Adhoc and Wireless Sensor Networks Questions
Adhoc and Wireless Sensor Networks Questions
Unit 1
4. The mesh topology of wireless mesh networks provides many alternate path for
_________ session between a source and destination.
A)data transfer
B)communication
C) network
Answer: A) Data transfer
6. The capacity of a _______ network can be increased if the network incorporate the
properties of multi-hop relaying along with the support of existing fixed infrastructure.
A)Distributed
B) Cellular
C) wireless
Answer: B) Cellular
7. The MAC protocol design should take into account the requirements of _______
synchronization.
A)Time
B)Data
C) session
Answer: A)time
8. ________ refers to the ability of the MAC protocol to provide an equal share or weighted
share of the bandwidth to all competing nodes.
A)Access
B)Fairness
C)Mesh network
Answer: B) Fairness
9. Major goal of Cellular network routing and call admission are to maximize __________
ratio and minimize the _______ratio.
A) call drop & call acceptance
B) call increase & call decrease
C) call acceptance & call drop
Answer: C) call acceptance & call drop
10. Main aim of ad hoc Wireless network routing is to fine paths with ______ overhead and
also quick reconfiguration of broken paths.
A) Minimum
B) Maximum
C) Increased
Answer: A) Minimum
Fill in the Blanks.
1. An ad-hoc wireless network is a ____________ network that does not rely on any
centralized infrastructure.
Ans: decentralized
2. In ad-hoc wireless networks, devices communicate directly with each other, forming a
____________ network.
Ans: peer-to-peer
4. One advantage of ad-hoc wireless networks is their ____________, allowing for quick
deployment and setup.
Ans: flexibility
6. The lack of a central infrastructure in ad-hoc wireless networks can lead to ____________
issues as the network grows larger.
Ans: scalability
7. Ad-hoc wireless networks often rely on ____________ algorithms to facilitate data routing
between devices.
Ans: routing
9. Ad-hoc wireless networks can be vulnerable to ____________ attacks, as they lack the
robust security measures of traditional networks.
Ans: Personal Hotspot
10. In military operations, ad-hoc wireless networks play a crucial role in establishing
____________ communication between troops.
Ans: tactical
11. The ____________ of devices participating in an ad-hoc network can affect its overall
performance and stability.
Ans: number
12. Ad-hoc wireless networks are commonly used in emergency situations when traditional
communication infrastructures are ____________.
Ans: damaged or unavailable.
13. The range of ad-hoc wireless networks can be extended by using ____________ nodes
that act as intermediaries between distant devices.
Ans: intermediary
14. Mobile ad-hoc networks (MANETs) are a specific type of ad-hoc network that allows
devices to ____________ their positions.
Ans: dynamically
15. Ad-hoc wireless networks have applications in ____________ monitoring, where sensors
communicate directly with each other.
Ans: environmental
16. The absence of a central authority in ad-hoc wireless networks makes them ____________
and adaptable.
Ans: organizing
17. The performance of ad-hoc wireless networks may ____________ in areas with high
interference or congestion.
Ans: degrade
18. Ad-hoc wireless networks can be formed using various technologies, including
____________ and Bluetooth.
Ans: Wi-Fi
19. In disaster-stricken areas, ad-hoc wireless networks can provide a lifeline for
____________ and relief coordination.
Ans: communication
20. The future of ad-hoc wireless networks looks promising, with advancements in
____________ and communication protocols.
Ans: technology
Two Mark Questions
Emergency Operations:
• Ad hoc wireless networks are very useful in emergency operations such as search and
rescue, crowd control, and commando operations. The major factors that favor ad hoc
wireless networks for such tasks are self-configuration of the system with minimal
overhead, independent of fixed or centralized infrastructure, the nature of the terrain of
such applications, the freedom and flexibility of mobility, and the unavailability of
conventional communication infrastructure.
• In environments where the conventional infrastructure-based communication facilities
are destroyed due to a war or due to natural calamities such as earthquakes, immediate
deployment of ad hoc wireless networks would be a good solution for coordinating
rescue activities. Since the ad hoc wireless networks require minimum initial network
configuration for their functioning, very little or no delay is involved in making the
network fully operational.
• Wireless mesh networks are ad hoc wireless networks that are formed to provide an
alternate communication infrastructure for mobile or fixed nodes/users, without the
spectrum reuse constraints and the requirements of network planning of cellular
networks. The mesh topology of wireless mesh networks provides many alternate paths
for a data transfer session between a source and destination, resulting in quick
reconfiguration of the path when the existing path fails due to node failures.
• Mesh networks provide the most economical data transfer capability coupled with the
freedom of mobility. Since the infrastructure built is in the form of small radio relaying
devices fixed on the rooftops of the houses in a residential zone, or similar devices fitted
on the lamp posts. The investment required in wireless mesh networks is much less than
what is required for the cellular network counterparts.
• Such networks are formed by placing wireless relaying equipment spread across the
area to be covered by the network. The possible deployment scenarios of wireless mesh
networks include:
1. Residential zones
2. Highways
3. Business zones
4. Important civilian regions
5. University campuses
• Sensor networks are a special category of ad hoc wireless networks that are used to
provide a wireless communication infrastructure among the sensors deployed in a
specific application domain. Sensor nodes are tiny devices that have the capability of
sensing physical parameters, processing the data gathered, and communicating over the
network to the monitoring station. A sensor network is a collection of a large number
of sensor nodes that are deployed in a particular region. The activity of sensing can be
periodic or sporadic.
• The issues that make sensor networks a distinct category of ad hoc wireless networks
are the following:
1. Mobility of nodes
2. Size of the network
3. Density of deployment
4. Power constraints
➢ Replenishable power source
➢ Non-replenishable power source
➢ Regenerative power source
20 Mark Questions
1.______ is defined at the ratio of the bandwidth used for actual data transmission to the total
available bandwidth. The MAC protocol for ad-hoc networks should maximize it.
a). Bandwidth efficiency
b). Collision masking
c). Fading
Ans: a). Bandwidth efficiency
2._________can be achieved by exchange of control packets.
a). Exposed nodes
b). Synchronization
c). Fading
Ans: b). Synchronization
3. When a node wants to transmit a data packet, it first transmits a_________frame.
a). RTS (Request to Send)
b). CTS (Clear to Send)
c). BTS
Ans: b). a). RTS (Request to Send)
4). _________refers to the process of gaining control of the channel. At any time only one node
is assigned to use the channel.
a). Collision masking
b). Hidden stations
c). Floor acquisition
Ans: c). Floor acquisition
5). _________used for transmitting the busy tone signal
a). Broadcast Channel
b). Control channel
c). Synchronization
Ans: b). Control channel
6). A ___________is responsible for end-to-end reservation and release of bandwidth
resources.
a). QoS routing protocol
b). A MAC protocol
c). A reservation protocol
Ans: a). QoS routing protocol
b). Synchronous
8). Carrier-sensing by the sender, followed by the _____control packet exchange, enables the
protocol to perform as efficiently as MACA.
a). RTS
b). CTS
c). RTS-CTS
9). A_____ can transmit on the data channel only if it finds the busy tone to be absent on the
control channel.
a). Node
b). Data packet
c). Protocol
Ans: a). Node
10). _______piggy-backs the priority tag of a node’s current and head-of-line packets o the
control and data packets
a). Distributed priority scheduling (DPS)
b). MAC layer protocol
c). Data packet
Ans: a). Distributed priority scheduling (DPS)
1 MARK (FILL UP)
1. --------------- is defined at the ratio of the bandwidth used for actual data transmission to
the total available bandwidth.
Answer: Synchronization.
3. When a node wants to transmit a data packet, it first transmits a ------------ frame.
Answer: PRMA
10. --------------- extends PRMA protocol in a wireless LAN.
Answer: D-PRMA
11. The ------------protocol assumes the availability of global time at all nodes.
Answer: Nodes
13. A --------------protocol is responsible for end-to-end reservation and release of bandwidth
resources.
3.What are all issues Mac protocol for ad hoc wireless network?
Ans:
• Bandwidth efficiency is defined at the ratio of the bandwidth used for actual data
transmission to the total available bandwidth. The MAC protocol for ad-hoc networks
should maximize it.
• Quality of service support is essential for time-critical applications. The MAC
protocol for ad-hoc networks should consider the constraint of ad-hoc networks.
• Synchronization can be achieved by exchange of control packets.
6.What is HRMA?
Ans:
• A multichannel MAC protocol which is based on half-duplex, very slow frequency-
hopping spread spectrum (FHSS) radios
• Uses a reservation and handshake mechanism to enable a pair of communicating
nodes to reserve a frequency hop, thereby guaranteeing collision-free data
transmission.
• Can be viewed as a time slot reservation protocol where each time slot is assigned a
separate frequency channel.
10.DWOP?
Ans:
Distributed Wireless Ordering Protocol (DWOP):
• A media access scheme along with a scheduling mechanism
• Based on the distributed priority scheduling scheme
10 MARK
20 MARK
MCQ QUESTIONS
2. What are the major challenges in designing a routing protocol for ad-hoc
wirelessnetworks?
a) Limited power and bandwidth, node mobility, and network scalability
4. How do Table Driven Routing Protocols keep their routing tables updated?
10. Which type of routing protocol dynamically adjusts routing paths to account
forchanging network conditions?
a) Table Driven Routing Protocols
12. Which routing protocol category is known for its ability to handle highly dynamic
and mobile ad-hoc networks efficiently?
a) Table Driven Routing Protocols
14. When using Power-Aware Routing Protocols, what is the primary objective?
15. Which routing protocol type is less susceptible to network changes and failures
due toits proactive nature?
a) Table Driven Routing Protocols
b) On-Demand Routing Protocols
c) Hybrid Routing Protocols
d) Hierarchical Routing Protocols
ANS : a) Table Driven Routing Protocols
16. DSR (Dynamic Source Routing) is an example of which routing protocol type?
17. How do Hybrid Routing Protocols combine the features of Table Driven and
On-Demand Routing Protocols?
a) By using routing tables and on-demand route setup when needed
b) By maintaining separate networks for each protocol type
c) By assigning different routing protocols to different nodes
d) By using only one protocol type at a time, based on network conditions
ANS : a) By using routing tables and on-demand route setup when needed
18. Which routing protocol type is best suited for highly dynamic networks where
nodes frequently join or leave the network?
a) Table Driven Routing Protocols
b) On-Demand Routing Protocols
c) Hybrid Routing Protocols
d) Power-Aware Routing Protocols
ANS : b) On-Demand Routing Protocols
19. When using Hierarchical Routing Protocols, what is the role of the cluster head?
d) It manages the communication within the cluster and handles routing decisions
ANS : d) It manages the communication within the cluster and handles routing decisions
20. Which routing protocol type is particularly useful in scenarios where the
powersupply is limited, such as in sensor networks?
a) Table Driven Routing Protocols
5. One of the essential requirements for routing protocols in ad hoc wireless networks is
efficient and effective management to adapt to
node movement.
