Presentation is loading. Please wait.

Presentation is loading. Please wait.

Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.

Similar presentations

Presentation on theme: "Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions."— Presentation transcript:

1 Mobile Routing protocols MANET Lecture: 4

2 DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions and –short transaction. Going through a monolithic document page by page can be considered as a session-oriented transaction. Going to a particular page directly through an index can be considered as a short transaction.

3 Selection of the transaction mode will depend on the type of device we use. A session may be helpful in case of services offered through computers with large screens and mouse. For devices with limited input/ output like SMS for instance, short transactions may be desired. Let us consider an example of bank balance enquiry over the Internet.

4 In case of Internet banking through desktop computer, the user has to go through the following minimum dialogues: 1.Enter the URL of the bank site. 2. Enter the account number/password and Login into the application. 3. Select the balance enquiry dialogue and see the balance. 4. Logout from the internet banking.

5 The dialogue above is an example of session-oriented transaction. Using short transaction, the same objective can be met through one single dialogue.

6 Ad-hoc Networks 'In Latin, ad hoc literally means 'for this purpose only'. An ad-hoc (or spontaneous) network is a small area network, especially one with wireless or temporary plug-in connections. In these networks some of the devices are part of the network only for the duration of a communication session.

7 An ad-hoc network is also formed when mobile, or portable devices, operate in close proximity of each other or with the rest of the network. When we beam a business card from our PDA (Personal Digital Assistant) to another, or use an IrDA (Infrared Data Association) port to print document from our laptop, we have formed an ad hoc network.

8 The term 'ad hoc' has been applied to networks in which new devices can be quickly added using, for example, Bluetooth or wireless LAN ( x). In these networks devices communicate with the computer and other devices using wireless transmission. Typically based on short-range wireless technology, these networks don't require subscription services or carrier networks.

9 May need to traverse multiple links to reach a destination

10 Mobile Ad Hoc Networks Mobility causes route changes

11 Mobile Ad Hoc Networks Formed by wireless hosts which may be mobile Don’t need a pre-existing infrastructure –ie, don’t need a backbone network, routers, etc. Routes between nodes potentially contain multiple hops

12 Mobile Ad Hoc Networks Why MANET? –Ease, speed of deployment –Decreased dependence on infrastructure –Can use in many scenarios where deployment of a wired network is impractical or impossible –Lots of military applications, but there are others…

13 MANET: Many Applications Personal area networking –cell phone, laptop, ear phone, wrist watch Civilian environments –meeting rooms –sports stadiums –groups of boats, small aircraft (wired REALLY impractical!!) Emergency operations –search-and-rescue –policing and fire fighting Sensor networks –Groups of sensors embedded in the environment or scattered over a target area

14 Many Variations Fully Symmetric Environment –all nodes have identical capabilities and responsibilities Asymmetric Capabilities –transmission ranges and radios may differ –battery life at different nodes may differ –processing capacity may be different at different nodes –speed of movement different Asymmetric Responsibilities –only some nodes may route packets –some nodes may act as leaders of nearby nodes (e.g., “cluster head”)

15 Many Variations Traffic characteristics may differ –bandwidth –timeliness constraints –reliability requirements –unicast / broadcast / multicast / geocast May co-exist (and co-operate) with an infrastructure- based network

16 Many Variations Mobility patterns may be different –people sitting at an airport lounge (little mobility) –taxi cabs (highly mobile) –military movements (mostly clustered?) –personal area network (again, mostly clustered?) Mobility characteristics –speed –predictability direction of movement pattern of movement –uniformity (or lack thereof) of mobility characteristics among different nodes

17 Challenges Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Environmental issues (“chop that tree!!”) Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard) Sensor networks: very resource-constrained!

18 Hidden Terminal Problem Nodes A and C cannot hear each other Transmissions by nodes A and C can collide at node B On collision, both transmissions are lost Nodes A and C are hidden from each other

19 First Issue: Routing Why is Ad hoc Routing Different? Host mobility –link failure/repair due to mobility may have different characteristics than those due to other causes –traditional routing algorithms assume relatively stable network topology, few router failures Rate of link failure/repair may be high when nodes move fast New performance criteria may be used –route stability despite mobility –energy consumption

20 Routing Protocols Proactive protocols –Determine routes independent of traffic pattern –Traditional routing protocols for wired networks are proactive Proactive Approach (Table Driven): –In this approach route calculation is a consistent process. –Routing tables are maintained at every node. –Every node exchange routing information timely with its neighbors. –This approach uses large bandwidth to maintain unused route.

21 Reactive protocols –Discover/maintain routes only if needed Reactive Approach (On Demand): –The reactive protocols in contrast create routes, when it requires. –Reactive protocols do not send periodic updates. –Each node send control message to discover a route between source and destination, only when it is required. –In this process route discovery takes a long time.

22 Trade-Off: Proactive vs. Reactive Latency of route discovery –Proactive protocols may have lower latency since routes are maintained at all times –Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y Overhead of route discovery/maintenance –Reactive protocols may have lower overhead since routes are determined only if needed –Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach achieves a better tradeoff depends on the traffic and mobility patterns

Download ppt "Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions."

Similar presentations

Ads by Google