ROUTING
ROUTING
net
UNIT - I
1 Wireless Networks
and Ad hoc Networks
ww
Syllabus
Elements of Ad hoc Wireless Networks, Issues in Ad hoc wireless networks, Example commercial
w
applications of Ad hoc networking, Ad hoc wireless Internet.
.Ea
Contents
1.1 Wireless Network
syE
1.2 Wireless Ad hoc Network
ngi
1.3 Two Marks Questions with Answers [Part - A]
1.4 Long Answered Questions [Part - B] nee
rin
g .ne
t
www.EasyEngineering.net
(1 - 1)
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-2 Wireless Networks and Ad hoc Networks
wother devices.
.Ea
In this technology, the information can be transmitted through the air without
requiring any cable or wires or other electronic conductors, by using
syE
electromagnetic waves like IR, RF, satellite, etc. In the present days, the wireless
communication technology refers to a variety of wireless communication devices
ngi
and technologies ranging from smart phones to computers, tabs, laptops,
Bluetooth technology, printers.
1. Satellite Communication
Satellite communication is one type of self contained wireless communication
technology, it is widely spread all over the world to allow users to stay connected
almost anywhere on the earth. When the signal (a beam of modulated microwave)
is sent near the satellite then, satellite amplifies the signal and sent it back to the
antenna receiver which is located on the surface of the earth. Satellite
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-3 Wireless Networks and Ad hoc Networks
communication contains two main components like the space segment and the
ground segment. The ground segment consists of fixed or mobile transmission,
reception and ancillary equipment and the space segment, which mainly is the
satellite itself.
2. Infrared Communication
Infrared wireless communication communicates information in a device or
systems through IR radiation . IR is electromagnetic energy at a wavelength that is
longer than that of red light. It is used for security control, TV remote control and
short range communications. In the electromagnetic spectrum, IR radiation lies
ww between microwaves and visible light. So, they can be used as a source of
communication. For a successful infrared communication, a photo LED
w .Ea
transmitter and a photo diode receptor are required. The LED transmitter
transmits the IR signal in the form of non visible light, that is captured and saved
syE
by the photoreceptor. So the information between the source and the target is
transferred in this way. The source and destination can be mobile phones, TVs,
ngi
security systems, laptops etc. supports wireless communication.
3. Broadcast Radio
nee
The first wireless communication technology is the open radio communication to
seek out widespread use, and it still serves a purpose nowadays. Handy
rin
g
multichannel radios permit a user to speak over short distances, whereas citizen’s
band and maritime radios offer communication services for sailors. Ham radio
enthusiasts share data and function emergency communication aids throughout .ne
disasters with their powerful broadcasting gear, and can even communicate
digital information over the radio frequency spectrum.
t
Mostly an audio broadcasting service, radio broadcasts sound through the air as
radio waves. Radio uses a transmitter which is used to transmit the data in the
form of radio waves to a receiving antenna (Different types of antennas). To
broadcast common programming, stations are associated with the radio N/W’s.
The broadcast happens either in simulcast or syndication or both. Radio
broadcasting may be done via cable FM, the net and satellites. A broadcast sends
information over long distances at up to two megabits/Sec. (AM/FM Radio).
Radio waves are electromagnetic signals, that are transmitted by an antenna.
These waves have completely different frequency segments, and user will be
ready to obtain an audio signal by changing into a frequency segment.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-4 Wireless Networks and Ad hoc Networks
For example, consider a radio station. When the RJ says you are listening to 92.7
BIG FM, what RJ really means is that signals are being broadcasted at a frequency
of 92.7 megahertz, that successively means the transmitter at the station is
periodic at a frequency of 92.700,000 Cycles/second.
When listener would like to listen to 92.7 BIG FM, listener has to tune in the radio
to just accept that specific frequency and will receive perfect audio reception.
4. Microwave Communication
Microwave wireless communication is an effective type of communication, mainly
ww this transmission uses radio waves, and the wavelengths of radio waves are
measured in centimeters. In this communication, the data or information can be
w transfers using two methods. One is satellite method and another one is terrestrial
method.
.Ea
Wherein satellite method, the data can be transmitted though a satellite, that orbit
syE
22,300 miles above the earth. Stations on the earth send and receive data signals
from the satellite with a frequency ranging from 11 GHz - 14 GHz and with a
ngi
transmission speed of 1 Mbps to 10 Mbps. In terrestrial method, in which two
microwave towers with a clear line of sight between them are used, ensuring no
nee
obstacles to disrupt the line of sight. So it is used often for the purpose of privacy.
rin
The frequency range of the terrestrial system is typically 4 GHz - 6 GHz and with
a transmission speed is usually 1 Mbps to 10 Mbps.
g
The main disadvantage of microwave signals is, they can be affected by bad
weather, especially rain. .ne
5. Wi-Fi
Wi-Fi is a low power wireless communication, that is used by various electronic
t
devices like smart phones, laptops, etc.In this setup, a router works as a
communication hub wirelessly. These networks allow users to connect only
within close proximity to a router. WiFi is very common in networking
applications which affords portability wirelessly. These networks need to be
protected with passwords for the purpose of security, otherwise it will access by
others
Cellular systems
Cellular telephone systems are very popular and used worldwide. They were
primarily designed in the 1960’s to provide analog communication and later it was
enhanced to provide digital communication between mobile devices. The main goal of
cellular communication systems is to provide voice and data communication to
international level coverage. The working of cellular system is as follows,
ww
The coverage area of cellular system is divided into non-overlapping cells which
.Ea
Communication between the mobile devices is controlled by a fixed point base
station which is connected with a Mobile Switching Center (MSC).
syE
Each MSC acts as a central controller and takes the responsibility of allocating
channels within cells and managing hand-offs between MSCs.
ngi
The essential components used in cellular systems are cheaper, faster and smaller in
size and require less power for radio propagation.
nee
The various developments of cellular systems are as follows : The first generation (1G)
rin
cellular system is called the Advance Mobile Phone Service (AMPS) which is based on
FDMA with 30 kHz FM-modulated voice channels. The second generation (2G) digital
g
systems called Global System for Mobile communication (GSM) provides data rates of up
to 100 kbps. The third generation (3G) cellular system provides different data rates .ne
depending on mobility and location.
Cordless Phones
t
Cordless telephones were first appeared in the late 1970’s. These phones are basically
designed for providing low cost, short wireless link communication. These devices use
radio waves with specific frequency for communication. Cordless phones replace the
handset cord or landline phone to radio link. The functionality of cordless phones is given
below :
The cordless phone uses a base station and the handset which can be used
anywhere and at any time within a specified distance from the base station.
The base station is connected to the phone line through a wire.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-6 Wireless Networks and Ad hoc Networks
Base station acts as a normal telephone. It receives calls through the phone line as
electrical signals. Then it converts the received electrical signals to a radio signal
and forwards that signal to the handset of the user.
The transmitted radio signal from the base station is received by the handset. This
signal is converted back to electrical signal and sent to the speaker.
The speaker converts the electrical signal into the sound form that can be head.
Again, when one talks via the handset, the voice is transmitted to the base station
as radio signal where it is converted to electrical signal and transmitted through
the phone line.
ww
The base station and handset operate on a frequency pair that allows to talk and listen
at the same time.
w
7. Bluetooth Technology
.Ea
The main function of the Bluetooth technology is that it permits user to connect
syE
various electronic devices wirelessly to a system for the transferring of data. Cell phones
are connected to hands free earphones, mouse, wireless keyboard. By using Bluetooth
ngi
device the information from one device to another device. This technology has various
nee
functions and it is used commonly in the wireless communication market.
8. ZigBee
rin
This wireless technology is mainly used in mesh networks and allows nodes to be
for providing communication with low cost and power consumption than Bluetooth g
connected together through multiple pathways. This radio specification is mainly used
.ne
technology.
The main objective of using ZigBee technology is to provide radio communication for
prolong period without recharging. So, this technology is suitable in sensor networks and
t
inventory tags. ZigBee technology was originally standardized as IEEE 802.15.4. ZigBee is
designed specifically to be used in Machine to Machine (M2M) networks.
ZigBee supports data rates of up to 250 kbps at a coverage range of upto 30 m.
However, these data rate is lower than Bluetooth technology. Furthermore, it consumes
less power and having more coverage area than Bluetooth technology.
9. WiMax
Worldwide Interoperability for Microwave Access (WiMax) is one of the broadband
wireless technologies. This technology was standardized as IEEE 802.16. This wireless
technology allows data to be transferred at a rate of 30 - 40 megabits per second. WiMax
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-7 Wireless Networks and Ad hoc Networks
would operate similar to WLAN, but it transfers data at higher speeds over greater
distances and for a large number of users. It has the ability to provide service in the places
where implementing wired infrastructure is difficult.
ww3. A router is a network device that can connect one network to another,
determine what traffic can pass between them, and perform other functions on
.Ea
and laptops used in accessing a network, routers make up the hardware that
runs the network.
4.
syE
A wireless network adapter to connect other devices in the network. An older
laptop, television, or Blu-Ray player may not have built-in wireless support. In
ngi
these devices a wireless network adapter is required to connect to the wireless
5.
network.
Role/Mode of Device in the wireless network nee
rin
There are three major “modes” a Wi-Fi device can use. These modes define the role a
g
Wi-Fi device has in the network, and networks must be built out of combinations of
devices operating in these different modes. How the devices are configured depends on
.ne
the types of connections used between various parts of the network.
1. A wireless router or access point - Most wireless networks are made using
Access Points - devices that host and control the wireless connection for
t
laptops, tablets, or smart phones. If you use Wi-Fi in your home or office, it is
most likely through an Access Point. When a router is set up as an AP, it is said
to be in “Master” or “Infrastructure” mode.
An AP is sometimes a stand-alone device that bridges between a wireless and
wired (Ethernet) network, or is part of a router. APs can cover a range of areas
with a wireless signal, depending on the power of the device and the type of
antenna. There are also some APs that are weatherproof, designed to be
mounted outdoors.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-8 Wireless Networks and Ad hoc Networks
ww and 60 GHz frequency bands. The latest wireless routers are based on the IEEE
802.11ac Wave 2 standard, often shortened to Wave 2. A wireless router is
.Ea
Computers, tablets, and other devices connect to a wireless network via a
wireless access point or wireless router. In Wi-Fi-based wireless networks, the
syE
access point or router acts as an Ethernet switch. All devices connect to the
router, rather than directly with each other. Wireless router or access points
ngi
should be installed in a way that maximizes coverage as well as throughput.
nee
The coverage provided is generally referred to as the coverage cell. Large areas
usually require more than one access point in order to have adequate coverage.
rin
An access point can also be added to the existing wireless router to improve
2.
g
coverage. Many DSL and cable modems today come equipped with integrated
wireless networking capabilities; these are called wireless modem routers.
Devices with wireless networking capabilities (wireless clients / Stations) - .ne
Devices such as computers, tablets, and phones are common Clients on a
network. Some routers can operate as Clients as well, which allows them to act
t
like the wireless card in a computer, and connect to other Access Points. This
can bridge two Ethernet networks, or connect to more distant APs.
When a device is accessing a wireless hotspot, or the router in home or office,
the device is the client. This client mode is also known as “station mode” as
well.
A wireless client is similar to a person in the audience of a play or movie. They
are one of several or many people accessing information through the same
conduit - someone speaking.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1-9 Wireless Networks and Ad hoc Networks
Most of the modern day devices have built-in wireless capabilities, either
802.11b/g, 802.11b/g/n, or even 802.11ac. These devices will be able to connect
directly to the wireless router.
