Professional Documents
Culture Documents
Adhoc Final
Adhoc Final
INTRODUCTION
In computer networking, an Ad Hoc Network refers to a network connection established for a single session and does not require a router or a wireless base station.Mobile nodes that are within each other's radio range communicate directly via wireless links that. Here mobile nodes are cause the di erent topology in the networks.
In the above diagram nodes A and D have direct connection between them. In the rst radio station shows that in same radio stations both A and D are directly connected. But as the show in the second radio station, when nodes d are goes away from the these station the connection link was broken between them. But still A and D are connected via nodes A-B-CD. So this type of networks connections is held in ad hoc networks. So it is widely used in the military application and other temporary networks. For example, military units (e.g., soldiers, tanks, or planes), equipped with wireless communication devices, could form an ad hoc network when they roam in a battle eld. Ad hoc networks can also be used for emergency, law enforcement, and rescue missions.
1.1 Characteristics
Operating without a central coordinator Multi-hop radio relaying Frequent link breakage due to mobile nodes Constraint resources (bandwidth, computing power, battery lifetime) Instant deployment
1
1.2 Applications
Military applications Collaborative computing Emergency rescue Mesh networks Wireless sensor networks Multi-hop cellular networks Wireless Community Network
has to implement medium access mechanisms to provide certain quality of service. Infrastructure based networks lose some of the exibility which wireless networks can o er. They cannot be used for disaster relief in cases where no infrastructure is left, where ad hoc networks can be used.
control of bridging). MAC management controls authentication mechanism and power management to save battery power. 2.2.1 Medium Access Control Layer The basic servies provided by the MAC layer are the mandatory "Asynchronous data service" and an optional "Time bounded service". while 802.11 only o ers the Asynchronous data service in ad-hoc mode,both service types can be o ered using an Infrastructure based network. The following three mechanisms for IEEE 802.11 : The mandatory basic method based on a version of CSMA/CA, an optional method avoiding the hidden terminal problem,and nally a contention free polling method for time bounded service. The rst two methods are also summarized as "Ditributed Coordination Function(DCF)", the third method is called "Point Coordination Function(PCF)". The MAC Mechanisms are also called "Distributed Foundation Wireless Medium Access Control(DFWMAC)". 2.2.2 Basic DFWMAC-DCF using CSMA/CA The mandatory access mechanism of IEE 802.11 is based on Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA) ,which is random access scheme with carrier sense and collision avoidance through random backo . The basic CSMA/CA mechanism shown in gure 2.1:
If medium is idle for at least the duration of DIFS , a node can access the medium at once.This allows for short access delay under light load. If medium is busy , nodes have to wait for the duration of DIFS , entering a contention phase afterwards. Each node now choose a random back o time within a contention window and delays medium access for this random amount of time. The node cntinues to sense the medium. As soon as a node senses the channel is busy , it has lost this cycle and has to wait for the next chance. But if the randomized additional waiting time for a node is over and the medium is still idle ,the node can access the medium immediately. The basic CSMA/CA mechanism is not
4
fair.Independent of the overall time a node has already waited for transmission;each node has the same chances for transmitting data in the next cycle.To provide fairness , IEEE 802.11 adds back o timer. Each node selects random amount of waiting time within the range of contention window. If certain station does not get access to the medium in rst cycle, it stops its back o timer , waits for the channel to be idle again for DIFS and starts the counter again. As soon as the counter expires, the node accesses medium. This means that de ered stations do not choose a randomized backo time again, but continue to countdown. Stations that have waited longer have the advantage over stations that have just en-tered,in that they only have to wait for the remainder of their backo timer from the previous cycle. 2.2.3 DFWMAC-DCF with RTS/CTS Hidden terminal problem may occur in 802.11, if one station can receive two others, but those cannot receive each other. To deal with this problem, mechanism using two control
packets , RTS and CTS. After waiting for DIFS , the sender can issue a request to send (RTS) control packet. Every node receiving this RTS now has to set its net allocation vector (NAV)
in accor-dance with the duration eld The NAV than speci es earliest point at which the station
can try to access the medium. If the receiver receives the RTS , it answers with the clear to send (CTS) waiting for SIFS.