Answer: mobility.
6. The radio band in wireless networks is limited, resulting in lowerdata rates compared
to wired networks, necessitating routing protocols to use the available optimally.
Answer: bandwidth.
7. Ad hoc wireless networks require routing protocols that can minimize overhead to
utilize the limited effectively.
Answer: bandwidth.
9. Due to the frequent changes in network topology, routing protocolsin ad hoc wireless
networks require more to maintain consistent
topological information at all nodes.
Answer: control overhead.
10. Efficient routing protocols in wired networks demand complete topology
information, making them less suitable for routing in ad hocwireless networks due to their
nature.
Answer: bandwidth wastage.
11. The broadcast nature of the radio channel in ad hoc wireless networks introduces a
unique challenge as wireless links have
characteristics in terms of link capacity and link-error probability.
Answer: time-varying.
12. Ad hoc wireless network routing protocols need to interact with the MAC layer to
find alternate routes through better-quality links tohandle the challenges posed by the
radio channel.
Answer: error-prone shared broadcast.
13. The hidden terminal problem in ad hoc wireless networks refers tothe collision of
packets at a receiving node due to simultaneous transmissions from nodes that are not
within the transmission
range of the sender.
Answer: direct.
14. Solutions to the hidden terminal problem in ad hoc wireless networks include
medium access collision avoidance (MACA), medium access collision avoidance for
wireless (MACAW), floor acquisition multiple access (FAMA), and dual busy tone
multipleaccess (DBTMA). Among these, MACA requires a two-way handshake control
protocol known as .
Answer: RTS-CTS protocol exchange.
15. An improved version of the MACA protocol, called MACAW, requires the receiver
to acknowledge each successful reception of a data packet, resulting in a four-way
exchange mechanism, namely________.
Answer: RTS-CTS-Data-ACK.
16. Even in the absence of bit errors and mobility, the RTS-CTS control packet exchange
cannot ensure data transmission in ad hoc
wireless networks.
Answer: collision-free.
17. In an ad hoc wireless network environment, specialized routing protocols are necessary
to address the challenges due to issues such as
, , and .
Answer: mobility of nodes, resource constraints, and error-prone shared
broadcast radio channel.
18. Wired network routing protocols are not suitable for ad hoc wireless networks because
they cannot handle the of nodes, limited
, and unique challenges posed by the .
Answer: mobility, bandwidth, error-prone shared broadcast radiochannel.
19. A routing protocol designed for ad hoc wireless networks shouldbe fully to
avoid high control overhead and ensure scalability, making it more than
centralized routing.
Answer: distributed, fault-tolerant.
20. Given the highly dynamic nature of ad hoc wireless networks, therouting protocol
must be adaptive to frequent changes in .
Answer: network topology.
21. Efficient route computation and maintenance in ad hoc wireless networks should
involve a minimum number of nodes to ensure quickaccess to routes and minimize .
Answer: connection setup time.
22. CEDAR is a specialized routing protocol for ad hoc wireless networks based on
extracting , which approximates the minimum
dominating set of the network.
Answer: core nodes.
24. CEDAZRP is another routing protocol for ad hoc wireless networks that reduces
control overhead by avoiding approaches
and periodic flooding of routing information.
Answer: on-demand.
25. Zone-Based Hierarchical Link State Routing Protocol (ZHLS) requires each node
to have location information with GPS, node ID,zone ID, and topology inside the .
Answer: zone.
2 MARKS QUESTIONS
1. Define Mobility?
Mobility models characterize the movements of mobile users with respect to their location,
velocity and direction over a period of time. These models play an vital role in the design of
Mobile Ad Hoc Networks (MANET). Most of the times simulators play a significant role in
testing the features of mobile ad hoc networks..
2. Define Bandwidth ?
• Bandwidth is typically defined as the number of bits, kilobits, megabits, or gigabits
that may be sent in one second.
• Bandwidth and capacity are terms that are used interchangeably to describe the pace
at which data is delivered.
4. What are the Types of Routing Protocols for ad hoc wireless networks?
The routing protocols for ad hoc wireless networks can be broadly classified into four
categories based on
• Routing information update mechanism
• Use of temporal information for routing
• •Routing topology
• Utilization of specific resource 5.Define Flat topology routing protocols?
Protocols that fall under this category make use of a flat addressing scheme similar to the one
used in IEEE 802.3 LANs. It assumes the presence of a globally unique (or at least unique to
the connected part of the network) addressing mechanism for nodes in an ad hoc wireless
network.
11. what are the issues in designing a routing protocol in for adhoc wireless networks?
The issues in designing a routing protocol in for adhoc wireless networks are:
• Mobility of nodes
• Resource constraints Error-prone channel state
• Hidden and exposed terminal problems Bandwidth constraint
• Highly dynamic frequent path breaks Frequent topology changes
• Shared broadcast radio channel
14. What are the Characteristics of A routing protocol for ad hoc wireless networks?
1. It must be fully distributed, as centralized routing involves high control overhead and
hence is not scalable. Distributed routing is more fault-tolerant than centralized
routing, which involves the risk of single point of failure.
2. It must be adaptive to frequent topology changes caused by the mobility of nodes 3.It
must be loop-free and free from stale routes
10 MARKS QUESTIONS
QUESTIONS:
1. Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless Networks.
2. Hybrid Routing Protocols.
3. Hierarchical Routing Protocols.
4. Power-Aware Routing Protocols.
ANSWERS:
1. Characteristics of an Ideal Routing Protocol for Ad Hoc Wireless Networks.
Due to the issues in an ad hoc wireless network environment discussed so far, wired network
routing protocols cannot be used in ad hoc wireless networks. Hence ad hoc wireless networks
require specialized routing protocols that address the challenges described above. A routing
protocol for ad hoc wireless networks should have the following characteristics:
1. It must be fully distributed, as centralized routing involves high control overhead and
hence is not scalable. Distributed routing is more fault-tolerant than centralized routing,
which involves the risk of single point of failure.
2. It must be adaptive to frequent topology changes caused by the mobility of nodes.
3. Route computation and maintenance must involve a minimum number of nodes. Each
node in the network must have quick access to routes, that is, minimum connection
setup time is desired.
4. It must be localized, as global state maintenance involves a huge state propagation
control overhead.
5. It must be loop-free and free from stale routes.
6. The number of packet collisions must be kept to a minimum by limiting the number of
broadcasts made by each node. The transmissions should be reliable to reduce message
loss and to prevent the occurrence of stale routes.
7. It must converge to optimal routes once the network topology becomes stable. The
convergence must be quick.
8. It must optimally use scarce resources such as bandwidth, computing power, memory,
and battery power.
9. Every node in the network should try to store information regarding the stable local
topology only. Frequent changes in local topology, and changes in the topology of parts
of the network with which the node does not have any traffic correspondence, must not
in any way affect the node, that is, changes in remote parts of the network must not
cause updates in the topology information maintained by the node.
10. It should be able to provide a certain level of quality of service (QoS) as demanded by
the applications, and should also offer support for time-sensitive traffic.
• A dominating set (DS) of a graph is defined as a set of nodes that every node in the
graphis either in the DS or is a neighbor of some node in the DS.
– There exists at least one core node within three hops
• Core broadcast: core nodes transmit any packet throughout the network in the unicast
– Virtual link: the path between two core nodes
• QoS Path:
– First phase: Finding a core path from the source node to the destination
• First phase
– A node initiates a RouteRequest if the destination is not in the local topology table of its
corenode.
– Source core node uses core broadcast to send RouteRequest to neighboring core nodes.
– The recipient core node forwards the RouteRequest to its neighboring core nodes if the
destination is not its core member.
– A core node which has the destination as its core member replies to the source core.
• Second phase
– MidCore: the farthest core node in the core path with required bandwidth found by the
sourcecore.
– When the source finds a MidCore, MidCore becomes the new source core and finds
another MidCore in the next iteration until a path to the destination with the required
bandwidth is found.
CEDAR
• Advantage
– It performs both routing and QoS path computation very efficiently with the help of
corenodes
• Disadvantage
– The movement of the core nodes affects the performance of the protocol.
– The update information of core nodes could cause a significant of control overhead.
– It brakes all nodes in the routing zone into interior nodes and peripheral nodes.
– Each node maintain routing path to all nodes in the routing zone by exchanging periodic
routeupdate packets.
• Inter-zone routing protocol (Reactive routing)
Zone Routing Protocol (ZRP)
– If d isn’t in the zone, s broadcasts (uses unicast routing) the RouteRequest to its
peripheralnodes.
– If any peripheral node finds d in its zone, it sends a RouteReply back to s indicating
thepath.
– Otherwise, the peripheral node rebroadcasts the RouteRequest again.
• The query control must ensure that redundant or duplicate RouteRequests are not
forwarded.
• Advantage
– ZRP reduces the control overhead employed in on-demand approach and the
periodicflooding of routing information in table-driven.
• Disadvantage
– In the absence of a query control, ZRP tends to produce higher control overhead.
– The decision on the zone radius has a significant impact on the performance of the
protocol
• Each node requires its location information (with GPS), node ID, zone ID and topology
insidethe zone.
• Intra-zone
• Gateway node
– The nodes receive link responses form nodes belonging to other zones.
– Every nodes in a zone is aware of the neighboring zones and their corresponding
Gatewaynodes.
Zone-Based Hierarchical Link State Routing Protocol (ZHLS)
• Inter-zone
– By using zone link state packets, a node can build the zone topology.
– The zone routing table is formed by executing the shortest path algorithm.
– If Dest is in the same zone, the packets are delivered by the intra-zone routing table.
– If Dest is not in the zone, Src generates a location request packet and forward it to every
other zone.
– The gateway nodes receiving the location request packet verifies its routing table for
Dest. The gateway node which finds Dest in its zone send a location response packet
containing thezone information to the Src.
• ZHLS reduces the storage requirements and the communication overhead.
• But the creation of zone-level topology incurs the additional overhead. And the paths are
notoptimal.
3. Hierarchical Routing Protocols.
Hierarchical Routing Protocols
• Elected leaders at every level from the members at the immediate higher level.