3. Ad-hoc node (Mesh) - Some wireless devices (laptops, smart phones, or
wireless routers) support a mode called Ad-hoc. This allows those devices to
connect together directly, without an Access Point in-between controlling the
connection. This forms a different type of network - in Ad-hoc mode, all
devices are responsible for sending and receiving messages to the other devices
- without anything else in between. In an Ad-hoc network, every device must
ww be in this role, and using the same configuration to participate. Not all devices
use this mode, and some have it as a “hidden” feature. Ad-hoc devices are
w used to create a mesh network, so when they are in this mode, they are called
.Ea
“Mesh Nodes”.
An Ad-hoc or mesh node is similar to an individual in a group or roundtable
syE
discussion. They can take equal part in the conversation, raising their hand
when they want to speak so the others will listen. If someone at the end of the
ngi
table cannot hear, one of the individuals in-between can repeat the original
message for the listener.
nee
rin
g .ne
t
ww to each other. It should also be noted that due to how Wi-Fi is designed, this
also prevents different roles from connecting to each other as well.
w 2.
3.
4.
Access points cannot connect to each other wirelessly.
.Ea
Clients cannot connect to each other wirelessly.
Clients cannot connect to Ad-hoc (Mesh) devices wirelessly.
5. syE
Access points cannot connect to Ad-hoc (Mesh) devices wirelessly.
ngi
1.1.5 Wireless Operating Modes - Infrastructure Mode and Ad hoc Mode
nee
The IEEE 802.11 standards specify two operating modes - Infrastructure mode and Ad
hoc mode (Infrastructure-less )
1.
rin
Infrastructure mode is used to connect computers with wireless network
.ne
In this mode each node is connected with other node through a fixed base
station. The fixed station is also known as Access Points (APs). An example for
infrastructure based network is cellular network in which base station or AP is
t
used as fixed equipment. Each network area is divided into cells and the base
station provides each cell with the network coverage which can be used for the
transmission of high quality voice, data and other types of messages.
2. Ad hoc mode is used to connect wireless clients directly together, without the
need for a wireless router or access point. An ad hoc network consists of up to
9 wireless clients, which send their data directly to each other.
In this mode Each node can communicate with each other without using any
fixed infrastructure. Mobile ad hoc networks and Vehicular Ad hoc Networks
(VANETs) are the examples of infrastructure less networks. In Ad hoc
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 11 Wireless Networks and Ad hoc Networks
1.
w
Communication
.Ea
Through an Access Point (AP),
APs act as a bridge to other
wireless/wired network.
Directly between devices, in ad-hoc
mode, each node communicates
directly with other nodes, so no
2. Security syE
More security options.
access point control is needed.
ngi no security.
.ne
it needs to use decentralized MAC
(Medium Access Control) protocols
simple machine. such as CSMA(Carrier Sense
t
Multiple Access)/CA (Collision
Avoidance), with all nodes having
same functionality. This shoots up
the complexity and cost.
6. When can not be It can’t be used in critical It is not always fully connected as
used situations like disaster relief two mobile nodes may temporarily
where no infrastructure is left. be out of range.
7. Channel Access Most infrastructure based Most Ad-hoc based WLAN uses
WLAN uses TDMA-based contention MAC protocols (e.g.
protocols. CSMA).
8. Topology Based on topology, one main Ad-hoc WLANs are easier to set-up
advantage is the ability of and require no infrastructure.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 12 Wireless Networks and Ad hoc Networks
infrastructure WLANs to
provide wired network
applications and services.
10. Figurative
depiction
ww
w .Ea
syE
Requirements for all devices
1 Unique IP
(Internet
Yes required.
ngi Yes required.
Protocol)
address for nee
each device
rin
2
3
Mode set to
Same SSID
Infrastructure mode.
Yes.
g .ne
4
(Service Set
Identifier)
ww1.
2.
Any data or information can be transmitted faster and with a high speed.
Maintenance and installation is less expensive in wireless networks.
w
3.
4. .Ea
The internet can be accessed from anywhere wirelessly.
Wireless networks are self-configuring and easy to use.
5.
6.
syE
Wireless networks are cost effective.
Wireless communication is a solution in certain areas where wired networks
ngi
are difficult to install (e.g. military areas, flooded areas, hazardous areas, long
7.
distances etc.)
nee
Customers can work and access Internet anywhere and at anytime without
rin
carrying cables or wires wherever they go. This also helps to complete the
8.
work anywhere on time and improves the feasibility.
g
Doctors, workers and other professionals working in remote areas can be in
touch with medical centers through wireless communication. .ne
9. Urgent situation can be alerted through wireless communication. The affected
regions can be provided help and support with the help of these alerts through
t
wireless communication.
ww 8.
9.
To get constant coverage in some buildings is difficult.
The speed of the wireless transmission is slower and less efficient.
w
1.1.8 Applications of Wireless Communication
.Ea
Applications of wireless communication involve security systems, television remote
syE
control, Wi-Fi, Cell phones, wireless power transfer, computer interface devices and
various wireless communication based projects.
ngi
1.1.9 Difference between Wired and Wireless Communication
nee
Wired networks use cables or wires to transfer data between different communicating
devices. In general, wired networks use Ethernet cable to transfer data between
rin
interconnected devices. On the other hand, the wireless devices use infrared or radio
frequency signals to exchange information and other resources between devices. The
difference between wired and wireless communication is summarized in below
Table 1.1.2.
g .ne
Sr. No
l.
Parameters
Connectivity
Wired Communication
Nodes are connected via
t
Wireless Communication
Nodes are linked using
cables or wires. wireless links.
11. Connection set up Requires less time for Requires more time for
connection set up. connection set up.
ww
12. Quality of service Quality of service is better. Quality of service is poor due
to higher jitter, delays and
13.
w .Ea
Bandwidth capacity High
longer connection set up times.
Low
14. Reliability
syE High Low
ngi
Table 1.1.2 Difference between wired and wireless communication
rin
built spontaneously to enable two or more wireless devices to be connected to each other
are in Ad-hoc mode, each device in the network forwards data to the others. g
without requiring a central device, such as a router or access point. When Wi-Fi networks
.ne
Since the devices in the Ad-hoc network can access each other's resources directly
through a basic point-to-point wireless connection, central servers are unnecessary for
functions such as file shares or printers. In a wireless Ad-hoc network, a collection of
t
devices (or nodes) is responsible for network operations, such as routing, security,
addressing and key management.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 16 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
nee
Fig. 1.2.1 Wireless Ad hoc network
rin
1.2.1 Ad hoc Network - Working
g
Devices in the Ad-hoc network require a wireless network adapter, and they need to .ne
support a hosted network. When setting up a wireless Ad-hoc network, each wireless
adapter must be configured for Ad-hoc mode instead of infrastructure mode. All wireless
t
adapters need to use the Same Service Set Identifier (SSID) and channel number.
Creating an Ad-hoc network for Windows 8 and 10 applications is more difficult than
it was for earlier Windows OSs. Networking experts offer pointers on how to tackle this
issue.
ww3.
bandwidth of wireless links.
Each node in ad hoc network has autonomous behavior. Each node can act as a
w host and router, which shows its autonomous behavior. All nodes have
.Ea
identical features with similar responsibilities and capabilities and hence it
forms a completely symmetric environment.
4. syE
Nodal connectivity is intermittent that is not steady or it is irregular.
5.
ngi
The terminals in the network are light-weight terminals. In maximum cases,
the nodes in ad hoc network are mobile with less CPU capability, low power
6.
storage and small memory size.
nee
Shared Physical Medium - The wireless communication medium is accessible
rin
to any entity with the appropriate equipment and adequate resources.
7.
Accordingly, access to the channel cannot be restricted.
g
In Ad hoc network the energy constrained operations can be critical in terms
.ne
of certain resource utilization. As some or all the nodes rely on batteries or
other exhaustible means for their energy. Mobile nodes are characterized with
less memory, power and light weight features.
t
8. Ad hoc networks offer limited security. Wireless network are more prone to
security threats. A centralized firewall is absent due to its distributed nature of
operation for security, routing and host configuration.
9. Less human intervention is required in Ad hoc network. They require
minimum human intervention to configure the network, therefore they are
dynamically autonomous in nature. Ad hoc network has mobile and
spontaneous behaviour which demands minimum human intervention to
configure the network.
10. There is no single point of failure in an Ad hoc network.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 18 Wireless Networks and Ad hoc Networks
11. In Ad hoc network multi hop routing is required as per situation. When a
node tries to send information to other nodes which is out of its
communication range, the packet should be forwarded via one or more
intermediate nodes.
12. High user density and large level of user mobility.
13. In ad hoc networks no central management hub is required from where all
devices can be controlled.
14. In Ad hoc network operations are performed in distributed manner.
Distributed nature of operation for security, routing and host configuration. A
.Ea
cooperate with each other and communicate among themselves and each node
syE
acts as a relay as needed, to implement specific functions such as routing and
security.
rin
Ad hoc network does not have any central access point. Every node is connected to
another node physically.
It is a temporary network setup generally for emergency purposes. g .ne
In this architecture communication is done directly between the nodes.
This type of network provides great flexibility.
Also this type of network is fit for smaller coverage area.
t
Interference and noise easily hinder the communication between the nodes. However,
detecting an error is easy in Ad hoc network as compared to infrastructure network.
Also configuring and re installation is quite economical as well. These networks do not
need much maintenance.
This network is costly for a small coverage area. In this network the transmission of
information is not reliable as compared to infrastructure network. But they are very
useful for emergency purposes like during flood, earthquakes etc.
The transmission is not very secure but offers good speed and serves the requirement
for communication in need.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 19 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
Fig. 1.2.2 Mobile Ad hoc network
g
areas by the mobile nodes such as laptops, mobile phones and desktop machines in the
air. Each ad hoc network node is allowed to move in any direction and can communicate
.ne
with its neighbours.
The mobile devices which are in the coverage range of other devices can communicate
t
with each other directly. Otherwise, if a mobile node (source) wants to transmit a message
to another mobile node (destination) which is in out of the communication range of
source node, then multiple intermediate nodes are used to forward the same message to
the designated destination.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 20 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
Fig. 1.2.3 Ad hoc network architecture
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 21 Wireless Networks and Ad hoc Networks
Location service is used to dynamically map the logical address of the receiver
device to its current location in the network.
3. Middleware and applications
Ad hoc systems do not have a middleware. However, it is developed to rely on
each application to handle all the services it needs in different environments.
Ad hoc networking applications are suitable mainly in specialized fields such
as emergency services, disaster recovery and environmental monitoring. In
addition, Ad hoc system can be widely used in home networking, search and
rescue operations, commercial and educational applications, sensor networks
ww etc.
w
1.2.3.2 Communication
.Ea
There are two types of Ad hoc communication namely,
1. Single hop communication - Here, Direct Communication is possible between
syE
two mobile nodes.
2.
ngi
Multi-hop communication - Here, each node forwards the message through
multiple hops (nodes) to deliver to the designated node (destination) which is
far away to source node.
nee
1.2.3.3 Ad hoc Network Operations
rin
responsibility to perform the following operations,
Cooperate and organize to self-configure the network.
g
As mentioned earlier, in ad hoc network each mobile node acts as router and takes
.ne
Exchanges its own information to its neighbours as beacon messages periodically.
Receives beacons or other packets from neighbours.
t
Discover forwarder nodes to forward packets to distant locations.
Forward the received packet to a specified destination.
Broadcast the packet to all other neighbours which are in its transmission range.
Mobile node can join the network and can leave the network at any time.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 22 Wireless Networks and Ad hoc Networks
environment. Ad hoc routing protocols are broadly classified into three categories
namely,
1. Proactive or table-driven routing protocol
2. On-demand or reactive routing protocol
3. Hybrid routing protocol.
1. Proactive routing protocol - Each node maintains a routing table to listen and
update the details of its neighbours. Each node exchanges hello packet
including node identifier, message and time-to-live parameters. The node
which receives the hello packet will response using hello reply message. These
ww messages are used to update the routing table. So, whenever a mobile node
wants to transmit a packet to other node in the network, it can easily find the
w route from its routing table. Thus, these type of protocols are reducing the time
.Ea
needed to determine a route for data transmission. One of the examples of pro
syE
active routing protocol is Destination Sequenced Distance Vector (DSDV)
routing protocol.