This CTS packet contains duration eld and receivers have to adjust their NAV. Now all nodes within receiving distance around sender and receiver are informed that they have to wait more time before accessing the medium. This mechanism reserves the medium for one sender exclusively. It is also called a Virtual Reservation Scheme.
memory and battery power. It should be able to provide a certain level of quality of service (Qos) as demanded by the applications,and should also o er support for time-sensitive tra c. The ooding must be less.
3.2
Secure delivery and the capability to handle constant connectivity are the most important issues for routing protocols in wireless mobile ad hoc networks. Once the path will establish between the source end destination, the source will send message to the destination without worried.If the connectivity of any two nodes changes and routes are a ected by this change, the routing protocol should be able to recover if an alternate path exists. There are some other issues related to routing in wireless ad hoc networks. For example: overhead is particularly important in a wireless network with limited bandwidth. Power consumption may also be a problem in an ad hoc network with batterypowered nodes. Quality of service may be required in an ad hoc network supporting delay sensitive applications such as video conferencing . A routing protocol may need to balance tra c based on the tra c load on links. Scalability of routing protocols is an important issue for large networks . The routing protocol may need to implement security to protect against attacks, such as sni er, man-in-the-middle. Routing protocols may rely on information based on other layers. For example, the Global Positioning System (GPS) can be used in wireless ad hoc networks deployed in battle elds or connecting vehicles. Mobility prediction can improve routing in wireless networks with known movement patterns, such as the IRIDIUM system satellite network . Information from the medium access control layer may be propagated to the network layer so that neighbours can be detected via MAC layer protocols. The power of received signals from a neighbouring node can be used to decide whether neighbour is moving closer or further away .
4. ROUTING PROTOCOLS
4.1 Classification
Routing protocols for ad hoc wireless networks can be classi ed into several types based on di erent criteria. The routing protocols for ad hoc wireless networks can be broadly classi ed into four categories base on :6
Routing Information update mechanism Use of Temporal information for routing Routing Topology Utilization of speci c resources 4.1.1 Based on the routing information update mechanism.
Proactive or table-driven routing protocols Reactive or on demand routing protocols Hybrid routing protocols
4.1.2 Based on the use of Temporal information for Routing Since ad hoc wireless networks are highly dynamic and path breaks are much more frequent than in wired networks, the use of temporal information regarding the lifetime of the wireless links and the lifetime of the path selected assumes signi cance. Routing protocols using past temporal information Routing protocols that use future temporal information 4.1.3 Based on Routing Topology Routing topology being used in the Internet is hierarchical in order to reduce the state information maintain at the core routers. Flat topology routing protocols Hierarchical topology routing protocols 4.1.4 Based on the Utilization of speci c Resources
This protocol also called as the DSDV routing protocol. It is the enhanced version of the distributed Bellman-Ford algorithm where each node maintains a table that contains the shortest distance and the rst node on the shortest path to every other node in the network. It
7
incorporate table update with increasing sequence number tag to prevent loops, to counter to the count-to-in nity problem, and for faster convergences. As describe this is the table driven so that at nite interval the tables of the each node exchange to update and which are reachable from all the nodes. If the topologies of the network are change then all tables are forwarded to their neighbor. Here in the table updating, we have two types:- One is the full dump in which done either when the local topology changed signi cantly or when a more incremental change required in the table. Second is the incremental update in which node does not observe change in the topology. Here one example is given for table updating and node table creation.
