1. A user makes a SIP call to join a PTT group. The call is routed through the mesh network to the PTT controller.
2. The PTT controller assigns the user a floor control state and notifies the relevant PTT nodes.
3. When a user wants to speak, they press a button which sends a signal to the PTT controller via SIP.
4. If granted the floor, the PTT controller allows the user's voice stream to be broadcast to other group members.
The document discusses implementing a wireless mesh network using IEEE 802.11s at Sikkim Manipal Institute of Technology. It describes the benefits of mesh networks, different mesh network modes, and comparisons with other wireless technologies. It also outlines the hardware and software developed, including antennas, wireless routers, firmware, and traffic monitoring tools used to test and analyze the campus mesh network.
The document discusses mesh networks, which are wireless networks formed by connecting nodes without centralized administration. It describes the topology and attributes of mesh networks, including that they are self-organizing, self-healing, and scalable. It then provides examples of several existing mesh networks around the world and discusses some of the technical and community challenges in building mesh networks.
MobiMESH: Introduction to Wireless MESH Networksacapone
This document introduces wireless mesh networks (WMNs) and discusses their advantages over other wireless network types. It describes the Mobimesh project, an experimental WMN platform developed by Politecnico di Milano, and its deployment in Bagnara Calabra, Italy. Ongoing research activities are also summarized, including projects to develop hierarchical routing, automatic frequency assignment, improved mobility management, integrated WMN and sensor networks, and hybrid wireless/powerline networks.
Tutorial at IEEE 802 LMSC Plenary Session, Dallas, TX, USA, Nov. 13, 2006 (with W. Steven Conner, Intel Corp., Jan Kruys, Cisco Systems, and Juan Carlos Zuniga, InterDigital Comm. Corp.).
Wireless mesh networks provide opportunities for broadband internet access, extending wireless LAN coverage, mobile internet access, emergency response, and more. They compare favorably to existing technologies due to lower upfront investments, good bandwidth and coverage, and ease of deployment in some cases. However, research challenges remain around the physical layer, medium access control, routing, security, and other areas. Ongoing work aims to improve performance through techniques like smart antennas, transmission power control, and use of multiple channels.
Multiprocessor mesh interconnection networks are 2-dimensional networks, with the processors arranged at the nodes of a grid, and point-to-point links connecting each node to its neighbors.
The document discusses implementing a wireless mesh network using IEEE 802.11s at Sikkim Manipal Institute of Technology. It describes the benefits of mesh networks, different mesh network modes, and comparisons with other wireless technologies. It also outlines the hardware and software developed, including antennas, wireless routers, firmware, and traffic monitoring tools used to test and analyze the campus mesh network.
The document discusses mesh networks, which are wireless networks formed by connecting nodes without centralized administration. It describes the topology and attributes of mesh networks, including that they are self-organizing, self-healing, and scalable. It then provides examples of several existing mesh networks around the world and discusses some of the technical and community challenges in building mesh networks.
MobiMESH: Introduction to Wireless MESH Networksacapone
This document introduces wireless mesh networks (WMNs) and discusses their advantages over other wireless network types. It describes the Mobimesh project, an experimental WMN platform developed by Politecnico di Milano, and its deployment in Bagnara Calabra, Italy. Ongoing research activities are also summarized, including projects to develop hierarchical routing, automatic frequency assignment, improved mobility management, integrated WMN and sensor networks, and hybrid wireless/powerline networks.
Tutorial at IEEE 802 LMSC Plenary Session, Dallas, TX, USA, Nov. 13, 2006 (with W. Steven Conner, Intel Corp., Jan Kruys, Cisco Systems, and Juan Carlos Zuniga, InterDigital Comm. Corp.).
Wireless mesh networks provide opportunities for broadband internet access, extending wireless LAN coverage, mobile internet access, emergency response, and more. They compare favorably to existing technologies due to lower upfront investments, good bandwidth and coverage, and ease of deployment in some cases. However, research challenges remain around the physical layer, medium access control, routing, security, and other areas. Ongoing work aims to improve performance through techniques like smart antennas, transmission power control, and use of multiple channels.
Multiprocessor mesh interconnection networks are 2-dimensional networks, with the processors arranged at the nodes of a grid, and point-to-point links connecting each node to its neighbors.