• The physical clustering is done among the nodes that are reachable in a single wireless hop.
– slot/frequency/code allocation
– call admission control
– After obtaining information from its peers, it floods the information to the lower levels.
• Hierarchical addressing can help in operation with reducing routing information exchanges.
• The storage required is O(n x m) compared to O(nm) that is required for a flat topology
linkstate routing protocol.
– n is the average number of nodes in a cluster.
• FSR uses the fisheye technique to reduce routing overhead and graphical data.
• FSR maintains the topology of the network at every node and computes the shortest paths.
– Periodically, every node exchanges topology information with sequence numbers only
withits neighbors.
– The accuracy decreases with an increase in the distance from the center of the focal
point.
• Scope: the set of nodes that can be reached in a specific numbers of hops.
Fisheye State Routing Protocol (FSR)
• FSR is suitable for large and highly mobile ad hoc wireless networks.
• The number of hops with each scope level has significant influence on the performance.
4. Power-Aware Routing Protocols.
• In ad hoc networks, the routers are also equally power-constrained just as the nodes are.
• The use of routing metrics that consider the capabilities of the power source of
nodescontributes to efficient utilization of energy and increases the lifetime of the
networks.
– Minimize the power consumed by a packet in traversing from the source node to
thedestination node
• Maximize Network Connectivity
– Minimize the maximum cost per node for a packet after routing a number of packets
orafter a specific period.
20 MARKS QUESTIONS
QUESTIONS:
1. Issues in Designing a Routing Protocol for Ad-hoc Wireless Networks.
2. Classification of Routing Protocols.
3. Table Driven Routing Protocols.
ANSWERS:
The major challenges that a routing protocol designed for ad hoc wireless networks faces are
mobility of nodes, resource constraints, error-prone channel state, and hid den and exposed
terminal problems. A detailed discussion on each of the followingis given below.
Mobility
The network topology in an ad hoc wireless network is highly dynamic due to the movement
of nodes, hence an on-going session suffers frequent path breaks. Disruption occurs either due
to the movement of the intermediate nodes in thepath or due to the movement of end nodes.
Such situations do not arise because of reliable links in wired networks where all the nodes are
stationary. Even though the wired network protocols find alternate routes during path breaks,
their convergence is very slow. Therefore, wired network routing protocols cannot be used in
ad hoc wireless networks where the mobility of nodes results in frequently changing network
topologies. Routing protocols for ad hoc wireless networks must be able to perform efficient
and effective mobility management.
Bandwidth Constraint
Abundant bandwidth is available in wired networks due to the advent of fiber optics and due to
the exploitation of wavelength division multiplexing (WDM) technologies. But in a wireless
network, the radio band is limited, and hence the data rates it can offer are much less than what
a wired network can offer. This requires that the routingprotocols use the bandwidth optimally
by keeping the overhead as low as possible.
The broadcast nature of the radio channel poses a unique challenge in ad hoc wireless networks.
The wireless links have time-varying characteristics in terms of link capacity and link-error
probability. This requires that the ad hoc wireless network routing protocol interacts with the
MAC layer to find alternate routes through better- quality links. Also, transmissions in ad hoc
wireless networks result in collisions of data and control packets. This is attributed to the hidden
terminal problem [1]. Therefore, it is required that ad hoc wireless network routing protocols
find paths withless congestion.
The hidden terminal problem refers to the collision of packets at a receiving node due to the
simultaneous transmission of those nodes that are not within the direct transmission range of
the sender, but are within the transmission range of the receiver. Collision occurs when both
nodes transmit packets at the same time without knowing about the transmission of each other.
For example, consider Fig ure 7.1. Here, if both node A and node C transmit to node B at the
same time, their packets collide at node B. This is due to the fact that both nodes A and C are
hidden from each other, as they are not within the direct transmission range of each other and
hence do not know about the presence of each other. Solutions for this problem include medium
access collision avoidance (MACA) [2], medium ac-cess collision avoidance for wireless
(MACAW) [3], floor acquisition multiple access (FAMA) [4], and dual busy tone multiple
access (DBTMA) [5]. MACA requires that a transmitting node first explicitly notifies all
potential hidden nodes about the forthcoming transmission by means of a two-way handshake
control protocol called the RTS-CTS protocol exchange. Note that this may not solve the
problem completely, but it reduces the probability of collisions. To increase the efficiency, an
improved version of the MACA protocol known as MACAW [3] has been proposed. This
protocol requires that the receiver acknowledges each successful reception of a data packet.
Hence, successful transmission is a four-way exchange mechanism, namely, RTS-CTS-Data-
ACK. Even in the absence of bit errors and mobility, the RTS-CTS control packet exchange
cannot ensure collision-free data transmission
that has no interference from hidden terminals. One very important assumption made is that
every node in the capture area of the receiver (transmitter) receives the CTS (RTS) cleanly.
Nodes that do not hear either of these clearly can disrupt the successful transmission of the
Data or the ACK packet. One particularly trouble some situation occurs when node A, hidden
from the transmitter T and within the capture area of the receiver R, does not hear the CTS
properly because it is within the capture area of node B that is transmitting and that is hidden
from both R and T, as illustrated in Figure 7.2. In this case, node A did not successfully receive
the CTS originated by node R and hence assumes that there is no on-going transmission in the
neighborhood.Since node A is hidden from node T, any attempt to originate its own RTS
would result in collision of the on-going transmission between nodes T and R.
The exposed terminal problem refers to the inability of a node which is blocked due to
transmission by a nearby transmitting node to transmit to another node. Consider the example
in Figure 7.3. Here, if a transmission from node B to another node A is already in progress,
node C cannot transmit to node D, as it concludes that itsneighbor, node B, is in transmitting
mode and hence should not interfere with
the on-going transmission. Thus, reusability of the radio spectrum is affected. For node C to
transmit simultaneously when node B is transmitting, the transmitting frequency of node C
must be different from its receiving frequency.
Resource Constraints
Two essential and limited resources that form the major constraint for the nodes in an ad hoc
wireless network are battery life and processing power. Devices used in ad hoc wireless
networks in most cases require portability, and hence they also have size and weight
constraints along with the restrictions on the power source. Increasing the battery power and
processing ability makes the nodes bulky and less portable. Thus ad hoc wireless network
routing protocols must optimally manage these resources.
in this direction. The routing protocols for ad hoc wireless networks can be broadlyclassified
into four categories based on
• Routing information update mechanism
• Use of temporal information for routing
• Routing topology
• Utilization of specific resources
Ad hoc wireless network routing protocols can be classified into three major categories based
on the routing information update mechanism. They are:
In table-driven routing protocols, every node maintains the network topology information in
the form of routing tables by periodically exchanging routing information. Routing information
is generally flooded in the whole network. Whenever a node requires a path to a destination, it
runs an appropriate path-finding algorithm on the topology information it maintains. Table-
driven routing protocols arefurther explored in Section 7.4.
Protocols belonging to this category combine the best features of the above two categories.
Nodes within a certain distance from the node concerned, or within a particular geographical
region, are said to be within the routing zone of the given node. For routing within this zone,
a table-driven approach is used. For nodes that are located beyond this zone, an on-demand
approach is used. Section 7.6 describes the protocols belonging to this category in detail.
This classification of routing protocols is based on the use of temporal information used for
routing. Since ad hoc wireless networks are highly dynamic and path breaks are much more
frequent than in wired networks, the use of temporal information regarding the lifetime of the
wireless links and the lifetime of the paths selected assumes significance. The protocols that
fall under this category can be further classified into two types:
These routing protocols use information about the past status of the links or the status of
links at the time of routing to make routing decisions. For example, the routingmetric
based on the availability of wireless links (which is the cur rent/presentinformation here)
along with a shortest path-finding algorithm, provides a path thatmay be efficient and
stable at the time of path-finding. The topological changes mayimmediately break the path,
making the path undergo a resource-wise expensive pathreconfiguration process.
Protocols belonging to this category use information about the expected future status of the
wireless links to make approximate routing decisions. Apart from the life time of wireless links,
the future status information also includes information regarding the lifetime of the node
(which is based on the remaining battery charge and dischargerate of the non-replenishable
resources), prediction of location, and prediction of link availability.
Routing topology being used in the Internet is hierarchical in order to reduce the state
information maintained at the core routers. Ad hoc wireless networks, due to their relatively
smaller number of nodes, can make use of either a flat topology or a hierarchical topology for
routing.
Protocols belonging to this category make use of a logical hierarchy in the network and an
associated addressing scheme. The hierarchy could be based on geographical information or it
could be based on hop distance.
1. Power-aware routing: This category of routing protocols aims at mini mizing the
consumption of a very important resource in the ad hoc wireless networks: the battery power.
The routing decisions are based on minimizing the power consumption either locally or
globally in the network.
These protocols are extensions of the wired network routing protocols. Theymain tain
the global topology information in the form of tables at every node. Thesetables are updated
frequently in order to maintain consistent and accurate net workstate information. The
destination sequenced distance-vector routing protocol(DSDV), wireless routing protocol
(WRP), source-tree adaptive routing protocol(STAR), and cluster-head gateway switch
routing protocol (CGSR) are some ex amples for the protocols that belong to this category.
The destination sequenced distance-vector routing protocol (DSDV) [6] is one of the first
protocols proposed for ad hoc wireless networks. It is an enhanced version of the distributed
Bellman-Ford algorithm where each node maintains a table that contains the shortest distance
and the first node on the shortest path to every other node in the network. It incorporates table
updates with increasing sequence number tags to prevent loops, to counter the count-to-
infinity problem, and for faster convergence. As it is a table-driven routing protocol, routes to
all destinations are readily available at every node at all times. The tables are exchanged
between neighbors at regular intervals to keep an up-to-date view of the network topology. The
tables are also forwarded if a node observes a significant change in local topology. The table
updates are of two types: incremental updates and full dumps. An incremental update takes a
single network data packet unit (NDPU), while a full dump may take multiple NDPUs.
Incremental updates are used when a node does not observe significant changes in the local
topology. A full dump is done either when the local topology changes significantly or when an
incremental update requires more than a single NDPU. Table updates are initiated by a
destination with a new sequence number which is always greater than the previous one. Upon
receiving an updated table, a node either updates its tables based on the received information
or holds it for some time to select the best metric (which may be the lowest number of hops)
received from multiple versions of the same update table from different neighboring nodes.
Based on the sequence number of the table update, it may forward or reject the table. Consider
the example as shown in Figure 7.5 (a). Here node 1 is the source node and node 15 is the
destination. As all the nodes maintain global topology information, the route is already
available as shown in Figure 7.5 (b). Here the routing table of node 1 indicates that the shortest
route to the destination node (node 15) is available through node 5 and the distance to it is 4
hops, as depicted in Figure 7.5 (b).
