SlideShare a Scribd company logo
1 of 154
Types of Wireless Networks
Need:
ā€¢ With the increasing use of small portable computers, wireless
networks, and satellites, a trend to support computing on the
move has emergedā€”this trend is known as mobile computing
or nomadic computing (also called anywhere/anytime
computing)
ā€¢ Mobile computing has several interesting and important
applications like:
ā€¢ Telecommunications
ā€¢ National defense (tracking troop movements),
ā€¢ Emergency and disaster management,
ā€¢ Remote operation of appliances, and in
ā€¢ Accessing the Internet.
Challenges:
ā€¢ The channel capacity typically available in wireless systems
is much lower than what is available in wired networks
ā€¢ Noise and interference have more impact on systems design
for wireless systems than on wired systems
ā€¢ security is a greater concern in wireless systems than in wired
systems since information may be traveling in free space
Wireless & Mobile Networks
ā€¢ Mobile networks provide support for routing (how to maintain
communication with mobility) and location management
(keeping track of the location) functions.
ā€¢ Wireless networks provide wireless interfaces to users (both
mobile and stationary) by supporting bandwidth allocation and
error-control functions
Wireless LAN
ā€¢ WLANs are typically restricted in their diameter to buildings,
a campus, single rooms etc
ā€¢ Advantages of WLANs are:
ā€¢ Flexibility: Within radio coverage, nodes can communicate
without further restriction. Radio waves can penetrate walls,
senders and receivers can be placed anywhere.
ā€¢ Planning: Only wireless ad-hoc networks allow for
communication without previous planning, any wired network
needs wiring plans. As long as devices follow the same
standard, they can communicate. For wired networks,
additional cabling with the right plugs and probably
interworking units (such as switches) have to be provided.
ā€¢ Design: Wireless networks allow for the design of small,
independent devices which can for example be put into a
pocket.
ā€¢ Robustness: Wireless networks can survive disasters, e.g.,
earthquakes or users pulling a plug. If the wireless devices
survive, people can still communicate. Networks requiring a
wired infrastructure will usually break down completely
ā€¢ Cost: After providing wireless access to the infrastructure via
an access point for the first user, adding additional users to a
wireless network will not increase the cost. This is, important
for e.g., lecture halls, hotel lobbies or gate areas in airports
where the numbers using the network may vary significantly.
ā€¢ WLANs disadvantages:
ā€¢ Quality of service: WLANs typically offer lower quality than
their wired counterparts. The main reasons for this are the
lower bandwidth due to limitations in radio transmission,
higher error rates due to interference.
ā€¢ Safety and security: Using radio waves for data transmission
might interfere with other high-tech equipment in, e.g.,
hospitals. The open radio interface makes eavesdropping much
easier in WLANs than, e.g., in the case of fiber optics.
Transmission technologies in
WLAN
ā€¢ One technology is based on the transmission of infra red light
(e.g., at 900 nm wavelength),
ā€¢ The other one, which is much more popular, uses radio
transmission in the GHz range (e.g., 2.4 GHz in the license-
free ISM band).
ā€¢ Infrared technology:
ā€¢ It allows computing devices to communicate via short-range
wireless signals
ā€¢ Infrared networks were designed to support direct two-
computer connections only, created temporarily as the need
arises. However, extensions to infrared technology also
support more than two computers and semi-permanent
networks.
ā€¢ Infrared network signals cannot penetrate walls or other
obstructions and work only in the direct "line of sightā€
ā€“ IrDA-SIR (slow speed) infrared supporting data rates up to 115 Kbps
ā€“ IrDA-MIR (medium speed) infrared supporting data rates up to 1.15 Mbps
ā€“ IrDA-FIR (fast speed) infrared supporting data rates up to 4 Mbps
ā€¢ Radio transmission:
ā€¢ It include the long-term experiences made with radio
transmission for wide area networks (e.g., microwave links)
and mobile cellular phones.
ā€¢ Radio transmission can cover larger areas and can penetrate
(thinner) walls, furniture, plants etc.
ā€¢ Additional coverage is gained by reļ¬‚ection. Radio typically
does not need a LOS if the frequencies
ā€¢ Furthermore, current radio-based products offer much higher
transmission rates (e.g., 54 Mbit/s)
ā€¢ Interference & limited range of license free bands
Infrastructure-based wireless
networks
ā€¢ Communication takes place only between the wireless nodes
and the access point
ā€¢ The access point does not just control medium access, but also
acts as a bridge to other wireless or wired networks.
ā€¢ Infrastructure-based networks lose some of the ļ¬‚exibility
wireless networks can offer, e.g., they cannot be used for
disaster relief in cases where no infrastructure is left.
Ad-hoc wireless networks
ā€¢ Nodes within an ad-hoc network can only communicate if they
can reach each other physically
ā€¢ In ad-hoc networks, the complexity of each node is higher
because every node has to implement medium access
mechanisms, mechanisms to handle hidden or exposed
terminal problems
The transmission range of A reaches B, but
not C (the detection range does not
reach C either). The transmission range of
C reaches B, but not A. Finally, the
transmission range of B reaches A and C,
i.e., A cannot detect C and vice versa.
ā€¢ A starts sending to B, C does not receive this transmission. C
also wants to send something to B and senses the medium. The
medium appears to be free, the carrier sense fails. C also starts
sending causing a collision at B. But A cannot detect this
collision at B and continues with its transmission. A is hidden
for C and vice versa.
ā€¢ B sends something to A and C wants to transmit data to some
other mobile phone outside the interference ranges of A and B.
C senses the carrier and detects that the carrier is busy (Bā€™s
signal). C postpones its transmission until it detects the
medium as being idle again.
System architecture
ā€¢ The components of an infrastructure and a wireless part as specified for
IEEE 802.11. Several nodes, called stations (STAi), are connected to
access points (AP).
ā€¢ Stations are terminals with access mechanisms to the wireless medium and
radio contact to the AP.
ā€¢ The stations and the AP which are within the same radio coverage form a
basic service set (BSSi)
ā€¢ A distribution system connects several BSSs via the AP to form a single
network and thereby extends the wireless coverage area. This network is
now called an extended service set (ESS)
ā€¢ The APs support roaming (i.e., changing access points), the
distribution system handles data transfer between the different
APs.
ā€¢ APs provide synchronization within a BSS, support power
management, and can control medium access to support time-
bounded service.
ā€¢ Wireless access points (APs or WAPs) are specially
configured nodes on wireless local area networks (WLANs).
Access points act as a central transmitter and receiver of
WLAN radio signals.
Mobile ip
ā€¢ Systems like GSM have been designed with mobility in mind,
the internet started at a time when no one had thought of
mobile computers
ā€¢ IP is the common base for thousands of applications and runs
over dozens of different networks. This is the reason for
supporting mobility at the IP layer; mobile phone systems, for
example, cannot offer this type of mobility for heterogeneous
networks.
ā€¢ To merge the world of mobile phones with the internet and to
support mobility in the small more efļ¬ciently, so-called micro
mobility protocols have been developed.
ā€¢ Entities and terminology:
ā€¢ Mobile node (MN): A mobile node is an end-system or router
that can change its point of attachment to the internet using
mobile IP. The MN keeps its IP address and can continuously
communicate with any other system in the internet as long as
link-layer connectivity is given.
ā€¢ Mobile nodes are not necessarily small devices such as laptops
with antennas or mobile phones; a router onboard an aircraft
can be a powerful mobile node.
ā€¢ Correspondent node (CN): At least one partner is needed for
communication. In the following the CN represents this
partner for the MN. The CN can be a ļ¬xed or mobile node.
ā€¢ Home network: The home network is the subnet the MN
belongs to with respect to its IP address. No mobile IP support
is needed within the home network.
ā€¢ Foreign network: The foreign network is the current subnet the
MN visits and which is not the home network.
ā€¢ Care-of address (COA): The COA defines the current location
of the MN from an IP point of view.
Packet delivery to and from the mobile node
ā€¢ Advantage:
ā€¢ Mobile IP provides users the freedom to roam beyond their
home subnet while consistently maintaining their home IP
address.
ā€¢ This enables transparent routing of IP datagrams to mobile
users during their movement, so that data sessions can be
initiated to them while they roam; it also enables sessions to be
maintained in spite of physical movement between points of
attachment to the Internet or other networks
Satellite systems
ā€¢ Satellites offer global coverage without wiring costs for base
stations and are almost independent of varying population
densities.
ā€¢ Satellite communication began after the Second World War
ā€¢ 1957, SPUTNIK- first satellite by soviet union
ā€¢ 1960-ECHO (it enables communication by reflecting signals)
ā€¢ 1963-SYNCOM(geostationary satellite)
ā€¢ 1965-INTELSAT1 (first commercial geostationary satellite)
ā€¢ Applications :
ā€¢ Weather forecasting: Without the help of satellites, the
forecasting of hurricanes would be impossible
ā€¢ Radio and TV broadcast satellites:
ā€¢ Military satellites: Many communication links are managed
via satellite because they are much safer from attack by
enemies.
ā€¢ Satellites for navigation:
ā€¢ Within the footprint, communication with the satellite is
possible for mobile users via a mobile user link (MUL)
ā€¢ Base station controlling the satellite and acting as gateway to
other networks via the gateway link (GWL)
ā€¢ Satellites may be able to communicate directly with each other
via intersatellite links (ISL)
ā€¢ Footprint can be defined as the area on earth where the signals
of the satellite can be received.
ā€¢ The loss L depending on the distance r between sender and
receiver can be calculated as:
f being the carrier frequency and c the speed of light
ā€¢ Different types of orbits can be identiļ¬ed:
ā€¢ Geostationary (or geosynchronous) earth orbit (GEO): GEO satellites have
a distance of almost 36,000 km to the earth. Examples are almost all TV
and radio broadcast satellites, many weather satellites and satellites
operating as backbones for the telephone network
ā€¢ Medium earth orbit (MEO): MEOs operate at a distance of about 5,000ā€“
12,000 km. eg, navigation
ā€¢ Low earth orbit (LEO): While some time ago LEO satellites were mainly
used for espionage, several of the new satellite systems now rely on this
class using altitudes of 500ā€“1,500 km
Wireless local loop
ā€¢ Wireless Local Loop: adopting radio as the transmission
medium
ā€¢ WLL is a technology that uses radio signals to substitute for
copper wires
ā€¢ WLL services are referred as fixed cellular services
ā€¢ FSU (Fixed Subscriber Unit) : interface between subscriberā€™s
wired devices and WLL network
ā€¢ A BSC controls one or more BTS and provide an interface to
the local exchange (switch) in the central office.
Connection Setup
PSTN
Switch
function
WLL
Controller
AM
HLR
Transceiver WASU
Trunk
Air
Interface
TWLL
Wireless Access Network Unit(WANU)
ā€“ Interface between underlying telephone
network and wireless link
ā€“ consists of
ā€¢ Base Station Transceivers (BTS)
ā€¢ Radio Controller(RPCU)
ā€¢ Access Manager(AM)
ā€¢ Home Location Register(HLR)
WANU
Wireless Access Subscriber
Unit(WASU)
ā€“ located at the subscriber
ā€“ translates wireless link into a
traditional telephone connection
Wireless in Local Loop (WLL) Mobile
Telephone Connections
ā€¢ BSNL WLL-M is a communication system that connects
customers to the The BSNL Landlinenetwork using radio
frequency signals instead of conventional copper wires, for the
full or part connection between the subscriber and the
exchange
ā€¢ This comes with superior voice quality and high speed data
capabilities.
ā€¢ CDMA is popular with more than 100 million subscribers
worldwide, and the number keeps on increasing exponentially.
Sensor networks
ā€¢ A sensor network is an infrastructure comprised of sensing
(measuring), computing, and communication elements that
gives an administrator the ability to instrument, observe, and
react to events and phenomena in a speciļ¬ed environment.
