy: Sensor networks may handle sensitive data, making them
vulnerable to security threats. Encryption, authentication techniques, and secure
routing protocols are necessary to protect against unauthorized access, data
tampering, and privacy breaches.
Both "source initiated on-demand network" and "dynamic routing" are related to
routing within computer networks, but they're not identical concepts. Here's a
breakdown to clarify their differences:
• This refers to a specific type of network where routes are established only
when they are needed by a source node. Instead of maintaining pre-
existing paths to all destinations, nodes in this network only discover routes
when they have actual data to send.
• Examples: Dynamic Source Routing (DSR), Ad hoc On-Demand Distance
Vector Routing (AODV), Temporarily Ordered Routing Algorithm (TORA)
• Benefits: Reduced routing overhead, improved scalability in large networks,
faster adaptation to network changes.
• Drawbacks: Slightly higher initial delay when establishing a new route,
increased processing on source nodes.
Dynamic Routing:
Essentially, all source-initiated on-demand networks are dynamic, but not all
dynamic routing protocols are source-initiated. While source-initiated networks
focus on route creation on demand, other dynamic protocols like OSPF update
existing routes proactively based on network changes.
Concept:
Operation:
message contains the source's address, destination's address, and the source's
current sequence number.
2. Route Reply (RREP): Nodes that receive the RREQ update their routing
tables if they have a fresher route to the destination (higher sequence
number) or are the destination itself. They then send an RREP message back
to the source, containing the destination's address and the number of hops to
reach it.
3. Route establishment: The source chooses the RREP with the shortest hop
count to the destination and updates its routing table with the chosen path.
4. Data forwarding: Data packets are forwarded hop-by-hop along the
established path to the destination.
5. Route maintenance: Nodes periodically send Route Error (RERR)
messages when they detect a link break or a change in hop count to the
destination. This triggers other nodes to update their routing tables and
remove the broken path.
Benefits of AODV:
Drawbacks of AODV:
• Higher initial delay: Setting up a new route can be slower than in proactive
protocols.
• Increased processing on source nodes: Source nodes perform more route
discovery tasks.
• Vulnerable to broadcast storms: Excessive RREQ messages can occur in
dense networks.
Do you have any further questions about AODV or how it compares to other
routing protocols for MANETs? I'm happy to dive deeper into specific aspects!
Both hierarchical and flat topologies play a role in sensor network design, each
with its own advantages and disadvantages:
Hierarchical Topology:
Flat Topology:
• Structure: All nodes have equal roles and communicate directly with each
other.
• Benefits:
o Simple and robust: Easy to deploy and manage, with no single point
of failure.
18
• Network size and density: Flat topology may be sufficient for small
networks, while hierarchical structure is beneficial for large-scale
deployments.
• Energy efficiency: Hierarchical topology typically minimizes energy
consumption in large networks.
• Latency requirements: Flat topology offers lower latency for time-
sensitive applications.
• Security considerations: Hierarchical topology simplifies access control
and security measures.
• Application requirements: Specific features like data aggregation or fault
tolerance might favor one topology over the other.
Both WLAN (Wireless Local Area Network) and wired LANs play crucial roles in
connecting devices, but they have distinct advantages and disadvantages that make
them suitable for different situations. Here's a breakdown:
Advantages of WLAN:
20
• Mobility and flexibility: Devices can connect and move freely within the
network coverage area, eliminating the need for physical cables. This is ideal
for offices, homes, and public spaces where flexibility is desired.
• Easy installation and expansion: Setting up a WLAN is often simpler and
faster than installing cables throughout a building. Expansion is also easier,
as adding new devices only requires placing them within range of the
existing network.
• Reduced costs: Eliminating the need for extensive cabling can significantly
lower installation and maintenance costs compared to wired LANs.
• Scalability: WLANs can easily adapt to changes in network size and
demand. Adding access points can extend coverage and accommodate more
devices without major infrastructure changes.
• Aesthetics: Wireless connectivity eliminates unsightly cables, maintaining a
cleaner and more aesthetically pleasing work or living space.
Disadvantages of WLAN:
• Security concerns: WLANs are inherently less secure than wired networks,
as signals can potentially be intercepted if not properly secured. Strong
encryption and network security measures are crucial.
• Lower performance: While WLAN speeds have improved significantly,
they generally offer lower data transfer rates compared to wired connections,
which can impact performance for bandwidth-intensive applications.
• Range limitations: Signal strength and coverage can be affected by physical
obstructions, distance from access points, and interference from other
devices. Dead zones may exist within the network area.