The reconfiguration of a path used by an on-going data transfer session is handled by the
protocol in the following way. The end node of the broken link initiates a table update message
with the broken link’s weight assigned to infinity (∞) and with a sequence number greater than
the stored sequence number for that destination. Each node, upon receiving an update with
weight ∞, quickly disseminates it to its neighbors in order to propagate the broken-link
information to the whole net-work.
Thus a single link break leads to the propagation of table update information to the whole
network. A node always assigns an odd sequence number to the link break update to
differentiate it from the even sequence number generated by the destination.Consider the case
when node 11 moves from its current position, as shown in Figure
7.6. When a neighbor node perceives the link break, it sets all the paths passing through the
broken link with distance as ∞. For example, when node 10 knows about the link break, it sets
the path to node 11 as ∞ and broadcasts its routing table to its neighbors. Those neighbors
detecting significant changes in their routing tables rebroadcast it to their neighbors. In this
way, the broken link information propagates throughout the network. Node 1 also sets the
distance to node 11 as ∞. When node 14 receives a table update message from node 11, it
informs the neighbors about the shortest distance to node 11. This information is also
propagated throughout thenetwork. All nodes receiving the new update message with the
higher sequencenumber set the new distance to node 11 in their corresponding tables. The
updated table at node 1 is shown in Figure 7.6, where the current distance from node 1 to node
11 has increased from three to four hops.
Advantages and Disadvantages
The availability of routes to all destinations at all times implies that much less delay is involved
in the route setup process. The mechanism of incremental updates with sequence number tags
makes the existing wired network protocols adaptable to ad hocwireless networks. Hence, an
existing wired network protocol can be applied to adhoc wireless networks with many fewer
modifications. The updates are propagated throughout the network in order to maintain an up-
to-date view of the network topology at all the nodes. The updates due to broken links lead to
a heavy control overhead during high mobility. Even a small network with high mobility or a
large network with low mobility can completely choke the available bandwidth. Hence, this
protocol suffers from excessive control overhead that is proportional to the number of nodes in
the network and therefore is not scalable in ad hoc wireless networks, which have limited
bandwidth and whose topologies are highly dynamic. Anotherdisadvantage of DSDV is that in
order to obtain information about a particular destination node, a node has to wait for a
tableupdate message initiated by the same destination node. This delay could result in stale
routing information at nodes.
Unit – 4
MCQ
3. Which statement best describes the nature of multicast routing in ad-hoc wireless
networks?
a) It is a one-to-many communication paradigm.
b) It is a one-to-one communication paradigm.
c) It is a many-to-many communication paradigm.
d) It is a point-to-point communication paradigm.
Answer: a) It is a one-to-many communication paradigm.
5. How does multicast routing differ from unicast routing in ad-hoc wireless networks?
a) Multicast routing requires additional security measures.
b) Multicast routing only involves communication between neighboring devices.
c) Multicast routing supports simultaneous communication with multiple devices.
d) Multicast routing relies on a centralized controller for data forwarding.
Answer: c) Multicast routing supports simultaneous communication with multiple devices.
6. What are the main issues faced in designing a multicast routing protocol?
a) Scalability and group membership management
b) Energy efficiency and data encryption
c) Quality of Service (QoS) and channel allocation
d) Network topology and unicast routing optimization
Answer: a) Scalability and group membership management
7. Which factor poses a challenge in achieving scalability in multicast routing protocols?
a) Limited bandwidth availability
b) Increasing network congestion
c) Large multicast group sizes
d) Unreliable wireless links
Answer: c) Large multicast group sizes
8. What does effective group membership management involve in multicast routing protocol
design?
a) Efficient distribution of group membership updates
b) Ensuring secure authentication of group members
c) Balancing network load across multicast groups
d) Implementing QoS parameters for different groups
Answer: a) Efficient distribution of group membership updates
9. Why is energy efficiency an important issue in multicast routing protocol design for wireless
networks?
a) Wireless devices have limited battery life
b) Energy consumption affects network coverage
c) Energy-efficient protocols minimize interference
d) Energy optimization improves multicast packet delivery
Answer: a) Wireless devices have limited battery life
10. Which aspect of multicast routing protocol design addresses the delivery of multicast packets
over wireless channels?
a) Congestion control mechanisms
b) Adaptive modulation techniques
c) Quality of Service (QoS) parameters
d) Error control and packet loss recovery
Answer: d) Error control and packet loss recovery
13. How are multicast packets distributed in a shared tree-based routing protocol?
a) They are sent to all devices in the network.
b) They are forwarded only to devices interested in the multicast group.
c) They follow the shortest path between the source and each receiver.
d) They are transmitted through a central server to all devices.
Answer: b) They are forwarded only to devices interested in the multicast group.
14. What is the role of the root node in a shared tree-based multicast routing protocol?
a) It forwards multicast packets to all devices in the network.
b) It manages group membership and controls multicast traffic.
c) It establishes individual unicast connections with all devices.
d) It performs error correction and packet loss recovery.
Answer: b) It manages group membership and controls multicast traffic.
15. How does a receiver join a multicast group in a shared tree-based protocol?
a) By sending a request to the source node.
b) By establishing a unicast connection with the root node.
c) By sending a join message to the nearest router.
d) By subscribing to the multicast group at a higher layer.
Answer: c) By sending a join message to the nearest router.
16. What does the architecture reference model for multicast routing protocols primarily
address?
a) Data encryption techniques in wireless networks
b) Quality of Service (QoS) parameters for routing decisions
c) Group management and control mechanisms for multicast communication
d) Physical layer communication protocols in ad-hoc networks
Answer: c) Group management and control mechanisms for multicast communication
17. Which of the following best describes multicast routing in ad-hoc wireless networks?
a) Unicast communication between two devices
b) Broadcasting data to all devices in the network
c) Sending data to a specific group of devices
d) Point-to-point communication between neighboring devices
Answer: c) Sending data to a specific group of devices
18. What are the main issues in designing a multicast routing protocol?
a) Congestion control and security
b) Unicast routing and channel allocation
c) Energy efficiency and data encryption
d) Scalability and group membership management
Answer: d) Scalability and group membership management
22. Which type of multicast routing protocol establishes a tree structure to forward multicast
data?
a) Tree-based multicast routing protocols
b) Mesh-based multicast routing protocols
c) Reactive multicast routing protocols
d) Proactive multicast routing protocols
Answer: a) Tree-based multicast routing protocols
24. What is the main criterion used for the classification of multicast routing protocols?
a) Bandwidth availability
b) Distance between devices
c) Number of multicast groups
d) Approach to route establishment
Answer: d) Approach to route establishment
25. Which classification of multicast routing protocols is based on whether routes are established
proactively or reactively?
a) Hierarchical and flat-based
b) Source-based and receiver-based
c) Tree-based and mesh-based
d) Scalable and non-scalable
Answer: b) Source-based and receiver-based
26. In source-based multicast routing, who is responsible for building and maintaining the
multicast distribution tree?
a) The multicast receivers
b) The multicast routers in the network
c) The source device sending the multicast data
d) A centralized controller managing multicast traffic
Answer: c) The source device sending the multicast data
28. Which classification of multicast routing protocols is based on the creation of a multicast
distribution tree?
a) Tree-based and mesh-based
b) Reactive and proactive
c) Source-based and receiver-based
d) Scalable and non-scalable
Answer: a) Tree-based and mesh-based
29. In mesh-based multicast routing protocols, how is data forwarded from the source to the
receivers?
a) Through a single path determined by a centralized controller
b) Via multiple paths, taking advantage of mesh network topology
c) Using dynamic unicast routing tables for data distribution
d) By broadcasting data to all devices in the network
Answer: b) Via multiple paths, taking advantage of mesh network topology
30. Which type of multicast routing protocol is better suited for dynamic and large-scale
networks?
a) Tree-based multicast routing protocols
b) Mesh-based multicast routing protocols
c) Source-based multicast routing protocols
d) Receiver-based multicast routing protocols
Answer: b) Mesh-based multicast routing protocols
Fill in the Blanks.
1. Multicast routing plays a crucial role in enabling efficient data dissemination in ad-hoc
wireless networks.
2. One of the main challenges in designing multicast routing protocols is ensuring scalability
in large networks.
3. Multicast routing protocols operate by establishing paths to deliver data from a sender to
multiple receivers in the network.
4. The architecture reference model for multicast routing protocols defines the components
and interactions involved in the multicast process.
5. Multicast routing protocols can be classified based on their underlying techniques and data
delivery mechanisms.
8. One of the key issues in multicast routing is managing group membership dynamically in
a mobile ad-hoc network.
9. The operation of multicast routing protocols involves building multicast trees and
maintaining group membership information.
10. Efficient multicast routing is crucial for minimizing the control overhead and maximizing
the delivery ratio in wireless ad-hoc networks.
11. Challenges in designing multicast routing protocols include handling node mobility and
maintaining a stable distribution structure.
12. The architecture reference model provides a conceptual framework for understanding how
multicast routing protocols function in the network.
14. Tree-based multicast routing protocols, such as the Core-Based Tree (CBT), aim to reduce
overhead by using a shared distribution tree.
15. Mesh-based multicast routing protocols, like ODMRP, form a mesh network among group
members for data forwarding.
16. Efficient multicast routing ensures that data is delivered to group members with minimal
packet duplication and latency.
17. The design of multicast routing protocols should account for varying network topologies
and link qualities in ad-hoc wireless environments.
18. Source-based multicast routing protocols rely on the sender to initiate the multicast tree
construction process.
19. Group-based multicast routing protocols rely on receivers to join the multicast group and
build the distribution structure cooperatively.
20. Multicast routing protocols need to handle network partitions and ensure robust data
delivery in challenging environments.
21. Multicast routing protocols can use proactive or reactive strategies to establish and
maintain multicast paths.
22. A well-designed multicast routing protocol optimizes the use of network resources and
minimizes energy consumption in mobile nodes.
23. Hybrid multicast routing protocols combine tree-based and mesh-based approaches to
achieve a balance between efficiency and adaptability.
24. Efficient multicast routing contributes to reduced network congestion and better overall
performance in ad-hoc wireless networks.
25. Multicast routing protocols should incorporate mechanisms for detecting and recovering
from link failures or node departures.
26. The control overhead of multicast routing protocols can be reduced by employing
advanced techniques like pruning and aggregation.
