Mobile Computing Quantum
Mobile Computing Quantum
,{obile Computing
56(IT-8)J
b. For example, Bluet . ::---.__ li7(JT_g,,
interconnectingaheadsootth, infrared np,n ... , ,~ IT-8)J
PART·l e to lapto rov1des w
WirelessLAN: p. PAN for
Wireless Networking, Wirekss LAN Overview : MAC Iss~ 2-
a. A wireless LAN (WI.AN) links
IEEE 802.11, Bluetooth, Wjreless Multiple ~ c~ ss Pro!.oc;l;. distributed method (For exam two or lllore device .
and usually providing pie.= SPfead.~USlllg a Wireless
wider internet. a connection through an or OFDM radio)
CONCEPT OUTLINE: PART·l . . access l>Oint to the
• Wrreless network refers to any type of computer network that b. This provides user the mobilit
coverage area and still be co Y to move around within
is wireless and is commonly associated with a telecommunication nnected to netw k a 1ocaJ
network. c. For example : or .
. ..-_r,;. . A wireless LAN is linking of two or more computer or devic i Wi-Fi :Wi-Fi networks broad .
using spread spectrum or OFDM modulation. es picked up by Wi-Fi receivers a::hrad10 ~aves that can be
• Bluetooth is open wireless technology standard for exchangin or mobile phones. ed to different computers
data over short distances from fixed or mobile device creating ii. Fixed wireless data : It is a t of .
PAN with high levels of security. g that can be used to connect twoyPe Wireless data network
or more building to
extend or share network bandwidth. s gether to
. 3. Wireless MAN:
a. WirelessMetropolitanAreaNetworkareatype 0 f .
Questions-Answers that connects several wireless LANs. 1
Wire essnetwork
J
Long Answer Type and Medium Answer Type Questions b. For example, Wi-Max is a type ofWMAN.
4. Wireless WAN:
a. Wireless Wide Area Network (WWAN) are wireless networks that
+QueFZ.1. '.j Describe briefly about wireless networking. Describe typically cover large outdoor areas.
the various types of wireless networking. b. These network can be used to connect branch offices of business or
OR as a public internet access system.
What are the basic differences between wireless WAN and wireless c. They are usually deployed on 2.4 GHz band.
LAN ? Discuss the common features of these. d. A typical system contains base station gateways, access points and
wireless bridging relays.
IUPTU 2012-13, Marks 05 I
~1°:l>Jti:_JExplain the uses, pros and cons of wireless network.
~ er OR
Wireless network : What are the advantages and disadvantages of using a wireless
1. Wireless network refers t.o any type of computer network that is wireless transmission as compared to a fiber or wire transmission ?
and is commonly associated with a telecommunication network whose I
UPTU 2012-13, Marks os]
interconnection between nodes are implemented without the use of
wires.
2. Wireless telecommunication networks are generally implemented with ~~~tdrt- "·.·
:: 1
some type of remote information transmission system that uses Uses of ~less networking:
1. With the help of wireless networks, information could be sent overseas
electromagnetic waves, such as radio waves for the carrier and this
with efficiency and more reliability.
implementation usually takes place at physical layer of network.
Types of wireless network : 2 Efficient services such as the police department utilize wireless network
·
to communicate important information quickly.
L Wireless PAN: · Another important use for wireless networks is an expensive and rapidth
3
a A Wireless Personal Area Networks (WPAN) interconnect devices way to be connected to the internet in countries and regions where e
1
within a relatively small area. telecom infrastructure is poor.
r ,....-
t 58(IT-8) J
Pros:
-
Wireless Networking
Mobile Computing
2. Installation difficulties :
59(1T-8) J
l
I
2. Coverage:
a. Th oug · ail
the past decade and good coverage 1s av a e wt
range.
bl
.
h coverage is limited, wireless technology has improved over
"thin a spec1"fied
a. Users can experience black spots within the coverage range where
the wireless signal has difficulty passing through certain building
materials or if the area has significant radio interference.
b. Users may need to do some experimenting to obtain optimal signal
b. Beyond that, extender and range boost~rs can be used if wider stability.
coverage is required. 4. Speed:
3. Unlimited users : a. While wireless networks are faster than dial-up connection, the
a. Wired routers will typically come with three or four connection average speed tends to be slower than an ethernet connection as
port and require a switch for additional expansion. an issue to be considered if you or your organization will be relying
b. With a wireless network you can add more users without the need solely on a wireless network.
to change hardware, though bandwidth and speed may become an
Que ·2;s: JI Give the brief discussion on wireless LAN. What are the
issue if there are too many users. h. ~ ~ ut1
Convenience, flexibility and efficiency : advantages and disadvantages of WLAN ?
4.
a. A wireless network can be invaluable for companies that hot desk
or have other office-sharing practices.
~ ' :)
.wer
•. '"_.
