of 5 Units WN
of 5 Units WN
Wired Wireless
Physical medium Used to send the electromagnetic
Used for transfer the electrical waves /infrared waves
signals Have to antenna or sensors
Ethernet cards for each system Uses radio frequency waves
Dataflow using cards Share multiple devices to share the
Share among multiple devices in data
wired n/w
• Use of WLANs
Surf Internet on the move
Areas without infrastructure, or affected by earthquakes or
disasters WLANs can be set up on the fly
Historic buildings may not be wiring
• Design Goals
Operational simplicity
Power-efficient operation
License-free operation
Tolerance to interference
Global usability
Security
Safety requirements
Quality of service requirement
Compatibility with other technologies and applications
Operational simplicity:
Power-efficient operation:
One of the major factors that affects the cost of wireless access is
the license fee for the spectrum in which a particular wireless
access technology operates. Low cost of access is an important
aspect for popularizing a WLAN technology. Hence the design of
WLAN should consider the parts of the frequency spectrum (e.g.,
ISM band) for its operation which do not require an explicit
licensing.
Tolerance to interference:
The proliferation of different wireless networking technologies
both for civilian and military applications and the use of the
microwave frequency spectrum for non- communication purposes
(e.g., microwave ovens) have led to a significant increase in the
interference level across the radio spectrum. The WLAN design
should account for this and take appropriate measures by way of
selecting technologies and protocols to operate in the presence of
interference.
Global usability:
The design of the WLAN, the choice of technology, and the
selection of the operating frequency spectrum should take into
account the prevailing spectrum restrictions in countries across the
world. This ensures the acceptability of the technology across the
world.
Security:
The inherent broadcast nature of wireless medium adds to the
requirement of security features to be included in the design of
WLAN technology.
Safety requirements:
The design of WLAN technology should follow the safety
requirements that can be classified into the following:
(i) interference to medical and other instrumentation devices and
(ii) increased power level of transmitters that can lead to health
hazards. A well-designed WLAN should follow the power
emission restrictions that are applicable in the given frequency
spectrum.
Quality of service requirements:
BSA: coverage of an AP
BSS
DS
ESS
Service offered by IEEE 802.11 network
Association
Re-association
Disassociation
Distribution: routing
Integration: if send frames through non-802.11
Authentication
De-authentication
Privacy
Data delivery
Association
The identity of an STA and its address should be known to the AP
before the STA can transmit or receive frames on the WLAN. This
is done during association, and the information is used by the AP
to facilitate routing of frames.
Re-association
The established association is transferred from one AP to another
using re association. This allows STAs to move from one BSS to
another.
Disassociation
When an existing association is terminated, a notification is issued
by the STA or the AP. This is called disassociation, and is done
when nodes leave the BSS or when nodes shut down.
Distribution
Distribution takes care of routing frames. If the destination is in
the same BSS, the frame is transmitted directly to the destination,
otherwise the frame is sent via the DS.
Integration: if send frames through non-802.11
To send frames through non-IEEE 802.11 networks, which may
have different addressing schemes or frame formats, the service is
invoked. The following are the STA services, which are provided
by every station, including Aps.
Authentication
Authentication is done in order to establish the identity of stations
to each other. The authentication schemes range from relatively
insecure handshaking to public-key encryption schemes.
De-authentication
De-authentication is invoked to terminate existing authentication.
Privacy
The contents of messages may be encrypted (say, by using the
WEP algorithm, which is explained later) to prevent
eavesdroppers from reading the messages.
Data delivery
• IEEE 802.11 naturally provides a way to transmit and receive
data. However, like Ethernet, the transmission is not
guaranteed to be completely reliable.
IEEE 802.11
Physical Layer
Physical medium dependent sub-layer (PMD)
Physical layer convergence protocol (PLCP)
Abstracts functionality for MAC
Offers service access point (SAP): 1 or 2Mbps
Clear channel assessment (CCA): CSMA/CA
3 choices:
FHSS: GFSK and 4-level GFSK
DSFF: DBPSK and DQPSK
Infrared: PPM
Basic MAC Layer Mechanisms
Distributed Foundation Wireless Medium Access
Control (DFWMAC)
During back off, if busy channel, freeze back off counter; resume
once channel becomes idle
CW size
Unnecessary delay if too large
Collision probability increase if too small
Binary exponential back off technique is used
Overhead involved in RTS-CTS
• Non-negligible overhead
• If frame size > RTS_threshold, RTS-CTS is
activated, a four-way handshake (I.e. RTS-
CTS-DATA-ACK)
• If frame size < RTS_threshold, a two-way
handshake (DATA-ACK)
Fig 2.3 MAC as a state machine
本圖取自"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Fragmentation
• Decreasing frame error rate use shorter
framessplit user data packet into
fragments
• RTS/CTS carry duration for current
fragment and estimated time for next
fragment
• Medium reserved for successive frames
2.3.4 Other MAC Layer
Functionalities
• Point Coordination Function
– Guarantee on maximum access delay, minimum
transmission bandwidth and other QoS
– Centralized scheme, applicable only in
networks where AP (Point Coordinator) pool
nodes
– Superframe: contention free
periods(CFP)+contention period(CP)
Synchronization
• Timing synchronization function (TSF)
• Required for
– Power management
– PCF coordination
– Frequency hopping spread spectrum (FHSS) hopping
sequence synchronization
• Within a BSS
– Quasi periodic beacon frames transmitted by AP
– Contains time-stamp for adjusting clock
– Contains information for power optimization and
roaming
Power Management
• Always ready to receive consume more
power (as high as 100 mA)
• Must be switched off whenever carrier
sensing is not needed
• 2 states: sleep and awake
– Longer periods in sleep leads to low throughput
– Shorter periods in sleep leads to high power
consumption
Roaming
• Provide uninterrupted service when walk
around with a wireless station
• When poor quality of current link, start
scanning for another AP
– Active scanning: send a probe on each channel
and wait for response
– Passive scanning: listen medium to find other
networks
2.3.5 Other Issues
• Newer standards
– 802.11a/11b/g
– Trademark by Wireless Ethernet Compatibility
Alliance (WECA) as Wi-Fi
– 802.11e: time-sensitive applications,
voice/video
– 802.11f: inter-AP communication to handle
roaming
– 802.11i: advanced encryption for better privacy
QoS for Voice and Video Packets
• Delay-sensitive packets: higher priority
– Hybrid coordination function (HCF): AP polls
stations in a weighted way to offer QoS
– Extended DCF: higher priority stations choose
random back-off interval from a smaller CW.