27. Real-world implementation of multicast routing protocols must address the limitations of
practical wireless communication and hardware.
29. The choice between tree-based and mesh-based multicast routing depends on the specific
network characteristics and application requirements.
30. Future advancements in multicast routing will focus on enhancing reliability, scalability,
and adaptability in ad-hoc wireless networks.
31. Multicast routing protocols need to consider Quality of Service (QoS) requirements to
support diverse applications in ad-hoc wireless networks.
32. An important issue in designing multicast routing protocols is minimizing control message
overhead to conserve bandwidth and energy.
33. The operation of multicast routing protocols involves data encapsulation and forwarding
at intermediate nodes along the multicast tree.
34. Multicast routing protocols should be able to adapt to changing network conditions and
group dynamics in dynamic ad-hoc environments.
35. The Multicast Listener Discovery (MLD) protocol is commonly used in IPv6 networks to
manage group membership for multicast routing.
36. Multicast routing protocols must handle the challenges posed by asymmetric
communication links and varying transmission ranges of nodes.
37. The Shared Tree (ST) and Source-specific Multicast (SSM) are two well-known
approaches in the taxonomy of multicast routing protocols.
38. Multicast routing protocols should support efficient data recovery in case of packet loss or
transmission errors during data dissemination.
39. Different multicast routing algorithms, such as the Reverse Path Forwarding (RPF) and
the Steiner Tree algorithm, are used to construct distribution trees.
40. Scalability and robustness are critical factors in evaluating the performance of multicast
routing protocols in large-scale ad-hoc networks.
8 Mark Questions
1)Discuss the major design issues that need to be addressed while developing a
Multicast Routing Protocol.
Answer:
Designing a multicast routing protocol for ad hoc networks presents several challenges due to
the unique characteristics of such networks. These challenges are as follows:
● Efficiency: Ad hoc networks often suffer from limited bandwidth availability, making
the efficiency of the multicast protocol critical. Multicast efficiency is measured by the
ratio of the total number of data packets received by the receivers to the total number
of packets (data and control) transmitted in the network. The multicast routing protocol
should optimize data dissemination to achieve the highest possible multicast efficiency,
thereby conserving precious bandwidth resources.
● Control Overhead: Managing multicast groups requires the exchange of control packets
to keep track of the group members. However, this control overhead consumes a
considerable amount of bandwidth, which is scarce in ad hoc networks. Hence, an
effective multicast routing protocol should minimize the total number of control
packets transmitted to maintain the multicast group, ensuring efficient bandwidth
utilization.
● Quality of Service (QoS): Ad hoc networks find significant applications in military and
strategic scenarios, where QoS is of paramount importance. QoS parameters such as
throughput, delay, delay jitter, and reliability are essential considerations in ad hoc
multicast routing protocols. The multicast routing protocol should be designed to
provide the required QoS levels to support critical applications effectively.
● Resource Management: Ad hoc networks consist of mobile nodes with limited battery
power and memory. An efficient multicast routing protocol should minimize power
consumption by reducing the number of packet transmissions. Additionally, it should
use minimal state information to conserve memory resources.
Addressing these challenges is crucial in the design of a multicast routing protocol for ad hoc
networks. By prioritizing robustness, efficiency, control overhead reduction, QoS
provisioning, protocol independence, and resource management, multicast routing protocols
can better cope with the dynamic and resource-constrained nature of ad hoc wireless networks,
enabling reliable and efficient multicast communication.
2)Explain the Architecture Reference Model for Multicast Routing Protocols in Ad hoc
Wireless Networks.
Answer:
The Architecture Reference Model for Multicast Routing Protocols in ad hoc wireless
networks comprises three layers in the network protocol stack: the Medium Access Control
(MAC) layer, the Routing layer, and the Application layer. Each layer is responsible for
specific functions and interactions that facilitate efficient multicast communication in these
dynamic networks.
1)MAC Layer: This layer handles the transmission and reception of packets and arbitrates
channel access. For wireless multicast, three crucial functions are performed:
b) Receiver Module: The receiver module handles the reception of packets, enabling nodes
to receive multicast data from other nodes within their communication range.
c) Neighbor List Handler: Informs higher layers about neighboring nodes and maintains a
list of all neighbor nodes using beacons or overhearing packets.
2)Routing Layer: Above the MAC layer is the Routing layer, responsible for forming and
maintaining both unicast sessions and multicast groups. It offers essential multicast services to
the application layer, including joining/leaving a multicast group and transmitting/receiving
multicast packets. The routing layer comprises the following components/modules:
e) Session Maintenance Module: Initiates route repair upon lower-layer link break
notification, restoring the multicast topology using multicast and unicast routing tables.
3)Application Layer: The top layer of the protocol stack is the Application layer, which
interacts with the Routing layer to fulfill the multicast requirements of applications. It consists
of two primary modules:
The interactions between these modules and the actions during the lifetime of a multicast
session, such as joining a group, data packet propagation, and route repair, enable efficient and
reliable multicast communication in ad hoc wireless networks. Overall, the Architecture
Reference Model serves as a guide for understanding the different modules and their
interactions in implementing multicast routing protocols, aiding the design and optimization
of protocols to meet the specific challenges posed by ad hoc wireless networks.
3)Explain the operations of Multicast Routing protocols?
Answer:
Multicast routing protocols in ad hoc wireless networks can be broadly classified into two
types based on their operation: source-initiated protocols and receiver-initiated protocols.
These protocols differ in how they establish and maintain the multicast tree or mesh for
efficient data packet dissemination.
Source-Initiated Protocols:
Source-initiated protocols utilize a soft state maintenance approach to construct and
periodically update the multicast tree or mesh. In this approach, the source(s) of the multicast
group periodically flood JoinRequest (JoinReq) packets throughout the network. These
JoinReq packets are propagated by other nodes, eventually reaching all receivers of the
multicast group.
Receivers express their interest in receiving packets for the group by responding with
JoinReply (JoinRep) packets, which are sent back along the reverse path followed by the
JoinReq packet. These JoinRep packets establish forwarding states in the intermediate nodes,
defining how multicast packets should be forwarded to the appropriate next-hop neighbor
nodes.
In soft state source-initiated protocols, there is no explicit route repair procedure. Instead, the
multicast tree or mesh is periodically refreshed by re-initiating the JoinReq flooding process at
the source(s). This approach ensures that the multicast topology remains updated and can adapt
to dynamic network conditions.
In hard state source-initiated protocols, an explicit route repair procedure is included. When a
link break in the tree or mesh is detected, the upstream node that identifies the broken link
initiates a tree construction procedure, similar to the one initiated by the source. Different
protocols adopt various strategies for route repair. Some protocols assign the responsibility of
searching for the former parent to the downstream node, while others impose this responsibility
on the upstream node.
Receiver-Initiated Protocols:
In receiver-initiated multicast protocols, receivers play an active role in constructing the
multicast tree or mesh. The soft state variant of receiver-initiated protocols follows a three-
phase process for tree (or mesh) construction. The receiver initiates the process by flooding a
JoinReq packet throughout the network. Nodes that are part of the multicast tree or mesh and/or
the sources of the multicast group respond with JoinRep packets, indicating their ability to send
data packets for that multicast group.
The receiver chooses the JoinRep with the smallest hop count (or based on other criteria) and
responds with a JoinAcknowledgment (JoinAck) packet along the reverse path taken by the
JoinRep. Periodically, the receiver initiates this procedure for route maintenance, ensuring the
stability of the multicast topology.
In the hard state variant of receiver-initiated protocols, the initial tree (or mesh) construction
process is similar to the soft state variant. However, when a link break is detected, the
responsibility for restoring the multicast topology can be assigned to either the downstream or
upstream node. In case of the downstream node being responsible, it searches for a route to the
multicast tree (or mesh) through a procedure similar to the initial topology construction
process.
12 Mark Questions
The important services provided by this layer to the ones above are transmission and reception
of packets. This layer also arbitrates access to the channel. Apart from these functions, three
other important functions are performed by this layer that are particularly important in wireless
multicast: detecting all the neighbors (nodes at a hop distance of 1), observing link
characteristics, and performing broadcast transmission/ reception. Corresponding to these
services, the MAC layer can be thought of as consisting of three principal modules:
(a) Transmission module: This module also includes the arbitration module which schedules
transmissions on the channel. The exact nature of this scheduling depends on the MAC
protocol. In general, the MAC protocol might maintain multicast state information based on
past transmissions observed on the channel, and the scheduling is dependent on that state.
(c) Neighbor list handler: This module informs the higher layers whether a particular node is a
neighbor node or not. It maintains a list of all the neighbor nodes. This functionality can be
implemented by means of beacons or by overhearing all packets on the channel.
2. Routing layer: This layer is responsible for forming and maintaining the unicast
session/multicast group. For this purpose, it uses a set of tables, timers, and route caches. The
important multicast services it provides to the application layer are the functions to join/leave
a multicast group and to transmit/receive multicast packets. Most of the multicast routing
protocols operate in the routing layer. Other layers have been touched upon here in order to
clarify the interactions in which the routing layer is involved. The routing layer uses the
following components/modules:
(a) Unicast routing information handler: This serves to discover unicast routes (by an on-
demand or a table-driven mechanism).
(b) Multicast information handler: This maintains all the pertinent information related to the
state of the current node with respect to the multicast groups of which it is a part, in the form
of a table. This state might include a list of its downstream nodes, the address of its upstream
node(s), sequence number information, etc. This table might be maintained per group or per
source per group.
(c) Forwarding module: This uses the information provided by the multicast information
handler to decide whether a received multicast packet should be broadcast, or be forwarded to
a neighbor node, or be sent to the application layer.
(d) Tree/mesh construction module: This module is used to construct the multicast topology.
It can use information provided by the unicast routing information handler for this purpose; for
example, this module might initiate flooding on being requested to join a group by the
application layer. Also, when the application layer process (through module 10) sends session
termination messages to this module, this module transmits the appropriate messages to the
network for terminating the participation of the current node in the multicast session.
(e) Session maintenance module: This module initiates route repair on being informed of a
link break by the lower layer. It might use information from the multicast and unicast routing
tables to perform a search (possibly localized) for the node (upstream or downstream) in order
to restore the multicast topology.
(f) Route cache maintenance module: The purpose of this module is to glean information
from routing packets overheard on the channel for possible use later. Such information might
be the addresses of nodes which have requested for a route to a multicast group source, etc.
The route cache is updated as newer information is obtained from the more recent packets heard
on the channel. This module is usually optional in most multicast protocols. It increases
efficiency by reducing the control overhead.
