Issues in Ad Hoc Wireless Networks

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

QoS in Mobile Ad Hoc Networks
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Winter 2004 UCSC CMPE252B1 CMPE 257: Wireless and Mobile Networking SET 3f: Medium Access Control Protocols.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Chapter 5: Ad Hoc Wireless Networks
Multicasting in Mobile Ad-Hoc Networks (MANET)
In-Band Flow Establishment for End-to-End QoS in RDRN Saravanan Radhakrishnan.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Wireless Sensor Network Security Anuj Nagar CS 590.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Wireless MAC Protocols for Ad-Hoc Networks Derek J Corbett Supervisor: Prof. David Everitt.
1 Heterogeneity in Multi-Hop Wireless Networks Nitin H. Vaidya University of Illinois at Urbana-Champaign © 2003 Vaidya.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
MULTIMEDIA OVER WIRELESS BROADBAND NETWORKS BY: NEELIMA PUNJALA.
A Survey on Wireless Mesh Networks IAN F. AKYILDIZ, GEORGIA INSTITUTE OF TECHNOLOGY XUDONG WANG, KIYON, INC. IEEE Radio Communications September 2005.
Ad Hoc Wireless Networks Lec#11. Mobile Wireless Network  Need: Access computing and communication services, on the move 2.
CROSS-LAYER OPTIMIZATION PRESENTED BY M RAHMAN ID:
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
We hope that it is more important to know where you are going than to get there quickly. SNU INC Lab. A Survey of Energy Efficient Network Protocols for.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Wireless Mesh Networks Myungchul Kim
Medium Access in Sensor Networks. Presented by: Vikram Shankar.
Wireless LAN Requirements (1) Same as any LAN – High capacity, short distances, full connectivity, broadcast capability Throughput: – efficient use wireless.
Submission May 2016 H. H. LEESlide 1 IEEE Framework and Its Applicability to IMT-2020 Date: Authors:
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Wireless Sensor Networks: A Survey I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci.
Data Link Layer Architecture for Wireless Sensor Networks Charlie Zhong September 28, 2001.
Guided by: Nagasundari Asst. Professor Dept. of ISE PESIT A Seminar on 4G WIRELESS SYSTEM By Suresh M.R USN:1PI08IS411.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
In the name of God.
Routing Metrics for Wireless Mesh Networks
Instructor Materials Chapter 6: Quality of Service
Dominik Kaspar, Eunsook Kim, Carles Gomez, Carsten Bormann
Routing Metrics for Wireless Mesh Networks
Overview of Wireless Networks:
Klara Nahrstedt Spring 2009
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Contention-based protocols with Reservation Mechanisms
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Wireless ATM & Congestion Control
Introduction to Wireless Sensor Networks
Lei Chen and Wendi B. Heinzelman , University of Rochester
Net 435: Wireless sensor network (WSN)
Subject Name: Adhoc Networks Subject Code: 10CS841
Congestion Control, Internet transport protocols: udp
Vehicular Communication Technology
Wireless ATM PRESENTED BY : NIPURBA KONAR.
Transport Layer Unit 5.
Ad Hoc and Sensor Networks
MULTIMEDIA OVER WIRELESS BROADBAND NETWORKS
Routing Metrics for Wireless Mesh Networks
Mobile ad hoc networking: imperatives and challenges
November 18 July 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Task Group 4e definitions Date.
Provision of Multimedia Services in based Networks
Xiuzhen Cheng Csci332 MAS Networks – Challenges and State-of-the-Art Research – Wireless Mesh Networks Xiuzhen Cheng
Chapter 5: Ad Hoc Wireless Networks
Subject Name: Adhoc Networks Subject Code: 10CS841
Chapter 5: Ad Hoc Wireless Networks
Optical communications & networking - an Overview
Protocols.
An Overview of Security Issues in Sensor Network
Protocols.
Presentation transcript:

Issues in Ad Hoc Wireless Networks Medium access scheme Routing Multicasting Transport layer protocol Pricing scheme Quality of service provisioning Self-organization Security Energy management Addressing and service discovery Scalability Deployment considerations

Medium Access Scheme Distributed operation Synchronization The MAC protocol design should be fully distributed involving minimum control overhead Synchronization Mandatory for TDMA-based systems. Synchronization involves usage of scarce resources such as bandwidth and battery power Hidden terminals Can significantly reduce the throughput of a MAC protocol. Hence the MAC protocol should be able to alleviate the effects of hidden terminals Exposed terminals To improve the efficiency of the MAC protocol, the exposed nodes should be allowed to transmit in a controlled fashion without causing collision to the on-going data transfer Access delay The MAC protocol should attempt to minimize the delay Throughput The important considerations for throughput enhancement are minimizing the occurrence of collision, maximize channel utilization, and minimize control overhead.

