Adhoc and Sensor Networks Full Notes
Adhoc and Sensor Networks Full Notes
in
UNIT I
INTRODUCTION
Page 1
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Fading refers to the fluctuations in signal strength, when received at the receiver.
It occurs due to multipath propagation. The different types of fading are
1.Slow/long term fading 2.Fast/short term fading
Page 2
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
When the propagating radio wave hits an object which is very large
compared to its wavelength (such as the surface of the Earth, or tall buildings), the
wave gets reflected by that object. Reflection causes a phase shift of 180 degrees
between the incident and the reflected rays.
8
Page 3
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
11. Write the equation for maximum data rate according to Shannon’s theorem.
PART B
1. Explain in detail about Cellular and Ad Hoc Wireless Networks (Nov/Dec 2016)
Page 4
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
infrastructure. Absence of any central coordinator or base station makes the routing
complex.
Ad hoc wireless network topology for the cellular network shown in above figure
is illustrated below.
The path setup for a call between 2 nodes, say, node C to E , is completed through
the intermediate mobile node F.
Wireless mesh network and Wireless sensor networks are specific examples of ad
hoc wireless networks.
The presence of base station simplifies routing and resource management in a
cellular network.
But in ad hoc networks, routing and resource management are done in a
distributed manner in which all nodes co-ordinate to enable communication among
them.
10
Page 5
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
11
Page 6
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
12
Page 7
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
13
Page 8
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Wireless mesh networks are adhoc wireless network that are formed to provide
an alternate communication infrastructure for mobile or fixed nodes/users,
without the spectrum reuse constraint & requirement of network planning of
cellular network.
It provides many alternate paths for a data transfer session between a source &
destination, resulting in quick reconfiguration of the path when the existing
path fails due to node failure.
Since the infrastructure built is in the form of small radio relaying devices, the
investment required in wireless mesh networks is much less than what is
required for the cellular network counterpart.
The possible deployment scenarios of wireless mesh networks include:
residential zones, highways, business zones, important civilian regions and
university campuses
Wireless mesh networks should be capable of self-organization and
maintenance.
It operates at license-free ISM band around 2.4 GHz & 5 GHz.
It is scaled well to provide support to large number of points.
Major advantage is the support for a high data rate, quick & low cost of
deployment, enhanced services, high scalability, easy extend ability, high
availability & low cost per bit.
Sensor networks are special category of Ad hoc wireless network that are used
to provide a wireless communication infrastructure among the sensors deployed in
a specific application domain.
Sensor nodes are tiny devices that have capability of sensing physical
parameters processing the data gathered, & communication to the monitoring
14
Page 9
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
system. The issues that make sensor network a distinct category of ad hoc wireless
network are the following:
Mobility of nodes:
Mobility of nodes is not a mandatory requirement in sensor networks.
For example, the nodes used for periodic monitoring of soil properties are not
required to be mobile & the nodes that are fitted on the bodies of patients in a
post-surgery ward of a hospital are designed to support limited or partial mobility.
In general, sensor networks need not in all cases be designed to support
mobility of sensor nodes.
The number of nodes in sensor network can be much larger than that in a
typical ad hoc wireless network.
Density of deployment :
Power constraints :
The power constraints in sensor networks are much more stringent than
those in ad hoc wireless networks. This is mainly because the sensor nodes are
expected to operate in harsh environmental or geographical conditions, with
minimum or no human supervision and maintenance. In certain case, the
recharging of the energy source is impossible.
Running such a network, with nodes powered by a battery source with
limited energy, demands very efficient protocol at network, data link, and physical
15
Page 10
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
layer. The power sources used in sensor networks can be classified into the
following 3 categories:
Replenishable Power source: The power source can be replaced when the
existing source is fully drained.
Non-replenishable Power source: The power source cannot be
replenished once the network has been deployed. The replacement of sensor
node is the only solution.
Regenerative Power source: Here, Power source employed in sensor
network have the capability of regenerating power from the physical
parameter under measurement.
Traffic Distribution :
16
Page 11
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The major issues that affect the design, deployment, & performance of an ad hoc
wireless network system are:
17
Page 12
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
b. Synchronization:
The MAC protocol design should take into account the requirement of time
synchronization. Synchronization is mandatory for TDMA-based systems for
management of transmission and reception slots.
c. Hidden Terminals:
Hidden terminals are nodes that are hidden(or not reachable) from the
sender of a data transmission session, but are reachable to the receiver of the
session.
d. Exposed terminals:
Exposed terminals, the nodes that are in the transmission range of the
sender of an on-going session, are prevented from making a transmission.
e. Throughput:
The average delay that any packet experiences to get transmitted. The
MAC protocol should attempt to minimize the delay.
g. Fairness:
Fairness refers to the ability of the MAC protocol to provide an equal share
or weighted share of the bandwidth to all competing nodes. Fairness can be either
node-based or flow-based.
h. Real-time Traffic support:
18
Page 13
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
i. Resource reservation:
The provisioning of QoS defined by parameters such as bandwidth, delay,
and jitter requires reservation of resources such as bandwidth, buffer space, and
processing power.
j. Ability to measure resource availability:
This refers to the variation in the data bit rate achieved over a channel.
A MAC protocol that has adaptive rate control can make use of a high data
rate when the sender and receiver are nearby & adaptively reduce the data rate as
they move away from each other.
m. Use of directional antennas:
19
Page 14
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Mobility :
The Mobility of nodes results in frequent path breaks, packet collisions, transient
loops, stale routing information, and difficulty in resource reservation.
