Wireless mesh networks provide opportunities for broadband internet access, extending wireless LAN coverage, mobile internet access, emergency response, and more. They compare favorably to existing technologies due to lower upfront investments, good bandwidth and coverage, and ease of deployment in some cases. However, research challenges remain around the physical layer, medium access control, routing, security, and other areas. Ongoing work aims to improve performance through techniques like smart antennas, transmission power control, and use of multiple channels.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
A wireless mesh network (WMN) consists of mesh clients, mesh routers, and gateways organized in a mesh topology. It is self-forming, self-healing, and allows multi-hop connections. In contrast, a wireless ad-hoc network is a decentralized wireless network that does not rely on existing infrastructure and where devices communicate directly with each other without an access point. Key differences are that WMN relies on some fixed infrastructure and supports multi-hop traffic to gateways, while ad-hoc networks are fully infrastructure-independent and support user-to-user traffic. Both utilize various routing protocols for path selection between nodes.
This document discusses wireless mesh networks (WMN) and compares various routing protocols for WMN. It covers the differences between mesh and ad-hoc networks, popular routing protocols like AODV, OSPF, HWMP, B.A.T.M.A.N, and factors to consider in WMN routing like load balancing, hop count, interference avoidance. Reactive protocols like AODV are on-demand while proactive protocols like OSPF maintain routing tables and update link states periodically. Mobile Mesh uses three separate protocols for different functions. HWMP is being developed for IEEE 802.16s WMN. Research is ongoing to find new metrics for protocols like OSPF in wireless
Practical Wireless Mesh Networks and Their ApplicationsRaluca Musaloiu-E.
1. A user makes a SIP call to join a PTT group. The call is routed through the mesh network to the PTT controller.
2. The PTT controller assigns the user a floor control state and notifies the relevant PTT nodes.
3. When a user wants to speak, they press a button which sends a signal to the PTT controller via SIP.
4. If granted the floor, the PTT controller allows the user's voice stream to be broadcast to other group members.
The document discusses ad hoc networks and wireless sensor networks. It defines an ad hoc network as a temporary network composed of mobile nodes without preexisting infrastructure that is self-organizing. Wireless sensor networks are introduced as a collection of sensor nodes densely deployed to monitor conditions and cooperatively pass data back to central nodes. The document outlines key characteristics of both networks including their temporary and adaptive nature, multi-hop routing, and challenges of mobility, power constraints, and dynamic topology changes.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
MobiMESH: Introduction to Wireless MESH Networksacapone
This document introduces wireless mesh networks (WMNs) and discusses their advantages over other wireless network types. It describes the Mobimesh project, an experimental WMN platform developed by Politecnico di Milano, and its deployment in Bagnara Calabra, Italy. Ongoing research activities are also summarized, including projects to develop hierarchical routing, automatic frequency assignment, improved mobility management, integrated WMN and sensor networks, and hybrid wireless/powerline networks.
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
A wireless mesh network (WMN) consists of mesh clients, mesh routers, and gateways organized in a mesh topology. It is self-forming, self-healing, and allows multi-hop connections. In contrast, a wireless ad-hoc network is a decentralized wireless network that does not rely on existing infrastructure and where devices communicate directly with each other without an access point. Key differences are that WMN relies on some fixed infrastructure and supports multi-hop traffic to gateways, while ad-hoc networks are fully infrastructure-independent and support user-to-user traffic. Both utilize various routing protocols for path selection between nodes.
This document discusses wireless mesh networks (WMN) and compares various routing protocols for WMN. It covers the differences between mesh and ad-hoc networks, popular routing protocols like AODV, OSPF, HWMP, B.A.T.M.A.N, and factors to consider in WMN routing like load balancing, hop count, interference avoidance. Reactive protocols like AODV are on-demand while proactive protocols like OSPF maintain routing tables and update link states periodically. Mobile Mesh uses three separate protocols for different functions. HWMP is being developed for IEEE 802.16s WMN. Research is ongoing to find new metrics for protocols like OSPF in wireless
Practical Wireless Mesh Networks and Their ApplicationsRaluca Musaloiu-E.
1. A user makes a SIP call to join a PTT group. The call is routed through the mesh network to the PTT controller.
2. The PTT controller assigns the user a floor control state and notifies the relevant PTT nodes.
3. When a user wants to speak, they press a button which sends a signal to the PTT controller via SIP.
4. If granted the floor, the PTT controller allows the user's voice stream to be broadcast to other group members.
The document discusses ad hoc networks and wireless sensor networks. It defines an ad hoc network as a temporary network composed of mobile nodes without preexisting infrastructure that is self-organizing. Wireless sensor networks are introduced as a collection of sensor nodes densely deployed to monitor conditions and cooperatively pass data back to central nodes. The document outlines key characteristics of both networks including their temporary and adaptive nature, multi-hop routing, and challenges of mobility, power constraints, and dynamic topology changes.
1. Wireless ad-hoc networks are collections of mobile nodes that dynamically form a temporary network without any fixed infrastructure. Nodes are able to communicate directly when within range, but rely on other nodes to forward packets when out of range.
2. Two routing protocols for ad-hoc networks are described: Destination-Sequenced Distance Vector (DSDV) which is a table-driven protocol that uses routing tables and sequence numbers to distribute routing information, and Cluster-Head Gateway Switch Routing (CGSR) which groups nodes into clusters with a head node to route packets between clusters.
3. Routing in ad-hoc networks is challenging due to the lack of infrastructure and changing network topology. The protocols described aim
MobiMESH: Introduction to Wireless MESH Networksacapone
This document introduces wireless mesh networks (WMNs) and discusses their advantages over other wireless network types. It describes the Mobimesh project, an experimental WMN platform developed by Politecnico di Milano, and its deployment in Bagnara Calabra, Italy. Ongoing research activities are also summarized, including projects to develop hierarchical routing, automatic frequency assignment, improved mobility management, integrated WMN and sensor networks, and hybrid wireless/powerline networks.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
The document discusses implementing a wireless mesh network using IEEE 802.11s at Sikkim Manipal Institute of Technology. It describes the benefits of mesh networks, different mesh network modes, and comparisons with other wireless technologies. It also outlines the hardware and software developed, including antennas, wireless routers, firmware, and traffic monitoring tools used to test and analyze the campus mesh network.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
The document discusses mesh networks, which are wireless networks formed by connecting nodes without centralized administration. It describes the topology and attributes of mesh networks, including that they are self-organizing, self-healing, and scalable. It then provides examples of several existing mesh networks around the world and discusses some of the technical and community challenges in building mesh networks.