Wired Equivalent Privacy (WEP)
• Data integrity
• Access control
• Confidentiality
• Vulnerable if more sophisticated
mechanisms are used to crack the key
2.5 Bluetooth
• Logically partitioned into 3 layers:
– Transport protocol group
• Radio layer
• Baseband layer
• Link manager layer
• Logical link control
• Adaptation layer
• Host controller interface
– Middleware protocol group
• RFCOMM, SDP, IrDA
– Application group
• Application profiles
Fig 2.7 Bluetooth protocol stack
本圖取自"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Radio (Physical) Layer
• GFSK
• 64Kbps voice channels and asynchronous
data channels with peak rate of 1Mbps
• Data channel: asymmetric or symmetric
• 79 channels, 79 hops
• Typical link range: up to 10 m, can be
extended to 100m by increasing power
Baseband Layer
• Piconet (Fig 2.8)
• 48-bit address
本圖取自"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Piconet
• Master + up to 7 active slaves
Fig 2.9 Operational States
本圖取自"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Fig 2.10 Transmission over a
channel
• ACL: asynchronous connectionless link
• SCO: synchronous connection oriented link
本圖取自"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
Inquiry State
• A potential master sends inquiry packet on
inquiry hop sequence of frequencies
• A slave periodically enter inquiry scan state
and listen for inquiry packets
• When received, send response packet
containing hopping sequence and device
address
Page State
• Master estimate slave’s clock to determine hop
sequence, and send page message
• Slaves listen in page scan mode
• On receiving page message, slave enter page
response sub-state, send page response containing
its device access code (DAC)
• Master enter page response state (after receiving
slave’s response), inform slaves its clock and
address for determining hopping sequence and
synchronization
Scatternets and Issues
• Piconet may overlap both spatially and temporally
• Each piconet is characterized by a unique master
and hop independently
• As more piconets added, more probability of
collisions
• Device can participate in 2 or more piconets by
time sharing (as a slave in several piconets, but as
a master in only a single piconet)
• A group of piconets scatternet (Fig2.11)
本圖取自"Ad Hoc Wireless Networks", by C. Siva Ram Murthy and B. S. Manoj, published by Prentice Hall, 2004
• Issues:
– Gateway nodes: bound back-and-forth, hard to
achieve full utilization
– Timing may miss:
Link Manager Protocol
• Power Management
– Active mode: active slaves are polled by master
– Sniff mode: master issues a command to slave to enter
sniff mode
– Hold mode: temporarily not support ACL packets,
performing scanning, paging, inquiring, or attending
another piconet
– Park mode: slave gives up its active member adress
• Security Management
• Minimal QoS support by allowing control over
parameters such delay and jitter
2.5.4 Bluetooth Profiles
• Promote interoperability among many
implementations of bluetooth protocol stack
• Provide a clear and transparent standard that can
be used to implement a specific user end function
• 4 categories
– Generic profiles
– Telephony profiles
– Networking profiles
– Serial and object exchange profiles
UNIT -2
Introduction
Ad Hoc Wireless Networks
Ad Hoc Wireless Internet
Advent of Ad hoc Wireless Networks
The principle behind ad hoc networking is multi-hop relaying in which
messages are sent from the source to the destination by relaying through
the intermediate hops (nodes).
0 1 2 3 4 5 6 7
In the last few years, efforts have been focused on multi-hop "ad hoc"
networks, in which relaying nodes are in general mobile, and
communication needs are primarily between nodes within the same
network.
Advent of Ad hoc Wireless Networks
An examples of such developments is the Bluetooth standard that is one
of the first commercial realizations of ad hoc wireless networking
developed by Bluetooth Special Interest Group (SIG):
Though the IEEE 802.11 protocols have developed for the wireless
networks, they don’t function well in multi-hop networks.