2.
ngi
Reactive routing protocol - Each node determines a routing path whenever it
is required to transmit a packet from a source node to the destination. Each
nee
protocol uses two key phases for finding a route : Route discovery and route
maintenance. Route discovery phase uses route request and route reply
rin
messages. If any reliable path is broken, then route maintenance phase can be
g
used. Route maintenance phase uses Route Error message for intimating the
broken route to the sender and will try to determine alternate route to reach
.ne
the source and destination. Some of the examples of reactive routing protocols
are Dynamic Source Routing (DSR) protocol and Ad hoc On demand Distance
Vector (AODV) routing protocol.
t
3. Hybrid routing protocol - This type of protocols combines the advantages of
proactive and reactive routing protocols. Each node uses proactive algorithm
within its visibility and uses reactive algorithm when a node wants to
communicate with other node which is in it’s out of the coverage area. Zone
Routing Protocol (ZRP) and Order One MANET Routing Protocol (OORP) are
the examples of hybrid routing protocols.
ww
w .Ea
syE
ngi
nee
Fig. 1.2.4 Mobile Ad hoc network (MANET)
rin
1.2.4.2 Vehicular Ad hoc Network (VANET) g .ne
Used for communication between vehicles. Intelligent VANETs use artificial
intelligence and Ad hoc technologies to communicate what should happen during
accidents. This network is formed by communication between moving vehicles and other
t
roadside devices.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 24 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
nee
Fig. 1.2.5 Vehicular Ad hoc network (VANET)
(Quick reference – RSU : Roadside Unit, Vehicle-to-Infrastructure (V2I) communication,
Vehicle-to-Vehicle (V2V) communication)
1.2.4.3 Smartphone Ad hoc Network (SPAN)
rin
g
Wireless Ad hoc network created on smart phones via existing technologies like Wi-Fi
and Bluetooth. These are peer to peer networks formed by smart phones within range of
each other without requiring any cellular carriers, wireless access point etc. .ne
t
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 25 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
nee
rin
Fig. 1.2.7 Wireless Mesh Network (WMN)
g .ne
1.2.4.5 Army Tactical MANET
Used in the army for "on-the-move" communication, a wireless tactical Ad hoc
t
network relies on range and instant operation to establish networks when needed.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 26 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE Fig. 1.2.8 Army tactical MANET
(Quick reference - Unmanned Aerial Vehicles (UAVs), LAN – Local Area Network)
rin
volume etc. These portable sensing devices can form an Ad hoc network to deliver
information to a home base without needing to connect directly to it. This network is
developed to collect the information on the fly.
g .ne
t
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
Fig. 1.2.10 Disaster rescue Ad hoc network
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 28 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
Fig. 1.2.11 Intelligent based mobile Ad hoc network (iMANET)
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 29 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
nee
Fig. 1.2.12 Flying Ad hoc network (FANET)
rin
1.2.5 Ad hoc Network - Commercial Applications
g
With the increased number of lightweight devices as well as evolution in wireless .ne
communication, the ad hoc networking technology is gaining effort with the increasing
number of widespread applications. t
Ad hoc networking can be used anytime, anywhere with limited or no
communication infrastructure.
The Ad hoc network architecture can be used in real time business applications,
corporate companies to increase the productivity and profit.
Ad-hoc networks are used frequently in new types of wireless engineering. Wireless
Ad-hoc networks require minimal configuration and can be deployed quickly, which
makes them suitable for emergencies, such as natural disasters or military conflicts.
There are dynamic and adaptive routing protocols so that these networks can be
configured quickly.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 30 Wireless Networks and Ad hoc Networks
These impromptu on-demand networks are useful for putting together a small,
inexpensive all-wireless LAN. They also work well as a temporary fallback mechanism if
equipment for an infrastructure mode network fails.
The importance of Ad hoc network has been highlighted in many fields as described
below,
1. Provincial level - Ad hoc networks can build instant link between multimedia
network using notebook computers or palmtop computers to spread and share
information among participants (e.g. Conferences).
2. Personal area network and home and enterprise network - A personal area
ww network is a short range, localized network where nodes are usually associated
with a given range. Conference meetings and lectures can be arranged.
w
3. Industry sector - Ad hoc network is widely used for commercial applications.
.Ea
Ad hoc network can also be used in emergency situation such as disaster relief.
syE
The rapid development of non-existing infrastructure makes the Ad hoc
network easily to be used in emergency situation.
4.
ngi
Bluetooth - Bluetooth can provide short range communication between the
nodes such as a laptop and mobile phone.
5.
nee
Tactical/military networks - Military communication and operations can be
rin
carried out. In this network the coordination of military object moving at high
speeds such as fleets of airplanes or ship can achieved. An Ad hoc networking
g
allows the military battle ground to maintain an information network among
.ne
the soldiers, vehicles and headquarters. Automated battlefields can be set such
6.
as in determining the position of troops during war fare.
Sensor networks - These network support collection of embedded sensor
devices used to collect real time data to automate everyday functions. Sensor
t
network can be deployed in the monitoring and measurement of variables
such as change in pressure, temperature etc especially in pipelining. This
network can be use in tracking of positions and movement of objects and
animals.
7. Emergency services - Ad hoc network can be used in search, rescue, crowd
control operations and in disaster control and recovery. It can be used in
replacement of a fixed infrastructure in case of earthquakes, hurricanes, fire
etc. It can be deployed for policing and fire-fighting. It can support doctors and
nurses in medical field.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 31 Wireless Networks and Ad hoc Networks
ww
1.2.6 Ad hoc Network Advantages and Disadvantages
w
Ad hoc network advantages
1.
.Ea
There is separation from central network administration.
2.
3. syE
The self-configuring nodes are also routers.
It is adaptive in nature. There are self configuring and self healing nodes, does
4.
not require human intervention.
ngi
It is very cheap to set up since there is no wiring of nodes.
5.
nee
Ad hoc networks are scalable in nature and incorporate the addition of more
6.
nodes.
rin
Mobility allows Ad hoc networks being created on the fly in any situation
7.
where there are multiple wireless devices.
g
Ad hoc networks are flexible and can be temporarily setup at anytime, in any .ne
8.
place.
Ad hoc networks have lower startup costs due to decentralized administration.
t
9. The nodes in ad hoc network need not rely on any hardware and software. So,
it can be connected and communicated quickly.
10. Lack of infrastructure makes the network robust in network failure.
11. Ad hoc networks do not restrict access to channels.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 32 Wireless Networks and Ad hoc Networks
4. Ad hoc networks are more prone to attacks due to limited physical security. If
an attacker comes within range of the ad hoc network, the attacker can easily
get in inside the network.
5. For file and printer sharing, all users need to be in the same workgroup, or if
one computer is joined to a domain, the other users have to have accounts on
that computer in order to access shared items.
.Ea
lower capacity as compare to infrastructure networks. The effect of fading,
multiple accesses, interference condition is very low in Ad hoc networks in
2.
syE
comparison to maximum radio transmission rate.
Variability in capacity links due to bandwidth constraint - Being a link of
ngi
wireless the nodes have tendency to continue with low capacity in comparison
3.
to the hardwired.
nee
Dynamic topology - In dynamic topology the nodes are free to move in any
rin
direction. Topology of network changes rapidly and unpredictably by the time.
g
Due to this topology the bidirectional and unidirectional routing exists.
Challenging task is to transferring the packets between the nodes because the
topologies are changes continuously. Due to dynamic topology the nodes have .ne
less trust between them. If some settlements are found between the nodes that
also makes trust level questionable.
t
4. Multicast routing - Another challenge of Ad hoc network is multicast.
Multicast stands for multiple communication between wireless devices. Ad hoc
networks are the multicast dynamic networks because the nodes randomly
change their positions. The nodes have multiple hopes instead of single hop
and they are complex. As the nature the multicast is not remains for longer
period so that the protocol has to maintain mobility which includes the leaving
and joining of nodes. The new device adds in the network need to know all the
other nodes. To facilitate automatic optimal route selection dynamic update is
necessary due to existence of node.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 33 Wireless Networks and Ad hoc Networks
ww transmission of packets by those node which are not in the direct transmission
range of sender side but are in range of receiver side.
w
8. Packet loss due to transmission error - The vulnerable nature of wireless
.Ea
networks often lead to frequent packet loss due to traffic collision caused by
syE
hidden terminals, interference and frequent path breaks caused by mobility of
nodes. By increase in collisions , hidden terminals, interference, uni-directional
ngi
links and by the mobility of nodes frequent path breaks a higher packet loss
has been faced by ADHOC networks.
9.
nee
Frequent network partitions - The random movement of nodes often leads to
network partitions. This affects mostly the intermediate nodes.
rin
10. Power-constrained and operation - This is considered as a major challenge for
g
the Ad hoc network. Most of the nodes rely on limited battery life. Some of the
power of the batteries is used for data transmission, data processing and for
.ne
Ad hoc network. In Ad hoc network all the nodes rely on the batteries or some
exhaustible source of energy. Conversion in the energy is the optimized criteria
t
routing packets to their destination. This is a critical issue in the design of an
and an important system design. Lean power consumption is also used for the
light weight mobile terminals. Conservation of power and power-aware
routing is another aspect which needs to be considered in Ad hoc network.
11. Diffusion hole problem - The excess energy consumption is faced by the
nodes which are present in the boundaries of the holes. If the bypass holes are
wish to omit then the packets are delivered along the holes boundaries. This
enlarges the hole due to consumption of very much of the nodes and its
boundaries.
12. Quality of service - In Ad hoc network the environment changes constantly so
that it provides different quality of service levels which are challengeable. The
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 34 Wireless Networks and Ad hoc Networks
ww attacks. A nasty neighbor node, relaying the packets is also a security problem
along with other vulnerabilities. Different schemes are used for authentication
.Ea
Reliability problem is also a wireless link characteristic due to limited wireless
syE
transmission. Due to the broadcast nature of wireless medium packets loss and
errors do occur in the transmissions. In comparison to the wired network the
ngi
wireless networks are more vulnerable to security threats.
There are various security threats in Ad hoc networks. Mobile nodes are
nee
usually more vulnerable to attacks within the network as well as outside the
network.
rin
External Threats - Performing communication in free space exposes Ad hoc networks
g
to attacks as anyone can join the network, and eavesdrop (being hidden and listening) or
inject messages. External attacks are accomplished by entities which are outside of the
.ne
network or by nodes which are not authorized. These attacks generally threaten the
lower layers that is physical and data link layer. As, in Ad hoc network the nodes inherit
the mobile nature it is intrinsically difficult to secure this layer. These threats can be
t
further classified in following categories based on their action,
(i) Passive Attacks - Passive eavesdropping is a technique where an unauthorized
node silently listens the network traffic, even the route updates. It gathers the
data and attempts to discover nodes information (for example, IP addresses,
location of nodes, etc.) by listening to routing traffic. Such information can be
used to threaten the network by interfering the topology, knowing the
geographical location of the nodes and identifying the heavily used nodes.
Passive attack signifies that the attacker does not send any message, but just
listens to the channel. A passive attack does not disrupt the operation of a
protocol, but only attempts to discover valuable information. Passive attack is
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 35 Wireless Networks and Ad hoc Networks
usually impossible to detect this attack, as it does not produce any new traffic
in the network.
(ii) Active Attacks - Active attacks are designed to disrupt the network by sending
signals or data. An active attack attempts to destroy or modify the data being
exchanged in the network, hence disrupting the normal functioning of attacks.
