This document discusses the origins and development of ad hoc networks. It describes how packet radio networks (PRNETs) in the 1970s, developed by DARPA, were the first generation of ad hoc networks. PRNETs used multi-hop routing between mobile radio terminals and packet radios to communicate without fixed infrastructure. The document outlines the key components and routing techniques of PRNETs, including point-to-point and broadcast routing. It also discusses how subsequent generations in the 1980s-1990s focused on improving performance, scalability, and developing commercial applications like Bluetooth.
Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.
The most common wireless technologies use radio
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION Soumen Santra
SPACE DIVISION MULTIPLE ACCESS (SDMA)
Definition : The communication channel encountered by this array of antennas.
advanced antenna technology.
Smart Antenna
Uplink Transmission
Downlink Transmission
Block Diagram
Features
Beam Frequency Reuse
Advantages
Disadvantages
Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor.
The most common wireless technologies use radio
SPACE DIVISION MULTIPLE ACCESS (SDMA) SATELLITE COMMUNICATION Soumen Santra
SPACE DIVISION MULTIPLE ACCESS (SDMA)
Definition : The communication channel encountered by this array of antennas.
advanced antenna technology.
Smart Antenna
Uplink Transmission
Downlink Transmission
Block Diagram
Features
Beam Frequency Reuse
Advantages
Disadvantages
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc N...Editor IJMTER
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Investigating VANET for Unwavering Ways with Flawless Connectivitypaperpublications3
Abstract: This paper is investigating the VANET techniques by understanding the various papers published by the authors in IEEE transactions. In this paper the new technique is explored where no of the routing method is applied for connecting the nodes. But using the other information such as speed ,density, time, range and calculating the time required by the vehicle on the road of interests we can link them full time period of their run. We can use the standard frequency bands widths allocated by the Governments.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. Objectives of the Chapter
Introduction PRNETs
Architecture of PRNETs
Components of Packet Radios
Routing in PRNETs
Route Calculation
PacingTechniques
MediaAccess in PRNETs
FlowAcknowledgments in PRNETs
Technical Challenges
2
3. Ad hoc networks
Temporary network composed of mobile nodes without preexisting
communication infrastructure, such as Access Point (AP) and Base Station
(BS).
Each node plays the role of router for multi-hop routing.
Self-organizing network without infrastructure networks
Started from DARPA PRNet in 1970
Cooperative nodes (wireless)
Each node decode-and-forward packets for other nodes
Multi-hop packet forwarding through wireless links
Proactive/reactive/hybrid routing protocols
Most works based on CSMA/CA to solve the interference problem
IEEE 802.11 MAC
3 Chandra Prakash, LPU
4. History
Principle behind ad hc networking ::: Multi hop relaying
(In 522-486 B.C) King of Persia –use line of shouting
men positioned on tall structures or heights.
Video
4
6. Origin of Ad-Hoc Networks
Generic View of mobile ad hoc networks
First generation
They were used for different military scenarios.
Packet radio networks was the first ad-hoc network system
Second generation from 1980s’ to the mid 1990’s
Main aim were the same as for the first generation ad-hoc networks
system i.e.Aiding combat/Battle operations.
Second generation developments focused on the further advancement of
the previously build ad-hoc network structure.
Some important developments: Global mobile information
Systems, Near term Digital Radio (NTDR)
Third generation ad-hoc network systems
known as commercial ad-hoc network systems.
developments , Bluetooth – ad-hoc sensor networks etc6
7. First generation ad-hoc network
systems
The merits of having an infrastructure-less network were discovered in
the 1970s.
At that time, computers were bulky and so were radio transceivers.
Defence Advanced Research Projects Agency (DARPA) had a
project known as packet radio, where several wireless terminals could
communicate with one another on a battlefield.
DARPA initiated research on the feasibility of using packet-switched
radio communications to provide reliable computer communications.
Came up with packet radio network 1973-1987
Packet radio was a technology that extended the concept of packet
switching (which evolved from point-to-point communication
networks) to the domain of broadcast radio networks.
7
8. Cont…
During the 1970s, the ALOHA project at the University of Hawaii
demonstrated the feasibility of using the broadcasting property of radios
to send/receive data packets in a single radio hop system.
ALOHA net utilized single-hop wireless packet switching and a multiple
access solution for sharing a single channel.