Hybrid Wireless
Cellular Wireless Networks
Networks Wireless Sensor
Networks
Wireless Mesh
Networks
Infrastructure Dependent
5
Single-Hop Wireless networks
Cellular Wireless Networks
6
Ad Hoc Wireless Networks
7
Comparisons between Cellular and Ad Hoc
Wireless Networks (I)
Cellular Networks Ad Hoc Wireless Networks
Fixed infrastructure-based Infrastructureless
Guaranteed bandwidth (designed for Shared radio channel (more suitable for
voice traffic) best-effort data traffic)
Centralized routing Distributed routing
Circuit-switched (evolving toward Packet-switched (evolving toward
packet switching) emulation of circuit switching)
Seamless connectivity (low call drops Frequent path breaks due to mobility
during handoffs)
High cost and time of deployment Quick and cost-effective deployment
Reuse of frequency spectrum through Dynamic frequency reuse based on
geographical channel reuse carrier sense mechanism
Easier to employ bandwidth reservation Bandwidth reservation requires complex
medium access control protocols 8
Comparisons between Cellular and Ad Hoc
Wireless Networks (II)
Cellular Networks Ad Hoc Wireless Networks
Application domains include mainly Application domains include battlefields,
civilian and commercial sectors emergency search and rescue operations,
and collaborative computing
High cost of network maintenance Self-organization and maintenance
(backup power source, staffing, etc.) properties are built into the network
Mobile hosts are of relatively low Mobile hosts require more intelligence
complexity (should have a transceiver as well as
routing/switching capability)
Major goals of routing and call Main aim of routing is to find paths with
admission are to maximize the call minimum overhead and also quick
acceptance ratio and minimize the call reconfiguration of broken paths
drop ratio
Widely deployed and currently in the Several issues are to be addressed for
third generation of evolution successful commercial deployment even
9
though widespread use exists in defense
Applications of Ad hoc Wireless Networks
Military applications
• Ad hoc wireless networks is useful in establishing communication in a battle
field.
Collaborative and Distributed Computing
• A group of people in a conference can share data in ad hoc networks.
• Streaming of multimedia objects among the participating nodes.
Emergency Operations
• Ad hoc wireless networks are useful in emergency operations such as search
and rescue, and crowd control.
A Wireless Mesh Network is a mesh network that is built upon
wireless communications and allows for continuous connections
and reconfiguration around blocked paths by "hopping" from node
to node until a connection can be established.
10
Wireless Mesh Networks
11
Wireless Mesh Networks
Mobility of nodes are not needed in all cases in wireless sensor networks.
The size of the network is much larger than that in a typical ad hoc wireless
network.
The density of nodes in a sensor network varies with the domain of
application.
The power constraints in sensor networks are much more stringent than those
15
in ad hoc wireless networks.
Wireless Sensor Networks
Distinct properties of wireless sensor networks:
• The power source can be classified into three categories:
16
Mobility of nodes
Density of deployment
Power constraints
Replenishable power source
Data/information fusion
Traffic distribution
17
Hybrid Wireless Networks
Hybrid Wireless Networks
• Multi-hop cellular networks (MCNs) allows the transmission through the
base stations or multi-hop of mobile nodes.
• Integrated cellular ad hoc relay (iCAR) is a system that combines
conventional cellular technology with Ad hoc Relay Station (ARS)
technology. In this system cellular stations will relay or reroute calls from the
congested cell to an adjacent one that is not congested.
Advantages
• Higher capacity than cellular networks
• Increased flexibility and reliability in routing
• Better coverage and connectivity
18
MCN Architecture
19
Issues in Ad hoc Wireless Networks
Medium access scheme
Routing
Multicasting
Transport layer protocol
Pricing scheme
Quality of service provisioning
Self-organization
Security
Energy management
Addressing and service discovery
Scalability
Deployment considerations
20
Issues in Ad hoc Wireless Networks
Medium access scheme
• Distributed operation is required.
• Synchronization is required in TDMA-based systems.
• Hidden terminals are nodes hidden from a sender.
• Exposed terminals are exposed nodes preventing a sender from sending.
• Throughput needs to be maximized.
• Access delay should be minimized.
• Fairness refers to provide an equal share to all competing nodes.
• Real-time traffic support is required for voice, video, and real-time data.
• Resource reservation is required for QoS.
• Ability to measure resource availability handles the resources.
• Capability for power control reduces the energy consumption.
• Adaptive rate control refers to the variation in the data bit rate.
• Use of directional antennas has advantages including increased spectrum
reuse, reduced interference, and reduced power consumption. 21
Issues in Ad hoc Wireless Networks
Routing
• Mobility
• Bandwidth constraint
• Error-prone and shared channel: wireless channel (10-5 to 10-3), wired
channel (10-12 to 10-9)
• Location-dependent contention depends on the number of nodes.
• Other resource constraints such as computing power, battery power
• Minimum route acquisition delay
• Quick route reconfiguration
• Loop-free routing
• Distributed routing approach
• Minimum control overhead
• Scalability
• Provisioning of QoS
• Support for time-sensitive traffic: hard real-time and soft real-time traffic
22
• Security and privacy
Issues in Ad hoc Wireless Networks
Provisioning of multiple links among the nodes in an ad hoc
network results in a mesh-shaped structure. The mesh-shaped
multicast routing structure work well in a high-mobility
environment.
The issues in multicast routing protocols are:
• Robustness: It must be able to recover and reconfigure quickly.
• Efficiency: It should make a minimum number of transmissions to deliver a
packet.
• Control overhead: It demands minimal control overhead.
• Quality of service: QoS support is essential.
• Efficient group management needs to be performed with minimal exchange
of control messages.
• Scalability: It should be able to scale for a large network.
• Security is important.
23
Issues in Ad hoc Wireless Networks
The objectives of the transport layer protocols include:
• Setting up and maintaining end-to-end connections
• Reliable end-to-end delivery of data packets
• Flow control
• Congestion control
Connectionless transport layer protocol (UDP), unaware of high
contention, increases the load in the network.
Pricing Schemes need to incorporate service compensation.
Quality of Service Provisioning
• QoS parameters based on different applications
• QoS-aware routing uses QoS parameters to find a path.
• QoS framework is a complete system that aims at providing the promised
services to each users.
24
Issues in Ad hoc Wireless Networks
Self-Organization is required in ad hoc wireless networks:
• Neighbor discovery
• Topology organization
• Topology reorganization
Security
• Denial of service
• Resource consumption
• Energy depletion: deplete the battery power of critical nodes
• Buffer overflow: flooding the routing table or consuming the data packet
buffer space
• Host impersonation: A compromised node can act as another node.