This document discusses wireless mesh networks (WMN) and compares various routing protocols for WMN. It covers the differences between mesh and ad-hoc networks, popular routing protocols like AODV, OSPF, HWMP, B.A.T.M.A.N, and factors to consider in WMN routing like load balancing, hop count, interference avoidance. Reactive protocols like AODV are on-demand while proactive protocols like OSPF maintain routing tables and update link states periodically. Mobile Mesh uses three separate protocols for different functions. HWMP is being developed for IEEE 802.16s WMN. Research is ongoing to find new metrics for protocols like OSPF in wireless
A wireless mesh network (WMN) consists of mesh clients, mesh routers, and gateways organized in a mesh topology. It is self-forming, self-healing, and allows multi-hop connections. In contrast, a wireless ad-hoc network is a decentralized wireless network that does not rely on existing infrastructure and where devices communicate directly with each other without an access point. Key differences are that WMN relies on some fixed infrastructure and supports multi-hop traffic to gateways, while ad-hoc networks are fully infrastructure-independent and support user-to-user traffic. Both utilize various routing protocols for path selection between nodes.
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
The document discusses ad hoc networks and wireless sensor networks. It defines an ad hoc network as a temporary network composed of mobile nodes without preexisting infrastructure that is self-organizing. Wireless sensor networks are introduced as a collection of sensor nodes densely deployed to monitor conditions and cooperatively pass data back to central nodes. The document outlines key characteristics of both networks including their temporary and adaptive nature, multi-hop routing, and challenges of mobility, power constraints, and dynamic topology changes.
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed for use in wireless ad-hoc networks without existing infrastructure. DSR allows networks to self-organize and self-configure. It uses two main mechanisms: route discovery determines the optimal transmission path between nodes, while route maintenance ensures the path stays optimal and loop-free as network conditions change.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed.
This document provides an introduction to mobile ad hoc networks (MANETs) and discusses associated research issues. It defines MANETs as infrastructureless, self-configuring networks formed spontaneously by wireless devices. Key characteristics of MANETs include dynamic topology, limited bandwidth, and lack of centralized management. The document outlines several research areas in MANETs, including power management, MAC layer protocols, routing, transport protocols, security, and data management. It discusses challenges in each area posed by the mobile and decentralized nature of MANETs.
The document discusses ad hoc networks. It defines an ad hoc network as a temporary network connection between devices without fixed infrastructure. Key characteristics of ad hoc networks include dynamic topology, nodes that can freely join and leave, multi-hop routing, and limited bandwidth. The document compares ad hoc networks to wired and managed wireless networks. It also discusses different types of ad hoc networks and routing protocols like DSR and AODV. Applications of ad hoc networks include military operations, conferences, and emergency response situations.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
This document summarizes a study on the impact of malicious nodes on throughput, packets dropped, and average latency in mobile ad hoc networks (MANETs). The study used the NS-2 simulator to model different MANET scenarios with varying numbers of malicious nodes, from 0 to 10 nodes per group and 0 to 40 nodes total. Key findings from the simulations include: (1) network throughput was highest with 0 malicious nodes, (2) packet drops were lowest with 4 malicious nodes, and (3) average latency was lowest with 4 malicious nodes. As the number of malicious nodes increased, network throughput decreased while packet drops and latency increased. The document concludes the presence of malicious nodes degrades MANET performance but having a small number
This document discusses wireless mesh networks (WMN) and compares various routing protocols for WMN. It covers the differences between mesh and ad-hoc networks, popular routing protocols like AODV, OSPF, HWMP, B.A.T.M.A.N, and factors to consider in WMN routing like load balancing, hop count, interference avoidance. Reactive protocols like AODV are on-demand while proactive protocols like OSPF maintain routing tables and update link states periodically. Mobile Mesh uses three separate protocols for different functions. HWMP is being developed for IEEE 802.16s WMN. Research is ongoing to find new metrics for protocols like OSPF in wireless
A wireless mesh network (WMN) consists of mesh clients, mesh routers, and gateways organized in a mesh topology. It is self-forming, self-healing, and allows multi-hop connections. In contrast, a wireless ad-hoc network is a decentralized wireless network that does not rely on existing infrastructure and where devices communicate directly with each other without an access point. Key differences are that WMN relies on some fixed infrastructure and supports multi-hop traffic to gateways, while ad-hoc networks are fully infrastructure-independent and support user-to-user traffic. Both utilize various routing protocols for path selection between nodes.
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
The document discusses ad hoc networks and wireless sensor networks. It defines an ad hoc network as a temporary network composed of mobile nodes without preexisting infrastructure that is self-organizing. Wireless sensor networks are introduced as a collection of sensor nodes densely deployed to monitor conditions and cooperatively pass data back to central nodes. The document outlines key characteristics of both networks including their temporary and adaptive nature, multi-hop routing, and challenges of mobility, power constraints, and dynamic topology changes.