TheALOHA project later led to the development of a multi-hop
multiple-access packet radio network (PRNET).
Initial attempt had a centralized control.
UnlikeALOHA, PRNET permits multi-hop communications over a
wide geographical area.
The DARPA PRNET has evolved through the years (1973-1987) to be a
robust, reliable, operational experimental network.
The DARPA PRNET projects includes network devices, routing protocols and
protocols for automatic distributed network management.
8
9. Features of PRNET
One of the most attractive features of PRNET is rapid
deployment.
Once installed, the system is self-initializing and self-organizing.
Network nodes should be able to discover radio connectivity
among neighboring nodes and organize routing strategies based
on this connectivity.
PRNETs are expected to require no system administration and
can be left unattended.
9
10. First generation ad-hoc network
systems
Packet radio network components
Firmware
Firmware can be loaded into a Packet Radio(PR) either locally (via serial
interface) or from the PRNET.
The firmware in each PR gathers information about bidirectional link quality,
nodal capacity and route characteristics and provides this knowledge to
debugging and monitoring
Communication
Use radio frequency technology to transmit and receive data
The implemented packet radios support omni-directional, spread spectrum,
half-duplex transmission and reception at 400kbit/s and 100kbit/s rates
They implement the physical, data link and network layer (OSI model).
10
11. Second generations ad-hoc network
systems
Started in 1980’s -1993
Main Aim
Providing packet switched networking to the mobile battlefield elements in
infrastructure- less environments.
Beneficial in improving
Radios performance by making them smaller, cheaper and power-thrifty.
Scalability of algorithms
Resilience to the electronic attacks.
Survivable radio network (SURAN)– aimed at providing adhoc n/w
with small, low cost, low power, devices with efficient protocols.
Internet EngineeringTask Force (IETF) – introduce MANET term
-Work to standardized the protocol and functional specifications of ad hoc network.11
12. Second generations ad-hoc network
systems
GloMo (Global Mobile Information Systems) project
Aim:to make the mobile environment user friendly connectivity and access
to services for wireless mobile users.
Includes self organizing/self healing networks;both flat and hierarchical
multihop routing algorithms
12
13. Second generations ad-hoc network
systems
NearTerm Digital Radio Systems
The NTDR system is an experimental, mobile packet data radio
network.
The NTDR provides a self-organizing, self-healing, network
capability. Radio network management is provided by a Network
ManagementTerminal.
The primary purpose of the NTDR is to provide data transport for
the Army Battle Command System automated systems to units at
brigade and below
Lessons learned from this experimental fielding provide a portion of
the technical baseline for radios being designed for future fielding13
14. Third generation mobile ad hoc
network system
1990’s- onwards
known as commercial ad-hoc network systems.
Invention of notebook computers and viable communication devices
based on radio waves concept of commercial ad-hoc networks has
arrived.
Idea of collection of mobile nodes were purposed in research
conferences
two main and important applications of mobile ad-hoc networks
Bluetooth – proposed by Ericsson in 1994
Ad-hoc sensors
14
15. Network Architecture of PRNETs
15
PRNET consists of several
Mobile radio repeaters:
The role of a repeater is to relay packets from one repeater to another, until
the packets eventually reach the destination host.
Wireless terminals
Dedicated Mobile stations :
The mobile station is present to derive routes from one host to another.
has knowledge of the overall network connectivity,that is,the network topology.
As network conditions change (terminal movement, repeater failures or
recovery, changes in hop reliability, and network congestion state), routes are
dynamically reassigned by the station to satisfy minimum delay criteria.
Hosts and terminals attached to the PRNET are unaware of the station's
assignment and reassignment of communication routes.
16. Network Architecture of PRNETs
16
Mobile radio repeaters:
Wireless terminals
Mobile stations
17. Components of Packet Radios
User computer -> mobile device/terminal
User computer is interfaced to a radio via the terminal-network controller (TNC).
Radio andTNC logic ->packet radio
17
18. Components of Packet Radios
18
The packet radio, therefore, implements functions related to
protocol layers 1, 2, and 3.
It is an intermediate system (IS) in the ISO context.
A packet radio network (PRN) is a collection of packet radios,
with some packet radios connected to user devices while
others are not.