In contrast to passive attack, during an active attack, information is inserted
into the network. Active attacks involve actions such as the replication,
modification and deletion of exchanged data. Certain active attacks can be
easily performed against an Ad hoc network. These attacks can be classified as
w blocked.
.Ea
Further these attacks are divided into two categories,
syE
External attacks - These are carried out by the outsider nodes, those nodes that do not
belong to the concerned network.
ngi
Internal attacks - These attacks occur because of compromised nodes present inside
the network.
nee
Routing Attacks - These attacks are aimed on the routing protocols and are being
performed in a manner to disrupt the operation of the network. These attacks are
rin
further categorized as routing table overflow and routing table poisoning.
1.2.8 Ad hoc Wireless and Cellular Network and their Comparative Analysis g .ne
A cellular network is a radio network distributed over land through cells where each
cell includes a fixed location transceiver known as base station. These cells together
provide radio coverage over larger geographical areas. User Equipment (UE), such as
t
mobile phones, is therefore able to communicate even if the equipment is moving through
cells during transmission.
Cellular networks give subscribers advanced features over alternative solutions,
including increased capacity, small battery power usage, a larger geographical coverage
area and reduced interference from other signals. Popular cellular technologies include
the global system for mobile communication, general packet radio service, 3GSM and
code division multiple access.
Cellular network technology supports a hierarchical structure formed by the Base
Transceiver Station (BTS), Mobile Switching Center (MSC), location registers and Public
Switched Telephone Network (PSTN). The BTS enables cellular devices to make direct
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 36 Wireless Networks and Ad hoc Networks
communication with mobile phones. The unit acts as a base station to route calls to the
destination base center controller. The Base Station Controller (BSC) coordinates with the
MSC to interface with the landline-based PSTN, Visitor Location Register (VLR), and
Home Location Register (HLR) to route the calls toward different base center controllers.
w
2.
.Ea
Infrastructure
requirements
station
Infrastructure required
as Base station needed
No infrastructure
required
3.
syE
Switching Type Circuit Switching Packet Switching
4.
5.
Number of Hops
Mesh
rin
requirements
.ne
take more time for
deployment
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 37 Wireless Networks and Ad hoc Networks
ww Table 1.2.1 Difference between cellular networks and Ad-hoc networks in tabular form
to other node. The major design issues of a routing protocol are as follows :
Mobility, bandwidth constrained, error-prone and shared channel, location
dependent contention and other resource constraints such as computing and
battery power, storage capacity etc.
Other requirements of routing protocols in Ad hoc networks are minimum
route acquisition delay, quick route reconfiguration, loop free routing,
distributed routing approach, minimum control overhead, scalability,
provisioning of Quality of Service (QoS), support for time sensitive traffic and
security.
.Ea
multicasting protocols are as follows : Robustness, efficiency, control overhead,
QoS, efficient group management, scalability and security.
4.
syE
Transport layer protocols - Transport layer protocols are used to set up and
maintain end-to-end connection. Further, it provides reliable data delivery in
ngi
wired networks. It is also focused to perform flow control and congestion
control.
nee
Transmission Control Protocol (TCP) is one of the reliable connection oriented
rin
protocols which is widely used in wired networks. However, the performance
of TCP is degraded in Ad hoc networks due to the factors such as frequent
g
path breaks, high mobility, bandwidth and power constrained, high channel
.ne
error rate and frequent network partitions. If a TCP connection is divided into
two in Ad hoc network, then it will lead to much packet loss. This would be an
intolerable when the network partitions exist for prolong period. Therefore, the
development of transport protocols for Ad hoc networks should take into
t
consideration the aforementioned issues.
5. Pricing scheme - In Ad hoc network, if any mobile node is not interested in
relaying a packet to its neighbours, it can decide to power off. In spite of that a
node is having an optimal path to communicate with other node and any
intermediate node on the path supposed to relay the packet is decided to
power down, then the sender node cannot use that optimal path; instead it
may force to determine or consider a costlier alternate path which is non-
optimal, consumes more resources and hence highly affects the throughput of
the system.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 39 Wireless Networks and Ad hoc Networks
.Ea
determining routing path. The routing measures considered are network
throughput, packet delivery ratio, packet loss rate, delay, reliability, bit
syE
error rate and bandwidth consumption.
c.
ngi
QoS framework is a complete system that is used to provide the assured
services to the concerned user or application. The key component of QoS
nee
framework is a QoS service model that defines the serving way of user
requirements. One of the design issues is whether to provide service in
rin
per-session basis or per-class basis. The other key components are QoS
scheduling schemes. g
routing, QoS signaling, QoS MAC, connection admission control and
.ne
7. Self-organization - The mobile nodes in ad hoc networks would self-configure
the network by itself. Self-organization includes neighbour discovery, topology
organization and reorganization. Beacon signals would be exchanged between
t
mobile nodes during neighbour discovery. For organizing topology, every
node gathers information from other nodes. During topology reorganization,
every node maintains the updated information. The topology of the network
would be changed due to high mobility, node failures and frequent network
partitioning.
8. Security - Security is a challenging one in Ad hoc wireless networks, especially
in military areas. The attacks in Ad hoc wireless network are broadly classified
into two types :
1. Passive attack
2. Active attack.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 40 Wireless Networks and Ad hoc Networks
In general, passive attacks would be caused by malicious nodes present in the network
to obtain the information being exchanged in the network. This type of attack would not
interfere in network operations. Active attacks would disturb the network operation. If
the network operation is disrupted by mobile nodes (attackers) available within the
network are called internal attackers; if the network operation is interrupted by the
mobile nodes (attackers) which is in external network are called as external attackers.
Some of the security threats exist in ad hoc wireless network are Denial-of-Service (DoS),
resource consumption, host impersonation, information disclosure and interference.
9. Addressing and service discovery - Address of a mobile node is a globally
.Ea
addresses to the nodes. Ad hoc wireless network also requires a duplicate
address-detection mechanism in order to maintain unique addressing
syE
throughout the network. Since the Ad hoc network forms frequent dynamic
topology, efficient service advertisement mechanism also required to locate
services that other nodes provide.
ngi
nee
10. Energy management - It is the process of managing the sources and consumers
of energy in a node to boost up the lifetime of the node in the network. Energy
management can be classified into four categories -
rin
I.
II.
Transmission power management
Battery energy management g .ne
III. Processor power management
IV. Device power management.
Some of the functions of energy management mechanisms are enhancing battery life of
t
a node by shaping the energy discharge pattern, determining routing path with minimum
energy consumption, using distributed scheduling schemes to enhance battery life of a
node and to minimize the power consumption of processor and other computing devices
during data transfer.
11. Deployment considerations - The deployment considerations of Ad hoc
wireless networks when compare with wired networks are low cost of
deployment, incremental deployment, short deployment time, re-
configurability and non-estimation of future traffic growth in network.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 41 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
Fig. 1.2.13 Ad hoc wireless internet protocol stack and structure of network
ww wireless Internet. Routing protocols that exploit the presence of gateway nodes
are more suitable here.
w
4.
.Ea
Transport layer protocol - Even though several solutions for transport layer
protocols exist for Ad hoc wireless networks, unlike other layers, the choice lies
syE
in favor of TCP's extensions proposed for Ad hoc wireless networks. Split
approaches that use traditional wired TCP for the wired part and a specialized
ngi
transport layer protocol for the Ad hoc wireless network part can also be
considered where the gateways act as the intermediate nodes at which the
nee
connections are split. Various factors are required to be considered here, like
the state maintenance overhead at the gateway nodes.
rin
5.
g
Load balancing - There is 100 % chance that the Ad hoc wireless Internet
gateways experience heavy traffic. Hence the gateways can be saturated much
earlier than other nodes in the network. Load balancing techniques are .ne
essential to distribute the load so as to avoid the situation where the gateway
nodes become bottleneck nodes.
t
6. Usage pricing/billing - Since Internet bandwidth is expensive, it becomes very
important to introduce pricing/billing strategies for the Ad hoc wireless
Internet. Gateway is the preferred choice for charging the traffic to and from
the Internet. It is very complex to calculate the Pricing for the local traffic
(traffic within the wireless part, that is, it originated and terminated within the
wireless part without passing through the gateway nodes), where it becomes
necessary to have a dedicated, secure, and lightweight pricing/billing
infrastructure installed at every node.
snoop on important information sent unprotected over the air. Hence security
is a prime concern in the Ad hoc wireless Internet.
Since the end users can utilize the Ad hoc wireless Internet infrastructure to
make e-commerce transactions, it is vital aspect to include security
mechanisms in the Ad hoc wireless Internet.
8. QoS support - Voice over IP (VoIP) is widely used all over and there is huge
multimedia applications usage over the Internet. Therefore, provisioning of
QoS support in the Ad hoc wireless Internet becomes a very important issue.
ww9. Service, address, and location discovery - By service discovery in any network
it means the activity of discovering or identifying the entity which provides a
.Ea
exist to do the same, and similar systems need to be extended to operate in the
Ad hoc wireless Internet as well. Address discovery refers to the services such
syE
as those provided by Address Resolution Protocol (ARP) or Domain Name
Service (DNS) operating within the wireless domain. Location discovery refers
ngi
to different activities such as detecting the location of a particular mobile node
nee
in the network or detecting the geographical location of nodes. Location
discovery services can provide enhanced services such as routing of packets,
location-based services, and selective region-wide broadcasts.
rin
g
Below Fig. 1.2.14 depicts wireless mesh network that connects several houses
to the Internet through a gateway node. Such networks can provide highly
.ne
reliable broadband wireless networks for the urban as well as the rural
population in a cost-effective manner with fast
reconfiguration. This wireless mesh network is a special case of the Ad hoc
t
deployment and
wireless Internet where mobility of nodes is not a major concern as most relay
stations and end users use fixed transceivers. In the Fig. 1.2.14 House-1 is
connected to the Internet over multiple paths (path 1 and path 2).
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 44 Wireless Networks and Ad hoc Networks
ww
w .Ea
syE
ngi
Fig. 1.2.14 Ad hoc wireless Internet implemented by a wireless mesh network
rin
g
Ans. : An Ad hoc network is a multi hop, infrastructure less network which has no
centralized server to control the communication between the nodes and resources .ne
cannot be reserved beforehand. It is used in battlefields and military applications.
Q.2 Why are Ad hoc networks needed ? t
Ans. : Ad hoc networking is often needed where an infrastructure network cannot be
deployed and managed. The presence of dynamic and adaptive routing protocols
enables quick formation of Ad hoc networks and is suitable for emergency situations
like natural disasters, spontaneous meetings or military conflicts.
Q.3 List the characteristics and applications of MANETs.
Ans. : The characteristics of MANETs are,
1. Dynamic topologies
2. Bandwidth-constrained and variable capacity links.
3. Energy-constrained operation.
4. Limited physical security.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 45 Wireless Networks and Ad hoc Networks
ww
Ans. : MANET is defined as an autonomous system of nodes or Mobile Stations (also
serving as routers) connected by wireless links, the union that forms a communication
w
networks, modeled in the form of an arbitrarily communication graph.
.Ea
Q.5 What are various operating modes in wireless networks ?
