AWSN Unit 1
AWSN Unit 1
AWSN Unit 1
SUSAN CHRSITINA
• Unit I Ad Hoc Networks – Introduction And Routing Protocols
C0704.4 Discuss the challenges in designing MAC protocols, routing protocol, physical
layer, Transport protocols and network programming for wireless Adhoc
K4-Analyze
Networks to optimize network performance.
C0704.5 Explain the network architecture, sensor/mote and sensor security issues for K2-understand
designing wireless sensor networks.
C0704.6 Comprehend various network protocols and network simulation tools for K2-understand
designing Adhoc wireless networks.
Reference Book • Wired and Wireless
C. Siva Ram Murthy and B. S. Manoj, ―Ad Hoc Network
Wireless Networks Architectures and Protocols, • Infrastructure and
Prentice Hall, Infrastructure less
• What is Adhoc network
• Difference between cellular
and Adhoc
• Characteristic of Adhoc
• Advantages of Adhoc
TOPIC 1
• Nodes are connected with the fixed
physical representation
• Nodes are communicated through AP
• Examples - GSM, UMTS and WLAN etc.
Infrastructure less
B
A
D
E
Switching Center
+
Gateway
• Energy-constrained operation
- Nodes in ad hoc network may rely on batteries or other limited energy sources
• Peer-to-peer
- No more or less “important” nodes
• Bandwidth-constrained, variable capacity links
• Each of the nodes act as a router and as a host.
❒ Mobility causes route changes
1
• Limited physical security
• More prone to physical security threats than wired networks
• Incl. stealing mobile ad hoc devices
• Many attacks, incl. Eavesdropping, spoofing, and DoS attacks are easier
• Decentralized network control
• Eliminates single points of failure (=> better reliability)
• Scalability problems
• As networks get large
• Capable of being multi-hopped when the intended node goes out of range of network.
• Mobile nodes are characterized with less memory, power and light weight features.
• The access to channel by any node is not restricted.
• Because the network is easy to set up, it can be setup at any place.
• It has a distributed administration
• Lack of infrastructure makes the network robust in network failure.
• It is scalable. This means that network accommodates addition of more nodes.
• It is very cheap to set up since there is no wiring of nodes.
• It has adaptive computing and self -configuring capability
• It does not restrict access to channels.
• Issues
• Applications
TOPIC 3
• Limited bandwidth:
• Wi-Fi ad hoc uses the unlicensed ISM (Industrial, Scientific, and Medical radio bands)
2.4 GHz radios.
• The limited radio band results in reduced data rate compared to wireless networks.
Adhoc - 54 Mbps
• Hence, optimal usage of bandwidth is necessary by keeping low overhead as possible.
• Energy constraints: Most of the nodes rely on limited battery life. Some of the
power of the batteries is used for data transmission, data processing and for
routing packets to their destination. This is a critical issue in the design of an ad
hoc network.
• Dynamic network topology: The frequent movement of nodes compounds the
challenges of designing an ad hoc network due to frequent path breaks.
• Routing overhead: Due to the mobility of nodes within the ad hoc network, stale
routes are generated in the routing table leading to routing overhead.
• Packet loss due to transmission error: The vulnerable nature of wireless
networks often lead to frequent packet loss due to traffic collision caused by
hidden terminals, interference and frequent path breaks caused by mobility of
nodes.
• Frequent network partitions: The random movement of nodes often leads to
network partition. This affects mostly the intermediate nodes.
• Limited physical security threats: Mobile nodes are more vulnerable to attacks
within and outside network.
• Military Applications
– Establishing communication among a group of soldiers for tactical
operations
– Coordination of military object moving at high speeds such as
fleets of airplanes or ships
– Requirements: reliability, efficiency, secure communication, and
multicasting routing,
• Emergency Operations
– Search, rescue, crowd control, and commando operations
– Support real-time and fault-tolerant communication paths
• Collaborative and Distributed Computing
– Conference, distributed files sharing
– reliability of data transfer is of high importance
• Wireless Mesh Networks
• An alternate communication infrastructure for mobile or fixed nodes/users
• Provides many alternate paths for a data transfer session between a source and
destination
• Each node is connected to every other node, forming a "mesh, comprises various
wireless nodes with access points
• Each node in the network acts as a forwarding node to transfer the data.
