CS6003 SCAD MSM by WWW - Learnengineering.in
CS6003 SCAD MSM by WWW - Learnengineering.in
in
ENGINEERING COLLEGES
2017 – 18 Odd Semester
IMPORTANT QUESTIONS & ANSWERS
Department of CSE
SUBJECT CODE: CS 6003
TABLE OF CONTENT
31 Why the TCP does not perform well in ad hoc wireless 109
networks?
UNITI INTRODUCTION 9
Fundamentals of Wireless Communication Technology – The Electromagnetic spectrum–
Radio propagation Mechanisms – Characteristics of the Wireless Channel –mobile ad hoc
networks(MANETs) and wireless sensor networks (WSNs) :concepts and architectures.
Applications of Ad Hoc and Sensor networks. Design Challenges in Ad hoc and Sensor
Networks.
UNIT II MAC PROTOCOLS FOR AD HOC WIRELESS NETWORKS 9
Issues in designing a MAC Protocol- Classification of MAC Protocols- Contention based
protocols- Contention based protocols with Reservation Mechanisms- Contention based
protocols with Scheduling Mechanisms – Multi channel MAC-IEEE 802.11
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN
ADHOC WIRELESS NETWORKS 9
Issues in designing a routing and Transport Layer protocol for Ad hoc networks-proactive
routing, reactive routing (on-demand), hybrid routing- Classification of
Transport Layersolutions-TCPoverAdhocwireless networks
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC
PROTOCOLS 9
Single node architecture: hardware and software components of a sensor node - WSN
Network architecture: typical network architectures-data relaying and aggregation
strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA
based MAC- IEEE 802.15.4.
UNIT V WSN ROUTING, LOCALIZATION & QOS 9
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-
absolute and relative localization, triangulation-QOS in WSN-Energy Efficient Design-
Synchronization-Transport Layer issues.
TOTAL: 45 PERIODS
TEXTBOOK:
1. C. Siva Ram Murthy, and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures
andProtocols",Prentice Hall Professional Technical Reference, 2008.
REFERENCES:
1. Carlos De Morais Cordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks:
Theory and Applications”, World Scientific Publishing Company, 2006.
2.Feng Zhao and Leonides Guibas, "Wireless Sensor Networks", Elsevier Publication -
2002.
3.Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor
Networks”,Wiley,2005
4.Kazem Sohraby, Daniel Minoli, & Taieb Znati, “Wireless Sensor Networks-
Technology, Protocols, and Applications”, John Wiley, 2007. 5. Anna Hac, “Wireless
Sensor Network Designs”, John Wiley, 2
AIM:
To discuss the basic principles, design issues, operations and Different
protocols used in ad hoc and wireless sensor networks.
OBJECTIVES:
Learn the basic wireless technologies
Understand the classification of MAC protocols and ad hoc routing protocols in
WSN.
Be familiar in WSN Hardware and Software components
Understand the issues in Ad Hoc & Sensor network.
To learn the applications of Sensor nodes.
Hours Cumm
Sl. Unit Topic/Portions to be Covered Required ulative Books
no /Planned Hrs Referred
UNIT 1: INTRODUCTION
Fundamentals of Wireless Communication
1 1
Technology 1 1 TB1
The Electromagnetic Spectrum-Spectrum
2 1
Allocation 1 2 TB1
3 1 Radio Propagation Mechanisms 1 3 TB1
4 1 Characteristics of the Wireless Channel 1 4 TB1
Mobile and ad hoc networks(MANETS) and
5 1 wireless sensor networks(WSNs): concepts
1 5 TB1
and architectures
6 1 Applications of Ad Hoc Wireless Networks 1 6 TB1
Design Challenges in Ad hoc and Sensor
7 1
Networks 1 7 TB1
Transport Layer Protocols
8 1 2 9 TB1
UNIT II
MAC PRTOCOLS FOR AD HOC WIRELESS NETWORKS
Issues in designing a MAC protocol for ad
1 10 TB1
8 2 hoc wireless networks
2
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
UNIT IV
WIRELESS SENSOR NETWORKS(WSNS) AND MAC PROTOCOLS
33 5 OLSR 1 38 TB1
34 5 Localization 1 39 TB1
UNIT I
INTRODUCTION
Fading refers to the fluctuations in signal strength, when received at the receiver.
It occurs due to multipath propagation. The different types of fading are
1.Slow/long term fading 2.Fast/short term fading
When the propagating radio wave hits an object which is very large
compared to its wavelength (such as the surface of the Earth, or tall buildings), the
wave gets reflected by that object. Reflection causes a phase shift of 180 degrees
between the incident and the reflected rays.
8
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
11. Write the equation for maximum data rate according to Shannon’s theorem.
PART B
1. Explain in detail about Cellular and Ad Hoc Wireless Networks (Nov/Dec 2016)
infrastructure. Absence of any central coordinator or base station makes the routing
complex.
Ad hoc wireless network topology for the cellular network shown in above figure
is illustrated below.
The path setup for a call between 2 nodes, say, node C to E , is completed through
the intermediate mobile node F.
Wireless mesh network and Wireless sensor networks are specific examples of ad
hoc wireless networks.
The presence of base station simplifies routing and resource management in a
cellular network.
But in ad hoc networks, routing and resource management are done in a
distributed manner in which all nodes co-ordinate to enable communication among
them.
10
11
12
13
Wireless mesh networks are adhoc wireless network that are formed to provide
an alternate communication infrastructure for mobile or fixed nodes/users,
without the spectrum reuse constraint & requirement of network planning of
cellular network.
It provides many alternate paths for a data transfer session between a source &
destination, resulting in quick reconfiguration of the path when the existing
path fails due to node failure.
Since the infrastructure built is in the form of small radio relaying devices, the
investment required in wireless mesh networks is much less than what is
required for the cellular network counterpart.
The possible deployment scenarios of wireless mesh networks include:
residential zones, highways, business zones, important civilian regions and
university campuses
Wireless mesh networks should be capable of self-organization and
maintenance.
It operates at license-free ISM band around 2.4 GHz & 5 GHz.
It is scaled well to provide support to large number of points.
Major advantage is the support for a high data rate, quick & low cost of
deployment, enhanced services, high scalability, easy extend ability, high
availability & low cost per bit.
Sensor networks are special category of Ad hoc wireless network that are used
to provide a wireless communication infrastructure among the sensors deployed in
a specific application domain.
Sensor nodes are tiny devices that have capability of sensing physical
parameters processing the data gathered, & communication to the monitoring
14
system. The issues that make sensor network a distinct category of ad hoc wireless
network are the following:
Mobility of nodes:
Mobility of nodes is not a mandatory requirement in sensor networks.
For example, the nodes used for periodic monitoring of soil properties are not
required to be mobile & the nodes that are fitted on the bodies of patients in a
post-surgery ward of a hospital are designed to support limited or partial mobility.
In general, sensor networks need not in all cases be designed to support
mobility of sensor nodes.
The number of nodes in sensor network can be much larger than that in a
typical ad hoc wireless network.
Density of deployment :
Power constraints :
The power constraints in sensor networks are much more stringent than
those in ad hoc wireless networks. This is mainly because the sensor nodes are
expected to operate in harsh environmental or geographical conditions, with
minimum or no human supervision and maintenance. In certain case, the
recharging of the energy source is impossible.
Running such a network, with nodes powered by a battery source with
limited energy, demands very efficient protocol at network, data link, and physical
15
layer. The power sources used in sensor networks can be classified into the
following 3 categories:
Replenishable Power source: The power source can be replaced when the
existing source is fully drained.
Non-replenishable Power source: The power source cannot be
replenished once the network has been deployed. The replacement of sensor
node is the only solution.
Regenerative Power source: Here, Power source employed in sensor
network have the capability of regenerating power from the physical
parameter under measurement.
Traffic Distribution :
16
The major issues that affect the design, deployment, & performance of an ad hoc
wireless network system are:
17
b. Synchronization:
The MAC protocol design should take into account the requirement of time
synchronization. Synchronization is mandatory for TDMA-based systems for
management of transmission and reception slots.
c. Hidden Terminals:
Hidden terminals are nodes that are hidden(or not reachable) from the
sender of a data transmission session, but are reachable to the receiver of the
session.
d. Exposed terminals:
Exposed terminals, the nodes that are in the transmission range of the
sender of an on-going session, are prevented from making a transmission.
e. Throughput:
The average delay that any packet experiences to get transmitted. The
MAC protocol should attempt to minimize the delay.
g. Fairness:
Fairness refers to the ability of the MAC protocol to provide an equal share
or weighted share of the bandwidth to all competing nodes. Fairness can be either
node-based or flow-based.
h. Real-time Traffic support:
18
i. Resource reservation:
The provisioning of QoS defined by parameters such as bandwidth, delay,
and jitter requires reservation of resources such as bandwidth, buffer space, and
processing power.
j. Ability to measure resource availability:
This refers to the variation in the data bit rate achieved over a channel.
