2. Wireless Network
Wireless Network uses electromagnetic radio waves for
communication(Exchange Information).
Spectrum Allocation Methods:
Comparative Bidding
Lottery System
Auctioning Method
Radio Propagation Mechanism :
Reflection
Diffraction
Scattering
3. Radio Propagation Mechanisms
Reflection: When a propagation radio waves hits an object which is
very large compared to its wavelength (such as surface of the earth
or a tall building) the wave gets reflected by that object.
Diffraction: When a wave is hits on an impenetrable object, the
wave bends at the edge of the object so the propagating in
different directions.
Scattering: When a wave travels through a medium which contains
many object with dimension small when compared to its
wavelength scattering is occurred.
4. Characteristics of Wireless
Channel
Path Loss: Path loss is the ratio of the power of the transmitted
signal to the power of the same signal received by the receiver on a
given path.
Fading: Fading refers to the fluctuation in signal strength when
receive at the receiver. Such as fast fading and Small fading.
Interference: Interference is the attack in wireless communication
to jam the network by creating a wide spectrum noise.
Doppler shift: Doppler shift is defined as the change/shift in the
frequency of the received signal when transmitter and receiver are
mobile with respect to each other.
5. Cellular Network
Cellular Networks are the infrastructure based or dependent
network.
Path Setup b/w two nodes such as C to E is completed through the
base station.
Cellular Network have single hope wireless link.
Cellular Network used centralized routing protocol.
Cellular Network have guaranteed bandwidth.
Circuit switchingTechnique is used in Cellular Network.
Cellular Networks are High Cost andTime Deployment.
Easier to achieve time synchronization.
High cost of Network and Maintenance.
Application areas are civilian and commercial sectors.
6. Ad Hoc Network
Ad hoc n/w is the category of wireless network that utilize multi-hop
radio relaying capable of operating without any fixed infrastructure.
Ad hoc is also called infrastructure less network.
Path setup b/w two nodes is completed trough the intermediate
mobile node.
Wireless mesh network and wireless sensor network are the
example of ad hoc network.
Routing and resource management is done in distributed manner.
Packet switching technique is used in ad hoc.
Ad hoc is Cost effective network.
Time synchronization is difficult and consume bandwidth.
Application domains are emergency search, rescue operations and
collaborative computing.
7. Application of Ad Hoc Wireless
Network
Military Application: .
Useful in communication among a group of soldiers for tactical operations.
For example leader of the soldiers want to give any order to all soldiers OR set of selected persons
are involved in the operation.
Collaborative and Distributed Computing:
To give information in a group of peoples using conference.
For example group of researchers want to share their research among group of peoples.
Sharing of a file among network.
Emergency Operations:
Ad hoc is used in search and rescue operations, crowd control and commando operations.
Due to the natural disaster like earthquake conventional communication facilities are destroyed
in that case ad hoc network is used for rescue activities.
8. Wireless Mesh Network
Wireless Mesh Network are the ad hoc wireless network that
provide the many alternate path from source to destination when
existing paths fails.
Mesh Networks are used in residential zones, business zones,
important civilian zones and university campus.
Mesh Network support high data rate, quick and low cost
deployment, enhanced services, high scalability and high
availability.
9. Wireless Sensor Network
A sensor network is a collection of large number of sensor nodes
that are deployed in particular region.
As we know that the sensor are the tiny devices that have
capability to sensing parameter, processing the data and
communicate over the network.
A sensing can be periodic or sporadic.
Military, Health Care, Home security and environmental
monitoring are the application areas of wireless sensor network.
10. Issues in Wireless Sensor Network
Mobility of the Nodes.
Size of the network.
Density of the deployment.
Power Constraint.
Data/ Information fusion.
Traffic Distribution.
11. Classification of Wireless Sensor
Network
Architecture:
Layered-UNPF(Unified network protocol framework)
Clustered-LEACH (Low energy adaptive clustering hierarchy)
Data handling:
Data Dissemination.
Data Gathering.
Medium Access Control:
SMACS(Self organizing MAC for sensor network)
HybridTDMA/FDMA
CSMA
Location Discovery:
Indoor Localization
Multi Lateration.
Miscellaneous:
Quality of N/W Coverage
- Breach path
-Maximum Support Path
12. Classification of Wireless Sensor
Network(Contd.)