ā€¢ Sensor devices, or wireless nodes (WNs), are also (sometimes)
called motes
ā€¢ IEEE 802.15.4 operates in the 2.4-GHz industrial, scientiļ¬c,
and medical (ISM) radio band and supports data transmission
at rates up to 250 kbps at ranges from 30 to 200 ft.
ā€¢ ZigBee/IEEE 802.15.4 is designed to complement wireless
technologies such as Bluetooth, Wi-Fi, and ultra-wideband
(UWB), and is targeted at commercial point-to-point sensing
applications where cabled connections are not possible and
where ultralow power and low cost are requirements
Typical sensing node
Micaz mote
Macro mote
MicaZ mote Moteiv Corporation's Tmote Sky
Cricket Mote
Sink
Sensors Field
Medical
Monitoring
Indoor
Control
Wireless Sensor Network
ā€¢ Elements
ā€“ Sink : sends queries and collects data from sensors
ā€“ Sensor : monitors phenomenon and reports to sink
Applications
Environment
Monitoring
Object
Tracking
Challenges for WSNs
ā€¢ Quality of Service In some cases, only occasional delivery of
a packet can be more than enough; in other cases, very high
reliability requirements exist.
ā€¢ In yet other cases, delay is important when actuators are to be
controlled in a real-time fashion by the sensor network.
ā€¢ Fault tolerance Since nodes may run out of energy or might
be damaged, or since the wireless communication between two
nodes can be permanently interrupted, it is important that the
WSN as a whole is able to tolerate such faults.
ā€¢ To tolerate node failure, redundant deployment is necessary,
using more nodes than would be strictly necessary if all nodes
functioned correctly.
ā€¢ Lifetime In many scenarios, nodes will have to rely on a
limited supply of energy (using batteries). Replacing these
energy sources in the ļ¬eld is usually not practicable, and
simultaneously, a WSN must operate at least for a given
mission time or as long as possible.
ā€¢ Hence, the lifetime of a WSN becomes a very important ļ¬gure
of merit. Evidently, an energy-efļ¬cient way of operation of the
WSN is necessary.
ā€¢ Maintainability As both the environment of a WSN and the
WSN itself change (depleted batteries, failing nodes, new
tasks), the system has to adapt.
ā€¢ It has to monitor its own health and status to change
operational parameters or to choose different trade-offs (e.g. to
provide lower quality when energy resource become scarce).
ā€¢ Scalability Since a WSN might include a large number of
nodes, the employed architectures and protocols must be able
scale to these numbers
ā€¢ Generic protocol stack for sensor networks:
ā€¢ Physical Layer : Can provide an interface to transmit a stream
of bits over physical medium. Responsible for frequency
selection, carrier frequency generation, signal detection,
Modulation and data encryption.
ā€¢ MAC layer: Responsible for Channel access policies,
scheduling, buffer management and error control. In WSN we
need a MAC protocol to consider energy efficiency, reliability,
low access delay and high throughput as a major priorities
ā€¢ Network layer: The major function of this layer is routing.
This layer has a lot of challenges depending on the application
but apparently, the major challenges are in the power saving,
limited memory and buffers, and have to be self organized.
ā€¢ Transport layer: The function of this layer is to provide
reliability and congestion avoidance
ā€¢ Application layer: Responsible for traffic management and
provide software for different applications that translate the
data in an understandable form or send queries to obtain
certain information.
Sensors Vs Conventional Networks
Property Conventional Sensor
Power Unlimited power
(power supply)
Battery-powered
processing fast processors
3.4GHz
Severely Constrained
16MHz
Memory Large Memory
2GB RAM
Severely constrained
4-10KB of RAM
Communication Wired/wireless Wireless
Topology Structured Ad-hoc
Scalability Highly-Scalable Scalable to certain extent
Security Developed & extensive Requires more developments
Life-time Unlimited Limited
Peer to Peer networks
ā€¢ Client/Server Limitations:
ā€¢ Scalability is hard to achieve
ā€¢ Presents a single point of failure
ā€¢ Requires administration
ā€¢ P2P Computing:
ā€¢ P2P computing is the sharing of computer resources and
services by direct exchange between systems.
ā€¢ All nodes are both clients and servers
ā€¢ Provide and consume data
ā€¢ Any node can initiate a connection
ā€¢ No centralized data source
ā€¢ P2P Network Characteristics:
ā€¢ Clients are also servers and routers
ā€¢ Nodes are autonomous (no administrative authority)
ā€¢ Network is dynamic: nodes enter and leave the network
ā€œfrequentlyā€
ā€¢ P2P Benefits
ā€¢ Efficient use of resources
ā€¢ Scalability
ā€¢ Reliability
ā€“ No single point of failure
ā€¢ Ease of administration
ā€“ No need to deploy servers to satisfy demand
ā€¢ Popular P2P Systems:
ā€¢ Napster, Gnutella, Kazaa, Freenet
ā€¢ Large scale sharing of files.
ā€¢ User A makes files (music, video, etc.) on their computer
available to others
ā€¢ User B connects to the network, searches for files and
downloads files directly from user A
ā€¢ Drawback:
ā€¢ Issues of copyright infringement
Napster (search ā€“ centralized & file
transferā€“ P2P)
ļ‚§A way to share music files with
others
ā€¢ Users upload their list of files to
Napster server
ā€¢You send queries to Napster server for
files of interest -- Keyword search (artist,
song, album,etc.)
ā€¢Napster server replies with IP address of
users with matching files
ā€¢You connect directly to user A to download
file
Gnutella
ļ‚§Share any type of files
(not just music)
ā€¢You ask your neighbours
for files of interest
ā€¢Neighbours ask their neighbours,
and so on
ā€¢ TTL field quenches messages
after a number of hops
ā€¢Users with matching files
reply to you
Mobile routing protocols
ā€¢ Mobile networks can be classified into infrastructure networks
and mobile ad hoc networks (MANETs) according to their
dependence on fixed infrastructures.
ā€¢ In an infrastructure mobile network, mobile nodes have wired
access points (or base stations) within their transmission range.
ā€¢ The access points compose the backbone for an infrastructure
network.
ā€¢ In contrast, mobile ad hoc networks are autonomously self-
organized networks without infrastructure support.
ā€¢ In a mobile ad hoc network, nodes move arbitrarily; therefore
the network may experience rapid and unpredictable topology
changes.
ā€¢ Types of routing protocols:
ā€¢ In proactive routing protocols, the routes to all the destinations
(or parts of the network) are determined at the start-up and
maintained by using a periodic route update process.
ā€¢ In reactive protocols, routes are determined when they are
required by the source using a route discovery process.
ā€¢ Hybrid routing protocols combine the basic properties of two
classes of protocols into one. That is, they are both reactive
and proactive in nature.
Ad Hoc On-Demand Distance
Vector (AODV)
ā€¢ AODV belongs to the class of Distance Vector Routing
Protocols (DV). In a DV every node knows its neighbours and
the costs to reach them. A node maintains its own routing
table, storing all nodes in the network, the distance and the
next hop to them.
ā€¢ The Ad Hoc On-Demand Distance Vector (AODV) algorithm
enables dynamic, self-starting, multihop routing between
participating mobile nodes wishing to establish and maintain
an ad hoc network.
ā€¢ AODV allows mobile nodes to obtain routes quickly for new
destinations, and does not require nodes to maintain routes to
destinations that are not in active communication.
ā€¢ AODV allows mobile nodes to respond quickly to link
breakages and changes in network topology.
ā€¢ AODV uses symmetric links between neighboring nodes. It
does not attempt to follow paths between nodes when one of
the nodes cannot hear the other one.
ā€¢ Path Discovery:
ā€¢ The path discovery process is initiated whenever a source node
needs to communicate with another node for which it has no
routing information in its table.
ā€¢ Every node maintains two separate counters: a node sequence
number and a broadcast ID.
ā€¢ The source node initiates path discovery by broadcasting a
Route REQuest (RREQ) packet to its neighbors.
ā€¢ The RREQ contains the following fields:
ā€¢ <source_addr source sequence# broadcast id dest_addr dest
sequence# hop cnt>
t sequence number rece
ā€¢ J Join flag; reserved for multicast.
ā€¢ R Repair flag; reserved for multicast.
ā€¢ G Gratuitous RREP flag
ā€¢ Reserved Sent as 0; ignored on reception.
ā€¢ Hop Count The number of hops from the Source IP Address to
the node handling the request.
ā€¢ Flooding ID A sequence number uniquely identifying the
particular RREQ when taken in conjunction with the source
node's IP address.
ā€¢ Destination IP Address The IP address of destination for which
a route is desired.
ā€¢ Destination Sequence Number The last sequence number
received in the past by the source for any route towards the
destination.
ā€¢ Source IP Address The IP address of the node which
originated the Route Request.
ā€¢ Source Sequence Number The current sequence number to
be used for route entries pointing to (and generated by) the
source of the route request.
ā€¢ broadcast_id is incremented whenever the source issues a
new RREQ.
ā€¢ Each neighbor either satisfies the RREQ by sending a Route
REPly (RREP) back to the source, or broadcasts the RREQ to
its own neighbors after increasing the hop_cnt.
ā€¢ Notice that a node may receive multiple copies of the same
route broadcast packet from various neighbors.
ā€¢ When an intermediate node receives an RREQ, if it has
already received an RREQ with the same broadcast_id and
source address, it drops the redundant RREQ and does not
rebroadcast it.
ā€¢ If a node cannot satisfy the RREQ, it keeps track of the
following information to implement the reverse-path setup as
well as the forward-path setup that will accompany the
transmission of the eventual RREP.
ā€¢ Destination IP address
ā€¢ Source IP address
ā€¢ Broadcast ID
ā€¢ Expiration time for reverse-path route entry
ā€¢ Source nodeā€™s sequence number
ā€¢ Reverse-Path Setup:
ā€¢ There are two sequence numbers (in addition to the
broadcast_id) included in an RREQ:
ā€¢ the source sequence number and the last destination sequence
number known to the source
ā€¢ As the RREQ travels from a source to various destinations, it
automatically sets up the reverse path from all nodes back to
the source.
ā€¢ To set up a reverse path, a node records the address of the
neighbor from which it received the first copy of the RREQ.
ā€¢ Forward-Path Setup:
ā€¢ If an intermediate node has a route entry for the desired
destination, it determines whether the route is current by
comparing the destination sequence number in its own route
entry to the destination sequence number in the RREQ.
ā€¢ If the RREQā€™s sequence number for the destination is greater
than that recorded by the intermediate node, the intermediate
node must not use its recorded route to respond to the RREQ.
Instead, the intermediate node rebroadcasts the RREQ.
ā€¢ The intermediate node can reply only when it has a route with
a sequence number that is equal or greater to that contained in
the RREQ.
ā€¢ If it does have a current route to the destination and if the
RREQ has not been processed previously, the node then
unicasts a route reply packet (RREP) back to its neighbor from
which it received the RREQ.
ā€¢ An RREP contains the following information:
ā€¢ <source_addr, dest_addr, dest_sequence #, hop_cnt, lifetime>
ā€¢ The forward path setup as the RREP travels from the
destination D to the source node S. Nodes that are not along
the path determined by the RREP will time out after
ACTIVE_ROUTE_TIMEOUT (3000 milliseconds) and will
delete the reverse pointers.
ā€¢ Type 2
ā€¢ R Repair flag; used for multicast.
ā€¢ A Acknowledgment required
ā€¢ Reserved Sent as 0; ignored on reception.
ā€¢ Prefix Size If nonzero, the 5-bit Prefix Size specifies that the
indicated next hop may be used for any nodes with the same
routing prefix
(The Prefix Size Field indicates the nodes within a
destination's subnet that are reachable via the same route.)
ā€¢ Lifetime The time for which nodes receiving the RREP
consider the route to be valid.
ā€¢ Type 3
ā€¢ N No delete flag; set when a node has performed a local
repair of a link, and upstream nodes should not delete the
route.