A MAC protocol that has adaptive rate control can make use of a high data
rate when the sender and receiver are nearby & adaptively reduce the data rate as
they move away from each other.
m. Use of directional antennas:
19
Mobility :
The Mobility of nodes results in frequent path breaks, packet collisions, transient
loops, stale routing information, and difficulty in resource reservation.
Bandwidth constraint :
Since the channel is shared by all nodes in the broadcast region, the bandwidth
available per wireless link depends on the number of nodes & traffic they handle.
Error-prone and shared channel :
-5 -3
The Bit Error Rate (BER) in a wireless channel is very high [ 10 to 10 ]
-12 -9
compared to that in its wired counterparts [ 10 to 10 ].
Consideration of the state of the wireless link, signal-to-noise ratio, and path loss for
routing in ad hoc wireless networks can improve the efficiency of the routing protocol.
Location-dependent contention :
The load on the wireless channel varies with the number of nodes present in a
given geographical region.
3.Multicasting
It plays important role in emergency search & rescue operations & in military
communication. Use of single-link connectivity among the nodes in a multicast group
results in a tree-shaped multicast routing topology. Such a tree-shaped topology provides
high multicast efficiency, with low packet delivery ratio due to the frequency tree breaks.
The major issues in designing multicast routing protocols are as follows:
Robustness
Efficiency
Control overhead
Quality of Service
Efficient group management
Scalability
Security
20
Assume that an optimal route from node A to node B passes through node C, &
node C is not powered on.
Then node A will have to set up a costlier & non-optimal route to B.
The non-optimal path consumes more resources & affects the throughput of the system.
As the intermediate nodes in a path that relay the data packets expend their
resources such as battery charge & computing power, they should be properly
compensated.
Hence, pricing schemes that incorporate service compensation or service
reimbursement are required.
21
Delay.
Delay jitter.
Packet loss rate.
Bit error rate.
Path loss.
QoS framework :
A framework for QoS is a complete system that attempts to provide the
promised services to each user or application.
The key component of QoS framework is a QoS service model which
defines the way user requirements are served.
7. Self-Organization
One very important property that an ad hoc wireless network should exhibit is
organizing & maintaining the network by itself.
The major activities that an ad hoc wireless network is required to perform for
self- organization are,
Neighbour discovery.
Topology organization &
Topology reorganization (updating topology information)
8. Security
22
Internal attack: The active attacks that are performed by nodes belonging to
the same network.
11. Scalability
Scalability is the ability of the routing protocol to scale well in a network with a
large number of nodes.
It requires minimization of control overhead & adaptation of the routing protocol
to the network size.
C=λ*f
where c is the speed of light (3 × 108m/s), f is the frequency of the wave in Hz, and λ is
its wavelength in meters.
ITU, located in Geneva and a sub organization of the United Nations, coordinates
wired and wireless telecommunication activities worldwide. There are no official names
for the bands in which the very high-frequency X-rays and Gamma rays fall.
The low-frequency bands comprised of the radio, microwave, infrared, and visible
light portions of the spectrum can be used for information transmission by modulating
the amplitude, frequency, or the phase of the waves.
The high frequency waves such as X-rays and Gamma rays, though theoretically
better for information propagation, are not used due to practical concerns such as the
difficulty to generate and modulate these waves, and the harm they could cause to
living things.
Radio waves are easy to generate and are widely used for both indoor and outdoor
communication due to properties such as their ability to pass through buildings and
ability to travel long distances. Since radio transmission is omni directional (when
radio waves are generated, they spread out from the transmitting antenna in all
24
directions) in nature, the need to physically align the transmitter and receiver also
does not arise.
The frequency of the radio wave determines many of the characteristics of the
transmission.
At low frequencies the waves can pass through obstacles easily, but their power falls
with an inverse-squared relation with respect to the distance. The higher frequency
waves are more prone to absorption by rain drops, and they get reflected by obstacles.
In the VLF, LF, and MF bands the propagation of waves, also called as ground waves
The maximum transmission ranges of these waves are of the order of a few hundred
kilometers. They are used for low bandwidth transmissions such as amplitude
modulated (AM) radio broadcasting
The HF and VHF band transmissions are absorbed by the atmosphere near the Earth’s
surface.
However, a portion of the radiation, called the sky wave, radiates outward and upward
to the ionosphere in the upper atmosphere.
SNR is the ratio of the signal power to the noise power on a transmission medium,
and is used to categorize the quality of a transmission. However, because of the higher
frequency of operation they do not pass through buildings.
Infrared waves and waves in the EHF band (also known as millimeter waves) are used
for short-range communication.
25
Spectrum Allocation
Worldwide, an agency of the International Telecommunications Union Radio
communication (ITU-R) Bureau called World Administrative Radio Conference
(WARC) tries to coordinate the spectrum allocation by the various national
governments, so that communication devices that can work in multiple countries can be
manufactured. Methods used for this frequency allocation are comparative bidding,
lottery system and auctioning method.
• Scattering:
When the wave travels through a medium, which contains many objects
with dimensions small when compared to its wavelength, scattering occurs. The
wave gets scattered into several weaker outgoing signals. In practice, objects such
as street signs, lamp posts, and foliage cause scattering.
26
27
UNIT II
29
Sender-initiated protocols:
Packet transmissions are initiated by the sender node.Single-channel
sender-initiated protocols: A node that wins the contention to the channel can make
use of the entire bandwidth. Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
Receiver-initiated protocols:
The receiver node initiates the contention resolution protocol.
30
31
PART- B
The main issues in designing MAC protocol for ad hoc wireless network are:
Bandwidth efficiency
Bandwidth must be utilized in efficient
manner Minimal Control overhead
BW = ratio of BW used for actual data transmission to the total available BW
Quality of service support
Essential for supporting time-critical traffic sessions
They have resource reservation mechanism that takes into considerations
The nature of wireless channel and the mobility of nodes
Synchronisation
MAC protocol must consider synchronisation between nodes in the
network Synchronisation is very important for BW (time slot) reservation
by nodes.
Exchange of control packets may be required for achieving time
synchronisation among nodes
Hidden and exposed terminal problems
The hidden terminal problem refers to the collision of packets at a receiving
node due to the simultaneous transmission of those nodes that are not
within the direct transmission range of the sender but are within the
transmission range of the receiver.
Collision occurs when both nodes transmit packets at the same time without
knowing about the transmission of each other.
S1 and S2 are hidden from each other & they transmit simultaneously to R1
which leads to collision
32
33
1b) Explain the Design Goals of a Mac Protocol for Ad Hoc Wireless Networks
Ad hoc network MAC protocols can be classified into three basic types:
Contention-based protocols
Contention-based protocols with reservation mechanisms
Contention-based protocols with scheduling mechanisms
Contention-based protocols:
34
Sender-initiated protocols:
Packet transmissions are initiated by the sender node.
Single-channel sender-initiated protocols:
A node that wins the contention to the channel can make use of the entire
bandwidth.
Multichannel sender-initiated protocols:
The available bandwidth is divided into multiple channels.
Receiver-initiated protocols:
The receiver node initiates the contention resolution protocol.
35
Node scheduling is done in a manner so that all nodes are treated fairly and
no node is starved of bandwidth.
Scheduling-based schemes are also used for enforcing priorities among
flows whose packets are queued at nodes.Some scheduling schemes also consider
battery characteristics.
Other protocols are those MAC protocols that do not strictly fall under the above
categories.
36
38
The CMS1 and CMS2 are used to inform neighbors about the current reservation.
While CMS3 and CMS4 are used for channel reservation.
Each node that receives data during the DMS of current slot transmits an SR in
CMS1.This serves to inform other neighbouring potential sender nodes about the
currently active reservations.
Every node that transmits data during the DMS of current slot transmits an RTS
in CMS2, CMS3 and CMS4 are used as follows:
The sender of an intend reservation, if it senses the channel is idle in
CMS1, transmits an RTS in CMS2 Then the receiver transmits a CTS in
CMS3.
can be transmitted in current slot
If the reservation was successful, the data
and the same slot in subsequent frames.
39
40
A node ready to transmit data, it senses the HR period of the current slot .If the
channel is idle during HR period; it transmits an RTS during RTS period and waits
for CTS during CTS period.
On receiving the RTS, the destination node transmits the CTS packet during the
CTS period of the same slot and waits for the data packet.
If the source node receives the CTS packet correctly, it implies that the source
and receiver nodes have successfully reserved the current hop. If the channel is
busy during HR period, it backs off for a randomly multiple slots.