Desination A B C D E F
Next Hop A B C D D D
Distance 0 1 1 1 2 2
Here consider the example, here node A is the source node and F is the destination node. Here in the table rst Column is destination node which is all nodes in the network. Second Column is the next node in the shortest path to the source path. Third column is the distance between two nodes- source to destination. And fourth column is the sequence number of each packet to be received by them. Here routing table for node A is indicating that the shortest path to the destination node F is available through node D and the distance to it is two. And
8
the packets to be received at that place which has number as shown in table. If any link between two node is broken then the distance is assign in nite to that node and update the all node's routing table. Advantages The availability of the routers to all destination at all times implies that much less delay is involved in the route setup process. The mechanism of incremental updates with sequence number tags makes the existing wired network protocol adaptable to ad hoc networks. Hence wired network protocol can be applied to the ad hoc network by less modi cation. Disadvantages A small network with high mobility or a large network with low mobility can completely choke the available bandwidth. Hence this protocol su ers from excessive control overhead that is proportional to the number of nodes in the network. In order to obtain information about a particular destination node, a node has to wait for a table update message initiated by the same destination node. 4.2.2 Wireless routing protocol
The WRP protocols is the basically same as the DSDV protocols, but it is di er from it only in the their routing protocol. The routing table contain the up-to-date view of the network for the network for all known destination. The routing table keeps the shortest distance, the predecessor node and ag indicating the status of the path. The path status may be a simple path(correct) ,or a loop(error) ,or the destination node not marked(null). The LTC(Link cost table) contain the cost of relaying message through each link. The MRL(Message transmission list) contains an entry for the every update message that is to be retransmitted and maintain the counter for the each entry. When a node detects a link break, it sends an update message to its all neighbors with the link cost is in nite (?). And that all neighbors nd the alternate path to reach the destination and resend the message. Advantages It is the faster convergence and involves fewer table updates. Disadvantages Complexity of maintenance of multiple tables demands a larger memory and greater processing power from the nodes. At the high mobility, the control overhead involved in updating table entries is almost the same as DSDV. So it is not suitable for highly dynamic and also for very large ad hoc networks.
9
4.2.3
The CGSR protocol uses a hierarchical network topology that employs at topologies. CGSR organizes nodes into clusters, with coordination among the member of each cluster instructed nodes named "cluster head". This cluster head selected dynamically by employing a least cluster change (LCC) algorithm. According to this algorithm ,nodes creates to be a clusterhead only if it comes under the range of another cluster-head, where tie is broken either using the lower ID or highest connectivity algorithm. CGSR protocol creates a xed region in the network. Each node in the cluster region is known as cluster member and they all are connected with pivot node which is called cluster-head .Two cluster region are connected via node which are place in intersection region of two cluster region and called cluster-gateway.
Here in the gure three cluster area are shown ,the all are overlapped in each other .so between their intersection one node is placed as the gateway which transfer the information of one cluster area to the other. Advantages CGSR is a hierarchical routing scheme which enables partial coordination between nodes by electing cluster-heads. Hence , better bandwidth utilization is possible. It is easy to implement priority scheduling scheme with token scheduling and gateway code scheduling.
10
Disadvantages It increases in path length and instability in the system at high mobility when the rate of change of cluster-heads is high. To avoid gateway con icts, more resources are required. The power consumption at the cluster-head node is also a matter of concern because the battery-draining rate at the cluster-head is higher than that at a normal node.