This document discusses a simulation of advanced networking using the GloMoSim simulator. It begins with an introduction by Dr. A. Kathirvel, a professor and head of the department of information technology. The document then covers topics like ad hoc wireless networks, research issues in mobile ad hoc networks, ad hoc wireless internet, and concludes with an outline of the simulator session.
This document discusses routing protocols for ad hoc wireless networks. It begins by outlining some key issues in designing routing protocols for these networks, such as mobility, bandwidth constraints, and frequent topology changes. It then classifies routing protocols as being either table-driven, on-demand, or hybrid approaches. Table-driven protocols maintain consistent, up-to-date routing information through periodic table updates. On-demand protocols only discover routes when needed, to reduce overhead. The document proceeds to describe several examples of these different routing protocol types.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
The document discusses ad hoc networks. It defines an ad hoc network as a temporary network connection between devices without fixed infrastructure. Key characteristics of ad hoc networks include dynamic topology, nodes that can freely join and leave, multi-hop routing, and limited bandwidth. The document compares ad hoc networks to wired and managed wireless networks. It also discusses different types of ad hoc networks and routing protocols like DSR and AODV. Applications of ad hoc networks include military operations, conferences, and emergency response situations.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
Introductory Approach on Ad-hoc Networks and its Paradigms IJORCS
This document provides an introductory overview of ad-hoc networks, including:
1) A definition of ad-hoc networks as decentralized wireless networks that self-configure without preexisting infrastructure;
2) A discussion of mobile ad-hoc networks (MANETs) and wireless sensor networks as examples of ad-hoc networks;
3) An overview of challenges in providing quality of service in ad-hoc networks given their dynamic topology.
The document discusses various topics related to wireless and mobile computing including wireless communication, effects of device portability, mobile computing platforms, wireless and fixed networks, wireless management, building blocks of mobile computing, CDMA and DAMA, wireless networks, CSMA problems, and the hidden terminal problem. It also covers applications of wireless technology and security concerns in wireless networks.
Mobile ad-hoc networks have frequent host and topology changes with no cellular infrastructure and require multi-hop wireless links for data transmission between nodes. Routing protocols must discover routes between nodes that may not be directly connected. Table-driven protocols like Destination Sequenced Distance Vector (DSDV) and Wireless Routing Protocol (WRP) maintain up-to-date routing tables through periodic broadcasts but generate significant control overhead. DSDV uses sequence numbers to distinguish stale routes and avoid loops while WRP maintains four tables for routing information.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
Performance analysis of CSMA/CA and TDMA MAC protocols in Wireless Mesh Netw...Pranjal Das
This document summarizes a project presentation on analyzing the performance of CSMA/CA and TDMA MAC protocols in wireless mesh networks. It first provides background on wireless mesh networks and describes their architecture and characteristics. It then discusses CSMA/CA and TDMA protocols and how they work. The project involved simulating a wireless mesh network topology using NS-2 and evaluating the performance of the two protocols based on metrics like throughput, delay, and packet loss under varying conditions like number of hops and link distance. The results showed that TDMA performance was better than CSMA/CA. The conclusion recommends further analysis using directional antennas.
This document discusses various topics related to ad-hoc wireless networks including wireless network concepts, radio propagation mechanisms, characteristics of wireless channels, cellular networks, ad hoc networks, medium access control, routing protocols, multicasting, and transport layer protocols for ad hoc networks. It provides classifications and examples of different types of network architectures, protocols, and issues/challenges in ad hoc wireless networks.
The document discusses implementing a wireless mesh network using IEEE 802.11s at Sikkim Manipal Institute of Technology. It describes the benefits of mesh networks, different mesh network modes, and comparisons with other wireless technologies. It also outlines the hardware and software developed, including antennas, wireless routers, firmware, and traffic monitoring tools used to test and analyze the campus mesh network.
Routing protocols for ad hoc wireless networks Divya Tiwari
The document discusses routing protocols for ad hoc wireless networks. It outlines several key challenges for these protocols, including mobility, bandwidth constraints, error-prone shared wireless channels, and hidden/exposed terminal problems. It also categorizes routing protocols based on how routing information is updated (proactively, reactively, or through a hybrid approach), whether they use past or future temporal network information, the type of network topology supported (flat or hierarchical), and how they account for specific resources like power.
The document discusses mesh networks, which are wireless networks formed by connecting nodes without centralized administration. It describes the topology and attributes of mesh networks, including that they are self-organizing, self-healing, and scalable. It then provides examples of several existing mesh networks around the world and discusses some of the technical and community challenges in building mesh networks.
This document discusses a simulation of advanced networking using the GloMoSim simulator. It begins with an introduction by Dr. A. Kathirvel, a professor and head of the department of information technology. The document then covers topics like ad hoc wireless networks, research issues in mobile ad hoc networks, ad hoc wireless internet, and concludes with an outline of the simulator session.
This document discusses routing protocols for ad hoc wireless networks. It begins by outlining some key issues in designing routing protocols for these networks, such as mobility, bandwidth constraints, and frequent topology changes. It then classifies routing protocols as being either table-driven, on-demand, or hybrid approaches. Table-driven protocols maintain consistent, up-to-date routing information through periodic table updates. On-demand protocols only discover routes when needed, to reduce overhead. The document proceeds to describe several examples of these different routing protocol types.
The document discusses different types of wireless networks including Mobile Ad Hoc Networks (MANETs), Wireless Sensor Networks (WSNs), and Vehicular Ad Hoc Networks (VANETs). It provides an overview of the key characteristics of each network type, such as their topology, communication paradigms, and constraints. MANETs allow nodes to connect and communicate in a decentralized manner without infrastructure support. WSNs consist of dense deployments of low-cost sensor nodes that collect and transmit data. VANETs are similar to MANETs but involve vehicle-to-vehicle communication and have more predictable mobility patterns.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
This document discusses wireless communications and ad hoc networks. It begins with an introduction to wireless communications, including the generations of wireless technologies and electromagnetic spectrum used. It then covers wireless computer networks, focusing on wireless local area networks (WLANs) and transmission techniques like infrared and spread spectrum. The document explains the IEEE 802.11 standard architecture, including components like access points, basic service sets, and extended service sets. It discusses security issues and considerations for wireless networks. Finally, it defines ad hoc networks as decentralized peer-to-peer networks without a central access point, set up temporarily to meet immediate needs.