Suppose the sender needs to transmit data across multiple frames, it informs the
receiver through the header of the data packet. The receiver node transmits an HR
packet during the HR period of the same slot in next frame to inform its neighbors.
The sender receiving the HR packet, it sends an RTS during the RTS period and
jams other RTS packets. Both receivers remain silent during the CTS period.
Soft Reservation Multiple Access with Priority Assignment (SRMA/PA)
41
reservation (SR), reservation request (RR), reservation confirm (RC), data sending
(DS) and acknowledgement (ACK).
The SYNC field is used for synchronization purposes
The SR, RR, RC, & ACK fields are used for transmitting & receiving the
corresponding control packets
The DS field is used for data transmission
The SR packet serves as a busy tone. It informs the nodes about the
the access priority value assigned to the
reservation of the slot. It also carries
node that has reserved the slot
A node determines whether or not a slot is free through the SR field of that slot.
When an idle node receives a data packet for transmission, the node waits for a
free slot and transmits the RR packet in the RR field of that slot.
In case of a voice terminal node, the node tries to take control of the slot already
reserved by a data terminal if it finds it priority level to be higher than that of the
data terminal. This process is called soft reservation.
Priority levels are initially assigned to nodes based on the service classes in a static
manner.
It is required that priority of voice terminal pv(R) > priority of data terminal
pd(R).
A node can be in one of the two states:
A node is said to be in the active state if it is currently transmitting
to be in the idle state if it does not have any packet to be
A node is said
transmitted
In the active state itself, nodes can be in one of the two states: access state and
reserved state. Access state is one in which the node is backlogged and is trying to
reserve a slot for transmission.In order to avoid collisions,a binary exponential
back-off algorithm is used for non-real time connections and a modified binary
exponential back-off algorithm is used for real time connection
42
43
44
Time is divided into slots. Each node records the transmit and receive
reservations of its neighbors in a reservation-table(RT). For real-time traffic
the source first sends an RTS packet, for which the receiver responds with a
CTS packet. Now the source sends the first DATA packet of the real-time
session.
Reservation information for the next DATA packet is piggy-backed on this
current DATA packet.
On receiving this DATA packet, the receiver updates its reservation table
with the piggy-backed reservation information
The receiver then sends ACK packet back to the source,Receiver piggy-
backs the reservation confirmation information on the ACK packet
Advantage: It does not require global synchronization among nodes
Drawback: A free slot can be reserved only if it can fit the entire RTS-CTS-DATA-
ACK exchange.
45
For transmitting best effort packets: RTS, CTS, and ACK are used.For transmitting
real time packets: ResvRTS, ResvCTS, and ResvACK are used
Time is divided into super frames. Each superframe consists of a number of
reservation-slots (resv).A node that needs to transmit real-time packets, first
reserves a set of resv-slots.
The set of resv-slots reserved by a node for a connection on a superframe is called a
connection-slot.
46
The duration of each resv-slot is twice the maximum propagation delay. Each node
maintains a reservation table (RT). RT contains information such as sender-id &
receiver-id.starting and ending times of active reservation.
NAV indicates the network allocation vector maintained at each node.
Advantages:
Bandwidth efficiency
Asynchronous mode of operation where nodes do not require any global time
synchronization
Flexibility of slot placement in the super frame.
4. Explain in detail about Contention Based Protocols. (Nov/Dec 2016)
The sender senses the carrier to see and transmits a RTS (Request To Send) frame
if no nearby station transmits a RTS.
The receiver replies with a CTS (Clear To Send) frame. Sender sends DATA, for
which receiver responds with ACK. RTS/CTS packets carry the expected duration
of the data transmission.
A node near the receiver on hearing the CTS packet, defers its transmission till the
receiver receives the data packet. This overcomes hidden node problem.
A node near the sender that only hears the RTS is free to transmit simultaneously
when the sender is transmitting data. This overcomes exposed node problem
47
.
The receiver sends an ACK when receiving a frame.
→ Neighbors keep silent until see ACK.
Collision handling: If a packet is lost (collision), the node uses the binary exponential
back-off (BEB) algorithm to back off for a random time interval before retrying.
RTS/CTS mechanism does not solve the exposed terminal problem.
Solution: New control packet called data-sending (DS) can be used. DS contains
information such as the duration of the forthcoming data transmission.
The protocol uses one more control packet called the request-for-request-to-send
(RRTS)
Synchronization information needs to be propagated to the concerned nodes.
If a node had received an RTS previously for which it was not able to respond
because there exists on-going transmission, then it waits for the next contention
period and transmits RRTS.
B)Floor Acquisition Multiple Access Protocols (FAMA)
It is based on a channel access discipline which consists of
o a carrier-sensing operation and
48
FAMA-NTR
Before sending a packet, the sender senses the channel.
If channel is busy, the sender back-off a random time and retries later.
If the channel is free, the sender sends RTS and waits for a CTS packet.
If the sender cannot receive a CTS, it takes a random back-off and retries later.
If the sender receives a CTS, it can start transmission data packet.
In order to allow the sender to send a burst of packets, the receiver is made to wait a
time duration τ seconds after a packet is received.
49
When a node is ready for transmission, it senses the channel to check whether the
busy tone is active. If not, it turns on the busy tone signal and starts data
transmissions.Otherwise, it reschedules the packet for transmission after some
random rescheduling delay.
When a node is transmitting, no other node in the two-hop neighborhood of the
transmitting node is permitted to simultaneously transmit.
Drawback: very poor bandwidth utilization
50
o First, it senses the channel to determine whether the BTr signal is active
o If there is no BTr signal, then it transmit RTS packet
On receiving the RTS packets, receiver checks whether the BTt tone is
active
If there is no BTt signal, Receiver Sends CTS packet and turns on the BTr
signal
Sender receives CTS, turns on BTt signal, starts data transmission and turns
off BTt signal
Receiver receives data and turn off BTr signal
DBTMA has better network utilization than RTS/CTS based protocol.
51
The data packet is divided into two portions: a preamble and the actual data
packet.The busy tone serves two purposes:
Acknowledges the sender the successful of receiving preamble
Inform the nearby hidden nodes the impending transmission
It is a receiver-initiated protocol.
It reduces the number of control packets used in the MACA protocol.
It eliminated the need for the RTS packet.
52
It is a receiver-initiated protocol.
It doesn’t require any traffic prediction mechanism.
It exploits the broadcast nature of traffic from omni-directional antennas to reduce
the number of handshakes involved in the data transmission. A node obtains
information about the data packet arrivals at its neighbouring nodes by
overhearing the CTS packets transmitted by them.
It then sends a CTS packet to the concerned neighbour node for relaying data from
that node.
The throughput of MARCH is significantly high compared to MACA.
Control overhead is much less.
Less BW is consumed for control traffic.
53
54
iii) The receiver copies priority-tag from the received-RTS and piggy-backs it along
Neighbors receive the RTS or CTS , retrieve the piggy-backed information and
make a corresponding entry in their scheduling-tables.
When source transmits a DATA, its head-of-line(HOL) packet information is
piggy-backed on DATA (HOL packet of a node refers to the packet to be
transmitted next by the node).
On receiving DATA, the receiver responds with ACK.
The receiver copies the HOL-information from the received-DATA and
piggy-backs it along Neighbors, receive the DATA or ACK retrieve the
piggy-backed information and make a corresponding entry in their STs.
When a node hears an ACK, it removes from its ST any entry made earlier for
corresponding DATA.
Figure 2.16 Piggy – backing and scheduling table update mechanism in DPS
Multi-Hop Coordination
The excess delay incurred by a packet at the upstream-nodes is compensated for at
the downstream-nodes. When a node receives a packet, it would have already received
the priority-index of the packet piggy-backed on the previous RTS packet. In case the
node is an intermediate-node (which has to further forward the packet), the node
55
calculates the new priority-index of the DATA packet based on the received value of the
priority-index.If a packet suffers due to excess delay at the upstream-nodes, then the
downstream-node increase priority of packet so that packet is able to meet its end-to-end
delay target Similarly, if a packet arrives very early due to lack of contention at the
upstream- nodes, then the priority of that packet would be reduced at the downstream-
nodes.
56
57
The FIH sends the previous state information Si-1 to the priority function
module (PFM)
The ULB of each packet in ST is available at the node. This information is also
sent to
PFM, which uses the information fed to it to calculate the priority-indices of
packets in the ST.PDR(packet delivery ratio) of the flow at any given time is
computed by
Each node maintains a data structure called PCL (Preferable Channel List).
PCL contains the usage of the channels within the transmission-range of the
node. Based on their usage, channels can be classified into three types:
High preference channel (HIGH): The channel has been selected by the
current node and is being used by the node in the current beacon-interval.
58
Medium preference channel (MID): The channel is free and is not being
currently used in the transmission-range of the node.