4.3
This type of protocols execute the path nding process and exchange routing information only when path is required by the node to communicate with a destination. There some of the routing protocols like Dynamic Source Routing Protocol (DSR) , Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) . 4.3.1 Dynamic Source Routing Protocol
This type of routing protocol is design to restrict the bandwidth consumed by control packets in ad wireless networks by eliminating the periodic table-update message required in the table driven approach. In this routing protocol does not require periodic 'hello' packet transmission, which are used by a node to inform its neighbors of its presence. The basic approach of this protocol during the routing construction phase is to establish a route by ooding Route-Request packets in the network. The destination node, On receiving a RouteRequest packet, respond by sending Route
11
Here shown in the gure, the node 1 is the source node and the node 5 is the destination node. when 1 has data packet to sent to the node 5, it initiate a Route-Request as BLUE arrow in gure ,and sent it to all its neighbors or ooded. Each node receiving this request packet check if it is the destination then it generate Reply packet and send to sender. If it is not proper destination then again that node send request packets to their neighbor until destination node not found. Each packet has unique sequence number so that in the network while ooding loop will not generate. If duplicate the packet at any node then it will discarded by the particular node where redundancy will observe. Advantages Do not exchange routing update periodically, so overhead transmission is greatly re-duced Can refer to cache for the new route when link fails. Disadvantages Scalability problem: High route discovery latency for large network. High mobility problem: although the packet dropped may not be substantional, the overhead tra c will increase a lot. 4.3.2 Ad Hoc On-Demand Distance Vector Routing Protocol
The Ad hoc On-demand Distance Vector (AODV) routing protocol is a reactive protocol. Similar to DSR,AODV broadcasts a route request to discover a route in a reactive mode. The di erence is that in AODV, a eld of the number of hops is used in the route record, instead of a list of intermediate router addresses. Each intermediate router sets up a temporary reverse link in the process of a route discovery. This link points to the router that forwarded the request. Hence, the reply message can nd its way back to the initiator when a route is discovered. When intermediate routers receive the reply, they can also set up corresponding forward routing entries. To prevent old routing information being used as a reply to the latest request, a destination sequence number is used in the route discovery packet and the route reply packet. A higher sequence number implies a more recent route request. We use the example topology shown in Figure to illustrate the discovery procedure of AODV. Note that Routers A and C are disconnected from each other while both of them connect to B. When Router A starts a route discovery to C, a route request is broadcast. The request packet contains the requested destination sequence number, which is 1 greater than the one currently kept at A. The intermediate routers reply to the source if they know the route to that destination with the same or higher destination sequence number. We assume that B does not have a record for a route to C. Therefore, B rst sets up a temporary link pointing back to A. In the second step, it increases the number of hops by 1 and rebroadcasts
12
the request. When C receives that request, it creates a new destination sequence number. A route reply with that new sequence number is sent by C. The initiator and all intermediate routers build routing entries associated with this new sequence number when they receive the reply. The number of hop values can be used to nd a shorter path if a router receives two replies with the same destination sequence number.
Advantages
AODV is loop-free due to the destination sequence numbers associated with routes. Therefore, it o ers quick convergence when the ad hoc network topology changes which, typically, occurs when a node moves in the network
Disadvantages
4.4
4.4.1
The Zone Routing Protocol (ZRP) is a prototype routing protocol. ZRP is formed by two subprotocols, the Intrazone Routing Protocol (IARP) and the Interzone Routing Protocol (IERP). IARP is "a limited scope proactive routing protocol used to improve the performance of existing globally reactive routing protocols". It relies on the service of a certain neighbor discovery protocol (NDP) to provide neighbor information. IARP may use a scheme based on the time-to-live (TTL) eld in IP packets to control the zone range. IERP is the reactive routing component of ZRP. This scheme is responsible for nding a global path. It avoids global queries for destinations that would be sent to surrounding hop neighbors. When global
13
queries are required, "the routing zone based broadcast service can be used to e ciently guide route queries outward, rather than blindly relaying queries from neighbor to neighbor". ZRP tries to combine the advantages of reactive and proactive routing protocols. The potential disad-vantage is the lack of route optimization. We use the example network in Figure to brie y show the concept of ZRP. The range of the zone is set to one. So routers in Subnets I and II use proactive IARP to nd routes to other routers in the same subnet. For routes to the other subnet, reactive IERP is used.
Advantages
By combining the best features of proactive and reactive routing scheme, ZRP reduce the control overhead compared to the Route-Request ooding mechanism employed in ondemand approaches and the periodic ooding of routing information packets in table-driven approaches.