ā€¢ Reserved Sent as 0; ignored on reception.
ā€¢ DestCount The number of unreachable destinations included
in the message; MUST be at least 1.
ā€¢ Unreachable Destination IP Address The IP address of the
destination which has become unreachable due to a link
break.
ā€¢ Unreachable Destination Sequence Number The last known
sequence number, incremented by one,
ā€¢ Local Connectivity Management:
ā€¢ Hello message, a special RREP containing its identity and
sequence number. The nodeā€™s sequence number is not changed
for Hello message transmissions.
ā€¢ Receiving a broadcast or a Hello message from a new
neighbor or failing to receive Hello messages from a node
previously in the neighborhood is an indication that the local
connectivity has changed.
ā€¢ The local connectivity management with Hello messages can
also be used to ensure that only nodes with bidirectional
connectivity are considered to be neighbors.
Route Requests in AODV
B
A
S E
F
H
J
D
C
G
I
K
Represents transmission of RREQ
Z
Y
Broadcast transmission
M
N
L
Route Requests in AODV
B
A
S E
F
H
J
D
C
G
I
K
Represents links on Reverse Path
Z
Y
M
N
L
Reverse Path Setup in AODV
B
A
S E
F
H
J
D
C
G
I
K
ā€¢ Node C receives RREQ from G and H, but does not forward
it again, because node C has already forwarded RREQ once
Z
Y
M
N
L
Reverse Path Setup in AODV
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
Reverse Path Setup in AODV
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
ā€¢ Node D does not forward RREQ, because node D
is the intended target of the RREQ
M
N
L
Forward Path Setup in AODV
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
Forward links are setup when RREP travels along
the reverse path
Represents a link on the forward path
Dynamic Source Routing (DSR)
Protocol
ā€¢ The DSR Protocol is composed of two mechanisms:
ā€¢ Route discovery is the mechanism by which a node S wishing
to send a packet to a destination node D obtains a source route
to D. Route discovery is used only when S attempts to send a
packet to D and does not already know a route to D.
ā€¢ Route maintenance is the mechanism by which node S is able
to detect, while using a source route to D, if the network
topology has changed such that it can no longer use its route to
D because a link along the route no longer works.
ā€¢ This entirely on-demand behavior and lack of periodic activity
allow the number of overhead packets caused by DSR to scale
all the way down to zero.
ā€¢ ā€œIn response to a single route discovery a node may learn and
cache multiple routes to any destinationā€.
ā€¢ The operations of route discovery and route maintenance in
DSR are designed to allow unidirectional links and
asymmetric routes to be easily supported (in wireless networks, it
is possible that a link between two nodes may not work equally well in
both directions, due to differing antenna or propagation patterns or sources
of interference)
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
Represents a node that has received RREQ for D from S
M
N
L
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Represents transmission of RREQ
Z
Y
Broadcast transmission
M
N
L
[S]
[X,Y] Represents list of identifiers appended to RREQ
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
ā€¢ Node H receives packet RREQ from two neighbors:
potential for collision
Z
Y
M
N
L
[S,E]
[S,C]
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
ā€¢ Node C receives RREQ from G and H, but does not forward
it again, because node C has already forwarded RREQ once
Z
Y
M
N
L
[S,C,G]
[S,E,F]
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
ā€¢ Nodes J and K both broadcast RREQ to node D
ā€¢ Since nodes J and K are hidden from each other, their
transmissions may collide
N
L
[S,C,G,K]
[S,E,F,J]
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
ā€¢ Node D does not forward RREQ, because node D
is the intended target of the route discovery
M
N
L
[S,E,F,J,M]
RREQ
ā€¢ Opt Data Len --- 8-bit unsigned integer.
ā€¢ Identification A unique value generated by the initiator
(original sender) of the Route Request.
ā€¢ Address[1..n] Address[i] is the IPv4 address of the i-th node
recorded in the Route Request option.
Route Discovery in DSR
ā€¢ Destination D on receiving the first RREQ,
sends a Route Reply (RREP)
ā€¢ RREP is sent on a route obtained by reversing
the route appended to received RREQ
ā€¢ RREP includes the route from S to D on which
RREQ was received by node D
Route Reply in DSR
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
RREP [S,E,F,J,D]
Represents RREP control message
RREP
ā€¢ Last Hop External (L) it denotes that the last hop indicated by
the DSR Source Route option
Dynamic Source Routing (DSR)
ā€¢ Node S on receiving RREP, caches the route included in the
RREP
ā€¢ When node S sends a data packet to D, the entire route is
included in the packet header
ā€“ hence the name source routing
ā€¢ Intermediate nodes use the source route included in a packet to
determine to whom a packet should be forwarded
Route Error
ā€¢ Option Type 3. Nodes not understanding this option will
ignore this option.
ā€¢ Error Type
ā€¢ 1 = NODE_UNREACHABLE
ā€¢ 2=FLOW_STATE_NOT_SUPPORTED
ā€¢ 3 = OPTION_NOT_SUPPORTED
ā€¢ Packet Salvage if route is broken (from A to E) the neighbor
(C) salvage the packet (after sending Rerr) by checking itā€™s
own cache to see if it has route to target (E) and replacing the
packetā€™s route with the new
Data Delivery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Z
Y
M
N
L
DATA [S,E,F,J,D]
Packet header size grows with route length
Route maintenance
ā€¢ Passive Acknowledgments
ā€“ Half duplex operation: transmit packet, go into
receive mode, receive ack, receive next packet, go
into transmit mode, repeat
ā€“ Original sender hears forwarding transmission
from next hop node in the route:
D E F
D transmits to E E transmits to F
D hears E to F transmission
as implicit ACK
Mobility Models
ā€¢ A mobility model should attempt to mimic the movements of
real mobile nodes. Changes in speed and direction must occur,
and they must occur in reasonable time slots.
ā€¢ For example, we would not want mobile nodes to travel in
straight lines at constant speeds, because real mobile nodes
would not travel in such a restricted manner.
ā€¢ Mobility models mainly are of two types:
1. Entity Mobility Model
2. Group Mobility Model
ā€¢ Entity Mobility Model:
ā€¢ Entity Mobility Models represent mobile nodes whose
movements are independent of each other. Examples of Entity
Mobility Models are as follows:
ā€¢ Random Walk Mobility Model: A simple mobility model based
on random directions and speeds
ā€¢ Random Waypoint Mobility Model: A model that includes
pause times between changes in destination and speed
ā€¢ Random Direction Mobility Model: A model that forces Mobile
Nodes (MNs) to travel to the edge of the simulation area
before changing direction and speed
ā€¢ City Section Mobility Model: A simulation area that represents
streets within a city
Classification of Mobility
Patterns
ā€¢ Deterministic Mobility Model
ā€¢ The Deterministic Mobility Model describes the most
predictable type of motion and is the most simplistic of all
mobility models.
ā€¢ A sample scenario resembling a Deterministic Mobility Model
would be cars moving in an urban traffic area, where the speed
of the cars is restricted and the direction in which the cars can
move is also predefined, that is, either in a straight line or
turning only at cross lights.
ā€¢ Semideterministic Mobility Pattern:
ā€¢ Consider, for example, a battalion of battle tanks marching
ahead. Here, the path followed by each tank is not specified,
but they do move in a general direction (i.e., toward the war
front).
ā€¢ Even though the individual tanks do not have a specified
direction, we can see a general pattern of a column evolving
out of it. Such a mobility pattern is termed a ā€œColumn Model.ā€
ā€¢ Random Mobility Pattern:
ā€¢ This motion is totally stateless, that is, the future movement
here is completely independent of the past movement and
hence there are no bounds imposed on the max deviation
which the nodes can take up for their next movement.
ā€¢ And this randomness in choosing the next direction vector
renders this type of motion completely unpredictable.
Random Walk
ā€¢ In this mobility model, an MN moves from its current location
to a new location by randomly choosing a direction and speed
in which to travel.
ā€¢ The new speed and direction are both chosen from pre-deļ¬ned
ā€¢ ranges, [speedmin; speedmax] and [0;2Ļ€] respectively. Each
movement in the Random Walk Mobility Model occurs in
either a constant time interval t or a constant distance traveled
d, at the end of which a new direction and speed are
calculated.
ā€¢ If an MN which moves according to this model reaches a
simulation boundary, it ā€œbouncesā€ off the simulation border
with an angle determined by the incoming direction. The MN
then continues along this new path.
ā€¢ The Random Walk Mobility Model is a memoryless mobility
pattern because it retains no knowledge concerning its past
locations and speed values .
ā€¢ The current speed and direction of an MN is independent of its
past speed and direction . This characteristic can generate
unrealistic movements such as sudden stops and sharp turns.
Random Waypoint Model
ā€¢ The Random Waypoint Model was first proposed by Johnson
and Maltz. Soon, it became a ā€œbenchmarkā€ mobility model to
evaluate the MANET routing protocols because of its
simplicity and wide availability.
ā€¢ The Random Waypoint Mobility Model includes pause times
between changes in direction and/or speed.
ā€¢ The implementation of this mobility model is as follows:
ā€¢ As the simulation starts, each mobile node randomly selects
one location in the simulation field as the destination.
ā€¢ It then travels toward this destination with constant velocity
chosen uniformly and randomly from [0,Vmax], where the
parameter Vmax is the maximum allowable velocity for every
mobile node.
ā€¢ The velocity and direction of a node are chosen independently
of other nodes.
ā€¢ Upon reaching the destination, the node stops for a duration
defined by the ā€œpause timeā€ parameter Tpause.
ā€¢ If Tpause = 0, this leads to continuous mobility.
ā€¢ After this duration, it again chooses another random
destination in the simulation field and moves toward it.
ā€¢ The whole process is repeated again and again until the
simulation ends.
Node movement in the Random
Waypoint Model
ā€¢ Limitations of the Random Waypoint Model:
ā€¢ Temporal Dependency of Velocity
ā€“ the velocity at the current epoch is independent of the previous epoch.
Thus, some extreme mobility behavior, such as sudden stopping,
sudden accelerating, and sharp turning, may frequently occur in the
trace generated by the Random Waypoint Model.
ā€¢ Spatial Dependency of Velocity
ā€“ in some scenarios, including battlefield communication and museum
touring, the movement pattern of a mobile node may be influenced by a
certain specific ā€œleaderā€ node in its neighborhood. Hence, the mobility
of various nodes is indeed correlated.
ā€¢ Geographic Restrictions of Movement
ā€“ in many realistic cases, especially the applications used in urban areas,
the movement of a mobile node may be bounded by obstacles,
buildings, streets, or freeways.
Random Direction
ā€¢ In this model, MNs choose a random direction in which to
travel similar to the Random Walk Mobility Model.
ā€¢ An MN then travels to the border of the simulation area in that
direction. Once the simulation boundary is reached, the MN
pauses for a speciļ¬ed time, chooses another angular direction
(between 0 and 180 degrees) and continues the process.
City Section Mobility Model
ā€¢ In the City Section Mobility Model, the simulation area is a
street network that represents a section of a city where the ad
hoc network exists
ā€¢ The streets and speed limits on the streets are based on the
type of city being simulated.
ā€¢ Each MN begins the simulation at a deļ¬ned point on some
street. An MN then randomly chooses a destination, also
represented by a point on some street. The movement
algorithm from the current destination to the new destination
locates a path corresponding to the shortest travel time
between the two points; in addition, safe driving characteristics
such as a speed limit and a minimum distance allowed
between any two MNs exists.
ā€¢ Upon reaching the destination, the MN pauses for a speciļ¬ed
time and then randomly chooses another destination (i.e., a
point on some street) and repeats the process.
Group Mobility Model
ā€¢ Exponential Correlated Random Mobility Model: A group
mobility model that uses a motion function to create
movements
ā€¢ Column Mobility Model: A group mobility model where the
set of MNs form a line and are uniformly moving forward in a
particular direction
ā€¢ Nomadic Community Mobility Model: A group mobility
model where a set of MNs move together from one location to
another.
