Documente Academic
Documente Profesional
Documente Cultură
Introduction. Advantages and Applications. Cellular VS Ad-Hoc Networks. Technical Challenges and Issues. Ad-Hoc Wireless Media Access Protocols. Ad-Hoc Routing Protocols. Providing Quality of Service in Ad-Hoc Networks.
Introduction (1):
Multi-hop Wireless Networks (MHWNs): It is defined as a collection of nodes that communicate with each other wirelessly by using radio signals with a shared common channel.
Hop
Switching Unit
Introduction (2):
There are several names for MHWNs; it could be called packet radio network, Ad-Hoc network or mobile network.
The nodes here could be named stations or radio transmitters and receivers.
MHWNs
Ad-Hoc Networks
Mesh Networks
Introduction (3):
Ad-Hoc Networks:
It is a type of MHWNs. Nodes in the network are mobile in general. The wireless hosts in such networks, communicate with each other without the existing of a fixed infrastructure and without a central control. A mobile ad-hoc network can be connected to other fixed networks or to the Internet. Most of the Ad-Hoc networks use the allocated frequencies for the Industrial, Scientific and Medical (ISM) band.
Sender 1 Receiver
Sender 2
Receiver
Transmitter
Exposed Node
If we give the node the freedom to send at any time, then that could result in a contention.
We can't have a central controller to manage the transmission process, because every node can move at any time. Therefore, we will choose from the medium access control (MAC) protocols in order to use the shred medium in the most efficient way.
Synchronous
Asynchronous
MAC Protocols
Sender-Initiated
Receiver-Initiated
RTS
CTS Receiver
Sender
Data
RTR
Sender
Receiver
Data
It was proposed as a solution for both hidden terminal and exposed node problems. It has the ability to control the transmitter power for each packet. It uses a three-way handshake, RTS-CTS-Data. Collisions could occur in MCSA, because there is no carrier sensing in it.
Receiver
Prohibited
TBT RTS
Prohibited
Sender
RBT - CTS
Receiver
Hybrid
On-DemandDriven / Reactive
Table-driven routing protocols try to keep the last updated and stable routing information from each node to the rest of the nodes in the network. In this type of routing protocol, each node should maintain at least one table to store the routing information.
In case of any change in the network topology, the nodes will propagate the route updates throughout the network in order to maintain a stable network view.
The main feature in this protocol is the avoidance of the routing loops. Each node here maintains a routing table of all destinations within the non-partitioned network and the number of hops to these destinations. A sequence numbering system is used in order to be able to distinguish between the old and bad routes from the new ones. Updates in the routing table are sent periodically to keep the routing table up-to-date and consistent.
Each routing node in WRP communicates the distance and second-to-last hop information for all destinations in the network. The WRP is classified as one of the path-finding algorithms, but here the count-to-infinity problem has been avoided by making each node check the consistency of the predecessor information reported by its neighbors. In WRP, each nodes learns about its neighbors from the acknowledgments and the other messages it's receives.
Routing Table
Hello
Routing Table
New Node
Existing Node
Nodes in CSGR are grouped in clusters and each cluster has a cluster head which can control a group of Ad-Hoc hosts. Each time a cluster head moves away, a new cluster head is selected. By using the least cluster change (LCC) algorithm, the cluster head will be changed either if two cluster heads come into contact or if the node moves away from all other cluster heads. CSGR is based on the DSDV, but with a little difference that CSGR uses a hierarchical cluster-head-to-gateway routing approach.
The DSR protocol is based on the concept of source routing, where each node is required to maintain route caches that contain the source routes of which the mobile is aware. There are two phases in this protocol: The route discovery phase. The route maintenance phase.
When node has data to send, it first checks its route cache to see if it already has an unexpired route to the destination.
N1-N3
N1
N1 N3-N4
N1 N3-N4-N6
N1 -N2-N5-N8
TORA is a source-initiated, loop-free, distributed routing algorithm based on the concept of link reversal. This protocol performs three basic functions: route creation, route maintenance, and route erasure. During the phases of creating and maintaining the route, nodes will use a "height" metric to establish a DAG (directed acyclic graph) rooted at the destination.
N2
N3
N1
N4
N7
N5
N6
One of the LAR protocol concepts, that it uses the location information (e.g. by utilizing the GPS) to enhance the performance of the Ad-Hoc network. There are two defined zones in LAR: The expected zone. The request zone.
In this protocol, battery life is the metric for selecting the route.
The IERP depends on the border nodes to search for routing information to nodes located outside its current zone by performing on-demand routing.
The STAR protocol is a proactive routing protocol. In STAR, each node maintains its own source tree. Each node in STAR knows about its adjacent links and the source trees of its neighbors, and after it aggregates the adjacent links with the source trees, it will get a partial topology graph. Each node derives the routing table from running a route selection algorithm on its own source tree, and from the routing table it can know what the successor to any destination is.