The document discusses ad hoc networks. It defines an ad hoc network as a temporary network connection between devices without fixed infrastructure. Key characteristics of ad hoc networks include dynamic topology, nodes that can freely join and leave, multi-hop routing, and limited bandwidth. The document compares ad hoc networks to wired and managed wireless networks. It also discusses different types of ad hoc networks and routing protocols like DSR and AODV. Applications of ad hoc networks include military operations, conferences, and emergency response situations.
This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
This document discusses mobile ad-hoc networks (MANETs) and wireless sensor networks. It describes how MANETs are self-configuring networks formed by mobile nodes connected wirelessly without any fixed infrastructure. Each node acts as a router to forward packets. Wireless sensor networks are similar but use smart sensor nodes that can sense environmental data and disseminate it through the network. Examples of MANET and sensor network applications include content sharing between devices, industrial plant monitoring, and traffic monitoring. Security challenges in these networks are also discussed.
MANET stands for mobile ad hoc network. It is a type of wireless network that can change locations and configure itself without a centralized administration. Nodes in a MANET can connect to each other to form a temporary network without any existing network infrastructure. Routing in MANETs is challenging due to the dynamic network topology, asymmetric links, and interference. Common routing algorithms for MANETs include distance vector, link state, and various protocols designed specifically for MANETs to handle mobility.
The document summarizes routing security in ad hoc wireless networks. It discusses the characteristics of ad hoc wireless networks and routing protocols used, including proactive, reactive, and hybrid protocols. It then covers various security attacks on routing protocols like passive attacks, active attacks, impersonation attacks, and attacks using modification or fabrication. Finally, it discusses some security mechanisms and routing protocols that aim to provide security, such as SEAD, Ariadne, SAR, and SRP.
Mac protocols for ad hoc wireless networks Divya Tiwari
The document discusses MAC protocols for ad hoc wireless networks. It addresses key issues in designing MAC protocols including limited bandwidth, quality of service support, synchronization, hidden and exposed terminal problems, error-prone shared channels, distributed coordination without centralized control, and node mobility. Common MAC protocol classifications and examples are also presented, such as contention-based protocols, sender-initiated versus receiver-initiated protocols, and protocols using techniques like reservation, scheduling, and directional antennas.
Introductory Approach on Ad-hoc Networks and its Paradigms IJORCS
This document provides an introductory overview of ad-hoc networks, including:
1) A definition of ad-hoc networks as decentralized wireless networks that self-configure without preexisting infrastructure;
2) A discussion of mobile ad-hoc networks (MANETs) and wireless sensor networks as examples of ad-hoc networks;
3) An overview of challenges in providing quality of service in ad-hoc networks given their dynamic topology.
The document discusses various topics related to wireless and mobile computing including wireless communication, effects of device portability, mobile computing platforms, wireless and fixed networks, wireless management, building blocks of mobile computing, CDMA and DAMA, wireless networks, CSMA problems, and the hidden terminal problem. It also covers applications of wireless technology and security concerns in wireless networks.
This document summarizes issues related to medium access control (MAC) protocols for wireless ad hoc networks. It discusses common MAC protocols like ALOHA, Slotted ALOHA, CSMA, and their variants. It also covers protocols specific to wireless networks like MACA, MACAW, and CSMA/CA. Additional topics covered include Bluetooth, wireless mesh networks, mobile ad hoc networks, and wireless sensor networks. Simulation tools for modeling wireless ad hoc networks are also mentioned.
Mobile ad-hoc networks (MANETs) were first developed in the 1970s by DARPA to allow packet radio connections between military terminals without infrastructure. MANETs allow devices to self-configure into a temporary network without centralized administration. They find applications in disaster relief, conferences, and more. Key challenges in MANETs include dynamic topology, limited bandwidth, energy constraints, and scalability issues as more devices join the network. Routing protocols must adapt to frequent changes, while providing quality of service, security, and other functions with distributed control.
Edhole School provides best Information about Schools in India, Delhi, Noida, Gurgaon. Here you will get about the school, contact, career, etc. Edhole Provides best study material for school students.
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
Wireless sensor networks are used to monitor environmental conditions like temperature and humidity under controlled environments for seed germination experiments. A wireless remote monitoring system using sensors can precisely monitor temperature, humidity, and water content of seeds in closed containers. ZigBee wireless sensor networks are effective for real-time monitoring of the conditions necessary for seed germination and growth. Researchers aim to design a wireless sensor network integrated with sensors to remotely manage and monitor the environmental parameters for seed germination experiments under controlled conditions.
In this thesis firstly we study the effects of Black hole attack in MANET using both Proactive and Reactive routing protocols and then discovering a Secure Path in MANET by Avoiding Black/Gray Holes. The impact of Black Hole attack on the performance of MANET is evaluated finding out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. blackhole route
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
Head to Head - The Battle between the Bellheads and the Netheads for control ...Pieter Geldenhuys
Part 1: When the infrastructure is ubiquitous and operates as a utility, like water or electricity, we will move beyond the current paradigm of cyberspace. What happens when information and knowledge are accessible to all who choose to look? What happens when eBusiness, eHealth and eLiteracy have become an invisible normality? What happens after the Ubiquitous Internet has irreparably changed our very understanding of the world we live in? A new Digital Value Chain will be required when the Netheads and Bellheads pit their business models against each other in an epic battle where the only winner is bound to be the consumer. Who will find the right balance between the investments required to support the infrastructure and the money that inevitably will flow to edge of the network where the intelligence and power resides?
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
- Wireless ad-hoc networks are collections of wireless devices that can communicate directly with nearby devices or through intermediate devices to reach destinations further away without any centralized administration. They were first developed in the 1990s and have been widely researched.