.w,-
Wireless LAN:
b. If you need mobility around the workplace, a wireless network 1. A wireless LAN is linking of two or more computer or devices using
help you move around without worrying about access points or spread spectrum or OFDM modulation.
wires.
2. WI.AN are typically restricted in their diameter to buildings, college
5. Cost:
I
campus, single rooms etc. and are operated by individuals, not a large-
a. Wireless routers have become very affordable in the past few years scale network providers.
so the costs associated with setting up a wireless network will not 3. The global goal ofWLAN's is to replace office cabling, to enable access to
necessarily be prohibitive.
I
the internet and, to introduce a higher flexibility for adhoc communication
b. It may even cheaper to install a wireless network in some situations. in public places and group meetings.
Cons: j 4. The wireless LAN technology is based on IBEE 802.11 standard.
L Security: 5. It is a member oflEEE 802 family, which is a series of specification for
a
b.
Wireless networks are more difficult to secure than wired local
networks.
As a result, they are more vulnerable to attack by unauthorized
I LAN technologies.
6. The primary component of a WLAN is the wireless interface card that
has an antenna.
users. 7. This interface card can be connected to the mobile unit as well as to fixed
C.
If improperly secured, an individual could access the network from network .
a location near the practice using scanning software to identify 8. There are many products which used unlicensed ISM bands along with
available network. WLAN, for example microwave over cordless phone etc.
9. There are three bands within the ISM bands.
L l
Wireless Networking •• bile Computing
60(IT-8)J
regulate the operation 61 (}T.G, ,
10. There are 900 MHz ISM band, which ranges from 902 to 928 MHz, 2 _4 interference. sand restrict frenn •• _ . ~
GHz ISM bands which ranges from 2.4 to 2.4853 GHz and 5.4 GHz band requencies to . .
which ranges from 5.275 to 5.85 GHz. b. The WLAN s are limited to low lllinimize
free frequency bands whi h PGWer Benders •·•
11. WLAN uses 2.4 GHz and 5.4 GHz band. ' c are not _,.. certain Ii
12. WLAN works both in infrastructure and adhoc mode.
S. safety and security : same worldWide. cense.
a. Using radio waves for data tr . .
AdvantagesofWLAN: high-tech equipments for ans1111sSJonlllightinter£ .
1. Flexibility: . . , example, in hos i ere with other
b. Special precautions have to bet ptais.
a Within radio coverage, nodes can communicate without further
restriction.
c. The open radio interface
"" A
-·L akentopre
,.r, this 1eads to the hacking
vent safety hazards
....,._es eavesdr0 . ·
vv ......ru, s, f . PPmg much easi .
b. As radio waves can penetrate walls, so senders and receivers can o Wireless er in
be placed anywhere. 4. proprietary solutions: Due to slow stand . . network easily.
companies have come up with proprietary ardi. zation Procedures man
2. Planning : · alitY WI"th many enhanced featur801utionsofliermg · standardized
' Y
function
a Wireless adhoc networks allow for communication without previous es.
b.
planning, any wired network needs wiring plan.
As long as devices follow the same standard, they can communicate.
~ IDiscuss the basic design goals of'WLAN's.
3. Design:
a Wireless networks allow for the design of small, independent devices
~ I
Design goals of WLAN's are:
which can be put into a pocket.
1. Global, seamless operation : It should work g1Oball 1,
b. For example : small PDAs, notepads, mobile phones etc. · al s an dthe operafionsh ould be faultless that is seamless.
tenmn Y orallthe
4. Robustness : 2. Low power fo~ battery use: Since mobility comes with the limitation
a Wireless networks can survive disasters. For example, earthquakes, of power thus, 1t should consume low power.
floods or users pulling a plug. 3. No special permissions : It should not require any special permission
b. If the wireless devic~s survive, people can still communicate. or license to use the LAN. All the users in the range of a particular
c. Networks requiring a wired infrastructure will usually breakdown WLAN should be able to access the LAN easily.
completely. 4. Robust transmission technology : The transmission technology
5. Cost: used should be robust that is easy to use and implement.
a After providing wireless access to the infrastructure via an access 5. Security : WLAN should ensure security that is a user must be ensured
point for the first user, adding additional users to a wireless network that no one should be able to read his/her data.
will not increase the cost. 6. Privacy: WLAN should also ensure privacy i.e., no one should be able
Disadvantages of WLAN: to collect user profiles.
1. Quality of Service : 7. Safety: WLAN should be safe i.e., it should have low radiation.
a WLAN s typically offer lower quality than their wired counterparts. 8. Simplified spontaneous cooperation at meetings.
b. The main reasons for this are the lower bandwidth due to 9. Easy to use for everyone, simple management.
limitations in radio transmission, (for example, 1-10 Mbps user data 10. Protection of investment in wired networks.
rate instead ofl00-1000 Mbps), higher error rates due to interference . Ii t·
11. Transparency concerning app ca ions an
d higher layer protocols, but
and higher delay due to extensive error correction and detection also location awareness if necessary.
