Ad Hoc Wireless Networks (Infrastructureless networks) An ad hoc network is a collection of wireless mobile host forming a temporary network without the.

Slides:



Advertisements
Similar presentations
Problems in Ad Hoc Channel Access
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Multicasting in Mobile Ad-Hoc Networks (MANET)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Progress Report Wireless Routing By Edward Mulimba.
Ad Hoc Wireless Media Access Protocols Mikko Raatikainen, TiTe 5.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
KING FAHD UNIVIRSITY OF PETROLEUM AND MIERALS ELECTRICAL ENGINEERING DEPARTMENT MAC Protocols in ad hoc networks Rami Bakhsh Mohammed Al-Farsi.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Winter CMPE 155 Week 9. Winter Project 8 Setting up wireless ad hoc network. Designing/implementing application- level neighbor discovery.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Ad Hoc Wireless Routing COS 461: Computer Networks
Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL COT 6930 Ad Hoc Networks (Part II)
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
12/28/2003CNSF Workshop Localized Algorithms and Their Applications in Ad Hoc Wireless Networks Jie Wu Dept. of Computer Science & Engineering Florida.
CIS 725 Wireless networks. Low bandwidth High error rates.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Seminar Algorithms for ad hoc networking: Patrik Floréen Seminar Introduction.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
POSTER TEMPLATE BY: Efficient Counter-Based Flooding for Mobile Ad Hoc Networks S. Al-Humoud, M. Ould Khaoua and L. M. Mackenzie.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Mobile Networking Challenges1 5.6 Mobile Ad Hoc Networks  Ad hoc network does not have any preexisting centralized server nodes to perform packet routing,
ROUTING ALGORITHMS IN AD HOC NETWORKS
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Designing Routing Protocol For Mobile Ad Hoc Networks Navid NIKAEIN Christian BONNET EURECOM Institute Sophia-Antipolis France.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Jie Wu Department of Computer Science and Engineering Florida Atlantic University Boca Raton, FL COT 6930 Ad Hoc Networks (Part II)
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Chapter 6 Multiple Radio Access
MANET: Introduction Reference: “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”; S. Corson and J.
Ad Hoc Network.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Introduction to Ad Hoc Mobile Wireless Networks
Self-stabilizing energy-efficient multicast for MANETs.
Medium Access Control in Wireless networks
UNIT-V Ad-hoc Networks
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Copyright © Wireless Sensor Networks: Zigbee Stack Polly Huang Department of Electrical.
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Ad-Hoc Networks.
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
Ad hoc Routing Protocols
by Saltanat Mashirova & Afshin Mahini
Subject Name: Computer Networks - II Subject Code: 10CS64
Routing in Mobile Ad-hoc Networks
COT 6930 Ad Hoc Networks (Part II)
Vinay Singh Graduate school of Software Dongseo University
Computer Networks: Wireless Networks
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Ad Hoc Wireless Networks (Infrastructureless networks) An ad hoc network is a collection of wireless mobile host forming a temporary network without the aid of any centralized administration or standard support services regularly available on the wide area network to which the hosts may normally be connected (Johnson and Maltz)

What is an Ad Hoc Network? Infrastructure Network (cellular or Hot spot) Ad Hoc, Multihop wireless Network

Ad Hoc Wireless Networks (Infrastructureless networks) Manet (mobile ad hoc networks) Mobile distributed multihop wireless networks Temporary in nature No base station and rapidly deployable Neighborhood awareness Multiple-hop communication Unit disk graph: host connection based on geographical distance

Sample Ad Hoc Networks Sensor networks Indoor wireless applications People-based networks “small world” that are very large graphs that tend to be sparse, clustered, and have a small diameter. “six degree of separation”

Self-organizing: without centralized control Scarce resources: bandwidth and batteries Dynamic network topology Characteristics

Unit Disk Graph Figure 1: A simple ad hoc wireless network of five wireless mobile hosts.

Defense industry (battlefield) Law enforcement Academic institutions (conference and meeting) Personal area networks and Bluetooth Home networking Embedding computing applications Health facilities Disaster recovery (search-and-rescue) Applications

Mobility management Addressing and routing* Location tracking Absolute vs. Relative, GPS Network management Merge and split Resource management Networks resource allocation and energy efficiency QoS management* Dynamic advance reservation and adaptive error control techniques Major Issues

MAC protocols* Contention vs. contention-free Applications and middleware Measurement and experimentation Security* Authentication, encryption, anonymity, and intrusion detection Error control and failure Error correction and retransmission, deployment of back-up systems Major Issues (Cont’d.)