- However, it is debated whether wireless ad-hoc networks are fundamentally flawed because they are rarely used in practice and wireless networks today typically connect to base stations or access points rather than communicating in a decentralized multi-hop fashion.
- This document will examine arguments for and against wireless ad-hoc networks being a flawed architecture, providing examples and analysis to support the position that technical limitations inherently make them unrealizable.
Evoluzione delle Reti Mesh con Collegamenti Eterogenei ad Alta VelocitàGoWireless
The document discusses the evolution of wireless mesh networks (WMNs) and their advantages over traditional wireless networks. It describes how WMNs allow for flexible, self-configuring networks by replacing wired infrastructure with wireless links. WMNs can support a wide range of applications by providing cost-effective broadband access where it is difficult or expensive to install wired connections. The author argues that heterogeneous mesh networking using multiple wireless technologies is the best approach to create high-capacity access networks and support mobility.
The document discusses the evolution of wireless mesh networking technologies. It describes how early ad hoc networks led to developments in wireless sensor networks and wireless mesh networks (WMNs). WMNs provide wireless infrastructure by replacing wired networks with self-configuring, flexible wireless links. This allows for easier deployment in areas where wired infrastructure is not feasible or too expensive. The document outlines ongoing research into heterogeneous mesh networking using multiple wireless technologies to create high-capacity access networks for future applications.
Definition
A decentralized type of wireless network, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, It can turn the dream of networking at any place and at time into reality. We are almost there by the way .Ex- Bluetooth enabled mobile phones such as 3G, laptops, handheld digital devices, personal digital assistants, or wearable computers
The document discusses intranets and wireless networks. It defines an intranet as a private network within an organization that uses Internet standards like HTML and TCP/IP. Wireless networks allow devices to connect without wires using radio waves. Different types are described, including wireless PANs, LANs, WANs and cellular networks. Benefits of wireless networks include mobility, convenience and easy setup while avoiding wiring costs, but they can be subject to interference.
The document discusses computer networks and networking concepts. It begins by outlining the course content, which includes network types, media, threats, and cloud computing. It then defines what a computer network is and describes common network components like nodes, interconnections, and communication protocols. The document outlines different network types including LANs, WANs, MANs, SANs, and VPNs. It also discusses network devices, media, protocols, and advantages of networks.
This document provides an overview of computer networking concepts. It discusses the basic components of networks including nodes, communication protocols, network media, common network types, networking devices, network topologies and wireless networks. Specific topics covered include the Internet protocol suite, Ethernet, wireless LANs, fiber optic and copper cabling, bridges, switches, routers, firewalls, the client-server model and peer-to-peer networking. Network advantages like simultaneous access and easier data backup are also summarized.
This document provides an overview of computer networking concepts. It discusses the basic components of networks including nodes, communication protocols, network media, common network types, networking devices, network topologies and wireless networks. Specific topics covered include LANs, WANs, the TCP/IP protocol suite, Ethernet, fiber optic and twisted pair cabling, switches, routers, firewalls, the internet, cloud computing and wireless technologies like Bluetooth and Wi-Fi. The document is intended as an introductory course on computer networking fundamentals.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
2. Outline
Overview of the technology
Opportunities
(Research) Challenges
Current state of the art
Conclusion
2
3. Overview
Node Types Link Types
Wireless routers Intra-mesh wireless links
Gateways
Stationary client access
Printers, servers
Mobile client access
Mobile clients
Stationary clients
Internet access links
3
4. Gateways
Multiple interfaces (wired &
wireless)
Mobility
Stationary (e.g. rooftop) –
most common case
Mobile (e.g., airplane,
busses/subway)
Serve as (multi-hop)
“access points” to user
nodes GW
Relatively few are needed,
(can be expensive)
4
5. Wireless Routers
At least one wireless interface.
Mobility
●
Stationary (e.g. rooftop)
●
Mobile (e.g., airplane,
busses/subway).
Provide coverage (acts as a
mini-cell-tower).
Do not originate/terminate data
flows
Many needed for wide areas,
hence, cost can be an issue.
5
6. Users
Typically one interface.
Mobility
Stationary
Mobile
Connected to the mesh
network through
wireless routers (or
directly to gateways)
The only
sources/destinations for
data traffic flows in the
network.
6
7. User – Wireless Router Links
Wired
Bus (PCI, PCMCIA, USB)
Ethernet, Firewire, etc.
Wireless
802.11x
Bluetooth
Proprietary
Point-to-Point or Point-to-
Multipoint
If properly designed is not a
bottleneck.
If different from router-to-
router links we’ll call them
access links
7
8. Router to Router Links
Wireless
802.11x
Proprietary
Usually multipoint to
multipoint
Sometimes a collection
of point to point
Often the bottleneck
If different from router-
to-user links we’ll call
them backbone links
8
9. Gateway to Internet Links
Wired
Ethernet, TV Cable,
Power Lines
Wireless
802.16
Proprietary
Point to Point or Point-
to-Multipoint
We’ll call them
backhaul links
If properly designed,
not the bottleneck
9
10. How it Works
User-Internet Data Flows
In most applications the
main data flows
User-User Data Flows
In most applications a
small percentage of data
flows
10
12. Mesh vs. Ad-Hoc Networks
Ad-Hoc Networks Wireless Mesh Networks
Multihop Multihop
Nodes are wireless, Nodes are wireless,
possibly mobile some mobile, some
fixed
May rely on It relies on
infrastructure infrastructure
Most traffic is user-
to-user
Most traffic is user-
to-gateway
12
13. Mesh vs. Sensor Networks
Wireless Sensor Networks Wireless Mesh Networks
Bandwidth is limited (tens Bandwidth is generous
of kbps) (>1Mbps)
In most applications, fixed Some nodes mobile, some
nodes fixed
Energy efficiency is an Normally not energy
issue limited
Resource constrained Resources are not an
issue
Most traffic is user-to-
Most traffic is user-to-
gateway gateway
13
14. Outline
Overview of the technology
Opportunities
Applications
Comparison with existing technologies
(Research) Challenges
Current state of the art
Conclusion
14
17. Mobile Internet Access
Direct competition
with G2.5 and G3
cellular systems.