Ans. : Operating modes in wireless networks are infrastructure mode and Ad hoc
syE
mode. The IEEE 802.11 standards specify two operating modes - infrastructure mode
and Ad hoc mode (Infrastructure-less )
1. ngi
Infrastructure mode is used to connect computers with wireless network
nee
adapters, also known as wireless clients, to an existing wired network with
the help from wireless router or access point. In this mode each node is
rin
connected with other node through a fixed base station. The fixed station is
g
also known as Access Points (APs). An example for infrastructure based
network is cellular network in which base station or AP is used as fixed
equipment. Each network area is divided into cells and the base station .ne
provides each cell with the network coverage which can be used for the
transmission of high quality voice, data and other types of messages.
t
2. Ad hoc mode is used to connect wireless clients directly together, without the
need for a wireless router or access point. An Ad hoc network consists of up
to 9 wireless clients, which send their data directly to each other. In this
mode Each node can communicate with each other without using any fixed
infrastructure. Mobile Ad hoc networks and Vehicular Ad hoc Networks
(VANETs) are the examples of infrastructure less networks. In Ad hoc
networks, each node acts as a router to forward the information in a multi-
hop fashion.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 46 Wireless Networks and Ad hoc Networks
ww
listening to routing traffic. Such information can be used to threaten the network by
interfering the topology, knowing the geographical location of the nodes and
w
identifying the heavily used nodes. Passive attack signifies that the attacker does not
.Ea
send any message, but just listens to the channel. A passive attack does not disrupt the
operation of a protocol, but only attempts to discover valuable information. Passive
syE
attack is usually impossible to detect this attack, as it does not produce any new traffic
in the network.
Q.8 What is wireless network ? ngi
nee
Ans. : Wireless networks are computer networks that are not connected by cables of
any kind. The use of a wireless network enables enterprises to avoid the costly process
rin
of introducing cables into buildings or as a connection between different equipment
locations.
Q.9 What is Wi-Fi network ? g .ne
Ans. : Wi-Fi is a low power wireless communication, that is used by various electronic
devices like smart phones, laptops, etc. In this setup, a router works as a
communication hub wirelessly. These networks allow users to connect only within
t
close proximity to a router. WiFi is very common in networking applications which
affords portability wirelessly. These networks need to be protected with passwords for
the purpose of security, otherwise it will access by others.
Q.10 What is Bluetooth technology ?
Ans. : The main function of the Bluetooth technology is that it permits user to connect
various electronic devices wirelessly to a system for the transferring of data.Cell
phones are connected to hands free earphones, mouse, wireless keyboard. By using
Bluetooth device the information from one device to another device. This technology
has various functions and it is used commonly in the wireless communication market.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 47 Wireless Networks and Ad hoc Networks
ww
Q.8 Explain various wireless communication. (Refer section 1.1)
w
Q.9 What are the various components of wireless networks ? (Refer section 1.1)
.Ea
Q.10 Classify wireless network and explain it. (Refer section 1.1)
syE
ngi
nee
rin
g .ne
t
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 1 - 48 Wireless Networks and Ad hoc Networks
Notes
ww
w .Ea
syE
ngi
nee
rin
g .ne
t
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
UNIT - I
Syllabus
ww
Issues in Designing a Routing Protocol for Ad Hoc Wireless Networks, Classifications of
Routing Protocols, Table Driven Routing Protocols - Destination Sequenced Distance Vector
w
(DSDV), On-Demand Routing protocols - Ad hoc On–Demand Distance Vector Routing
(AODV).
.Ea
Contents
syE
2.1 Introduction to Routing
2.2 Types of Ad hoc Routing Protocols
ngi
nee
2.3 Advantages and Disadvantages of Ad hoc Wireless Routing Protocols
2.4 Two Marks Questions with Answers [Part A]
2.5 Long Answered Questions [Part B]
rin
g .ne
t
www.EasyEngineering.net
(2 - 1)
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-2 Routing in Ad hoc Networks
ww
1. Routing is the process of establishing a path between the sender and receiver nodes
for transmitting the packet along the path. Different types of routing protocols are
wwidely used to discover a path between two nodes and take the responsibility of
.Ea
routing the packet to the intended destination with minimized delay, efficient
bandwidth consumption and maximizing reliability.
syE
2. Since two hosts wishing to exchange packets cannot be able to communicate
directly, some form of routing protocol is necessary to relay the packets between
ngi
nodes. When the destination is few hops away from the source node, multi-hop
communication need to be used for establishing path between the source and
destination.
nee
2.1.2 Major Issues in Designing Routing Protocols for Ad hoc Networks
rin
Routing protocols used in wired networks cannot be directly applied to ad hoc
wireless networks because of the following design constraints, g .ne
1.
2.
Node mobility
Bandwidth constrained t
3. Error-prone shared broadcast radio channel
4. Hidden and exposed terminal problems
5. Resource / energy constrained
6. Security
7. Highly dynamic topology
8. No infrastructure for centralized administration
9. Establishing end-to-end path.
Therefore, the design of new routing protocol has to consider the design constraints of
ad hoc wireless networks to meet out the requirements of an efficient routing protocol.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-3 Routing in Ad hoc Networks
1. Node Mobility
The nodes used in ad hoc network are highly dynamic due to the movement of nodes.
Mobility nature of nodes causes frequent path break. Sometimes, the node which acts as a
forwarder node may move away and leads to path break. The frequent path break occurs
ww
due to the movement of intermediate nodes or end nodes along the path. So the design of
routing protocol has to consider this issue to introduce efficient algorithms for
w .Ea
determining alternate path with little delay.
2. Bandwidth Constraint
syE
Wireless link has limited bandwidth due to limited radio spectrum. Hence the wireless
links carrying large amount of data is not possible in ad hoc network. Frequent dynamic
ngi
topology leads to high control overhead. The bandwidth is affected by multiple access,
nee
fading, noise, interference conditions etc. Message aggregation exceeds network capacity
frequently.
reply message, node-B transmits CTS packet to node-A, this can be received by node-A
and heard by node-C. So, node-C defers its transmission for the time period specified in
CTS packet as there is a transmission between node-A and node-B.
Consider the scenario where node-D exists in the transmission range of node-C. When
node-B wants to transmit to node-A, at the same time, node-C cannot communicate with
node-D due to false conclusion by node-C. This problem is often referred to as “the
exposed terminal problem”. Both the hidden and the exposed terminal problems cause
reduction of network throughput when the traffic load is high.
5. Resource Constraints
ww
Mobile nodes have limited battery power, processing power, memory and energy.
w
Increasing the battery power and processing ability makes the nodes bulky and less
.Ea
portable. Hence the design of a routing protocol has to consider the resource constraints
of mobile nodes.
nee
new routing protocol. Unauthorized access of others data is known as snooping.
Tunneling a packet between two colluding attackers is referred to as a wormhole. In
rin
wormhole attack, a malicious node receives packets at one location in the network and
g
forwards them to another location where these packets are resent into the network. In
black hole attack, a node (attacker) designs a routing protocol as having a shortest path
between itself and the node whose packets it wants to intercept. .ne
7. Highly Dynamic Topology
Frequent changes in local topology and changes in the topology of parts of the
t
network with which the node does not have any traffic correspondence, are required be
considered appropriately.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-5 Routing in Ad hoc Networks
ww
networks. Hence ad hoc wireless networks require specialized routing protocols that
address the challenges described above.
w
A routing protocol for ad hoc wireless networks should have the following
characteristics,
.Ea
1. It must be fully distributed, as centralized routing involves high control overhead
syE
and hence is not scalable. Distributed routing is more fault tolerant than centralized
routing, which involves the risk of single point of failure.
ngi
2. It must be adaptive to frequent topology changes caused by the mobility of nodes.
nee
3. Route computation and maintenance must involve a minimum number of nodes.
Each node in the network must have quick access to routes, that is, minimum
connection setup time is desired.
rin
control overhead. g
4. It must be localized, as global state maintenance involves a huge state propagation
.ne
5. Protocol should be loop-free and free from stale routes.
6. The number of packet collisions must be kept to a minimum by limiting the number
of broadcasts made by each node. The transmissions should be reliable to reduce
t
message loss and to prevent the occurrence of stale routes.
7. It must converge to optimal routes once the network topology becomes stable. The
convergence must be quick.
8. It must optimally use scarce resources such as bandwidth, computing power,
memory, and battery power.
9. Every node in the network should try to store information regarding the stable local
topology only. Frequent changes in local topology and changes in the topology of
parts of the network with which the node does not have any traffic correspondence,
should not affect the node in any ways, that is, changes in remote parts of the
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-6 Routing in Ad hoc Networks
network must not cause updates in the topology information maintained by the
node.
10. It should be able to provide a certain level of Quality of Service (QoS) as
demanded by the applications, and should also offer support for time-sensitive
traffic.
ww
2. Reactive or on-demand routing protocols
3. Hybrid routing protocols.
w .Ea
2.2.1 Proactive Routing Protocols (Table Driven Routing Protocols)
1. Proactive routing protocols are also called as table-driven routing protocols in
syE
which each node maintains a routing table.
ngi
2. Routing table contains up-to-date routing information of the entire network.
Whenever a node wants to send a packet to the receiver node, it looks up its own
nee
routing table to find the routing path from itself to the intended receiver.
3. These routing tables have to be updated periodically to maintain the current stable
rin
or available paths. This can be achieved by exchanging or broadcasting the periodic
beacon signals between the nodes.
4. Therefore, each node can have the knowledge about the complete network g .ne
topology. Hence each node can update its routing table based on the beacon signal
it has received from its neighbors. t
Advantage
1. Minimum time is required to find out a route for data transmission
Disadvantages
1. Due to the frequent change of network topology, the exchange of up-to-date
information has to be done periodically
2. Network overload is high
3. Bandwidth consumption is high in large networks
4. This type of protocol is not suited for large networks
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-7 Routing in Ad hoc Networks
ww
proactive routing protocols of ad hoc network. In DSDV, each node keeps record of route
information in the form of routing table. Each table contains the following information :
w .Ea
ID of destination node
Details of next hop
Metric
Sequence number
syE
Time-to-live parameter.
ngi
nee
Each route broadcast message includes the list of ID of destination node, number of
hops required to reach the destination node, next hop, recent sequence number and
rin
metric parameter. Each node exchanges its updated routing table with each other.
Updates in the routing table can be sent to other nodes in two ways :
Full dump update g .ne
Incremental update.
In full dump update method, a node sends the whole routing table to the neighbors
and thereby increases network overhead. In incremental update method, only the recent
t
updated entries are sent. The incremental update method is more suitable when the
network is large and stable so that heavy traffic can be avoided.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-8 Routing in Ad hoc Networks
According to the shortest path information, each node constructs another routing
table where the node has recently updated route information to reach destination
with minimum distance.
This new routing table will be broadcast to its
neighbours.
On receipt of these messages, the neighbour
nodes update its routing table. Fig. 2.2.1 Network topology in
In the Fig. 2.2.1, the connectivity between nodes are DSDV
shown using wireless links. The routing table
ww
maintained at node-A is shown in Table 2.2.1.
w Destination
.Ea
B
Next Hop
B
Metrix
1
Sequence No
342
D
syE C
B
1
2
168
121
E C ngi 2 24
nee
Table 2.2.1 Routing table at node A
rin
If node-B is the destination for node-A, then node-A can directly transmit the packet
g
with metric 1 and next hop is node-B. But, if node-A wants to transmit a packet to node-E,
then it can find the route from the routing table. In this case, the node-E is not in the .ne
visibility of node-A. Therefore, the packet can be transmitted through the next hop C with
metric 2. t
Maintaining Metric Field
In ad hoc wireless network, all the nodes are moving and relocate its position from
time to time. When topology changes dynamically each node will broadcast a routing
table update packet to its neighbours. The procedure for updating metric field in the
routing table update packet is as follows,
• The routing table update packet starts with a metric of one.
• When the neighbour nodes receive this packet, it will increment this metric by one
and then re-broadcast the updated packet to its neighbours.