Bandwidth constraint :
Since the channel is shared by all nodes in the broadcast region, the bandwidth
available per wireless link depends on the number of nodes & traffic they handle.
Error-prone and shared channel :
-5 -3
The Bit Error Rate (BER) in a wireless channel is very high [ 10 to 10 ]
-12 -9
compared to that in its wired counterparts [ 10 to 10 ].
Consideration of the state of the wireless link, signal-to-noise ratio, and path loss for
routing in ad hoc wireless networks can improve the efficiency of the routing protocol.
Location-dependent contention :
The load on the wireless channel varies with the number of nodes present in a
given geographical region.
3.Multicasting
It plays important role in emergency search & rescue operations & in military
communication. Use of single-link connectivity among the nodes in a multicast group
results in a tree-shaped multicast routing topology. Such a tree-shaped topology provides
high multicast efficiency, with low packet delivery ratio due to the frequency tree breaks.
The major issues in designing multicast routing protocols are as follows:
Robustness
Efficiency
Control overhead
Quality of Service
Efficient group management
Scalability
Security
20
Page 15
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Assume that an optimal route from node A to node B passes through node C, &
node C is not powered on.
Then node A will have to set up a costlier & non-optimal route to B.
The non-optimal path consumes more resources & affects the throughput of the system.
As the intermediate nodes in a path that relay the data packets expend their
resources such as battery charge & computing power, they should be properly
compensated.
Hence, pricing schemes that incorporate service compensation or service
reimbursement are required.
21
Page 16
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Delay.
Delay jitter.
Packet loss rate.
Bit error rate.
Path loss.
QoS framework :
A framework for QoS is a complete system that attempts to provide the
promised services to each user or application.
The key component of QoS framework is a QoS service model which
defines the way user requirements are served.
7. Self-Organization
One very important property that an ad hoc wireless network should exhibit is
organizing & maintaining the network by itself.
The major activities that an ad hoc wireless network is required to perform for
self- organization are,
Neighbour discovery.
Topology organization &
Topology reorganization (updating topology information)
8. Security
22
Page 17
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Internal attack: The active attacks that are performed by nodes belonging to
the same network.
11. Scalability
Scalability is the ability of the routing protocol to scale well in a network with a
large number of nodes.
It requires minimization of control overhead & adaptation of the routing protocol
to the network size.
Page 18
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
C=λ*f
where c is the speed of light (3 × 108m/s), f is the frequency of the wave in Hz, and λ is
its wavelength in meters.
ITU, located in Geneva and a sub organization of the United Nations, coordinates
wired and wireless telecommunication activities worldwide. There are no official names
for the bands in which the very high-frequency X-rays and Gamma rays fall.
The low-frequency bands comprised of the radio, microwave, infrared, and visible
light portions of the spectrum can be used for information transmission by modulating
the amplitude, frequency, or the phase of the waves.
The high frequency waves such as X-rays and Gamma rays, though theoretically
better for information propagation, are not used due to practical concerns such as the
difficulty to generate and modulate these waves, and the harm they could cause to
living things.
Radio waves are easy to generate and are widely used for both indoor and outdoor
communication due to properties such as their ability to pass through buildings and
ability to travel long distances. Since radio transmission is omni directional (when
radio waves are generated, they spread out from the transmitting antenna in all
24
Page 19
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
directions) in nature, the need to physically align the transmitter and receiver also
does not arise.
The frequency of the radio wave determines many of the characteristics of the
transmission.
At low frequencies the waves can pass through obstacles easily, but their power falls
with an inverse-squared relation with respect to the distance. The higher frequency
waves are more prone to absorption by rain drops, and they get reflected by obstacles.
In the VLF, LF, and MF bands the propagation of waves, also called as ground waves
The maximum transmission ranges of these waves are of the order of a few hundred
kilometers. They are used for low bandwidth transmissions such as amplitude
modulated (AM) radio broadcasting
The HF and VHF band transmissions are absorbed by the atmosphere near the Earth’s
surface.
However, a portion of the radiation, called the sky wave, radiates outward and upward
to the ionosphere in the upper atmosphere.
SNR is the ratio of the signal power to the noise power on a transmission medium,
and is used to categorize the quality of a transmission. However, because of the higher
frequency of operation they do not pass through buildings.
Infrared waves and waves in the EHF band (also known as millimeter waves) are used
for short-range communication.
25
Page 20
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Spectrum Allocation
Worldwide, an agency of the International Telecommunications Union Radio
communication (ITU-R) Bureau called World Administrative Radio Conference
(WARC) tries to coordinate the spectrum allocation by the various national
governments, so that communication devices that can work in multiple countries can be
manufactured. Methods used for this frequency allocation are comparative bidding,
lottery system and auctioning method.
• Scattering:
When the wave travels through a medium, which contains many objects
with dimensions small when compared to its wavelength, scattering occurs. The
wave gets scattered into several weaker outgoing signals. In practice, objects such
as street signs, lamp posts, and foliage cause scattering.
26
Page 21
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
27
Page 22
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
UNIT II
Page 23
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
29
Page 24
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Sender-initiated protocols:
Packet transmissions are initiated by the sender node.Single-channel
sender-initiated protocols: A node that wins the contention to the channel can make
use of the entire bandwidth. Multichannel sender-initiated protocols: The available
bandwidth is divided into multiple channels.
Receiver-initiated protocols:
The receiver node initiates the contention resolution protocol.