Law enforcement
Source: www.meshnetworks.com
Intelligent transportation
(now www.motorola.com).
17
19. Layer 2 Connectivity
The entire wireless mesh
cloud becomes one (giant)
Ethernet switch
Simple, fast installation
Short-term events (e.g.,
conferences, conventions,
shows)
Where wires are not
desired (e.g., hotels,
airports)
Where wires are impossible
(e.g., historic buildings)
Internet
19
21. Community Networks
Grass-roots broadband
Internet Access
Several neighbors may
share their broadband
connections with many
other neighbors
Not run by ISPs
Possibly in the
disadvantage of the
ISPs Source: research.microsoft.com/mesh/
21
22. Many Other Applications
Remote
monitoring and
control
Public
transportation
Internet access
Multimedia home
networking
Source: www.meshnetworks.com
(now www.motorola.com).
22
23. Outline
Overview of the technology
Opportunities
Applications
Comparison with existing technologies
(Research) Challenges
Current state of the art
Conclusion
23
24. Broadband Internet Access
Cable WMAN Cellular WMN
DSL (802.16) (2.5-3G)
Bandwidth Very Very Limited Good
Good Good
Upfront Very High High Low
Investments High
Total Very High High Moderate
Investments High
Market Coverage Good Modest Good Good
24
25. WLAN Coverage
Source:
802.11 WMN
www.meshdynamics.com
Wiring High Low
Costs
Bandwidth Very Good
Good
Number of APs As needed Twice as many
Cost of APs Low High
25
26. Mobile Internet Access
Cellular
2.5 – 3G WMN
Source: www.meshnetworks.com
(now www.motorola.com).
Upfront High Low
Investments
Bandwidth Limited Good
Geolocation Limited Good
Upgrade
High Low
Cost
26
27. Emergency Response
Cellular Walkie
2.5 – 3G Talkie WMN
Source: www.meshdynamics.com
Availability Reasonable Good Good
Bandwidth Limited Poor Good
Geolocation Poor Poor Limited
27
28. Layer 2 Connectivity
Ethernet WMN
Speed/Ease of Slow/Difficult Fast/Easy
Deployment
Bandwidth Very Good
Good
Mobile Users 802.11 needed Good
Total Cost Low Moderate
28
29. Military Communications
Existing
System(s) WMNs
Source: www.meshdynamics.com
Very
Coverage Good Good
Bandwidth Poor Good
Voice Support Very Good
Good
Covertness Poor Better
Power efficiency Reasonable Good
29
30. Outline
Overview of the technology
Opportunities
Applications
Comparison with existing technologies
(Research) Challenges
Current state of the art
Conclusion
30
31. Abstraction
Users + routers = nodes
Nodes have two functions: =
+
Generate/terminate traffic
Route traffic for other nodes
Gateway 2 Gateway 2
y1 y1
Gatewa Gatewa
Internet Internet
31
32. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
32
33. Physical Layer (PHY)
Wish list
Performance Extras
Bandwidth Mobility (potentially
Robust modulation high-speed)
Link adaptation
Sensitivity
Variable
Short preamble transmission power
Fast switch (details shortly)
between channels Multiple channels
Fast switch from Link quality
Tx/Rx and back feedback
33
34. PHY - Modulation
Existing modulations work well (OFDM,
DSSS, FSK, etc.).
UWB may be an interesting alternative for
short distances
Spread spectrum solutions are preferred as
they tend to have better reliability in the face
of
Fading (very important for mobile applications)
Interference (more of a factor than in any other
wireless system)
34
35. PHY- Licensed vs. Unlicensed Spectrum
Licensed Unlicensed
Spectrum Spectrum
Cost Expensive Free
Controllable medium
Yes No
(i.e., no interference)
Limits on
Transmitted Power Some Lots
35
36. PHY – Smart Antennas
Background Omnidirectional
antenna
Implemented as an
array of Variable
omnidirectional delay
antennas Signal to
transmit
By changing the Direction
phase, beamforming changed by
the delays
can be achieved
The result is a
software steered
directional antenna
Radiation Pattern
36
37. PHY-Smart Antennas
Advantages
Low power
transmissions
Battery not a big
concern in many
applications
Enables better spatial
reuse and, hence,
increased network
capacity
37
40. PHY-Smart Antennas
Disadvantages
Specialized
hardware
Specialized MAC
(difficult to design)
Difficult to track
mobile data users
40
41. PHY – Transmission Power Control
GW GW
GW
Too low Too high Just right
41
42. PHY – Transmission Power Control
(cont)
Optimization Criteria
Network capacity
Delay
Error rates
Power consumption
The ideal solution will depend on
Network topology
Traffic load
42
43. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
43
44. Medium Access Control (MAC)
Scheduled
Fix scheduled TDMA
Polling
Impractical due to lack of:
Central coordination point
Reasonable time synchronization
Random Access
CSMA – simple and popular
RTS/CTS – protects the receiver
44
45. 802.11 Compatibility
Proprietary 802.11
MAC Compatible
Flexible PHY/MAC Yes No
Ease of upgrade Hard Easy
Force clients to buy
custom cards Yes/Yes No/No
45
46. MAC – Multichannel
What?
c
f
Channels can be
implemented by: t
c
f
TDMA (difficult due to
lack of synchronization) c
t
FDMA
CDMA (code f
c
t c
assignment is an issue) s1
f
t
s2
SDMA (with directional t c
f
antennas) t
s3
Combinations of the
f
c
above f
t
46
47. MAC – Multichannel
Why?
Increases network capacity
Ch
-1
1 Ch-1 2 1 Ch-1 2 3
Ch
2
-2
1
4 3 4 3
Ch-1 Ch-2
User bandwidth = B/2 User bandwidth = B Chain bandwidth = B
B = bandwidth of a channel
47
48. MAC – Multichannel
How?
c
f
Standard MAC Custom MAC
t (e.g.,802.11)
Single Radio X X
X X
Multiple Radios
48
49. MAC – Multichannel
Standard MAC – Single Radio
Can it be done at all?