ā€¢ Pursue Mobility Model: A group mobility model where a set of
MNs follow a given target.
ā€¢ Reference Point Group Mobility Model: A group mobility
model where group movements are based upon the path
traveled by a logical center.
Exponential Correlated
Random Mobility Model
ā€¢ The ļ¬rst group mobility models to be proposed is the
Exponential Correlated Random Mobility Model.
ā€¢ In this model, a motion function is used to create MN
movements.
ā€¢ Given a position (MN or group) at time t, b(t) is used to deļ¬ne
the next position (MN or group) at time t +1, b(t +1):
ā€¢ where Ļ„ adjusts the rate of change from the MNā€™s previous
location to its new location
ā€¢ r is a random Gaussian variable with variance Ļƒ
Column Mobility Model
ā€¢ This model represents a set of MNs that move around a given
line (or column), which is moving in a forward direction (e.g.,
a row of soldiers marching together towards their enemy).
ā€¢ For the implementation of this model, an initial reference grid
(forming a column of MNs) is deļ¬ned
ā€¢ Each MN is then placed in relation to its reference point in the
reference grid; the MN is then allowed to move randomly
around its reference point via an entity mobility model.
advance_vector is a predeļ¬ned offset that
moves the reference grid.
The predeļ¬ned offset that moves the
reference grid is calculated via a random
distance and a random angle (between 0
and Ļ€ since movement is in a forward
direction only)
Nomadic Community Mobility
Model
ā€¢ Just as ancient nomadic societiesmoved fromlocation to location, the
Nomadic CommunityMobilityModel represents groups of MNs that
collectively move from one point to another
ā€¢ Within each community or group of MNs, individuals maintain their own
personal ā€spacesā€ where they move in random ways.
ā€¢ For example, consider a class of students touring an art museum. The class
would move from one location to another together; however, the students
within the class would roam around a particular location individually.
ā€¢ in the Nomadic Community Mobility Model, the MNs may be allowed to
travel for 60 seconds before changing direction and speed.
Pursue Mobility Model
ā€¢ The Pursue Mobility Model attempts to represent MNs
tracking a particular target.
ā€¢ For example, this model could represent police ofļ¬cers
attempting to catch an escaped criminal. The Pursue Mobility
Model consists of a single update equation for the new
position of each MN:
Reference Point Group
Mobility Model
ā€¢ Reference Point Group
Mobility Model
ā€“ Group movements are based
on the path traveled by a
logical center for the group
ā€“ GM: Group Motion Vector
ā€“ RM: Random Motion Vector
ā€“ Random motion of individual
node is implemented by
Random Waypoint without
Pause
ā€¢ The new position for each MN is then calculated by summing
a random motion vector, RM, with the new reference point.
ā€¢ The length of RM is uniformly distributed within a speciļ¬ed
radius centered at RP(t +1) and its direction is uniformly
distributed between 0 and 2Ļ€.
Location Aided Routing
ā€¢ It makes use of location information to reduce routing
overhead. Location information used in the LAR protocol may
be provided by the Global Positioning System (GPS)
ā€¢ Assumption:
ā€“ Each host knows its current location precisely (i.e., no error)
Problem
A
B
E
C
X
S D
D
C
X
S D
C
S
D
C
X
S
t0
t1
ā€¢ As the route request is propagated to various nodes, the path
followed by the request is included in the route request packet.
Using the above ļ¬‚ooding algorithm, provided that the intended
destination is reachable from the sender, the destination should
eventually receive a route request message.
ā€¢ On receiving the route request, the destination responds by
sending a route reply message to the sender the route reply
message follows a path that is obtained by reversing the path
followed by the route request received by D (the route request
message includes the path traversed by the request).
ā€¢ It is possible that the destination will not receive a route
request message (for instance, when it is unreachable from the
sender, or route requests are lost due to transmission errors). In
such cases, the sender needs to be able to reinitiate route
discovery.
Route Discovery Using Flooding
A
B
C
E
X
S D
route request
route reply
ā€¢ Therefore, when a sender initiates route discovery, it sets a
timeout. If during the timeout interval, a route reply is not
received, then a new route discovery is initiated (the route
request messages for this route discovery will use a different
sequence number than the previous route discovery ā€“ recall
that sequence numbers are useful to detect multiple receptions
of the same route request).
ā€¢ Timeout may occur if the destination does not receive a route
request, or if the route reply message from the destination is
lost
ā€¢ Location-Aided Routing (LAR), as it makes use of location
information to reduce routing overhead. Location information
used in the LAR protocol may be provided by the Global
Positioning System (GPS).
ā€¢ With the availability of GPS,it is possible for a mobile host to
know its physical location
ā€¢ Expected zone and request zone
ā€¢ Consider a node S that needs to ļ¬nd a route to node D. Assume
that node S knows that node D was at location L at time t0,
and that the current time is t1.
ā€¢ Then, the ā€œexpected zoneā€ of node D, from the view-point of
node S at time t1, is the region that node S expects to contain
node D at time t1.
ā€¢ Node S can determine the expected zone based on the
knowledge that node D was at location L at time t0. For
instance, if node S knows that node D travels with average
speed v,then S may assume that the expected zone is the
circular region of radius v(t1 - t0), centered at location L
ā€¢ If node S does not know a previous location of node D, then
node S cannot reasonably determine the expected zone ā€“ in
this case, the entire region that may potentially be occupied by
the ad hoc network is assumed to be the expected zone.
ā€¢ In this case, the algorithm reduces to the basic ļ¬‚ooding
algorithm.
ā€¢ Request zone:
ā€¢ Limited flooding
ā€¢ A node forwards a route request only if it belongs to the
request zone
ā€¢ The request zone should include
ā€¢ expected zone
ā€¢ other regions around the expected zone
LAR Scheme 1
ā€¢ Assume that node S knows that node D was at location (Xd,
Yd) at time t0. At time t1, node S initiates a new route
discovery for destination D. We assume that node S also
knows the average speed v with which D can move. Using
this, node S deļ¬nes the expected zone at time t1 to be the
circle of radius R = v(t1- t0) centered at location (Xd, Yd).
ā€¢ In our ļ¬rst LAR algorithm, we deļ¬ne the request zone to be
the smallest rectangle that includes current location of S and
the expected zone (the circular region deļ¬ned above), such
that the sides of the rectangle are parallel to the X and Y axes.
In ļ¬gure (a), the request zone is the rectangle whose corners
are S, A, B and C, whereas in ļ¬gure (b), the rectangle has
corners at point A, B, C and G ā€“ note that, in this ļ¬gure,
current location of node S is denoted as (Xs, Ys).
ā€¢ The source node S can, thus, determine the four corners of the
request zone. S includes their coordinates with the route
request message transmitted when initiating route discovery.
When a node receives a route request, it discards the request if
the node is not within the rectangle speciļ¬ed by the four
corners included in the route request.
ā€¢ When node D receives the route request message, it replies by
sending a route reply message (as in the ļ¬‚ooding algorithm).
However, in case of LAR, node D includes its current location
and current time in the route reply message.
ā€¢ When node S receives this route reply message (ending its
route discovery), it records the location of node D. Node S can
use this information to determine the request zone for a future
route discovery.
LAR Scheme 2
S knows the location (Xd, Yd) of node
D at time t0
Node S calculates its distance from
location (Xd, Yd): DISTs
Node I receives the route request,
calculates its distance from location (Xd,
Yd): DISTi
For some parameter Ī“,
If DISTs + Ī“ ā‰„ DISTi, node I replaces
DISKs by DISKi and forwards the
request to its neighbors; otherwise
discards the route request
ā€¢ In LAR scheme 1, source S explicitly speciļ¬es the request
zone in its route request message. In scheme 2, node S
includes two pieces of information with its route request:
ā€¢ Assume that node S knows the location (Xd, Yd) of node D at
some time to - the time at which route discovery is initiated by
node S is tl, where tl>= to. Node S calculates its distance from
location (Xd, Yd), denoted as DISTs, and includes this
distance with the route request message.
ā€¢ The coordinates (Xd, Yd) are also included with the route
ā€¢ request
ā€¢ When a node I receives the route request from sender node S,
node I calculates its distance from location (Xd, Yd),denoted
as DISTi, and
ā€¢ For some parameter Ī“ , if DISTs, + Ī“ > DISTi, then node I
forwards the request to its neighbors. When node I forwards
the route request it now includes DISTi and (Xd, Yd) in the
route request (ie., it replaces the DISTs, value received in the
route request by DISTi, before forwarding the route request).
ā€¢ Else DISTs + Ī“ < DISTi. In this case, node I discards the route
request
ā€¢ When some node J receives the route request (originated by
ā€¢ node S) from node I, it applies a criteria similar to above: If
node J has received this request previously, it discards the
request Otherwise, node J calculates its distance from (Xd,
Yd), denoted as DISTj. NOW,
ā€¢ The route request received from I includes DISTi. If
ā€¢ DISTi + Ī“ > DISTj, then node J forwards the request to its
neighbors (unless node J is the destination for the route
request).
ā€¢ Before forwarding the request J replaces the DISTi value in the
route request by DISTj.
ā€¢ Else DISTi + Ī“ < DISTj. In this case,node J discards the
request
Error in Location Estimate
ā€¢ Let e denote the maximum error in the
coordinates estimated by a node.
ā€¢ Modified LAR scheme 1
D (Xd, Yd)
e+v(t1-t0)
Expected Zone
ā€¢ However, in reality there may be some error in the estimated
location.
ā€¢ Let e denote the maximum error in the coordinates estimated
by a node. Thus, if a node N believes that it is at location (Xn,
Yn), then the actual location of node N may be anywhere in
the circle of radius e centered at (Xn, Yn).
ā€¢ In the above LAR schemes, we assume that node S obtained
the location (Xd, Yd) of node D at time t0, from node D
(perhaps in the route reply message during the previous route
discovery). Thus, node S does not know the actual location of
node D at time t0 ā€“ the actual location is somewhere in the
circle of radius e centered at (Xd, Yd).
ā€¢ To take the location error e into account, we modify LAR
scheme 1 so that the expected zone is now a circle of radius
e + v(t1- t0).