• This process will be repeated until all the nodes in the network receive the copy of
update message.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2-9 Routing in Ad hoc Networks
• When a node receives more than one packet, then the update packet with smallest
metric value will be considered to ensure the shortest path. Other packets will be
ignored.
ww
the routing packet will be updated in the table. Else, the received packet will be assumed
as a stale or old packet and hence discarded.
w
2.2.1.2 Wireless Routing Protocol
.Ea
Wireless Routing Protocol (WRP) is one of the proactive routing protocols in ad hoc
wireless networks.
syE
When compare with DSDV, the WRP differs in table maintenance and the procedure
used in updating routing tables.
ngi
In order to maintain the accurate information in the routing table, in WRP, each node
maintains four tables. These tables are explained below,
nee
1. Distance table
2. Routing table rin
3. Link cost table
4. Message re-transmission list.
g .ne
1. Distance Table
In this table, each node contains information such as destination node, next hop,
t
distance and the previous node (predecessor) of the destination.
2. Routing Table
It contains the shortest distance and the up-to-date information of all destinations. In
order to determine the shortest path, each node maintains the ID of destination node, next
hop, distance (cost) and predecessor node.
3. Link-Cost Table
Each node contains the cost of link and the ID of direct nodes with which the node can
communicate directly. The cost of other links is represented as infinity.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 10 Routing in Ad hoc Networks
Table Maintenance
This protocol requires larger memory to store four tables and more processing for
ww
maintaining accurate information about nodes in the network.
It is also not suitable for large networks with high mobility.
w
In order to update the table, each node periodically
.Ea
broadcast hello message to its neighbours. If the sending
node is a new one, then all the neighbouring nodes will
syE
update its table. Otherwise, the nodes will ignore the
ngi
message. The exchange of hello message is used to ensure Fig. 2.2.2 Example topology
the availability and the connectivity of node in the network. for WRP protocol
Fig. 2.2.2 shows an example network topology of WRP
protocol. nee
rin
Consider that node-A is the source and node-E is the destination. The routing table
maintained at each node with destination node-E is shown in Table 2.2.2.
Node ID Next Hop Predecessor Costg .ne
A
C
C
E
C
C
7
2
t
D C C 5
E E E 0
From the routing table, node-A can identify that there is a path to node-E with next
hop C and the predecessor is also C with cost value 7.
Route Maintenance
When a link break occurs, the node which detects link breakage will send an update
message by setting the cost of broken link to infinity. The nodes receive this update
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 11 Routing in Ad hoc Networks
message will update its routing table. The node which had been initiated the update
packet will detect an alternate path and broadcast the new path information to its
neighbors. Based on the reception of this message, all the neighbors will update its
routing table.
ww
Each cluster contains a special node called cluster-head which controls its cluster. Each
cluster-head maintains the information of the members of that cluster.
w
CGSR uses Least Cluster Change (LCC) algorithm to select cluster-head. Clusters can
.Ea
overlap with other clusters. Communication between the clusters can take place through
the common nodes (members of more than one cluster) exists in the overlapping area of
syE
each cluster. The common nodes are called as gateways or border nodes. Data
transmission can be carried out through the cluster-heads of each cluster.
ngi
When a cluster-head enters in another cluster, it cannot act as cluster-head; it acts as
A routing table.
rin
node in the network. g
Cluster-Member Table - This table maintains the cluster-head of each destination
.ne
Routing Table - This table contains routing information such as destination node, next
hop, metric and the sequence number.
Each table is updated periodically at every node. Before performing actual packet
t
transmission, each node has to receive a token from its cluster-head. This token includes
the information of destination cluster-head and the next hop node information taken from
the cluster-member table and the routing table of its cluster-head. The steps involved in
packet transmission using CGSR are given below,
When a node wants to send a packet to the node belongs to same cluster, it
forwards the packet directly to the cluster-head.
Cluster-head checks whether the destination node belongs to that cluster or not.
If the destination node belongs to that cluster, then the cluster-head forwards the
packet to the destination node directly.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 12 Routing in Ad hoc Networks
Otherwise, the packet has to be forwarded to other cluster using gateways. This
step will be repeated until finding the destination node’s cluster-head.
Once the destination node’s cluster-head is identified, then the packet is
transmitted to the cluster-head of the destination node. This cluster-head will in
turn forward the packet directly to the intended destination.
ww
w .Ea
syE
ngi
nee
Fig. 2.2.3 Network topology of CGSR
In the above Fig. 2.2.3, cluster-heads, border nodes (gateways) and cluster members
rin
are shown. When node H wants to transmit a packet to node M, it follows the path H-A-
g
F-B-L-C-M. Packet transmission between clusters is carried out through border nodes.
Since node F and node L are border nodes, the packet transmission between node H and
.ne
node M are taken place through these border nodes. If a path break occurs or any node
moves away, then the source node will reestablish the path between the source and
destination. If any cluster-head or border node moves away, then the time taken to find
t
an alternate path by the source node will lead to long delay.
1. Neighbour Discovery - Each node maintains neighbour list and topology table.
Initially these tables are maintained as empty. Once the node initiates this
neighbour discovery phase, then it can fill the table with neighbour relationships. In
order to identify the presence of neighbours, each node broadcasts ‘hello’ packet
including its ID, time-to-live parameters. The nodes hearing the packet will
response with the reply message. Thus each node maintains relationship between
each other.
Information Dissemination - This phase propagates Link State Packets (LSP). This
phase handles two functions namely, LSP integrity and updating interval. In LSP
ww
integrity, when a node generates a new LSP, it must be flooded throughout the
network. Most recently generated LSP contains highest sequence number. Each
w
node keeps track of sequence number that it is used for the last LSP and inserts a
.Ea
next sequence number for the new LSP. A sequence number is a counter value. For
each new LSP, counter value is incremented. Most recent sequence number
syE
indicates the freshness of the message. The update interval is that the time gap
between sending first LSP and next LSP by a node.
ngi
When a node receives a LSP to retransmit, it calculates interval time to wait before
nee
sending out the LSP to other nodes based on Update_Interval calculation.
Update_Interval = Constant_Time * hop_count^
rin
Where, Constant_Time is the user defined refresh period to send out LSPs (in the 1st
g
scope), hop_count is the number of hops the LSP has traversed, alpha is a parameter that
determines how much effect each scope has on the Update_Interval. Values for alpha are
.ne
0 or ≥ 1.
Route Computation - This phase is responsible for computing route based on the
information available in LSP. Using Dijkstra's algorithm, each node computes
t
shortest path to reach other nodes. The hop count value is taken as cost of the path.
Data can be transmitted through shortest path.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 14 Routing in Ad hoc Networks
3. In order to find a route, the sender node has to broadcast route discovery control
messages to neighbor nodes until receiving reply from the intended receiver.
Advantages
1. Needs to broadcast less control messages for discovering route when required
2. Network overhead is low
3. Suitable for large networks
4. Bandwidth wastage is low.
Disadvantage
ww
1. Time taken to discover a route is non-predictable.
w
Various Reactive Routing Protocols
.Ea
Reactive routing protocols are also called as on-demand routing protocols. The
protocols which use reactive routing concept are as follows,
syE
1. Dynamic source routing protocol
2. Ad hoc on-demand routing protocol
3. Temporarily ordered routing algorithm ngi
4. Location aided routing
nee
5. Associativity-based routing
6. Signal stability-based routing protocol rin
7. Flow oriented routing protocol.
g .ne
2.2.2.1 Dynamic Source Routing (DSR) Protocol
Dynamic Source Routing (DSR) protocol is one of the popular reactive routing
protocols that discover a route between the source and destination whenever required.
t
The operation of this protocol is based on source routing. The sender knows the complete
route to reach the destination. Each data packet carries the source route in the packet
header.
Since each packet carries the complete route information in the packet, the
intermediate nodes do not maintain routing information to route the packets to the
destination. Nodes which use reactive routing protocol does not maintain routing table.
Therefore, the number of message exchanges between nodes is very low and hence leads
to less network overhead.
So, the major advantage of this protocol is that the bandwidth usage is limited by
avoiding the periodic table updates. However, at the time of route discovery, the sender
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 15 Routing in Ad hoc Networks
node has to exchange control messages to establish a path between source and the
destination. DSR protocol comprises two phases : Route discovery and route
maintenance.
whas the information about destination or until the destination node receives this
packet.
.Ea
One node may receive multiple numbers of RREQ packets. Then, the destination
syE
node selects only one path with shortest distance.
On receipt of RREQ messages, the actual destination will send a Route Reply
ngi
(RREP) message to the sender node through the selected path.
nee
After receiving the RREP packet, actual data transmission will be started between
the sender and the receiver nodes.
rin
The route discovery phase of DSR protocol using RREQ packet is shown in below
Fig. 2.2.4,
g .ne
t
Fig. 2.2.4 Route construction in DSR protocol
When node A wants to transmit a packet to node F, it broadcasts RREQ packet in the
network. The key fields of RREQ packet are ID of source node and ID of destination node.
The RREQ packet is received by node B. Node B checks that whether the packet has to be
rebroadcast or not. If so, it attaches its own ID and rebroadcast it. This happens until the
packet received by node F. Node F may receive multiple RREQ packets with different
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 16 Routing in Ad hoc Networks
ww
node. This route information can be used by the
node in future. This concept reduces the time required to discover a new route.
w
Route Maintenance Phase
.Ea
In this phase, if any node finds that the path is broken, then a Route Error (RERR)
syE
message will be forwarded to the sender node. So, the sender node again starts the route
construction phase by broadcasting RREQ packet to discover an alternate path in order to
reach the actual destination node.
ngi
nee
Furthermore, if a node detects an error along the path of a packet transmission, then
the node forwards a route error packet to the sender. The route error packet contains the
rin
IDs of the upstream and downstream nodes at both ends of the node in error. When a
route error packet is heard by neighbors, the link in error is removed from any route
caches.
g .ne
2.2.2.2 Ad-hoc On-demand Distance Vector (AODV) Protocol
It is one of the reactive or on-demand routing protocols used widely in mobile ad hoc
networks. As DSR protocol, AODV protocol also operates on two phases namely, route
t
discovery and route maintenance mechanism. The major difference between DSR and
AODV protocols, in AODV, the source route will not carry the complete path. Each node
only knows its previous hop and next hop information of the established path.
Route Discovery
In AODV, each node maintains a routing cache to save the information about the
reachable destinations. When to a node wants to transmit a packet to the destination the
sender node initiates to broadcast the RREQ packet. All the neighbouring nodes receive
the RREQ packet and rebroadcast it if it is not the intended recipient. The RREQ contains
the following information.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 17 Routing in Ad hoc Networks
ID of source node
ID of destination node
Most recent sequence number
Broadcast ID
Hop count
Time-to-live.
Each broadcast packet contains broadcast ID. The hop count is the number of hops the
packet passes through to discover the destination. If any one of the neighboring nodes
ww
which had received the RREQ packet and knows the path for destination, then it sends
RREP packet through a selected path to the sender node. Otherwise, the neighbor node
w
rebroadcasts the RREQ packet.
.Ea
Consider that node-A wants to send a packet to node H. Node-A initiates broadcasting
RREQ packet. Node-B and node-C are the neighbors of node-A and received the packet. If
syE
node-B and node-C has route information of node-H, then it replies with RREP packet.
Otherwise, node-B and node-C will re-broadcast the RREQ packet which is shown in
Fig. 2.2.6 (a).
ngi
nee
rin
g .ne
Fig. 2.2.6 (a) Broadcasting RREQ packet in AODV protocol
t
Finally, node-H receives more number of RREQ packets through different paths. In
general, a shortest path will be selected
to route the RREP packet. When the
RREP sends back to the sender node-
A, all the intermediate nodes on the
path will update their routing cache
with the reachable destination
information. Fig. 2.2.6 (b) shows the
transmission of RREP packet from
Fig. 2.2.6 (b) Transmission of RREP packet in
node-H to the source node-A. AODV protocol
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 18 Routing in Ad hoc Networks
Once the sender node receives RREP packet, then it saves the route in the cache and
starts to send the packet to the destination through the established path. Unlike DSR, in
AODV, each node does not store the complete path required for data transmission.