• Reliability issues: Wireless connections can be more susceptible to
interference and disruptions from environmental factors or network
congestion, potentially leading to dropped connections or performance
fluctuations.
• Power consumption: Wireless devices, especially laptops and mobile
devices, tend to consume more power when relying on WLAN connectivity
compared to wired connections.
Ultimately, the best choice between WLAN and wired LAN depends on your
specific needs and priorities. Consider factors like:
Energy Efficiency:
Security:
23
Fixed WSNs offer a hybrid approach between traditional WSNs and wired
networks. They utilize wireless communication between sensor nodes but connect
to a central gateway or access point via fixed infrastructure like cables or dedicated
wireless links.
Possible Architecture:
• Sensor Nodes: These nodes gather data and transmit it wirelessly to nearby
relay nodes.
• Relay Nodes: These nodes amplify and forward the data received from
sensor nodes towards the central gateway.
• Central Gateway: This gateway connects to the backhaul network and
processes the collected data.
• Increased range and reliability compared to pure WSNs, due to the fixed
infrastructure support.
• Higher data transfer rates and reduced interference compared to pure WSNs.
• More efficient power management by utilizing fixed nodes for data
forwarding.
• Easier network management and security control than pure WSNs.
• Higher initial deployment cost due to the need for fixed infrastructure.
• Reduced flexibility compared to pure WSNs as adding nodes requires
installing additional cables or links.
• Less suitable for dynamic environments where flexibility is crucial.
24
Choosing between a fixed WSN and a pure WSN depends on your specific needs
and priorities. Consider factors like:
By carefully analyzing your needs and constraints, you can choose the optimal
WSN architecture to achieve efficient and reliable data collection and monitoring
for your specific application.
The terms "source-initiated non-demand routing" and "dynamic source routing" are
related but not identical. Here's a breakdown to clarify their differences:
• This refers to a general concept where routes are established only when a
source node needs to send data to a specific destination. It contrasts with
proactive routing approaches where all nodes maintain pre-existing paths to
all potential destinations, even if those paths are never used.
• Examples: Dynamic Source Routing (DSR), Ad hoc On-Demand Distance
Vector Routing (AODV), Temporarily Ordered Routing Algorithm (TORA)
• Benefits: Reduced routing overhead, improved scalability in large networks,
faster adaptation to network changes.
• Drawbacks: Slightly higher initial delay when establishing a new route,
increased processing on source nodes.
25
Operation:
• Increased packet size: Including the route information increases packet size
and network overhead.
• Scalability limitations: Large networks with numerous route updates can
overwhelm source nodes.
• Security concerns: Malicious nodes can potentially exploit or manipulate
routes included in data packets.
1. Associativity:
4. Route Maintenance:
5. Security Considerations:
Benefits of ABR:
Drawbacks of ABR:
nodes. Its focus on on-demand routing, localized repair, and security makes it
a viable option for applications requiring reliable and adaptive
communication in dynamic network environments.
Definition:
Concept:
Operation:
5. Data Forwarding: Once the source selects a route, it starts sending data
packets to the destination along the chosen path. Intermediate nodes forward
these packets based on the routing information contained within the packets
or their routing tables.
6. Route Maintenance: Nodes monitor the network for link failures or
changes in path quality. When a problem is detected, they send error
messages (e.g., Route Error or RERR) to inform other nodes and trigger
updates in routing tables. This allows the source to re-initiate route
discovery if necessary and maintain connectivity with the destination.
• Higher initial delay: Setting up a new route can be slower than in proactive
protocols as it requires route discovery before data transmission.
• Increased processing on source nodes: Source nodes perform route
discovery and maintenance tasks, potentially impacting their energy
consumption.
• Increased complexity: Designing and implementing efficient on-demand
protocols can be more complex compared to simple proactive approaches.
Energy efficiency:
Overall, the choice between WSNs and WSNs depends on your specific needs
and priorities. Consider factors like:
By carefully weighing these factors, you can choose the optimal sensor network
solution that best meets your specific requirements and ensures efficient and
reliable data collection and monitoring for your application.
I hope this explanation helps you make an informed decision! Feel free to ask if
you have any further questions or need more specific information.
35
Here are two common route optimization strategies you can consider:
1. Load Balancing:
• Concept: This strategy aims to distribute the traffic load evenly across
available routes. By avoiding overload on any single path, you can:
o Reduce congestion and delays.
o Improve overall network performance and responsiveness.
o Extend the lifespan of network infrastructure by preventing undue
stress on specific routes.
