Mobile ad hoc networking: imperatives and challenges

Download Mobile ad hoc networking:    imperatives and challenges

Post on 24-Jan-2016

23 views

Category:

Documents

0 download

Embed Size (px)

DESCRIPTION

Mobile ad hoc networking: imperatives and challenges. Imrich Chlamtac, Marco Conti, Jennifer J.N. Liu 2005. 10. 10. MMLAB, Seongil Han sihan@mmlab.snu.ac.kr. Contents. Introduction Mobile ad hoc network research Medium Access Control Networking issues Applications and middleware - PowerPoint PPT Presentation

TRANSCRIPT

  • Mobile ad hoc networking: imperatives and challengesImrich Chlamtac, Marco Conti, Jennifer J.N. Liu

    2005. 10. 10.MMLAB, Seongil Han

    sihan@mmlab.snu.ac.kr

  • ContentsIntroductionMobile ad hoc network researchMedium Access ControlNetworking issuesApplications and middlewareCross layers research issuesDiscussion and conclusions

  • IntroductionMobile Ad hoc Network (MANET)Sensor networkAn important part of the 4G architectureNon infrastructure basedSpontaneous networkingCan be connected to a backbone networkAttractive technology

  • MANET issuesTraditional problems of wireless networkChannel characteristicsHidden and exposed terminalMANET specificsAutonomous and infrastructure-lessMulti-hop routingDynamically changing network topologyVariation in link and node capabilitiesEnergy constrained operationNetwork scalability

  • Research area3 layers and cross layers issues

  • Medium Access ControlBluetoothDe-facto standardFor low-cost, short-range radio linksContention-free token-based multi-accessMasters and slavesMany applications is developed and being developed.Mobile phone, headset, etc.The scatternetMulti-hop Bluetooth networks, interconnecting several piconetsVarious formation algorithm

  • Medium Access Control (cont.)IEEE 802.11Infrastructure-based and infrastructure-lessLittle or no attention was given to Ad hoc modeWith TCP, problems get large

    HiperLANETSI has promoted High Performance Radio Local Area NetworkHiperLAN/2 is noticeable

  • MAC research issuesRandom accessUsed by most proposalCollision avoidance and utilization maximizationHidden-terminal and exposed-terminal problem

    Controlled accessMore suitable for QoSHandling dynamic change of topologyTDMATime Spread Multiple Access (TSMA)

  • NetworkingConsiderationsSelf-organizing, dynamic, energy-constrainedLocation serviceReactive and proactiveRouting and forwarding algorithmsUnicast, geocast, multicast, broadcastRedesign of Transport layer mechanismsMainly TCP issues

  • RoutingUnicastProactive routing protocolsTable-driven, periodic and event-driven updatesDSDV, CGSR, WRP, OLSR, TBRPF, FSRReactive routing protocolsOn demand, route discoveryDSR, AODV, TORA, ABR, SSR, ZRPMulticastTree based : AMRoute, MAODV, AMRISMesh based : CAMP, ODMRP

  • Routing (cont.)Location aware routingGreedy forwarding, directed flooding, hierarchical routingClusteringClusterheadInter-cluster, intra-cluster communicationCluster bottleneck problem

  • TCP issuesImpact of mobilityRoute failurePacket loss and increased delayExacerbate unfairnessNodes interaction at MACImpact of TCP congestion window sizeSmall congestion windows is goodNew mechanismsExplicit Link Failure Notification (ELFN)Ad hoc TCP (ATCP)Link RED

  • Applications and middlewareApplicationsTactical, sensor, emergency service, commercial environment, home and enterprie networking, educational application, entertainment, location aware servicesMiddlewareProvide service abstractionEfficiency is open issueService discovery and locationQoS-Aware resource discovery

  • Cross layers research issuesEnergy conservationLocal strategy : power saving modeGlobal strategy : maximize the network lifetimeSecurityAttacks and protectionsCooperationSimulation and performance evaluationQuality of Service

  • SecurityAttacksPassive attacksEavesdroppingActive attacksImpersonation, Denial of Service, Disclosure attackSecurity mechanismPreventive and detectiveKey-based, Intrusion detectionWired Equivalent PrivacySecure routingWormhole attack

  • Discussion and conclusionsThe center of evolutionToward 4G wireless technologyFlexibility, easy maintenance, infrastructure-less, auto-configuration, self-administration capability, cost advantageIETF MANET WGkiller application(s) has yet emerged.Many open research issues

    p.19P 31Destination-sequenced distance vectorClusterhead gateway switching routingWireless routing protocoloptimized link state routing topology dissemination based on reverse path forwardingFisheye State Routing

    Dynamic Source RoutingAd hoc On Demand Distance VectorTemporally Ordered Routing AlgorithmAssociativity Based RoutingSignal Stability RoutingZone-based Hierarchical Link State Routing Protocol

    Ad hoc multicast routingMulticast AODVAd hoc Multicast Routing protocol utilizing Increasing id numberSCore-Assisted Mesh ProtocolOn-demand Multicast Routing Protocol

Recommended

View more >