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed for use in wireless ad-hoc networks without existing infrastructure. DSR allows networks to self-organize and self-configure. It uses two main mechanisms: route discovery determines the optimal transmission path between nodes, while route maintenance ensures the path stays optimal and loop-free as network conditions change.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed.
This document provides an introduction to mobile ad hoc networks (MANETs) and discusses associated research issues. It defines MANETs as infrastructureless, self-configuring networks formed spontaneously by wireless devices. Key characteristics of MANETs include dynamic topology, limited bandwidth, and lack of centralized management. The document outlines several research areas in MANETs, including power management, MAC layer protocols, routing, transport protocols, security, and data management. It discusses challenges in each area posed by the mobile and decentralized nature of MANETs.
The document discusses ad hoc networks. It defines an ad hoc network as a temporary network connection between devices without fixed infrastructure. Key characteristics of ad hoc networks include dynamic topology, nodes that can freely join and leave, multi-hop routing, and limited bandwidth. The document compares ad hoc networks to wired and managed wireless networks. It also discusses different types of ad hoc networks and routing protocols like DSR and AODV. Applications of ad hoc networks include military operations, conferences, and emergency response situations.
The document discusses ad-hoc networks and their key characteristics. It describes several challenges in ad-hoc networks including limited battery power, dynamic network topology, and scalability issues. It also summarizes several ad-hoc network routing protocols (e.g. DSDV, AODV, DSR), addressing both table-driven and on-demand approaches. Additionally, it outlines some ad-hoc MAC protocols like MACA and PAMAS that aim to manage shared wireless medium access.
This document provides notes on ad hoc networks from R N S Institute of Technology. It begins with an introduction comparing cellular and ad hoc wireless networks. Ad hoc networks are infrastructureless networks that use multi-hop radio relaying. The document then discusses applications of ad hoc networks such as military operations, emergency response, wireless mesh networks, and wireless sensor networks. It also covers key issues in ad hoc networks including medium access, routing, multicasting, and energy management. The first unit focuses on these introductory concepts and applications of ad hoc networks.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
This document summarizes a study on the impact of malicious nodes on throughput, packets dropped, and average latency in mobile ad hoc networks (MANETs). The study used the NS-2 simulator to model different MANET scenarios with varying numbers of malicious nodes, from 0 to 10 nodes per group and 0 to 40 nodes total. Key findings from the simulations include: (1) network throughput was highest with 0 malicious nodes, (2) packet drops were lowest with 4 malicious nodes, and (3) average latency was lowest with 4 malicious nodes. As the number of malicious nodes increased, network throughput decreased while packet drops and latency increased. The document concludes the presence of malicious nodes degrades MANET performance but having a small number
Impact of Malicious Nodes on Throughput, Packets Dropped and Average Latency ...iosrjce
Mobile Ad-hoc Network is a decentralized wireless network[1]. Here the mobile nodes make and
break the links with the neighbouring nodes available in the radio range without actually being physically
connected. These networks are temporary and keep on changing from time to time. MANET applications are
getting importance in both civilian and military areas. MANETs can be applied in disaster communications and
used as the backup network of traditional mobile communication networks as well. Network throughput, number
of packets dropped and average latency are important parameters to evaluate the performance of wireless ad
hoc network[3]. Generally, it is difficult to achieve high throughput and low packet drop with minimum
delay[5]. In this paper, the objective is to achieve high throughput while keeping the packet drop and the
average latency under certain acceptable limits[10]. We tried to study the signature pattern of these malicious
nodes and made conclusions with the results obtained. The performance is evaluated with the following
parameters: network throughput, number of packets dropped and the average latency. We used NS2 simulator
and extracted data from the trace files[2]. Ad-hoc On Demand Distance Vector (AODV) routing protocol has
been used in our experiments[4]. Similar to our previous work, the nodes are free to move or remain static in all
the quadrants in the defined space[8].
Black Hole Detection in AODV Using Hexagonal Encryption in Manet’sIJMER
In MANETs (mobile ad hoc network), security is common problem and lack of issues in
MANET network. When comparing to wired network, MANETs are harmed to security attacks due to the
scarcity of a trusted centralized enforce authority and limited resources. This paper proposed a technique
to avoid Blackhole node behaviour in AODV (Ad Hoc On-Demand Distance Vector) using Hexagonal
Encryption inNS2. Hexagonal Encryption has been chosen for low cost and high computation speed up.
Compared to existing blackhole detection technique, this proposed technique obtains better result by
stimulating in NS2.