Low preference channel (LOW): The channel is already being used in
the transmission-range of the node by other neighboring nodes.
A counter is associated with each LOW state channel.Time is divided into beacon-
intervals & every node is synchronized by periodic beacon transmissions
At the start of every beacon-interval, there exists a time interval called the adhoc
traffic indication messages (ATIM) window.
ATIM window is used by the nodes to negotiate for channels for transmission
during the current beacon-interval. The protocol works as follows
A source sends an ATIM to the intended receiver. The ATIM carries the PCL
of the source.
On receiving this ATIM, the receiver uses the PCL carried on the ATIM and its
own PCL to select a channel. It includes this channel information in the ATIM-
ACK packet & sends to the source.
Then, source determines whether it can transmit on the channel indicated in the
ATIM-ACK message. If so, it responds by sending the receiver an ATIM-
RES(reservation) packet.
At the end of the ATIM window, the source and receiver switch to the agreed-upon
channel and start communicating by exchanging RTS/CTS.
If a receiver node R receives an ATIM packet from a source S, it selects a channel as
below.
If there exists a HIGH state channel in the node R's PCL, then that channel is
selected.
if there exists a HIGH state channel in the PCL of node S, then that channel is
selected.
if there exists a common MID state channel in the PCLs of both node S and node
R, then that channel is selected.
if there exists a channel which is in the MID state at only one of the two nodes,
59
60
In case FCL is non-empty, the node first checks whether the channel it used
for its most recent successful transmission is included in the list. If so, the
node uses this channel for its new transmission.
Otherwise, one among the IDLE channels available in the FCL is randomly
chosen.
Drawback:
If the number of channels is very large, then the protocol results in very high
packet transmission time.
61
UNIT III
Issues in designing a routing and Transport Layer protocol for Ad hoc networks-
proactive routing, reactive routing (on-demand), hybrid routing- Classification of
Transport Layer solutions-TCP over Ad hoc wireless Networks.
PART-A
The energy aware routing works based on the routing metrics such as low energy,
cost and remaining battery charge. It aims mainly at increasing the lifetime of the
network.
62
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
63
The TCP does not work well in ad hoc network because of the following reasons
Misinterpretation of packet loss
Frequent path breaks
Effect of path length
64
9.What are not supported by the traditional TCP for handling Ad hoc
network?
The features that are not supported by the traditional TCP for handling ad
hoc network are
Throughput
Power consumption
Path break handling mechanisms
Scheduling of packet loss and rate of transmission
Bandwidth consumption due to RTS-CTS-DATA-ACK
If the route to the sender is not available at the FP then additional control
packets may need to be generated for routing the RFN packet.
65
TCP-F has an additional state compared to the traditional TCP state m/c,
and hence its implementation requires modifications to the existing TCP
libraries.
Congestion window used after a new route is obtained may not reflect the
achievable transmission rate to the n/w and the TCP-F receiver.
11.What are the issues in designing a transport layer protocol for ad hoc
wireless Networks?
Induced traffic
Induced throughput unfairness
Separation of congestion control, reliability, and flow control
Power and bandwidth constraints
Misinterpretation of congestion
Completely decoupled transport layer
Dynamic topology.
PART-B
1. Discuss the issues in designing a routing protocol for ad hoc wireless networks
and describe the classification of routing protocols. (nov/Dec 2016)
The major challenges that a routing protocol designed for ad hoc wireless
networks faces are:
Mobility
Network topology is highly dynamic due to movement of nodes. Hence, an
ongoing session suffers frequent path breaks.
Disruption occurs due to the movement of either intermediate nodes in the
path or end nodes.
66
67
68
Ex: consider the figure (3.3). Here, if a transmission from node B to another node A
is already in progress, node C cannot transmit to node D, as it concludes that its
neighbor node B, is in transmitting mode and hence should not interfere with the
on-going transmission. Thus, reusability of the radio spectrum is affected.
5. Resource Constraints
Two essential and limited resources are battery life and processing power. Devices
used in ad hoc wireless networks require portability, and hence they also have size
and weight constraints along with the restrictions on the power source. Increasing the
battery power and processing ability makes the nodes bulky and less portable.
71
72
Use information about the about the expected future status of the wireless
links to make approximate routing decisions.
Apart from the lifetime of wireless links, the future status information also
includes information regarding the lifetime of the node, prediction of
location, and prediction of link availability.
Based on the routing topology
Ad hoc wireless networks, due to their relatively smaller number of nodes, can
make use of either a flat topology or a hierarchical topology for routing.
Flat topology routing protocols:
Make use of a flat addressing scheme similar to the one used in
IEEE 802.3 LANs.
It assumes the presence of a globally unique addressing mechanism
for nodes in an ad hoc wireless network.
Hierarchical topology routing protocols:
Make use of a logical hierarchy in the network and an associated
addressing scheme.
The hierarchy could be based on geographical information or it could be
based on hop distance.
Based on the utilization of specific resources
Power-aware routing:
o Aims at minimizing the consumption of a very important resource in
the ad hoc wireless networks: the battery power.
o The routing decisions are based on minimizing the power consumption
either logically or globally in the network.
Geographical information assisted routing :
o Improves the performance of routing and reduces the control
overhead by effectively utilizing the geographical information
available.
73
74
Figure 3.4(a) Topology graph of the network Figure 3.4(b) Routing for Node 1
75
Advantages:
76
77
Figure 3.6 shows the cluster head, cluster gateways, and normal cluster
member nodes in an ad hoc wireless network.
78
Lead to Frequent changes in the cluster-head, which may result in multiple path
breaks.
3. Explain in detail about WRP and STAR. DSDV (nov/Dec 2016)
79
iv) Message retransmission list (MRL): contains an entry for every update
message that is to be retransmitted and maintains a counter for each entry.
After receiving the update message, a node not only updates the distance for
transmitted neighbors but also checks the other neighbors’ distance, hence
convergence is much faster than DSDV.
Consider the example shown in figure 3.7(a) , where the source of the route is
node 1 and destination is node 15. As WRP proactively maintains the route to all
destinations, the route to any destination node is readily available at the source
node.
From the routing table shown, the route from node 1 to node 15 has the next node
as node 2. The predecessor node of 15 corresponding to this route is route 12.
The predecessor information helps
WRP to converge quickly during link breaks.
When a node detects a link break, it sends an update message to its neighbors
with the link cost of the broken link set to ∞. After receiving the update message;
all affected nodes update their minimum distances to the corresponding nodes.
The node that initiated the update message then finds an alternative route, if
available from its DT. Below figure3.7(b) shows route maintenance in WRP.
Advantages:
WRP has the same advantages as that of DSDV.
It has faster convergence and involves fewer table updates.
Disadvantages:
The complexity of maintenance of multiple tables demands a larger memory and
greater processing power from nodes in the adhoc wireless network.
It is not suitable for highly dynamic and also for very large ad hoc wireless networks.
80
81
They execute the path-finding process and exchange routing information only
When a path is required by a node to communicate with a destination.
Dynamic Source Routing Protocol (DSR)
82
83
Advantages:
Uses a reactive approach which eliminates the need to periodically flood
the network with table update messages
Route is established only when required
Reduce control overhead
Disadvantages
Route maintenance mechanism does not locally repair a broken link
Stale route cache information could result in inconsistencies during route
construction phase.
Route Establishment in DSR:
85
87
88
In the LAR1 algorithm figure 3.12(a), the source node explicitly specifies the
RequestZone in the RouteRequest packet which is broadcast to its neighbors.
These nodes verify their own geographical locations to check whether they
belong to the ExpectedZone.
Finally, when the RouteRequest reaches the destination node, it originates a
RouteReply that contains the current location and current time of the node.
89
In LAR2 algorithm figure 3.12 (b), the source node includes the distance
between itself and the destination node
When the intermediate node receives this RouteRequest packet, it computes the
distance to the node D.
A RouteRequest packet is forwarded only once and the distance between the
forwarding node and D is updated in the RouteRequest packet for further
relaying
In order to compensate for the location error, a larger RequestZone that can
accommodate the amount of error that occurred is considered.
It is a distributed routing protocol that selects routes based on the stability of the
wireless links
It is a beacon-based on-demand routing protocol
A link is classified as stable or unstable based on its temporal stability
The temporal stability is determined by counting the periodic beacons that a node
receives from its neighbors
Each node maintains the count of its neighbor’s beacons and classifies each link as
stable or unstable
The link corresponding to a stable neighbor is termed as a stable link, while a link
to an unstable neighbor is called an unstable link
A source node floods RouteRequest packets throughout the network if a route is
not available in its route cache
All intermediate nodes forward the RouteRequest packet
A RouteRequest packet carries the path it has traversed and the beacon count for
the corresponding nodes in the path
When the first RouteRequest reaches the destination, the destination waits for a
time period T to receive multiple RouteRequests through different paths
If two paths have the same proportion of stable links, the shorter of them is
selected
If more than one path is available, then a random path among them is selected as
the path between source and destination.