Disadvantages
In absence of a query control ,ZRP tends to produce higher control overhead than the aforementioned schemes. This can happen due to the large overlapping of nodes' routing zones. The query control must ensure that redundant or duplicate Route-Request are not forwarded.
The decision on the zone radius has a signi cant impact on the performance of the protocol.
or access
points in
managed
(infrastructure)
wireless
networks.
Instead,
each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity. In addition to the classic routing, ad hoc networks can use flooding for forwarding data. An ad hoc network typically refers to any set of networks where all devices have equal status on a network and are free to associate with any other ad hoc network device in link range. Ad hoc network often refers to a mode of operation of IEEE 802.11 wireless networks. It also refers to a network device's ability to maintain link status information for any number of devices in a 1-link (aka "hop") range, and thus, this is most often a Layer 2 activity. Because this is only a Layer 2 activity, ad hoc networks alone may not support a routeable IP network environment without additional Layer 2 or Layer 3 capabilities. The earliest wireless ad hoc networks were the "packet radio" (PRNETs) from the 1970s, sponsored by DARPA after the ALOHAnet project.
5.1 Application
The decentralized nature of wireless ad hoc networks makes them suitable for a variety of applications where central nodes can't be relied on and may improve the scalability of networks compared to wireless managed networks, though theoretical[3] and practical[4] limits to the overall capacity of such networks have been identified. Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of dynamic and adaptive routing protocols enables ad hoc networks to be formed quickly. Wireless ad-hoc networks can be further classified by their application:
communications improves immunity to interference by having the destination node combine self-interference and other-node interference to improve decoding of the desired signal.
5.5 Security
Microsoft does not allow advanced encryption and security protocols for wireless Ad hoc networks on Windows. In fact, the security hole provided by Ad hoc networking is not only the Ad hoc network itself, but the bridge it provides into other networks (see Ad hoc networks in the article Wireless security).
16
called Complex Adaptive System, are simple but result in advanced global phenomena such as emergence.
6.1 Types
Vehicular Ad hoc Networks (VANETs) are used for communication among vehicles and between vehicles and roadside equipment
Internet based mobile ad hoc networks (iMANETs) are ad hoc networks that link mobile nodes and fixed Internet-gateway nodes. In such type of networks normal adhoc routing algorithms don't apply directly.
Intelligent vehicular ad hoc networks (InVANETs) are a kind of artificial intelligence that helps vehicles to behave in intelligent manners during vehicle-to-vehicle collisions, accidents, drunken driving etc.
A mobile ad-hoc network (MANET) is an ad-hoc network but an ad-hoc network is not a MANET.
6.2 Simulations
There are several ways to study MANETs. One solution is the use of simulation tools like OPNET, NetSim and NS2.
17
6.4 Security
A lot of research has been done in the past but the most significant contributions have been the PGP (Pretty Good Privacy) and trust based security. None of the protocols have made a decent trade off between security and performance. In an attempt to enhance security in MANETs many researchers have suggested and implemented new improvements to the protocols and some of them have suggested new protocols. Attack classifications These attacks on MANETs challenge the mobile infrastructure in which nodes can join and leave easily with dynamics requests without a static path of routing. Schematics of various attacks as described by Al-Shakib Khan [1] on individual layer are as under:
Application Layer: Malicious code, Repudiation Transport Layer: Session hijacking, Flooding Network Layer: Sybil, Flooding, Black Hole, Grey Hole. Worm Hole, Link Spoofing, Link Withholding, Location disclosure etc.