International Journal of Engineering Research and DevelopmentIJERD Editor
This document describes the simulation and performance evaluation of a wireless ad hoc network using the NS2 simulator. The network uses the AODV routing protocol. 15 nodes were simulated over a 1000m x 800m area for 1000 seconds, with 6 concurrent UDP connections. Packet delivery ratio, throughput, and packet drop ratio were evaluated based on the trace file data. The simulation found a packet delivery ratio of 0.71 and throughput of around 534.19 kbps for the AODV protocol in the simulated network.
Abstract Mobile Ad Hoc Network(MANETs) is a wireless communications technology in which devices may move around. There is no fixed structure or network that all the participating nodes form. It is a very flexible network. These characteristicsof MANET make it very unsafe and prone to various attacks.Although many research focus on how to deliver packets fromone node to another, very less importance had been given tothe security. Current techniques of addressing security on thefixed structured wired network are only useful to protect thetransmitted message on the end nodes, the security of routinginformation among the mobile nodes in the hostile environmentwhere mobile Ad Hoc networks are usually used has beeninadequately addressed. Security and routing has been treatedseparately incase of wired network but that cannot be done inwireless network since routing itself can be a major reason fordata loss or theft if done in a casual manner making it prone toattack from malicious node.Hence the routing and security hasto be looked into as one and not separately. Making the routingsecured can make the MANET a more reliable network. We havemade the routing mechanism secured but extending Fuzzy logic toit. Fuzzy logic in deciding the route makes it less prone to attacksand thus ensuring enhanced security. The proposed scheme ofsecure routing will be demonstrated by using simulation on NS2. Keywords AODV, SAODV, Fuzzy Logic, Black holeattack.
Mobile ad hoc network (MANET) is an autonomous system of mobile nodes. Each node operates not only as an end system, but also as a router to forward packets. The nodes are free to move about and organize themselves into a network. These cause extra challenges on security. In this paper, evaluation of prominent on-demand routing protocol i.e. AODV,MAODV,RAODV has been done by varying the network size. An effort has been carried out to do the performance evaluation of these protocols using random way point model. The simulator used is NS 2.34. The performance of either protocol has been studied by using a self created network scenario with respect to pause time.
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
A mobile ad-hoc network (MANET) is a collection of
mobile nodes, which communicate over radio. These networks
have an important advantage; they do not require any
existing infrastructure or central administration. Therefore,
mobile ad-hoc networks are suitable for temporary
communication links. This flexibility, however, comes at a
price: communication is difficult to organize due to frequent
topology changes. In this paper we propose on-demand
routing algorithm for mobile, multi-hop ad-hoc networks. The
algorithm is based on ant algorithms, which are a class of
swarm intelligence. The main goal in the design of the
algorithm is to reduce the overhead for routing. Furthermore,
in this paper the performance of AODV protocol is analyzed
by varying mobility and node density parameters through
simulation of results ns2 simulator.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
This document compares the AODV and DSR MANET routing protocols. It provides background on MANETs and categories of routing protocols. It then describes the key features of the AODV and DSR reactive protocols. The document outlines a methodology to simulate scenarios using these two protocols in NS2 and compare their performance based on throughput and packet delivery ratio. It proposes improving AODV security using cryptography for future work.
A Survey On Secure Cooperative Bait Detection Approach For...Jennifer Perry
This document discusses designing an MPLS VPN network for a customer with multiple locations. It covers key topics such as MPLS and VPN technologies, how MPLS VPN works, and security considerations. The design would involve configuring MPLS on routers to create tunnels between sites and establish VPNs to allow private communications over a shared infrastructure. Proper configuration is important to provide security and isolation between customer networks.
The document proposes an Abstraction Layer Based Virtual Clusters (AL-VC) architecture for distributed data centers. The key aspects are:
1. VMs are grouped into clusters based on service type to take advantage of data correlation. Each cluster is assigned an abstraction layer consisting of a subset of virtual switches.
2. The abstraction layer provides local management and control for its cluster. It can efficiently replace failed VMs or servers by matching attributes and requesting new deployments from the network manager when needed.
3. The proposed architecture aims to efficiently utilize network resources while remaining scalable and flexible to changes. Evaluation shows it can replace failed components with less time and communication cost compared to a centralized scheme.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
An alternative Routing Mechanisms for Mobile Ad-hoc NetworksPresentation2Aws Ali
This document outlines a student's research project on proposing an alternative routing mechanism for mobile ad-hoc networks. The student investigated existing routing protocols, proposed a new hybrid protocol, and simulated its performance in NS2 compared to AODV and DSDV. Simulation results showed the hybrid protocol had lower packet drop and loss rates than the other protocols. The hybrid protocol switches between proactive and reactive modes based on power consumption, mobility, and vicinity.