Security
- LEAP
- INSENS
- SPINS
RealTime Communication
- Speed
- RAP
Other solutions
- Energy efficient H/W design
- Synchronization.
- Transport Layer.
Data Dissemination(Data handling)
Flooding, Gossiping, Roumor Routing, SAR, Directed Diffusion, SPIN, Cost
field approach, geographic hash table, SMECN.
Data Gathering (Data Handling)
Direct Transmission, PEGASIS, Binary scheme, Chain based tree level
scheme.
13. Hybrid Wireless Network
Hybrid wireless networks are the combination of multi-hop
cellular network and integrated cellular ad hoc relay network.
Hybrid network have the higher capacity than the cellular
network.
Increased flexibility and reliability in routing.
Better coverage and connectivity in holes.
14. Classification of Hybrid Wireless
Network
System with Host cum relay station
Single Mode System
MCM(Multi hop cellular Network)
MWLAN (Multi hop wireless LAN)
SMCN(Single interface multi hop cellular network)
Multi Mode System
High Mobility System
- HWN (Hybrid wireless network)
- MuPAC (Multi power architecture for cellular network)
- MADF(Mobile assisted data forwarding)
- A-GSM(Ad hoc GSM)
- UCAN(Unified cellular and ad hoc network)
Limited Mobility System
-TWiLL(Throughput enhanced wireless in local loop architecture)
- DWiLL(Directional throughput enhanced wireless in local loop)
System with Dedicated relay station
Single Mode System
SOPRANO(Self organizing packet radio ad hoc network with overlay )
Multi Mode System
iCAR (Integrated cellular and ad hoc relaying system)
15. Issues and challenges in Ad-Hoc
wireless Network
Medium Access Scheme
Routing
Multicasting
Transport Layer Protocol
Pricing Scheme
Quality of Service Provisioning
Self Organization
Security
Energy Management
Addressing and Service Discovery
Scalability
Deployment Consideration
16. Medium Access Control
MAC protocol in ad hoc wireless network is distributed and shared
channel for the transmission of packets. Design issues of MAC for
Ad Hoc wireless Network:
Distributed Operation: The design of MAC protocol should be fully
distributed with minimum control overhead.
Synchronization: MAC protocol should be synchronized with time.
Hidden Terminal: The presence of hidden terminal reduced the throughput
of MAC protocol. Hence MAC protocol should be able to handle the effects of
hidden terminal.
Exposed Terminal: To improve the efficiency of MAC protocol the exposed
nodes should be allowed to transmit without causing collision to the on going
data transfer.
Throughput: MAC protocol should maximize the throughput with
minimizing the occurrence of collision, maximizing channel utilization and
minimizing control overhead.
17. Medium Access Control(Contd.)
Access Delay: Access delay refers to the average delay that any packet
experiences to get transmitted. The MAC protocol should attempt to
minimize the delay.
Fairness: Fairness refers to the ability of the MAC protocol to provide equal
bandwidth to all competing nodes.
Some Other Issues of MAC
Real time traffic support
Resource reservation
Ability to measure resource availability
Capability for power control
Adaptive rate control
Use of directional antennas
18. Classification of Medium Access
Control
Contention Based Protocol
Sender Initiated Protocols
Receiver Initiated Protocols
Contention Based Protocols with Reservation mechanism
Synchronous Protocol
Asynchronous Protocols
Contention Based Protocols with Scheduling mechanism
DPS(Distributed priority scheduling)
DWOP(Distributed wireless ordering protocol)
DLPS(Distributed Laxity Based priority scheduling)
Other MAC Protocols
Protocol using directional antennas
MMAC(Multichannel MAC)
MCAMA(Multichannel CSMA MAC protocol)
PCM(Power control MAC protocol)
RBAR(Receiver based auto rate protocol)
19. Sender & Receiver Initiated Protocol
Single Channel protocol
MACAW(Multiple access collision avoidance for wireless LAN’s)
FAMA(Floor acquisition multiple access protocols)
Multi Channel protocol
BTMAC(Busy tone MAC)
DBTMAC( Dual Busy tone MAC)
ICAMA(Interleaved CSMA)
Receiver Initiated Protocol
RI-BTMAC
MACA-BI( MACA by invitation)
MARCH(Media access with reduced handshake)
20. Synchronous and Asynchronous Protocol
Synchronous Protocols
DPRMA(Distributed packet reservation multiple access protocol)
CATA(Collision avoidance time allocation protocol)
HRMA(Hop reservation multiple access protocol)
SRMA/PA(Soft reservation multiple access with priority assignment)
FPRP(Five phase reservation protocol)
Asynchronous Protocols
MACA/PR(MACA with piggy backed reservation)
RTMAC(Real time medium access control protocol)
21. Routing in Ad-Hoc Network
Routing refers to the exchanging the route information and finding
feasible and appropriate path to destination based on the criteria
such as minimum power required, hop length and utilizing
minimum bandwidth. The major challenges of routing protocol
are:
Mobility: Due to the mobility frequent path breaks, packet collision,
transient loops are occur in the network. Routing protocol should be able to
solve all these problems in efficient manner.