• Information disclosure: a compromised node can act as an informer.
• Interference: jam wireless communication by creating a wide-spectrum
noise.
25
Issues in Ad hoc Wireless Networks
Addressing and Service Discovery is essential because of
absence of a centralized coordinator.
Energy Management
• Transmission power management: The radio frequency (RF) hardware
design should ensure minimum power consumption.
• Battery energy management is aimed at extending the battery life.
• Processor power management: The CPU can be put into different power
saving modes.
• Devices power management: Intelligent device management can reduce
power consumption of a mobile node.
Scalability is expected in ad hoc wireless networks.
26
Issues in Ad hoc Wireless Networks
Deployment considerations
• Low cost of deployment
• Incremental deployment
• Short deployment time
• Reconfigurability
• Scenario of deployment
• Military deployment
• Emergency operations deployment
• Commercial wide-area deployment
• Home network deployment
• Required longevity of network
• Area of coverage
• Service availability
• Operational integration with other infrastructure
• Choice of protocols at different layers should be taken into consideration.
27
AD HOC WIRELESS INTERNET
28
Issues of Ad hoc Wireless Internet
Gateways
• Gateway nodes are the entry points to the wired Internet and generally
owned and operated by a service provider.
• Perform the following tasks: keeping track of the end users, band-width
fairness, address, and location discovery.
Address mobility
• Solutions such as Mobile IP can be used.
Routing
• Specific routing protocols for ad hoc networks are required.
Transport layer protocol
• Split approaches that use traditional wired TCP for the wired part and a
specialized transport layer protocol for the ad hoc wireless network part.
Load balancing
• Load balancing techniques are essential to distribute the load so as to avoid
the situation where the gateway nodes become bottleneck nodes. 29
Issues of Ad hoc Wireless Internet
Pricing/billing
• It is important to introduce pricing/billing strategies for the ad hoc wireless
internet.
Provisioning of security
• It is essential to include security mechanisms in the ad hoc wireless Internet.
QoS support
• Voice over IP (VoIP) and multimedia applications require the QoS support.
Service, address, and location discovery
• Service discovery refers to the activity of discovering or identifying the
party which provides a particular service or resource.
• Address discovery refers to the services such as address resolution protocol
(ARP) or domain name service (DNS).
• Location discovery refers to different activities such as detecting the
location of a particular mobile node.
30
An illustration of the ad hoc wireless Internet implemented
by a wireless mesh network.
31
32
UNIT 3
• Routing Protocols: Introduction, Issues in Designing a Routing Protocol for
Ad Hoc Wireless Networks, Classification of Routing Protocols, Table –
Driven Routing Protocols, On – Demand Routing Protocols, Hybrid Routing
Protocols, Routing Protocols with Efficient Flooding Mechanisms
Hierarchical Routing Protocols, Power – Aware Routing Protocols.
• Transport Layer and Security Protocols: Introduction, Issues in Designing a
Transport Layer Protocol for Ad Hoc Wireless Networks, Design Goals of a
Transport Layer Protocol for Ad Hoc Wireless Networks, Classification of
Transport Layer Solutions, TCP Over Ad Hoc Wireless Networks, Other
Transport Layer Protocol for Ad Hoc Wireless Networks, Security in Ad Hoc
Wireless Networks, Network Security Requirements, Issues and Challenges
in Security Provisioning, Network Security Attacks, Key Management,
Secure Routing in Ad Hoc Wireless Networks.
ROUTING PROTOCOLS FOR AD HOC
WIRELESS NETWORKS
• An ad hoc wireless network consists of a set of
mobile nodes (hosts) that are connected by
wireless links
• Routing protocols that find a path to be
followed by data packets from a source node
to a destination node used in traditional wired
networks cannot be directly applied in ad hoc
wireless networks due to their highly dynamic
topology
ROUTING PROTOCOLS FOR AD HOC
WIRELESS NETWORKS
• absence of established infrastructure for
centralized administration (e.g., base stations
or access points), bandwidth-constrained
wireless links, and resource (energy)-
constrained nodes.
ISSUES IN DESIGNING A ROUTING PROTOCOL
FOR AD HOC WIRELESS NETWORKS
• Mobility
Network topology is highly dynamic due to movement of nodes.
hence, an ongoing session suffers frequent path breaks.
• Disruption occurs due to the movement of either intermediate
nodes in the path or end nodes .
• Even though the wired network protocols find alternate routes
during path breaks, their convergence is very slow.
• Therefore, wired network routing protocols cannot be used in ad
hoc wireless networks where the mobility of nodes results in
frequently changing network topologies.
CONT..
• Bandwidth Constraint
Abundant bandwidth is available in wired networks due to the
advent of fiber optics and due to the exploitation of
wavelength division multiplexing (WDM) technologies.
• In a wireless network, the radio band is limited, and hence the
data rates it can offer are much less than what a wired network
can offer.
• This requires that the routing protocols use the bandwidth
optimally by keeping the overhead as low as possible.
• The limited bandwidth availability also imposes a constraint
on routing protocols in maintaining the topological
information.
CONT..
• Error-prone shared broadcast radio channel
The broadcast nature of the radio channel poses a unique challenge
in ad hoc wireless networks.
11
5 10
7
4 8
2
1 9
3
S
POWER AWARE ROUTING(PAR)
conserve power and share cost of routing
packets to ensure increase in life of node and
network
Metrics
1. Minimize energy consumed / packet
2. Maximize time to Network Partition
3. Minimize variance in node power levels
4. Minimize cost / packet
5. Minimize maximum node cost
• Minimal energy consumption per a packet:
This metric involves a number of nodes from source to destination.
uniform consumption of power throughout the network;
• Maximize the network connectivity:
To balance the load between the cut-sets (those nodes removal of which
causes partitions).