Data Link/MAC: Malicious Behavior, Selfish Behavior, Active, Passive, Internal External
18
7. CONCLUSION
It was revealed that ad hoc mobile devices can be highly mobile, powerful (in terms of computation and memory capacity), and heterogeneous. Ad hoc wireless networks are not limited to a homogeneous group of laptops. They can consist of a group of minute sensors, communicating to each other and gathering environmental information. Ad hoc networks need to possess self-organizing characteristics, and they must perform routing and packet-forwarding functions. The topology of an ad hoc wireless network is dynamically changing since devices are not tied down to specific locations over time. The fact that nodes are not static implies that centralized media access is not entirely applicable. Routing protocols in ad hoc networks need to deal with the mobility of nodes and constraints in power and bandwidth. Multicasting in ad hoc wireless networks needs to be efficient since using flooding will only result in a massive consumption of available bandwidth and degrade battery life. Ad hoc devices rely on batteries to operate; hence, any inefficiency in communication protocols can drastically shorten the uptime of these devices. Current transport protocols are not designed for wireless ad hoc networks. In particular, TCP is an end-to-end protocol that cannot distinguish the presence of mobility from congestion. Finally, new methods are needed to faciliate service location, provision, and access in ad hoc wireless networks. In summary, many challenging technical issues have arisen that demand our attention and investigation.
19
8. REFERENCE
1) An Inter-domain Routing for Heterogeneous MobileAd Hoc Networks Using Packet Conversion and Address Sharing Fujiwara, S. ; Ohta, T. ; Kakuda, Y. Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on Digital Object Identifier: 10.1109/ICDCSW.2012.14 Publication Year: 2012 , Page(s): 349 - 355 Cited by: Papers (4) 2) Optimized use of battery power in wireless Ad hocnetworks Gupta, P. ; Saxena, P. ; Ramani, A.K. ; Mittal, R. Advanced Communication Technology (ICACT), 2010 The 12th International Conference on Volume: 2 Publication Year: 2010 , Page(s): 1093 1097 3(Analyzing performance of ad hoc network mobility models in a peer-topeer network application over mobile ad hoc network Amin, R. ; Ashrafch, S. ; Akhtar, M.B. ; Khan, A.A. Electronics and Information Engineering (ICEIE), 2010 International Conference On Volume: 2 Digital Object Identifier: 10.1109/ICEIE.2010.5559795 Publication Year: 2010 , Page(s): V2-344 - V2-348 4) Route Discovery Protocol for Optimizing the Power Consumption in Wireless Adhoc Network Chaturvedi, A. ; Tiwari, D. ; Bhadoria, R.S. ; Dixit, M. Communication Systems and Network Technologies (CSNT), 2013 International Conference on Digital Object Identifier: 10.1109/CSNT.2013.68 Publication Year: 2013 , Page(s): 290 294 5) A bi-directional connectivity framework for Mobile adhoc network and the internet Khan, K. ; Zaman, R.U. ; Reddy, A.V. Wireless Days, 2008. WD '08. 1st IFIP Digital Object Identifier: 10.1109/WD.2008.4812871 Publication Year: 2008 , Page(s): 1 5
20
6) Hybrid mobile ad hoc network support for Proxy Mobile IPv6 Hun-Jung Lim ; Seon-Ho Park ; Young-Ju Han ;Tai-Myoung Chung Communications, 2008. APCC 2008. 14th Asia-Pacific Conference on Publication Year: 2008 , Page(s): 1 - 5 7) A dynamic network gateway selection scheme based on autonomous clustering for heterogeneous mobilead hoc network environment Okano, K. ; Ohta, T. ; Kakuda, Y. Globecom Workshops (GC Wkshps), 2012 IEEE Digital Object Identifier: 10.1109/GLOCOMW.2012.6477626 Publication Year: 2012 , Page(s): 513 - 517 Cited by: Papers (1) 8)Performance evaluation AODV routing protocol on adhoc hybrid network testbed using PDAs Sari, R.F. ; Syarif, A. ; Ramli, K. ; Budiardjo, B. Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication., 2005 13th IEEE International Conference on Volume: 1 Digital Object Identifier: 10.1109/ICON.2005.1635480 Publication Year: 2005 Cited by: Papers (2)
21