0% found this document useful (0 votes)
5 views

Issues 2

project of memories to use some prototype

Uploaded by

diyide4473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Issues 2

project of memories to use some prototype

Uploaded by

diyide4473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Pricing Scheme

• Adhoc networks function depends on the presence of


relaying nodes and their willings to relay other nodes
traffic.
• If an optional route from A to node B passes through
node’c’, but node ‘c’ is not powered ON.
• Then node ‘A’ set a costlier and non optimal route to ‘B’.
• The non-optimal route consumes more resources and
affects the throughput of the system.
• If the intermediate node in a path that relay the data
packets, they use the resources such as battery charge
and computing power.
• Military, rescue operation and law enforcement do not
require pricing scheme.
• Commercial deployment of adhoc wireless network
Quality of service provisioning

• Quality of service (QoS) is the performance level


of service offered by the service provider or a
network to a node.
The requirement of QoS:
1. Negotiation between the host and the network.
2. Resources reservation scheme.
3. Priority scheduling.
4. Call admission control.
QoS- aware routing
It is nothing but, the routing protocol use QoS
parameters for finding a path.
The parameters are
1. Network throughput,
2. Packet delivery ratio
3. Reliability
4. Delay
5. Delay gitter
6. Packet less rate
7. Bit error rate
8. Path less
• For example, the QoS parameters is bandwidth,
the routing protocol utilizes the available
bandwidth at every link to select the path.
QoS framework

• The framework for QoS is a complete system


that attempt to provide the promised services to
each user or application.
• In adhoc wireless network, there is no central co-
oridination QoS is achieved by the better co-
oridination among the nodes.
QoS Parameters
• QoS parameters vary from application to application.
• Multimedia applications- The key parameters are
bandwidth and delay.
• Military application- The key parameters are security
and reliability.
• Defence application- Finding trust worthy
intermediate host and routing through them.
• Emergency Search and rescue operation-The key
parameter is availability (ie) Multiplelink disjoint
path.
• Hybrid Wireless networks-Maximum available link
life, delay, channel utilization and bandwidth.
• Sensor Network-Communication among nodes
results in minimum energy consumption.
• The key Component of QoS Frame is a QoS
service model which defines the way user
requirements are served.
The key components of the framework are:
• QoS Routing to find all
• QoS signalling for resource reservation
• QoS Medium access control for connection
Admission control
Self-organization

• Self-organization means organizing and-


maintaining the network by the nodes itself.
• The major activings of self- organization are:
1. Neighbor discovery.
2. Topology organization.
3. Topology reorganization.
Neighbor discovery

• During neighbor discovery, every node in the


network gathers information about its neighbors
and maintains that information in appropriate
data structure.
• This may require periodic transmission of short
packets named beacons.
Topology organization

• In this phase, every node in the network gathers


information about the entire network in order to
maintain the topological information.
Topology reorganization

In this phase, the node updates the topology


information by incorporating the topology changes
occurred in the network due to mobility of nodes,
failure of nodes or complete depletion of power
sources of the nodes.
• It consists of two major activities first in the periodic
or aperiodic exchange of topological information.
• Second is adaptability (recovery from major
topological changes in the network) so adhoc
wireless network should be able to perform self-
organization quickly and efficiently in a way
transparent to the user and application.
Security

• The security of communication is very important


especially in military application.
• Two types of attacks in Adhoc wireless Network:
1.Passive attack
2. Active attack
Passive Attack

• It refers to the attempt made by malicious nodes


to perceive the nature of activities and to obtain
information transacted in the network without
distributing the operation.
Active attack

• This attack disrupt the operation of the network.


• Active attacks are performed by the nodes
outside the network is called external attack.
• This attack is done by the nodes within the
network is called internal attacks.
• Nodes that perform internal attacks are
compromised nodes.
Security threats

1.Denial of Service:
This attack is effected by making the network resource
unavailable for service to other nodes either by
consuming the bandwidth or by overloading the
system is known as denial of service.
2.Resource Consumption:
Two types of Resource- consumption attack
1. Energy depletion:
This attack depleting the battery power of critical nodes
by directing unnecessary traffic through them.
2.Buffer overflow
This attack is carried out either by felling the
routing table with unwanted routing entries or by
consuming data packet buffer space with
unwanted data.
3.Host impersonation:
A compromised internal node can act as another
node and respond with Control packets to create
wrong route entries and can terminate the path to
the destination node.
4.Information disclosure:
A compromised node can act as an informer by
deliberate disclosure of confidential information to
unauthorized nodes.
5.Interferance:
A common attack in defence application is to jam
the wireless communication by creating a wide-
spectrum noise. This should be done by single
wide band jammer sweeping across the spectrum.
The MAC and physical layer protocol an able to
handle such external threats.

You might also like