MANETS Justin Champion Room C203, Beacon Building Tel 3292,

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Multicasting in Mobile Ad-Hoc Networks (MANET)
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Remote Desktop Connection Techniques Wireless Communication Networks.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Wireless LANS Justin Champion Room C208 - Tel:
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Supervisor: Mr. Hai Vortman. The ultimate goal Creating a wireless sensor network using Bluetooth technology.
Networks Evolving? Justin Champion C208 Ext:3723
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
Energy Saving In Sensor Network Using Specialized Nodes Shahab Salehi EE 695.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
A Study of Live Video Streaming over Highway Vehicular Ad hoc Networks Meenakshi Mittal ©2010 International Journal of Computer Applications ( )Volume.
Routing Protocols in Ad-hoc Networks, OLSR Self configuring systems (SCS) TTM3 – Høst 2004 Jørn Andre Berntzen 22/10/2004.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks Reporter: Yanlin Peng Wenrui Zhao, Mostafa Ammar, College of Computing,
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Outline Introduction Existing solutions for ad hoc
Data Communications and Networking Overview
TELE202 Lecture 6 Routing in WAN 1 Lecturer Dr Z. Huang Overview ¥Last Lecture »Packet switching in Wide Area Networks »Source: chapter 10 ¥This Lecture.
Ad Hoc Network.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Scalable Routing Protocols for
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
*SWITCHES *WIRELESS Routers. Description/Appearance Forwards data packets (a basic unit of communication) to its destination Can be wireless or connected.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Lecture 7. Building Forwarding Tables There are several methods Static Method Dynamic Methods Centralized Distributed Distance Vector Link State.
1 Optimized Link State Routing Protocol for Ad Hoc Networks Jacquet, p IEEE INMIC Dec park gi won
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Mobile Ad Hoc Network (MANET)
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
IMPROVEMENT OF NETWORK LIFETIME BY IMPROVING ROUTE DISCOVERY PHASE IN MULTI-PATH DSR USING HYBRID ANT COLONY OPTIMIZATION.
AODV-OLSR Scalable Ad hoc Routing
Ad-hoc Networks.
MZR: A Multicast Protocol based on Zone Routing
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
Chapter 5 The Network Layer.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Subject Name: Computer Networks - II Subject Code: 10CS64
Protocols.
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

MANETS Justin Champion Room C203, Beacon Building Tel 3292,

Content Introduction  Why consider this  Types of Network  Issues in transferring data Conclusion

Why is this a consideration So far in lectures we have looked at cellular networks  These are infrastructure based The access points to the network never move The contents within the network will always be in the same point The nodes once issued with a IP address will always be connected at the same point  The university uses a fixed infrastructure network  The Internet is based on a known structure to route information between points

Infrastructure Based Network A B

Other Types of Networks PicoNets  These are a small network of a number of nodes communicate  Good example is Bluetooth with 1 master and 7 slaves communicating Scatternets  A Scatternet is several Piconets sharing one common device These are all examples of adhoc networks  Commonly know as MANETS

Scatternet

Why is this a consideration With mobile networks the infrastructure can change  Consider the previous diagram of a Scatternet  If all devices are accessing the network through an access point This will be fixed as a point into the network  As long as the device is within range  AdHoc networking consists of when there is no set infrastructure These are referred to as MANET’s  Mobile Ad hoc Networks (MANETS)

MANETS – why ? Why ?  By having common communication standards Allows all of the devices to communicate with each other Wireless standards will be covered in another week  No installation required The parties communicating can get together to transfer information No prior knowledge of each other is required No agreement or identification is needed to start the communications

MANETS –Common use Usage  Business meeting All of the parties at the meeting can receive the presentations being used Business details can be exchanged  Game players Come together for the game to play Afterwards then move to another group and join that game  Sensor networks Where a number of wireless nodes are distributed  Emergency Service use Allows a network to set quickly until full infrastructure can be arranged