19. Routing in PRNETs
1. Point-to-Point Routing
PRNETs support point-to-point communications through point-to-point routing.
A packet originating at one part of the network moves through a series of one or
more repeaters until it eventually reaches the final destination.
Point-to-point route is an ordered set of repeater addresses
Specific routes are derived prior to data transmission
determined by the mobile station:
Mobile station is the only element in the network that has knowledge of
the overall network connectivity (the network topology).
Mobile station computes the best point-to-point route and distributes this information
to all repeaters in the route or directly to the source packet radio.
This scheme was found to be suitable for slow moving user terminals.
19
20. Routing in PRNETs
2. Broadcast Routing
Radio technology provides very good broadcasting properties.
Broadcasting information to all radios in a network is equivalent to
flooding.
To ensure that each packet radio only forwards a packet once, each
repeater has to maintain a list of packet identifiers for previously
broadcast packets that it recently had received and forwarded.
In broadcast routing, a packet radiates away from the source packet
radio in a wave-like fashion, i.e the packet ripples away from the
source.
20
21. Routing in PRNETs
2. Broadcast Routing (cont…)
Broadcasting is very robust
All other nodes in the network must participate in the transmission and
reception of packets even that is not intended for them.
When broadcast routing is used for point-to-point communication, the
destination host address is included in each data packet.
Routing decisions are not centralized:
No specific routes are derived prior to data transmission
Packets will eventually reach the destination host if the network is not
partitioned. For fast moving user terminals, broadcast routing was
found to be useful as it avoids the need to process rapidly changing
routes.
21
22. Packet Forwarding
1. Connectionless approach :
Requires some background operation to maintain up-to-date network
topology and link information in each node.
As network topology changes, the background routing traffic can be
substantial.
Associated with broadcast routing, where each packet carries sufficient
routing information for it to arrive at the destination.
2. Connection-oriented packet :
An Explicit route establishment phase is required before data traffic can
be transported.
Associated with point-to-point routing, where each node in a route
has a lookup table for forwarding incoming packets to the respective
outgoing links.
If a topology changes, a route re-establishment phase is needed.22
23. Impact of Mobility
In a PRNET, all elements of the network can be mobile.
Assumption : User terminals normally move slowly enough such that the assigned
point-to-point routes are valid for at least a few seconds before another route must
be chosen.
If User rate of mobility increased point-to-point routing may not
be practical .Why ???
Because most of the time will be spent in computing alternate point-to-point
routes instead of forwarding the packets to their intended destinations.
Solution ???
Broadcast routing is less affected by user mobility
the packets do not follow a specific point-to-point route.
Every node is supposed to relay the packets to the destination host.
No need to cope with rapidly changing routes in broadcast routing under
conditions of rapid host mobility.
broadcasting is power inefficient.23
24. Route Calculation
Each packet radio gathers and maintains information about current
network topology so that it can make independent decisions about
how to route packets toward their destinations.
Each node maintains the following tables:
1. Neighbor table
2. Tier table
3. Device table
24
25. Neighbor Table
Broadcast a Packet Radio Organization Packet (PROP)
every 7.5 seconds
Announcing its existence and information about the
network topology from its own perspective at time.
Neighbors that hear a PROP make entry in their neighbor tables
When nodes hears a PROP, it updates its neighbor table
Transmitted data packets also used to build neighbor table
Tracks bidirectional quality of links with neighbors
(retransmission counts)
25
26. Neighbor Table
Neighboring PR Link Quality
Node 1 3/9
Node 5 4/5
Node 7 6/9
Node 9 5/8
26
Link Quality =
number of packets correctly received from the transmitting packet radio
during a PROP
number of packets that the transmitting packet radio actually transmitted at
that same interval
27. Tier Table
Routing in PRNETs relies on each packet radio maintaining
adequate knowledge of the best packet radio to forward
packets to for every prospective destination.
The tier information ripples outward from each packet radio at an
average rate of 3.75 seconds per hop and eventually reaches all
packet radios.
Every packet radio knows its distance in tiers (or radio hops) from
itself to every prospective destination and the next-hop packet
radio.
Similar to the earlyARPANET routing algorithm which is based
on the classical Bellman-Ford routing.