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET Journal
This document summarizes a research study that used the ns-3 network simulator to analyze the performance of two routing protocols - Optimized Link State Routing (OLSR) and Adhoc On-demand Distance Vector (AODV) - in a wireless ad hoc network under different conditions. The study varied parameters like packet size, number of nodes, and hello interval (the frequency at which routing information is broadcast) and measured metrics like throughput, delay, jitter, packet delivery ratio, packet loss, and congestion window. The results showed how the performance of the two protocols was impacted by changes to these parameters. The goal was to better understand congestion control and avoidance in wireless ad hoc networks through simulation.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
This document summarizes a research paper that evaluates the performance of two routing protocols (AODV and DSDV) under different traffic patterns (TCP and CBR) in a mobile ad hoc network (MANET) simulation. The paper describes MANET characteristics and challenges for routing. It provides an overview of reactive (AODV), proactive (DSDV), and hybrid routing protocols. It also defines TCP and CBR traffic patterns. The research aims to analyze and compare the packet delivery ratio and end-to-end delay of AODV and DSDV under different traffic loads using the NS-2 simulator. Preliminary results show that reactive protocols perform better in terms of these metrics.
The document discusses and compares the performance of two on-demand routing protocols for mobile ad hoc networks (MANETs), Dynamic Source Routing (DSR) and Ad Hoc On-Demand Distance Vector Routing (AODV). The protocols were simulated using the NS-2 network simulator across different network parameters and their performance was evaluated based on average throughput, end-to-end delay, and packet delivery ratio. The results showed that AODV generally performed better than DSR, having lower end-to-end delays and higher throughput, especially as the packet size and number of nodes increased. However, DSR may resort to route discovery less often than AODV since it can maintain multiple routes for a source-
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
This document discusses providing quality of service (QoS) for scalable video streaming over ad-hoc networks using cross-layer design. It begins by introducing multi-hop wireless networks and ad-hoc networks, noting their advantages and challenges. It then discusses QoS and cross-layer design approaches. The document proposes using cross-layer design to provision QoS for scalable video streaming over ad-hoc networks in order to overcome challenges like variable topology, limited resources and interference.
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
This document discusses a proposed technique for efficient data transfer of different packet sizes over wireless sensor networks. The technique uses a combination of routing protocols, including AODV, DSDV, and DSR. It aims to improve quality of service for data transmission by using proper packet formatting and compression techniques. The objective is to develop a reliable architecture that can handle both proactive and reactive routing approaches to efficiently manage routing and transmission of data between neighboring nodes. The proposed technique will be implemented and evaluated using a network simulator.
Similar to Practical Wireless Mesh Networks and Their Applications (20)
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
20240609 QFM020 Irresponsible AI Reading List May 2024
Practical Wireless Mesh Networks and Their Applications
1. Practical
Wireless Mesh Networks
and Their Applications
Raluca Musăloiu-E.
Johns Hopkins University
November 11, 2009
Joint work with:
Yair Amir, Claudiu Danilov, Michael Hilsdale, Michael Kaplan, Nilo Rivera
3. ... using access points.
Follows client-server paradigm.
For more coverage, install more
access points.
Each access point is connected to
the Internet.
5. Mesh networks are a paradigm shift.
Two classes of participants:
Clients, which are mobile.
Nodes, which are relatively stationary.
Only a few nodes are connected to
the Internet (Internet gateways).
They are multi-hop networks.
6. Lots of research on wireless
networks relies on simulations.
The Mistaken Axioms of Wireless-Network Research:
(Kotz et al., Darmouth College, Tech Report, 2003)
“The world is flat.”
“A radio's transmission area is circular.”
“All radios have equal range.”
“If I can hear you, you can hear me (symmetry).”
“If I can hear you at all, I can hear you perfectly.”
“Signal strength is a simple function of distance.”
7. We try to bridge the gap
between theory and practice
and build a real mesh system.
8. Effort has already been made to
make mesh networks a reality.
However...
Some of them are experimental testbeds.
Use expensive hardware for mesh nodes.
Have limited support (or none) for mobility.
9. For example,
In academia: In industry:
MIT Roofnet Metricom Ricochet
Microsoft MCL Nokia Rooftop
UCSB MeshNet Firetide
Rice Taps Meraki
Rutgers ORBIT Lab Tropos Networks
Stony Brook iMesh
Community Networks:
Champaign-Urbana Community Wireless Network (CUWiN)
NYCwireless
Freyfunk (Germany)
10. What we are looking for is
Seamless access for mesh users.
Fast handoff while roaming.
Rapid deployment.
Robustness.
Low cost.
Security.
Applications.
11. This thesis introduces
The architecture of the first high-throughput wireless mesh
network with fast handoff using off-the-shelf routers.