Bandwidth Constraint: Bandwidth is equally distributed or shared between
all the nodes in the broadcast region.
Location Dependent Contention: A good routing protocol should have built
in mechanism for distributing the network load uniformly across the network
which is dependent on the number of nodes in the network.
Other Resource Constraints: Routing protocol should be able to handle
issues related with computing power, battery power and buffer storage.
22. Requirement of Routing in Ad-Hoc
Network
Minimum route acquisition delay
Quick route reconfiguration
Loop free routing
Distributed routing approach
Minimum control overhead
Scalability
Provisioning of Quality of Services(QoS)
Security and Privacy
All these requirement are discussed in upcoming slides.
23. Requirement of Routing in Ad-Hoc
Network
Minimum route acquisition delay: Delay is dependent on the size of the network
and network load.
Quick Route Reconfiguration: If any change is occur in the network due to the path
breaks and packet loss, routing protocol be able to quick reconfigure the network.
Loop Free Routing: Looping waste the network bandwidth , routing protocol
should be able to detect such transient routing loops and take corrective actions.
Distributed Routing Approach: Ad hoc wireless network uses distributed routing
approach between mobile nodes.
Minimum control overhead: Control Packet exchanging is done with minimum
control overhead as possible.
Scalability: Scalability is the ability of a routing protocol to scal well or perform
efficiently in a network with a large number of nodes.
Provisioning of QoS: Routing protocol should be able to provide certain level of
Quality of Services. QoS Parameter are:
Bandwidth, Delay, Jitter, Packet Delivery Ratio, Throughput.
Security and Privacy: The routing protocol should be able to handle Denial-of-
Service attacks.
24. Classification of Routing Protocols
of Ad-Hoc Network
Based on routing information update mechanism
Table Driven(Proactive)
On Demand(Reactive)
Hybrid
Based on the use of temporal information for routing
Path Selection Using Path History
Path Selection Using Prediction
Based OnTopology Information
Flat Routing
Hierarchical Routing
Miscellaneous Classification Based on Utilization of specific
resources:
Power aware routing
Routing Using Geographical information
Routing with efficient flooding
25. Routing Protocols of Ad-Hoc Network
Table Driven routing(Proactive):
DSDV(Destination sequenced distance vector routing protocol)
WRP(Wireless Routing Protocol)
CGSR(Cluster head gateway switch routing protocol)
STAR(Source Tree Adaptive routing protocol)
OLSR(Optimized link State routing)
FSR(Fisheye State Routing)
HSR(Hierarchical State Routing
On Demand Routing:
DSR(Dynamic Source Routing)
AODV(Adhoc on demand distance vector routing)
ABR(Associativity based routing)
TORA(Temporal Ordered routing)
LAR(Location aided routing)
SSA(Signal stability based routing
FORP(Flow oriented routing protocol)
PLBR(Preffered link based routing)
26. Routing Protocols of Ad-Hoc
Network(Contd.)
Hybrid
CEDAR(Core Extraction Distributed Ad-Hoc routing)
ZRP(Zone routing protocol)
ZHLS(Zone based hierarchical link state routing protocol)
Hierarchical routing Protocol
HSR(Hierarchical State Routing Protocol)
FSR(Fisheye state routing protocol)
Routing protocol with Efficient Flooding Mechanism
PLBR(Preffered Link based routing protocol)
OLSR(Optimized link state protocol)
27. Multicasting
Multicasting plays an important role in application of Ad-Hoc
wireless network , namely emergency search , rescue
operation and military communication.