In figure 3.13(a), source node initiates the RouteRequest to the flooded for
finding a route to the destination node
o Solid lines represent stable links
o Dotted lines represent unstable links
ABR uses stability information only during the route selection process at the
destination node
91
92
If a link break occurs at an intermediate node, the node closer to the source,
which detects the break, initiates a local route repair process.In this process,
the node locally broadcasts a route repair packet, termed the local query (LQ)
broadcast, with a limited time to live (TTL), as shown in figure 3.13(b)
This way a broken link is bypassed locally without flooding a new
RouteRequest packet in the whole network.
Advantage:
Stable routes have a higher preference compared to shorter routes
They result in fewer path breaks which, in turn, reduces the extent of flooding
due to reconfiguration of paths in the network.
Disadvantage:
Chosen path may be longer than the shortest path between the source and
destination because of the preference given to stable paths
Repetitive LQ broadcasts may result in high delays during route repairs.
Uses signal stability as the prime factor for finding stable routes
This protocol is beacon-based, in which signal strength of the beacon is
measured for determining link stability
The signal strength is used to classify a link as stable or unstable
This protocol consists of two parts: forwarding protocol (FP) and dynamic
routing protocol (DRP)
These protocols use an extended radio interface that measures the signal strength
from beacons
DRP maintains the routing table by interacting with the DRP processes on other
hosts
FP performs the actual routing to forward a packet on its way to the destination
93
Every node maintains a table that contains the beacon count and the signal
strength of each of its neighbors
If a node receives strong beacons, then link is classified as strong/stable link
The link is otherwise classified as weak/unstable link
Each node maintains a table called the signal stability table (SST) which is based
on the signal strengths of its neighbors’ beacons
This table is used by the nodes in the path to the destination to forward the
incoming RouteRequest over strong links for finding the most stable end-to-end
path
A source node which does not have a route to the destination floods the network
with RouteRequest packets
SSA protocol process a RouteRequest only if it is received over a strong link
A RouteRequest received through a weak link is dropped without being
processed
The destination selects the first RouteRequest packet received over strong links
The destination initiates a RouteReply packet to notify the selected route to the
source
In figure 3.14(a), source node broadcasts a RouteRequest for finding the route to
the destination node
Solid lines represent the stable links
Dotted lines represent the weak links
SSA restricts intermediate nodes from forwarding a RouteRequest packet if the
packet has been received over a weak link
When a link breaks, the end nodes of the broken link notify the corresponding
end nodes of the path
A source node, after receiving a route break notification packet, rebroadcasts the
RouteRequest to find another stable path to the destination
94
Stale entries are removed only if data packets that use the stale route information
fail to reach the next node
If no strong path is available when a link gets broken, then the new route is
established by considering weak links also
This is done when multiple RouteRequest attempts fail to obtain a path to
the destination using only the stable links
95
Advantage:
Finds more stable routes when compared to the shortest path route selection
protocols
Accommodates temporal stability by using beacon counts to classify a link as
stable or weak
Disadvantage:
It puts a strong RouteRequest forwarding condition which results in
RouteRequest failures
Multiple flooding of RouteRequest packets consumes significant amount of
bandwidth
Increases the path setup time
Strong link criterion increases the path length
Flow-Oriented Routing Protocol (FORP)
96
Every node is assumed to be able to predict the LET of each of its links with its
neighbors
The LET between two nodes can be estimated using information such as
current position of the nodes, their direction of movement, and their
transmission ranges
FORP requires the availability of GPS information in order to identify the
location of nodes
When a sender node needs to setup a real time flow to a particular destination,
it checks its routing table for the availability of a route to that destination
If a route is available, then that is used to send packets to the destination
Otherwise sender broadcasts a flow-REQ packet carrying information
regarding the source and destination nodes
The Flow-REQ packet also carries a flow identification number/sequence
number which is unique for every session
A neighbor node, on receiving this packet, first checks if the sequence number
of the received Flow –REQ is higher than the sequence number corresponding
to previous packet
If the sequence number on the packet is less than that of the previous packet,
then the packet is discarded
This is done to avoid looping of flow-REQ packets
The Flow-REQ packet, when received at the destination node, contains the list
of nodes on the path it had traversed, along with the LET values of every
wireless link on that path
FORP assumes all the nodes in the network to be synchronized to a common
time by means of GPS information
97
98
Advantage:
Use of LET and RET estimates reduces path breaks
Reduces the reduction in packet delivery
Reduces number of out-of-order packets
Reduces non-optimal paths
Disadvantage:
Works well when topology is highly dynamic
Requirements of time synchronization increases the control overhead
Dependency on GPS infrastructure affects the operability of this protocol
wherever it is not available.
(a) Discuss in detail feedback based TCP and TCP BUS.
Feedback-Based TCP:
TCP-F is a feedback-based approach. It requires the support of a reliable link
layer and routing protocol that can provide FB to the TCP sender about the
path break.
The routing protocol is expected to repair the broken link within a reasonable
period.
TCP-F aims to minimize the throughput degradation resulting from the
frequent path breaks that occur in ad hoc wireless networks.
During a TCP session, there could be several path breaks resulting in
considerable packet loss and path reestablishment delay.
Upon detection of packet loss, the sender in a TCP session invokes the
congestion control algorithm leading to the exponential back-off of
retransmission timers and a decrease in congestion window size.
In TCP-F, an intermediate node, upon detection of a path break, originates a
route failure notification (RFN) packet.
This RFN packet is routed toward the sender of the TCP session.
99
100
is sent to node A and the TCP state is updated back to the connected state.
(figure 3.16 (c))
Advantages:
TCP-F provides a simple FB based solution to minimize the problem arising out
of frequent path breaks in ad hoc wireless networks.
At the same time, it also permits the TCP congestion control mechanism to
respond to congestion in the n/w.
Disadvantages:
If the route to the sender is not available at the FP then additional control packets
may need to be generated for routing the RFN packet.
TCP-F has an additional state compared to the traditional TCP state m/c, and
hence its implementation requires modifications to the existing TCP libraries.
Congestion window used after a new route is obtained may not reflect the
achievable transmission rate to the n/w and the TCP-F receiver.
101
TCP BUS:
TCP with buffering capacity and sequence information (TCP-Bus) is similar to TCP-
F and TCP-ELFN in its use of feedback information from an intermediate node on
detection of a path break. TCP-Bus was proposed with Associativity bared routing
(ABR) scheme. TCP-Bus works as follows.
Upon detection of a path break an upstream intermediate node (called pivot node
PN) originates explicit route disconnection notification (ERDN) message.
This ERDN is propagated to the TCP-Bus sender Upon reception of ERDN, the
TCP-Bus sender stops transmissions and freezes all times and windows.
The packets in transit at the intermediate nodes from TCP-Bus sender to PN are
buffered until a new partial path from the PN to the TCP-Bus receiver is
obtained by PN.
Upon detection of a path break, the downstream node originates the route
notification (RN) packet to the TCP bus receiver.
The PN includes the sequence number of the TCP segment belonging to the flow
that is currently at the head of its queue in the ERDN packet.
A PN attempt to final an alternate route to the TCP-Bus receiver and availability
of such partial route is to destination is intimated to the TCP-Bus sender through
an explicit route successful notification (ERSN) packet.
The Local Query (LQ) packet carries the sequence number of the segment at the
head of the queue buffered at the PN and REPLY carries the sequence number of
the last successful segment the TC-Bus receiver received.
This enable the TCP-Bus receiver to understand the packets lost in transition and
those buffered at the intermediate nodes.
This is used to avoid fast retransmission requests generated by the TCP-BuS
receiver when it notices an out-of-order packet delivery.
When the TCP-BuS sender receives an ERSN packet, it resumes the data
transmission
102
The TCP-BuS sender also periodically originates probe packets to check the
availability of a path to the destination.
Fig shows the propagation of ERDN and RN messages when a link between
nodes 4 and 12 fails.
When a TCP-BuS sender receives the ERSN message, it understands, from the
sequence number of the last successfully received packet at the destination and
the sequence number of the packet at the head of the queue at PN, the packets lost
in transition.
The TCP-BuS receiver understands that the lost packets will be delayed.
The Lost packets are retransmitted by the TCP-Bus sender.
Advantages:
Performance improvement and avoidance of fast retransmission due to the use
of buffering, seq numbering and selective acknowledgement.
It takes advantage of ABR
103
Disadvantages:
Increased dependency on the routing protocol and buffering at intermediate
nodes
The failure of intermediate nodes that buffer the packets may lead to loss of
packets and performance degradation.