• Minimum variance in node power levels:
To distribute load such that power consumption pattern remains uniform
across nodes.
nearly optimal performance is achieved by routing a packet to least loaded
next-hop.
• Minimum cost per a packet:
• Cost as a function of the battery charge (less energy { more cost) and use
it as a metric.
easy to compute (battery discharge patterns are available);
this metric handles congestions in the network.
TRANSPORT LAYER AND SECURITY PROTOCOLS
FOR AD HOC WIRELESS NETWORKS
• The objectives of a transport layer protocol include the
setting up of an end-to end connection, end-to-end delivery
of data packets, flow control, and congestion control.
• There exist simple, unreliable, and Connection-less transport
layer protocols such as UDP, and reliable, byte-stream-based,
and connection oriented transport layer protocols such as
TCP for wired networks.
• This chapter mainly focus on communication and security has
been established in all the protocols and also it provides the
infrastructure network with secure transmission.
ISSUES IN DESIGNING A TRANSPORT LAYER PROTOCOL
FOR AD HOC WIRELESS NETWORKS
• In this section, some of the issues to be considered while designing a
transport layer protocol for ad hoc wireless networks are discussed.
• Induced traffic
In a path having multiple links, transmission at a particular link affects one
upstream link and one downstream link. This traffic at any given link (or
path) due to the traffic through neighboring links (or paths) is referred to as
induced traffic.
• Induced throughput unfairness
This refers to the throughput unfairness at the transport layer due to the
throughput/delay unfairness existing at the lower layers such as the
network and MAC layers.
• Separation of congestion control, reliability, and flow control
Transport layer protocol can provide better performance if end-to-end
reliability, flow control, and congestion control are handled separately.
Reliability and flow control are end-to-end activities, whereas congestion
can at times be a local activity.
• Power and bandwidth constraints
Nodes in ad hoc wireless networks face resource constraints including the two
most important resources: (i) power source and (ii) bandwidth.
• Misinterpretation of congestion
Traditional mechanisms of detecting congestion in networks, such as packet
loss and retransmission timeout, are not suitable for detecting the network
congestion in ad hoc wireless networks.
• Completely decoupled transport layer
In ad hoc wireless networks, the cross-layer interaction between the transport
layer and lower layers such as the network layer and the MAC layer is
important for the transport layer to adapt to the changing network environment.
• Dynamic topology
Some of the deployment scenarios of ad hoc wireless networks experience
rapidly changing network topology due to the mobility of nodes. This can lead
to frequent path breaks, partitioning and remerging of networks, and high delay
in reestablishment of paths.
DESIGN GOALS OF A TRANSPORT LAYER PROTOCOL FOR
AD HOC WIRELESS NETWORKS
TCP
TCP over
over ad
ad hoc
hoc wireless
wireless networks
networks Other transport layer approach
ATCP
End-to-end
ATP
Split Approach
approach
Split-TCP TCP-F
TCP-ELFN
TCP-Bus
56
TCP Over Ad Hoc Wireless Network
Feedback-based TCP (TCP Feedback – TCP-F)
Requires the support of a reliable link layer and a routing protocol that can provide
feedback to the TCP sender about the path breaks.
The routing protocol is expected to repair the broken path within a reasonable time
period.
Advantages: Simple, permits the TCP congestion control mechanism to respond to
congestion
Disadvantages:
If a route to the sender is not available at the failure point (FP), then additional
control packets may need to be generated for routing the route failure notification
(RFN) packet.
Requires modification to the existing TCP.
The congestion window after a new route is obtained may not reflect the
achievable transmission rate acceptable to the network and the TCP-F receiver.
57
58
TCP-F
RFN RFN
N
S A B C Failed Point D
59
TCP-F
S A B C D
RRN RRN RRN RRN
60
TCP Over Ad Hoc Wireless Network
TCP with explicit link failure notification (TCP-ELFN)
Handle explicit link failure notification
Use TCP probe packets for detecting the route reestablishment.
The ELFN is originated by the node detecting a path break upon detection of a link
failure to the TCP sender.
Advantages:
improves the TCP performance by decoupling the path break information from
the congestion information by the use of ELFN.
Less dependent on the routing protocol and requires only link failure
notification
Disadvantages
When the network is partitioned, the path failure may last longer
The congestion window after a new route is obtained may not reflect the
achievable transmission rate acceptable to the network and TCP receiver.
TCP ELFN
Sender reaction
When a TCP sender receives an ELFN,
It disables its retransmission timers and enters a “standby” mode
While on standby,
A packet is sent at periodic intervals to probe the network to see if a
route has been established
If an acknowledgment is received,
Then it leaves standby mode
62/41
TCP Over Ad Hoc Wireless Network
TCP with buffering capability and sequence information (TCP-BuS)
63
64
TCP Over Ad Hoc Wireless Network
Ad Hoc TCP (ATCP)
uses a network layer feedback mechanism to make the TCP sender aware of the status of the
network path
Based on the feedback information received from the intermediate nodes, the TCP sender
changes its state to the persist state, congestion control state, or the retransmit state.
When an intermediate node finds that the network is partitioned, then the TCP sender state
is changed to the persist state.
The ATCP layer makes use of the explicit congestion notification (ECN) for maintenance
for the states.
Advantages
Maintain the end-to-end semantics of TCP
Compatible with traditional TCP
Provides a feasible and efficient solution to improve throughput of TCP
Disadvantages
The dependency on the network layer protocol to detect the route changes and
partitions
The addition of a thin ATCP layer to the TCP/IP protocol changes the interface
functions currently being used.