• Implementation: Various techniques can be used for load balancing:
o Dynamic routing: Algorithms can analyze traffic patterns and
network conditions to automatically choose the least congested routes
for data transmission.
o Static routing: Pre-defined rules can be established to distribute
traffic across different paths based on factors like capacity, latency, or
reliability.
o Multipath routing: Utilize multiple paths simultaneously to
distribute the load, enhancing redundancy and fault tolerance.
• Benefits: Improved performance, reduced congestion, longer equipment
lifespan.
• Drawbacks: Increased complexity of implementation and management,
potential overhead associated with dynamic routing decisions.
2. Zone-Based Routing:
• Concept: This strategy divides the network into smaller geographical zones
and optimizes routing within each zone. Data packets are prioritized to stay
within their zone as much as possible, minimizing unnecessary hops and
reducing traffic over long distances.
• Implementation: Zone borders can be defined based on various factors like
physical boundaries, traffic density, or device types. Within each zone,
specific routing algorithms can be employed:
o Shortest path routing: Prioritize the shortest path within the zone to
minimize delay.
36
Concept:
• The network is divided into clusters, with each cluster containing a cluster
head and multiple member nodes.
• Cluster heads aggregate data from member nodes within their cluster and
transmit it to the base station either directly or through other cluster heads in
a hierarchical structure.
• This reduces the number of transmissions within the entire network, saving
energy and extending the overall lifetime of the WSN.
Benefits:
37
Operation:
Benefits:
Drawbacks:
• Increased packet size: Including the route information increases packet size
and network overhead.
• Scalability limitations: Large networks with numerous route updates can
overwhelm source nodes.
• Security concerns: Malicious nodes can potentially exploit or manipulate
routes included in data packets.
• Sensor Nodes: Gather data and transmit it wirelessly to nearby relay nodes.
• Relay Nodes: Amplify and forward the data received from sensor nodes
towards the central gateway.
• Central Gateway: Connects to the backhaul network and processes the
collected data.
Benefits of FWSNs:
• Increased range and reliability compared to pure WSNs, due to the fixed
infrastructure support.
• Higher data transfer rates and reduced interference compared to pure
WSNs.
• More efficient power management by utilizing fixed nodes for data
forwarding.
• Easier network management and security control than pure WSNs.
40
Drawbacks of FWSNs:
• Higher initial deployment cost due to the need for fixed infrastructure.
• Reduced flexibility compared to pure WSNs as adding nodes requires
installing additional cables or links.
• Less suitable for dynamic environments where flexibility is crucial.
Choosing between a FWSN and a pure WSN depends on your specific needs
and priorities. Consider factors like:
Concept:
Operation:
1. Route Maintenance: Nodes constantly update their routing tables based on:
o Periodic broadcasts of their own routing tables (distance-vector
protocols) or specific link-state advertisements (link-state protocols).
o Receiving routing updates from neighboring nodes about changes in
the network topology (link failures, new connections, etc.).
o Local knowledge of directly connected neighbors and their routes.
2. Data Forwarding: When a node needs to send data to a destination, it
consults its routing table to determine the best path based on pre-defined
metrics like hop count, delay, or bandwidth.
3. Loop Prevention: Various mechanisms like routing loops are implemented
to avoid endless data circles within the network. These can involve horizon
splits, age timestamps, or poison reverse updates.
• Fast route lookup: Data forwarding decisions are quick and efficient as
routes are readily available in the routing table.
• Scalability: Can handle relatively large networks efficiently due to
distributed routing information.
• Loop-free routing: Mechanisms like poison reverse updates and sequence
numbers help prevent routing loops.
• Reliable data delivery: Guaranteed delivery of data packets as long as the
chosen path remains operational.
Choosing the right routing protocol depends on various factors like network
size, topology, traffic patterns, and resource constraints. While table-driven
protocols offer fast data forwarding and reliable delivery, their drawbacks like
overhead and slow reaction might make them less suitable for dynamic networks
or resource-constrained environments.
6. Scalability: Ad hoc networks can be large and dynamic, with varying sizes and
network configurations. Routing protocols and management strategies need to
scale efficiently to accommodate different network sizes and changing
environments.
7. Mobility: Nodes in ad hoc networks can move freely, which can lead to link
breakages and disruptions in communication. Protocols and mechanisms are
needed to handle mobility-related challenges like route maintenance and link re-
establishment.
intervention. This requires proactive protocols and mechanisms for fault detection
and recovery