30
Page 25
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
31
Page 26
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
PART- B
The main issues in designing MAC protocol for ad hoc wireless network are:
Bandwidth efficiency
Bandwidth must be utilized in efficient
manner Minimal Control overhead
BW = ratio of BW used for actual data transmission to the total available BW
Quality of service support
Essential for supporting time-critical traffic sessions
They have resource reservation mechanism that takes into considerations
The nature of wireless channel and the mobility of nodes
Synchronisation
MAC protocol must consider synchronisation between nodes in the
network Synchronisation is very important for BW (time slot) reservation
by nodes.
Exchange of control packets may be required for achieving time
synchronisation among nodes
Hidden and exposed terminal problems
The hidden terminal problem refers to the collision of packets at a receiving
node due to the simultaneous transmission of those nodes that are not
within the direct transmission range of the sender but are within the
transmission range of the receiver.
Collision occurs when both nodes transmit packets at the same time without
knowing about the transmission of each other.
S1 and S2 are hidden from each other & they transmit simultaneously to R1
which leads to collision
32
Page 27
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
33
Page 28
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
1b) Explain the Design Goals of a Mac Protocol for Ad Hoc Wireless Networks
Ad hoc network MAC protocols can be classified into three basic types:
Contention-based protocols
Contention-based protocols with reservation mechanisms
Contention-based protocols with scheduling mechanisms
Contention-based protocols:
34
Page 29
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Sender-initiated protocols:
Packet transmissions are initiated by the sender node.
Single-channel sender-initiated protocols:
A node that wins the contention to the channel can make use of the entire
bandwidth.
Multichannel sender-initiated protocols:
The available bandwidth is divided into multiple channels.
Receiver-initiated protocols:
The receiver node initiates the contention resolution protocol.
35
Page 30
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Node scheduling is done in a manner so that all nodes are treated fairly and
no node is starved of bandwidth.
Scheduling-based schemes are also used for enforcing priorities among
flows whose packets are queued at nodes.Some scheduling schemes also consider
battery characteristics.
Other protocols are those MAC protocols that do not strictly fall under the above
categories.
36
Page 31
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Page 32
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
38
Page 33
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The CMS1 and CMS2 are used to inform neighbors about the current reservation.
While CMS3 and CMS4 are used for channel reservation.
Each node that receives data during the DMS of current slot transmits an SR in
CMS1.This serves to inform other neighbouring potential sender nodes about the
currently active reservations.
Every node that transmits data during the DMS of current slot transmits an RTS
in CMS2, CMS3 and CMS4 are used as follows:
The sender of an intend reservation, if it senses the channel is idle in
CMS1, transmits an RTS in CMS2 Then the receiver transmits a CTS in
CMS3.
can be transmitted in current slot
If the reservation was successful, the data
and the same slot in subsequent frames.
39
Page 34
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
40
Page 35
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
A node ready to transmit data, it senses the HR period of the current slot .If the
channel is idle during HR period; it transmits an RTS during RTS period and waits
for CTS during CTS period.
On receiving the RTS, the destination node transmits the CTS packet during the
CTS period of the same slot and waits for the data packet.
If the source node receives the CTS packet correctly, it implies that the source
and receiver nodes have successfully reserved the current hop. If the channel is
busy during HR period, it backs off for a randomly multiple slots.
Suppose the sender needs to transmit data across multiple frames, it informs the
receiver through the header of the data packet. The receiver node transmits an HR
packet during the HR period of the same slot in next frame to inform its neighbors.
The sender receiving the HR packet, it sends an RTS during the RTS period and
jams other RTS packets. Both receivers remain silent during the CTS period.
Soft Reservation Multiple Access with Priority Assignment (SRMA/PA)
41
Page 36
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
reservation (SR), reservation request (RR), reservation confirm (RC), data sending
(DS) and acknowledgement (ACK).
The SYNC field is used for synchronization purposes
The SR, RR, RC, & ACK fields are used for transmitting & receiving the
corresponding control packets
The DS field is used for data transmission
The SR packet serves as a busy tone. It informs the nodes about the
the access priority value assigned to the
reservation of the slot. It also carries
node that has reserved the slot
A node determines whether or not a slot is free through the SR field of that slot.
When an idle node receives a data packet for transmission, the node waits for a
free slot and transmits the RR packet in the RR field of that slot.
In case of a voice terminal node, the node tries to take control of the slot already
reserved by a data terminal if it finds it priority level to be higher than that of the
data terminal. This process is called soft reservation.
Priority levels are initially assigned to nodes based on the service classes in a static
manner.
It is required that priority of voice terminal pv(R) > priority of data terminal
pd(R).
A node can be in one of the two states:
A node is said to be in the active state if it is currently transmitting
to be in the idle state if it does not have any packet to be
A node is said
transmitted
In the active state itself, nodes can be in one of the two states: access state and
reserved state. Access state is one in which the node is backlogged and is trying to
reserve a slot for transmission.In order to avoid collisions,a binary exponential
back-off algorithm is used for non-real time connections and a modified binary
exponential back-off algorithm is used for real time connection
42
Page 37
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
43
Page 38
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
44
Page 39
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Time is divided into slots. Each node records the transmit and receive
reservations of its neighbors in a reservation-table(RT). For real-time traffic
the source first sends an RTS packet, for which the receiver responds with a
CTS packet. Now the source sends the first DATA packet of the real-time
session.
Reservation information for the next DATA packet is piggy-backed on this
current DATA packet.