65
66
Split-TCP
Issues addressed by Split-TCP:
Throughput degradation with increasing path length
Channel capture effect (802.11)
Mobility issues with regular TCP
67
Channel Capture Effect
Definition:
“The most data-intense connection dominates the multiple-
access wireless channel”
Higher SNR(Signal-to-noise ratio)
Early start
Example: 2 simultaneous heavy-load TCP flows located close to
each other.
68
How does Split-TCP work?
Connection between sender and receiver broken into
segments
A proxy controls each segment
Regular TCP is used within segments
Global end-to-end connection with periodic ACKs (for
multiple packets)
69
Split-TCP Segmentation
70
Split-TCP in a MANET:
Proxy Functionality
Proxies:
Intercept and buffer TCP packets
Transmit packet, wait for LACK
Send local ACK (LACK) to previous proxy
Packets cleared upon reception of LACK
Increase fairness by maintaining equal connection length
71
Split-TCP in a MANET (2)
Steps:
Node 1 initiates TCP session
Nodes 4 and 13 are chosen as
proxies on-demand
Upon trx, 4 buffers packets
If a packet lost at 15, request
made to 13 to retransmit
1 unaware of link failure at 15
72
NETWORK SECURITY REQUIREMENTS
Confidentiality:
Integrity:
Availability:
Non-repudiation:
NETWORK SECURITY REQUIREMENTS
Confidentiality:
The data sent by the sender (source node) must be
comprehensible only to the intended receiver
(destination node).
Though an intruder might get hold of the data being
sent, he/she must not be able to derive any useful
information out of the data. One of the popular
techniques used for ensuring confidentiality is data
encryption.
Integrity:
The data sent by the source node should reach the
destination node as it was sent: unaltered.
Availability:
The network should remain operational all the time.
It should be able to provide the guaranteed services
whenever an authorized user requires them.
Non-repudiation:
• Non-repudiation is a mechanism to guarantee that
the sender of a message cannot later deny having sent
the message and that the recipient cannot deny
having received the message.
Digital signatures, which function as unique identifiers
for each user, much like a written signature, are used
commonly for this purpose.
KEY MANAGEMENT
Cryptography is one of the most common and reliable
means to ensure security.
Cryptography is not specific to ad hoc wireless networks. It
can be applied to any communication network
The processes of encryption and decryption are governed
by keys, which are small amounts of information used by the
cryptographic algorithms.
When the key is to be kept secret to ensure the security of
the system, it is called a secret key. The secure administration
of cryptographic keys is called key management.
Symmetric Key Algorithms
Symmetric key algorithms rely on the presence of the shared
key at both the sender and receiver, which has been
exchanged by some previous arrangement.
Asymmetric Key Algorithms
Asymmetric key (or public key) algorithms use different keys
at the sender and receiver ends for encryption and
decryption, respectively.
Key Management Approaches
The primary goal of key management is to share a secret (some
information) among a specified set of participants.
Key Predistribution
Key predistribution, as the name suggests, involves
distributing keys to all interested parties before the start of
communication. This method involves much less
communication and computation, but all participants must
be known a priori, during the initial configuration.
Key Transport
In key transport systems, one of the communicating entities
generates keys and transports them to the other members.
The simplest scheme assumes that a shared key already exists
among the participating members.
Key Arbitration
Key arbitration schemes use a central arbitrator to create and
distribute keys among all participants. Hence, they are a class
of key transport schemes. Networks which have a fixed
infrastructure use the AP as an arbitrator.
Key Agreement
Most key agreement schemes are based on asymmetric key
algorithms. They are used when two or more people want to
agree upon a secret key, which will then be used for further
communication.
Key Management in Ad Hoc Wireless Networks
Cluster TDMA
The time division multiple access (TDMA) scheme is used within
a cluster for controlling access to the channel.
Further, it is possible for multiple sessions to share a given
TDMA slot via code division multiple access (CDMA).
A synchronous time division frame is defined to support TDMA
access within a cluster and to exchange control information.
Each synchronous time division frame is divided into slots. Slots
and frames are synchronized throughout the network.
• IEEE 802.11e
In this section the IEEE 802.11 MAC protocol is first described briefly.
Then, the recently proposed mechanisms for QoS support, namely
enhanced
distributed coordination function (EDCF) and
hybrid coordination function (HCF),
• IEEE 802.11 MAC protocol
The 802.11 MAC protocol supports two modes of operation, namely
Distributed coordination function (DCF)
Point coordination function (PCF).
The DCF mode provides best-effort service, while the PCF mode has
been designed to provide real-time traffic support in infrastructure-
based wireless network configurations. The DCF mode does not use any
kind of centralized control, all stations are allowed to contend for the
shared medium simultaneously.
CSMA/CA mechanism and random back off scheme are used to reduce
frame collisions.
• QoS support mechanisms of IEEE 802.11e
The IEEE 802.11 Task Group e (TGe) has been setup to enhance the
current 802.11 MAC protocol such that it is able to support multimedia
applications.
• Enhanced distributed coordination function(EDCF)
Each frame from the higher layer carries its user priority (UP). After
receiving each frame, the MAC layer maps it into an access category
(AC). Each AC has a different priority of access to the wireless medium.
One or more Ups can be assigned to each AC.
Hybrid coordination function
The Hybrid coordination function (HCF)
combines features of EDCF and PCF to provide
the capability of selectively handling MAC
service data units (MSDUs),
in a manner that has upward compatibility
with the both DCF and PCF.