MANETS – $100 laptop Designed to allow educational computing power in regions of the world that currently can not have it  This should connect them to the Internet and allow people access to resources we take for granted  Using a single connection to get all devices networking  Each device will talk to its neighbours ource/0, , ,00.htm ource/0, , ,00.htm Uruguay has purchased 100,000 of these 29 th Oct 07  m

MANETS – Usage LANDroid  Generating a MANET and adjusting itself to ensure optimal communications

MANET Demo AB C  All Devices are in range All devices receive all communications Sending from A to C is straightforward as no packet routing is required

MANET Demo AB C  A wants to communicate with C Packets can be sent through B

Difficulties Difficulty comes from  Routing information Finding a route through the network  Battery Life Other users could be using your limited battery capability  Security Concerns The routing party could also be taking copies of any data transferred

Routing in a MANET C A B No Route from A to C !

Routing in a MANET The nature of mobile networks indicates that nodes move  This means that a route to a particular point may also change  Special protocols are used to keep the routing table current AdHoc routing protocols which come in two varieties  Re-active  Only finds a route as and when required  Pro-Active  These always search for the best or better routes

Routing in a MANET Examples of adhoc routing protocols  Complete list of all techniques en.wikipedia.org/wiki/Ad_hoc_protocol_list  Example techniques Pro-active  Wireless Routing Protocol (WRP) Re-active  Temporarily Ordered Routing Algorithm (TORA)

Routing using WRP Wireless Routing Protocol (WRP)  Is a table driven method of communicating Each of the nodes will have a table which contains all routes in the network  For WRP these are four tables, Routing, distance, route cost and message retransmission  The method is proactive so The routes are worked out before they are needed They are constantly updated  Giving a overhead to the network and the battery of the device Even routes which may never be needed are calculated and stored

Routing using WRP WRP operates by  Each node must send a “hello” message within a certain time-frame If receiving nodes do not know the “hello” message node the routing table is updated of all receiving nodes  Each node will forward the list of known routes to all other neighbour nodes Neighbour nodes are the ones within range of transmissions The list is sent out periodically Sent out immediately in the event of a change to the network

Routing using TORA Temporally Ordered Routing Algorithm (TORA)  Routes are only created as required  Packets are sent out asking for the destination node This packet is then forwarded to each neighbouring node Until the destination is found or a break is discovered  This method may produce multiple routes to a single destination This is potentially good for load sharing

Sensor Network These are a number of nodes distributed within an area  The nodes can be any size Small would be located in a building to detect fire Large would be placed at location detecting ground movements An example from Intel is used to monitor ship vibration   They need A source of power  Battery or mains Processing and detecting capabilities Wireless Communication to transfer the information  A good research paper on this subject umber= , umber=  This link will only work within the university network

Sensor Network These are a number of nodes distributed within an area  Instead of a few detectors, this uses a large number of small detectors

Security Forwarding packets allows multiple nodes to get access to the data  Security is required if the data is confidential  Easiest method is the use of Internet Protocol Security (IPSEC) Although available for IPv4, it is now mandatory for the use of IPv6 Either the data within the packet can be encrypted or  The entire packet can be placed inside another packet encrypting everything

Security Without security of some kind  How would you know a message is genuine Consider the fire example previously  What would stop someone from sending a spurious signal to active the fire system Ensure your data is confidential  Are you happy for node B to be able to read/store everything you send? A B C Packet 1 Packet 2 Packet 3

Battery Mobile devices by there nature are battery powered  This gives a limited amount of power to the device The biggest use of this power is the wireless networking Using adhoc networking some of the parties will drain the battery without any benefit! (node B in the example below) Also throughput is limited, so if B wishes to communicate part of the available network speed is being used  It is about fair sharing of resources, with each device benefiting A B C Battery Power

Conclusion We have looked at  Networking models PicoNets ScatterNets MANETS  Considerations