On receiving this DATA packet, the receiver updates its reservation table
with the piggy-backed reservation information
The receiver then sends ACK packet back to the source,Receiver piggy-
backs the reservation confirmation information on the ACK packet
Advantage: It does not require global synchronization among nodes
Drawback: A free slot can be reserved only if it can fit the entire RTS-CTS-DATA-
ACK exchange.
45
Page 40
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
For transmitting best effort packets: RTS, CTS, and ACK are used.For transmitting
real time packets: ResvRTS, ResvCTS, and ResvACK are used
Time is divided into super frames. Each superframe consists of a number of
reservation-slots (resv).A node that needs to transmit real-time packets, first
reserves a set of resv-slots.
The set of resv-slots reserved by a node for a connection on a superframe is called a
connection-slot.
46
Page 41
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The duration of each resv-slot is twice the maximum propagation delay. Each node
maintains a reservation table (RT). RT contains information such as sender-id &
receiver-id.starting and ending times of active reservation.
NAV indicates the network allocation vector maintained at each node.
Advantages:
Bandwidth efficiency
Asynchronous mode of operation where nodes do not require any global time
synchronization
Flexibility of slot placement in the super frame.
4. Explain in detail about Contention Based Protocols. (Nov/Dec 2016)
The sender senses the carrier to see and transmits a RTS (Request To Send) frame
if no nearby station transmits a RTS.
The receiver replies with a CTS (Clear To Send) frame. Sender sends DATA, for
which receiver responds with ACK. RTS/CTS packets carry the expected duration
of the data transmission.
A node near the receiver on hearing the CTS packet, defers its transmission till the
receiver receives the data packet. This overcomes hidden node problem.
A node near the sender that only hears the RTS is free to transmit simultaneously
when the sender is transmitting data. This overcomes exposed node problem
47
Page 42
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
.
The receiver sends an ACK when receiving a frame.
→ Neighbors keep silent until see ACK.
Collision handling: If a packet is lost (collision), the node uses the binary exponential
back-off (BEB) algorithm to back off for a random time interval before retrying.
RTS/CTS mechanism does not solve the exposed terminal problem.
Solution: New control packet called data-sending (DS) can be used. DS contains
information such as the duration of the forthcoming data transmission.
The protocol uses one more control packet called the request-for-request-to-send
(RRTS)
Synchronization information needs to be propagated to the concerned nodes.
If a node had received an RTS previously for which it was not able to respond
because there exists on-going transmission, then it waits for the next contention
period and transmits RRTS.
B)Floor Acquisition Multiple Access Protocols (FAMA)
It is based on a channel access discipline which consists of
o a carrier-sensing operation and
48
Page 43
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
FAMA-NTR
Before sending a packet, the sender senses the channel.
If channel is busy, the sender back-off a random time and retries later.
If the channel is free, the sender sends RTS and waits for a CTS packet.
If the sender cannot receive a CTS, it takes a random back-off and retries later.
If the sender receives a CTS, it can start transmission data packet.
In order to allow the sender to send a burst of packets, the receiver is made to wait a
time duration τ seconds after a packet is received.
49
Page 44
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
When a node is ready for transmission, it senses the channel to check whether the
busy tone is active. If not, it turns on the busy tone signal and starts data
transmissions.Otherwise, it reschedules the packet for transmission after some
random rescheduling delay.
When a node is transmitting, no other node in the two-hop neighborhood of the
transmitting node is permitted to simultaneously transmit.
Drawback: very poor bandwidth utilization
50
Page 45
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
o First, it senses the channel to determine whether the BTr signal is active
o If there is no BTr signal, then it transmit RTS packet
On receiving the RTS packets, receiver checks whether the BTt tone is
active
If there is no BTt signal, Receiver Sends CTS packet and turns on the BTr
signal
Sender receives CTS, turns on BTt signal, starts data transmission and turns
off BTt signal
Receiver receives data and turn off BTr signal
DBTMA has better network utilization than RTS/CTS based protocol.
51
Page 46
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The data packet is divided into two portions: a preamble and the actual data
packet.The busy tone serves two purposes:
Acknowledges the sender the successful of receiving preamble
Inform the nearby hidden nodes the impending transmission
It is a receiver-initiated protocol.
It reduces the number of control packets used in the MACA protocol.
It eliminated the need for the RTS packet.
52
Page 47
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
It is a receiver-initiated protocol.
It doesn’t require any traffic prediction mechanism.
It exploits the broadcast nature of traffic from omni-directional antennas to reduce
the number of handshakes involved in the data transmission. A node obtains
information about the data packet arrivals at its neighbouring nodes by
overhearing the CTS packets transmitted by them.
It then sends a CTS packet to the concerned neighbour node for relaying data from
that node.
The throughput of MARCH is significantly high compared to MACA.
Control overhead is much less.
Less BW is consumed for control traffic.
53
Page 48
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
54
Page 49
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
iii) The receiver copies priority-tag from the received-RTS and piggy-backs it along
Neighbors receive the RTS or CTS , retrieve the piggy-backed information and
make a corresponding entry in their scheduling-tables.
When source transmits a DATA, its head-of-line(HOL) packet information is
piggy-backed on DATA (HOL packet of a node refers to the packet to be
transmitted next by the node).
On receiving DATA, the receiver responds with ACK.
The receiver copies the HOL-information from the received-DATA and
piggy-backs it along Neighbors, receive the DATA or ACK retrieve the
piggy-backed information and make a corresponding entry in their STs.