27
28. Tier Table
Every packet radio knows the “best” next node on the route from it to a given
destination node
Tier 1 = 1 hop neighbors
These neighbors send out their PROPs indicating that they are one hop from
the originator
At next step, receivers of these PROPs know that they are 2 hops away from
the originator
Process continues until every radio knows its distance in tiers from every
other radio
“Best”: shortest route with “good” connectivity on each hope
To change table, must discover a new node with better link quality and
lower tier number than currently recorded next node
Also disseminate information about bad links in PROP messages
28
30. Device Table
30
Each mobile device/terminal periodically sends a
control packet across the wired interface to its
attached packet radio.
Packet radio keeps track of affiliated devices and
propagates this mapping information via a PROP to
other packet radios in the network at an average rate
of 3.75 seconds per hop.
when a packet radio receives a packet addressed to a
specific mobile device, the device currently attached
to the packet radio is known and the appropriate next
hop-packet radio is chosen to forward the packet.
31. Device Table
Logical addressing: maps device to a packet radio
Information about the radio’s attached device is included in PROP messages
This allows new radios to be attached to devices and vice versa
Such correspondences are maintained in the device table at each packet radio
P
NML
Q
1 2
Device
PR Node
Device
31
32. Principles of Forwarding Protocols
Forwarding is accomplished via information read from the device and tier tables and from
the packet headers.
Packet Headers:
End-to-end header
The end-to-end header (ETE) is created by the source mobile
device/terminal, not the packet radio.
<Src Device ID, Dest Device ID,Type of Service Flag>
Source device ID/address: used to update the packet radio's device-to-
packet radio mapping information
Destination device ID/address: used in packet forwarding.
ToS: indicate low latency/low reliability, e.g., speech
The ETE header remains intact as the packet transits toward the destination
device.32
33. Principles of Forwarding Protocols
Routing header
In contrast to the ETE header, the routing header is created by the
source packet radio.
The routing header encapsulates the ETE header, since it is the routing
header that the packet radio will use to forward the packets
<Src PR ID, Seq No, SpeechToS flag, Prev PR ID (for acks), Prev PR
transmission count,Transmitting PR ID,Transmitting PR transmit count (for
pacing), Next PR ID, Lateral alternative routing flag,Alternative routing
request flag,Tier, Dest PR ID>
33
35. Forwarding Protocol
Device 1 --> Device 2 via PRs L, M, N
Device 1 --> PR L
Device sends packet PR L via its wired connection;
Prepare packet to forward on to PR N via PR M:
Dest PR ID =N
Prev PR ID =null
Trans PR ID = L
Next PR ID =M (known from tier table)
Tier =2 (from tier table)
P
NML
Q
1 2
Device
PR Node
Device
35
36. Forwarding Protocol
PR L --> PR M
PR M receives packet over the air
Next PR ID = M, this PR should process the packet
Prepare to forward packet on to PR N:
Prev PR ID = L
Transmitting PR ID = M
Next PR ID = N (known from tier table)
Tier = 1 (from tier table)
Transmit packet to PR N … and any other PR within range, including L!This is an
example of the passive acknowledgement.
P
NML
Q
1 2
Device
PR Node
Device
36
37. Forwarding Protocol
PR M --> PR N
N receives packet, determines it should process it based on Next PR ID
Determines that packet should be delivered to the attached Device 2 (from ETE header
and device table)
Wire-line transmits the packet to Device 2
Sets in header, for the ack message:
Prev PR ID = M
Trans PR ID = N
Next PR ID = null
Tier = null
Ack message is sent, consisting only of header
Note that end PR can’t use passive acknowledgement, so is forced to transmit ack
message to PR M
P
NML
Q
1 2
Device
PR Node
Device
37
38. Forwarding Protocol
Criteria for recognizing an Ack
Source PR ID and Seq No match the original packet
AND must have arrived from further downstream:
Transmitting PR ID in ack packet is same as next PR ID in original
packet
Previous PR ID is same as receiving PR’s ID--the forward packet
came from this packet radio
Ack packet contains a smaller tier number, indicating it got closer
to the destination PR
38
39. Forwarding Protocol
Retransmissions
If a packet is forwarded, and no ack is received, the packet will be
retransmitted after a time out
Will do this six times before giving up
Interval between retransmission based on pacing protocol, and
grows with each successive unsuccessful retransmission
At some point, sending PR assumes that it can no longer reach the
next radio on the hop and sets its connectivity to that radio to 0
39
40. Transmission Protocols
Pacing protocol
Provide Flow and congestion control mechanisms
Transmission parameters are chosen based on measure link
quality and the type of service desired by the user.