5 .(b) With a neat diagram, explain the operation of ad hoc TCP(ATCP) protocol.
104
Fig (a) shows the thin layer implementation of ATCP between the traditional
TCP layer and the IP layer. This does not require changes in the existing TCP
protocol. This layer is active only at the TCP sender.The major function of the
ATCP layer is to monitor the packets sent and received by the TCP sender, the
state of the TCP sender, and the state of the network.
Fig (b) shows the state transition diagram for the ATCP at the TCP sender. The
four states in the ATCP are (I) NORMAL (II) CONGESTED (III) LOSS(IV)
DISCONN
TCP and the TCP sender is removed from the persist state and then the ATCP
sender changes to the NORMAL state.
When a TCP connection is established, the ATCP sender is in NORMAL State.
In this state, ATCP does not interfere with the operation of TCP
When packets are lost or arrive out-of-order at the destination, it generates
duplicate ACKs. In traditional TCP, upon reception of duplicate ACKs, the
TCP sender invokes the congestion control. But the ATCP sender counts the
number of duplicate ACKs received, if it reaches three, of it puts TCP in
persists state and ATCP in loss state
.
Figure 3.18: An illustration of ATCP thin layer and ATCP state diagram.
105
When a new ACK comes from TCP receiver. It is forwarded to TCP and the
TCP sender is removed from the persists state and then the ATCP sender
change to the NORMAL state.
When ATCP sender is in loss state, the receipt of an ECN message charges it
to the CONGESTED State. Along with this transition, ATCP sender removes
the TCP from the persists state.
When the n/w gets congested, the ECN flag is set in the data and the ACK
packets.
106
107
108
In addition to these transmission windows at the TCP sender, every proxy node
maintains a congestion window that governs the segment level transmission
rate.
6.b) Discuss briefly why the TCP does not perform well in ad hoc
wireless networks.
The major reasons behind throughput degradation that TCP faces when used in
ad hoc wireless networks are the following:
i) Misinterpretation of Packet Loss
109
As path length increases, the throughput decreases the possibility of a path break
increases with path length. Given that the probability of a link break is pl , the
probability of a path break (pb) for a path of length k can be obtained as pb = 1 -
(1 -pl)k.
111
112
A network with two TCP sessions A and B is shown in Figure 3.22(a) at time
instant t1.
Due to dynamic topological changes, the network gets partitioned into two as in
Figure 3.22(b) at time t2.
The TCP session A's sender and receiver belong to two different partitions and the
TCP session B experiences a path break. These partitions could merge back into a
single network at time t3.
Uni-directional Path
TCP relies on end-to-end ACK for ensuring reliability.
Path-break on an entirely different reverse path can affect the performance of the
network as much as a path-breaks in the forward path.
Multipath Routing
For TCP, multipath routing leads to significant amount of out-of-order
packets, when intern generates a set of duplicate acknowledgement(DUPACKs), which
cause additional power-consumption and invocation of congestion-control.
113
UNIT -IV
Single node architecture: hardware and software components of a sensor node - WSN
Network architecture: typical network architectures-data relaying and aggregation
strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA
based MAC- IEEE 802.15.4.
PART - A
6. What is UNPF?
It is a set of protocols for complete implementation of a layered architecture for
sensor networks. UNPF integrates three operations in its protocol structure: network
initialization and maintenance, MAC, and routing protocols.
115
Inside the home, there are several areas where such technology can be
applied effectively:
PC-peripherals including keyboards, wireless mice, low end PDAs,
joysticks; consumer electronics including radios, TVs, DVD players,
remote controls;
Home automation including heating, ventilation, air conditioning, security,
lighting, control of windows, curtains, doors, locks; health monitors and
diagnostics.
12. What is GTS ?
Channel access is usually contention based though the PAN may assign time slots
to a single device. This is known as a guaranteed time slot (GTS)
PART-B
117
Layered architecture has a single powerful base station (BS), and the layers of
sensor nodes around it correspond to the nodes that have the same hop-count to the BS.
Layered architectures have been used with in-building wireless backbones, and in
military sensor-based infrastructure, such as the multi-hop infrastructure network
architecture (MINA) . In the in-building scenario, the BS acts an access point to a wired
network, and small nodes form a wireless backbone to provide wireless connectivity. The
users of the network have hand-held devices such as PDAs which communicate via the
small nodes to the BS.
118
119
nodes to the BS. The node to which a packet is to be forwarded is selected considering
the remaining energy of the nodes. This achieves a higher network lifetime. Existing ad
hoc routing protocols can be simplified for the layered architecture, since only nodes of
the next layer need to be maintained in the routing table. A modification to the UNPF
protocol set termed the UNPF-R has been proposed. It makes the sensor nodes adaptively
vary their transmission range so that network performance can be optimized. While a
very small transmission range could cause network partitioning, a very large transmission
range will reduce the spatial reuse of frequencies. The optimal range is determined
through an algorithm similar to simulated annealing. This is a centralized control
algorithm in which the BS evaluates an objective function periodically.
For a transmission range R, the objective function is, where N is the total number
of sensors in the system; n is the number of nodes in layer one; is the energy consumption
per packet; and d is the average packet delay. The BS selects a new transmission range R'
as follows. If no packet is received by the BS from any sensor node for some interval of
time, the transmission range is increased by Δr, a predefined increment. Otherwise, the
transmission range is either decreased by Δr with probability 0.5 × (n/N), or increased by
Δr with probability [1 - 0.5 × (n/N)].
The objective function is reevaluated with the new transmission range. If , then the
transmission range R' is adopted. Otherwise, R is modified to R' with probability, where
T is the temperature parameter, as in simulated annealing. The advantage of the UNPF-R
is that it minimizes the energy × delay metric, and maximizes the number of nodes which
can connect to the BS. The minimization of the energy × delay metric ensures that
transmission should occur with minimum delay and with minimum energy consumption.
The two conflicting objectives are together optimized by minimizing their product.
120
provides an inferior objective value is also accepted with a probability, which is reduced
as the algorithm progresses. This is to escape local minima of the objective function. The
progress of the heuristic is indicated by the decreasing temperature parameter.
Figure represents a clustered architecture where any message can reach the BS
in at most two hops. Clustering can be extended to greater depths hierarchically.
Clustered architecture is especially useful for sensor networks because of its
inherent suitability for data fusion. The data gathered by all members of the
cluster can be fused at the cluster-head, and only the resulting information
needs to be communicated to the BS.
Sensor networks should be self-organizing, hence the cluster formation and
election of cluster-heads must be an autonomous, distributed process. This is
achieved through network layer protocols such as the low-energy adaptive
clustering hierarchy (LEACH) .
121
A sensor network has some design challenges due to the following reasons:
Sensor nodes are randomly deployed and hence do not fit into any regular
topology. Once deployed, they usually do not require any human intervention.
Hence, the setup and maintenance of the network should be entirely autonomous.
122
The challenges posed by sensor network MAC protocol has no single controlling
authority, so global synchronization is difficult
Efficiency issue
Frequent topology changes due to mobility and failure
123
Self-Organizing MAC for Sensor Networks (SMACS) and Eavesdrop and Register
(EAR)
SMACS and EAR protocols which handle network initialization and
mobility support, respectively. SMACS is a distributed protocol for
network initialization and link-layer organization.
In this protocol, neighbor discovery and channel assignment take place
simultaneously in a completely distributed manner.
A communication link between two nodes consists of a pair of time slots, at
a fixed frequency, which is randomly chosen at the time of establishing the
link. Such an assignment is possible in sensor networks without
interference from neighboring nodes because the available bandwidth is
much larger than the data rate required for a message transmission between
two nodes.
124
EAR protocol:
The EAR protocol enables seamless connection of nodes under mobile and
stationary conditions. This protocol makes use of certain mobile nodes, besides the
existing stationary sensor nodes, to offer service to maintain connections. Mobile nodes
eavesdrop on the control signals and maintain neighbor information.
Hybrid TDMA/FDMA
125
5. Draw the protocol stack of IEEE 802.15.4 and explain its functions.
IEEE standard 802.15.4 intends to offer the fundamental lower network layers
of a type of wireless personal area network (WPAN) which focuses on low-
cost, low rate, low-speed ubiquitous communication between devices. It can be
contrasted with other approaches, such as Wi-Fi, which offer more bandwidth
and require more power.
It is used in home networking applications where the key motivations are
reduced installation cost and low power consumption.
The basic framework conceives a 10-meter communications range with a
transfer rate of 250 kbit/s.
Lower transfer rates of 20 and 40 kbit/s were initially defined, with the 100
kbit/s rate being added in the current revision.
Even lower rates can be considered with the resulting effect on power
consumption.
126
Features:
Reservation of guaranteed time slots, Collision avoidance through CSMA/CA
Integrated support for secure communications.