When a node hears an ACK, it removes from its ST any entry made earlier for
corresponding DATA.
Figure 2.16 Piggy – backing and scheduling table update mechanism in DPS
Multi-Hop Coordination
The excess delay incurred by a packet at the upstream-nodes is compensated for at
the downstream-nodes. When a node receives a packet, it would have already received
the priority-index of the packet piggy-backed on the previous RTS packet. In case the
node is an intermediate-node (which has to further forward the packet), the node
55
Page 50
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
calculates the new priority-index of the DATA packet based on the received value of the
priority-index.If a packet suffers due to excess delay at the upstream-nodes, then the
downstream-node increase priority of packet so that packet is able to meet its end-to-end
delay target Similarly, if a packet arrives very early due to lack of contention at the
upstream- nodes, then the priority of that packet would be reduced at the downstream-
nodes.
56
Page 51
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
57
Page 52
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The FIH sends the previous state information Si-1 to the priority function
module (PFM)
The ULB of each packet in ST is available at the node. This information is also
sent to
PFM, which uses the information fed to it to calculate the priority-indices of
packets in the ST.PDR(packet delivery ratio) of the flow at any given time is
computed by
Each node maintains a data structure called PCL (Preferable Channel List).
PCL contains the usage of the channels within the transmission-range of the
node. Based on their usage, channels can be classified into three types:
High preference channel (HIGH): The channel has been selected by the
current node and is being used by the node in the current beacon-interval.
58
Page 53
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Medium preference channel (MID): The channel is free and is not being
currently used in the transmission-range of the node.
Low preference channel (LOW): The channel is already being used in
the transmission-range of the node by other neighboring nodes.
A counter is associated with each LOW state channel.Time is divided into beacon-
intervals & every node is synchronized by periodic beacon transmissions
At the start of every beacon-interval, there exists a time interval called the adhoc
traffic indication messages (ATIM) window.
ATIM window is used by the nodes to negotiate for channels for transmission
during the current beacon-interval. The protocol works as follows
A source sends an ATIM to the intended receiver. The ATIM carries the PCL
of the source.
On receiving this ATIM, the receiver uses the PCL carried on the ATIM and its
own PCL to select a channel. It includes this channel information in the ATIM-
ACK packet & sends to the source.
Then, source determines whether it can transmit on the channel indicated in the
ATIM-ACK message. If so, it responds by sending the receiver an ATIM-
RES(reservation) packet.
At the end of the ATIM window, the source and receiver switch to the agreed-upon
channel and start communicating by exchanging RTS/CTS.
If a receiver node R receives an ATIM packet from a source S, it selects a channel as
below.
If there exists a HIGH state channel in the node R's PCL, then that channel is
selected.
if there exists a HIGH state channel in the PCL of node S, then that channel is
selected.
if there exists a common MID state channel in the PCLs of both node S and node
R, then that channel is selected.
if there exists a channel which is in the MID state at only one of the two nodes,
59
Page 54
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
60
Page 55
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
In case FCL is non-empty, the node first checks whether the channel it used
for its most recent successful transmission is included in the list. If so, the
node uses this channel for its new transmission.
Otherwise, one among the IDLE channels available in the FCL is randomly
chosen.
Drawback:
If the number of channels is very large, then the protocol results in very high
packet transmission time.
61
Page 56
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
UNIT III
Issues in designing a routing and Transport Layer protocol for Ad hoc networks-
proactive routing, reactive routing (on-demand), hybrid routing- Classification of
Transport Layer solutions-TCP over Ad hoc wireless Networks.
PART-A
The energy aware routing works based on the routing metrics such as low energy,
cost and remaining battery charge. It aims mainly at increasing the lifetime of the
network.
62
Page 57
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
63
Page 58
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The TCP does not work well in ad hoc network because of the following reasons
Misinterpretation of packet loss
Frequent path breaks
Effect of path length
64
Page 59
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
9.What are not supported by the traditional TCP for handling Ad hoc
network?
The features that are not supported by the traditional TCP for handling ad
hoc network are
Throughput
Power consumption
Path break handling mechanisms
Scheduling of packet loss and rate of transmission
Bandwidth consumption due to RTS-CTS-DATA-ACK
If the route to the sender is not available at the FP then additional control
packets may need to be generated for routing the RFN packet.
65
Page 60
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
TCP-F has an additional state compared to the traditional TCP state m/c,
and hence its implementation requires modifications to the existing TCP
libraries.
Congestion window used after a new route is obtained may not reflect the
achievable transmission rate to the n/w and the TCP-F receiver.
11.What are the issues in designing a transport layer protocol for ad hoc
wireless Networks?
Induced traffic
Induced throughput unfairness
Separation of congestion control, reliability, and flow control
Power and bandwidth constraints
Misinterpretation of congestion
Completely decoupled transport layer
Dynamic topology.
PART-B
1. Discuss the issues in designing a routing protocol for ad hoc wireless networks
and describe the classification of routing protocols. (nov/Dec 2016)
The major challenges that a routing protocol designed for ad hoc wireless
networks faces are:
Mobility
Network topology is highly dynamic due to movement of nodes. Hence, an
ongoing session suffers frequent path breaks.
Disruption occurs due to the movement of either intermediate nodes in the
path or end nodes.