There are
WLAN : two basic transmission technologies that can be us ed to set up
~ ml What the variol18 types of WLAN ? List the various
applications of wireless LAN.
1. Infrared technology :
a. This technology uses diffuse light reflected at walls f . Types ofWLAN: There are different types ofWLAN's. Some of the most
directed light if a line-of-~ight (LOS) exists betwee'n urruture
sender and
or
popular ones are :
receiver. 1. IEEE 802.11 :
ders can be simple light emitting diodes (LEDs) where
b. S en . as a. In June 1997, IEEE finalized the initial specification for WLAN's:
ii photodiodes can act as receivers. IEEE 802.11.
Advantages of infrared technology : b. This standard specifies a 2.4 GHz frequency hand with data rate of
l. It is simple and extremely cheap. 1 Mbps and 2 Mbps.
2. Most of the devices have an infrared data association (lrDA) c. Today, these standards offer a local area network of bandwidth
interface. going upto a maximum of 54 Mbps.
3. No licenses are needed for infrared technology and shielding 2. Hyper LAN:
is very simple. a. Hyper LAN begins in Europe in 1996 by EISI broadband radio ·
4. Electrical devices do not interfere with infrared transmission. access network group.
h. Hyper LAN/1 the current version works at the 5 GHz band and
Disadvantages of infrared technology :
offer upto 24 Mbps bandwidth.
1. Low bandwidth compared to other LAN technologies.
c. Next version Hyper LAN/2 will support a bandwidth of 54 Mbps
2. Infrared data association devices are internally connected to a with QoS support.
serial port limiting transfer rates to 115 khit/s. This is not a
d. This will he able to carry Ethernet frames, ATM cells, IP packets
high data rate. and support data, video, voice and images.
3. One of the main drawbacks of infrared is that it can be easily
3. Bluetooth :
shielded.
a. Bluetooth was named after Harold Bluetooth, King of Denmark
4. Infrared transmission cannot penetrate walls or other obstacles. · during 952 to 995 AD, who had a vision of a world with cooperation
2. Radio transmission : It includes long-term experiences made with and interoperability. ·
radio transmission for wide area networks and mobile cellular phones. b. It is now promoted by many big industry leaders like IBM, Ericsson,
Advantages of radio transmission : Intel, Microsoft, Nokia etc.
1. It can cover larger areas. c. Blue tooth is a wireless personal area network (PAN) operating at
2.4 GHz hand and offers 1 Mbps data rate.
2. It can penetrate walls, furniture, plants etc.
d. It uses frequency hopping spread spectrum (FHSS) modulation
3. It does not need line-of-sight (LOS) if the frequencies are not too
and offers 1 Mbps and 2 Mbps at 2.4 GHz frequency band.
high.
4. MANET: Manet is a working group within the IETF to investigate and
4. Radio based products have higher transmission rates . For example,
develop the standard for mobile adhoc networks.
54 Mhit/s, 100 Mhit/s.
Disadvantages of radio transmission : Various applications of wireless LAN are:
l
64(IT-8) J Wireless Networking
r,fobile Computing 65 <IT-8) J
I
18,e.2.t,itl Give the brief dis~ussion on MAC layer. Why the :::.--:-:;; therefore, needs a mechanism to coordinate traffic · · • th
~•• llis' th t ,m1mnuze e
specialized MAC is needed for wireless LAN? 4- UDlber of co ions a occurs, and maximize the numbe f fr
nthat are delivere
. d successfull y. r o ames
1· ,. ·;·-·-1
,~swe:a;'l,J,
0 •
- In
sender cannot "hear" the collision due to weakening of the signals, i.e.,
1. The MAC algorithms used in wired network often fail in wireless CD does not further move, CS might not work if, for example, a terminal
network due to some reasons. is "bidden". Collision detection in wireless is a difficult task as the
2. One of the commonly used algorithm for wired networks is CSMA/cn magnitude of the signal varies with distance.
which works as follows : If a sender wants to send something, it sends as
soon as the medium is free, it listen into the medium if a collision occurs context to cellular network, discuss the following:
it stops sending and sends a jamming f!ignal. i. Cell splitting
3. Now, in case of wireless network this scheme fails, as in wireless network ii. Near and far problem
4.
the signal strength decreases proportional to the square of the distance.
Now when the sender would apply CS (Carrier Sense) and CD (Collision
iii. Bidden terminal problem IUPTU 2014-15, Marks 05 I
Detection) if a collision occurs at the receivl!r it might be the case that a IUPTU 2015-16, Marks 02 I
sender cannot "hear" the collision due to weakening of the signal, i.e.,
CD does not further move, CS might not work. For example, a terminal
is "hidden".
IA1itnr4
Cell splitting: Refer Q. 1.10, Page 19.J, Unit-1.
5. Collision detection in wireless is a difficult task as the magnitude of the Near and far problem:
signal varies with distance.