ā€¢ The request zone may now be bigger, as it must include the
larger request zone

More Related Content

Similar to Types o Wireless Networks in computer networks

Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanAbhishek Mahajan
Ā 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technologyshonaiqra
Ā 
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.pptraghul805834
Ā 
Presentation on different modes of data communication
Presentation on different modes of data communicationPresentation on different modes of data communication
Presentation on different modes of data communicationTafadzwa Gonera
Ā 
Week1
Week1Week1
Week1Mr SMAK
Ā 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete IntroductionDenis R
Ā 
Wireless Communication & Networking
Wireless Communication & NetworkingWireless Communication & Networking
Wireless Communication & NetworkingMohit Somani
Ā 
WNMC CH1.ppt
WNMC CH1.pptWNMC CH1.ppt
WNMC CH1.pptfisehacom
Ā 
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.pptLecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.pptMujahidHasan4
Ā 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptxOmar91305
Ā 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptxOmar91305
Ā 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsprojectteach
Ā 
ITFT_Wireless network
ITFT_Wireless networkITFT_Wireless network
ITFT_Wireless networkShilpa Sharma
Ā 
Wireless communication
Wireless communicationWireless communication
Wireless communicationsaujanya shah
Ā 
Wireless communications
Wireless communicationsWireless communications
Wireless communicationsArchana Dwivedi
Ā 
Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wirelessPrachi Patki
Ā 
Communication and Network Concepts
Communication and Network ConceptsCommunication and Network Concepts
Communication and Network ConceptsDev Chauhan
Ā 
HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002
HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002
HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002SOLOMONCHINAEMEUCHEA
Ā 
Lanmanandwanpptfinal 131121041622-phpapp02
Lanmanandwanpptfinal 131121041622-phpapp02Lanmanandwanpptfinal 131121041622-phpapp02
Lanmanandwanpptfinal 131121041622-phpapp02Vijay Vj
Ā 

Similar to Types o Wireless Networks in computer networks (20)

Wireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajanWireless communication by abhishek mmahajan
Wireless communication by abhishek mmahajan
Ā 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Ā 
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
10-Ch17-WirelessLANsTech_IEEE802.11wireless.ppt
Ā 
Presentation on different modes of data communication
Presentation on different modes of data communicationPresentation on different modes of data communication
Presentation on different modes of data communication
Ā 
Week1
Week1Week1
Week1
Ā 
Mobile Computing Complete Introduction
Mobile Computing Complete IntroductionMobile Computing Complete Introduction
Mobile Computing Complete Introduction
Ā 
Wireless Communication & Networking
Wireless Communication & NetworkingWireless Communication & Networking
Wireless Communication & Networking
Ā 
WNMC CH1.ppt
WNMC CH1.pptWNMC CH1.ppt
WNMC CH1.ppt
Ā 
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.pptLecture-5 Transmission sprectrum  WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Lecture-5 Transmission sprectrum WIRELESS NETWORK AND MOBILE TECHNOLOGY.ppt
Ā 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptx
Ā 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptx
Ā 
Networking Technologies
Networking TechnologiesNetworking Technologies
Networking Technologies
Ā 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
Ā 
ITFT_Wireless network
ITFT_Wireless networkITFT_Wireless network
ITFT_Wireless network
Ā 
Wireless communication
Wireless communicationWireless communication
Wireless communication
Ā 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
Ā 
Final ppt wireless
Final ppt wirelessFinal ppt wireless
Final ppt wireless
Ā 
Communication and Network Concepts
Communication and Network ConceptsCommunication and Network Concepts
Communication and Network Concepts
Ā 
HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002
HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002
HHCJ AMUMARA: COMPUTER STUDIES LECTURE NOTE FOR SS3-002
Ā 
Lanmanandwanpptfinal 131121041622-phpapp02
Lanmanandwanpptfinal 131121041622-phpapp02Lanmanandwanpptfinal 131121041622-phpapp02
Lanmanandwanpptfinal 131121041622-phpapp02
Ā 

Recently uploaded

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
Ā 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
Ā 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Ā 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
Ā 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”soniya singh
Ā 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
Ā 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
Ā 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
Ā 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Ā 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
Ā 

Recently uploaded (20)

GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Ā 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Ā 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Ā 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Ā 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Ā 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Ā 
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ā˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Ā 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Ā 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Ā 
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Model Call Girl in Narela Delhi reach out to us at šŸ”8264348440šŸ”
Ā 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Ā 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Ā 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Ā 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Ā 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
Ā 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Ā 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Ā 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Ā 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Ā 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Ā 

Types o Wireless Networks in computer networks

  • 1. Types of Wireless Networks
  • 2. Need: ā€¢ With the increasing use of small portable computers, wireless networks, and satellites, a trend to support computing on the move has emergedā€”this trend is known as mobile computing or nomadic computing (also called anywhere/anytime computing)
  • 3. ā€¢ Mobile computing has several interesting and important applications like: ā€¢ Telecommunications ā€¢ National defense (tracking troop movements), ā€¢ Emergency and disaster management, ā€¢ Remote operation of appliances, and in ā€¢ Accessing the Internet.
  • 4. Challenges: ā€¢ The channel capacity typically available in wireless systems is much lower than what is available in wired networks ā€¢ Noise and interference have more impact on systems design for wireless systems than on wired systems ā€¢ security is a greater concern in wireless systems than in wired systems since information may be traveling in free space
  • 5. Wireless & Mobile Networks ā€¢ Mobile networks provide support for routing (how to maintain communication with mobility) and location management (keeping track of the location) functions. ā€¢ Wireless networks provide wireless interfaces to users (both mobile and stationary) by supporting bandwidth allocation and error-control functions
  • 6.
  • 7. Wireless LAN ā€¢ WLANs are typically restricted in their diameter to buildings, a campus, single rooms etc ā€¢ Advantages of WLANs are: ā€¢ Flexibility: Within radio coverage, nodes can communicate without further restriction. Radio waves can penetrate walls, senders and receivers can be placed anywhere. ā€¢ Planning: Only wireless ad-hoc networks allow for communication without previous planning, any wired network needs wiring plans. As long as devices follow the same standard, they can communicate. For wired networks, additional cabling with the right plugs and probably interworking units (such as switches) have to be provided.
  • 8. ā€¢ Design: Wireless networks allow for the design of small, independent devices which can for example be put into a pocket. ā€¢ Robustness: Wireless networks can survive disasters, e.g., earthquakes or users pulling a plug. If the wireless devices survive, people can still communicate. Networks requiring a wired infrastructure will usually break down completely ā€¢ Cost: After providing wireless access to the infrastructure via an access point for the first user, adding additional users to a wireless network will not increase the cost. This is, important for e.g., lecture halls, hotel lobbies or gate areas in airports where the numbers using the network may vary significantly.
  • 9. ā€¢ WLANs disadvantages: ā€¢ Quality of service: WLANs typically offer lower quality than their wired counterparts. The main reasons for this are the lower bandwidth due to limitations in radio transmission, higher error rates due to interference. ā€¢ Safety and security: Using radio waves for data transmission might interfere with other high-tech equipment in, e.g., hospitals. The open radio interface makes eavesdropping much easier in WLANs than, e.g., in the case of fiber optics.
  • 10. Transmission technologies in WLAN ā€¢ One technology is based on the transmission of infra red light (e.g., at 900 nm wavelength), ā€¢ The other one, which is much more popular, uses radio transmission in the GHz range (e.g., 2.4 GHz in the license- free ISM band).
  • 11. ā€¢ Infrared technology: ā€¢ It allows computing devices to communicate via short-range wireless signals ā€¢ Infrared networks were designed to support direct two- computer connections only, created temporarily as the need arises. However, extensions to infrared technology also support more than two computers and semi-permanent networks. ā€¢ Infrared network signals cannot penetrate walls or other obstructions and work only in the direct "line of sightā€ ā€“ IrDA-SIR (slow speed) infrared supporting data rates up to 115 Kbps ā€“ IrDA-MIR (medium speed) infrared supporting data rates up to 1.15 Mbps ā€“ IrDA-FIR (fast speed) infrared supporting data rates up to 4 Mbps
  • 12. ā€¢ Radio transmission: ā€¢ It include the long-term experiences made with radio transmission for wide area networks (e.g., microwave links) and mobile cellular phones. ā€¢ Radio transmission can cover larger areas and can penetrate (thinner) walls, furniture, plants etc. ā€¢ Additional coverage is gained by reļ¬‚ection. Radio typically does not need a LOS if the frequencies ā€¢ Furthermore, current radio-based products offer much higher transmission rates (e.g., 54 Mbit/s) ā€¢ Interference & limited range of license free bands
  • 14. ā€¢ Communication takes place only between the wireless nodes and the access point ā€¢ The access point does not just control medium access, but also acts as a bridge to other wireless or wired networks. ā€¢ Infrastructure-based networks lose some of the ļ¬‚exibility wireless networks can offer, e.g., they cannot be used for disaster relief in cases where no infrastructure is left.
  • 16. ā€¢ Nodes within an ad-hoc network can only communicate if they can reach each other physically ā€¢ In ad-hoc networks, the complexity of each node is higher because every node has to implement medium access mechanisms, mechanisms to handle hidden or exposed terminal problems
  • 17. The transmission range of A reaches B, but not C (the detection range does not reach C either). The transmission range of C reaches B, but not A. Finally, the transmission range of B reaches A and C, i.e., A cannot detect C and vice versa.
  • 18. ā€¢ A starts sending to B, C does not receive this transmission. C also wants to send something to B and senses the medium. The medium appears to be free, the carrier sense fails. C also starts sending causing a collision at B. But A cannot detect this collision at B and continues with its transmission. A is hidden for C and vice versa. ā€¢ B sends something to A and C wants to transmit data to some other mobile phone outside the interference ranges of A and B. C senses the carrier and detects that the carrier is busy (Bā€™s signal). C postpones its transmission until it detects the medium as being idle again.
  • 20. ā€¢ The components of an infrastructure and a wireless part as specified for IEEE 802.11. Several nodes, called stations (STAi), are connected to access points (AP). ā€¢ Stations are terminals with access mechanisms to the wireless medium and radio contact to the AP. ā€¢ The stations and the AP which are within the same radio coverage form a basic service set (BSSi) ā€¢ A distribution system connects several BSSs via the AP to form a single network and thereby extends the wireless coverage area. This network is now called an extended service set (ESS)
  • 21. ā€¢ The APs support roaming (i.e., changing access points), the distribution system handles data transfer between the different APs. ā€¢ APs provide synchronization within a BSS, support power management, and can control medium access to support time- bounded service. ā€¢ Wireless access points (APs or WAPs) are specially configured nodes on wireless local area networks (WLANs). Access points act as a central transmitter and receiver of WLAN radio signals.
  • 22.
  • 23. Mobile ip ā€¢ Systems like GSM have been designed with mobility in mind, the internet started at a time when no one had thought of mobile computers ā€¢ IP is the common base for thousands of applications and runs over dozens of different networks. This is the reason for supporting mobility at the IP layer; mobile phone systems, for example, cannot offer this type of mobility for heterogeneous networks. ā€¢ To merge the world of mobile phones with the internet and to support mobility in the small more efļ¬ciently, so-called micro mobility protocols have been developed.
  • 24.
  • 25. ā€¢ Entities and terminology: ā€¢ Mobile node (MN): A mobile node is an end-system or router that can change its point of attachment to the internet using mobile IP. The MN keeps its IP address and can continuously communicate with any other system in the internet as long as link-layer connectivity is given. ā€¢ Mobile nodes are not necessarily small devices such as laptops with antennas or mobile phones; a router onboard an aircraft can be a powerful mobile node.
  • 26. ā€¢ Correspondent node (CN): At least one partner is needed for communication. In the following the CN represents this partner for the MN. The CN can be a ļ¬xed or mobile node. ā€¢ Home network: The home network is the subnet the MN belongs to with respect to its IP address. No mobile IP support is needed within the home network. ā€¢ Foreign network: The foreign network is the current subnet the MN visits and which is not the home network. ā€¢ Care-of address (COA): The COA defines the current location of the MN from an IP point of view.
  • 27. Packet delivery to and from the mobile node
  • 28. ā€¢ Advantage: ā€¢ Mobile IP provides users the freedom to roam beyond their home subnet while consistently maintaining their home IP address. ā€¢ This enables transparent routing of IP datagrams to mobile users during their movement, so that data sessions can be initiated to them while they roam; it also enables sessions to be maintained in spite of physical movement between points of attachment to the Internet or other networks
  • 29. Satellite systems ā€¢ Satellites offer global coverage without wiring costs for base stations and are almost independent of varying population densities. ā€¢ Satellite communication began after the Second World War ā€¢ 1957, SPUTNIK- first satellite by soviet union ā€¢ 1960-ECHO (it enables communication by reflecting signals) ā€¢ 1963-SYNCOM(geostationary satellite) ā€¢ 1965-INTELSAT1 (first commercial geostationary satellite)
  • 30. ā€¢ Applications : ā€¢ Weather forecasting: Without the help of satellites, the forecasting of hurricanes would be impossible ā€¢ Radio and TV broadcast satellites: ā€¢ Military satellites: Many communication links are managed via satellite because they are much safer from attack by enemies. ā€¢ Satellites for navigation:
  • 31.
  • 32. ā€¢ Within the footprint, communication with the satellite is possible for mobile users via a mobile user link (MUL) ā€¢ Base station controlling the satellite and acting as gateway to other networks via the gateway link (GWL) ā€¢ Satellites may be able to communicate directly with each other via intersatellite links (ISL) ā€¢ Footprint can be defined as the area on earth where the signals of the satellite can be received.