66
Page 61
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
67
Page 62
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
68
Page 63
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Page 64
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Ex: consider the figure (3.3). Here, if a transmission from node B to another node A
is already in progress, node C cannot transmit to node D, as it concludes that its
neighbor node B, is in transmitting mode and hence should not interfere with the
on-going transmission. Thus, reusability of the radio spectrum is affected.
5. Resource Constraints
Two essential and limited resources are battery life and processing power. Devices
used in ad hoc wireless networks require portability, and hence they also have size
and weight constraints along with the restrictions on the power source. Increasing the
battery power and processing ability makes the nodes bulky and less portable.
Page 65
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
71
Page 66
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
72
Page 67
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Use information about the about the expected future status of the wireless
links to make approximate routing decisions.
Apart from the lifetime of wireless links, the future status information also
includes information regarding the lifetime of the node, prediction of
location, and prediction of link availability.
Based on the routing topology
Ad hoc wireless networks, due to their relatively smaller number of nodes, can
make use of either a flat topology or a hierarchical topology for routing.
Flat topology routing protocols:
Make use of a flat addressing scheme similar to the one used in
IEEE 802.3 LANs.
It assumes the presence of a globally unique addressing mechanism
for nodes in an ad hoc wireless network.
Hierarchical topology routing protocols:
Make use of a logical hierarchy in the network and an associated
addressing scheme.
The hierarchy could be based on geographical information or it could be
based on hop distance.
Based on the utilization of specific resources
Power-aware routing:
o Aims at minimizing the consumption of a very important resource in
the ad hoc wireless networks: the battery power.
o The routing decisions are based on minimizing the power consumption
either logically or globally in the network.
Geographical information assisted routing :
o Improves the performance of routing and reduces the control
overhead by effectively utilizing the geographical information
available.
73
Page 68
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
74
Page 69
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Figure 3.4(a) Topology graph of the network Figure 3.4(b) Routing for Node 1
75
Page 70
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Advantages:
76
Page 71
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
77
Page 72
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Figure 3.6 shows the cluster head, cluster gateways, and normal cluster
member nodes in an ad hoc wireless network.
78
Page 73
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Lead to Frequent changes in the cluster-head, which may result in multiple path
breaks.
3. Explain in detail about WRP and STAR. DSDV (nov/Dec 2016)
79
Page 74
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
iv) Message retransmission list (MRL): contains an entry for every update
message that is to be retransmitted and maintains a counter for each entry.
After receiving the update message, a node not only updates the distance for
transmitted neighbors but also checks the other neighbors’ distance, hence
convergence is much faster than DSDV.
Consider the example shown in figure 3.7(a) , where the source of the route is
node 1 and destination is node 15. As WRP proactively maintains the route to all
destinations, the route to any destination node is readily available at the source
node.
From the routing table shown, the route from node 1 to node 15 has the next node
as node 2. The predecessor node of 15 corresponding to this route is route 12.
The predecessor information helps
WRP to converge quickly during link breaks.
When a node detects a link break, it sends an update message to its neighbors
with the link cost of the broken link set to ∞. After receiving the update message;
all affected nodes update their minimum distances to the corresponding nodes.
The node that initiated the update message then finds an alternative route, if
available from its DT. Below figure3.7(b) shows route maintenance in WRP.
Advantages:
WRP has the same advantages as that of DSDV.
It has faster convergence and involves fewer table updates.
Disadvantages:
The complexity of maintenance of multiple tables demands a larger memory and
greater processing power from nodes in the adhoc wireless network.
It is not suitable for highly dynamic and also for very large ad hoc wireless networks.
80
Page 75
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
81
Page 76
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
They execute the path-finding process and exchange routing information only
When a path is required by a node to communicate with a destination.
Dynamic Source Routing Protocol (DSR)
82
Page 77
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Page 109
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
6. What is UNPF?
It is a set of protocols for complete implementation of a layered architecture for
sensor networks. UNPF integrates three operations in its protocol structure: network
initialization and maintenance, MAC, and routing protocols.
115
Page 110
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Inside the home, there are several areas where such technology can be
applied effectively:
PC-peripherals including keyboards, wireless mice, low end PDAs,
joysticks; consumer electronics including radios, TVs, DVD players,
remote controls;
Home automation including heating, ventilation, air conditioning, security,
lighting, control of windows, curtains, doors, locks; health monitors and
diagnostics.
12. What is GTS ?
Channel access is usually contention based though the PAN may assign time slots
to a single device. This is known as a guaranteed time slot (GTS)
PART-B
Page 111
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Page 112
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
117
Page 113
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Layered architecture has a single powerful base station (BS), and the layers of
sensor nodes around it correspond to the nodes that have the same hop-count to the BS.
Layered architectures have been used with in-building wireless backbones, and in
military sensor-based infrastructure, such as the multi-hop infrastructure network
architecture (MINA) . In the in-building scenario, the BS acts an access point to a wired
network, and small nodes form a wireless backbone to provide wireless connectivity. The
users of the network have hand-held devices such as PDAs which communicate via the
small nodes to the BS.
118
Page 114
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
119
Page 115
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
nodes to the BS. The node to which a packet is to be forwarded is selected considering
the remaining energy of the nodes. This achieves a higher network lifetime. Existing ad
hoc routing protocols can be simplified for the layered architecture, since only nodes of
the next layer need to be maintained in the routing table. A modification to the UNPF
protocol set termed the UNPF-R has been proposed. It makes the sensor nodes adaptively
vary their transmission range so that network performance can be optimized. While a
very small transmission range could cause network partitioning, a very large transmission
range will reduce the spatial reuse of frequencies. The optimal range is determined
through an algorithm similar to simulated annealing. This is a centralized control
algorithm in which the BS evaluates an objective function periodically.
