Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Chapter – 3
NETWORKS
In early 1970s, the Mobile Ad hoc Network (MANET) was called packet radio
network, which was sponsored by Defense Advanced Research Projects Agency
(DARPA). They had a project named packet radio having several wireless terminals
that could communication with each other on battlefields. “It is interesting to note that
these early packet radio systems predict the Internet and indeed were part of the
motivation of the original Internet Protocol suite” [26].
The whole life cycle of Ad hoc networks could be categorized into the first,
second, and the third generation Ad hoc networks systems. Present Ad hoc networks
systems are considered the third generation [27].
The first generation goes back to 1972. At the time, they were called PRNET
(Packet Radio Networks). In conjunction with ALOHA (Arial Locations of
Hazardous Atmospheres) and CSMA (Carrier Sense Medium Access), approaches for
medium access control and a kind of distance-vector routing PRNET were used on a
trial basis to provide different networking capabilities in a combat environment.
[29]
An Ad hoc network is a collection of mobile nodes, which forms a
temporary network without the aid of centralized administration or standard support
devices regularly available as conventional networks. These nodes generally have a
limited transmission range and, so, each node seeks the assistance of its neighboring
nodes in forwarding packets and hence the nodes in an Ad hoc network can act as
both routers and hosts. Thus a node may forward packets between other nodes as well
as run user applications. By nature these types of networks are suitable for situations
where either no fixed infrastructure exists or deploying network is not possible. Ad
hoc mobile networks have found many applications in various fields like military,
emergency, conferencing and sensor networks. Each of these application areas has
their specific requirements for routing protocols.
Since the network nodes are mobile, an Ad hoc network will typically have a
dynamic topology, which will have profound effects on network characteristics.
Network nodes will often be battery powered, which limits the capacity of CPU,
memory, and bandwidth. This will require network functions that are resource
effective. Furthermore, the wireless (radio) media will also affect the behavior of the
network due to fluctuating link bandwidths resulting from relatively high error rates.
These unique desirable features pose several new challenges in the design of wireless
Ad hoc networking protocols. Network functions such as routing, address allocation,
authentication and authorization must be designed to cope with a dynamic and volatile
network topology. In order to establish routes between nodes, which are farther than
a single hop, specially configured routing protocols are engaged.
The unique feature of these protocols is their ability to trace routes in spite of a
dynamic topology. In the simplest scenarios, nodes may be able to communicate
directly with each other, for example, when they are within wireless transmission
range of each other. However, Ad hoc networks must also support communication
between nodes that are only indirectly connected by a series of wireless hops through
other nodes. For example, in Fig 3.1, to establish communication between nodes A
and C the network must enlist the aid of node B to relay packets between them. The
circles indicate the nominal range of each node’s radio transceiver. Nodes A and C
are not in direct transmission range of each other, since A’s circle does not cover C.
Figure 3.1: A Mobil Ad hoc network of three nodes, where nodes A and C must
discover the route through B in order to communicate.
Since there is no background network for the central control of the network
operations, the control and management of the network is distributed among the
terminals. The nodes involved in a MANET should collaborate amongst themselves
and each node acts as a relay as needed to implement functions like security and
routing.
Since the nodes are mobile, the network topology may change rapidly
and unpredictably and the connectivity among the terminals may vary with time.
MANET should adapt to the traffic and propagation conditions as well as the mobility
patterns of the mobile network nodes. The mobile nodes in the network dynamically
establish routing among themselves as they move about, forming their own network
on the fly. Moreover, a user in the MANET may not only operate within the Ad hoc
network, but may require access to a public fixed network (e.g. Internet).
In most of the cases, the MANET nodes are mobile devices with less CPU
processing capability, small memory size, and low power storage. Such devices need
optimized algorithms and mechanisms that implement the computing and
communicating functions.
Ad hoc networking has been a popular field of study during the last few years.