1. This situation often occurs in wireless networks. Consider the scenario
S!e·u : ,JI "CSMA/CD is not suitable protocol for wireless LAN".
ft
in Fig. 2.9.1.
--~·"-·.c·.:.·.:._; ·-:-
Give reaaons in favour of or against the statement ?
----~~~ --
Answer
IUP.TU 2013-14, Marks 05 j
IUPTU 2012-13, 2015-16; Marks 10 I
A B
I C
• •il:!.:JJear and far_terminals.
1.
Whenever multiple users have unregulated access to a single line, there Terminals A and B send with the same transmission power but as the
is a danger of signals overlapping and destroying each other. 2.
signal strength decreases proportional to the square of the distance, the
2. signal ofteruriJlal B, therefore, drowns out A's signal.
Such overlaps which turn the Bignais into unusable noise are called
collisions.
Thus c cannot receive A. lfC, for example , was an arbiter for sending
3. 3.
A traffic increases on a multiple-access link, so do collisions.
::!wn
. bbl (C acts as a coordinator for media access), terminal B would
out teruriJlal A already on the physical layer .
· -:-,1
Ii _Li~
'(,'-., -
1'
66 (IT-8) J Wireless Ne._
•wor~
67(1T-8)J
Hidden terminal problem:
l. In Fig. 2.9.2 there are three devices A, Band C. The ellipses re
the transmission ranges. Prel!ent (Multiple Access Collision Avoidance) : MACA is proposed as an
2. We can see that the transmission range of A reaches B b 'llfACAtive to traditional CSMA. It presents a simple scheme that solves the
. ut not c,
transmission range ofC reaches B but not A and transnu·s s1onr a}ternaterminal problem.
bidden
B reaches both A and C. Rnge of 1nMACA:
3. Suppose that both A and C want to transmit to B then the fi0 1 CSMA senses the state of the channel only at the transmitter.
problem occurs : Uo1Ving · a. Lead to hidden node problem.
a A sends to B, C cannot receive A as it is not in the tr . Does not use carrier sensing.
range of A. anslllisaion 2.
b. Nodes start transmitting after a random backot'f.
b. Now, C wants to send to B, C senses a "free" medium (CS .
it cannot detect A. fails), 118 3. MACA uses RTS and CTS to overcome hidden node problems and exposed
lI ,::t-1·
node problems.
c. Thus, collision occurs at B, A cannot receive the colli •
d A is hidden for C. sion (CD fails). a. Node which only hears CTS (but no RTS), stop from transmitting
(hidden node).
b. Node which only hears RTS (but no CTS), is transmit (exposed
node).
I I 4.
c. RTS and CTS carry the expected duration of data transmission.
When there is a collision, it uses binary exponential backoff (BEB)
before retrying.
A B C where RTS stands for request to send
~ ?nfifidd~ ' pod~ ~ CTS stands for clear to send.
4. Such terminals like A and C are called hidden terminals. These tYJ)es of Packet transmission in MACA : The packet transmission in MACA is
terminals c,a use collision. shown in Fig. 2.10.1
5. Another ek ects is there known as exposed terminals which cause
unnecessary delay. N eigh~bo~r,1:1:_S,~ender R~~eiver Nei~ghbour
6. The situation is as follows :
' CTS , CTS
a. Suppose B sends something to A and C wants to send data to some DATA ',,
another terminal (not A or B) which is outside the interference ,,'
-------- ........
range of A and B.
b.
C senses the channel but finds it busy (due to B's transmission), so i!f~&;JO;K}!fef8~ 1 . ; ; ' ~.A11
C has to wait.
Avoidance of hidden terminal using MACA: MACA avoids the problem
c. But A is outside the radio range of C , therefore, waiting is not of hidden terminals as follows:
necessary. 1. Suppose A and C want to send to B.
2. A has already started the transmission, but is hidden for C, C also starts
d This is known t>.s C is "exposed" to B.
with its transmission, thereby, causing a collision at B.
Avoidance).
Explain the MACA (Multiple Access with Collision
addressed in How are hidden node and exposed node problems
MACA?
I 3. With MACA, A does not start its transmission at once, but sends a RTS
first.
4. B receives the RTS that contains the name of sender and receiver, as
well as the length of the future transmission.
I
L .1n .'
" 68 (IT-8) J
5.
.
. . . Wireless Networ1oitg
This RTS is not beard by C, but tnggers an acknowledgem~
called cTS. nt frolll ll,
The CTS again contains the names of sender (A) and receiver (
T·:=
.
69(IT-8)J
2, IEEE 802.lla:
a. It is an extension to 802.11 that applies to wireless LANs and provide
upto 54 Mbps in the 5 GHz band.
b. 802.lla uses an orthogonal frequency division multiplexing (OFDM)
encoding scheme.
c. The protocol also supports data rates of 6, 9, 12, 18, 24, 36 and 48
B C Mbps.
A
The 802.lla specifications is applied to wireless ATM gystems and is
l.t!J-~ d
used to access hubs.