The first robust Push-To-Talk service for wireless mesh
networks.
13. The entire mesh network is
seen by the client as an
omniscient access point!
We use 802.11 IBSS mode
(ad-hoc).
MobiSys 2006
WoWMoM 2007
WiMesh 2008
14. SMesh communication
infrastructure uses the Spines
Messaging System.
Spines was created by Yair Amir and Claudiu Danilov (DSN03, NOSSDAV05,
TOM06).
Spines daemons create overlay networks on the fly.
We run a Spines daemon on each mesh node.
Spines provides unicast, anycast, multicast communication.
15. Mesh topology formation
Direct links are created Client C
between nearby nodes via an
auto-discovery mechanism.
Client B
Virtual links are created
between Internet gateways
(they form a fully connected
graph, communicating over
an overlay multicast group).
Client A
16. Mesh topology is hybrid: we use
both wireless and wired links.
The routing metric gives preference to wired links.
17. SMesh provides a seamless
interface to the mobile clients.
Standard DHCP protocol.
Client always gets the same IP address
(private IP in 10.0.0.0/8 address space;
based on the MAC address).
Client routes all packets through a Virtual
Default Gateway.
19. Control
Group
26
30
14
NAT
We associate two overlay multicast groups for
each client.
20. Control
Group
26 Data
30
Group
14
NAT
We associate two overlay multicast groups for
each client.
21. Fast intra-domain handoff.
The handoff is controlled from the mesh infrastructure!
We use multiple access points during the handoff, to avoid
losing packets.
22.
23.
24.
25.
26.
27. Fast inter-domain handoff.
SMesh runs in a private address space (NAT is performed at
each Internet gateway).
Connection oriented protocols expect packets to come
from the same source.
Solution: Route each stream through the Internet gateway
used during connection establishment.
28. We deployed SMesh in our campus.
18-nodes testbed, covering three buildings in
our campus (NEB/Shaffer, Maryland, Barton).
Linksys WRT54G 802.11b/g routers,
BCM947XX radios, omni-directional
antennas, 16 MB RAM, 4 MB flash memory,
200 Mhz CPU.
Available as open-source software
(smesh.org).
31. 1 2
Node 5 routing rules
3 Source Destination Ne
Node 1 client 1 6
… …
4 Node 2 client 1 6, 7
5 … …
6
7
Client 1
Fig. 1. The routes to a mobile client (multipath routin
To route, we need to use source based multicast trees.
Multipath routing is not supported by current operating
systems. an overlay network to increase the reliability of
to-end path. End-System-Multicast [14] and Spine
33. With user-space routing all the
packets are moved to
application level.
Spines
Spines Spines
User space
Kernel space
Spines
34. We need flexibility in
routing... but without losing
performance.
We developed a new architecture that maintains the control in
user space, while the data is routed at the kernel level.
35. Node’s 5 kernel routing tables:
1 2
Node 5 routing rules
3 Source Destination Next-Hop(s)
Node 1 client 1 6
… …
4 Node 2 client 1 6, 7
5 … … Node 3
6
Node 2
7 Node 1
Client 1
Fig. 1. The routes to a mobile client (multipath routing). Fig. 2
an overlay network to increase the reliability of the end- space to user space in orde
to-end path. End-System-Multicast [14] and Spines [3] also routing decision is made, th
Each route through an application router to support overlay multicast spaceone for sent on th
node maintains multiple kernel routing tables, where it is
each without infrastructure support.
node in the network. boundary must be crossed
Other work has looked into operating system support for We describe next a me
wireless ad-hoc routing protocols. Chakeres and Belding dundant multipath routing
showed in [9] an in-kernel design and implementation of the is simple: each node maint
ad-hoc AODV protocol using Netfilter modules, and showed one for each node in the
36. One of node’s 5 routing tables:
1 2
Node 5 routing rules
3 Source Destination
Node 2
Next-Hop(s)
Node 1 client 1 6
… …
4
5
Node 2 Destination
client 1 6, 7 Next-hops
… …
6 client 1 6, 7
client 2 3
7
... ...
Client 1
Fig. 1. The routes to a mobile client (multipath routing). Fig. 2
an overlay network to increase the reliability of the end- space to user space in orde
Eachto-end path. End-System-Multicast [14] and Spines [3] also
route may have multiple next-hops. routing decision is made, th
route through an application router to support overlay multicast space where it is sent on th
without infrastructure support. boundary must be crossed
Other work has looked into operating system support for We describe next a me
wireless ad-hoc routing protocols. Chakeres and Belding dundant multipath routing
showed in [9] an in-kernel design and implementation of the is simple: each node maint
ad-hoc AODV protocol using Netfilter modules, and showed one for each node in the
39. 1. Encode entry node in the
packet’s IP header.
