introduction to mobile ad hoc networks
DESCRIPTION
Introduction Applications Challenges Medium Access Control Routing - Proactive routing protocols - Reactive routing protocolsTRANSCRIPT
![Page 1: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/1.jpg)
한국해양과학기술진흥원
Introduction to Mobile Ad hoc
Networks
2013.10.6
Sayed Chhattan Shah, PhD
Electronics and Telecommunications Research Institute, Korea
https://sites.google.com/site/chhattanshah/
![Page 2: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/2.jpg)
한국해양과학기술진흥원2
Acknowledgements
David B. Johnson, Rice University, “Multihop Wireless Ad Hoc Networking: Current Chal-lenges and Future Opportunities”
Carlos Pomalaza-Ráez, University of Oulu, Finland, “MAC protocols for Mobile Ad hoc Network”
Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedtand Piet Demeester, Ghent Univer-sity, “An Overview of Mobile Ad Hoc Net-works: Applications and Challenges”
![Page 3: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/3.jpg)
한국해양과학기술진흥원
Outline
Introduction
Applications
Challenges
Medium Access Control
Routing
Proactive routing protocols
Reactive routing protocols
![Page 4: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/4.jpg)
Introduction
![Page 5: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/5.jpg)
한국해양과학기술진흥원
Wireless Networks
Any type of computer network that utilizes some
form of wireless network connection
Types
Cellular Network Wireless LAN
![Page 6: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/6.jpg)
한국해양과학기술진흥원
Wireless Networks Types
Several types but all have similar architecture
Relies on a fixed infrastructure
• Centralized base station or access point
• All users within wireless range of it
• Communicate with an access point or base station
• Need planning, installation and management
![Page 7: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/7.jpg)
한국해양과학기술진흥원
Wireless Ad Hoc Network
A decentralized type of wireless networks
Ad hoc because it does not rely on a pre existing
infrastructure such as routers or access points
Each node participates in routing by forwarding
data of other nodes
![Page 8: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/8.jpg)
한국해양과학기술진흥원
Mobile Ad Hoc Network
A type of wireless ad hoc network
Infrastructureless network of mobile devices
Nodes are free to move independently in any direction
Links to other devices are changed frequently
![Page 9: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/9.jpg)
한국해양과학기술진흥원
Mobile Ad Hoc Network
Used when
Infrastructure is not available
• Remote areas
• Unplanned meetings
• Disaster relief
• Military operations
May not want to use the available infrastructure
• Time or cost to access service
Dynamically extend coverage of infrastructure
• Allow users to be further away from infrastructure
![Page 10: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/10.jpg)
Mobile Ad Hoc Network Applications
![Page 11: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/11.jpg)
![Page 12: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/12.jpg)
한국해양과학기술진흥원
Challenges
Nodes Battery-powered
Limited processing power
Wireless Network Packet loss due to transmission errors
Variable capacity links
Shared Bandwidth
Limited Bandwidth and High Latency
![Page 13: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/13.jpg)
한국해양과학기술진흥원
Challenges
Dynamic Network Environment Nodes may move any time
May join and leave the network
Self-organized Network No one is in charge
No one to provide standard service
Security
![Page 14: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/14.jpg)
Medium Access Control
![Page 15: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/15.jpg)
한국해양과학기술진흥원
Medium Access Control
In a given area, only one speaker is allowed to talk at a time,
Else, listener would hear noise
To avoid conflict Wait for a coordinator to ask them to speak
Wait different time before talking
![Page 16: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/16.jpg)
Classification of MAC Protocols
Wireless MAC protocols
DistributedMAC protocols
CentralizedMAC protocols
Randomaccess
Randomaccess
Guaranteedaccess
Hybridaccess
Since we are interested in Ad hoc networks we will focus our discussions on distributed type
protocols
![Page 17: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/17.jpg)
한국해양과학기술진흥원17
Medium access methods from fixed networks
Carrier Sense Multiple Access with Collision De-tection• A collision is detected, whenever a transmitting node senses a
different signal on the same channel it has transmitted
• CSMA/CD widely used in 802.3 and Ethernet
Problems
• Signal strength decreases proportional to square of the distance
• CD is not possible in wireless channel due to half duplex operation
• Sender would apply CS and CD, but collisions happen at receiver
• Sender may not “hear” the collision, i.e., CD does not work
• CS might not work, e.g. if a terminal is “hidden”
Medium Access Control
![Page 18: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/18.jpg)
Hidden and Exposed Node Problems
A is transmitting to B C is out of range of A and is unaware of the transmissionIf C transmits to B it will cause a collision at B
A B C
A B C D
B is transmitting to AC wants to transmit to DC senses transmission & declines even if its transmission will not cause any collision at A
Hidden node
Exposed node
![Page 19: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/19.jpg)
Capture Problem
A B
C
D
dA
BdC
B
If A and C transmitsimultaneously to B then the signal power of C, re-ceived at B, is higher than the one from A (because dCB < dAB) and there is a good probability that C’s signal can be correctly de-coded in the presence of A’s transmission
This capture of C’s signal can improve protocol perfor-mance, but it results in unfair sharing of the channel with preference given to nodes closer to the receiver. Wireless MAC protocols need to ensure fairness under such conditions
![Page 20: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/20.jpg)