Avoidance of exposed terminal problem using MACA : MACA avoid
the problem of exposed terminal as follows : 3. IEEE 802.llb:
l. With MACA, B has to transmit an RTS first containing the name of the a. It is also referred to as 802.11 high rate or Wi-Fi.
receiver (A) and the sender (B). b. This standard uses DSS and uses 2.4 GHz ISM band and provides
2. C does not react to this message as it is not the receiver, but A maximum data rate of 11 Mbps and with fall back to 5.5 Mbps.
acknowledges using a CTS which identifies B as the sender and A as the 4. IEEE802,llg:
receiver of the following data transmission.
a. It offers wireless transmission over relatively short distances at
3. C does not receive this CTS and concludes that A is outside the detection 20.54 Mbps in the 2.4 GHz band.
range. C can start its transmission assuming it will not cause a collision The 802. llg also uses the OFDM encoding scheme.
at(A).
b.
c. It uses the data rates of 6, 9, 12, 18, 24, 36 and 48 Mbps.
4. The problem with exposed terminals is solved without fixed access
patterns or a base station. d It provides compatibility with 802. llb equipment.
II
-...
CoJllPuting
r4obile 71 (lT-8) J
70(IT-8)J Wireless Networking l\{i\C JDanagement :
11- • This supports the association and re .
'A ns!!er ] 1. an access point. ·association of a station to ,
Protocol architecture of IEEE 802.11 :
1. IEEE 802.11 fits seamlessly into the other 802.x standards for wired
..
n.
It also controls synchronization r
respect to an access point and
battery power.
~;ammg .
of a station with
er management to save
LANs as shown in Fig. 2.12.1.
2. This is most common scenario where an IEEE 802.11 wireless LAN iiL MAC management also maintains th MAC
connected to a switched IEEE 802.3 ethernet via a bridge. infonnation base (MIB). e management
3. The higher layers (application, TCP, IP) look the same for wireless paY JDanagement : This is responsible for chann 1 1 .
nodes as for wired nodes. b- p}IY-MIB maintenance. e se ectionand
4. The upper part of the data link control layer, the logical link control
(LLC), covers the differences of the medium access control layers needed Station JDanagement: This is responsible for coordination fall
for the different media. c- management functions and additional higher layer functions~
5. In many of today's networks, no explicit LLC layer is visible. . slayers used in 802.11 are as follows:
variou
Mobile terminal Access point physical layer :
L The 802.11 physical layer (PHY) acts as an interface between the
a. MAC and the wireless media where the frames are transmitted
~_.s--+ and received.
Application Application
b. The PHY provides three functions:
TCP TCP
L The PHY layer provides an interface to exchange frames with
IP IP the upper MAC layer for transmission and reception of data.
LLC LLC The PHY uses carrier signal and spread spectrum modulation
ii.
802.11 MAC 802.3 MAC 802.3MAC to transmit data frames over the media.
802.11 PHY 802.3 PHY 802 .3PHY iii. The PHY provides a carrier sense indication back to the MAC
to verify activity on the media.
Three versions of PHY layer defined as follows:
6. The IEEE 802.11 standard only covers the physical layer PHY and 1. Frequency Hopping Spread Spectrum (FHSS) :
medium access layer MAC like the other 802.x LANs do.
a. FHSS allows the co-existence of multiple networks in the same
7. The physical layer is subdivided into the "physical layer convergence area by separating different networks using different hopping
protocol (PLCP)" and the "physical medium dependent sub-layer (PMD)".
sequences.
C)
LLC b. Data transmission over the media is controlled by FHSS PMD sub-
,-.l
A
"El layer.
MAC MAC managemant The 802.11 Frequency Hopping Spread Spectrum (FHSS) PHY uses
., C.
the 2.4 GHz radio frequency band, operating with 1 or 2Mbps data
PLCP
PHY managemer.t ls rate.
PMD j d. The frame consists of two basi~ parts namely the PLCP part
rn (preamble and header) and the payload part (pSDU).
Fig. 2.12. ~- Detailed IEEE"802.11 protocof'aaj,itecture and managemenq 1
e. PLCP part is transmitted at 1 M!Jit/sec and P8DU can transmit or
8~ Flg. 2.12.2 shows the IEEE 802.11 layers along and the protocol sub- 2 Mbit/sec.
layer and MAC, PHY and station management. 23
f. The frame of IEEE 802.11 FHSS is shown in Fig. 2.1 -
r-,
..
80 4 16 _ _ b,~
Synchronization I SFD I PLW I PSF I HEC 1
80
Synchronization
16 8 8 16
Payload
....L
iiif
74(IT-8)J r,i:obile Computing
Wireless Networking
::---
5773 slats 4 slots 3 slots 32 slots 16 slots 18 bit This waiting time is --__ 75(1T.0>.
contention period. D~f~: asYllchronous d a t a ~
Synchronization SFD Dats rate D,level Length CRC PSDU fdAC protocols : There are two b . lined as SJFs Plus tw&ervic, Within a
, nows : asic 80'2.11 MAC O slot times
!UPTU 20u~12, 19 ! The architecture of a bluetooth device is described by the two terminology :
piconet and scatternet.