  • 33. ā€¢ The loss L depending on the distance r between sender and receiver can be calculated as: f being the carrier frequency and c the speed of light
  • 34. ā€¢ Different types of orbits can be identiļ¬ed: ā€¢ Geostationary (or geosynchronous) earth orbit (GEO): GEO satellites have a distance of almost 36,000 km to the earth. Examples are almost all TV and radio broadcast satellites, many weather satellites and satellites operating as backbones for the telephone network ā€¢ Medium earth orbit (MEO): MEOs operate at a distance of about 5,000ā€“ 12,000 km. eg, navigation ā€¢ Low earth orbit (LEO): While some time ago LEO satellites were mainly used for espionage, several of the new satellite systems now rely on this class using altitudes of 500ā€“1,500 km
  • 36. ā€¢ Wireless Local Loop: adopting radio as the transmission medium ā€¢ WLL is a technology that uses radio signals to substitute for copper wires ā€¢ WLL services are referred as fixed cellular services ā€¢ FSU (Fixed Subscriber Unit) : interface between subscriberā€™s wired devices and WLL network ā€¢ A BSC controls one or more BTS and provide an interface to the local exchange (switch) in the central office.
  • 37. Connection Setup PSTN Switch function WLL Controller AM HLR Transceiver WASU Trunk Air Interface TWLL Wireless Access Network Unit(WANU) ā€“ Interface between underlying telephone network and wireless link ā€“ consists of ā€¢ Base Station Transceivers (BTS) ā€¢ Radio Controller(RPCU) ā€¢ Access Manager(AM) ā€¢ Home Location Register(HLR) WANU Wireless Access Subscriber Unit(WASU) ā€“ located at the subscriber ā€“ translates wireless link into a traditional telephone connection
  • 38. Wireless in Local Loop (WLL) Mobile Telephone Connections ā€¢ BSNL WLL-M is a communication system that connects customers to the The BSNL Landlinenetwork using radio frequency signals instead of conventional copper wires, for the full or part connection between the subscriber and the exchange ā€¢ This comes with superior voice quality and high speed data capabilities. ā€¢ CDMA is popular with more than 100 million subscribers worldwide, and the number keeps on increasing exponentially.
  • 39. Sensor networks ā€¢ A sensor network is an infrastructure comprised of sensing (measuring), computing, and communication elements that gives an administrator the ability to instrument, observe, and react to events and phenomena in a speciļ¬ed environment. ā€¢ Sensor devices, or wireless nodes (WNs), are also (sometimes) called motes
  • 40. ā€¢ IEEE 802.15.4 operates in the 2.4-GHz industrial, scientiļ¬c, and medical (ISM) radio band and supports data transmission at rates up to 250 kbps at ranges from 30 to 200 ft. ā€¢ ZigBee/IEEE 802.15.4 is designed to complement wireless technologies such as Bluetooth, Wi-Fi, and ultra-wideband (UWB), and is targeted at commercial point-to-point sensing applications where cabled connections are not possible and where ultralow power and low cost are requirements
  • 43. MicaZ mote Moteiv Corporation's Tmote Sky Cricket Mote
  • 44. Sink Sensors Field Medical Monitoring Indoor Control Wireless Sensor Network ā€¢ Elements ā€“ Sink : sends queries and collects data from sensors ā€“ Sensor : monitors phenomenon and reports to sink Applications Environment Monitoring Object Tracking
  • 45.
  • 46. Challenges for WSNs ā€¢ Quality of Service In some cases, only occasional delivery of a packet can be more than enough; in other cases, very high reliability requirements exist. ā€¢ In yet other cases, delay is important when actuators are to be controlled in a real-time fashion by the sensor network. ā€¢ Fault tolerance Since nodes may run out of energy or might be damaged, or since the wireless communication between two nodes can be permanently interrupted, it is important that the WSN as a whole is able to tolerate such faults. ā€¢ To tolerate node failure, redundant deployment is necessary, using more nodes than would be strictly necessary if all nodes functioned correctly.
  • 47. ā€¢ Lifetime In many scenarios, nodes will have to rely on a limited supply of energy (using batteries). Replacing these energy sources in the ļ¬eld is usually not practicable, and simultaneously, a WSN must operate at least for a given mission time or as long as possible. ā€¢ Hence, the lifetime of a WSN becomes a very important ļ¬gure of merit. Evidently, an energy-efļ¬cient way of operation of the WSN is necessary.
  • 48. ā€¢ Maintainability As both the environment of a WSN and the WSN itself change (depleted batteries, failing nodes, new tasks), the system has to adapt. ā€¢ It has to monitor its own health and status to change operational parameters or to choose different trade-offs (e.g. to provide lower quality when energy resource become scarce). ā€¢ Scalability Since a WSN might include a large number of nodes, the employed architectures and protocols must be able scale to these numbers
  • 49. ā€¢ Generic protocol stack for sensor networks:
  • 50.
  • 51. ā€¢ Physical Layer : Can provide an interface to transmit a stream of bits over physical medium. Responsible for frequency selection, carrier frequency generation, signal detection, Modulation and data encryption. ā€¢ MAC layer: Responsible for Channel access policies, scheduling, buffer management and error control. In WSN we need a MAC protocol to consider energy efficiency, reliability, low access delay and high throughput as a major priorities ā€¢ Network layer: The major function of this layer is routing. This layer has a lot of challenges depending on the application but apparently, the major challenges are in the power saving, limited memory and buffers, and have to be self organized.
  • 52. ā€¢ Transport layer: The function of this layer is to provide reliability and congestion avoidance ā€¢ Application layer: Responsible for traffic management and provide software for different applications that translate the data in an understandable form or send queries to obtain certain information.
  • 53. Sensors Vs Conventional Networks Property Conventional Sensor Power Unlimited power (power supply) Battery-powered processing fast processors 3.4GHz Severely Constrained 16MHz Memory Large Memory 2GB RAM Severely constrained 4-10KB of RAM Communication Wired/wireless Wireless Topology Structured Ad-hoc Scalability Highly-Scalable Scalable to certain extent Security Developed & extensive Requires more developments Life-time Unlimited Limited
  • 54. Peer to Peer networks
  • 55. ā€¢ Client/Server Limitations: ā€¢ Scalability is hard to achieve ā€¢ Presents a single point of failure ā€¢ Requires administration
  • 56. ā€¢ P2P Computing: ā€¢ P2P computing is the sharing of computer resources and services by direct exchange between systems.
  • 57. ā€¢ All nodes are both clients and servers ā€¢ Provide and consume data ā€¢ Any node can initiate a connection ā€¢ No centralized data source ā€¢ P2P Network Characteristics: ā€¢ Clients are also servers and routers ā€¢ Nodes are autonomous (no administrative authority) ā€¢ Network is dynamic: nodes enter and leave the network ā€œfrequentlyā€
  • 58. ā€¢ P2P Benefits ā€¢ Efficient use of resources ā€¢ Scalability ā€¢ Reliability ā€“ No single point of failure ā€¢ Ease of administration ā€“ No need to deploy servers to satisfy demand
  • 59. ā€¢ Popular P2P Systems: ā€¢ Napster, Gnutella, Kazaa, Freenet ā€¢ Large scale sharing of files. ā€¢ User A makes files (music, video, etc.) on their computer available to others ā€¢ User B connects to the network, searches for files and downloads files directly from user A ā€¢ Drawback: ā€¢ Issues of copyright infringement
  • 60. Napster (search ā€“ centralized & file transferā€“ P2P) ļ‚§A way to share music files with others ā€¢ Users upload their list of files to Napster server ā€¢You send queries to Napster server for files of interest -- Keyword search (artist, song, album,etc.) ā€¢Napster server replies with IP address of users with matching files ā€¢You connect directly to user A to download file
  • 61. Gnutella ļ‚§Share any type of files (not just music) ā€¢You ask your neighbours for files of interest ā€¢Neighbours ask their neighbours, and so on ā€¢ TTL field quenches messages after a number of hops ā€¢Users with matching files reply to you
  • 62. Mobile routing protocols ā€¢ Mobile networks can be classified into infrastructure networks and mobile ad hoc networks (MANETs) according to their dependence on fixed infrastructures. ā€¢ In an infrastructure mobile network, mobile nodes have wired access points (or base stations) within their transmission range. ā€¢ The access points compose the backbone for an infrastructure network. ā€¢ In contrast, mobile ad hoc networks are autonomously self- organized networks without infrastructure support. ā€¢ In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes.
  • 63. ā€¢ Types of routing protocols: ā€¢ In proactive routing protocols, the routes to all the destinations (or parts of the network) are determined at the start-up and maintained by using a periodic route update process. ā€¢ In reactive protocols, routes are determined when they are required by the source using a route discovery process. ā€¢ Hybrid routing protocols combine the basic properties of two classes of protocols into one. That is, they are both reactive and proactive in nature.
  • 64. Ad Hoc On-Demand Distance Vector (AODV)
  • 65. ā€¢ AODV belongs to the class of Distance Vector Routing Protocols (DV). In a DV every node knows its neighbours and the costs to reach them. A node maintains its own routing table, storing all nodes in the network, the distance and the next hop to them.
  • 66. ā€¢ The Ad Hoc On-Demand Distance Vector (AODV) algorithm enables dynamic, self-starting, multihop routing between participating mobile nodes wishing to establish and maintain an ad hoc network. ā€¢ AODV allows mobile nodes to obtain routes quickly for new destinations, and does not require nodes to maintain routes to destinations that are not in active communication. ā€¢ AODV allows mobile nodes to respond quickly to link breakages and changes in network topology.
  • 67. ā€¢ AODV uses symmetric links between neighboring nodes. It does not attempt to follow paths between nodes when one of the nodes cannot hear the other one. ā€¢ Path Discovery: ā€¢ The path discovery process is initiated whenever a source node needs to communicate with another node for which it has no routing information in its table. ā€¢ Every node maintains two separate counters: a node sequence number and a broadcast ID.
  • 68. ā€¢ The source node initiates path discovery by broadcasting a Route REQuest (RREQ) packet to its neighbors. ā€¢ The RREQ contains the following fields: ā€¢ <source_addr source sequence# broadcast id dest_addr dest sequence# hop cnt>
  • 70. ā€¢ J Join flag; reserved for multicast. ā€¢ R Repair flag; reserved for multicast. ā€¢ G Gratuitous RREP flag ā€¢ Reserved Sent as 0; ignored on reception. ā€¢ Hop Count The number of hops from the Source IP Address to the node handling the request. ā€¢ Flooding ID A sequence number uniquely identifying the particular RREQ when taken in conjunction with the source node's IP address. ā€¢ Destination IP Address The IP address of destination for which a route is desired.
  • 71. ā€¢ Destination Sequence Number The last sequence number received in the past by the source for any route towards the destination. ā€¢ Source IP Address The IP address of the node which originated the Route Request. ā€¢ Source Sequence Number The current sequence number to be used for route entries pointing to (and generated by) the source of the route request.
  • 72. ā€¢ broadcast_id is incremented whenever the source issues a new RREQ. ā€¢ Each neighbor either satisfies the RREQ by sending a Route REPly (RREP) back to the source, or broadcasts the RREQ to its own neighbors after increasing the hop_cnt. ā€¢ Notice that a node may receive multiple copies of the same route broadcast packet from various neighbors. ā€¢ When an intermediate node receives an RREQ, if it has already received an RREQ with the same broadcast_id and source address, it drops the redundant RREQ and does not rebroadcast it. ā€¢ If a node cannot satisfy the RREQ, it keeps track of the following information to implement the reverse-path setup as well as the forward-path setup that will accompany the transmission of the eventual RREP.
