0% found this document useful (0 votes)
29 views

Design Issues of Adhoc Network

Uploaded by

Ethi Sathish Dev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

Design Issues of Adhoc Network

Uploaded by

Ethi Sathish Dev
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Wireless Network

Issues of Ad Hoc
2.2 Design
hoc network are discussed below
issues of wireless ad
The various design
Medium access scheme
wh

Routing ho
po
Multicasting
Transport layerprotocol
Pricing scheme dE
a
Quality of service provisioning
Self-organization
Security
Addressing and service discovery
Energy management
Deployment considerations
Medium access scheme: The major issues considered while designing a MAC protocol fo
ad hoc wireless network are as follows: distributed operation, synchronization, hidden
terminals, exposed terminals, throughput, access delay, fairness, real time trafitic support
resource reservation, ability to measure resource availability, capability for power control,
adaptive rate control and use of directional antennas.
Routing: It is the process of determining a route based on hop count, need of power and life
time of the link in order to exchange information from one node to other node. The
major
design issues of a routing protocol are as follows: mobility, bandwidth constrained,
error-prone and shared channel, location dependent contention and other resource constraints
such as computing and battery power, storage
capacity etc.
Other requirements of routing protocols in ad hoc networks are minimum route
acquisition delay, quick route reconfiguration, loop free routing, distributed
minimum control overhead, scalability, provisioning of Quality routing approach,
time sensitive traffic and security. of Service (QoS), for
support
Multicasting: Transmission of same message to a group or mobile
transmission is called multicasting. The major design isues of nodes in single
follows robustness, eficiency, control overheaa, Q00, Cncient multicasting protocals are a
scalability and security. group management.

Transportlayer protocols: Transport layer protocols used to are


to set
up and
and
end-to-end connection. Further, provides reliable
it data delivery Wired
in
networks
maintain
mointi

focused to perform flow control and congestion control. also


Wireless Ad Hoc Networks
Transmission ControI Protocol (TCP) is one of
widely
used in ired the reliable
connection orientea piu cols
which is networks.
hue to the factors
networks du
networks However, the performance of TCP is in ad
hoc
such as degrau
constrained, high channel error frequent path breaks, high mobility, bandwidth
bandwiatn and
au
nnection isIS div
connection divided into two in ad
divided h
rate na
and frequent network
network partitions.
partitions. If a TCP a
connection ad hoc
network T
vould be tolerable when the network
an then it will lead to much packet
lead to much packet loss. This

development ot transport protocols for ad partitions


development of tions exist
exist for prolong period. Therefore, the
hoc networks should take the
into consideration
aforementioned issues,.

Pricing scheme : In ad hoc network, if any mobile node


is not interested in relaying a packe
to its neighbors, it can decide to
power off. In spite of that a node is having an
communicate with other node and any intermediate node on the path optimal path to
packet is decided to power down, then the sender node cannot use that supposed relay it
to the

may force to determine or consider


optimal path; instead
a costlier alternate path which is
more resources and hence
non-optimal, consumes
highly affects the throughput of the system.
QoS provisioning : It is the
performance level of services which is offered by a service
provider. If there is a better coordination and cooperation between service provider and the
user, then high QoS can be achieved. Some of the QoS parameters, QoS-aware routing and
QoS frameworks are discussed below.
QoS parameters differ from application to application. For instance, bandwidth and delay
are the important key parameters of multimedia
applications. Identifying trusty nodes and
routing the packets through them are key parameters of defense applications. Multiple link
disjoint paths and availability are the key parameters of emergency and rescue operations
related applications. Energy conservation and battery life are the major QoS parameters in
sensor networks.

QoS aware routing protocol should possess QoS parameters for determining routing path.
The routing measures considered are network throughput, packet delivery ratio, packet loss
rate, delay, reliability, bit error rate and bandwidth consumption.
QoS framework is a complete system that is used to provide the assured services to the
concerned user or application. The key component of QoS framework is a QoS service model
that defines the serving way of user requirements. One of the design issues is whether to
provide service in per-session basis or per-class basis. The other key components are QoS
routing, QoS signaling, QoS MAC, connection admission control and scheduling schemes.
Self-organization: The mobile nodes in ad hoc networks would self-configure the network
by itself. Self-organization includes neighbor discovery, topology organization and
reorganization. Beacon signals would be exchanged between mobile nodes during neighbor
discovery. For organizing topology, every node gathers information from other nodes. During
topology reorganization, every node maintains the updated information. The topology of the
Wireless Ad Hoc Network

due to high mobility, node tailures and frequent networ


work
nefwork would be changed
partitioning
challenging hoc wireless networks, especially in
in ad militany
Security: Security is a one
classified into two types:
aras The attacks in ad hoc wireless network are broadly

Passive attack

Active attack
In general. passive attacks would be caused by malicious nodes present in the network to
obtain the information being exchanged in the network. This type of attack would not interfere
in network operations. Active attacks would disturb the network operation. If the network
are called
operation is disrupted by mobile nodes (attackers) available within the network
internal attackers; if the network operation is interrupted by the mobile nodes (attackers)
which is in external network are called as external attackers. Some of the security threats exist
in ad hoc wireless network are Denial-of-Service (DoS), resource consumption, host
impersonation, information disclosure and interference.
Addressing and service discovery: Address of a mobile node is a globally unique identifier
used for communication in ad hoc wireless network. Since nodes join into a new network and
leave from the current network any time, any auto-configuration addressing scheme is
required to allocate non-duplicate addresses to the nodes. Ad hoc wireless network also
requires a duplicate address-detection mechanism in order to maintain unique addressing
throughout the network. Since the ad hoc network foms frequent dynamic topology, cfficient
service advertisement mechanism also required to locate services that other nodes provide.

Energy management : It is the process of managing the sources and consumers of energy in a
node to boost up the lifetime ofthe node in the network. Energy management can be clasified
into four categories
Transmission power management
Battery energy management
Processor power management
Device power management
Some of the functions of energy management mechanisms are enhancing battery lifte of a
node by shaping the energy discharge pattern, determining routing path with minimum energy
consumption, using distributed scheduling schemes to enhance battery life of a node and
minimize the power consumption of
processor and other computing devices during da"
transfer.

Deployment considerations: The


deployment considerations of ad hoc wireless nefworso
when compare with wired networks are low cost of
short deployment time, re-configurability and
deployment, incremental deploymeu
non-estimation of future traffic growth
network.)

You might also like