1. Piconet :
Answer
a. A piconet is a collection ofbluetooth devices connected in an adhoc
Advantages of bluetooth : fashion .
1. Bluetooth does not require a clear line of sight between the synced b. One device in the piconet act as master (M) and all other devices
devices. connected to the master act as slaves (S).
-.,
M = Master
S = Slave
,,...._,
P = Parked
SB = Standby ®\ I
I
@/
,
~/ Audio
[!!;7r
llli.Jlae&th1€@!iW
d Collisicn occurs if two or more piconets use the same carrier Host controller
interface
frequency at the same time.
Baseband
e. If a device wanta to participate in more than one piconet, it has to
synchronize to the hopping sequence of the piconet it wants to take Radio
part in.
Fig. 2.16.1. Bluetootb protocol stack_.
Wireless Networking Jllputing 81 (IT.a) J
-.
80(IT-8)J
~.,i,U• CO ,band 1ay., off,~ two dilr.,,ot 1yp,, "'"""• ' " " " ' -
3. Here,
f
. , Bas
onnection-oriented link and an asYnchronous connectionless 1,.L =
AT: Attention Sequence c. manager protoc~l (~) =.It provides link set-up and
OBEX : Object Exchange fbe Jjnk nt between devices including security functions and
TCS BIN: Telephony Control Protocol Specification-Binary s. ,,,,..,.8 na.gellle
eters
negotiation. LMP performs the following functions:
p · · dE ·
a.ra.Jll tication, llll'lng an ncrypt1on :
BNEP : Bluetooth Network Encapsulation Protocol a. . L
P AutheMPn has to control the exchange of random numbers and
SDP : Service Discovery Protocol L signed responses.
RFCOMM: Radio Frequency Communication
.. For Pairing, it. provides
t d link key which may be changed,
4. The· bluetooth protocol stack can be divided into a core specification, IL acce pted or reJec e .
which describes the protocols from physical layer to the data link control
together with management functions, and profile specifications. cryption, LMP sets the encryption mode (no encryption,
iii. F:~n~~to-point,
p • or broadcast), key size and random speed.
Core specifications of bluetooth comprise of the following layers : nization:
h
L Radio layer (Physical layer) : This layer includes specification of air
._.,. . Sync
Sync rohr om·zation is of major importance within a bluetooth
interface, i.e., frequencies, modulation and transmit power. L network.
Design issues : .
a The radio layer operates ii:J.· the unlicensed ISM band at 2.4 GHz. ii The clock offset is updated each time a packet • .
the master. IS received from
b. Power consumption is very low due to battery operated devices.
c. Frequency band (2400-2483.5 MHz), 83.5 MHz bandwidth. C.
Capability negotiation :Notonlytheversionof•h
. " e LMP can be
d Bluetooth uses frequency hopping/l'DD scheme at a rate of 1600 . d b ut als o infiormation
exchange . about the supported r,eatures sueh
as multi-slot packets, encryption, SCO links, voice encoding etc.
hops/sec to avoid narrow band interference.
d. Power control :
e. Within a piconet, all devices use the same hopping sequence. i. A bluetooth device can measure the received signal strength.
f. Transmitting power is uJ!to 100 mW and minimum is 1 mW. ii. Depending on this signal level the device can direct the sender
g. Range is between 10 m - 100 m. of the measured signal to increase or decrease its transmit
2. Baseband layer (MAC layer) : power.
a. It includes description of basic connection establishment, packet e. Link supervision : LMP has to control the activity of a link, it may
formats, timing and basic QoS parameters. set up new SCO links, or it may declare the failure of a link.
b. The functions of baseband layer are quite complex as it not only f. State and transmission mode change : Devices might switch
performs frequency hopping for interference mitigation and medium the master/slave role, detach themselves from a connection, or
access, but also defines physical links and many packet formats. change the operating mode.
c. It enables the physical radio frequency link between the bluetooth 4. Service Discovery Protocol (SDP) :
SDP is usoo to allow devices to discover what services each other support,
devices to form a piconet.
and what parameters to use services and the characteristics of the
d Bluetooth also defines 1 slot, 3 slot and 5 slot packets for higher services can be queried and after that, a connection between two or
data rates. more bluetooth devices may be established.
68(72) 54 0-2745 bits For example : When we connect a mobile phone to a bluetooth headset.