Almost every aspect of the network has been explored in one way or other at different
level of problem. Yet, no ultimate resolution to any of the problems is found or, at
least, agreed upon. On the contrary, more questions have arisen. The topics that need
to be resolved are as follows [30]-
Scalability
Routing
Quality of service
Client server model shift
Security
Energy conservation
Node cooperation
Interoperation
The approach to tackle above aspects has been suggested and possible update
[31]
solutions have been discussed . In present research work one of the aspects “the
routing” has been reconsidered for suitable protocol performing better under dynamic
condition of network.
3.4.1 Scalability
3.4.2 Routing
addressing approach may be required. In addition, it is still not clear who will be
responsible for managing various network services. Therefore, while there have been
vast research initiatives in this area, the issue of shift from the traditional client-sever
model remains to be appropriately addressed.
3.4.5 Security
Much research has been carried out at the physical, medium access control (MAC)
and routing layers, while little has been done at the transport and application layers.
Nevertheless, there is still much more investigation to be carried out.
Closely related to the security issues, the node cooperation stands in the way
of commercial application of the technology. To receive the corresponding services
from others there is no alternative but one has to rely on other people’s data.
However, when differences in amount and priority of the data come into picture, the
situation becomes far more complex. A critical fire alarm box should not waste its
batteries for relaying gaming data, nor should it be denied access to other nodes
because of such restrictive behavior. Encouraging nodes to cooperate may lead to the
introduction of billing, similar to the idea suggested for Internet congestion control
[36]
. Well-behaving network members could be rewarded, while selfish or malicious
users could be charged higher rates. Implementation of any kind of billing mechanism
is, however, very challenging. These issues are still wide open [37].
questions on how the Ad hoc network could be designed so that they are compatible
with wireless LANs, 3 Generation (3G) and 4G cellular networks.
The following are some of the main routing issues to be considered when
deploying MANETs
Unpredictability of Environment
Unreliability of Wireless Medium
Resource-Constrained Nodes
Dynamic Topology
Transmission Errors
Node Failures
Link Failures
Route Breakages
Congested Nodes or Links
the wireless medium may also be limited because nodes may not be able to sacrifice
the energy consumed by operating at full link speed.
Dynamic Topology: The topology in an Ad hoc network may change constantly due
to the mobility of nodes. As nodes move in and out of range of each other, some links
break while new links between nodes are created.
Node Failures: Nodes may fail at any time due to different types of hazardous
conditions in the environment. They may also drop out of the network either
voluntarily or when their energy supply is depleted.
Route Breakages: When the network topology changes due to node/link failures
and/or node/link additions to the network, routes become out-of-date and thus
incorrect. Depending upon the network transport protocol, packets forwarded through
stale routes may either eventually be dropped or be delayed.
Congested Nodes or Links: Due to the topology of the network and the nature of the
routing protocol, certain nodes or links may become over utilized, i.e., congested.
This will lead to either larger delays or packet loss.
This client-server model suffers the following major drawbacks: a user cannot
play games where there is no Internet infrastructure, or when the connection is too
bad, or when the server is not available (either the server is down or refuses users
because the maximum number of users is reached). Another drawback is that it limits
the gamers from randomly announcing, discovering and joining a networked game.
Fig 3.3: Soldiers, Tanks and other Vehicles carrying Mobile Devices
coordinates and potentially the depth) of the victims through the transponders. As a
result, the rescue teams can more effectively locate and reach the victims. The mobile
devices could also monitor the vital signs of victims, such as heart rate or breathing
rate, to prioritize the rescue of victims that are still alive.
A similar application arises when disasters, such as earthquakes, blackouts, or
bombings occur. The disaster may destroy existing communication infrastructure,
preventing critical contact among emergency workers. The emergency response teams
can set up Ad hoc networks quickly to replace the destroyed infrastructure, enabling
the teams to better coordinate their efforts. In emergency situation the wired networks
could be destroyed. There will be a need of wireless network, which could be
deployed quickly for coordination of rescue. An example is the design for future
public safety communications. A European project called Wireless Deployable
[29]
Network System (WIDENS) concentrated their work on this field. WIDENS have
an idea that using Ad hoc network to interoperate with existing TETRA network
which is used for public safety. The system structure is shown in Fig 3.4.