IP
Perhaps, if a new Multi-
Channel Coordination Layer MCCL
(MCCL) is introduced 802.11
between MAC and Network PHY
Must work within the
constraints of 802.11
Ch
-1 C h
1
Ch-1
2 3
May increase the 2
-2
capacity of the network 1
4 3
Ch-2
49
50. MAC – Multichannel
Standard MAC – Single Radio (cont)
Channel assignment
GW GW
GW GW
GW GW
Gateway Loads = 4 : 1 : 1 Gateway Loads = 2 : 2 : 2
50
51. MAC – Multichannel
Custom MAC – Single Radio
Easier problem than before
IP
Common advantages and
disadvantages associated Custom
with custom MACs PHY
May further increase the
capacity of the network GW
GW
The problem of optimal
channel assignment
remains GW
51
52. MAC – Multichannel
Standard MAC – Multiple Radios
A node now can
receive while
transmitting
Practical problems with GW
GW
antennas separation
(carrier sense from
nearby channel)
Optimal assignment –
NP complete problem GW
Solutions
●
Centralized
●
Distributed
52
53. MAC – Multichannel
Custom MAC – Multiple Radios
Nodes can use a
control channel to
coordinate and the rest
to exchange data. GW
GW
In some conditions can
be very efficient.
However the control
channel can be:
GW
●
an unacceptable
overhead;
●
a bottleneck;
53
54. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
54
55. Routing
Finds and maintains
routes for data flows
The entire
performance of the
WMN depends on the
routing protocol
May be the main
product of a mesh
company
May be missing
55
56. Routing – Wish List
Scalability Flexibility
Overhead is an issue in Work with/without
mobile WMNs. gateways, different
topologies
Fast route discovery QoS Support
and rediscovery Consider routes
Essential for reliability. satisfying specified
criteria
Multicast
Mobile user support Important for some
Seamless and efficient applications (e.g.,
handover emergency response)
56
57. Existing Routing Protocols
Internet routing Ad-hoc routing
protocols (e.g., OSPF, protocols (e.g., DSR,
BGP, RIPv2) AODV, OLSR, TBRPF)
Well known and trusted Newcomers by
Designed on the comparison with the
assumption of seldom Internet protocols
link changes Designed for high rates
Without significant of link changes; hence
modifications are perform well on WMNs
unsuitable for WMNs in May be further
particular or for ad hoc Ad Hoc
Networks optimized to account for
networks in general. WMNs’ particularities
Wireless Mesh
Networks
57
58. Routing - Optimization Criteria
Minimum Hops
Minimum Delays
Maximum Data Rates
Minimum Error Rates
Maximum Route
Stability
Minimum ETA Use of multiple
Power Consumption routes to the same
Combinations of the gateway
above Use of multiple
gateways
58
59. Routing – Cross-Layer Design
Routing – Physical Routing – MAC
Link quality feedback is Feedback on link loads
shown often to help in can avoid congested
selecting stable, high links → enables load
bandwidth, low error balancing.
rate routes. Channel assignment
Fading signal strength and routing depend on
can signal a link about each other.
to fail → preemptive MAC detection of new
route requests. neighbors and failed
Cross-layer design routes may significantly
essential for systems improve performance at
with smart antennas. routing layer.
59
60. Routing – Cross-Layer Design (cont)
Routing – Transport
Choosing routes with
low error rates may
improve TCP’s
throughput.
Especially important
when multiple routes are
used
Freezing TCP when a Routing – Application
route fails.
●
Especially with respect
of satisfying QoS
constraints
60
61. Network Layer - Fairness
Fairness
Equal share of
resources to all GW
participants.
Special case of priority 1 2
based QoS.
Horizontal – nodes 1, 2
The MAC layer’s
fairness ensures
horizontal fairness. GW
Vertical – nodes 3, 4
3
MAC layer is no longer
sufficient
4
61
62. Fairness
Problem
Unfair
G G
2 1 Inefficient
GW
S2 S1
Ideal Real
62
63. Network – Fairness
Problem Source
Conflict between locally
generated traffic and GW
forwarded traffic.
At high loads the network
layer queue fills up with local
traffic and traffic to be Network layer
forwarded arrives to a full
queue.
MAC layer
Consequence:
no fairness
poor efficiency Throughput
Solutions:
Compute the fair share for
each user and enforce it generated
Local information based
solution presented next
forwarded
Offered load
63
64. Fairness
Considered Topology and Node Model
f1
4 3
2 1
G G
GW
2G 4G f2, f3 and f4
• Capacity of the network: G = B/8
• Assume unidirectional traffic for the clarity of explanation.
64
65. Fairness
Separate Queue for Local Traffic
Unfair
Single Queue
f1
Inefficient
Theoretically
evaluated
throughputs
generated ( f1 )
forwarded ( f2-f4 )
f 2 , - f4
Offered load
Separate Queue Unfair
Inefficient
f1:f2:f3:f4 = 4:1:2:1
65
66. Fairness
Weighted Queue for Local Traffic
Unfair
Separate Queue Inefficient
f1:f2:f3:f4 = 4:1:2:1
Weighted Queue
Unfair
Inefficient
f1:f2:f3:f4 = 4:6:3:3
66
69. QoS
Support required at every layer
Physical Layer Transport
Robust modulation Attempt end-to-end
Link adaptation recovery when possible
MAC Layer Application
Offer priorities Negotiate end-to-end
and with lower layers
Offer guarantees
(bandwidth, delay) Adapt to changes in
QoS
Network Layer
Select “good” routes
Offer priorities
Reserve resources (for
guarantees)
69
70. QoS
Flavors
Guarantees Priorities
Similar to RSVP in the Similar to diffserv in the
Internet Internet
Has to implement Offers classes of
connection admission services
control Generalization of
Difficult in WMNs due fairness
to: A possible
Shared medium (see implementation on next
provisioning section)
slide
Fading and noise
70
72. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
72
73. TCP
Problems
Efficiency – TCP Causes for missing
assumes that a missing ACKs in WMNs:
(or late) ACK is due to Wireless transmission
network congestion and error
slows down: Broken routes due to
to half if the missing mobility (both users and
ACK shows up fast wireless routers)
enough Delays due to MAC
to zero if it times out contention
Interplay between MAC
and TCP back-off
mechanisms
73
74. TCP
Efficiency Solutions
Focus on eliminating the End to end
confusion between SACK
congestion loss and all other Explicit error notification
reasons Explicit congestion
Many approaches developed notification (e.g. RED)
for single-hop wireless Several solutions for multi-
systems hop
Snoop A-TCP
I-TCP Freeze-TCP
M-TCP
Applicability Trade-off Improvement in
Clean Layering Efficiency
Layer Violations
74
75. TCP
Problems (cont)
Unfairness
Due to network layer
unfairness
TCP
Due to variation in round
trip delays IP
DLL
Likely both will be fixed
if network layer fairness PHY
is ensured
75
76. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
76
77. Provisioning
Two related questions:
How much bandwidth for
each user?
