0% found this document useful (0 votes)
21 views

Unit-I Adhoc Sensor Networks

Uploaded by

anushakb
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Unit-I Adhoc Sensor Networks

Uploaded by

anushakb
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 47

Ad-Hoc & Sensor

Networks IV year I
sem
Computer Science And Engineering
Content

Cellular and Ad Hoc Wireless Networks


Applications of Ad Hoc Wireless Networks
Issues in Ad Hoc Wireless Networks
Ad Hoc Wireless Internet
Cellular networks:
In Cellular networks we need to have some fixed
infrastructure, like base stations for communication to
occur.These base stations should be setup by the network
providers.In Cellular Networks the presence of base station,
simplifies routing resource management
Fig: CELLULAR NETWORK
Ad Hoc Wireless Network:

Ad hoc wireless networks are defined as a category of wireless network that utilize
multi-hop radio relaying and are capable of operating without the support of any
fixed infrastructure.Absence of any central coordinator or base station makes the
routing complex.Ad hoc wireless network topology for the cellular network shown in
above figure is illustrated below.
Fig: Ad-Hoc Network
AdHocMo
del
InfrastructureVsAdHocNetwork
Infrastructure networks Ad-hoc wireless networks
Fixed infrastructure No infrastructure

Single-hop wireless links Multi-hop wireless links

High cost and time of deployment Very quick and cost-effective

Reuseof frequency via channel reuse Dynamic frequency sharing

Nowadays applications: civilian, commercial Nowadays applications: military, rescue

High cost of network maintenance Maintenance operations are built-in

Low complexity of mobile devices Intelligent mobile devices arerequired

Widely deployed, evolves Still under development in commercialsector


Mode of operation
Ad hoc networks are basically peer-to-peer multi-hop mobile wireless networks where
information packets are transmitted in a store-and-forward manner from a source to an arbitrary
intermediate nodes as shown in Figure destination, via
As the MHs move, the resulting change in network topology must be made known to the
other
nodes so that outdated topology informationcan be updated or removed.
For example, as the MH2 in the above Figure changes its point of attachment from MH3 to
MH4 other nodes part of the network should use this new route to forward
packets to MH2.
Applications of Ad Hoc Wireless
Networks
• Military Applications

• Collaborative and Distributed Computing

• Emergency Operations

• Wireless Mesh Networks

• Wireless Sensor Networks

• Hybrid Wireless Networks


Cellular and Ad Hoc Wireless
Networks
Wireless Mesh Networks
• WMN are ad hoc wireless networks that are formed to provide an
alternate communication infrastructure for mobile or
fixed nodes/users.

• The mesh topology of wireless mesh networks provides many


alternate paths for a data transfer session between a source
and destination, resulting in quick reconfiguration of the path
when the existing path fails due to node failures.
Wireless Mesh Networks (contd..)
• The possible deployment scenarios of wireless mesh networks :

 residential zones (where broadband Internet connectivity is required),

 highways (where a communication facility for moving automobiles


is required),

 business zones (where an alternate communication system to cellular


networks is required),
Wireless Mesh Networks (contd..)
• The possible deployment scenarios of wireless mesh networks :

 important civilian regions (where a high degree of service availability


is required), and

 university campuses (where inexpensive campus-wide network coverage


can be provided).
Wireless Mesh Networks (contd..)
• Wireless mesh networks should be capable of self-organization and
maintenance.

• Major advantages of wireless mesh networks:

 support for a high data rate,

 quick and low cost of deployment, enhanced services,

 high scalability, easy extendibility, high availability, and low cost


per bit.

• Wireless mesh networks operate at the license-free ISM bands around 2.4 GHz
Wireless mesh network operating in a residential zone.
Wireless mesh network covering a highway.
Wireless Sensor Networks
• WSN are special category of ad hoc wireless networks that are used to
provide a wireless communication infrastructure among the sensors
deployed in a specific application domain.

• Sensor nodes are tiny devices that have the capability of sensing physical
parameters, processing the data gathered, and communicating over
the network to the monitoring station.

• The activity of sensing can be periodic or sporadic.


Wireless Sensor Networks (contd..)
• An example for the periodic type :

 sensing of environmental factors for the measurement of parameters such


as temperature, humidity, and nuclear radiation.