3. Application layer: This layer utilizes the services of the routing layer to satisfy the multicast
requirements of applications. It primarily consists of two modules:
The interactions between these modules can be understood by considering some actions that
take place during the lifetime of a multicast session:
1. Joining a group: Module 10, which exists in the application layer, makes a request to join
a group to module 5 present in the routing layer, which can use cached information from
module 4 and the unicast route information from module 9. It then initiates flooding of JoinReq
packets (or other mechanisms) by using module 2 of the MAC layer. These JoinReq packets
are passed by module 3 of other nodes to their forwarding module, which updates the multicast
table and propagates this message. During the reply phase, the forwarding states in the
multicast tables of intermediate nodes are established.
2. Data packet propagation: Data packets are handled by module 11 in the application layer,
which passes them on to module 8 (forwarding module), which makes the decision on whether
to broadcast the packets after consulting module 7 (multicast information handler). A similar
process occurs in all nodes belonging to the multicast topology until eventually the data packets
are sent by the forwarding module of the receivers to the application layer.
3. Route repair: Route repair is handled by module 6 on being informed by module 1 of link
breaks. It uses the unicast and multicast routing tables to graft the node back into the multicast
topology.
In BEMRP, the multicast tree construction is initiated by the receivers. When a receiver wants
to join the group, it initiates flooding of Join control packets. The existing members of the
multicast tree, on receiving these packets, respond with Reply packets. When many such Reply
packets reach the requesting node, it chooses one of them and sends a Reserve packet on the
path taken by the chosen Reply packet. When a new receiver R3 (Figure 8.5) wants to join the
multicast group, it floods the Join control packet. The nodes S, I1, and R2 of the multicast tree
may receive more than one Join control packet. After waiting for a specific time, each of these
tree nodes chooses one Join packet with the smallest hop count traversed. It sends back a Reply
packet along the reverse path which the selected Join packet had traversed. When tree node I1
receives Join packets from the previous nodes I9 and I2, it sends a Reply packet to receiver R3
through node I2. The receiver may receive more than one Reply packet. In this case, it selects
the Reply packet which has the lowest hop count, and sends a Reserve packet along the reverse
path that the selected Reply packet had traversed. Here, in Figure 8.5, receiver R3 receives
Reply packets from source S, receiver R2, and intermediate node I1. Since the Reply packet
sent by intermediate node I1 has the lowest hop count (which is 3), it sends a Reserve packet
to node I3, and thus joins the multicast group.
To reduce the control overhead, in BEMRP, tree reconfiguration is done only when a link break
is detected. There are two schemes to recover from link failures.
1. Broadcast-multicast scheme: In this scheme, the upstream node is responsible for finding
a new route to the previous downstream node. When receiver R3 moves from A to B, it gets
isolated from the remaining part of the tree. The upstream node I3 now floods broadcast
multicast packets (with limited TTL). After receiving this packet, receiver R3 sends a Reserve
packet and joins the group again.
2. Local rejoin scheme: In this scheme, the downstream node of the broken link tries to rejoin
the multicast group by means of limited flooding of the Join packets. When the link between
receiver R3 and its upstream node I3 fails (due to movement of node R3), then R3 floods the
Join control packet with a certain TTL value (depending on the topology, this value can be
tuned). When tree nodes receive the Join control packet, they send back the Reply packet. After
receiving the Reply packet, the downstream node R3 rejoins the group by sending a Reserve
packet to the new upstream node I4.
When a tree node or a receiver node comes within the transmission range of other tree nodes,
then unwanted tree nodes are pruned by sending the Quit message. In Figure 8.8, when receiver
R3 comes within the transmission range of the intermediate node I2, it will receive a multicast
packet from node I2 earlier than from node I5. When node R3 receives a multicast packet from
node I2, it sends a Reserve packet to node I2 to set up a new route directly to node I2, and
sends a Quit packet to node I5. Since node R3 is no more its downstream node, node I5 sends
a Quit packet to node I4, node I4 sends a Quit packet to node I3, and node I3 in turn sends a
Quit packet to node I2. Thus unnecessary forwarding nodes are pruned. This mechanism helps
to reduce the number of data packet transmissions.
The main advantage of this multicast protocol is that it saves bandwidth due to the reduction
in the number of data packet transmissions and the hard state approach being adopted for tree
maintenance. Since a node joins the multicast group through its nearest forwarding node, the
distance between source and receiver increases. This increase in distance increases the
probability of path breaks, which in turn gives rise to an increase in delay and reduction in the
packet delivery ratio. Also, since the protocol uses the hard state approach for route repair, a
considerable amount of time is spent by the node in reconnecting to the multicast session,
which adds to the delay in packet delivery.
3. What are mesh-based multicast routing protocols?
In ad hoc wireless networks, wireless links break due to the mobility of the nodes. In the case
of multicast routing protocols, the path between a source and receiver, which consists of
multiple wireless hops, suffers very much due to link breaks. Multicast routing protocols which
provide multiple paths between a source-receiver pair are classified as mesh-based multicast
routing protocols. The presence of multiple paths adds to the robustness of the mesh-based
protocols at the cost of multicast efficiency. In this section, some of the existing mesh-based
multicast routing protocols are described in detail.
In the mesh initialization phase, a multicast mesh is formed between the sources and the
receivers. To create the mesh, each source in the multicast group floods the JoinReq control
packet periodically. Upon reception of the JoinReq control packet from a source, potential
receivers can send JoinReply through the reverse shortest path. The route between a source and
receiver is established after the source receives the JoinReply packet. For initializing the mesh,
sources S1 and S2 in the multicast group flood the JoinReq control packets. The nodes that
receive a JoinReq control packet store the upstream node identification number (ID) and
broadcast the packet again. When receivers R1, R2, and R3 receive the JoinReq control packet,
each node sends a JoinReply control packet along the reverse path to the source. Here in the
figure, receiver R2 receives JoinReq control packets from sources S1 and S2 through paths S1-
I2-I3-R2 and S2-I6-I4-I5-R2, respectively. The JoinReply packet contains the source ID and
the corresponding next node ID (the upstream node through which it received the JoinReq
packet). When node I2 receives the JoinReply control packet from receiver R1, it sets a
forwarding flag and becomes the forwarding node for that particular multicast group. After
waiting for a specified time, it composes a new JoinReply packet and forwards it. The format
of the JoinReply packet sent by the node R2. In this way, subsequent forwarding of JoinReply
packets by the intermediate nodes along the reverse path to the source establishes the route.
In this phase, attempts are made to maintain the multicast mesh topology formed with sources,
forwarding nodes, and receivers. To some extent, the multicast mesh protects the session from
being affected by mobility of nodes. For example, due to movement of the receiver R3, R3 can
still receive data packets through route S2-I6-I4-I7-I8-R3 and this contributes to the high packet
delivery ratio. ODMRP uses a soft state approach to maintain the mesh, that is, to refresh the
routes between the source and the receiver, the source periodically floods the JoinReq control
packet. In Figure 8.31, when receiver R3 receives a new JoinReq control packet from node I11
(sent by the source S2), it sends a JoinReply on this new shortest path R3-I11-I10-I9-S2,
thereby maintaining the mesh structure.
Since ODMRP uses the soft state approach for maintaining the mesh, it exhibits robustness.
But this robustness is at the expense of high control overhead. Another disadvantage is that the
same data packet (fromsource S2 to receiver R3) propagates through more than one path to a
destination node, resulting in an increased number of data packet transmissions, thereby
reducing the multicast efficiency
20 Mark Questions
In summary, tree-based multicast routing protocols provide a single path between source-
receiver pairs and can be further divided into source-tree-based and shared-tree-based
protocols. Source-tree-based protocols are more efficient at heavy loads, while shared-tree-
based protocols are more scalable but suffer from core node dependency. On the other hand,
mesh-based multicast protocols allow multiple paths between source-receiver pairs, making
them more robust.
1. The traffic at any given link (or path) due to the traffic through neighboring links (or paths)
is referred to as ________.
2. Induced throughput unfairness refers to the throughput unfairness at the transport layer
due to the throughput/delay unfairness existing at the lower layers such as the ________
layers.
3. Reliability and flow control are end-to-end activities, whereas _______ can at times be a
local activity.
4. Nodes in ad hoc wireless networks face resource constraints including the two most
important resources are _____ & _____.
5. Some of the deployment scenarios of ad hoc wireless networks experience rapidly
changing network topology due to the ________.
6. The transport layer protocol should have mechanisms for _____ control & ______ control
in the network.
7. The protocol should maximize the _______ per connection.
8. It should have a well-defined ______ interaction framework for effective, scalable, and
______ interaction with lower layers.
9. The solutions for TCP over ad hoc wireless networks can further be classified into _____
and ______ approaches.
10. _______ is the performance level of a service offered by the network to the user.
11. QoS service can be characterized by a set of measurable prespecified service requirements
such as minimum ____, maximum _____, maximum _____, and maximum ______.
12. Real-time applications require mechanisms that guarantee _____ and _____.
13. Real-time applications can be classified as _____ and _____.
14. As different applications have different requirements, the services required by them and
the associated ____ parameters differ from application to application.
15. Since the nodes in an ad hoc wireless network do not have any restriction on mobility, the
______ changes dynamically.
16. In most cases, the nodes in an ad hoc wireless network maintain both the ______
information and ______ information.
17. Unlike wireless LANs and cellular networks, ad hoc wireless networks do not have ____
to coordinate the activity of nodes.
18. The lack of central coordinates complicates ______ in ad hoc wireless networks.
19. During propagation through the wireless medium, the radio waves suffer from several
impairments such as _____, _____ & _____.
20. The _______ control packet exchange mechanism, proposed and adopted later in the IEEE
802.11 standard, reduces the hidden terminal problem only to a certain extent.
21. Resources such as ____, ____, ____ & ____ are limited in ad hoc wireless networks.
22. Due to the broadcast nature of the wireless medium, communication through a wireless
channel is ______.
23. ______________ is one of the very important components of any QoS framework.
24. QoS resource reservation mechanisms can be broadly classified into two categories:
________ & ________ reservation mechanisms.
25. If a path is broken due to network dynamics, the reserved resources have to be explicitly
released by a ________ mechanism.
26. In the stateful approach, each node maintains either ______ information or only ______
information, while in the case of a stateless approach, no such information is maintained
at the nodes.
27. In the case of the stateless approach, neither _____ nor _____ state information is
maintained at the nodes.
28. If the QoS requirements are not guaranteed for the entire session, the QoS approach is
termed a _______.