Iaccess code Ipacket he~erl payload
4 1 -r----l __ ---
8b~
SDP will be used to determine which bluetooth profiles are supported by
the headset (the headset profile, handfree profile) and the P~dotocallol
/ 4 64 (47"--~ 3 . tt h of them. Bes1 es
flow I ARQN ISEQN I HEC mul t1plexer settings are needed to connec o eac
st
these, some other terms are also described in protocol ack :
• f ·s the cable
a. RFCOMM: Radio frequency co~mun1c~~onsrt1usedtomake
e. A bluetooth packet (1 slot) baseband layer consists three fields: replacement protocol used to create virtual se pothr gh minimal
. t ansparent ou
access code, packet header, payload. replacement of cable techno1ogies r
modification of existing devices.
82 (IT-8) J
stuetooth profiles :
1.
83(1T-8)J
~---.., .
~ swer ®Jm
Multiple access protocol :
Bluetooth: Refer Q. 2.13, Page 75J, Unit-2. 1. If many users share a channel and two or more users transmit packets
Functions of different layer of protocol stack : Refer Q. 2.1 6, simultaneously, collision may occur.
Page 79J, Unit-2.
111111111111,
11111
84(IT-8)J
Wireless Networlting
2. To avoid the collision, we need access protocol. ft{obile Computing
DJ:,._ -
3. There are various multiple access protocols used in Wirele
communications. 88 What are the characterist· - ~
ics required f
4. On the basis of characteristics, multiple access protocol are categorized • less ? or Tep over
as follows : ,itil"' OR
Multiple access protocol TCP over wireless works ?
JloW
Scheduled access
Random access •
[!eer]
TCP over wirel-:Ss :
Static I 7
§
assignment Demand Repeat random Reservation 1. TCP is the prunary transport protocol in the internet.
§
assignment access random access t is designed to provide reliable data transfer betw h
2- Iby a senes
. of wire
. d routers. een osts COnn...+.
- =a
SDMA
Polling Aloha · tr-Aloha
FDMA
Slotted aloha 3_ TCP is a connection-oriented and reliable transmission protocol.
TDMA
CSMA 4. It uses flow control to avoid data overflows on both sender and receiver
CDMA t Token passing ISMA PRMA side.
a. Scheduled access protocol: By adjusting each user's tranamitting TCP working:
time and frequency, it avoids simultaneously data transmission l.. When the application requires reliable transport of the packets, it may
between two or more users. use TCP.
b. Random access protocol :Although collision occurs because two 2_ TCP requires several packe~s over the wireless link.
or more users access a channel simultaneously, collision can he
reduced. 3. First TCP uses a three-way handshake to establish the connection.
4. At least one additional packe~is needed for transmission of the request
and requires three more packets to close the connection.
PART-2
5. It is explained with the help of Fig. 2.19.1.
T CP over Wireless, Wireless Applications, Data Broadcasting,
Mobile IP, WAP : Architecture, Protocol Stac/f., Client Server
Applicati.on Envircmment, Application.
TCP SYN
_. - < I
• TCP is designed to provide reliable data transfer between hosts
TC } Connection setup
connected by a series ofrouters. PACK
• Mobil e IP protocol allows location independent routing of IP HTTP request } Data transmission
da tagram's on the internet.
• Broadcast systems are classified as unidirectional distribution !>15snodata
systems.
• Wireless Application Protocol (WAP) provides internet services
for mobile and wireless devices.
Questions-Answers
T
._I:.
,GPRS: 500 ms )
6. Fig. 2.19.1 shows an example for the overhead introduced by using TCP
Long Answer Type and Medium Answer Type QuestiODB
over GPRS is a web scenario.
7. Web services are based on HTl'P which requires a reliable transport
system.
86(IT-8)J Wireless Networking
"
~ obiie
CoJJlputing
~ e l losses: 87(IT-s)J
l, Signals carried by wireless med"
8. In the internet, TCP is used for this purpose. 11- interference from other signals anida are subject to sian:li
9. Before a HTI'P request can be transmitted the TCP connection has to
· fb"t hil ' .,,i...___ 1 .,... cant
Jll dification o 1 s w e frames arebe·:--'luent y, lOSses d
0 lllg transnu ue to
established. be
tted.
TCP performance is affected by the fr
10. This requires three messages. b- the link layer,
. because
d" TCP
k inherent!Yassumesa111
equent losses oce,,,.,.;ftn at
· ··-·"'15
11. If GPRS is used as wide area transport system, one-way delays of • to congestion an mvo es the congestion 06Ses oceur due
ms and more take place. 500 detecting any loss. control algorithms upon
12. The setup of a TCP connection already takes far more than a second. Lo"' bandwidth :
Characteristics of TCP over wireless : So Bandwidth of wireless links may be 1 ·hi
11- • • b--~ . ow, w ch can .
L Data rates : result m excessive w,ermg at the base station. sometimes
a The data rates of2.5G systems are 10-20 kbit/s uplink and 20-50 b. This could lead to packets being dropped at the b stati.
kbit/s downlinks, 3G and future 2.5G systems offer data rates &round tran5roitted back to back on the wireless link, hi h on, or
64 kbit/s uplink and 115-384 kbit/s downlink. in high observed round trip times. w c in tum resull8
b. Data rates are asymmetric as it is expected that users will download S. Signal fading : Fading typically occurs when a wireless host is mobile
more data compared to uploading.