0 7 8 15 16 23 24 31
Version IHL TOS Total length
Identification (IPID) Flags Fragment offset
TTL Protocol Header checksum
Source IP
Destination IP
Options and padding
40. 1. Encode entry node in the
packet’s IP header.
0 7 8 15 16 23 24 31
Version IHL TOS Total length
Identification (IPID)
Identification (IPID) Flags Fragment offset
TTL Protocol Header checksum
Source IP
Destination IP
Options and padding
41. 1. Encode entry node in the
packet’s IP header.
0 7 8 15 16 23 24 31
Version IHL TOS
TOS Total length
Identification (IPID)
Identification (IPID) Flags Fragment offset
TTL Protocol Header checksum
Source IP
Destination IP
Options and padding
42. 2. Use policy routing and define
multiple routing tables.
# iptables -A PREROUTING -t mangle
-m u32 --u32 "2&0xFFFF=35"
-j MARK --set-mark 35
# ip rule add fwmark 35 table 35
43. 3. Build a kernel module to
deliver packets to multiple next
hops.
Use CONFIG_IP_ROUTE_MULTIPATH kernel option.
# ip route add 10.233.59.169/32 table 35
nexthop via 10.0.11.32 dev eth1
nexthop via 10.0.11.33 dev eth1
# iptables -A POSTROUTING
-t mangle
-j MULTIHOP
44. A packet path in the kernel..
entry point: set IPID
set TOS
all routers: set fwmark fwmark MULTIHOP module
Routing
NF_IP_PRE_ROUTING NF_IP_FORWARD NF_IP_POST_ROUTING
Decision
Routing
Decision
NF_IP_LOCAL_IN NF_IP_LOCAL_OUT
59. What is PTT?
Half-duplex communication
system with multiple
participants.
While one person speaks, the
others listen.
60. Push-To-Talk systems require an arbitration
mechanism (“floor control”) that
determines the order in which participants
speak.
In cellular networks, Push-To-Talk systems are centralized.
61. We need a robust, distributed
Push-To-Talk system that works
even when
Mesh nodes crash.
The network is partitioned or it merges.
62. Our Push-To-Talk system allows regular
phone users to remotely join a PTT
session established inside the mesh!
64. Mobile Client with VoIP Software
SIP RTP
PTT Controller
Distributed RTP Proxy Mobile, Fault-Tolerant
SIP 3PCC DTMF Voice
Floor
Monitor
Management
Mobile Client
Mesh Node
State sip_call_id, PTT Session
sip_cseq, rtp_port, Manager
ptt_group, ptt_state
Client PTT PTT
PTT Data
Control CMonitor Controller
Group
Group Group Group
Routing Daemon (Discovery, Topology Management, Group Management)
Wireless Mesh Network
65. Interface with Mobile Client
We use the standard Session Initiation Protocol (SIP) to interact
with users.
The entire mesh is seen by the user as a single, distributed third
party call controller (3pcc).
66. A user interacts with the system
using a VoIP application.
sip : ptt @ 192.168.1.10
How to connect:
(that’s a virtual SIP server)
How to join a group: type # 12 #
How to request to speak: type 5
How is notified when he
receive a “beep-beep” audio signal
has permission to speak:
67. We use multicast groups to
manage the client and the PTT
sessions.
These are overlay multicast groups.
77. Sending Mesh
Controller
client node
Sends “Request to speak”
to the access point.
78. Sending Mesh
Controller
client node
Floo
r Re
Sends “Request to speak” Con ques
t
trol
to the access point. ler g
roup
79. Sending Mesh
Controller
client node
Floo
r Re
Sends “Request to speak” Con ques
t
trol
to the access point. ler g
roup
k
e st Ac
Requ
st
u nica
80. Sending Mesh
Controller
client node
Floo
r Re
Sends “Request to speak” Con ques
t
trol
to the access point. ler g
roup
k
e st Ac
Requ
st
u nica
k
to Spea
sion up
Pe rmis ol gro
C ontr
Receives “Permission lient
Mesh C
granted” from the node
access point.
This can be a different node!
81. Sending Mesh
Controller
client node
Floo
r Re
Sends “Request to speak” Con ques
t
trol
to the access point. ler g
roup
k
e st Ac
Requ
st
u nica
k
to Spea
sion up
Pe rmis ol gro
C ontr
Receives “Permission lient
Mesh C
granted” from the node
access point. PTS
Ac k
unic
This can be a different node! ast
82. The controller is rotated periodically,
according to participants’ locations in
the network.