Where to place the next
gateway?
Essential for QoS
guarantees
Complicated by the
shared medium and multi-
hop routing
77
88. Provisioning
Conclusion
Non-trivial procedure G
Capacity depends on: G G
G
Network topology G
G
Traffic load G
G
G
G
G
3G 2G
G
Any practical algorithm 2G
GW
3G 2G
will trade-off: G
3G G
G
2G
Responsiveness G
G
G G
Efficiency G
G
G
G
88
89. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
89
90. Security
Authentication Reliability – protect:
Prevent theft of service Routing data
Prevent intrusion by Management data
malicious users Monitoring data
Prevent denials of
Privacy - user data is at service (very difficult at
risk while on transit in the physical layer)
the WMN due to:
Wireless medium
Multi-hop
90
91. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
91
92. Network Management
Monitor the “health” of
the network
Determine when is time
to upgrade
Either hardware
New gateway
Detect problems
Equipment failures (often
hidden by the self-repair
feature of the network)
Intruders Source: www.meshdynamics.com
Manage the system
92
93. Overview of Research Topics
Physical Layer Provisioning
Smart Antennas
Transmission Power Security
Control
MAC Layer Network Management
Multiple Channels
Network Layer
Routing
Geo-location
Fairness and QoS
Transport Layer
93
95. Geolocation
How?
Measure ranges
between mobile users
and some known fixed
points (wireless
routers).
Triangulate (same as
cellular systems).
Since the “cells” are
much smaller, much Many improvements
better precisions is possible as users can
possible.
talk to each other.
95
96. Outline
Overview of the technology
Opportunities
(Research) Challenges
Current state of the art
Companies
Universities
Standards
Conclusion
96
98. Aerial Broadband
Tiny start-up in RTP, NC,
USA in 2002
Closed its doors shortly
after its start
Application: broadband
Internet access to
apartment complexes
Features
802.11b-compatible
product
Zero configuration
Layer 2 “routing”
Source: www.aerialbroadband.com
98
99. BelAir Networks
Based in Ontario, Canada
Application: 802.11b coverage
of large zones
Features:
Three radios on each wireless
router; dynamically mapped on:
8 fixed directional antennas
Dynamic Tx power and data rate
control
Routing based on PHY
feedback, congestion, latency
Load balancing features
Source: www.belairnetworks.com
99
100. Firetide
Based in Hawaii and Silicon
Valley, USA
Application: Layer 2
connectivity (indoor and
outdoor)
Features:
Proprietary routing protocol
2.4GHz and 5GHz products
AES, WEP security
Variable Tx Power
Management software
Source: www.firetide.com
100
101. Intel
Expressed interest in
WMNs (since 2002).
Research in:
Low power – related
with their wireless
sensor networks
activities at Intel
Research Berkeley Lab.
Traffic balancing
Together with Cisco
active in 802.11s
standardization process
101
Source: www.intel.com
102. Kiyon
Based in La Jolla, CA,
USA
Applications: extended
802.11 indoor coverage
Features:
Products based on
802.11a/b/g
Custom routing (WARP)
Management software
Source: www.kiyon.com
102
103. LamTech (ex. Radiant Networks)
UK-based company
Purchased by LamTech
in 2004
Applications: broadband
Internet access
MESHWORKTM
ATM switch in wireless
router
90 Mbps
Directional links
4 mobile directional
antennas
QoS - CBR & VBR-NR
Source: www.radiantnetworks.com
103
104. Locust World
Based in UK
Application: community
networks
Features:
Free, open source
software
Off-the-shelf hardware
+ open source software
Monitoring software
Several deployments
around the world
Source: www.locustworld.com
104
105. Mesh Dynamics
Based on Santa Clara, CA,
USA Source: www.meshdynamics.com
Application: 802.11
coverage (indoor, outdoor,
citiwide), VoIP, video
Features:
802.11a/b/g compatible
Multiple radios options
(1-4)
Dynamic channel selection
Dynamic tree topology
Management software
Radio agnostic control
layer
105
106. Microsoft
Application: community
networks
Software
Routing
Mesh Connectivity
Link quality Layer (MCL
Routing based on DSR
(named LQSR)
Transparent to lower and
higher layers
Binaries for Windows XP Source: research.microsoft.com/mesh/
available at research.
microsoft.com/mesh/
106
107. Motorola – ex. MeshNetworks
Based in Orlando, FL, USA
Acquired by Motorola in Nov.
2004
Application: mobile broadband
Internet access
Features:
Support for high speed mobile
users
Proprietary routing protocol
Adaptive transmission protocol
Proprietary QDMA radio
Proprietary multichannel MAC
Proprietary geolocation feature
Source: www.meshnetworks.com
Support for voice applications
(now www.motorola.com)
Local testbeds
107
108. Nokia Rooftop
Acquisition of Rooftop
Comm.
Discontinued in 2003
Application:
broadband Internet
access
Features:
Proprietary radio
Proprietary multi-
channel MAC
Variable TX Power
Management and
monitoring tools
Source: www.rooftop.com
108
109. Nortel Networks
Applications: extended
WLAN coverage
Features:
802.11a backhaul
802.11b for users
Management software
Source: www.nortelnetworks.com
Diagram and images and website hyperlink reproduced 109
with courtesy of Nortel Networks.
