Transcript
Page 1: Mobile ad hoc networking:    imperatives and challenges

1

Mobile ad hoc networking: imperatives and challenges

Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu

2005. 10. 10.MMLAB, Seongil Han

[email protected]

Page 2: Mobile ad hoc networking:    imperatives and challenges

-2-

Contents Introduction

Mobile ad hoc network research

Medium Access Control

Networking issues

Applications and middleware

Cross layers’ research issues

Discussion and conclusions

Page 3: Mobile ad hoc networking:    imperatives and challenges

-3-

Introduction Mobile Ad hoc Network (MANET)

Sensor network

An important part of the 4G architecture Non infrastructure based Spontaneous networking Can be connected to a backbone network Attractive technology

Page 4: Mobile ad hoc networking:    imperatives and challenges

-4-

MANET issues Traditional problems of wireless network

Channel characteristics Hidden and exposed terminal

MANET specifics Autonomous and infrastructure-less Multi-hop routing Dynamically changing network topology Variation in link and node capabilities Energy constrained operation Network scalability

Page 5: Mobile ad hoc networking:    imperatives and challenges

-5-

Research area 3 layers and cross layers issues

Page 6: Mobile ad hoc networking:    imperatives and challenges

-6-

Medium Access Control Bluetooth

De-facto standard For low-cost, short-range radio links Contention-free token-based multi-access Masters and slaves

Many applications is developed and being developed.

Mobile phone, headset, etc. The scatternet

Multi-hop Bluetooth networks, interconnecting several piconets

Various formation algorithm

Page 7: Mobile ad hoc networking:    imperatives and challenges

-7-

Medium Access Control (cont.)

IEEE 802.11 Infrastructure-based and infrastructure-less Little or no attention was given to Ad hoc mode With TCP, problems get large

HiperLAN ETSI has promoted “High Performance Radio Local Area Network” HiperLAN/2 is noticeable

Page 8: Mobile ad hoc networking:    imperatives and challenges

-8-

MAC research issues Random access

Used by most proposal Collision avoidance and utilization maximization Hidden-terminal and exposed-terminal problem

Controlled access More suitable for QoS Handling dynamic change of topology TDMA Time Spread Multiple Access (TSMA)

Page 9: Mobile ad hoc networking:    imperatives and challenges

-9-

Networking Considerations

Self-organizing, dynamic, energy-constrained

Location service Reactive and proactive

Routing and forwarding algorithms Unicast, geocast, multicast, broadcast

Redesign of Transport layer mechanisms Mainly TCP issues

Page 10: Mobile ad hoc networking:    imperatives and challenges

-10-

Routing Unicast

Proactive routing protocols Table-driven, periodic and event-driven updates DSDV, CGSR, WRP, OLSR, TBRPF, FSR

Reactive routing protocols On demand, route discovery DSR, AODV, TORA, ABR, SSR, ZRP

Multicast Tree based : AMRoute, MAODV, AMRIS Mesh based : CAMP, ODMRP

Page 11: Mobile ad hoc networking:    imperatives and challenges

-11-

Routing (cont.) Location aware routing

Greedy forwarding, directed flooding, hierarchical routing

Clustering Clusterhead Inter-cluster, intra-cluster communication Cluster bottleneck problem

Page 12: Mobile ad hoc networking:    imperatives and challenges

-12-

TCP issues Impact of mobility

Route failure Packet loss and increased delay

Exacerbate unfairness

Nodes’ interaction at MAC

Impact of TCP congestion window size Small congestion windows is good

New mechanisms Explicit Link Failure Notification (ELFN) Ad hoc TCP (ATCP) Link RED

Page 13: Mobile ad hoc networking:    imperatives and challenges

-13-

Applications and middleware Applications

Tactical, sensor, emergency service, commercial environment, home and enterprie networking, educational application, entertainment, location aware services

Middleware Provide service abstraction Efficiency is open issue Service discovery and location QoS-Aware resource discovery

Page 14: Mobile ad hoc networking:    imperatives and challenges

-14-

Cross layers’ research issues Energy conservation

Local strategy : power saving mode Global strategy : maximize the network

lifetime

Security Attacks and protections

Cooperation

Simulation and performance evaluation

Quality of Service

Page 15: Mobile ad hoc networking:    imperatives and challenges

-15-

Security Attacks

Passive attacks Eavesdropping

Active attacks Impersonation, Denial of Service, Disclosure

attack

Security mechanism Preventive and detective

Key-based, Intrusion detection Wired Equivalent Privacy

Secure routing Wormhole attack

Page 16: Mobile ad hoc networking:    imperatives and challenges

-16-

Discussion and conclusions The center of evolution

Toward 4G wireless technology Flexibility, easy maintenance, infrastructure-less, a

uto-configuration, self-administration capability, cost advantage

IETF MANET WG “killer application(s)” has yet emerged. Many open research issues


Top Related