Adhoc and Wireless Sensor Networks
Adhoc and Wireless Sensor Networks
NETWORKS
SYLLABUS
UNIT- 1 : Ad Hoc Wireless Networks
UNIT- 2: MAC Protocols for Ad Hoc Wireless
Networks
UNIT- 3: Routing Protocols for Ad Hoc Wireless
Networks
UNIT-4 :Multi-cast routing in Ad Hoc Wireless
Networks
UNIT-5: Transport layer in Ad Hoc Wireless
Networks
UNIT-6: Management in Ad Hoc Wireless Networks
BOOK
.
6. Traffic Distribution
The communication traffic pattern varies with the domain of
application in sensor networks.
• Energy Management
• Security
• Scalability
• Deployment Considerations
The data link layer is further divided into two sub layers:
The Media Access Control (MAC) sub layer is responsible for managing
access and permissions to transmit data between the network nodes.
Medium Access Scheme
The major issues to be considered in designing MAC protocol
for ad-hoc wireless
Distributed Operation
Synchronization
Hidden Terminals
Exposed Terminals
Throughput
Access Delay
Fairness
Real time traffic support
Resource reservation
Ability to measure resource Availability
Capability for power control
Adaptive rate control
Distributed Operation
The ad hoc wireless networks usually have no
centralized coordination .
The MAC protocol design should be fully distributed
involving minimum control overhead.
In the case of polling-based MAC protocols, partial
coordination is required.
Synchronization
Time Synchronization needs to be considered for TDMA
based systems
• Exposed Terminal
Fairness:
• Resource reservation:
This refers to the variation in the data bit rate achieved over a
channel. A MAC protocol that has adaptive rate control can make
use of a high data rate when the sender and receiver are nearby and
adaptively reduce the data rate as they move away from each other.
The route acquisition delay for a node that does not have a route to a particular destination
node should be as minimal as possible. This delay may vary with the size of the network and
the network load.
The unpredictable changes in the topology of the network require that the routing protocol
be able to quickly perform route reconfiguration in order to handle path breaks and
subsequent packet losses.
• Loop-free routing:
An ad hoc wireless network is a fully distributed wireless network and the use of
centralized routing approaches in such a network may consume a large amount of
bandwidth.
The control packets exchanged for finding a new route and maintaining existing
routes should be kept as minimal as possible. The control packets consume
precious bandwidth and can cause collisions with data packets, thereby reducing
network throughput.
• Scalability:
Scalability is the ability of the routing protocol to scale well (i.e., perform
efficiently) in a network with a large number of nodes. This requires minimization
of control overhead and adaptation of the routing protocol to the network size.
Provisioning of QoS:
The routing protocol should be able to provide a certain level of QoS as demanded
by the nodes or the category of calls. The QoS parameters can be bandwidth, delay,
jitter, packet delivery ratio, and throughput. Supporting differentiated classes of
service may be of importance in tactical operations.
The routing protocol in ad hoc wireless networks must be resilient to threats and
vulnerabilities. It must have inbuilt capability to avoid resource consumption, denial
of-service, impersonation, and similar attacks possible against an ad hoc wireless
network.
Multicasting
The major issues in designing multicast routing protocols are as follows:
• Scalability:
The multicast routing protocol should be able to scale for a network
with a large number of nodes.
• Security:
TCP and UDP are the two protocols used at Transport layer to carry
out these functions
The simple connectionless transport layer protocols (e.g., UDP)
neither performs flow control and congestion control nor provide
reliable data transfer.
This tends to be more serious when the partitions exist for a long
duration, resulting in multiple retransmissions of the TCP
packets and subsequent increase in the retransmission timers.
Such a behavior causes long periods of inactivity even when a
transient partition in the network lasts for a short while .
Pricing Scheme
An ad hoc wireless network's functioning depends on the presence of
relaying nodes and their willingness to relay other nodes' traffic.
neighbour discovery,
topology organization,
topology reorganization.
Neighbour discovery phase
every node in the network gathers information about its neighbours
and maintains that information in appropriate data structures. This
may require periodic transmission of short packets named beacons,
or promiscuous snooping on the channel for detecting activities of
neighbours.