• Since the network is decentralized, forwarding of data is possible only to the
neighboring node.
• This results in the network structure simple and easy.
• WMN makes the people connected with the Internet who work at remote
areas and operating business.
• Advantages of Wireless Mesh Networks
– High data rate, quick and low cost of deployment, enhanced services, high scalability,
easy extendability, high availability, and low cost per bit
Wired Network
Gateway node
Transmission range
A house with rooftop transceiver Wired link to the Internet
Wireless link
2
Internet
TOPIC 4
• Ad hoc networks support efficient Internet connectivity, including mobility
management.
• Each node, have an arbitrary IP address in an ad hoc network, would require a
host route propagated to every router of the fixed network; clearly, this is an
unscalable approach.
• Mobile IP is considered as an access protocol, reduces the need for host route
dissemination.
Gate way Node
• Entry points to the wired Internet
• Owned and operated by a service provider
• keeping track of the end users, bandwidth management, load
balancing, traffic shaping, packet filtering, bandwidth fairness, and
address, service, and location discovery.
Gateways:
• Gateway nodes in the ad hoc wireless Internet are the entry points to the wired Internet.
• The major part of the service provisioning lies with the gateway nodes.
TOPIC 5
• Host mobility
• Dynamic topology
• Link failure / repair due to mobility
• Distributed environment
• Bandwidth constrained
• Energy constrained
Routing protocols that find a path to be followed by data packets from a source node to a destination
node
• Many factors affecting routing in MANETs:
• Models of topology
• Selection of routers
• Initiation of route requests
• Specific underlying characteristics
• E.g. application-based characteristics
• Major goals in selecting routing protocols:
• Provide the maximum possible reliability - use alternative
routes if an intermediate node fails
• Choose a route with the least cost
• E.g., minimal # of hops from source to destination
• Give the nodes the best possible response time and
throughput
• Each node in MANETs expected to serve as a router
• All execute the same routing protocol
• Protocol calculates a route
• Controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network.
• Nodes do not know the topology of their network, instead they have to discover it by their own as the topology
in the ad-hoc network is dynamic topology.
• The basic rules is that a new node whenever enters into an ad-hoc network, must announce its arrival and
presence and should also listen to similar announcement broadcasts made by other mobile nodes.
• Major goals in selecting routing protocols:
• Provide the maximum possible reliability - use alternative routes if an intermediate node fails
• Choose a route with the least cost
• E.g., minimal # of hops from source to destination
• Give the nodes the best possible response time and throughput
• Each node in MANETs expected to serve as a router
• All execute the same routing protocol
• Protocol calculates a route
Mobility:
• Ad hoc is highly dynamic due to the movement of nodes, hence
an on-going session suffers frequent path breaks.
1-4-2-6
• Disruption occurs either due to the movement of the
intermediate nodes in the path or due to the movement of
1-3-6
end nodes.
• Wired network routing protocols cannot be used in ad hoc
wireless networks because the nodes are stationary and the
path repair in wired network has slow convergence.
• Routing protocols for ad hoc wireless networks must be able to perform efficient
and effective mobility management.
Bandwidth Constraint:
• Abundant bandwidth is available in wired networks due to the advent of fiber optics
• Wireless has less bandwidth due to the limited radio band, and hence the data rates it
can offer are much less than what a wired network can offer.
TOPIC 6
1. It must be fully distributed, Distributed routing is more fault tolerant than centralized routing, which involves
the risk of single point of failure.
2. It must be adaptive to frequent topology changes caused by the mobility of nodes.
3. Route computation and maintenance must involve a minimum number of nodes. Each node in the network
must have quick access to routes, that is, minimum connection setup time is desired.
4. It must be localized, as global state maintenance involves a huge state propagation control overhead.
5. It must be loop-free and free from stale routes.
6. The number of packet collisions must be kept to a minimum by limiting the number of broadcasts made by
each node. The transmissions should be reliable to reduce message loss and to prevent the occurrence of stale
routes.
7. It must converge to optimal routes once the network topology becomes stable. The convergence must be
quick.
8. It must optimally use scarce resources such as bandwidth, computing power, memory, and battery
power.
9. Every node in the network should try to store information regarding the stable local topology only.
Frequent changes in local topology, and changes in the topology of parts of the network with which the
node does not have any traffic correspondence, must not in any way affect the node, that is, changes in
remote parts of the network must not cause updates in the topology information maintained by the node.