Ad hoc networks also have applications in home and office environments. The
simplest and most direct application of Ad hoc networks in both homes and offices is
the networking of laptops, PDAs and other WLAN-enabled devices in the absence of
a wireless base station. Another home application that falls within the Personal Area
Network (PAN) class is wire replacement through wireless links, as in Bluetooth. All
periphery devices can connect to a computer through wireless Bluetooth links,
eliminating the need for wired connections. Ad hoc networks can also enable
streaming of video and audio among wireless nodes in the absence of any base
station. For instance, UWB provides a sufficiently high bandwidth (in the order of
Gb/s) to support several multimedia streams. UWB-equipped nodes can
autonomously set up an Ad hoc network to stream high quality video and audio
between several computers through wireless UWB connections. Educational and
recreational activities can also benefit from Ad hoc networks. For example, students
attending a classroom can use their laptops to obtain the latest class material from a
professor’s laptop as the class progresses. Universities and campus settings, Virtual
classrooms, Ad hoc communications during meetings or lectures are some of the
educational applications of Ad hoc networks. On the recreational side, the mobility
and nomadic nature of Ad hoc networks enables richer multi-user games that can
incorporate user mobility and proximity into the virtual game environment.
random, vehicles tend to move in an organized fashion. The interactions with roadside
equipment can likewise be characterized fairly accurately. And finally, most vehicles
are restricted in their range of motion, for example by being constrained to follow a
paved high way.
In addition, in the year 2006 the term MANET mostly describes an academic
area of research, and the term VANET perhaps it’s most promising area of
application. In VANET, or Intelligent Vehicular Ad hoc Networking, defines an
intelligent way of using Vehicular Networking. In VANET integrates on multiple Ad
hoc networking technologies such as WiFi IEEE 802.11 b/g, WiMAX IEEE 802.16,
Bluetooth, IRA, ZigBee for easy, accurate, effective and simple communication
between vehicles on dynamic mobility. Effective measures such as media
communication between vehicles can be enabled as well methods to track the
automotive vehicles are also preferred. In VANET helps in defining safety measures
in vehicles, streaming communication between vehicles, infotainment and telematics.
Vehicular Ad hoc Networks are expected to implement variety of wireless
technologies such as Dedicated Short Range Communications (DSRC) which is a
type of WiFi. Other candidate wireless technologies are Cellular, Satellite, and
WiMAX. Vehicular Ad hoc Networks can be viewed as component of the Intelligent
Transportation Systems (ITS).
Advances in processor, memory and radio technology will enable small and
cheap nodes capable of sensing, communication and computation. Networks of such
nodes called wireless sensor networks can coordinate to perform distributed sensing
of environmental phenomena.
through the existing wired networks. The primary component of the network is the
sensor, essential for monitoring real world physical conditions such as sound,
temperature, humidity, intensity, vibration, pressure, motion, pollutants etc. at
different locations.
Wireless mesh networks are Ad hoc wireless networks, which are formed to
provide communication infrastructure using mobile or fixed nodes/users. The mesh
topology provides alternative path for data transmission from the source to the
destination. It gives quick re-configuration when the firstly chosen path fails. Wireless
mesh network should be capable of self-organization and self-maintenance. The main
advantages of wireless mesh networks are high speed, low cost, quick deployment,
high scalability, and high availability. It works on 2.4 GHz and 5 GHz frequency
bands, depending on the physical layer used. For example, if IEEE 802.11a is used,
the speed can be up to 54 Mbps. An application example of wireless mesh network
could be a wireless mesh networks in a residential zone, which the radio relay devices
are built on top of the rooftops. In this situation, once one of the nodes in this
residential area is equipped with the wired link to the Internet, this node could be the
gateway node. Others could connect to the Internet from this node. Other possible
deployments are highways, business zones, and university campus.