Professional Documents
Culture Documents
Adhoc Wireless Sensor Network Unit 1 PART A and PART B Questions and Answers
Adhoc Wireless Sensor Network Unit 1 PART A and PART B Questions and Answers
Adhoc Wireless Sensor Network Unit 1 PART A and PART B Questions and Answers
AD HOC NETWORKS
The nodes that are in the transmission range of the sender of an on-going session, are
prevented from making a transmission. The exposed nodes should be allowed to transmit in
a controlled fashion without causing collision to the on-going data transfer. Exposed terminal
problem causes delay in packet transmission
Proactive Reactive
Nodes continuously evaluate and update routes Nodes evaluate and update routes only when they
are needed
Periodic route-update packets Route update when necessary
Route from each node to every other node in the Routes from Source to Destination only
network
Routes are ready to use instantaneously Routes constructed when needed, higher
connection setup delay
Large routing tables Small or No routing tables
Large amount of Overhead Minimum overhead
13. What do you mean by proactive routing protocols / table driven routing protocol?
Proactive routing protocols are also called as table-driven routing protocols in which each node
maintains a routing table. Routing table contains up-to-date routing information of the entire
network.
14. Mention the significance of power aware routing in ad hoc wireless networks.
Minimizes the energy consumption while routing the traffic,
Minimizing the total power consumption of all the nodes in the network,
Minimizing the overhead etc
Maximizing the lifetime of the network
15. Write the classification of routing protocols based on the routing information update
mechanism.
Ad hoc wireless network routing protocols can be classified into 3 major categories based on
the routing information update mechanism. They are:
Proactive or table-driven routing protocols
Every node maintains the network topology information in the form of routing tables by
periodically exchanging routing information.
Routing information is generally flooded in the whole network.
Whenever a node requires a path to a destination, it runs an appropriate path- finding
algorithm on the topology information it maintains.
Reactive or on-demand routing protocols
Full dump
o A node sends the whole routing table to the neighbors and thereby increases
network overhead
o A full dump is done either when the local topology changes significantly or when
an incremental update requires more than a single NDPU.
Incremental update
o In incremental update method, only the recent updated entries are sent
o An incremental update requires a single network data packet unit (NDPU)
o These are used when a node does not observe significant changes in the local
topology
o The incremental update method is more suitable when the network is large and stable
so that heavy traffic can be avoided
19. Write the difference between cellular and mobile ad hoc network
Part B
1. Explain the issues / challenges in designing Adhoc /MANET network
• Limited bandwidth:
• Wi-Fi ad hoc uses the unlicensed ISM (Industrial, Scientific, and Medical radio
bands) 2.4 GHz radios.
• The limited radio band results in reduced data rate compared to wireless networks.
Adhoc - 54 Mbps
• Hence, optimal usage of bandwidth is necessary by keeping low overhead as
possible.
• Energy constraints: Most of the nodes rely on limited battery life. Some of the power of the
batteries is used for data transmission, data processing and for routing packets to their
destination. This is a critical issue in the design of an ad hoc network.
• Dynamic network topology: The frequent movement of nodes compounds the challenges of
designing an ad hoc network due to frequent path breaks.
• Routing overhead: Due to the mobility of nodes within the ad hoc network, stale routes are
generated in the routing table leading to routing overhead.
• Packet loss due to transmission error: The vulnerable nature of wireless networks often
lead to frequent packet loss due to traffic collision caused by hidden terminals, interference
and frequent path breaks caused by mobility of nodes.
• Frequent network partitions: The random movement of nodes often leads to network
partition. This affects mostly the intermediate nodes.
• Limited physical security threats: Mobile nodes are more vulnerable to attacks within and
outside network.
•
2. Draw the schematic diagram of an ad hoc wireless Internet and discuss the issues to be
considered for the successful ad hoc wireless Internet.
Ad hoc wireless internet - Ad hoc networks support efficient Internet connectivity,
including mobility management.
Each node, have an arbitrary IP address in an ad hoc network, would require a host
route propagated to every router of the fixed network; clearly, this is an unscalable
approach.
Mobile IP is considered as an access protocol, reduces the need for host route
dissemination.
Diagram for adhoc wireless network is shown in fig
4. Explain the applications of mobile Adhoc network/MANET (or) Explain wireless mesh
network(or) Explain how adhoc network is useful in battle field.
