1 Mobile ad hoc networking: imperatives and challenges Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu 2005. 10. 10. MMLAB, Seongil Han

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Security in Mobile Ad Hoc Networks
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Introduction to Wireless Sensor Networks
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Prepared by: Suman Chakraborty CSE, 4 th year Roll Sensor Networks(CS-704D)
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Summary and Further Reading Part I of 13th.
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security of wireless ad-hoc networks. Outline Properties of Ad-Hoc network Security Challenges MANET vs. Traditional Routing Why traditional routing protocols.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
CS541 Advanced Networking 1 Vehicular Ad Hoc Networks (VANETs) Neil Tang 2/4/2009.
MAC Reliable Broadcast in Ad Hoc Networks Ken Tang, Mario Gerla University of California, Los Angeles (ktang,
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Hamida SEBA - ICPS06 June 26 th -29 th Lyon France 1 ARMP: an Adaptive Routing Protocol for MANETs Hamida SEBA PRISMa Lab. – G2Ap team
1 Seminar Algorithms for ad hoc networking: Patrik Floréen Seminar Introduction.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Multicast Routing in Mobile Ad Hoc Networks (MANETs)
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
IDRM: Inter-Domain Routing Protocol for Mobile Ad Hoc Networks C.-K. Chau, J. Crowcroft, K.-W. Lee, S. H.Y. Wong.
TCP PERFORMANCE OVER AD HOC NETWORKS Presented by Vishwanee Raghoonundun Assisted by Maheshwarnath Behary MSc Computer Networks Middlesex University.
ROUTING ALGORITHMS IN AD HOC NETWORKS
College of Computer Science Karl Lieberherr. Projects Focus on two Projects: –Karl Lieberherr: Demeter and Aspect-Oriented Programming Java tools XML.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
Ad Hoc Wireless Networks (Infrastructureless networks) An ad hoc network is a collection of wireless mobile host forming a temporary network without the.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
2003/04/24AARON LEE 1 An Efficient K-hop Clustering Routing Scheme for Ad-Hoc Wireless Networks S. F. Hwang, C. R. Dow Journal of the Internet Technology,
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
Ad Hoc Network.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Ad Hoc Multicast Routing
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Wireless Mesh Networks Myungchul Kim
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
UNIT-V Ad-hoc Networks
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Strawman Recharter Nov 12, Basic Problem “The purpose of this working group is to standardize IP routing protocol functionality suitable for wireless.
A New MAC Protocol for Wi-Fi Mesh Networks Tzu-Jane Tsai, Hsueh-Wen Tseng, and Ai-Chun Pang IEEE AINA’06.
Mobile Ad Hoc Network (MANET)
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Ad Hoc Wireless Routing Different from routing in the “wired” world Desirable properties of a wireless routing protocol –Distributed operation –Loop freedom.
Introduction to Mobile Ad hoc Networks (MANETs) Advanced Computer Networks.
Ad Hoc Wireless Routing
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
Ad Hoc Wireless Routing
Mobile ad hoc networking: imperatives and challenges
Lecture 45 Review of Lectures Dr. Ghalib A. Shah
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

1 Mobile ad hoc networking: imperatives and challenges Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu MMLAB, Seongil Han

-2- Contents Introduction Mobile ad hoc network research Medium Access Control Networking issues Applications and middleware Cross layers’ research issues Discussion and conclusions

-3- Introduction Mobile Ad hoc Network (MANET) Sensor network An important part of the 4G architecture Non infrastructure based Spontaneous networking Can be connected to a backbone network Attractive technology

-4- MANET issues Traditional problems of wireless network Channel characteristics Hidden and exposed terminal MANET specifics Autonomous and infrastructure-less Multi-hop routing Dynamically changing network topology Variation in link and node capabilities Energy constrained operation Network scalability

-5- Research area 3 layers and cross layers issues

-6- Medium Access Control Bluetooth De-facto standard For low-cost, short-range radio links Contention-free token-based multi-access Masters and slaves Many applications is developed and being developed. Mobile phone, headset, etc. The scatternet Multi-hop Bluetooth networks, interconnecting several piconets Various formation algorithm

-7- Medium Access Control (cont.) IEEE Infrastructure-based and infrastructure-less Little or no attention was given to Ad hoc mode With TCP, problems get large HiperLAN ETSI has promoted “High Performance Radio Local Area Network” HiperLAN/2 is noticeable

-8- MAC research issues Random access Used by most proposal Collision avoidance and utilization maximization Hidden-terminal and exposed-terminal problem Controlled access More suitable for QoS Handling dynamic change of topology TDMA Time Spread Multiple Access (TSMA)

-9- Networking Considerations Self-organizing, dynamic, energy-constrained Location service Reactive and proactive Routing and forwarding algorithms Unicast, geocast, multicast, broadcast Redesign of Transport layer mechanisms Mainly TCP issues

-10- Routing Unicast Proactive routing protocols Table-driven, periodic and event-driven updates DSDV, CGSR, WRP, OLSR, TBRPF, FSR Reactive routing protocols On demand, route discovery DSR, AODV, TORA, ABR, SSR, ZRP Multicast Tree based : AMRoute, MAODV, AMRIS Mesh based : CAMP, ODMRP

-11- Routing (cont.) Location aware routing Greedy forwarding, directed flooding, hierarchical routing Clustering Clusterhead Inter-cluster, intra-cluster communication Cluster bottleneck problem

-12- TCP issues Impact of mobility Route failure Packet loss and increased delay Exacerbate unfairness Nodes’ interaction at MAC Impact of TCP congestion window size Small congestion windows is good New mechanisms Explicit Link Failure Notification (ELFN) Ad hoc TCP (ATCP) Link RED

-13- Applications and middleware Applications Tactical, sensor, emergency service, commercial environment, home and enterprie networking, educational application, entertainment, location aware services Middleware Provide service abstraction Efficiency is open issue Service discovery and location QoS-Aware resource discovery

-14- Cross layers’ research issues Energy conservation Local strategy : power saving mode Global strategy : maximize the network lifetime Security Attacks and protections Cooperation Simulation and performance evaluation Quality of Service

-15- Security Attacks Passive attacks Eavesdropping Active attacks Impersonation, Denial of Service, Disclosure attack Security mechanism Preventive and detective Key-based, Intrusion detection Wired Equivalent Privacy Secure routing Wormhole attack

-16- Discussion and conclusions The center of evolution Toward 4G wireless technology Flexibility, easy maintenance, infrastructure-less, auto-configuration, self-administration capability, cost advantage IETF MANET WG “killer application(s)” has yet emerged. Many open research issues