• An example for the sporadic type :

 Detecting border intrusion, sensing the temperature of a furnace to prevent


it rising beyond a threshold, and measuring the stress on critical structures
or machinery are examples of the sensing activities
Wireless Sensor Networks (contd..)
• Applications of Sensor Networks:

military, health care, home security, and environmental monitoring.


• issues that make sensor networks a distinct category of ad hoc
wireless networks are the following:
1. Mobility of nodes
2. Size of the network
3. Density of deployment
4. Power constraints
5. Data/information fusion
6. Traffic distribution
Hybrid Wireless Networks
• One of the major application areas of ad hoc wireless networks is in hybrid
wireless architectures such as multi-hop cellular networks (MCNs)
and integrated cellular ad hoc relay (iCAR) networks.

• MCNs combine the reliability and support of fixed base stations of cellular
networks with flexibility and multi-hop relaying of ad hoc wireless
networks.
Hybrid Wireless Networks
(contd..)

Figure. MCN architecture.


Hybrid Wireless Networks (contd..)
• when two nodes (which are not in direct transmission range) in the same cell
want to communicate with each other, the connection is routed
through multiple wireless hops over the intermediate nodes.

• The base station maintains the information about the topology of the network
for efficient routing.

• The base station may or may not be involved in this multi-hop path.
Hybrid Wireless Networks (contd..)

• The major advantages of hybrid wireless networks are as follows:


 Higher capacity than cellular networks.

 Increased flexibility and reliability in routing.

 Better coverage and connectivity in holes (areas that are not covered
due to transmission difficulties.
ISSUES IN AD HOC WIRELESS
NETWORKS
• The major issues that affect the design, deployment, and performance of an

ad hoc wireless system are


1. Medium access scheme 7. Self-organization
2. Routing 8. Security
3. Multicasting 9. Energy management
4. Transport layer protocol 10. Addressing and service discovery
5. Pricing scheme 11. Scalability
6. Quality of service provisioning 12. Deployment considerations
Medium Access
• Distributed operation Scheme
– fully distributed involving minimum control overhead

• Synchronization

– Mandatory for TDMA-based systems

• Hidden terminals

– Can significantly reduce the throughput of a MAC protocol

• Exposed terminals
– To improve the efficiency of the MAC protocol, the exposed nodes should be
allowed to transmit in a controlled fashion without causing
collision to the on-going data transfer
The Hidden Terminal Problem
Medium Access Scheme
• (contd..)
Throughput and access delay
– To minimize the occurrence of collision, maximize channel utilization, and
minimize controloverhead
• Fairness
– Equal share or weighted share of the bandwidth to all competing
nodes
• Real-time traffic support
• Resource reservation
– Such as BW, buffer space, and processing power
• Capability for power control
• Adaptive rate control
• Use of directional antennas
Routing
• Protocol
Mobility result in frequent path break, packet collision, and difficulty in
resource reservation
• Bandwidth constraint: BW is shared by every
node
• Error-prone and share channel: high bit error
rate network load
uniformly
• Location-dependent contention: distributing
• Other resource
the across constraint: computing power, battery
the network power, and buffer
storage
Routing Protocol
• (contd..)
Minimum route acquisition delay
• Quick route reconfiguration: to handle path
breaks
• Loop-free routing

• Distributed routing approach

• Minimum control overhead

• Scalability

• Provisioning of QoS:
Multicast Routing
• Robustness Protocols
– recover and reconfigure quickly from link breaks
• Efficiency
– minimum number of transmissions to deliver a data packet to all the
group members
• Minimal Control overhead
• QoS support
• Efficient group management
• Scalability
• Security
Transport Layer Protocols
• Objectives: setting up and maintaining
– End-to-end connections, reliable end-to-end data delivery, flow
control, and congestion
control
• Major performance degradation:

– Frequent path breaks, presence of old routing information, high


channel error rate, and frequent network partitions
Quality of Service
• QoS Provisioning
often requires negotiation between the host and the network,
resource reservation schemes, priority scheduling and call admission
control
• Qos Parameters: different applications have different requirements
– Multimedia: bandwidth and delay are the key parameters
– Military:
Emergency BW, delay,
searchsecurity and reliability
–and-rescue: availability is the parameters,
key multiple link disjoint paths
– WSN: battery life, minimum energy consumption
Quality of Service Provisioning (contd..)
• QoS-aware routing:
– To have the routing use QoS parameters for finding a path
– The parameters are network through put, packet ratio, reliability,
delivery delay, delay jitter, packet lost rate, bit error rate,
and path loss
• QoS framework: to provide the
– A frame work for QoS is a complete system that
– attempts promised service
The QoS modules such as routing protocol,
Self-
Organization
• An important property that an ad hoc network should exhibit is
wireless organizing and maintaining the
network by itself organization, and
• Major activities: neighbor discovery,
topology reorganization
topology
• Ad hoc wireless networks should be able to perform self-organization
quickly and efficiently
Securit
• The attack against ad hocywireless networks classified into two types:
are passive and active attacks
• Passive attack: malicious nodes to observe nature of activities and to
the
obtain information in the network without disrupting the
operation
• Active attack: disrupt the operation of the network
– Internal attack: nodes belong to the same network
– External attack: nodes outside the network
AD HOC WIRELESS
INTERNET
• Some of the applications of the ad hoc wireless Internet are wireless mesh
networks, provisioning of temporary Internet services to major
conference venues, sports venues, temporary military settlements,
battlefields, and broadband Internet services in rural regions.
AD HOC WIRELESS INTERNET
AD HOC WIRELESS INTERNET (contd..)
The major issues to be considered for a successful ad hoc wireless Internet are the
following:
1. Gateways:
• Gateway nodes in the ad hoc wireless Internet are the entry points to the wired Internet.
• The major part of the service provisioning lies with the gateway nodes.
• Generally owned and operated by a service provider, gateways perform the
following tasks:
• keeping track of the end users, bandwidth management, load balancing, traffic shaping,
packet filtering, bandwidth fairness, and address, service, and location discovery.
AD HOC WIRELESS INTERNET (contd..)
2. Address mobility:

• This problem is worse as the nodes operate over multiple wireless hops. Solutions such as
Mobile IP can provide temporary alternatives for this.

3. Routing:

• Routing is a major problem in the ad hoc wireless Internet, due to the dynamic topological
changes, the presence of gateways, multi-hop relaying, and the hybrid character of
the network.

• The possible solution for this is the use of a separate routing protocol, for the wireless part of
the ad hoc wireless Internet.

• Routing protocols are more suitable as they exploit the presence of gateway nodes.
AD HOC WIRELESS INTERNET (contd..)

4. Transport layer protocol:

• Split approaches that use traditional wired TCP for the wired part and a specialized
transport layer protocol for the ad hoc wireless network part can also be considered
where the gateways act as the intermediate nodes at which the connections are split.

• Several factors are to be considered here, the major one being the state maintenance
overhead at the gateway nodes.
AD HOC WIRELESS INTERNET (contd..)
5. Load balancing:

• The gateways can be saturated much earlier than other nodes in the network because of the heavy
traffic.

• Load balancing techniques are essential to distribute the load so as to avoid the situation where the
gateway nodes become bottleneck nodes.

6. Provisioning of security:

• The inherent broadcast nature of the wireless medium attracts not just the mobility seekers but also
potential hackers who love to snoop on important information sent unprotected over the air.

• Hence security is a prime concern in the ad hoc wireless Internet.

• Since the end users can utilize the ad hoc wireless Internet infrastructure to make e-
commerce
AD HOC WIRELESS INTERNET (contd..)
7. QoS support:

• With the widespread use of voice over IP (VoIP) and growing multimedia applications over
the
Internet, provisioning of QoS support in the ad hoc wireless Internet becomes a very important issue.

8. Service, address, and location discovery:

• Service discovery in any network refers to the activity of discovering or identifying the party which
provides a particular service or resource.

• In wired networks, service location protocols exist to do the same, and similar systems need to be
extended to operate in the ad hoc wireless Internet as well.

• Address discovery refers to the services such as those provided by address resolution protocol (ARP)
or domain name service (DNS) operating within the wireless domain.
AD HOC WIRELESS INTERNET (contd..)

• Location discovery refers to different activities such as detecting the location of a particular
mobile node in the network or detecting the geographical location of nodes.

• Location discovery services can provide enhanced services such as routing of


packets, location-based services, and selective region-wide broadcasts.
An illustration of the ad hoc wireless Internet implemented by a wireless mesh
network.

You might also like