10. It should be able to provide a certain level of quality of service (QoS) as demanded by the applications,
and should also offer support for time-sensitive traffic.
The routing protocols for ad hoc wireless networks can be broadly classified into four categories
based on
• • Routing information update mechanism
• • Use of temporal information for routing
• • Routing topology
• • Utilization of specific resources
• Types of routing protocols:
1) Proactive Table Driven protocols
• Keep routes ready at all times
• When a packet needs to be forwarded, the route is already known
• Example: distance vector routing protocols (more below)
2) Reactive (= on-demand) protocols
• Route determination on demand
• Determine a route only when there is a packet to send
• Examples: flooding routing algorithms, ad hoc on-demand distance vector
(AODV), temporarily ordered routing algorithm (TORA) (more below)
• Routing Algorithm
• Link-State algorithm:
• Each node maintains a view of the network topology
• Distance-Vector algorithm:
• Every node maintains the distance of each destination
• Like the shortest-path computation method
• Each node maintains a view of the network topology with a cost for each link
• Periodically broadcast link costs to its outgoing links to all other nodes such as
flooding
A
link costs
F
H
B
C
G
D
• known also as Distributed Bellman-Ford or RIP (Routing Information Protocol)
• Every node maintains a routing table
• all available destinations
• the next node to reach to destination
• the number of hops to reach the destination
Routing table
is updated (A, 1) (A, 1)
(B, 0) (B, 0)
(C, 1) (C, 1)
1 1
A B C
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
A A 0 A A 1 A B 3 2
B B 1 B B 0 B B 1
C B 3 2 C C 1 C C 0
broadcasts to update
tables of C, B, A with
new entry for D
(A, 1) (A, 2)
(B, 0) (B, 1)
(C, 1) (C, 0)
(D, 2) (D, 1) (D, 0)
1 1 1
A B C D
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
A A 0 A A 1 A B 2
B B 1 B B 0 B B 1
C B 2 C C 1 C C 0
D B 3 D C 2 D D 1
1 1 1
A B C D
Dest. Next Metric … Dest.c Next Metric … Dest. Next Metric …
… … … … … … … … …
D B 3 D C 2 D B
D 1
(D, 2) (D, 2)
1 1 1
A B C D
Dest. Next Metric … Dest. Next Metric … Dest. Next Metric …
… … … … … … … … …
D B 3 D C 2 D B 3
(D,5)
(D,4) (D,4)
(D,3)
(D,2) (D,2)
1 1 1
A B C D
Dest. Next Metric … Dest.c Next Metric … Dest. Next Metric …
… … … … … … … … …
D B 3, 5, … D C 2, 4, 6… D B 3, 5, …
• DV not suited for ad-hoc networks!
• Loops
• Count to Infinity
TOPIC 7
• “Table-driven” because:
• Each node maintains table(s) with routing information for every other nodes in the network
• When the topology changes, updates are propagated throughout the network.
• Routing information is generally flooded in the whole network.
• Whenever a node requires a path to a destination, it runs an appropriate path-finding
algorithm on the topology information it maintains.
Examples of table-driven routing protocols are:
Destination Sequenced Distance Vector routing (DSDV)
Cluster-head Gateway Switch routing (CGSR)
Wireless Routing Protocol (WRP)
• Based on the Bellman-Ford algorithm
• Each mobile node maintains a routing table
• In terms of number of hops to each destination
• To minimize the routing updates, variable sized update packets are used
• Depending on the number of topological changes
Broken node distance is ∞
DSDV- Table updates
The table updates are of two types: incremental updates and full dumps
Full dump
q Large packet that contains all routing information available at a node.
q IT require several Network Protocol Data Units (NPDUs) to be transferred if the routing table is
large.
q Full dump packets are transmitted infrequently if the node only experiences occasional movement.
q A full dump is done either when the local topology changes significantly or when an incremental
update requires more than a single NDPU
Incremental routing
q An incremental update requires a single network data packet unit
q Smaller packet contains only the information that has changed since the latest full dump was sent
out by the node.
q Incremental packets only consume a fraction of the network resources compared to a full dump.
Advantages
• The availability of routes to all destinations at all times implies that much less delay is involved in
the route setup process.