For a transmission range R, the objective function is, where N is the total number
of sensors in the system; n is the number of nodes in layer one; is the energy consumption
per packet; and d is the average packet delay. The BS selects a new transmission range R'
as follows. If no packet is received by the BS from any sensor node for some interval of
time, the transmission range is increased by Δr, a predefined increment. Otherwise, the
transmission range is either decreased by Δr with probability 0.5 × (n/N), or increased by
Δr with probability [1 - 0.5 × (n/N)].
The objective function is reevaluated with the new transmission range. If , then the
transmission range R' is adopted. Otherwise, R is modified to R' with probability, where
T is the temperature parameter, as in simulated annealing. The advantage of the UNPF-R
is that it minimizes the energy × delay metric, and maximizes the number of nodes which
can connect to the BS. The minimization of the energy × delay metric ensures that
transmission should occur with minimum delay and with minimum energy consumption.
The two conflicting objectives are together optimized by minimizing their product.
120
Page 116
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
provides an inferior objective value is also accepted with a probability, which is reduced
as the algorithm progresses. This is to escape local minima of the objective function. The
progress of the heuristic is indicated by the decreasing temperature parameter.
Figure represents a clustered architecture where any message can reach the BS
in at most two hops. Clustering can be extended to greater depths hierarchically.
Clustered architecture is especially useful for sensor networks because of its
inherent suitability for data fusion. The data gathered by all members of the
cluster can be fused at the cluster-head, and only the resulting information
needs to be communicated to the BS.
Sensor networks should be self-organizing, hence the cluster formation and
election of cluster-heads must be an autonomous, distributed process. This is
achieved through network layer protocols such as the low-energy adaptive
clustering hierarchy (LEACH) .
121
Page 117
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
A sensor network has some design challenges due to the following reasons:
Sensor nodes are randomly deployed and hence do not fit into any regular
topology. Once deployed, they usually do not require any human intervention.
Hence, the setup and maintenance of the network should be entirely autonomous.
122
Page 118
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The challenges posed by sensor network MAC protocol has no single controlling
authority, so global synchronization is difficult
Efficiency issue
Frequent topology changes due to mobility and failure
123
Page 119
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Self-Organizing MAC for Sensor Networks (SMACS) and Eavesdrop and Register
(EAR)
SMACS and EAR protocols which handle network initialization and
mobility support, respectively. SMACS is a distributed protocol for
network initialization and link-layer organization.
In this protocol, neighbor discovery and channel assignment take place
simultaneously in a completely distributed manner.
A communication link between two nodes consists of a pair of time slots, at
a fixed frequency, which is randomly chosen at the time of establishing the
link. Such an assignment is possible in sensor networks without
interference from neighboring nodes because the available bandwidth is
much larger than the data rate required for a message transmission between
two nodes.
124
Page 120
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
EAR protocol:
The EAR protocol enables seamless connection of nodes under mobile and
stationary conditions. This protocol makes use of certain mobile nodes, besides the
existing stationary sensor nodes, to offer service to maintain connections. Mobile nodes
eavesdrop on the control signals and maintain neighbor information.
Hybrid TDMA/FDMA
125
Page 121
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
5. Draw the protocol stack of IEEE 802.15.4 and explain its functions.
IEEE standard 802.15.4 intends to offer the fundamental lower network layers
of a type of wireless personal area network (WPAN) which focuses on low-
cost, low rate, low-speed ubiquitous communication between devices. It can be
contrasted with other approaches, such as Wi-Fi, which offer more bandwidth
and require more power.
It is used in home networking applications where the key motivations are
reduced installation cost and low power consumption.
The basic framework conceives a 10-meter communications range with a
transfer rate of 250 kbit/s.
Lower transfer rates of 20 and 40 kbit/s were initially defined, with the 100
kbit/s rate being added in the current revision.
Even lower rates can be considered with the resulting effect on power
consumption.
126
Page 122
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Features:
Reservation of guaranteed time slots, Collision avoidance through CSMA/CA
Integrated support for secure communications.
Devices also include power management functions such as link quality and
energy detection.
Upper layer
Convergence sublayers
IEEE 802.15.4
Medium Access
Physical layers
127
Page 123
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
PHY protocol data unit(PPDU) Preamble Start of packet delimiter PHY header
PHY service data unit (PSDU) 6 bytes i 127 bytes PHY packet fields.
The packet or PHY protocol data unit (PPDU) consists of the synchronization
header, a PHY header for the packet length, and the payload itself which is also
referred to as the PHY service data unit (PSDU).
preamble – used for synchronization 8-bit start of packet delimiter, signifying the
end of the preamble. Out of the 8 bits in the PHY header, seven are used to specify
the length of the PSD which can range from 0-127 bytes.
Beyond these three bands, the IEEE 802.15.4c study group considered the newly
opened 314–316 MHz, 430–434 MHz, and 779–787 MHz bands in China.
In August 2007, IEEE 802.15.4a was released expanding the four PHYs available
in the earlier 2006 version to six, including one PHY using Direct Sequence ultra-
wide band(UWB) and another using chirp spread spectrum (CSS).
129
Page 125
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The Medium Access Control (MAC) enables the transmission of MAC frames
through the use of the physical channel. Besides the data service, it offers a
management interface and itself manages access to the physical channel and
network beaconing.
