0% found this document useful (0 votes)
14 views

Issues 1

issue 1 it was something protect for a message device

Uploaded by

diyide4473
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Issues 1

issue 1 it was something protect for a message device

Uploaded by

diyide4473
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

Issues in adhoc wireless network

The major issues that affect design, deployment


and performance of an adhoc wireless system are
as follows,
• Medium Access Scheme
• Routing
• Multicasting
• Transport layer protocol
• Pricing Scheme
• Quality of Service provisioning
• Self-organization
• Security
• Energy management
• Addressing and service discovery
• Scalability
• Deployment consideration
Medium access scheme

The primary responsibility of a medium access


scheme in adhoc wireless network is the
distributed arbitration for the shared channel for
transmission of packets.
1.Distributed operation:
• The MAC protocol design should be fully
distributed involving minimum control overhead.
2.Synchronization:
• Synchronization involves usage of scares
resources such as bandwidth and battery power.
• the control packets used for synchronization can
also increase collision in the network.
3.Hidden terminals:
• Hidden terminals can cause a collision at the
receiver node.
• If affects throughput of a MAC protocol.
• So the protocol design should be able to
alleviate the effects of hidden terminals.
4. Exposed terminals:
• Exposed terminals cause inability to transmit
data by the sender.
• It affects the efficiency of MAC protocol.
5.Throughput:
• To maximize the throughput of the system by,
1. Minimizing the occurrence of collision
2. Maximizing channel utilization
3. Minimizing control overhead
6.Access Delay:
• Average delay that any packet experiences to get
transmitted.
• The protocol should minimize the delay.
7.Fairness:
• The ability of the MAC protocol to provide an
equal share for weighted share of the bandwidth
two all competing nodes.
8.Real time traffic support:
• The channel should support time-sensitive traffic
such as voice, video and real-time data.
9.Resorce reservation:
• This technique is used to provide quality of
service.
• this protocol should able to support resource
reservation.
10. Ability to measure resource availability:
• It is used to handle the resource efficiently and
perform call admission control on their
availability.
• It is also used for congestion control decisions.
11.Capacity of power control:
• Power control is used to reduce energy
consumption at the nodes.
• Decreasing interference at neighboring nodes.
• Increasing frequency reuse.
12. Adaptive rate control:
• MAC protocol should have adaptive data rate
control, (i.e.) it is use high data rate when sender
and receiver are nearby and low data rate when
sender and move away from each other.
13. Use of directional antennas:
• Increased spectrum reuse.
• Reduction in interference.
• Reduced power consumption.
Routing

The responsibilities of Routing Protocol:


• Exchanging the route information
• Finding the suitable path to the destination
• Gathering information about path breaks
• Utilizing minimum bandwidth
Major Challenges of Routing protocol
1. Mobility
Mobility of Nodes results in,
• Frequent path breaks
• Packet collision
• Transient loops
• State routing information
• Difficulty in resource reservation
A good routing protocol should efficiently solve all
the
above problems.
2.Bandwidth Constraints:
• The channel is shared by all the nodes in the
broadcast region.
• The Bandwidth available per wireless link depends
on the number of nodes and the traffic they handle.
• Thus only a fraction of bandwidth is available for
every node.
3.Error-prone and Shared channel:
• The bit error rate in a Wireless channel is
• The bit error rate in a Wired channel is
• In order to increase the efficiency of the routing
protocol, should consider the state of the Wireless
link, Signal to Noise ratio and Path loss for routing.
4.Location-dependent Contention:
• High contention of the channel results in a high
number of collision results in Wastage of
Bandwidth.
• Contention depends on the number of nodes.
• If the number of nodes increases in a given
geographical region, contention also increases.
• A good routing protocol should uniformly
distribute the load across the Network.
5.Other resource Constraints:
• Computing power, Battery power and buffer
storage also limit the capability of a routing
protocol.
Major Requirements of a Routing
protocol in AWN
1.Minimum Route Acquistion Delay:
• The distance Between source node to the
destination node should be minimum.
• This delay depends on the Size of the network
and the network load.
2. Quick route configuration:
• Due to unpredictable changes in the network
topology, the routing protocol should able to
reconfigure the route due to path breaks and
packet loses.
3.Loop-free Routing:
• Due to random movement of nodes, transient
loops may form in the route, results in wastage
of Bandwidth.
• Routing protocol thus detect the transient lop
and take corrective actions.
4. Distributing routing approach:
• If we use controller is routing approach in this
network may consume large bandwidth.
5. Minimum control overhead:
• Control packets exchanged for finding routs and
maintaining existing routes.
• Control packets may consume network
bandwidth, cause collision with data packet and
reduce network through put.
6. Scalability:
•If the number of nodes in the network increases
means the routing protocol may adapt the
scalability and perform efficiently in the network.
7. Provision of QOS:
•QOS Parameters: Bandwidth, delay, gitter,
packet delivery ratio and through put.
The routing protocol should be able to provide a
certain level of QOS as demanded by the nodes.
8. Support for time- sensitive traffic:
• Tractical communication require time- sensitive
traffic.
• The routing protocol should be able to support
hard real time and soft real time traffic.
9. Security and privacy:
• Routing protocol have in- built capability to avoid
resource consumption, denial of service,
impersonation.
Multicasting