We want to maintain the controller node in the “center of
gravity” of the nodes handling PTT clients on a certain group.
84. Mesh
Controller
node
When a “better” controller is available
stop handling and queueing requests.
85. Mesh
Controller
node
When a “better” controller is available
stop handling and queueing requests. INVI
TE (
Grou
p, Q
unic ueue
ast )
Join Controller group
Join Monitoring group
Start handling
requests
86. Mesh
Controller
node
When a “better” controller is available
stop handling and queueing requests. INVI
TE (
Grou
p, Q
unic ueue
ast )
Join Controller group
Join Monitoring group
Start handling
)
requests
(G roup
k
TE Ac
INVI st
u nica
Controller change succeeded
Leave Controller group
Leave Monitoring group (if necessary)
87. The system needs to withstand
node crashes, network partitions
and merges.
93. PING_CMON Sending
Network Controller
Monitoring group node
On timeout: Controller is lost
Join Controller group (if lowest IP).
Start handling requests.
Sending
client
94. PING_CMON PTS_PING (client) Sending
Network Controller
Monitoring group Controller group node
On timeout: Controller is lost On timeout: Sending node is lost
Join Controller group (if lowest IP). Handle the next client in the
Start handling requests. queue.
Sending
client
95. PING_CMON PTS_PING (client) Sending
Network Controller
Monitoring group Controller group node
On timeout: Controller is lost On timeout: Sending node is lost
Join Controller group (if lowest IP). Handle the next client in the Voice
Start handling requests. queue.
Sending
client
96. In summary,
We instantiate a controller for each PTT group that arbitrates the
requests on that group.
The controller is monitored and rotated if a more suitable node is
available.
We achieve high availability with a monitoring mechanism that uses
overlay multicasts groups.
99. We evaluated the system when
1. The network is stable (normal operation).
2. The number of users in a PTT group increases.
3. The number of groups increases.
4. Large-scale scenario (40 clients, 10 groups, network partitions
and merges).
100. 1. Normal operation
Throughput
80 Kbps
Sender node 2 Sender node 12 Sender node 14
14 nodes,
60 Kbps
40 Kbps 4 users, each speaks
for 20 seconds.
20 Kbps
Overhead
0 Kbps
0 10 20 30 40 50 60 70
Time (s)
Sender node 2 Sender node 12
21.7 21.8 21.9 22.0 22.1 22.2 22.3 22.4
Packet Arrival time (s)
101. 2. Scalability with the #clients
Average latency Average loss rate
1.2 %
120 ms 114
1 %
100 ms 0.92
0.8 %
80 ms No PTT support
60 ms 0.6 % No PTT support
40 ms 0.4 %
27
Single radio 28 Single radio
23 26
0.23
18 16 21 0.18 0.19
25 0.2 %
20 ms 17
21
19
16 Dual radio 0.08 0.09 0.1
0.15
0.05 0.13
Dual radio
0 ms 0 %
2 4 8 14 28 42 2 4 8 14 28 42
Number of clients Number of clients
Using dual radios, it scales to at least 42 users in a single PTT
session, in our testbed.
102. 3. Scalability with the #groups
Average latency Average loss rate
2500 ms 20 % Dual radio
Single radio 18
2227
2000 ms Single radio
15 % 14
Dual radio Dual radio+
1541
1500 ms packing
1270
10 % Single radio+ Dual radio+
packing packing
1000 ms 6
6
Single radio+ 5 %
500 ms 360 packing 2
2
244 1
178 183 1
0 0
74 53 0 0 0
24 26 28 24 26 30 37
0 ms 0 %
1 2 4 6 8 10 12 14 16 18 20 1 2 4 6 8 10 12 14 16 18 20
Number of groups Number of groups
Using dual radios and packing, it scales up to 18 groups, with 4
users in each PTT group.
103. 4. Large-scale scenario
(10 PTT groups, 4 clients on each group)
Data & overhead traffic:
5000
Data
Traffic (kbps)
4000
C D F
PTT control traffic
Routing control traffic
3000
A B E
2000
1000
G
0
0 50 100 150 200 250 300 350 400 450
Time (s)
Overhead traffic only:
100
C D F
PTT control traffic
Traffic (kbps)
80
A B E
Routing control traffic
60
40 G
20
0
0 50 100 150 200 250 300 350 400 450
Time (s)
(A) clients join (D) the network partitions
(B) clients request to speak (E) stable network after partition
(C) regular operation (F) the network merges
(G) clients stop speaking
104. In conclusion, we presented
The architecture of the first high-throughput wireless mesh
network with fast handoff using off-the-shelf routers.
The first robust Push-To-Talk service for wireless mesh
networks.