Design Issues of Multicast Routing Protocol:
Robustness
Efficiency
Control Overhead
Quality of Service(QoS)
Efficient Group Management
Scalability
Security
28. Classification of Ad Hoc Multicasting
Routing Protocol
Application Independent/Generic Multicast Protocol
Nature of MulticastTopology
Tree Based
Mesh Based
InitializationApproach
Source Initiated
Receiver Initiated
Topology MaintenanceApproach
Soft State
Hard State
Application Dependent Multicast Routing Protocol
RBM(Role Based Multicast)
CBM(Content Based Multicast)
LBM( Location Based Multicast)
29. Tree Based Multicasting Routing
Protocol
SourceTree Based
BEMRP(Bandwidth Efficient Multicast routing protocol)
MZRP(Multicast routing protocol based on zone routing)
MCEDAR(MulticastCore extraction Distributed Ad-Hoc Routing)
ABAM(Assoicativity based Adhoc multicast routing)
DDM(Diffrential destination multicast routing protocol)
WBM(Weight based multicast protocol
PLBM(Preffered link based multicast protocol)
SharedTree Based
MAODV(MulticastAd hoc on demand distance vector routing protocol)
AMRIS(Ad hoc multicast routing protocol utilizing increasing ID numbers.
AMRoute(Ad hoc multicast routing protocol)
31. Transport Layer Protocol
The main objective of transport layer protocol is establish and
maintain end-to-end connection , reliable end-to-end delivery of
packets, flow control, and congestion control.
Classification ofTransport Layer Protocol for Adhoc Network:
TCO over Adhoc wireless network
Split approach
End –to-End approach
TCP-ELFN(TCP with explicit link failure notification)
TCP-F(Feedback based TCP)
TCP-BUS(TCP with buffering capacity and sequenced information)
OtherTransport Layer protocols:
ACTP( Application controlled transport protocol)
ATP(Ad Hoc transport protocol)
32. Quality of Service Provisioning
QoS is the performance level of services offered by service
provider or a network to the user.
QoS would be measure on per flow, per link, per node basis. QoS
have following important terms:
QoS Parameters
Bandwidth, Delay, Security, Reliability,Throughput, Packet delivery ratio.
QoS Aware Routing: QoS aware routing means routing with QoS
parameters.
QoS Framework: A framework for a QoS is a complete system that attempts
to provide promised services to each user or application. The QoS service
model is the important component of QoS framework which describe how
services are served to the user.
33. Classification of Quality of Service
Based on interaction b/w routing protocol and QoS Provisioning
Mechanism
Coupled
Decoupled
Based on interaction b/w network and MAC Layers
Independent
Dependent
Based on routing information update mechanism emloyed
On Demand
Table Driven
Hybrid
34. Quality of Service Routing Protocols
TBP(Ticket Based QoS Routing)
PLBQR(Predictive Location based QoS Routing Protocol)
TDR(Trigger based Distributed QoS Routing Protocol)
QoSAODV (QoS enabled Ad hoc on demand distance vector
routing protocol)
BR(Bandwidth Routing protocol)
OQR(On Demand QoS Routing protocol)
OLMQR(On Demand link state multipath QoS routing
protocol)
AQR(Asynchronous QoS Routing)
35. Self Organization
Self organization is the important property of Ad hoc wireless
network in which organizing and maintaining the network by itself.
Activities of self organization in Ad-Hoc wireless networks are :
Neighbor Discovery: In neighbor discovery phase every node in
the network gather information about its neighbor and maintain
this information in appropriate data structure.
Topology Organization: If any change is occur in the network
topology due the mobility or failure of nodes this is
automatically organized.
Topology Re-Organization: Means Recovery from the major
topological changes in the network.
36. Security in Ad hoc Wireless
Network
Security is important in Ad hoc wireless network especially in
military application. There are two types of attacks in Ad hoc
Wireless network:
Passive Attack(Don’t distrusts operation of the N/W)
Active Attack(Disrupts the operation of the network)
37. Major Security Threats in Ad hoc
Wireless Network
Denial of Service: Due to this attack network resources are unavailable to
other nodes by consuming bandwidth or overloading the system.