29. If QoS requirements of a connection are guaranteed to be met for the whole duration of
the session, the QoS approach is termed a ________.
30. Based on the interaction between the routing protocol and the QoS provisioning
mechanism, QoS approaches can be classified into two categories: _____ and _____ QoS
approaches.
31. Based on the interaction between the routing protocol and the MAC protocol, QoS
approaches can be classified into two categories: _______ and ______ QoS approaches.
32. Based on the routing information update mechanism employed, QoS approaches can be
classified into three categories, namely, ______, ______, and _____ QoS approaches.
33. The _______ protocol determines which node should transmit next on the broadcast
channel when several nodes are competing for transmission on that channel.
34. In MAC protocol, the _____ mode provides best-effort service, while the _____ mode has
been designed to provide real-time traffic support in infrastructure based wireless network
configurations.
35. In bandwidth-constrained ad hoc wireless networks, the limited resources available need
to be managed efficiently. To achieve this goal, a dynamic clustering scheme is used in
_________.
36. DCF and PCF stands for ______ and ______ respectively.
37. The time interval between the transmission of two consecutive frames in IEEE 802.11
MAC protocol is called the _________.
38. The ______ protocol permits real-time stations (rt-stations) to acquire excess bandwidth
on demand.
39. ______ is the unit of data exchanged between two peer MAC entities using the services of
the physical layer.
40. ______ is the information that is delivered as a unit between MAC service access points.
41. The bandwidth reservation and real-time traffic support capability of MAC protocols can
ensure reservation at the link level only, hence the ______ support for ensuring end-to-end
resource negotiation, reservation, and reconfiguration is very essential.
42. _________ protocols search for routes with sufficient resources in order to satisfy the QoS
requirements of a flow.
43. The QoS metrics can be classified as _____, _____ & _____.
44. _________ routing is a distributed QoS routing protocol for ad hoc wireless networks.
45. The objective of ticket-based probing is to improve the _______ of ad hoc wireless
networks.
46. The ________ is based on the prediction of the location of nodes in ad hoc wireless
networks.
47. The network state information is maintained in two tables, namely, the ______ table and
the _____ table.
48. The ___________ protocol was proposed for supporting real-time applications in ad hoc
wireless networks.
49. In _______ protocol, only bandwidth is considered to be the QoS parameter.
50. The ________ strategies are used in the bandwidth allocation phase in order to decide upon
the order of links in a chosen path and particular slot positions to be assigned.
Answers:
1. Induced traffic
2. Network and MAC layers
3. congestion
4. power source, bandwidth
5. mobility of nodes
6. congestion control and flow control
7. throughput
8. Cross-layer interaction & protocol-independent interaction
9. split approaches and end-to-end approaches
10. Quality of service (QoS)
11. minimum bandwidth, maximum delay, maximum delay variance (jitter), and maximum
packet loss rate
12. bounded delay and delay jitter
13. hard real-time applications and soft real-time applications
14. QoS parameters
15. network topology
16. link-specific state information & flow-specific state information
17. central controllers
18. QoS provisioning
19. attenuation, multipath propagation, and interference
20. RTS/CTS
21. bandwidth, battery life, storage space, and processing capability
22. highly insecure
23. QoS resource reservation
24. hard state and soft state reservation mechanisms
25. deallocation mechanism
26. global state information, local state information
27. flow-specific & link-specific state information
28. soft QoS approach
29. hard QoS approach
30. Coupled & decoupled approached
31. independent and dependent QoS approaches
32. table-driven, on-demand, and hybrid QoS approaches
33. MAC protocol
34. DCF mode, PCF mode
35. Cluster TDMA
36. Distributed coordination function (DCF), Point coordination function (PCF)
37. Inter-frame space (IFS)
38. DBASE protocol
39. MPDU (MAC protocol data unit)
40. MSDU (MAC service data unit)
41. network layer
42. QoS routing protocols
43. additive metrics, concave metrics, and multiplicative metrics
44. Ticket-based QoS routing
45. Average call acceptance ratio (ACAR)
46. Predictive location-based QoS routing protocol (PLBQR)
47. update table, routing table
48. Trigger-based (on-demand) distributed QoS routing (TDR)
49. Bandwidth routing (BR) protocol
50. slot allocation strategies
SECTION -B
Answers:
1.Some of the issues to be considered while designing a transport layer protocol for ad hoc
wireless networks are,
Induced traffic: Unlike wired networks, ad hoc wireless networks utilize multi-hop radio
relaying. A link-level transmission affects the neighbour nodes of both the sender and receiver
of the link. In a path having multiple links, transmission at a particular link affects one upstream
link and one downstream link. This traffic at any given link (or path) due to the traffic through
neighbouring links (or paths) is referred to as induced traffic. This is due to the broadcast nature
of the channel and the location-dependent contention on the channel. This induced traffic
affects the throughput achieved by the transport layer protocol.
Induced throughput unfairness: This refers to the throughput unfairness at the transport layer
due to the throughput/delay unfairness existing at the lower layers such as the network and
MAC layers. For example, an ad hoc wireless network that uses IEEE 802.11 DCF as the MAC
protocol may experience throughput unfairness at the transport layer as well. A transport layer
protocol should consider these in order to provide a fair share of throughput across contending
flows.
Separation of congestion control, reliability, and flow control: A transport layer protocol
can provide better performance if end-to-end reliability, flow control, and congestion control
are handled separately. Reliability and flow control are end-to-end activities, whereas
congestion can at times be a local activity. The transport layer flow can experience congestion
with just one intermediate link under congestion. Hence, in networks such as ad hoc wireless
networks, the performance of the transport layer may be improved if these are separately
handled. While separating these, the most important objective to be considered is the
minimization of the additional control overhead generated by them.
Power and bandwidth constraints: Nodes in ad hoc wireless networks face resource
constraints including the two most important resources: (i) power source and (ii) bandwidth.
The performance of a transport layer protocol is significantly affected by these constraints.
Completely decoupled transport layer: Another challenge faced by a transport layer protocol
is the interaction with the lower layers. Wired network transport layer protocols are almost
completely decoupled from the lower layers. In ad hoc wireless networks, the cross-layer
interaction between the transport layer and lower layers such as the network layer and the MAC
layer is important for the transport layer to adapt to the changing network environment.
Dynamic topology: Some of the deployment scenarios of ad hoc wireless networks experience
rapidly changing network topology due to the mobility of nodes. This can lead to frequent path
breaks, partitioning and reemerging of networks, and high delay in reestablishment of paths.
Hence, the performance of a transport layer protocol is significantly affected by the rapid
changes in the network topology.
2. The following are the important goals to be met while designing a transport layer protocol
for ad hoc wireless networks:
• The protocol should maximize the throughput per connection.
• It should provide throughput fairness across contending flows.
• The protocol should incur minimum connection setup and connection maintenance
overheads. It should minimize the resource requirements for setting up and maintaining
the connection in order to make the protocol scalable in large networks.
• The transport layer protocol should have mechanisms for congestion control and flow
control in the network.
• It should be able to provide both reliable and unreliable connections as per the
requirements of the application layer.
• The protocol should be able to adapt to the dynamics of the network such as the rapid
change in topology and changes in the nature of wireless links from unidirectional to
bidirectional or vice versa.
• One of the important resources, the available bandwidth, must be used efficiently.
• The protocol should be aware of resource constraints such as battery power and buffer
sizes and make efficient use of them.
• The transport layer protocol should make use of information from the lower layers in
the protocol stack for improving the network throughput.
• It should have a well-defined cross-layer interaction framework for effective, scalable,
and protocol-independent interaction with lower layers.
• The protocol should maintain end-to-end semantics.
3. Figure 9.1 shows a classification tree for some of the transport layer protocols discussed in
this chapter. The top-level classification divides the protocols as extensions of TCP for ad hoc
wireless networks and other transport layer protocols which are not based on TCP. The
solutions for TCP over ad hoc wireless networks can further be classified into split approaches
and end-to-end approaches.
4 . Providing QoS support in ad hoc wireless networks is an active research area. Ad hoc
wireless networks have certain unique characteristics that pose several difficulties in
provisioning QoS. Some of the characteristics are dynamically varying network topology, lack
of precise state information, lack of a central controller, errorprone shared radio channel,
limited resource availability, hidden terminal problem, and insecure medium. A detailed
discussion on how each of the above-mentioned characteristics affects QoS provisioning in ad
hoc wireless networks is given below.
Dynamically varying network topology: Since the nodes in an ad hoc wireless network do
not have any restriction on mobility, the network topology changes dynamically. Hence, the
admitted QoS sessions may suffer due to frequent path breaks, thereby requiring such sessions
to be reestablished over new paths. The delay incurred in reestablishing a QoS session may
cause some of the packets belonging to that session to miss their delay targets/deadlines, which
is not acceptable for applications that have stringent QoS requirements.
Imprecise state information: In most cases, the nodes in an ad hoc wireless network maintain
both the link-specific state information and flow-specific state information. The link-specific
state information includes bandwidth, delay, delay jitter, loss rate, error rate, stability, cost, and
distance values for each link. The flow-specific information includes session ID, source
address, destination address, and QoS requirements of the flow (such as maximum bandwidth
requirement, minimum bandwidth requirement, maximum delay, and maximum delay jitter).
The state information is inherently imprecise due to dynamic changes in network topology and
channel characteristics. Hence, routing decisions may not be accurate, resulting in some of the
real-time packets missing their deadlines.
Lack of central coordination: Unlike wireless LANs and cellular networks, ad hoc wireless
networks do not have central controllers to coordinate the activity of nodes. This further
complicates QoS provisioning in ad hoc wireless networks.
Error-prone shared radio channel: The radio channel is a broadcast medium by nature.
During propagation through the wireless medium, the radio waves suffer from several
impairments such as attenuation, multipath propagation, and interference (from other wireless
devices operating in the vicinity) as discussed in Chapter 1.
Hidden terminal problem: The hidden terminal problem is inherent in ad hoc wireless
networks. This problem occurs when packets originating from two or more sender nodes, which
are not within the direct transmission range of each other, collide at a common receiver node.
It necessitates the retransmission of the packets, which may not be acceptable for flows that
have stringent QoS requirements. The RTS/CTS control packet exchange mechanism,
proposed in [1] and adopted later in the IEEE 802.11 standard [2], reduces the hidden terminal
problem only to a certain extent. BTMA and DBTMA provide two important solutions for this
problem, which are described in Chapter 6.