110. Packet Hop
Based in Belmont, CA, USA
Application: emergency
response
Product: software for mesh
networking
Features:
Works on 802.11a/b/g
based hardware platforms
Security
Management software
Deployed testbed near
Golden Gate Bridge in
Feb. 2004
Source: www.packethop.com
110
111. Ricochet Networks
Based in Denver, CO, USA
Application: Internet access
Features:
Mobile user support
2 hop architecture
900 MHz user – pole top
2.4GHz pole top - WAP
Sell both hardware and
service in Denver and San
Diego
Speed: “up to 4 times the dial-
up speed”
Source: www.ricochet.net
111
112. SkyPilot Networks
Based in Santa Clara, CA, USA
Application: broadband Internet
access
Features:
High power radio + 8 directional
antennas
Proprietary routing (based on
link quality and hop count)
Dynamic bandwidth scheduling
(decides who transmits when)
Management software
Dual band (2.4GHz for users,
5GHz for backhaul)
Source: www.skypilot.com
112
113. Strix Systems
Based in Calabasas, CA,
USA
Application: indoor and
outdoor WLAN coverage,
temporary networks
Features:
Compatible with 802.11a/b/
g
Supports multiple (up to 6)
radios
Management software
Soon to come testbeds
Source: www.strixsystems.com
113
114. Telabria
Based in Kent, UK
Application: WLAN
coverage
(campus/city);
Features:
802.11 compatibility
Compatible
indoor/outdoor products
Dual radio 802.11a/(b,g)
(one for router-router,
one for router-user
traffic).
Source: www.telabria.com
114
115. Tropos Networks
Based in Sunnyvale, CA, USA
Ex – FHP wireless
Applications: citywide 802.11b/
g coverage
Features:
Proprietary routing optimizing
throughput
Support for client mobility
Security
Management software
Indoor/outdoor products
150 customers installed their
products
Source: www.tropos.com
115
116. Outline
Overview of the technology
Opportunities
(Research) Challenges
Current state of the art
Companies
Universities
Standards
Conclusion
116
117. University Testbeds
Georgia Tech - BWN-Mesh
MIT - Roofnet
Rutgers WinLab – Orbit
SUNY Stonybrook – Hyacinth
University of Utah - Emulab
117
118. Georgia Institute of Technology
BWN-Mesh
15 IEEE 802.11b/g
nodes
Flexible configuration
and topology
Can evaluate routing
and transport protocols
for WMNs.
Integrated with the
existing wireless sensor
network testbed
Source: http://users.ece.gatech.edu/~ismailhk/mesh/work.html
118
119. MIT Roofnet
Experimental testbed
40 nodes at the present
Real users (volunteers)
Focus on link layer
measurements and
routing protocols
Open source software
runs on Intersil Prism
2.5 or Atheros AR521X
based hardware
Source: http://pdos.csail.mit.edu/roofnet/doku.php
119
120. Rutgers Winlab
ORBIT
Collaborative NSF project
(Rutgers, Columbia,
Princeton, Lucent Bell Labs,
Thomson and IBM Research)
Start date: September 2003
Emulator/field trial wireless
system
400 nodes radio grid
supporting 802.11x
Software downloaded for
MAC, routing, etc.
Outdoor field trial
Source: www.winlab.rutgers.edu
120
121. SUNY Stonybrook
Hyacinth
Multichannel testbed
based on stock PCs
with two 802.11a NICs.
Research focus on:
interface channel
assignment
routing protocol
Source: http://www.ecsl.cs.sunysb.edu/multichannel/
121
122. University of Utah
Emulab
Three experimental environments
simulated,
emulated, and
hundreds of PCs (168 PCs in
racks)
Several with wireless NICs
(802.11 a/b/g)
wide-area network
50-60 nodes geographically
distributed across approximately
30 sites
Smaller brothers at
U. of Kentucky
Georgia Tech
Source: www.emulab.net
122
123. Outline
Overview of the technology
Opportunities
(Research) Challenges
Current state of the art
Companies
Universities
Standards
Conclusion
123
125. IEEE 802.11s
ESS Mesh Networking
Started on May 13th, 2004
802.11a/b/g were never intended to work multi-hop
Target application: extended 802.11 coverage
Will define an Extended Service Set (ESS), and a
Wireless Distribution System (WDS)
Purpose: “To provide a protocol for auto-configuring
paths between APs over self-configuring multi-hop
topologies in a WDS to support both broadcast/multicast
and unicast traffic in an ESS Mesh [...]”.
Status: 35 proposals will likely be submitted in July 2005.
Intel and Cisco are active in this area
125
126. IEEE 802.15.1
Bluetooth
Low data rate (1Mbps bit-
rate) PAN technology
Targets wire replacement
Has provisions for multi-
hop scatternets
Not a popular wireless
mesh network platform due
to:
the low bandwidth and
limited hardware support
for scatternets.
126
127. IEEE 802.15.4
Zigbee
Lower data rate PAN
(250,40,20kbps)
Multi-months – years
lifetime on small batteries
Supports mesh topology –
one coordinator is
responsible for setting up
the network
Characteristics suitable for
wireless sensor networks
rather than wireless mesh
networks.
127
128. IEEE 802.15.5
Mesh Topology Capability in (WPANs).
Standard applicable to all other
WPANs
Mesh networks have the capability to
provide:
Extension of network coverage without
increasing transmit power or receive
sensitivity
Enhanced reliability via route redundancy
Easier network configuration
Better device battery life due to fewer
retransmissions
128
129. IEEE 802.16a
WiMax
Published April 1st 2003
Enhances the original 802.16
standard
Original IEEE 802.16 specifies
only point to multipoint
functionality – great for gateway to
internet links
The extensions specifies user-
user links using:
either centralized schedules,
or distributed schedules.
129
130. Outline
Overview of the technology
Opportunities
(Research) Challenges
Current state of the art
Companies
Universities
Standards
Conclusion
130
131. Conclusion
Relatively new technology
Significant advantages for
many applications
Significant amount of research
exist and, yet,
Significant improvements can
be enabled by more research.
Impressive products from
several companies
Multiple standardization
activities are on the way
131
132. Acknowledgements and Disclaimer
Special thanks to Jangeun
Jun for practically all original
artwork in this presentation
Many thanks to all
companies that graciously
allowed the use of their
artwork for this presentation
Disclaimer
All technical content, views, commentaries, positions and
opinions expressed in this presentation are those of the
author/presenter alone. The author and this presentation
is not endorsed, sponsored or affiliated with the companies
or products represented in it. Source: www.meshdynamics.com
132