It also controls frame validation, guarantees time slots and handles node
associations. Finally, it offers hook points for secure services.
The MAC protocol data unit (MPDU), or the MAC frame, consists of
The MHR consists of a 2 byte frame control field that specifies the frame type, the
address format and controls the acknowledgement, 1 byte sequence number which
matches the acknowledgement frame with the previous transmission, and a
variable sized address field (0-20 bytes).
130
Page 126
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The payload field is variable in length but the maximum possible size of an
MPDU is 127 bytes.
The MFR completes the MPDU and consists of a frame check sequence (FCS)
field which is basically a 16-bit CRC code.
IEEE 802.15.4 under certain conditions provides dedicated bandwidth and low
latencies to certain types of applications, by operating in a super frame mode.
Channel access is usually contention based though the PAN may assign time slots
to a single device. This is known as a guaranteed time slot (GTS) .
No security,
Access control lists and
Symmetric key security using AES-128.
3. Explain the main components of the wireless sensor node.
Controller
Communication device(s)
Sensors/actuators
Memory
Power supply
Microcontrollers:
The processor for general purposes
It is used in Optimized for embedded applications
Low energy consumption.
The communication module of a sensor node is called “Radio Transceiver”
The essentially tasks of transceiver is to “transmit” and “receive” data between a pair of
nodes.
The following characteristics of the transceiver should be consider for sensor nodes
Capabilities
Energy characteristics
Radio performance
Transceivers typically has several different states/modes
Transmit mode
Transmitting data
Receive mode
Receiving data
Idle mode
Ready to receive, but not doing so some functions in hardware can be
switched off.
Reducing energy consumption a little
Sleep mode
132
Page 128
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Memory
Power
Supply
134
Visit & DownloadedPage 130
from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
UNIT V
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-
absolute and relative localization, triangulation-QOS in WSN-Energy Efficient Design-
Synchronization-Transport Layer issues.
PART – A
Sensor networks pose certain design challenges due to the following reasons:
Sensor nodes are randomly deployed and hence do not fit into any
regular topology. Once deployed, they usually do not require any human intervention.
Hence, the setup and maintenance of the network should be entirely autonomous.
Sensor networks are infrastructure-less. Therefore, all routing and
maintenance algorithms need to be distributed.
Sensor nodes should be able to synchronize with each other in a
completely distributed manner, so that TDMA schedules can be imposed and temporal
ordering of detected events can be performed without ambiguity.
2.Define Localization.
135
Page 131
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
3.Define worst-case and best-case coverage.
136
Page 132
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
This protocol optimizes the pure link state routing protocol. Optimizations are
done in two ways: by reducing the size of the control packets and by reducing the
number of links that are used for forwarding the link state packets.
137
Page 133
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
PART – B
The optimized link state routing (OLSR) protocol is a proactive routing protocol
that employs an efficient link state packet forwarding mechanism called multipoint
relaying. This protocol optimizes the pure link state routing protocol.
Optimizations are done in two ways:
by reducing the size of the control packets and
by reducing the number of links that are used for forwarding
the link state packets.
The reduction in the size of link state packets is made by declaring only a subset of
the links in the link state updates.
This subset of links or neighbors that are designated for link state updates and are
assigned the responsibility of packet forwarding are called multipoint relays.
138
Page 134
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
The optimization by the use of multipoint relaying facilitates periodic link state
updates.
The link state update mechanism does not generate any other control packet when
a link breaks or when a link is newly added.
The link state update optimization achieves higher efficiency when operating in
highly dense networks.
Figure 5.1(a) shows the number of message transmissions required when the
typical flooding-based approach is employed. In this case, the number of message
transmissions is approximately equal to the number of nodes that constitute the
network.
The set consisting of nodes that are multipoint relays is referred to as MPRset.
Each node (say, P) in the network selects an MPRset that processes and forwards
every link state packet that node P originates.
The neighbor nodes that do not belong to the MPRset process the link state
packets originated by node P but do not forward them.
Similarly, each node maintains a subset of neighbors called MPR selectors, which
is nothing but the set of neighbors that have selected the node as a multipoint
relay.
A node forwards packets that are received from nodes belonging to its
MPRSelector set. The members of both MPRset and MPRSelectors keep
changing over time.
The members of the MPRset of a node are selected in such a manner that every
node in the node's two-hop neighborhood has a bidirectional link with the node.
The selection of nodes that constitute the MPRsetsignificantly affects the
performance of OLSR because a node calculates routes to all destinations only
through the members of its MPRset.
139
Page 135
Visit & Downloaded from : www.LearnEngineering.in
Visit & Downloaded from : www.LearnEngineering.in
Every node periodically broadcasts its MPR Selector set to nodes in its immediate
neighborhood. In order to decide on the membership of the nodes in the MPRset, a
node periodically sends Hello messages that contain the list of neighbors with
which the node has bidirectional links and the list of neighbors whose
transmissions were received in the recent past but with whom bidirectional links
have not yet been confirmed.
The nodes that receive this Hello packet update their own two-hop topology
tables. The selection of multipoint relays is also indicated in theHello packet. A
data structure called neighbor table is used to store the list of neighbors, the two-
hop neighbors, and the status of neighbor nodes.
The neighbor nodes can be in one of the three possible link status states, that is,
uni- directional, bidirectional, and multipoint relay. In order to remove the stale
entries from the neighbor table, every entry has an associated timeout value,
140
Page 136
Visit & Downloaded from : www.LearnEngineering.in