• Military Applications
• Collaborative and Distributed computing
• Energy Operations
• Wireless Mesh Networks
• Wireless Sensor Networks
• Hybrid Wireless Networks
Military Applications
o Establishing communication among a group of soldiers for tactical operations.
o Setting up of a fixed infrastructure for communication among group of soldiers in
enemy territories or in inhospitable terrains may not be possible.
o In such a case, adhoc wireless networks provide required communication mechanism
quickly.
o The primary nature of the communication required in a military environment enforces
certain important requirements on adhoc wireless networks namely, Reliability,
Efficiency, Secure communication & Support for multicast routing.
Collaborative & Distributed computing
o Adhoc wireless network helps in collaborative computing, by establishing temporary
communication infrastructure for quick communication with minimal
configuration among a group of people in a conference.
o In distributed file sharing application reliability is of high importance which
would be provided by adhoc network.
o Other applications such as streaming of multimedia objects among participating
nodes in ad hoc wireless networks require support for soft real-time communication
o Devices used for such applications could typically be laptops with add -on wireless
interface cards, enhanced personal digital assistants (PDAs) or mobile devices with
high processing power
Emergency Operations
o Ad hoc wireless networks are very useful in emergency operations such as search
and rescue, crowd control and commando operations.
o The major factors that favour ad hoc wireless networks for such tasks are self-
configuration of the system with minimal overhead, independent of fixed or
centralised infrastructure, the freedom and flexibility of mobility, and
unavailability of conventional communication infrastructure.
o In environments, where the conventional infrastructure based communication
facilities are destroyed due to a war or due to natural calamities, immediate
deployment of adhoc wireless networks would be a good solution for co-
ordinating rescue activities.
o They require minimum initial network configuration with very little or no delay
Wireless Mesh Network
o Wireless mesh networks are adhoc wireless network that are formed to provide an
alternate communication infrastructure for mobile or fixed nodes/users, without
the spectrum reuse constraint & requirement of network planning of cellular network.
o It provides many alternate paths for a data transfer session between a source &
destination, resulting in quick reconfiguration of the path when the existing path
fails due to node failure.
o Since the infrastructure built is in the form of small radio relaying devices, the
investment required in wireless mesh networks is much less than what is required
for the cellular network counterpart.
o Each node is connected to every other node, forming a "mesh, comprises various
wireless nodes with access points
o Each node in the network acts as a forwarding node to transfer the data.
o Since the network is decentralized, forwarding of data is possible only to the
neighbouring node. This results in the network structure simple and easy.
o Wireless mesh networks should be capable of self-organization and maintenance.
o It operates at license-free ISM band around 2.4 GHz & 5 GHz.
o It is scaled well to provide support to large number of points.
o WMN makes the people connected with the Internet who work at remote areas and
operating business.
o The possible deployment scenarios of wireless mesh networks include: residential
zones, highways, business zones, important civilian regions and university campuses
o Major advantage is the support for a high data rate, quick & low cost of deployment,
enhanced services, high scalability, easy extendibility, high availability & low cost
per bit.
Wireless Sensor Networks
o The Wireless Sensor Networks (WSN) are special category of Adhoc wireless
network that are used to provide a wireless communication infrastructure among the
sensors deployed in a specific application domain
o Sensor nodes are tiny devices that have capability of sensing physical parameters
processing the data gathered, & communication to the monitoring system.
6. Explain any one of the suitable protocol for ad hoc network that maintains up to date
the routing information (or) Write about the types of ad hoc network routing protocols
based on routing information update mechanism(or) Analyze the operation of
destination sequenced distance- vector routing protocol with an example .(or) Evaluate
whether the Table driven routing protocol is suitable high mobility environment.(or)
explain proactive routing protocol(or) explain route establishment and maintenance in
DSDV protocol
“Table-driven” - Each node maintains table(s) with routing information for every other
nodes in the network
When the topology changes, updates are propagated throughout the network.
Routing information is generally flooded in the whole network.
Whenever a node requires a path to a destination, it runs an appropriate path-finding
algorithm on the topology information it maintains.