  • 73. ā€¢ Destination IP address ā€¢ Source IP address ā€¢ Broadcast ID ā€¢ Expiration time for reverse-path route entry ā€¢ Source nodeā€™s sequence number
  • 74. ā€¢ Reverse-Path Setup: ā€¢ There are two sequence numbers (in addition to the broadcast_id) included in an RREQ: ā€¢ the source sequence number and the last destination sequence number known to the source ā€¢ As the RREQ travels from a source to various destinations, it automatically sets up the reverse path from all nodes back to the source. ā€¢ To set up a reverse path, a node records the address of the neighbor from which it received the first copy of the RREQ.
  • 75. ā€¢ Forward-Path Setup: ā€¢ If an intermediate node has a route entry for the desired destination, it determines whether the route is current by comparing the destination sequence number in its own route entry to the destination sequence number in the RREQ. ā€¢ If the RREQā€™s sequence number for the destination is greater than that recorded by the intermediate node, the intermediate node must not use its recorded route to respond to the RREQ. Instead, the intermediate node rebroadcasts the RREQ. ā€¢ The intermediate node can reply only when it has a route with a sequence number that is equal or greater to that contained in the RREQ. ā€¢ If it does have a current route to the destination and if the RREQ has not been processed previously, the node then unicasts a route reply packet (RREP) back to its neighbor from which it received the RREQ.
  • 76. ā€¢ An RREP contains the following information: ā€¢ <source_addr, dest_addr, dest_sequence #, hop_cnt, lifetime> ā€¢ The forward path setup as the RREP travels from the destination D to the source node S. Nodes that are not along the path determined by the RREP will time out after ACTIVE_ROUTE_TIMEOUT (3000 milliseconds) and will delete the reverse pointers.
  • 77.
  • 78. ā€¢ Type 2 ā€¢ R Repair flag; used for multicast. ā€¢ A Acknowledgment required ā€¢ Reserved Sent as 0; ignored on reception. ā€¢ Prefix Size If nonzero, the 5-bit Prefix Size specifies that the indicated next hop may be used for any nodes with the same routing prefix (The Prefix Size Field indicates the nodes within a destination's subnet that are reachable via the same route.) ā€¢ Lifetime The time for which nodes receiving the RREP consider the route to be valid.
  • 79.
  • 80. ā€¢ Type 3 ā€¢ N No delete flag; set when a node has performed a local repair of a link, and upstream nodes should not delete the route. ā€¢ Reserved Sent as 0; ignored on reception. ā€¢ DestCount The number of unreachable destinations included in the message; MUST be at least 1. ā€¢ Unreachable Destination IP Address The IP address of the destination which has become unreachable due to a link break. ā€¢ Unreachable Destination Sequence Number The last known sequence number, incremented by one,
  • 81. ā€¢ Local Connectivity Management: ā€¢ Hello message, a special RREP containing its identity and sequence number. The nodeā€™s sequence number is not changed for Hello message transmissions. ā€¢ Receiving a broadcast or a Hello message from a new neighbor or failing to receive Hello messages from a node previously in the neighborhood is an indication that the local connectivity has changed. ā€¢ The local connectivity management with Hello messages can also be used to ensure that only nodes with bidirectional connectivity are considered to be neighbors.
  • 82.
  • 83. Route Requests in AODV B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L
  • 84. Route Requests in AODV B A S E F H J D C G I K Represents links on Reverse Path Z Y M N L
  • 85. Reverse Path Setup in AODV B A S E F H J D C G I K ā€¢ Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once Z Y M N L
  • 86. Reverse Path Setup in AODV B A S E F H J D C G I K Z Y M N L
  • 87. Reverse Path Setup in AODV B A S E F H J D C G I K Z Y ā€¢ Node D does not forward RREQ, because node D is the intended target of the RREQ M N L
  • 88. Forward Path Setup in AODV B A S E F H J D C G I K Z Y M N L Forward links are setup when RREP travels along the reverse path Represents a link on the forward path
  • 89.
  • 90. Dynamic Source Routing (DSR) Protocol ā€¢ The DSR Protocol is composed of two mechanisms: ā€¢ Route discovery is the mechanism by which a node S wishing to send a packet to a destination node D obtains a source route to D. Route discovery is used only when S attempts to send a packet to D and does not already know a route to D. ā€¢ Route maintenance is the mechanism by which node S is able to detect, while using a source route to D, if the network topology has changed such that it can no longer use its route to D because a link along the route no longer works.
  • 91. ā€¢ This entirely on-demand behavior and lack of periodic activity allow the number of overhead packets caused by DSR to scale all the way down to zero. ā€¢ ā€œIn response to a single route discovery a node may learn and cache multiple routes to any destinationā€. ā€¢ The operations of route discovery and route maintenance in DSR are designed to allow unidirectional links and asymmetric routes to be easily supported (in wireless networks, it is possible that a link between two nodes may not work equally well in both directions, due to differing antenna or propagation patterns or sources of interference)
  • 92. Route Discovery in DSR B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L
  • 93. Route Discovery in DSR B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ
  • 94. Route Discovery in DSR B A S E F H J D C G I K ā€¢ Node H receives packet RREQ from two neighbors: potential for collision Z Y M N L [S,E] [S,C]
  • 95. Route Discovery in DSR B A S E F H J D C G I K ā€¢ Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once Z Y M N L [S,C,G] [S,E,F]
  • 96. Route Discovery in DSR B A S E F H J D C G I K Z Y M ā€¢ Nodes J and K both broadcast RREQ to node D ā€¢ Since nodes J and K are hidden from each other, their transmissions may collide N L [S,C,G,K] [S,E,F,J]
  • 97. Route Discovery in DSR B A S E F H J D C G I K Z Y ā€¢ Node D does not forward RREQ, because node D is the intended target of the route discovery M N L [S,E,F,J,M]
  • 98. RREQ
  • 99. ā€¢ Opt Data Len --- 8-bit unsigned integer. ā€¢ Identification A unique value generated by the initiator (original sender) of the Route Request. ā€¢ Address[1..n] Address[i] is the IPv4 address of the i-th node recorded in the Route Request option.
  • 100. Route Discovery in DSR ā€¢ Destination D on receiving the first RREQ, sends a Route Reply (RREP) ā€¢ RREP is sent on a route obtained by reversing the route appended to received RREQ ā€¢ RREP includes the route from S to D on which RREQ was received by node D
  • 101. Route Reply in DSR B A S E F H J D C G I K Z Y M N L RREP [S,E,F,J,D] Represents RREP control message
  • 102. RREP
  • 103. ā€¢ Last Hop External (L) it denotes that the last hop indicated by the DSR Source Route option
  • 104. Dynamic Source Routing (DSR) ā€¢ Node S on receiving RREP, caches the route included in the RREP ā€¢ When node S sends a data packet to D, the entire route is included in the packet header ā€“ hence the name source routing ā€¢ Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded
  • 106. ā€¢ Option Type 3. Nodes not understanding this option will ignore this option. ā€¢ Error Type ā€¢ 1 = NODE_UNREACHABLE ā€¢ 2=FLOW_STATE_NOT_SUPPORTED ā€¢ 3 = OPTION_NOT_SUPPORTED ā€¢ Packet Salvage if route is broken (from A to E) the neighbor (C) salvage the packet (after sending Rerr) by checking itā€™s own cache to see if it has route to target (E) and replacing the packetā€™s route with the new
  • 107. Data Delivery in DSR B A S E F H J D C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length
  • 108. Route maintenance ā€¢ Passive Acknowledgments ā€“ Half duplex operation: transmit packet, go into receive mode, receive ack, receive next packet, go into transmit mode, repeat ā€“ Original sender hears forwarding transmission from next hop node in the route: D E F D transmits to E E transmits to F D hears E to F transmission as implicit ACK
  • 109. Mobility Models ā€¢ A mobility model should attempt to mimic the movements of real mobile nodes. Changes in speed and direction must occur, and they must occur in reasonable time slots. ā€¢ For example, we would not want mobile nodes to travel in straight lines at constant speeds, because real mobile nodes would not travel in such a restricted manner. ā€¢ Mobility models mainly are of two types: 1. Entity Mobility Model 2. Group Mobility Model
  • 110. ā€¢ Entity Mobility Model: ā€¢ Entity Mobility Models represent mobile nodes whose movements are independent of each other. Examples of Entity Mobility Models are as follows: ā€¢ Random Walk Mobility Model: A simple mobility model based on random directions and speeds ā€¢ Random Waypoint Mobility Model: A model that includes pause times between changes in destination and speed ā€¢ Random Direction Mobility Model: A model that forces Mobile Nodes (MNs) to travel to the edge of the simulation area before changing direction and speed ā€¢ City Section Mobility Model: A simulation area that represents streets within a city
  • 111. Classification of Mobility Patterns ā€¢ Deterministic Mobility Model ā€¢ The Deterministic Mobility Model describes the most predictable type of motion and is the most simplistic of all mobility models. ā€¢ A sample scenario resembling a Deterministic Mobility Model would be cars moving in an urban traffic area, where the speed of the cars is restricted and the direction in which the cars can move is also predefined, that is, either in a straight line or turning only at cross lights.
  • 112. ā€¢ Semideterministic Mobility Pattern: ā€¢ Consider, for example, a battalion of battle tanks marching ahead. Here, the path followed by each tank is not specified, but they do move in a general direction (i.e., toward the war front). ā€¢ Even though the individual tanks do not have a specified direction, we can see a general pattern of a column evolving out of it. Such a mobility pattern is termed a ā€œColumn Model.ā€
  • 113. ā€¢ Random Mobility Pattern: ā€¢ This motion is totally stateless, that is, the future movement here is completely independent of the past movement and hence there are no bounds imposed on the max deviation which the nodes can take up for their next movement. ā€¢ And this randomness in choosing the next direction vector renders this type of motion completely unpredictable.
  • 114. Random Walk ā€¢ In this mobility model, an MN moves from its current location to a new location by randomly choosing a direction and speed in which to travel. ā€¢ The new speed and direction are both chosen from pre-deļ¬ned ā€¢ ranges, [speedmin; speedmax] and [0;2Ļ€] respectively. Each movement in the Random Walk Mobility Model occurs in either a constant time interval t or a constant distance traveled d, at the end of which a new direction and speed are calculated. ā€¢ If an MN which moves according to this model reaches a simulation boundary, it ā€œbouncesā€ off the simulation border with an angle determined by the incoming direction. The MN then continues along this new path.
  • 115. ā€¢ The Random Walk Mobility Model is a memoryless mobility pattern because it retains no knowledge concerning its past locations and speed values . ā€¢ The current speed and direction of an MN is independent of its past speed and direction . This characteristic can generate unrealistic movements such as sudden stops and sharp turns.
  • 116. Random Waypoint Model ā€¢ The Random Waypoint Model was first proposed by Johnson and Maltz. Soon, it became a ā€œbenchmarkā€ mobility model to evaluate the MANET routing protocols because of its simplicity and wide availability. ā€¢ The Random Waypoint Mobility Model includes pause times between changes in direction and/or speed.
  • 117. ā€¢ The implementation of this mobility model is as follows: ā€¢ As the simulation starts, each mobile node randomly selects one location in the simulation field as the destination. ā€¢ It then travels toward this destination with constant velocity chosen uniformly and randomly from [0,Vmax], where the parameter Vmax is the maximum allowable velocity for every mobile node. ā€¢ The velocity and direction of a node are chosen independently of other nodes.
  • 118. ā€¢ Upon reaching the destination, the node stops for a duration defined by the ā€œpause timeā€ parameter Tpause. ā€¢ If Tpause = 0, this leads to continuous mobility. ā€¢ After this duration, it again chooses another random destination in the simulation field and moves toward it. ā€¢ The whole process is repeated again and again until the simulation ends.