Limited resource availability: Resources such as bandwidth, battery life, storage space, and
processing capability are limited in ad hoc wireless networks. Out of these, bandwidth and
battery life are critical resources, the availability of which significantly affects the performance
of the QoS provisioning mechanism. Hence, efficient resource management mechanisms are
required for optimal utilization of these scarce resources.
Insecure medium: Due to the broadcast nature of the wireless medium, communication
through a wireless channel is highly insecure. Therefore, security is an important issue in ad
hoc wireless networks, especially for military and tactical applications. Ad hoc wireless
networks are susceptible to attacks such as eavesdropping, spoofing, denial of service, message
distortion, and impersonation. Without sophisticated security mechanisms, it is very difficult
to provide secure communication guarantees.
5. The QoS solutions can be classified in two ways. One classification is based on the QoS
approach employed, while the other one classifies QoS solutions based on the layer at which
they operate in the network protocol stack.
1) Elaborate the issues in designing and design goals of Transport Layer Protocol?
Some of the issues to be considered while designing a transport layer protocol for ad hoc
wireless networks are,
Induced traffic: Unlike wired networks, ad hoc wireless networks utilize multi-hop radio
relaying. A link-level transmission affects the neighbour nodes of both the sender and receiver
of the link. In a path having multiple links, transmission at a particular link affects one upstream
link and one downstream link. This traffic at any given link (or path) due to the traffic through
neighbouring links (or paths) is referred to as induced traffic. This is due to the broadcast nature
of the channel and the location-dependent contention on the channel. This induced traffic
affects the throughput achieved by the transport layer protocol.
Induced throughput unfairness: This refers to the throughput unfairness at the transport
layer due to the throughput/delay unfairness existing at the lower layers such as the network
and MAC layers. For example, an ad hoc wireless network that uses IEEE 802.11 DCF as the
MAC protocol may experience throughput unfairness at the transport layer as well. A transport
layer protocol should consider these in order to provide a fair share of throughput across
contending flows.
Separation of congestion control, reliability, and flow control: A transport layer protocol
can provide better performance if end-to-end reliability, flow control, and congestion control
are handled separately. Reliability and flow control are end-to-end activities, whereas
congestion can at times be a local activity. The transport layer flow can experience congestion
with just one intermediate link under congestion. Hence, in networks such as ad hoc wireless
networks, the performance of the transport layer may be improved if these are separately
handled. While separating these, the most important objective to be considered is the
minimization of the additional control overhead generated by them.
Power and bandwidth constraints: Nodes in ad hoc wireless networks face resource
constraints including the two most important resources: (i) power source and (ii) bandwidth.
The performance of a transport layer protocol is significantly affected by these constraints.
Dynamic topology: Some of the deployment scenarios of ad hoc wireless networks experience
rapidly changing network topology due to the mobility of nodes. This can lead to frequent path
breaks, partitioning and reemerging of networks, and high delay in reestablishment of paths.
Hence, the performance of a transport layer protocol is significantly affected by the rapid
changes in the network topology.
Power and bandwidth constraints: Nodes in ad hoc wireless networks face resource
constraints including the two most important resources: (i) power source and (ii) bandwidth.
The performance of a transport layer protocol is significantly affected by these constraints.
Completely decoupled transport layer: Another challenge faced by a transport layer protocol
is the interaction with the lower layers. Wired network transport layer protocols are almost
completely decoupled from the lower layers. In ad hoc wireless networks, the cross-layer
interaction between the transport layer and lower layers such as the network layer and the MAC
layer is important for the transport layer to adapt to the changing network environment.
Dynamic topology: Some of the deployment scenarios of ad hoc wireless networks experience
rapidly changing network topology due to the mobility of nodes. This can lead to frequent path
breaks, partitioning and reemerging of networks, and high delay in reestablishment of paths.
Hence, the performance of a transport layer protocol is significantly affected by the rapid
changes in the network topology.
The following are the important goals to be met while designing a transport layer protocol for
ad hoc wireless networks:
• The protocol should maximize the throughput per connection.
• It should provide throughput fairness across contending flows.
• The protocol should incur minimum connection setup and connection maintenance
overheads. It should minimize the resource requirements for setting up and maintaining
the connection in order to make the protocol scalable in large networks.
• The transport layer protocol should have mechanisms for congestion control and flow
control in the network.
• It should be able to provide both reliable and unreliable connections as per the
requirements of the application layer.
• The protocol should be able to adapt to the dynamics of the network such as the rapid
change in topology and changes in the nature of wireless links from unidirectional to
bidirectional or vice versa.
• One of the important resources, the available bandwidth, must be used efficiently.
• The protocol should be aware of resource constraints such as battery power and buffer
sizes and make efficient use of them.
• The transport layer protocol should make use of information from the lower layers in
the protocol stack for improving the network throughput.
• It should have a well-defined cross-layer interaction framework for effective, scalable,
and protocol-independent interaction with lower layers.
• The protocol should maintain end-to-end semantics.
2) What is Quality of Services in Ad hoc Wireless Network? Expalin the issues and
challenges and classification of Ad hoc Wireless Network?
Quality of service (QoS) is the performance level of a service offered by the network to the
user. The goal of QoS provisioning is to achieve a more deterministic network behavior, so
that information carried by the network can be better delivered and network resources can be
better utilized. A network or a service provider can offer different kinds of services to the users.
Providing QoS support in ad hoc wireless networks is an active research area. Ad hoc wireless
networks have certain unique characteristics that pose several difficulties in provisioning QoS.
Some of the characteristics are dynamically varying network topology, lack of precise state
information, lack of a central controller, error-prone shared radio channel, limited resource
availability, hidden terminal problem and insecure medium. A detailed discussion on how each
of the above-mentioned characteristics affects QoS provisioning in ad hoc wireless networks
is given below:
• Dynamically varying network topology:
Since the nodes in an ad hoc wireless network do not have any restriction on mobility, the
network topology changes dynamically. Hence, the admitted QoS sessions may suffer due to
frequent path breaks, thereby requiring such sessions to be reestablished over new paths. The
delay incurred in reestablishing a QoS session may cause some of the packets belonging to that
session to miss their delay targets/deadlines, which is not acceptable for applications that have
stringent QoS requirements.
• Imprecise state information:
In most cases, the nodes in an ad hoc wireless network maintain both the link-specific state
information and flow-specific state information. The link-specific state information includes
bandwidth, delay, delay jitter, loss rate, error rate, stability, cost, and distance values for each
link. The flow-specific information includes session ID, source address, destination address,
and QoS requirements of the flow (such as maximum bandwidth requirement, minimum
bandwidth requirement, maximum delay, and maximum delay jitter). The state information is
inherently imprecise due to dynamic changes in network topology and channel characteristics.
Hence, routing decisions may not be accurate, resulting in some of the real-time packets
missing their deadlines.
• Lack of central coordination:
Unlike wireless LANs and cellular networks, ad hoc wireless networks do not have central
controllers to coordinate the activity of nodes. This further complicates QoS provisioning in ad
hoc wireless networks. The radio channel is a broadcast medium by nature. During propagation
through the wireless medium, the radio waves suffer from several impairments such as
attenuation, multipath propagation, and interference (from other wireless devices in the
vicinity)
• Hidden terminal problem:
The hidden terminal problem is inherent in ad hoc wireless networks. This problem occurs
when packets originating from two or more sender nodes, which are not within the direct
transmission range of each other, collide at a common receiver node.
The QoS solutions can be classified in two ways. One classification is based on the QoS
approach employed, while the other one classifies QoS solutions based on the layer at which
they operate in the network protocol stack.
Similarly, based on the interaction between the routing protocol and the MAC protocol, QoS
approaches can be classified into two categories: independent and dependent QoS approaches.
In the independent QoS approach, the network layer is not dependent on the MAC layer for
QoS provisioning. The dependent QoS approach requires the MAC layer to assist the routing
protocol for QoS provisioning. Finally, based on the routing information update mechanism
employed, QoS approaches can be classified into three categories, namely, table-driven, on-
demand, and hybrid QoS approaches. In the table-driven approach, each node in the network
maintains a routing table which aids in forwarding packets. In the on-demand approach, no
such tables are maintained at the nodes, and hence the source node has to discover the route on
the fly. The hybrid approach incorporates features of both the table-driven and the on-demand
approaches.
The time division multiple access (TDMA) scheme is used within a cluster for controlling
access to the channel. Further, it is possible for multiple sessions to share a given TDMA slot
via code division multiple access (CDMA). Across clusters, either spatial reuse of the time-
slots or different spreading codes can be used to reduce the effect of inter-cluster interference.
A synchronous time division frame is defined to support TDMA access within a cluster and to
exchange control information. Each synchronous time division frame is divided into slots. Slots
and frames are synchronized throughout the network. A frame is split into a control phase and
a data phase. In the control phase, control functions such as frame and slot synchronization,
routing, clustering, power management, code assignment, and
virtual circuit (VC) setup are done.
1.2 IEEE 802.11e
In this section, the IEEE 802.11 MAC protocol is first described. Then, the recently proposed
mechanisms for QoS support, namely, enhanced distributed coordination function (EDCF) and
hybrid coordination function (HCF), defined in the IEEE 802.11e draft, are discussed.
IEEE 802.11 MAC Protocol
The 802.11 MAC protocol [2], which is discussed in Chapter 2, describes how a station present
in a WLAN should access the broadcast channel for transmitting data to other stations. It
supports two modes of operation, namely, distributed coordination function (DCF) and point
coordination function (PCF). The DCF mode does not use any kind of centralized control,
while the PCF mode requires an access point (AP, i.e., central controller) to coordinate the
activity of all nodes in its coverage area. All implementations of the 802.11 standard for
WLANs must provide the DCF mode of operation, while the PCF mode of operation is
optional. The time interval between the transmission of two consecutive frames is called the
inter-frame space (IFS). There are four IFSs defined in the IEEE 802.11 standard, namely, short
IFS (SIFS), PCF IFS (PIFS), DCF IFS (DIFS), and extended IFS (EIFS). The relationship
among them is as follows:
SIF S < P IF S < DIF S < EIF S
1.3 DBASE
The distributed bandwidth allocation/sharing/extension (DBASE) protocol supports
multimedia traffic [both variable bit rate (VBR) and constant bit rate (CBR)] over ad hoc
WLANs. In an ad hoc WLAN, there is no fixed infrastructure (i.e., AP) to coordinate the
activity of individual stations. The stations are part of a single-hop wireless network and
contend for the broadcast channel in a distributed manner. For real-time traffic (rt-traffic), a
contention-based process is used in order to gain access to the channel. Once a station gains
channel access, a reservation-based process is used to transmit the subsequent frames.