Instead, each node stores only the next hop information of the established path. The
routing packets are transmitted by specifying sequence numbers to indicate the freshness
of the packet.
Route Maintenance
When a node moves away or fails from the established path, then the broken path has
to be intimated by sending Route Error (RERR) packet to the sender node. RERR message
ww
can also be sent when a node has no route or if the node cannot communicate with its
neighbors.
w .Ea
2.2.2.3 Temporarily Ordered Routing Algorithm
syE
Temporarily Ordered Routing Algorithm (TORA) is one of the reactive routing
protocols and works based on 'link reversal' algorithm. The main motive of TORA is to
ngi
reduce the transmission of control messages in mobile environment. TORA performs the
following functions,
1. Route discovery
nee
2. Route maintenance
3. Removing route if not valid. rin
g
Every node maintains local topology based on the information received from its
neighbors. In TORA, nodes have an ability to discover the network partitions. .ne
Route Discovery
When a node wants to transmit a packet to the
t
destination, it starts route discovery. A destination
oriented Directed Acyclic Graph (DAG) is formed
using TORA. DAG is a directed graph with no
cycles. If a DAG does not have any downstream
nodes then it is called as destination oriented
DAG. DAG can be created based on two
Fig. 2.2.7 (a) Operation of TORA
messages, Query and Update messages. The
Fig. 2.2.7 (a) illustrates the operation of TORA.
Consider, node-A that wants to transmit a packet to destination D. For that, node-A
initiates broadcasting Query packet. All the neighbor nodes (B, E) rebroadcast the
received packets if it is not the intended recipient. Node-C again rebroadcast the Query
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 19 Routing in Ad hoc Networks
packet and it can be received by node-D. Since node-D is the intended recipient, it does
not re-broadcast the Query packet further.
On receipt of Query packet, node-D replies with Update message to the sender node.
Update packet contains the information about distance from the destination. When a
node receives Update packet, it sets the distance higher than the existing value in the
packet. Thus direct links from the sender node-A to the destination node-D is created.
This links forms a DAG. After establishing a path to destination, data transfer will take
place.
ww
If any intermediate node identifies
that the path with destination is broken
w
or becomes invalid, then it changes its
.Ea
distance value higher than the existing
one and again starts to broadcast Update
using syE
packet. In this case, DAG has to be
recomputed link reversal
algorithm. The neighbor node which
ngi Fig. 2.2.7 (b) Route maintenance in TORA
receives the update packet will reverse the path as shown in Fig. 2.2.7 (b).
nee
Node-E broadcasts Update packet. On receiving this, node-A reverses the path
rin
between E and A. Similarly, if the path between node-C and node-D breaks, then the link
(C-D) will be removed. This leads to separate the node-D from the network. Now nodes
g
A, E and C remain in a network and node-D is partitioned from the network. This will in
turn make changes in DAG. This representation also makes network partitions. Using .ne
Clear message, the existing path in the partition with respect to destination is removed.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 20 Routing in Ad hoc Networks
If a node can collect more information about destination’s mobility, then the expected
region can be determined perfectly. This helps to route the packet efficiently with
minimum latency.
Request Region - The control packets used for determining a path can be propagated
in a region called request region. Usually, sender node itself may determine the request
region.
ww
packet in outside of the request region, then the packet will be discarded at the node. If
sender node does not find any forwarder node in the particular request region, then the
w
region of request zone (region) will be extended.
.Ea
TORA uses two algorithms for taking decisions in forwarding and rejecting the
packets which had been received from other nodes. They are,
1. LAR1 2. LAR2
syE
These two algorithms are discussed in detail below.
rin
route request packet contains the information about the request region. The Fig. 2.2.8 (a)
shows expected and request regions.
g .ne
t
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 21 Routing in Ad hoc Networks
The request region is specified as a rectangle area and the coordinates used for
specifying the rectangle is (x1, y1), (x2 + r, y1), (x1, y2 + r) and (x2 + r, y2 + r). Request region
contains source node and the expected region of destination node. When the sender node
presents within the expected region, then the size of request region may shrink to the size
of the expected region.
As explained earlier, if the intermediate nodes C, B and E are present within the
request region and receives route request packet from node-A, then the intermediate
nodes will rebroadcast the same packet. Otherwise, the nodes will drop the packet. In the
given example, node-I discards the packet since it is present out of the request zone.
When node-D receives route request packet from node-A, it will send route reply
ww
packet to the sender node. This packet contains the current location of node-E and current
time.
w
LAR2 Algorithm
.Ea
In LAR2, source node attaches the (x, y) position of destination in the route request
packet. It does not attaché the information about the expected region of the destination in
syE
the route request packet explicitly. In addition to the position of destination, the sender
node also attaches the distance between source and destination in the route request
packet. ngi
nee
When the intermediate node receives route request packet, it calculates the distance
between the node-A and node-D which is shown in Fig. 2.2.8 (b).
rin
g .ne
t
Fig. 2.2.8 (b) LAR2 algorithm
If the calculated distance is smaller than the distance between node-A to destination
D+Δ (Δ is the locality error), then it forwards the received packet. Otherwise the packet
will be dropped at the node.
As shown in Fig. 2.2.8 (b), when node-C receives route request packet and calculates
the distance between itself and node-D, it identifies that the newly computed distance
value is smaller than the distance between node-A and node-D. So it decides to forward
the packet. But, node-B discards the packet since the newly computed distance value is
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 22 Routing in Ad hoc Networks
greater than the existing one. When node-D receives the route request packet, then it
sends route reply message to the sender node. After that, actual data transmission will be
started.
•
w
Based on temporal stability, each neighbor can be classified as,
.Ea
Stable neighbour
•
syE
Unstable neighbor.
Each node maintains route cache to store the information about destination.
Route Establishment
ngi
nee
The sender node broadcasts route request packet in order to discover a path between
sender node and the receiver. Each route request packet contains the path it has visited
and the beacon count of the node along the path.
rin
g
When a destination node receives first route request packet from its neighbors, it waits
for some more time to receive multiple route request packets from other nodes. Finally,
when time expires, the destination node selects a path with stable links. When more than .ne
one path contains stable links, then a path with shortest distance will be considered.
t
In above Fig. 2.2.9 node-A wants to transmit a packet to node-E. In the Fig. 2.2.9, solid
lines represent stable links and other links are unstable links. In ABR, in spite of receiving
two routes from node A (A-B-H-E, A-B-D-F-E), node-E selects second route even the
length of second path is longer than the first path. This happens because the second path
contains stable links.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 23 Routing in Ad hoc Networks
Route Maintenance
If a link break occurs, then the previous intermediate node near the broken link will
discover a new route by broadcasting route repair packet or route error packet. This
process continued until repairing the route or establishing a new route from the source to
the destination nodes.
ww
stable routes. The signal strength of each beacon is measured and is classified as,
Stable signal
w Unstable signal.
.Ea
SSA protocol comprises two protocols,
syE
Forwarding Protocol (FP)
Dynamic Routing Protocol (DRP).
ngi
Forwarding Protocol - FP routes the packets to the intended destination through
specific path.
nee
Dynamic Routing Protocol - DRP communicates with other DRP processes to collect
Route Establishment
When a node forwards a packet to the destination, it refers SST for identifying the
stable links. After identifying the stable links, the sender node broadcasts route request
packet.
When a neighour node receives route request packet, it forwards the packet if the
packet has been received only through strong link. Otherwise, the node will drop the
packet. On receipt of route request packet, the destination node sends route reply packet
to the sender node through the determined strong path. The operation of SSA protocol is
shown in Fig. 2.2.10 (a).
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 24 Routing in Ad hoc Networks
ww
w .Ea
Fig. 2.2.10 (a) Operation of SSA protocol
Consider that node-A wants to send a packet to node-H. As discussed in ABR, solid
lines represent strong links and the dotted lines represent weak links. Node-A broadcasts
syE
route request packet that can be received by node-B and node-D. Since the path between
node-A and node-B is weak, node-B does not forward route request packet further. But
ngi
node-D will forward the packet to its neighbours. This process continues until node-H
receives route request packet. On receiving route request packet through the path A-D-E-
nee
G-H, the node-H sends route reply message to node-A through the reverse path H-G-E-
D-A.
If the link between node-E and node-G breaks, then the end nodes-E and node-G of the
link will send PBN packet to the sender node-A and the receiver node-H of the path
respectively. After receiving the PBN packet, the sender node initiates broadcasting route
request packet to establish a new path between nodes A and H.
ww
operates based on prediction mechanism to prevent the link breaks. In order to prevent
link breaks, FORP uses the following information.
wMobility of a node
.Ea
Location of a node.
Based on the above information, each node maintains the following details of the path.
syE
Link Expiry Time (LET)
Route Expiry Time (RET).
ngi
Link Expiry Time - LET is the maximum lifetime of a link that can be determined by
nee
every node. LET can be calculated based on the positional information of the node,
moving direction and its transmission range.
rin
Route Expiry Time - The lowest LET of the wireless link of a path is assumed as RET.
Route Establishment g
When a node wants to send a packet to the receiver, it first checks its routing table to .ne
know the path details in order to identify the reachability of destination. If the routes are
not available, then the sender node broadcast a flow request packet. This packet includes
t
the ID of the sender, ID of the receiver and the sequence number. Each fresh transmission
will have highest sequence number than the previous transmission. The sequence number
is used to identify the freshness of the message.
On receiving flow request packet, every neighbour node forwards the packet if the
sequence number exists on the packet is higher than the old packet which had been
received by the node. Otherwise, the packet will be discarded.
Moreover, when a node receives a flow request packet, it attaches the ID of the node
and the LET value of the most recent link through which the packet has been traversed.
When a destination node receives a flow request packet with LET values of all links
through which the packet traversed, it can able to determine the RET value of newly
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 26 Routing in Ad hoc Networks
received route. If the newly computed value of RET is better than the old one which is
currently being used by destination, then the newly received path will be stored in the
table. This new route will be used for further communication. The operation of FORP is
shown in Fig. 2.2.11.
ww
w .Ea
syE
Fig. 2.2.11 Route establishment of FORP
ngi
Consider that node-A sends a packet to node-F. Node A broadcasts flow request
nee
packet and the intermediate nodes B and G forwards the packet. Finally, node-F receives
two flow request packets, A-B-D-F and A-G-E-F, from different paths. After receiving the
rin
flow request packet, the destination node F will response with flow setup message to
sender node A.
Calculation of LET
g .ne
Let the transmission range of two nodes A and G be denoted as TA and TG and the
velocity of node A and node G be VA and VG respectively. Now, LET of the wireless link
t
between node A and node G can be computed as,
– (pq + rs) + (p2 + r2)TX2 – (ps – qr)2
LETAG =
p2 + q2
where
p = VA cos TA – VG cos TG
q = XA – X G
r = VA sin TA – VG sin TG
s = YA – YG
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 27 Routing in Ad hoc Networks
Route Maintenance
Each destination can able to calculate RET of the path being used. Based on the RET
value, the node can able to find out at what time (critical time) the link break would
occur. Before the critical time exceeds, the destination node broadcast a flow-handoff
packet to the source node and the neighboring nodes which receive the flow-handoff
packet will forward the message as broadcasting flow request packet. Sender node may
receive many flow-handoff messages through different paths. Further, the source node
calculates RET values of all the paths and finds a better path to continue data
transmission.
ww
2.2.3 Hybrid Routing Protocols
w
1. Hybrid routing protocols combine the features of both proactive and reactive
.Ea
routing protocols.
2. In this protocol, the network is divided into zones. Each node uses node ID and
syE
zone ID during packet transmission.
3. Data transmission can be carried out to other zones using border nodes of a zone.
Advantages ngi
Requires less memory and processing power
nee
Integrates reactive and proactive routing advantages.
rin
Disadvantage
g
If the border nodes move away, then re-establishing a path takes long time
.ne
Hybrid Routing Protocols
Hybrid routing takes the advantages of both the proactive and reactive routing
t
protocols. In this routing protocol, nodes are grouped into zones.