Destination Sequenced Distance Vector routing protocol
Based on the Bellman-Ford algorithm
Each mobile node maintains a routing table, in terms of number of hops to each
destination
Routing table updates are periodically broadcasted
Each node broadcasts a table and based upon this, other nodes broadcasts the updated
routing
Those nodes which are unreachable directly are labelled as “infinite”.
But, this updation of routing tables keeps on happening and an infinite loop is generated
which is commonly known as Count-To-Infinity problem.
To overcome this, Each entry in the table is marked by a sequence number, it helps to
distinguish stale routes from new ones, and thereby avoiding loops
To minimize the routing updates, variable sized update packets are used,
Depending on the number of topological changes
Destination Sequenced Distance Vector Routing: Concept
DSDV protocol uses and maintains a single table only, for every node individually. The table
contains the following parameters.
This table is updated on every step and ensures that each node broadcast as well as receives
correct information about all the nodes including their distance and sequence number.
Routing table updation can be sent to other nodes in two ways :
o In full dump update method, a node sends the whole routing table to the neighbors
o and thereby increases network overhead.
o In incremental update method, only the recent updated entries are sent. The incremental
update method is more suitable when the network is large and stable so that heavy traffic can
be avoided.
Table Maintenance in DSDV
The steps followed for maintaining a routing table at each node is given below,
o Each node receives the route information with most recent sequence number from
other nodes and updates its table.
o The node looks at its routing table in order to determine the shortest path to reach
all the destinations.
o According to the shortest path information, each node constructs another routing
table where the node has recently updated route information to reach destination
with minimum distance.
o This new routing table will be broadcast to its neighbours.
o On receipt of these messages, the neighbour nodes update its routing table.
The procedure for updating metric field in the routing table update packet is as follows,
o The routing table update packet starts with a metric of one.
o When the neighbour nodes receive this packet, it will increment this metric by one
and then re-broadcast the updated packet to its neighbours.
o This process will be repeated until all the nodes in the network receive the copy of
update message.
o In the following figure the node 11 is moved so the path between 10 to 11 is broken
up, new table is updated and broadcast to other node.
Example :
Route Establishment
Consider the example as shown in Figure (a). Here node 1 is the source node and node
15 is the destination. As all the nodes maintain global topology information, the route is
already available as shown in Figure (b). Here the routing table of node 1 indicates that
the shortest route to the destination node (node 15) is available through node 5 and the
distance to it is 4 hops, as depicted in Figure (b).
Route Maintenance
Node 11 moves from its current position, as shown in Figure b . When a neighbor node
perceives the link break, it sets all the paths passing through the broken link with
distance as ∞. For example, when node 10 knows about the link break, it sets the path to
node 11 as ∞ and broadcasts its routing table to its neighbors. Those neighbors detecting
significant changes in their routing tables rebroadcast it to their neighbors. In this way,
the broken link information propagates throughout the network. Node 1 also sets the
distance to node 11 as ∞. When node 14 receives a table update message from node 11, it
informs the neighbors about the shortest distance to node 11. This information is also
propagated throughout the network. All nodes receiving the new update message with the
higher sequence number set the new distance to node 11 in their corresponding tables.
The updated table at node 1 is shown in Figure 7.6, where the current distance from node
1 to node 11 has increased from three to four hops.
Advantages
Less delay involved in the route setup process.
Mechanism of incremental update with sequence number tags makes the existing wired
network protocols adaptable to ad hoc wireless networks.
The updates are propagated throughout the network in order to maintain an up-to- date view
of the network topology at all nodes.
Disadvantages
o The updates due to broken links lead to a heavy control overhead during high mobility.
o Even a small network with high mobility or a large network with low mobility can
completely choke the available bandwidth.
o Suffers from excessive control overhead.
o In order to obtain information about a particular destination node, a node has to wait for a
table update message initiated by the same destination node.
7. Explain the Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless Networks
1. It must be fully distributed, Distributed routing is more fault tolerant than centralized
routing, which involves the risk of single point of failure.
2. It must be adaptive to frequent topology changes caused by the mobility of nodes.
3. Route computation and maintenance must involve a minimum number of nodes. Each
node in the network must have quick access to routes, that is, minimum connection setup time
is desired.
4. It must be localized,
5. It must be loop-free and free from stale routes.
6. The number of packet collisions must be kept to a minimum by limiting the number of
broadcasts made by each node. The transmissions should be reliable to reduce message loss
and to prevent the occurrence of stale routes.