Multiple Access with Collision Avoidance
Uses signaling packets for collision avoidance
Request to send RTS Sender request the right to send from a receiver with a
short RTS packet before it sends a data packet
Clear to send CTS
Receiver grants the right to send as soon as it is ready to receive
![Page 21: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/21.jpg)
Multiple Access with Collision Avoidance
Avoids the problem of hidden terminal A and C want to send to B
A sends RTS
C waits after receiving CTS from B
![Page 22: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/22.jpg)
Multiple Access with Collision Avoidance
Avoids the problem of exposed terminal B wants to send to A, C to another terminal
Now C does not have to wait, as it cannot receive CTS from A
![Page 23: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/23.jpg)
Multiple Access with Collision Avoidance
Reliability Solution is to use acknowledgements
If fail to receive acknowledgements, retransmit
Power Saving Solution is to turn of radio when not needed
IEEE 802.11 Wireless MAC
Distributed and centralized MAC components
Distributed Coordination Function (DCF)
Point Coordination Function (PCF)
DCF suitable for multi-hop ad hoc networking
![Page 24: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/24.jpg)
한국해양과학기술진흥원
Key Performance Metrics
Delay Average time spent by a packet in the MAC queue
Fairness A fair MAC protocol does not give preference to any single node when
multiple nodes are trying to access the channel
Power Consumption Important to design MAC protocols that have power saving features
QoS Support Protocols need to treat packets from various applications based on
their delay constraints
• Common methods are the use of access priorities and scheduling
![Page 25: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/25.jpg)
Routing Protocols
![Page 26: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/26.jpg)
한국해양과학기술진흥원
Routing
Routing process of selecting paths in a network along which to send network traffic
Routing algorithms determine the specific choice of route
![Page 27: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/27.jpg)
한국해양과학기술진흥원
Distance Vector and Link State Routing Protocol
Routing information is only exchanged between directly connected neighbors Router knows from which neighbor a route was
learned, but it does not know where that neighbor learned the route
Link state routing requires that all routers know about the paths reachable by all other routers in the network
![Page 28: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/28.jpg)
한국해양과학기술진흥원
Routing in MANET
Local Node Mobility
Global Node Mobility
Limited Resources
Constrained Communication Environment
Limited Power
![Page 29: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/29.jpg)
한국해양과학기술진흥원
Routing in MANET
Proactive or table-driven routing protocols Maintain routes
Based on periodic updates
DSDV (Destination sequenced distance vector)
Advantages Low routing latency
State information
Disadvantages High routing overhead
Maintain routes which may never be used
Route repair depends on update frequency
![Page 30: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/30.jpg)
한국해양과학기술진흥원
Routing in MANET
Reactive or On-demand routing protocols Determine route when needed
Source initiates route discovery
DSR (Dynamic Source Routing)
Advantages No overhead from periodic update
Disadvantages High routing latency
![Page 31: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/31.jpg)
한국해양과학기술진흥원
Proactive Routing Protocol
DSDV (Destination Sequenced Distance Vector)
Each node maintains a routing table which stores
Destination ID
Next hop
Cost metric
Sequence No to determine freshness of route
Each node periodically forwards routing table to neighbors
Each node increments and appends its sequence number when sending its local routing table
Each route is tagged with a sequence number
routes with greater sequence numbers are preferred
![Page 32: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/32.jpg)
한국해양과학기술진흥원
Proactive Routing Protocol
DSDV (Destination sequenced distance vector) When X receives information from Y about a route to Z
• Let destination sequence number for Z at X be S(X) • S(Y) is sent from Y
If S(X) > S(Y), then X ignores the routing information received from Y
If S(X) = S(Y), and cost of going through Y is smaller than the route known to X, then X sets Y as the next hop to Z
If S(X) < S(Y), then X sets Y as the next hop to Z, and S(X) is updated to equal S(Y)
![Page 33: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/33.jpg)
한국해양과학기술진흥원
Reactive Routing Protocol
AODV (On-Demand Distance Vector Routing) Establishes a route to a destination only on demand
A node that needs a connection broadcast a route request RREQ packet
Nodes receiving RREQ packet update their information for the source node and set up backwards pointers to the source node in the route ta-bles
A node receiving the RREQ may send a route reply (RREP)
If it is either the destination or it has a route to the destination
Otherwise, it rebroadcasts the RREQ
If a node receives a RREQ which it has already processed
it discards the RREQ and does not forwards
As the RREP propagates back to the source, nodes set up forward pointers to the destination
A route is considered active as long as there are data packets peri-odically travelling from the source to the destination along that path
![Page 34: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/34.jpg)
한국해양과학기술진흥원
Routing in MANET
Hybrid routing protocols
Cluster routing protocols
Geographic routing protocols
Which protocol to use? Depends on traffic and mobility patterns?
![Page 35: Introduction to Mobile Ad hoc Networks](https://reader036.vdocuments.site/reader036/viewer/2022081516/55795c7ad8b42ab6648b4fa4/html5/thumbnails/35.jpg)
한국해양과학기술진흥원
Vehicular Ad hoc Networks
Used for communication among vehicles and be-
tween vehicles and roadside equipment
Vehicles tend to move in an organized fashion