Devices also include power management functions such as link quality and
energy detection.
Upper layer
Convergence sublayers
IEEE 802.15.4
Medium Access
Physical layers
127
PHY protocol data unit(PPDU) Preamble Start of packet delimiter PHY header
PHY service data unit (PSDU) 6 bytes i 127 bytes PHY packet fields.
The packet or PHY protocol data unit (PPDU) consists of the synchronization
header, a PHY header for the packet length, and the payload itself which is also
referred to as the PHY service data unit (PSDU).
preamble – used for synchronization 8-bit start of packet delimiter, signifying the
end of the preamble. Out of the 8 bits in the PHY header, seven are used to specify
the length of the PSD which can range from 0-127 bytes.
Beyond these three bands, the IEEE 802.15.4c study group considered the newly
opened 314–316 MHz, 430–434 MHz, and 779–787 MHz bands in China.
In August 2007, IEEE 802.15.4a was released expanding the four PHYs available
in the earlier 2006 version to six, including one PHY using Direct Sequence ultra-
wide band(UWB) and another using chirp spread spectrum (CSS).
129
The Medium Access Control (MAC) enables the transmission of MAC frames
through the use of the physical channel. Besides the data service, it offers a
management interface and itself manages access to the physical channel and
network beaconing.
It also controls frame validation, guarantees time slots and handles node
associations. Finally, it offers hook points for secure services.
The MAC protocol data unit (MPDU), or the MAC frame, consists of
The MHR consists of a 2 byte frame control field that specifies the frame type, the
address format and controls the acknowledgement, 1 byte sequence number which
matches the acknowledgement frame with the previous transmission, and a
variable sized address field (0-20 bytes).
130
The payload field is variable in length but the maximum possible size of an
MPDU is 127 bytes.
The MFR completes the MPDU and consists of a frame check sequence (FCS)
field which is basically a 16-bit CRC code.
IEEE 802.15.4 under certain conditions provides dedicated bandwidth and low
latencies to certain types of applications, by operating in a super frame mode.
Channel access is usually contention based though the PAN may assign time slots
to a single device. This is known as a guaranteed time slot (GTS) .
No security,
Access control lists and
Symmetric key security using AES-128.
3. Explain the main components of the wireless sensor node.
Controller
Communication device(s)
Sensors/actuators
Memory
Power supply
Microcontrollers:
The processor for general purposes
It is used in Optimized for embedded applications
Low energy consumption.
The communication module of a sensor node is called “Radio Transceiver”
The essentially tasks of transceiver is to “transmit” and “receive” data between a pair of
nodes.
The following characteristics of the transceiver should be consider for sensor nodes
Capabilities
Energy characteristics
Radio performance
Transceivers typically has several different states/modes
Transmit mode
Transmitting data
Receive mode
Receiving data
Idle mode
Ready to receive, but not doing so some functions in hardware can be
switched off.
Reducing energy consumption a little
Sleep mode
132
Memory
Power
Supply
134
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
UNIT V
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-
absolute and relative localization, triangulation-QOS in WSN-Energy Efficient Design-
Synchronization-Transport Layer issues.
PART – A
Sensor networks pose certain design challenges due to the following reasons:
Sensor nodes are randomly deployed and hence do not fit into any
regular topology. Once deployed, they usually do not require any human intervention.
Hence, the setup and maintenance of the network should be entirely autonomous.
Sensor networks are infrastructure-less. Therefore, all routing and
maintenance algorithms need to be distributed.
Sensor nodes should be able to synchronize with each other in a
completely distributed manner, so that TDMA schedules can be imposed and temporal
ordering of detected events can be performed without ambiguity.
2.Define Localization.
135
3.Define worst-case and best-case coverage.
136
This protocol optimizes the pure link state routing protocol. Optimizations are
done in two ways: by reducing the size of the control packets and by reducing the
number of links that are used for forwarding the link state packets.
137
PART – B
The optimized link state routing (OLSR) protocol is a proactive routing protocol
that employs an efficient link state packet forwarding mechanism called multipoint
relaying. This protocol optimizes the pure link state routing protocol.
Optimizations are done in two ways:
by reducing the size of the control packets and
by reducing the number of links that are used for forwarding
the link state packets.
The reduction in the size of link state packets is made by declaring only a subset of
the links in the link state updates.
This subset of links or neighbors that are designated for link state updates and are
assigned the responsibility of packet forwarding are called multipoint relays.
138
The optimization by the use of multipoint relaying facilitates periodic link state
updates.
The link state update mechanism does not generate any other control packet when
a link breaks or when a link is newly added.
The link state update optimization achieves higher efficiency when operating in
highly dense networks.
Figure 5.1(a) shows the number of message transmissions required when the
typical flooding-based approach is employed. In this case, the number of message
transmissions is approximately equal to the number of nodes that constitute the
network.
The set consisting of nodes that are multipoint relays is referred to as MPRset.
Each node (say, P) in the network selects an MPRset that processes and forwards
every link state packet that node P originates.
The neighbor nodes that do not belong to the MPRset process the link state
packets originated by node P but do not forward them.
Similarly, each node maintains a subset of neighbors called MPR selectors, which
is nothing but the set of neighbors that have selected the node as a multipoint
relay.
A node forwards packets that are received from nodes belonging to its
MPRSelector set. The members of both MPRset and MPRSelectors keep
changing over time.
The members of the MPRset of a node are selected in such a manner that every
node in the node's two-hop neighborhood has a bidirectional link with the node.
The selection of nodes that constitute the MPRsetsignificantly affects the
performance of OLSR because a node calculates routes to all destinations only
through the members of its MPRset.
139
Every node periodically broadcasts its MPR Selector set to nodes in its immediate
neighborhood. In order to decide on the membership of the nodes in the MPRset, a
node periodically sends Hello messages that contain the list of neighbors with
which the node has bidirectional links and the list of neighbors whose
transmissions were received in the recent past but with whom bidirectional links
have not yet been confirmed.
The nodes that receive this Hello packet update their own two-hop topology
tables. The selection of multipoint relays is also indicated in theHello packet. A
data structure called neighbor table is used to store the list of neighbors, the two-
hop neighbors, and the status of neighbor nodes.
The neighbor nodes can be in one of the three possible link status states, that is,
uni- directional, bidirectional, and multipoint relay. In order to remove the stale
entries from the neighbor table, every entry has an associated timeout value,
140
Figure 5.1 (b) shows the forwarding of TC packets using the MPRset of node 4. In
this example, node 4 selects the nodes 2, 3, 10, and 12 as members of its MPRset.
Forwarding by these nodes makes the TCpackets reach all nodes within the transmitting
node’s two-hop local topology. The selection of the optimal MPRset is NP-complete. In a
heuristic has been proposed for selecting the MPRset.The notations used in this heuristic
141
are as follows: N i (x) refers to the ith hop neighbor set of node x andMPR(x) refers to
the MPRset of node x.
MPR(x) ← Ø/* Initializing empty MPRset */
MPR(x) ← {Those nodes that belong to N 1 (x) and which are the only neighbors
of nodes in N 2 (x)}
While there exists some node in N 2 (x) which is not covered by MPR(x)
For each node in N 1 (x), which is not in MPR(x), compute the maximum
number of nodes that it covers among the uncovered nodes in the set N 2 (x).
Add to MPR(x) the node belonging to N 1 (x), for which this number is
maximum.
A node updates its MPRset whenever it detects a new bidirectional link in its
neighborhood or in its two-hop topology, or a bidirectional link gets broken in its
neighborhood.
142
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
location discovery.
A global positioning system (GPS) is not always feasible because it cannot
reach nodes in dense foliage or indoors.
It also consumes high power and makes sensor nodes bulkier. Two basic
mechanisms of location discovery are
Indoor Localization
Sensor Network Localization
Indoor Localization
Indoor localization techniques use a fixed infrastructure to estimate the
location of sensor nodes.
Fixed beacon nodes are strategically placed in the field of observation,
typically indoors, such as within a building.
The randomly distributed sensors receive beacon signals from the beacon
nodes and measure the signal strength, angle of arrival, and time difference
between the arrivals of different beacon signals.
Using the measurements from multiple beacons, the nodes estimate their
location. Some approaches use simple triangulation methods, while others
require a priori database creation of signal measurements.
distances by looking up the database instead of performing
The nodes estimate
computations.
may not be possible in each node, so only
However, storage of the database
the BS may carry the database.
Atomic ML: If a node receives three beacons, it can determine its position by a
mechanism similar to GPS. This is illustrated in Figure 5.2.
Iterative ML: Some nodes may not be in the direct range of three beacons. Once a
node estimates its location, it sends out
a beacon, which enables some other nodes
to now receive at least three beacons
Iteratively, all nodes in the network can estimate their location. This is shown in
Figure 5.3. The drawback of this multi-hop method is that errors are propagated;
hence estimation of location may not be accurate.