Resource Consumption: Resource consumption is done by energy
depletion battery power of nodes using heavy traffic and buffer overflow. In case
of buffer overflow attack filling the routing table with unwanted entries or
packet data.
Host Impersonation: A fake node act as a actual node and respond as a
actual or original node and create wrong entries in routing table.
Information Discloser: A compromised node can act as a informer by
disclose confidential information to unauthorized nodes.
Interference: A common attach in defense application is to jam the wireless
communication by creating a wide spectrum noise.
38. Addressing and Service Discovery
Every node which is participated in communication have its own
unique global address.
Auto configuration technique is used to allocate the addresses to
the nodes.
Service Discovery protocols are used in authentication , billing
and privacy services.
39. Energy Management
Energy management is the process of managing energy resources
for improving the lifetime of the network.
Energy management is deals with managing energy resources by
means of controlling the battery discharge, adjusting the
transmission power and scheduling of power sources.
Energy Management is classified into :
Battery Energy Management: Battery energy management is used to
improve the battery lifetime with its chemical properties.
Processor Power Management
Clock Speed
No. of instruction per unit time
Device Power Management
40. Battery Management Schemes
Device Dependent Schemes
Modeling and shipping of battery discharge patterns.
Battery Scheduling
Data link layer
Lazy packet Scheduling
BAMAC(Battery Aware MAC Protocol)
Network Layer
Traffic Shaping
BEE(Battery Energy efficient routing)
Routing based on battery status
41. Transmission Power Management Schemes
Data Link Layer
Dynamic PowerAdjustment
Distributed topology control
Distributed power control loop
Centralized topology control
Network Layer
COMPOW(Common Power Protocol)
Globalized power aware routing
Localized power aware routing
Determination of critical transmission range
Higher Layer
Congestion control and transmission policies atTCP/IP layer
OS/Middilware approach
42. System Power Management Schemes
Processor Power Management schemes
Power Saving Modes
PAMAS
Device Management Schemes
Low power design of Hardware
43. Recent Advances in Wireless Network
UltraWide Band Radio Communication
Wireless Fidelity System (Wi-Fi)
Optical Wireless Networks
The Multimode 802.11-IEEE 802.11 a/b/g
The Meghdoot architecture
44. Conclusion:
In this presentation discussed about Ad Hoc wireless network
from ground level. In this journey I cover:
The comparative study of cellular network and ad hoc Network
Applications areas of Ad hoc wireless network
Wireless Mesh Network
Wireless Sensor Network
Hybrid Wireless Network
Medium Access Scheme of Ad hocWireless Network
Routing inAd hoc wireless network
Multicasting in Ad hoc wireless network
Transport Layer protocols of Ad hoc wireless network
Pricing Scheme of Ad hoc wireless network
Quality of Service of Ad hoc wireless network
Self Organization
Security
Energy Management inAd hoc wireless network
Recent Advances inWireless Networks
45. Future Work in Ad-Hoc Network
Routing: We design a routing protocols that works best among all mobility
ranges. That means, how can we do a routing protocol that can do well in
stationary network, moderately mobile networks, and highly mobile networks?
Multicasting: We suggest a unified protocol for multicasting and uni-casting
that can offer end-to-end reliability without having high control overhead. Can
we design a stateless multicast routing protocol? How do we scale multicasting
to a very large network?
MAC Protocols: We design a MAC protocols for simultaneous communication
among the nodes in a neighborhood.
We can design a MAC protocols for a full-duplex radio interface?
We can suggest a MAC protocol for effective use of spatial multiplexing Vs spatial diversity
tradeoffs in a MIMO system.
We can design a MAC for UWB ad hoc networks? What kind of MAC works best in very high
speed (aerial ad hoc networks) MAC protocols?
46. Future Work in Ad-Hoc Network
Energy Management: There are many open problems in this area too. Low
power operation of nodes is still a major problem. Is it possible to operate with
minimal energy spending for certain idle time slots. Is it possible to find out an
energy aware cross-layer protocol design? How far we can save energy without
affecting throughput?
Security: There are many open problems in security area in ad hoc networks.
There exists many solutions. However, it has been found that most of them are
either not realizable or inadequate.
In every area, we have open problems that can be worked on.Of all the above
areas, the most challenging areas are energy management and security.You
may choose an area where you will be most productive.