It uses a common set of frame exchange
sequences during both the CP
QAP may include one or more TXOPs. During the CAP, the HC may
transmit frames and issue polls to stations which grant them TXOPs.
At the end of the TXOP or when the station has no more frames to
transmit, it explicitly hands over control of the medium back to the HC.
During CP, each TXOP begins either when the medium is determined to
be available under the EDCF rules (EDCF-TXOP) or when the station
receives a QoS CF-Poll frame from the HC (Polled- TXOP).
• DBASE(Ditributed Bandwidth allocation Sharing/Extension)
Like the IEEE 802.11 standard, the DBASE protocol divides the frames into three
priority classes.
Frames belonging to different priority classes have to wait for different IFSs
before they are transmitted.
Stations have to wait for a minimum of PIFS(PCF(Point coordination
function) Inter-frame Space (PISF)
before transmitting rt-frames such as reservation frame (RF) and request to
send (RTS).
The Non real time-frames have the lowest priority, and hence stations have to
wait for DIFS(DCF(Distributed coordination function) Inter-frame Space)
before transmitting such frames.
• The access procedure for real-time stations
Each real time-station maintains a virtual Reservation table (RSVT). In this
virtual table, the information regarding all rt-stations that have successfully
reserved the required bandwidth is recorded.
Before initiating an rt-session, the rt-station sends an RTSin order to reserve the
required bandwidth.
Before transmitting the RTS, a corresponding entry is made in the RSVT of the
node. Every station that hears this RTS packet also makes a corresponding entry
in its RSVT.
• Network layer solutions
The bandwidth reservation and real-time traffic support capability of
MAC protocols can ensure reservation at the link level only, hence the
network layer support for ensuring end-to-end resource negotiation,
reservation, and reconfiguration is very essential. This section describes
the existing network layer solutions that support QoS provisioning.
• QoS routing protocols
QoS routing protocols search for routes with sufficient resources in
order to satisfy the QoS requirements of a flow. The information
regarding the availability of resources is managed by a resource
management module which assists the QoS routing protocol in its
search for QoS feasible paths.
The QoS routing protocol should find paths that consume minimum
resources. The QoS metrics can be classified as additive metrics, concave
metrics, and multiplicative metrics.
• Ticket-based QoS routing protocol
• Ticket-based routing (TBR) protocol is a promising protocol because it
can select routes based on several desired metrics, for example route
cost and delay.
Ticket-based QoS routing is a distributed QoS routing protocol for
AWNs. It can tolerate imprecise state information during QoS route
computation and exhibits good performance even when the degree of
imprecision is high.
• Advantages and disadvantages
The objective of ticket-based probing is to improve the average call
acceptance ratio (ACAR) of AWNs.
The protocol assumes that each node has global state information, but
maintaining such information incurs huge control overhead in the
already bandwidth constrained AWNs.
• Predictive location based QoS routing protocol
The predictive location-based QoS routing protocol (PLBQR) is based on the
prediction of the location of nodes in AWNs.
The prediction scheme overcomes to some extent the problem arising due to
the presence of stale routing information.
No resources are reserved along the path from the source to the destination,
but QoS-aware admission control is performed.
• If node Y admits the flow, the flow gets the required reservation all
along the path. The new path is S→ A → Y → D.
• Energy-Efficient Design
• Synchronization
• Transport Layer Issues
• Security
• Real-Time Communication
Energy-Efficient Design
In node level :
• Dynamic power management (DPM)
• One of the basic DMP is to shut down several component of the sensor
node when no events take place.
• Dynamic voltage scaling (DVS)
• The processor has a tome-varying computational load, hence the voltage
supplied to it can be scaled to meet only the instantaneous processing
requirement.
• The real-time task scheduler should actively support DVS by predicting the
computation and communication loads.
• Sensor applications can also be trade-off between energy and accuracy.
In network level :
• The computation-communication trade-off determines how much local
computation is to be performed at each node and what level of
aggregated data should be communicated to neighbor node or BSs.
Synchronization
Sensor networks are highly distributed networks of small, lightweight wireless nodes, deployed
in large numbers to monitor the environment or system by the measurement of physical
parameters such as temperature, pressure, or relative humidity
The two basic kinds of sensor network architecture are layered and clustered.
1. Layered Architecture
2. Clustered Architecture
1. Layered Architecture
A layered architecture has a single powerful base station (BS), and the layers of sensor nodes
around it correspond to the nodes that have the same hop-count to the BS.
• Layered architectures have been used with in-building wireless backbones, and in
military sensor-based infrastructure, such as the multi-hop infrastructure network
architecture (MINA).
• In the in-building scenario, the BS acts an an access point to a wired network, and small
nodes form a wireless backbone to provide wireless connectivity.
• The users of the network have hand-held devices such as PDAs which communicate via
the small nodes to the BS. Similarly, in a military operation, the BS is a data-gathering
and processing entity with a communication link to a larger network.
Unified Network Protocol Framework (UNPF)
✓ The BS broadcasts its ID using a known CDMA code on the common control channel.
✓ All nodes which hear this broadcast then record the BS ID. They send a beacon signal
with their own IDs at their low default power levels.
✓ BS broadcasts a control packet with all layer one node IDs. All nodes send a beacon
signal again.
✓ The layer one nodes record the IDs which they hear (form layer two) and inform the BS
of the layer two nodes IDs.
✓ Periodic beaconing updates neighbor information and change the layer structure if
nodes die out or move out of range.
MAC protocol
During the data transmission phase, the distributed TDMA receiver oriented channel (DTROC)
assignment MAC protocol is used.
Channel allocation: Each node is assigned a reception channel by the BS, and channel reuse is
such that collisions are avoided.