  • 119. Node movement in the Random Waypoint Model
  • 120. ā€¢ Limitations of the Random Waypoint Model: ā€¢ Temporal Dependency of Velocity ā€“ the velocity at the current epoch is independent of the previous epoch. Thus, some extreme mobility behavior, such as sudden stopping, sudden accelerating, and sharp turning, may frequently occur in the trace generated by the Random Waypoint Model. ā€¢ Spatial Dependency of Velocity ā€“ in some scenarios, including battlefield communication and museum touring, the movement pattern of a mobile node may be influenced by a certain specific ā€œleaderā€ node in its neighborhood. Hence, the mobility of various nodes is indeed correlated. ā€¢ Geographic Restrictions of Movement ā€“ in many realistic cases, especially the applications used in urban areas, the movement of a mobile node may be bounded by obstacles, buildings, streets, or freeways.
  • 121. Random Direction ā€¢ In this model, MNs choose a random direction in which to travel similar to the Random Walk Mobility Model. ā€¢ An MN then travels to the border of the simulation area in that direction. Once the simulation boundary is reached, the MN pauses for a speciļ¬ed time, chooses another angular direction (between 0 and 180 degrees) and continues the process.
  • 122. City Section Mobility Model ā€¢ In the City Section Mobility Model, the simulation area is a street network that represents a section of a city where the ad hoc network exists ā€¢ The streets and speed limits on the streets are based on the type of city being simulated. ā€¢ Each MN begins the simulation at a deļ¬ned point on some street. An MN then randomly chooses a destination, also represented by a point on some street. The movement algorithm from the current destination to the new destination locates a path corresponding to the shortest travel time between the two points; in addition, safe driving characteristics such as a speed limit and a minimum distance allowed between any two MNs exists.
  • 123. ā€¢ Upon reaching the destination, the MN pauses for a speciļ¬ed time and then randomly chooses another destination (i.e., a point on some street) and repeats the process.
  • 124.
  • 125. Group Mobility Model ā€¢ Exponential Correlated Random Mobility Model: A group mobility model that uses a motion function to create movements ā€¢ Column Mobility Model: A group mobility model where the set of MNs form a line and are uniformly moving forward in a particular direction ā€¢ Nomadic Community Mobility Model: A group mobility model where a set of MNs move together from one location to another. ā€¢ Pursue Mobility Model: A group mobility model where a set of MNs follow a given target. ā€¢ Reference Point Group Mobility Model: A group mobility model where group movements are based upon the path traveled by a logical center.
  • 126. Exponential Correlated Random Mobility Model ā€¢ The ļ¬rst group mobility models to be proposed is the Exponential Correlated Random Mobility Model. ā€¢ In this model, a motion function is used to create MN movements. ā€¢ Given a position (MN or group) at time t, b(t) is used to deļ¬ne the next position (MN or group) at time t +1, b(t +1):
  • 127. ā€¢ where Ļ„ adjusts the rate of change from the MNā€™s previous location to its new location ā€¢ r is a random Gaussian variable with variance Ļƒ
  • 128. Column Mobility Model ā€¢ This model represents a set of MNs that move around a given line (or column), which is moving in a forward direction (e.g., a row of soldiers marching together towards their enemy). ā€¢ For the implementation of this model, an initial reference grid (forming a column of MNs) is deļ¬ned ā€¢ Each MN is then placed in relation to its reference point in the reference grid; the MN is then allowed to move randomly around its reference point via an entity mobility model.
  • 129. advance_vector is a predeļ¬ned offset that moves the reference grid. The predeļ¬ned offset that moves the reference grid is calculated via a random distance and a random angle (between 0 and Ļ€ since movement is in a forward direction only)
  • 130. Nomadic Community Mobility Model ā€¢ Just as ancient nomadic societiesmoved fromlocation to location, the Nomadic CommunityMobilityModel represents groups of MNs that collectively move from one point to another ā€¢ Within each community or group of MNs, individuals maintain their own personal ā€spacesā€ where they move in random ways. ā€¢ For example, consider a class of students touring an art museum. The class would move from one location to another together; however, the students within the class would roam around a particular location individually. ā€¢ in the Nomadic Community Mobility Model, the MNs may be allowed to travel for 60 seconds before changing direction and speed.
  • 131.
  • 132. Pursue Mobility Model ā€¢ The Pursue Mobility Model attempts to represent MNs tracking a particular target. ā€¢ For example, this model could represent police ofļ¬cers attempting to catch an escaped criminal. The Pursue Mobility Model consists of a single update equation for the new position of each MN:
  • 133. Reference Point Group Mobility Model ā€¢ Reference Point Group Mobility Model ā€“ Group movements are based on the path traveled by a logical center for the group ā€“ GM: Group Motion Vector ā€“ RM: Random Motion Vector ā€“ Random motion of individual node is implemented by Random Waypoint without Pause
  • 134. ā€¢ The new position for each MN is then calculated by summing a random motion vector, RM, with the new reference point. ā€¢ The length of RM is uniformly distributed within a speciļ¬ed radius centered at RP(t +1) and its direction is uniformly distributed between 0 and 2Ļ€.
  • 135. Location Aided Routing ā€¢ It makes use of location information to reduce routing overhead. Location information used in the LAR protocol may be provided by the Global Positioning System (GPS) ā€¢ Assumption: ā€“ Each host knows its current location precisely (i.e., no error)
  • 137. ā€¢ As the route request is propagated to various nodes, the path followed by the request is included in the route request packet. Using the above ļ¬‚ooding algorithm, provided that the intended destination is reachable from the sender, the destination should eventually receive a route request message. ā€¢ On receiving the route request, the destination responds by sending a route reply message to the sender the route reply message follows a path that is obtained by reversing the path followed by the route request received by D (the route request message includes the path traversed by the request). ā€¢ It is possible that the destination will not receive a route request message (for instance, when it is unreachable from the sender, or route requests are lost due to transmission errors). In such cases, the sender needs to be able to reinitiate route discovery.
  • 138. Route Discovery Using Flooding A B C E X S D route request route reply
  • 139. ā€¢ Therefore, when a sender initiates route discovery, it sets a timeout. If during the timeout interval, a route reply is not received, then a new route discovery is initiated (the route request messages for this route discovery will use a different sequence number than the previous route discovery ā€“ recall that sequence numbers are useful to detect multiple receptions of the same route request). ā€¢ Timeout may occur if the destination does not receive a route request, or if the route reply message from the destination is lost
  • 140. ā€¢ Location-Aided Routing (LAR), as it makes use of location information to reduce routing overhead. Location information used in the LAR protocol may be provided by the Global Positioning System (GPS). ā€¢ With the availability of GPS,it is possible for a mobile host to know its physical location
  • 141. ā€¢ Expected zone and request zone ā€¢ Consider a node S that needs to ļ¬nd a route to node D. Assume that node S knows that node D was at location L at time t0, and that the current time is t1. ā€¢ Then, the ā€œexpected zoneā€ of node D, from the view-point of node S at time t1, is the region that node S expects to contain node D at time t1. ā€¢ Node S can determine the expected zone based on the knowledge that node D was at location L at time t0. For instance, if node S knows that node D travels with average speed v,then S may assume that the expected zone is the circular region of radius v(t1 - t0), centered at location L
  • 142. ā€¢ If node S does not know a previous location of node D, then node S cannot reasonably determine the expected zone ā€“ in this case, the entire region that may potentially be occupied by the ad hoc network is assumed to be the expected zone. ā€¢ In this case, the algorithm reduces to the basic ļ¬‚ooding algorithm.
  • 143. ā€¢ Request zone: ā€¢ Limited flooding ā€¢ A node forwards a route request only if it belongs to the request zone ā€¢ The request zone should include ā€¢ expected zone ā€¢ other regions around the expected zone
  • 144.
  • 146. ā€¢ Assume that node S knows that node D was at location (Xd, Yd) at time t0. At time t1, node S initiates a new route discovery for destination D. We assume that node S also knows the average speed v with which D can move. Using this, node S deļ¬nes the expected zone at time t1 to be the circle of radius R = v(t1- t0) centered at location (Xd, Yd). ā€¢ In our ļ¬rst LAR algorithm, we deļ¬ne the request zone to be the smallest rectangle that includes current location of S and the expected zone (the circular region deļ¬ned above), such that the sides of the rectangle are parallel to the X and Y axes. In ļ¬gure (a), the request zone is the rectangle whose corners are S, A, B and C, whereas in ļ¬gure (b), the rectangle has corners at point A, B, C and G ā€“ note that, in this ļ¬gure, current location of node S is denoted as (Xs, Ys).
  • 147. ā€¢ The source node S can, thus, determine the four corners of the request zone. S includes their coordinates with the route request message transmitted when initiating route discovery. When a node receives a route request, it discards the request if the node is not within the rectangle speciļ¬ed by the four corners included in the route request. ā€¢ When node D receives the route request message, it replies by sending a route reply message (as in the ļ¬‚ooding algorithm). However, in case of LAR, node D includes its current location and current time in the route reply message. ā€¢ When node S receives this route reply message (ending its route discovery), it records the location of node D. Node S can use this information to determine the request zone for a future route discovery.
  • 148. LAR Scheme 2 S knows the location (Xd, Yd) of node D at time t0 Node S calculates its distance from location (Xd, Yd): DISTs Node I receives the route request, calculates its distance from location (Xd, Yd): DISTi For some parameter Ī“, If DISTs + Ī“ ā‰„ DISTi, node I replaces DISKs by DISKi and forwards the request to its neighbors; otherwise discards the route request
  • 149. ā€¢ In LAR scheme 1, source S explicitly speciļ¬es the request zone in its route request message. In scheme 2, node S includes two pieces of information with its route request: ā€¢ Assume that node S knows the location (Xd, Yd) of node D at some time to - the time at which route discovery is initiated by node S is tl, where tl>= to. Node S calculates its distance from location (Xd, Yd), denoted as DISTs, and includes this distance with the route request message. ā€¢ The coordinates (Xd, Yd) are also included with the route ā€¢ request
  • 150. ā€¢ When a node I receives the route request from sender node S, node I calculates its distance from location (Xd, Yd),denoted as DISTi, and ā€¢ For some parameter Ī“ , if DISTs, + Ī“ > DISTi, then node I forwards the request to its neighbors. When node I forwards the route request it now includes DISTi and (Xd, Yd) in the route request (ie., it replaces the DISTs, value received in the route request by DISTi, before forwarding the route request). ā€¢ Else DISTs + Ī“ < DISTi. In this case, node I discards the route request
  • 151. ā€¢ When some node J receives the route request (originated by ā€¢ node S) from node I, it applies a criteria similar to above: If node J has received this request previously, it discards the request Otherwise, node J calculates its distance from (Xd, Yd), denoted as DISTj. NOW, ā€¢ The route request received from I includes DISTi. If ā€¢ DISTi + Ī“ > DISTj, then node J forwards the request to its neighbors (unless node J is the destination for the route request). ā€¢ Before forwarding the request J replaces the DISTi value in the route request by DISTj. ā€¢ Else DISTi + Ī“ < DISTj. In this case,node J discards the request
  • 152. Error in Location Estimate ā€¢ Let e denote the maximum error in the coordinates estimated by a node. ā€¢ Modified LAR scheme 1 D (Xd, Yd) e+v(t1-t0) Expected Zone
  • 153. ā€¢ However, in reality there may be some error in the estimated location. ā€¢ Let e denote the maximum error in the coordinates estimated by a node. Thus, if a node N believes that it is at location (Xn, Yn), then the actual location of node N may be anywhere in the circle of radius e centered at (Xn, Yn). ā€¢ In the above LAR schemes, we assume that node S obtained the location (Xd, Yd) of node D at time t0, from node D (perhaps in the route reply message during the previous route discovery). Thus, node S does not know the actual location of node D at time t0 ā€“ the actual location is somewhere in the circle of radius e centered at (Xd, Yd).
  • 154. ā€¢ To take the location error e into account, we modify LAR scheme 1 so that the expected zone is now a circle of radius e + v(t1- t0). ā€¢ The request zone may now be bigger, as it must include the larger request zone