7. It must converge to optimal routes once the network topology becomes stable. The
convergence must be quick.
8. Optimum use of resources such as bandwidth, computing power, memory, and battery
power.
9. Every node in the network should try to store information regarding the stable local
topology only.
10. It should be able to provide a certain level of quality of service (QoS) as demanded by
the applications, and should also offer support for time-sensitive traffic.
o For example, if both node A and node C transmit to node B at the same time, their
packets collide at node B. This is due to the fact that both node A and C are hidden from
each other, as they are not within the direct transmission range of each other and hence do
not know about the presence of each other.
o Solution for this problem include medium access collision avoidance (MACA)
o Transmitting node first explicitly notifies all potential hidden nodes about the
forthcoming transmission by means of a two way handshake control protocol called RTS-
CTS protocol exchange. This may not solve the problem completely but it reduces the
probability of collisions.
Exposed Terminal Problem
o The exposed terminal problem refers to the inability of a node which is blocked due to
transmission by a nearby transmitting node to transmit to another node.
o For example, consider the figure, Here, if a transmission from node B to another node A
is already in progress, node C cannot transmit to node D, as it concludes that its neighbor
node B, is in transmitting mode and hence should not interfere with the on-going
transmission. Thus, reusability of the radio spectrum is affected.
o Solution for this problem, : In this case, node A did not successfully receive the CTS
originated by node R and hence assumes that there is no on- going transmission in the
neighborhood. Since node A is hidden from node T, any attempt to originate its own RTS
would result in collision of the on-going transmission between nodes T and R.
Advantages
• Dynamic networks can be handled easily.
• No loop generation.
Disadvantages
• A delayed protocol because of its route discovery process.
• High bandwidth requirement.’
10. How is the loop free property ensured in an on demand routing protocol and in table
driven routing protocol?
When a data packet is continually routed through the same routers over and over is
called routing loop.
It is a serious problem since routing loops not only consume a lot of bandwidth but
also cause inaccessible network.
Loop free routing is achieved by using a combination of timestamps or sequence
numbers
Timestamps is the need for a globally synchronized clock at all nodes, whereas
sequence numbers would need to be reset eventually, which requires reliable
broadcasts
DSDV Protocol
11. What is MAC protocol ? and explain the issue of Medium Access Control in adhoc
network
MAC provides fair access to shared broadcast radio channel to all node.
The purpose of this protocol is to achieve a distributed FIFO schedule among multiple nodes
in an ad hoc network. The major issues in MAC protocol are as follows:
Distributed Operation: The MAC protocol design should be fully distributed involving
minimum control overhead, because it need to operate in environment without centralized
device.
Synchronization: The synchronization is mandatory for TDMA-based systems for
management of transmission and reception slots.
Hidden Terminals Problem: Hidden terminals are nodes that are hidden (or not reachable)
from the sender of a data transmission session, but are reachable to the receiver of the session.
Throughput: The MAC protocol employed in ad hoc wireless networks should attempt to
maximize the throughput of the system. The important considerations for throughput
enhancement are
a. Minimizing the occurrence of collisions.
b. Maximizing channel utilization
c. Minimizing control overhead.
Access delay: The average delay that any packet experiences to get transmitted. The MAC
protocol should attempt to minimize the delay.
Fairness: Fairness refers to the ability of the MAC protocol to provide an equal share of the
bandwidth to all competing nodes. Fairness can be either node-based or flow-based.
Real-time Traffic support: In a contention-based channel access environment, without any
central coordination, with limited bandwidth, and with location- dependent contention,
supporting time- sensitive traffic such as voice, video, and real-time data requires explicit
support from the MAC protocol.
Resource reservation: The provisioning of QoS defined by parameters such as bandwidth,
delay, and jitter requires reservation of resources such as bandwidth, buffer space, and
processing power.
Ability to measure resource availability: The MAC protocol should be able to provide an
estimation of resource availability at every node. This can also be used for making congestion
control decisions.
Capability for power control: The transmission power control reduces the energy
consumption at the nodes, causes a decrease in interference at neighboring nodes, and
increases frequency reuse.
Adaptive rate control: This refers to the variation in the data bit rate achieved over a
channel. A MAC protocol that has adaptive rate control can make use of a high data rate.