Академический Документы
Профессиональный Документы
Культура Документы
ADHOC NETWORKS
1
INTRODUCTION
Adhoc networks are formed by devices that are able to communicate with each other using a wireless physical medium without having to resort to pre-existing network infrastructure. These are also known as MANETS ie Mobile Adhoc Networks.
Adhoc networks
Compared to cellular networks adhoc networks are more adaptive to changing demands and physical conditions. Attenuation characteristics of wireless networks are non linear. Energy efficiency will be potentially superior and the increased spatial reuse will yield superior capacity with increased spectral efficiency. These characteristics make adhoc networks attractive and is tightly linked to heterogeneous network and 4G architecture.
Body
Wireless
WLAN has the range of 100s of meters. For WLAN the main option is the family of standards i.e. IEEE 802.11 The main existing technology for implementing BANs and PANs is Bluetooth.
Routing is the most active research field in the adhoc networks as it is related with different communication layers . Minimizing the hops is no longer the objective of the routing algorithm but optimization of multiple parameters such as packets error rate over the route, energy consumption, network survivability, routing overheads, possibility of establishing a parallel route.
Use of TCP over wireless links poses many problems .it results in additional problems for wireless links. Communication over wireless Route failures lead to unnecessary congestion control. MAC congestion reduces throughput on longer routes.
Power awareness
: since most of the w/l terminals can be expected to have limited energy storage, power awareness is very important. This subject spans over several communication layers so attention is given to different power saving approaches. The objectives are not only the reduction of transmission power but also the management of sleep states or extention of network survivability through the routing which isenergy aware ..
However if the medium remains idle for this period the station will go to the back off state. When entering the back off state MS selects aback off interval (BI) between zero and the contention window period (CW). CW is the integer no of basic tine slots, if the medium remains idle for the duration of BI time (i.e the value of chosen BI minus the elapsed time since entering the back off state).
CSMA CD
Carrier
When the mobile gets a frame to transmit, it first senses the channel to determine whether another MS is transmitting. If MS senses the channel to be idle for a period which is equal to the inter space frame, then it starts transmitting the frame.
When it senses the channel to be busy it will differ the transmission and the station will keep on sensing the channel. At the point of time when the media becomes idle the station will continue sensing and will wait for the period which is equal to inter frame space to elapse again. If the medium becomes busy during this period, the station will go to the deffering state again.
Collision will occur if two or more MSs select the same BI provided the condition stated above , that the frame coexist spatially at one or more of the receiving stations. When the collision occurs the station that have caused the collision senses the medium again for the inter frame space and go again to back off state. Selecting a new BI. Randomly with the value of contention window period doubled
The other station which stored their remaining BI times also waits for inter frame space and then go to the back off state.
Basic principal
Mobile devices communicate in Peer to Peer fashion. Self organizing network without the need to fixed network infrastructure. Multihop communication. Decentralized mobility-adaptive operation. This is the art of networking without a network .
Applications
Accident warning Floating car data Multihop extensions of Info stations. Application for wireless sensor networks Temperature. Measurement details Detect vibrations Make photos. Environmental monitoring Intrusion detection , detection of bush fires , earth quake warning.
ADHOC NETWORKS
1/28/2012
Medical sector : Monitoring of body functions and Implants. Biological sector : Animal tracking , undersea exploration Industrial sector : Remote sensing in power plants Home automation : Remote monitoring of resources such as Electricity , Water and Gas Aerospace sector : Sensor equipped Robots on a plant
18
1/28/2012
Key advantages :y y y
No expensive infrastructure must be involved. Making use of unlicensed frequency spectrum. Quick distribution of information around sender.
19
KEY CHALLENGES
1/28/2012
20
Problems :
Topologies changes
Many protocols have been proposed some have been invented specifically for MANETs other are adopted from previously proposed protocols for wired networks.
No single protocol works well in all environments. Some attempts made to develop adaptive protocols.
22
ROUTING PROTOCOLS :
1/28/2012
Proactive
y y
Protocols :
Determines the route independent of traffic pattern Traditionally link state and distance vector routing protocols are proactive
Reactive
y
protocols :
Hybrid
y
protocols :
23
1/28/2012
Position
based protocols
24
TRADE OFF
1/28/2012
Latency of route discovery Proactive protocols may have lower latency since the routes are maintained at all times
Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send Y
1/28/2012
Reactive protocols may have lower overhead since routes are determined only if needed
Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating
Which of the protocols achieve a better trade off depends on the traffic and mobility patterns
26
Sender S broadcast data packet P to all neighbours Each node receiving P forwards P to its neighbours Sequence no's are used which avoid the possibility of forwarding the same packet more than once
27
S E
1/28/2012
B H
J A C K I L G M
i.e. S represent a node that has received packet P represents that connected nodes are within each other transmission range
D
28
Wireless links are prone to errors Either because of interference y Or because of collisions (collision detection does not work for half duplex networks)
y
29
Automatic repeat request (ARQ) use acknowledgements and re-transmission y ARQ for multi hop AD-HOC networks Implicit assumptions :y Packet loss is caused by interference or collisions y Retransmission seems to be appropriate
30
i. ii.
Unlikely
y
protected by ARQ
1. 2.
Large interference , dramatically reduces the capacity Ranges depend on the transmission rate
Low rate less vulnerable to interference
3.
4. 5.
Broadcasts are used for route discovery Uni casts used for data delivery
32
CONSEQUENCES :1/28/2012
Routes found via broadcast may not be usable for data traffic y It is called Grey zone IEEE 802.11 is used and will be used for multi hop ADHOC networks Inter-vehicle communication Also as access networks It is certainly not optimal : focus is on single hop networks There are many pit falls when blindly using existing MAC mechanism There is also the need & integrated routing /MAC approach Building a new MAC is hard and expensive
33
1.
Availability
Accountability
End user perspective : wants secure end to end communication Operator perspective : Has to provide secure n/w organization as basis for offering a secure communication service
Routing signaling cannot be spoofed Fabricating routing messages can not be integrated in the network Routing messages cannot be altered in transit except according to the normal functionality of the routing protocol Routing loops cannot be formed through malicious action route cannot be re-directed from the shortest path by malicious action
Managed hostile environment The network topology must be exposed neither to adversaries nor to authorized nodes by the routing messages
1/28/2012
Cryptography Monitoring Difference in service classes and ADHOC network 1)Key managed infrastructure 2)Intrusion detection 3)Single administration domain 4)Transiently unavailable Only local monitoring Multiple domains , no clear line of defense
38
Radio jamming DLC : attacks on MAC , MAC address Routing : no infrastructure support , no clear line of defense
Co-ordination : based on principal of mutual assistance , simple attacks and packet drops
39
Security procedures:
1/28/2012
Route y Signed discovery packet (RDP) propagates to sought destination y Destination sends back signed route reply (REP) y At each hop the following action is taken Validation of original signature Validation of last hop signature When last hop is neither source nor destination replace the last hop signature by your own signature
40
check list : Unauthorized participation , managed by trusted authority Spoofed route signaling everything is signed Fabricated routing messages
41