144
Collaborative ML: When two or more nodes cannot receive at least three beacons
each, they collaborate with each other.
As shown in Figure 5.4, node A and node B have three neighbors each. Of the six
participating nodes, four are beacons, whose positions are known. Hence, by
solving a set of simultaneous quadratic equations, the positions of A and B can be
determined.
their location. The errors in this technique occur due to non- zero beam-width from the
beacons.
The beam is not a straight line as theoretically imagined, but it has a finite width.
Hence, the measurement of the angle of the beacon signal will be inaccurate.
146
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Generate the Voronoi diagram, with the set of vertices V and the set of edges E.
This is done by drawing the perpendicular bisectors of every line segment joining
two sites, and using their points of intersection as the vertices of the convex
polygons.
147
Create a weighted graph with vertices from V and edges from E, such that the
weight of each edge in the graph is the minimum distance from all sensors in S.
The edge weights represent the distance from the nearest sensor. Smaller edge
weights imply better coverage along the edge.
Determine the maximum cost path from I to F, using breadth-first search. The
this maximum-cost path determined from the Voronoi diagram.
maximum cost implies least coverage. Hence, the required breach path is along
The breach path shows the region of maximum vulnerability in a sensor network,
where the coverage provided by the sensors is the weakest.
A related problem is that of finding the best-case coverage. The problem is
formally stated as finding the path which offers the maximum coverage, that is, the
maximum support path P S in S, from I to F. The solution is obtained by a
mathematical technique called Delaunay triangulation, shown in Figure 5.6
This is obtained from the Voronoi diagram by connecting the sites whose
polygons share a common edge. The best path P S will be a set of line segments from
the Delaunay triangulation, connecting some of the sensor nodes.
The algorithm is again similar to that used to find the maximum breach path,
replacing the Voronoi diagram by the Delaunay triangulation, and defining the edge
costs proportional to the line segment lengths. The maximum support path is hence
formed by a set of line segments connecting some of the sensor nodes.
148
Exposure
Exposure is defined as the expected ability of observing a target in the sensor
field. It is formally defined as the integral of the sensing function on a path from
source node P s to destination node P d. The sensing power of a node s at point p is
usually modeled as
The closest-sensor field intensity at p is
149
In the simplest case of having one sensor node at (0, 0) in a unit field, the breach
path or minimum exposure path (MEP) from (-1, -1) to (1, 1) is shown in Figure 5.7
It can also be proved that for a single sensor s in a polygonal field, with vertices
v1, v2 , ..., vn , the MEP between two vertices vi and vj can be determined as
follows. The edge (vi , vi+ 1 ) is tangent to the inscribed circle at u i . Then the MEP
consists of the line segment from vi to u i , part of the inscribed circle from u i to u
j , and the line segment from u j to vj . This is shown in Figure 5.8
150
The exposure problem is still unsolved for two points in the same corner, or for
points within the inscribed circle. For the generic exposure problem of determining the
MEP for randomly placed sensor nodes in the network, the network is tessellated with
grid points. An example is shown in Figure 5.9.
To construct an n × n grid of order m, each side of a square is divided into m equal
parts, creating (m + 1) vertices on the edge. Within each square, all vertices are connected
to obtain a grid. Higher order grids have greater accuracy.
For each edge in the grid network, the exposure function is used to determine the
edge weights, and the MEP is defined as the shortest path, determined by Dijkstra’s
algorithm.
.
151
The mathematical concept of exposure is important for evaluating the target detection
capability of a sensor network. Sensors are deployed in a given area to detect events
occurring in the field of interest.
The nodes collaborate among themselves (perform data fusion) through the exchange
of localized information, and reach a decision about the location and movement of a
given event or target.
152
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
send time,
access time,
propagation time, and
receive time.
The send time is the time spent at the sender to construct the message.
The access time is the time taken by the MAC layer to access the medium, which
is appreciable in a contention-based MAC protocol.
The propagation time reflects the time taken by the bits to be physically
transmitted through the medium over the distance separating the sender and
receiver.
The receive time is the time for processing required in the receiver’s network
interface to receive the message from the channel and notify the host of its
arrival.
If the arrival time is time-stamped at a low layer, overheads of context switches and
system calls are avoided, and the arrival time-stamp closely reflects the actual arrival
time, with the only non-determinism introduced being due to reception of the first bit.
Many existing synchronization algorithms for sensor networks rely on the time
information obtained through the GPS to provide coarse time synchronization. The
accuracy of time synchronization provided by GPS depends on the number of satellites
observed by the GPS receiver.
In the worst case, with only one observed satellite, GPS offers an accuracy of 1 μs.
However, GPS is not a suitable choice for sensor networks because GPS receivers cannot
be used inside large buildings and basements, or underwater, or in other satellite-
unreachable environments where sensor networks may have to be deployed.
A low-power synchronization scheme called post facto synchronization has been
proposed by Elson and Estrin in for wireless sensor networks. In this scheme, the clocks
of the nodes are normally unsynchronized.
153
updates its virtual clock to the expected value of the leader's real clock at that
instant. Time-stamping of claims is performed at the physical layer, to avoid the
variable queuing and medium access delays introduced by the MAC layer.
The claim is flooded throughout the partition, bounded by a TTL field. In case two
nodes within a partition stake a leadership claim, the one whose
LeaderAnnouncement has a higher random number resynchronizes to the leader
whose LeaderAnnouncement has the lower random number, and then rebroadcasts
theLeaderAnnouncement of the node that generated the lower random number.
In the highly unlikely case of two leaders generating the same random number, node
ID is used for resolution. Periodic beaconing ensures that synchronization is
maintained throughout the partition, and nodes which join it later also synchronize
their clocks.
Resynchronization
Resynchronization is the process of synchronizing different network
partitions that are independently synchronized to different clocks to a common
clock. In dynamic networks such as sensor networks, frequent changes in topology
make resynchronization an important issue. Resynchronization takes place in
situations such as the merging of two partitions due to mobility, where all clocks
in a partition may need to be updated to match the leader of the other partition, as
shown in Figure 5.10
155
156
Collisions are reduced to a great extent for the control packets. However, the
available bandwidth for data transmission is reduced, and the cost of the mobile
nodes increases because of the need for an additional radio interface.
In in-band synchronization, control information for synchronization shares the
same channel with the data packets, as shown in Figure 5.12 (a). This leads to a
greater number of collisions, but avoids an additional channel or bandwidth
reservation.
Piggy-backing can be used to reduce explicit control packets.
Control information is piggy-backed onto outgoing data packets, as in Figure 5.12
(b). This involves very low overhead with each packet and leads to considerable
bandwidth saving.
A control packet carrying the synchronization information is originated only if
there are no data packets to be sent from the node.
The scheme can also be applied with piggy- backing on the link-level
acknowledgments. In sensor networks, data usually flows from all sensors
to the monitor, which is a fixed node with greater computing and power
resources than the sensors.
If the monitor is forced to be the leader, the synchronization information moves in
157
the reverse direction, that is, along the link-level acknowledgments sent by the
nodes for each hop of the data packets, as shown in Figure 5.12 (c). Using
simulation studies, this has been observed to be the most efficient mechanism.
Energy-Efficient Design
The sensor nodes have a very stringent energy constraint. Energy optimization in
sensor networks must prolong the life of a single node as well as of the entire
network.
Power saving in the micro-controller unit has been
analyzed, where the power
required by different processors has been compared.
such that performance
The choice of the processor should be application-specific,
requirements are met with the least power consumption.
out in a power-aware manner using dynamic power
Computation can be carried
management (DPM).
One of the basic DPM techniques is to shut down several components of the
sensor node when no events take place.
158
161
162
(ii) What is range based localization? Explain with an example how triangulation works. (8)
Or
(b) What is quality of Service (QoS)? Discuss QoS in wireless Sensor networks. (16)
PART B – (5 X 16 = 80 marks)
13. (a) Discuss any four reactive routing protocols for Ad Hoc wireless sensosr networks.
(16)
Or
(b) What is TCP? Discuss with an example TCP over Ad Hoc wireless sensor networks.
(16)
164
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
14. (a) Discuss the architecture of wireless sensor network with diagtammatic illustration.
(16)
(b) Present an overview of MAC protocols for Ad Hoc wireless sensor networks. (16)
15. (a) (i) Appraise the issues related to routing in Ad Hoc wireless sensosr networks. (8)
(ii) Present an overview of Localization in Ad Hoc wireless sensor networks. (8)
(b) (i) Appraise the QoS related measures in Ad Hoc wireless sensosr networks. (8)
(ii) Outline the issues related to the transport layer in Ad Hoc wireless sensor
networks. (8)
165
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
166