Channel scheduling: The node schedules transmission slots for all its neighbors and broadcasts
the schedule. This enables collision-free transmission and saves energy, as nodes can turn off
when they are not involved on a send/receive operation.
Routing protocol
✓ Downlink from the BS is by direct broadcast on the control channel. Uplink from the
sensor nodes to BS is by multi-hop data forwarding.
2 Clustered Architecture
✓ A clustered architecture organizes the sensor nodes into clusters, each governed by a
cluster-head. The nodes in each cluster are involved in message exchanges with their
cluster-heads, and these heads send message to a BS.
✓ Clustered architecture is useful for sensor networks because of its inherent suitability for
data fusion. The data gathered by all member of the cluster can be fused at the cluster-
head, and only the resulting information needs to be communicated to the BS.
• Data dissemination is the process by which queries or data are routed in the sensor
network. The data collected by sensor nodes has to be communicated to the BS or to any
other node interested in the data.
• The node that generates data is called a source and the information to be reported is
called an event.
• node which is interested in an event and seeks information about it is called a sink.
Flooding
In flooding, each node which receives a packet broadcasts it if the maximum hop-count
of the packet is not reached and the node itself is not the destination of the packet.
• Implosion: This is the situation when duplicate messages are sent to the same node.
This occurs when a node receives copies of the same message from many of its
neighbors.
• Overlap: The same event may be sensed by more than one node due to overlapping
regions of coverage. This results in their neighbors receiving duplicate reports of the
same event.
• Resource blindness: The flooding protocol does not consider the available energy at the
nodes and results in many redundant transmissions. Hence, it reduces the network
lifetime.
Gossiping
Rumor Routing
✓ The sequential assignment routing (SAR) algorithm creates multiple trees, where the root
of each tree is a one-hop neighbor of the sink.
✓ To avoid nodes with low throughput or high delay.
✓ Each sensor node records two parameters about each path though it : available energy
resources on the path and an additive QoS metric such as delay.
• Higher priority packets take lower delay paths, and lower priority packets have to use
the paths of greater delay, so that the priority x delay QoS metric is maintained.
✓ SAR minimizes the average weighted QoS metric over the lifetime of the network.
Directed Diffusion
• The directed diffusion protocol is useful in scenarios where the sensor nodes themselves
generate requests/queries for data sensed by other nodes, instead of all queries arising
only from a BS.
• Hence, the sink for the query could be a BS or a sensor node. The directed diffusion
routing protocol improves on data diffusion using interest gradients.
• The objective of the data-gathering problem is to transmit the sensed data from each
sensor node to a BS.
• The goal of algorithms which implement data gathering is to maximize the number of
rounds of communication before the nodes die and the network becomes inoperable
Direct Transmission
All sensor nodes transmit their data directly to the BS. This is extremely expensive in
terms of energy consumed , since the BS may be very far away from some nodes
✓ PEGASIS based on the assumption that all sensor nodes know the location of every other
node.
✓ Any node has the required transmission range to reach the BS in one hop, when it is
selected as a leader.
✓ The goal of PEGASIS are as following
– Minimize the distance over which each node transmit
– Minimize the broadcasting overhead
– Minimize the number of messages that need to be sent to the BS
– Distribute the energy consumption equally across all nodes
✓ To construct a chain of sensor nodes, starting from the node farthest from the BS. At each
step, the nearest neighbor which has not been visited is added to the chain.
✓ It is reconstructed when nodes die out
✓ At every node, data fusion or aggregation is carried out.
✓ A node which is designated as the leader finally transmits one message to the BS.
✓ Leadership is transferred in sequential order.
✓ The delay involved in messages reaching the BS is O(N)
Figure:Data gathering with PEGASIS.
Binary Scheme
✓ This is a chain-based scheme like PEGASIS, which classifies nodes into different levels.
✓ This scheme is possible when nodes communicate using CDMA, so that transmissions of
each level can take place simultaneously.
✓ The delay is O(logN)
• There are three basic kinds of MAC protocols used in sensor networks: fixed allocation,
demand-based, and contention-based.
• Fixed-allocation protocols provide a bounded delay for each node. However, in the case
of bursty traffic, where the channel requirements of each node may vary over time.
• Demand based MAC protocols are used in such cases, where the channel is allocated
according to the demand of the node.
✓ In situations where there is no fixed infrastructure available, some of the sensor nodes
themselves act as beacons.
✓ Using GPS, the beacon nodes have their location information, and send periodic beacons
signal to other nodes.
✓ In the case of communication using RF signals, the received signal strength indicator
(RSSI) can be used to estimate the distance.
✓ The time difference between beacon arrivals from different nodes can be used to estimate
location.
✓ Multi-lateration (ML) techniques
– Atomic ML
– Iterative ML
- Collaborative ML
Atomic ML: If a node receives three beacons, it can determine its position by a mechanism
similar to GPS.
Iterative ML: Some nodes may not be in the direct range of three beacons. Once a node
estimates its location, it sends out a beacon, which enables some other nodes to now receive at
least three beacons. Iteratively, all nodes in the network can estimate their location.
Collaborative ML: When two or more nodes cannot receive at least three beacons each, they
collaborate with each other.
Coverage(2 marks)
• Coverage is a measure of how well the network can observe or cover an event. Coverage
depends upon the range and sensitivity of the sensing nodes, and the location and density
of the sensing nodes in the given region.
• The worstcase coverage defines areas of breach, that is, where coverage is the poorest.
• Thebest-case coverage, on the other hand, defines the areas of best coverage.
Exposure(2 marks)
• Exposure is defined as the expected ability of observing a target in the sensor field. It is
formally defined as the integral of the sensing function on a path from source node P s
to destination node P d