• The mechanism of incremental updates with sequence number tags makes the existing wired
network protocols adaptable to ad hoc wireless networks. Hence, an existing wired network
protocol can be applied to ad hoc wireless networks with many fewer modifications.
• The updates are propagated throughout the network in order to maintain an up-to-date view of
the network topology at all the nodes.
Disadvantages
• The updates due to broken links lead to a heavy control overhead during high mobility. Even a
small network with high mobility or a large network with low mobility can completely block the
available bandwidth. Hence, this protocol suffers from excessive control overhead that is
proportional to the number of nodes in the network and therefore is not scalable in ad hoc
wireless networks, which have limited bandwidth and whose topologies are highly dynamic.
• Another disadvantage of DSDV is that in order to obtain information about a particular destination
node, a node has to wait for a table update message initiated by the same destination node. This
delay could result in stale routing information at nodes.
DSDV (Route Advertisements)
TOPIC 8
Cluster-head Gateway Switch Routing (CGSR)
Gateway Node
Cluster Head 7 1
0
Internal (non-
cluster) Node 9
8
Cluster Head Gateway Switch Routing (CGSR)
n CGSR scenario - routing from Node 1 to Node 12:
n Packet sent by Node 1 is first routed to its CH (2)
n The packet is routed from CH (2) to gateway (4) connecting to CH of
another cluster (5)
n Packet routed from gateway (4) to the next CH (5)
n …
n Packet routed from gateway (10) to CH of destination cluster (11)
n Packet routed to destination node (12)
6
12
5
11
10
4 7
1
9
8 Gateway Node
3
Cluster Head
Internal (non-
cluster) Node
Advantages and Disadvantages
TOPIC 9
• Source-initiated on-demand routing - the 2nd category (“family”) of routing protocols
• Unlike the table-driven routing protocols, on-demand routing protocols execute
the path-finding process and exchange routing information only when a path is
required by a node to communicate with a destination.
• Route Discovery:
• Initiates by broadcasting a route request packet.
• Source node S floods Route Request (RREQ)
• Route request message contains
• Address of the destination,
• Source node's address and
• Unique identification number.
• Each node appends own identifier(Sequence number) when forwarding
RREQ Entries in the route cache are continually updated as new
routes are learned.
• Source Node broadcast RouteRequest packet
• Each Intermediate node do the following steps:
• If request received before discard
• If node ID is listed in request discard
• If Route to the destination is available send RouteReply to the source node with full
path
• Otherwise append node ID and rebroadcast
• When destination is reached return RouteReply with full path
• Intermediate nodes cache all paths they overhear
• Source node caches all paths received and choose Shortest Path
S-B
S-B-E
S E
B
D
S-B S-B-C
S C
S-A-G-F
S-B-C F
S
A
G S-A-G
S-A
RouteRequest Dropped
B-E-D E-D
S-B-E-D
S-B-E-D
E
S-B-E-D B
D
S-B-E-D
S C
S-A-G-F-D
S-A-G-F-D
F
F-D
S-A-G-F-D
A
S-A-G-F-D
A-G-F-D G
S-A-G-F-D G-F-D
• Triggered when a link breaks between two nodes along the path
from the Source to the destination
• Node who discover the break send a RouteError to inform the
source node about the broken link
• Source Node
• erase the route from the cache, and
• Use another cached routes, Or
• Request a new Route
RouteError
E
RouteError B
D
S-B-E-D
S C
S-A-G-F-D
F
A
G
• Promiscuous mode, intermediate nodes learns about routes breaks
• During network partition, if the destination is in different partition a backoff algorithm is
used to prevent frequent RouteRequest broadcast
• Scalability - since the source need to add the IDs of all nodes
along the path to the destination which increase the overhead
in every data packet sent
• No Local repair of the broken link -When a link is broken
RouteError packets need to go all the way to the source to
inform it about the problem
• Intermediate node can use outdated routes stored in their cache
• Stale cache information could result to inconsistence during
route reconstruction
• Poor Performance as Mobility increases-As mobility increases
more links are broken hence more route reconstructions is
needed
• Uses a reactive approach which eliminates the need to periodically
flood the network with table updatemessages
• Route is established only when required
• Reduce control overhead
• Route maintenance mechanism does not locally repair a broken link
• Stale route cache information could result in inconsistencies during route
construction phase
• Connection set up delay is higher
• Performance degrades rapidly with increasing mobility
• Routing overhead is more & directly proportional to path length
• Each host maintains a route cache which contains all routes it has learnt.