• Multicasting plays an important role in


emergency, search and rescue operation, and
military application.
• In this environments, nodes form groups to
carry out certain tasks that require point to
point or point to multipoint voice and data
communication.
• Provision of Multiple links among the nodes is
designed by Mesh-shaped structure.
• The Mesh-based multicast routing structure
may work well in a high-mobility environment.
Major Issues in designing Multicast
Routing Protocol:
1.Robustness:
• The multicasting protocol must be able to
recover and reconfigure the path break.
2.Efficiency:
• The protocol should make a minimum number of
transmission to deliver a data packet to all the
group members.
3.Control overhead:
• This protocol should provide minimum control
overhead in order to use the available bandwidth
effectively.
4.Quality of service:
• It is very important in multicasting routing
because the data transferred in a multicast
session is time sensitive.
5.Efficient group management:
• It refers to the process of accepting multicast
session members and maintaining the
connectivity until the session expires.
6.Scalability:
• This protocol should be able to scale for a
network with a large number of nodes.
7.Security:
• Authentication of Session members and prevention
of non members from gaining unauthorized
information.
Transport layer protocol:
The main objective of transport layer protocol is,
• Setting up and maintaining end to end connections
• Reliable end to end delivery of data packets
• Flow control
• Congestion control
Transport layer Protocols

The main objective of this protocol is:


• Setting up and maintaining end to end
connections.
• Reliable end- end delivery of data packets.
• Flow control
• Congestion control
The major problem occur in this layer

• Frequent path breaks.


• Presence of stale routing information.
• High channel error rate.
• Frequent network partitions.
1. Frequent path breaks:
• The frequent path breaks occurred in the network
due to the mobility of nodes and limited
transmission range.
• If path breaks means, the Protocol should find an
alternate path reconfiguring the broken path.
• It takes long time than retransmission of packet
by the sender node.
• So the network retransmit the packet and
executes congestion control algorithm decrease
the size of the congestion window resulting in low
throughput.
2. Presence of state routing information:
• It is due to the latency associated with the
reconfiguration of a broken path and use of route
caches.
• Hence the packets will be forwarded through multiple
paths to a destination causing an increase in the
number of out of order packet.
• Multipath Routing Protocols:
1. Temporally ordered routing algorithm (TORA).
2. Spilt multipath routing protocols (SMR).
• Out of order packets arrivals force the receivers of the
TCP connection to generate duplicate
acknowledgements (ACKS).
• On receiving duplicate ACKS, the sender invokes the
congestion control algorithm.
3.High channel error rate:
• Wireless channel are inherently unreliable due to
high probability of error caused by interference.
• Hidden terminals also contributes to the increased
loss of TCP data packets or ACKS.
• When the TCP ACK is delayed mare than the round-
trip time out the congest control algorithm is
invoked
4.Frequent Network Partitions:
• Due to the mobility of node adhoc Wireless Network
experience isolation nodes from the rest of the
network or occurrence of partitions in the network.
• If sender and receiver connection are in two
different partitions, all the packets gets dropped.
• The TCP should adapt the above issues for
performing efficiently in adhoc wireless networks.

You might also like