Real-time traffic support Fairness Equal share or weighted share of the bandwidth to all competing nodes Real-time traffic support Voice, video and real-time data require explicit support from the MAC protocol Resource reservation Such as BW, buffer space, and processing power Capability for power control Reduces the energy consumption, decrease in interference , increase in frequency reuse Adaptive rate control Variation in the data bit rate Use of directional antennas Increased spectrum reuse, reduction in interference, and reduced power consumption

Routing The Major Challenges of Routing Protocol are Mobility: results in frequent path break, packet collision, and difficulty in resource reservation Bandwidth constraint: BW is shared by every node Error-prone and share channel: high bit error rate Location-dependent contention: distributing the network load uniformly across the network Other resource constraint: computing power, battery power, and buffer storage

The Major Requirement of Routing Protocol Minimum route acquisition delay Quick route reconfiguration: to handle path breaks Loop-free routing Distributed routing approach Minimum control overhead Scalability Provisioning of QoS Bandwidth, delay, jitter, packet delivery ratio Supporting differentiated classes of services Support for time-sensitive traffic Hard real-time and Soft real-time traffic Security and privacy

Multicasting The Major Issues in Multicast Routing Protocols Robustness recover and reconfigure quickly from link breaks Efficiency minimum number of transmissions to deliver a data packet to all the group members Minimal Control overhead QoS support Efficient group management Scalability Security

Transport Layer Protocols Objectives: setting up and maintaining End-to-end connections, reliable end-to-end data delivery, flow control, and congestion control Major performance degradation: Frequent path breaks, presence of old routing information, high channel error rate, and frequent network partitions

Pricing Scheme

Quality of Service Provisioning QoS often requires negotiation between the host and the network, resource reservation schemes, priority scheduling and call admission control QoS in Ad hoc wireless networks can be on a per flow, per link, or per node Qos Parameters: different applications have different requirements – Multimedia: bandwidth and delay are the key parameters – Military: BW, delay, security and reliability – Emergency search –and-rescue: availability is the key parameters, multiple link disjoint paths – WSN: battery life, minimum energy consumption

Quality of Service Provisioning QoS-aware routing: – To have the routing use QoS parameters for finding a path – The parameters are network through put, packet delivery ratio, reliability, delay, delay jitter, packet lost rate, bit error rate, and path loss QoS framework: – A frame work for QoS is a complete system that attempts to provide the promised service – The QoS modules such as routing protocol, signaling protocol, and resource management should react promptly according to changes in the network state

Self-Organization An important property that an ad hoc wireless network should exhibit is organizing and maintaining the network by itself Major activities: neighbor discovery, topology organization, and topology reorganization Ad hoc wireless networks should be able to perform self-organization quickly and efficiently

Security The attack against ad hoc wireless networks are classified into two types: passive and active attacks Passive attack: malicious nodes to observe the nature of activities and to obtain information in the network without disrupting the operation Active attack: disrupt the operation of the network – Internal attack: nodes belong to the same network – External attack: nodes outside the network

Major Security Threats Denial of service: either consume the network BW or overloading the system Resource consumption – Energy depletion: by directing unnecessary traffic through nodes – Buffer overflow: filling unwanted data, routing table attack (filling nonexistent destinations) Host impersonation: A compromised node can act as another node and respond control packets to create wrong route entries and terminate the traffic Information disclosure: support useful traffic pattern Interference: create wide-spectrum noise

Addressing and Service Discovery An address that is globally unique is required for a node to participate communication – Auto-configuration of address is required to allocate non-duplicate address to the nodes – In networks frequent partitioning and merging of network components require duplicate address detection mechanisms Nodes in the network should be able to locate services that other nodes provide

Energy Management Transmission power management: – RF hardware design ensure minimum power consumption – Uses variable power MAC protocol – Load balance in network layer – Reducing the number of retransmissions at the transport layer – Application software developed for mobile computers

Energy Management(cont.) Battery energy management: extending the battery life by taking chemical properties, discharge patterns, and by the selection of a battery from a set of batteries that is available for redundancy Processor power management: CPU can be put into different power saving modes during low processing load conditions Devices power management: can be done by OS by selectively powering down interface devices that are not used or by putting devices into different power-saving modes

Scalability The latency of path-finding involved with an on-demand routing protocol in a large ad hoc wireless network may be unacceptably high. A hierarchical topology-based system and addressing may be more suitable for large ad hoc wireless networks

Deployment Considerations The deployment of a commercial ad hoc wireless network has the following benefits – Low cost of deployment – Incremental deployment – Short deployment time – Re-configurability

Major Issues for Deployment Scenario of deployment – Military deployment • Data-centric (e.g. WSN) • User-centric (soldiers or vehicles carrying with wireless communication devices) – Emergency operations deployment – Commercial wide-area deployment – Home network deployment Required longevity of network: regenerative power source can be deployed when the connectivity is required for a longer duration of time Area of coverage

Major Issues for Deployment Service availability: redundant nodes can be deployed to against nodes failure Operational integration with other infrastructure: can be considered for improve the performance or gathering additional information, or for providing better QoS Choice of protocols: the choices of protocols at different layers of the protocol stack is to be done taking into consideration the deployment scenario