Nodes which want to communicate within a particular region (zone) can act
proactively. In this case, each node maintains a routing table; whenever a node wants to
communicate within the region can looks at the routing table and find the path for the
intended recipient. Otherwise, each node uses reactive type of protocol for transmitting a
packet to the designated recipient. In this case, each node discovers a route using route
discovery mechanism.
Various routing protocols which use hybrid routing concept are as follows,
1. Core extraction distributed ad hoc routing protocol
2. Zone routing protocol
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 28 Routing in Ad hoc Networks
ww
virtual link is a path between two core nodes of the network. CEDAR uses an algorithm
called core selection algorithm to select core nodes in the network.
w
Core Node Selection Procedure
.Ea
The selection of core nodes is done by using distributed algorithm. Initially, during the
syE
core extraction phase, a set of nodes is selected dynamically to form the core of the
network. Core nodes are taking responsibility to transmit packet over the network. In
ngi
order to perform routing efficiently, each core node collects the information of its
neighboring core nodes.
g
creating virtual link between them. This process leads to efficient routing. When a core
node moves away, a new core selection phase will be initiated. .ne
Information regarding link state is propagated throughout the network using link state
propagation mechanism. The link state propagation mechanism uses two types of waves,
t
Slow-moving increase-waves
Fast-moving decrease-waves.
The increase-waves carry high bandwidth link information whereas decreasing-waves
carries reduction in the available total bandwidth.
Route Establishment
The route establishment of CEDAR uses two phases namely,
Detection of core path
Detection of QoS achievable path over core path.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 29 Routing in Ad hoc Networks
The path between source and destination core is known as core path. When a node
wants to transmit a packet, it starts broadcasting route request packet. All the
neighboring core nodes will receive the route request packet and will in turn forward the
same packet if the destination is not in its core member.
If the core node finds that intended destination is present in its core member, then the
core node sends a reply to the sender node.
ww
bandwidth links. Fig. 2.2.12 shows the operation of CEDAR protocol.
w .Ea
syE
ngi
nee
Fig. 2.2.12 Operation of CEDAR protocol
rin
Assume that node-A wants to communicate with node-G. As shown in Fig. 2.2.12, the
g
dominating nodes or core nodes are represented as double circles. In the given network
topology, node-C and node-E are the core nodes. When node-A broadcasts route request .ne
packet and intimates the ID of source and destination information to the core node, the
core node-C receives the information. If the core node-C possesses the information about
the dominator node of node-G, it does not broadcast the route request packet. Otherwise,
t
node-C rebroadcasts the packet.
Once the core path is set, then the availability of bandwidth on the path will be
checked. If the required bandwidth is found, then the path is established.
Route Maintenance
Route maintenance phase is used to repair the route when a path is broken. When a
link fails, the end nodes of the link will intimate it to the source node. The source node
will reestablish the path between source and destination. Link failure may occur in three
places as discussed below.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 30 Routing in Ad hoc Networks
Case 1 - Link break may occur near the destination node. In this case, the time taken to
intimate the link breakage to the source node will take long time. During this time, the
packets received by the end node from the source node will be dropped at end node.
Case 2 - Link break may occur near the source node. In this case, the time taken to
intimate the link breakage to the source node will take less time. During this time, the
packets received by the end node are less and hence the packet loss is highly reduced.
Case 3 - Link break may occur in the middle of the path. Then the time taken to
intimate the link breakage to the source node is considerably average.
When a link break occurs, the end node (after which the link break occurred) will
ww
identify the link breakage and will send a notification of failure packet to the sender node.
The sender node begins to find a new path from it to the intended destination. The above
w
mentioned end node rejects every received packet until it finds a new path to the
.Ea
destination. Meanwhile, when the source receives the notification message, it stops the
syE
current data transmission and tries to find a new path to the destination. If the new route
is found by the sender or the particular end node, then a new path is established from the
source to the destination.
ngi
In the above given network topology, if the link break occurs between nodes C and E,
nee
then node-C will intimate the link breakage to node-A. Node-A will re-establish the core
path between the source and destination.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 31 Routing in Ad hoc Networks
ww
w .Ea
syE
Fig. 2.2.13 Zone radius with respect to node A
The zone consists of all nodes within a certain number of n-hops, called the zone
ngi
radius (r), away from the node. If the node forms with the nodes 1-hop away or 2-hops
nee
away, then the zone radius is r = 1 or r = 2 respectively. In the above Fig. 2.2.13, the zone
radius for node-A is shown.
.ne
node is within its zone or not. If it is within the zone, then the sender node identifies the
path to reach the destination from its routing table and send the packet directly to the
destination. Else, the sender node has to initiate route discover phase to establish a path
from the source to destination. To achieve this, the sender node uses DSR reactive routing
t
protocol.
In order to reduce number of packets flooding on the network, in ZRP, the sender
node sends the route request node to the border nodes. This process is called border-
casting. When the border nodes receive the route request packet, they repeat the process
for their own zones to discover a path to the intended destination. Thus the path between
sender and receiver nodes is established. For example, in the given topology, if node-A
wants to send a packet to node-P, then node-A sends the request packet to node-C
(border node), which will in turn find a path to node-P. After establishing a path between
node-A and node-P, data transmission will be carried out.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 32 Routing in Ad hoc Networks
Route Establishment
ww
Every node maintains its zone information. The connectivity of nodes which are
present beyond the zone also maintained at each node. Using positional information, each
w .Ea
node determines its zone ID by mapping its node ID. ZHLS follows proactive routing
inside the zone and reactive routing outside the zone. Fig. 2.2.14 shows a network
syE
topology with different zones.
ngi
nee
rin
g .ne
t
Fig. 2.2.14 Network topology with different zones for ZHLS
Two types of Link State Packets (LSPs) are maintained. They are,
Node LSP
Zone LSP.
Node LSP carries a list of neighbors connected with it whereas zone LSP carries a list
of its connected zones. Each node propagates link state details to every other node
present within the zone in such a way each node maintains the node ID of all the nodes in
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 33 Routing in Ad hoc Networks
its zone and maintains node-level topology. The node LSPs contain the zone IDs of the
neighboring zones which is shown in Table 2.2.3 (a).
Source Node LSP
A B, C and zone A
C A, D and zone I
ww
Each node can receive the link state information of other nodes present outside of the
w
zone through border nodes. Hence every node can able to know the connectivity with the
.Ea
nodes beyond its zone. Every node generates zone link state packet and circulate this
packet to entire network through border nodes. Table 2.2.3 (b) shows the zone link state
packet.
syE
Source Zone Zone LSP
A
ngi B
C
nee
A,C,E and I
D - rin
E
F
B
-
g .ne
G
H
-
-
t
I B
Packet Transmission
When a source node wants to transmit a packet to destination, it first checks whether
the destination is present in its zone or not. If the destination is present in its zone, then
intra-zone routing protocol is used. If the destination is present outside of the zone, then
the source node initiates location request packet and forwards to border nodes. The
border nodes which receive the message will check its routing table and determine
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 34 Routing in Ad hoc Networks
whether the destination belongs to its zone or not. If so, the border node sends location
response packet to the sender node. Else, it forwards the request packet.
Route Maintenance
In ZHLS, communication between the nodes will be carried out through border nodes.
So, border nodes are the key elements of ZHLS. If the border nodes move away, then the
established path will break. However, this route failure can be managed by other border
nodes with little delay.
ww
2.3.1 Proactive (Table Driven) Routing Protocols
DSDV w
Name of the Protocol
.Ea
Advantages
Route establishment requires
less time.
Disadvantages
Periodic beaconing increases
network overhead.
ngi
Best path is maintained in the Inefficient due to periodic update
routing table.
nee mechanism.
rin
consumes high bandwidth.
g
Each node has to maintain routing
table separately.
.ne
WRP Route establishment requires
less time.
Multiple table maintenance
requires larger memory. t
Faster convergence. Requires high processing power.
Table 2.3.1 Advantages and disadvantages of various table driven routing protocols
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 35 Routing in Ad hoc Networks
w .Ea
Most recent route is identified using
destination sequence number.
AODV
syE
Least congested route is established
rather than finding shortest route.
Asymmetric links cannot be
ngi
used.
.ne
be longer than the shortest path.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 36 Routing in Ad hoc Networks
CEDAR
syE used in finding stable high-
bandwidth and unstable low-
bandwidth information.
leads to high control overhead.
ngi
Communication through core
nodes provides reliable
communication. nee
Control overhead is highly
rin
If the destination is not in the
ZRP
reduced due to proactive and
reactive routing.
g
zone, then the message cannot
.ne
be received by the destination
with less delay.
Border-casting takes less time to
transmit a packet.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 37 Routing in Ad hoc Networks
ww
No infrastructure for centralized administration
Bandwidth constrained
wEnergy constrained
.Ea
Establishing end-to-end path.
syE
Q.3 What are the types of ad hoc routing protocols ?
Ans. : Ad hoc routing protocols can be broadly classified into three categories :
ngi
Proactive or table driven routing protocols
Reactive or on-demand routing protocols
Hybrid routing protocols.
nee
Q.4 What do you mean by proactive routing protocols ?
rin
Ans. : Proactive routing protocols are also called as table-driven routing protocols in
g
which each node maintains a routing table. Routing table contains up-to-date routing
information of the entire network.
.ne
Q.5 List the advantages and disadvantages of proactive routing protocols.
Ans. : Advantage
Minimum time is required to find out a route for data transmission.
t
Disadvantages
Due to the frequent change of network topology, the exchange of up-to-date
information has to be done periodically.
Network overload is high.
Bandwidth consumption is high in large networks.
This type of protocol is not suited for large networks.
Q.6 Define reactive routing protocols.
Ans. : Reactive routing protocols are also called as on-demand routing protocols. In
this type of routing protocols, each node determines the routing path whenever it is
ready for transmitting data to other node in the network.
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge
Downloaded From: www.EasyEngineering.net
Ad hoc and Wireless Sensor Networks 2 - 38 Routing in Ad hoc Networks
ww
Ans. : Hybrid routing protocols combine the features of both proactive and reactive
routing protocols. In this protocol, the network is divided into zones.
w .Ea
Q.9 Define wireless routing protocol.
Ans. : Wireless Routing Protocol (WRP) is one of the proactive routing protocols in ad
hoc wireless networks.
Q.10 What is routing table ? syE
ngi
Ans. : It contains the shortest distance and the up-to-date information of all
destinations. In order to determine the shortest path, each node maintains the ID of
destination node, next hop, distance (cost) and predecessor node.
nee
2.5 Long Answered Questions
rin
Part - B
g
Q.1 How table-driven routing protocols for ad hoc networks work ? (Refer section 2.3.1) .ne
Q.2 Write down the difference between proactive and reactive routing. (Refer section 2.3)
Q.3 Discuss the various major issues in designing routing protocols for Ad hoc networks.
(Refer section 2.1)
t
Q.4 Explain in detail about the types of Ad hoc routing protocols. (Refer section 2.1)
Q.5 Discuss the steps involved for maintaining a routing table in DSDV. (Refer section 2.3)
Q.6 Write short note on wireless routing protocol. (Refer section 2.1)
Q.7 Explain in detail the various algorithms of reactive routing protocols. (Refer section 2.3)
Q.8 Write in detail the various algorithms of hybrid routing protocols. (Refer section 2.2.3)
Q.9 List out the advantages and disadvantages of various table driven routing protocols.
(Refer section 2.3.1)
Q.10 Discuss the advantages and disadvantages of various on-demand routing protocols.
(Refer section 2.3.2)
www.EasyEngineering.net
TECHNICAL PUBLICATIONS® - An up thrust for knowledge