Also promotes fair use of the radio spectrum
The time at which a packet is selected for transmission is
determined by a three-component packing protocol.
SingleThreading
Forwarding Delay Measurement
Measurement of Retransmissions
40
41. Transmission Protocols
SingleThreading
Last packet sent to PR must be ack’d or discarded before next packet is sent
to the same PR
Passive acks imply that next hop PR now ready to accept a new packet
Deflects congestion bottleneck away from source PR
Forwarding Delay
packet radio records the time at which its transmission completes and when it
receives the acknowledgment from the next packet radio.This difference is
known as forwarding delay
Affects the setting of retransmission intervals
Includes processing, queuing, carrier sense/random access, transmission
delay from neighboring PR
41
43. Media Access in PRNET’s
PRNETs employ the Carrier Sense MultipleAccess (CSMA)
protocol to coordinate communications among mobile hosts.
CSMA prevents a packet radio from transmitting at the same
time when a neighboring packet radio is using the medium.
A packet radio is aware if a neighbor is transmitting by
reading its hardware indication bit-synchronization-in-the-
lock.
Basically, this bit, when set, implies that the channel is busy
and a carrier is being sensed.
Whenever a carrier is being sensed, a packet radio will
refrain from transmitting.
43
44. CSMA
Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access
Control (MAC) protocol in which a node verifies the absence of
other traffic before transmitting on a shared transmission medium, such as an electrical
bus, or a band of the electromagnetic spectrum.
"Carrier Sense" describes the fact that a transmitter uses feedback from a receiver that
detects a carrier wave before trying to send. That is, it tries to detect the presence of an
encoded signal from another station before attempting to transmit. If a carrier is
sensed, the station waits for the transmission in progress to finish before initiating its
own transmission. In other words, CSMA is based on the principle "sense
before transmit" or "listen before talk".
"Multiple Access" describes the fact that multiple stations send and receive on the
medium. Transmissions by one node are generally received by all other stations using
the medium.
44
45. Media Access in PRNET’s
While carrier sensing reduces the probability of channel
contention, it cannot eliminate hidden terminal and
exposed nodes problems.
The former is a result of a node lying within the radio range of
the receiver, but not another transmitter that is two hops away.
The latter results in neighboring nodes of a transmitter being
blocked from transmission.
45
46. Flow Acknowledgments in PRNETs
Packets are forwarded via a single communication route
through a PRNET.
Each packet radio must
examines the information contained in the packet headers and
in its own device and tier tables.
decide if it should be the one to transmit the packet, if it should
update the routing header before transmitting, and if it should
update its own tables.
46
48. Other packet radios within the radio range will also receive the
transmitted packet.
If these neigbors are not part of the route, they will discard the
overheard packets.
The downstream node that receives the packet will process the
packet and proceed with issuing a passive acknowledgment.
The single transmission, not only forwards the packet on to the
next packet radio but also acknowledges the previous packet radio
that the packet was successfully received and is being forwarded.
This principle of passive acknowledgment will proceed
until the packet reaches the destination node. reception of the
packet.
48
49. Since the destination node does not have a downstream
node and it is the terminating point, an active
acknowledgment is sent by the destination node to its
upstream node to confirm successful
49
50. Technical Challenges
PRNETs are different from wired networks in many aspects.
They have an infrastructure-less backbone and network nodes that act as
routers or packet switches to forward packets from one node to another.
Routers are connected without wires and routers
themselves can be mobile.
The introduction of wireless connectivity and the presence of mobility
result in great technical challenges in the field of computer
communications.
PRNET is the network that attempts to merge computer
communications with telecommunications.
It allows networks to be formed and de-formed on-the-fly, through a set
of innovative and adaptive communication protocols.
50
51. Technical challenges for PRNET
The technical challenges for PRNET can be summarized as:
Flow control over a wireless multi-hop communication route
Error control over wireless links
Deriving and maintaining network topology information
Deriving accurate routing information
Mechanisms to handle router mobility
Shared channel access by multiple users
Processing capability of terminals
Size and power requirements
51