Issues to be Covered Wireless Media Access Protocols (MAC) Ad Hoc Routing Protocols Multicasting and Broadcasting Power Optimization Security

Routing in Ad Hoc Networks Qualitative properties: Distributed operation Loop-freedom Demand-based operation Proactive operation Security Sleep period operation Unidirectional link support

Routing in Ad Hoc Networks Quantitative metrics: End-to-end data throughput and delay Route acquisition time Percentage out-of-order delivery Efficiency

Basic Routing Strategies in Internet Source Routing vs. Distributed Routing Figure 2: A sample source routing Figure 3: A sample distributed routing

Classification Proactive vs. reactive proactive: continuously evaluate network connectivity reactive: invoke a route determination procedure on-demand. Right balance between proactive and reactive Flat vs. hierarchical

Categorization of ad hoc routing protocols Commonly categorized into two groups: Pro-active protocols On-demand protocols AODV DSR TORAFSR LANMAR OLSR On-demand protocols Pro-active protocols Ad hoc routing protocols

Sample Protocols Proactive Protocols Destination sequenced distance vector (DSDV) Reactive Protocols Dynamic source routing (DSR) Ad hoc on-demand distance vector routing (AODV) Temporally ordered routing algorithms (TORA)

Sample Protocols Hybrid: Zone routing Hierarchical Cluster-based Connected-dominating-set-based

Proactive: DSDV Based on Bellman-Ford routing algorithms Enhanced with freedom from loops. Enhanced with differentiation of stale routes from new ones by sequence numbers.

Reactive Three steps Route discovery Data forwarding Route maintenance

DSR There are no periodic routing advertisement messages (thereby reducing network bandwidth overhead). Each host maintains a route cache: source routes that it has learned. If a route is not found from route cache, the source attempts to discover one using route discovery. Route maintenance monitors the correct operation of a route in use.

DSR Routing (Cont’d.) A sample DSR route discovery

AODV Combination of DSR and DSDV Routing table is constructed on demand. The node should respond a request if It is the destination node An intermediate node with a route of a destination sequence number no less than that in the request packet.

TORA For each destination, a DAG is maintained with destination as the sink: Each node has a height metric. A directed link always points to a node with a lower height metric. To send a packet, a host forwards the packet to any neighbor with a lower metric.

Proactive: Data Forwarding Source routing: centralized at the source Distributed routing: decentralized Multiple paths

Broadcast: Blind Flooding Redundant transmission may cause contention and collision

Broadcast Static vs. dynamic Forwarding status determined before or after the broadcast process) Self-pruning vs. neighbor-designating Forwarding status determines by each node itself or by neighbors.

Broadcast Connected-dominating-set-based Only dominating nodes forward the broadcast packet. Cluster-based (independent set) Only clusterheads forward the packet, some gateways (that connect two adjacent clusters) are selected to relay the packet.

Broadcast Dominant pruning (multipoint relays) Select a subset of 1-hop neighbor to cover all 2-hop neighbors

Broadcast A generic rule: Node v has a non-forwarding status if any two neighbors are connected by a path consists of visited nodes and nodes with a higher priorities.

Multicast Shortest path tree: for a particular multicast Core tree: shared tree for all multicast

Multicasting: ODMRP On-demand multicast routing protocol

Multicasting: Multicast AODV

Wireless MAC A MAC (Media Access Protocol) is a set of rules or procedures to allow the efficient use of a shared medium. Contention vs. contention-free Sender-initiated vs. receiver-initiated

Wireless MAC Contention-based ALOHA: no collision avoidance Pure: transmitted at arbitrary time Slotted: transmitted at start of a time slot p-persistent: slotted and transmitted with a probability p

Wireless MAC Carrier Sense Multiple Access (CSMA): listen to determine whether there is activity on the channel Persistent: continuously listens Nonpersistent: waits a random amount of time before re-testing p-persistent: slotted and transmit when idle with a probability of p

Wireless MAC Contention-free protocols Bit-map protocol: each contention period consists of N slots. Binary countdown: use binary station address in bidding. Limited Contention Protocols: Stations are grouped and each group is assigned to a distinct slot.

Wireless MAC RTS-CTS handshake RTS – request to send CTS - clear to send Data transmission RST-CTS: contention Data transmission: contention-free

Wireless MAC Hidden Terminal Problem Two nodes, hidden from one another (out of transmission range), attempt to send information to the same receiving node. Packet collisions. Exposed Node Problem A node is inhibited from transmitting to other nodes on overhearing a packet transmission. Wasted bandwidth.

Wireless MAC RTS-CTS problem 1

Wireless MAC RTS-CST problem 2

Wireless MAC Solution to exposed node problem Use of separate control and data Use of directional antennas Wireless MAC do not use collision detection

Wireless MAC Sender-initiated MACA (Multiple Access with Collision Avoidance) (RTS-CTS-data) MACAW (MACA with Acknowledgement) Receiver-initiated MACA-BI (By Invitation)

Wireless MAC Dual Busy Tone Multiple Access (DBTMA) RTS Receive busy tone + CTS Transmit busy tone + Data

Wireless MAC Media Access with Reduced Handshake (MARCH)

Wireless MAC Power-Aware Multi-Access Protocol with Signaling (PAMAS) Temp. reducing transmitter range Turn off