• Source Routing:
• routes are denoted with complete information (each hop is registered)
• Two major parts:
• route discovery
• route maintenance
Dynamic Source Routing
7
2
5
Source 1
8 Destination
3
<1,4,6> <1,4,6>
6
4
<1,4,6>
A
A-C-E
A E H A-B-C
A-C-E
Route Request (RREQ)
A-C-E
C A-C A-B-C
F Route Reply (RREP)
Route Discovery: at source A
A need to send to G
Start Route no
Buffer Route
Discovery found?
packet
Protocol
Continue
yes
normal
wait
Route Packet
Discovery in
buffer?
Send
finished no packet to
don
next-hop
e
Route Discovery: At an intermediate node
no
Host’s
address yes Discard
already in route
patrial request
route
Append no
myAddr to no myAdd
partial route
r=targ
et
yes
Store <src,id>
in list Send route
reply packet
Broadcast packet
done
message containing path information is sent back to the
source either by
• the destination, or
• intermediate nodes that have a route to the destination
• Reverse the order of the route record, and include it in Route Reply.
• Unicast, source routing
D
G
A
C
F
• Ad hoc On–Demand
Distance Vector Routing
(AODV)
TOPIC 10
AD HOC ON–DEMAND DISTANCE VECTOR ROUTING (AODV)
• In AODV, the source node and intermediate nodes store the next-hop information
corresponding to each flow for data packet transmission.
• Nodes that are not in a selected path do not maintain routing information or participate in
routing table exchanges
AD HOC ON–DEMAND DISTANCE VECTOR ROUTING (AODV).
• The major difference between AODV and other on-demand routing protocol is that it uses a
destination sequence number ( DestSeqNum) to determine an up-to-date path to the
destination.
• Destination sequence numbers are used to ensure that routes are loop free and has the most
recent route information. A node updates its path information only if the DestSeqNum of the
current packet received is greater than the last DestSeqNum stored at the node.
• The routing table stores: destination next-hop destination hop count life time
addr addr sequence
AD HOC ON–DEMAND DISTANCE VECTOR ROUTING (AODV).
• If a node wants to send a packet to some destination. At first, it checks its routing table to
determine whether it has a current route to the destination or not.
=>If yes, it forwards the packet to next hop node of the route.
• A source node initiates a path discovery process to locate the other intermediate nodes (and
the destination), by broadcasting a Route Request (RREQ) packet to its neighbors
AD HOC ON–DEMAND DISTANCE VECTOR ROUTING (AODV).
• A source node initiates a path discovery process to locate the other intermediate nodes (and the destination), by
broadcasting a Route Request (RREQ) packet to its neighbors. Broadcasting is done via flooding.
• The neighbors in turn forward the request to their neighbors and so on until either an intermediate node with
valid (fresh enough) route or destination is located
• Each node maintains its own sequence number and broadcast ID (incremented with every RREQ the node
initiates)
• Broadcast ID and source IP address form a unique identifier for the RREQ.
• DestSeqNum indicates the freshness of the route that is accepted by the source.
AD HOC ON–DEMAND DISTANCE VECTOR ROUTING (AODV).
• When a node broadcasts a RREQ, a reverse path towards the source is created
C
2 Node A rebroadcasts RREQ to all its neighbors. 3. Since, node C known a route to D, Node C creates a RREP
packet and unicasts RREP to A. Set forward path in node C’s
routing table.
4. Node A creates a RREP packet and unicasts RREP to S.
Set forward path in node A’s routing table. B
S A
RERR
S A
Periodic Hello messages are used to ensure the links exist RERR
A link failure occurs when no hello message are exchanged D
for a timeout interval (the time to live (TTL) field.)
Failure to receive MAC-level acknowledgement can also be C
interpreted as a link failure
On-demand routing protocol – AODV (cont.)
• Advantage:
– The routes are established on demand and the destination
sequence number can find the latest route to the destination.
• Disadvantage:
– The intermediate nodes can lead to inconsistent routes if the
source sequence number is very old.
• The periodic beaconing leads to unnecessary bandwidth
consumption. (When a link breaks, which is determined by
observing the periodical beacons or through link-level
acknowledgments, the end nodes (i.e., source and destination
nodes) are notified. )