'- Movement across cells : ·
c. In cellular networks, asymmetry does not exceed 3-6 times and in a. Mobility of a wireless host involves addressing connection handoff.
satellite systems asymmetry may reach a factor of 1000.
b. In a~dition to th~~ layer sta~ that has to be handed off, the~
d To support multiple users within a cell, a scheduler may have to station may mamtain connection state about the transport lay
repeatedly allocate and de-allocate resources for each user. which might need to be handed off. er
2. Latency:
5. Channel asymmetry :
a Wireless systems provide algorithms for error correction and a. Resolving channel contention is usually asymmetric.
protection, such as forward error correction (FEC), check summing
and interleaving etc. b. The sending entity gets more transmission time than the receiving
b. FEC and interleaving let the round trip time (RTT) grow to several entity.
hundred milliseconds upto some seconds. c. This could lead to TCP acknowledgements being queued for
transmission at the link layer of the receiving entity and sent back
c. The GPRS standard specifies an average delay of less than two
to back when channel access is permitted.
seconds for the transport class with the highest quality.
d This can lead to larger round trip times measured by the TCP
3. Jitter:
sender and to bursty traffic, which subsequently reduces the
a Wireless systems suffer large delay variation or delay spikes. throughput of the TCP connection.
b. Reasons for sudden increase in latency are link outages due to 6. Link latency : Wireless links may exhibit high latencies and when such
temporal loss of radio coverage, blocking due to high-priority traffic, delays are a signi£~ant fraction of the total round trip times observed_by
or handovers. TCP, the retransmission time outs of TCP are set to high values, which
4. Packet loss : subsequently affects TCP performance.
a Packets might be lost during handovers or due to corruption. §!~iii£} Write a short note on TCP congestion control,
b. The loss rates of2.5G/3G systems due to corruption are relatively
low.
E
17. If the sender receives du packs, it assumes loss and retransmits the lost
segment without waiting for the retransmit timer to go off. Access point (foreign agent)
18. It also updates ssthresh.
=----.,i '-._ internet ,/ I=- I
19. Fast recovery keeps track of the number of du packs received and tries Wireless TCP _ _
to estimate the amount of outstanding data in the network. Mobile host
20. It inflates cwnd (by one segment) for each dupack received, thus
maintaining the flow of traffic. 2. Snooping TCP :
21. The sender comes out of fast recovery when the segment whose loss a. One of the drawbacks of I-TCP is the segmentation of the single
resulted in the duplicate ACKs is acknowledged. TCP connection into two TCP connections.
b. This loses the original end to end TCP semantic.
22. TCP then deflates the window by returning it to ssthresh, and enters
the congestion avoidance phase. c. Snooping TCP works transparently and hence does not lose end to
end semantics.
~ e 2.22. j Why does traditional TCP not perform well in wireless
d. The main function of the enhancement is buffering of packets
network ? Discuss different approaches for TCP Improvement. close to the mobile host to perform fast local retransmission.
IUPTU 2014-~, Marks 0~ e. Lost packets on the wireless link (both directions) will be
retransmitted immediately by the mobile host of foreign agent,
respectively (so called "local" retransmission) the foreign agent,
.........._____
90(1T-8)J
f.
therefore, "snoops" the packet
acknowledgements in both directions.
Wireless Networking
Mobile Snooping of ACKs Buffering of data The wired networks are relatively reliable as compared to the wireless links
host.+-+-------':"":-....._ _ _ _ _ _ _ - - and so TCP assumes congestion to be the main cause of any packet loss, and
End-to-end TCP connection invokes congestion control measures at the source. Wireless links (part of a
!Ei&~.3;Sng[pga'C~ heterogeneous network) bring some serious problems with them :
g. Data transfer from the mobile host takes place as FA detects 1. Bit Error Rate (BER) :
p~cket loss on the wireless link via sequence numbers, FA answers a Wireless hosts use radio transmission or infrared wave transmission
directly with a NACK to the MH. MH can now retransmit data for communication.
with only a very short delay.
b. The BER of wireless links is typically higher than that of wired
h. Problems with snooping TCP: networks.
i. Snooping TCP does not isolate the wireless link as good as c. Also the wireless environment changes quickly, and so the BER
I-TCP
also varies by a large amount.
ii. Snooping might be useless depending on encryption schemes. d The bit error rates of 10 or worse are common on wireless links.
3. Mobile TCP:
2. Bandwidth :
a. Mobile TCP (M-TCP) also uses a split connection based approach a. Wireless links offer very less bandwidth (2 Mbps) as compared to
but tries to preserve end to end semantics. M-TCP adopts a three the wired links (10-lO0Mbps).
level hierarchy.
b. Optimum use of available bandwidth is a major issue in
b. At the lowest level, mobile hosts communicate with mobile support heterogeneous networks that has to be taken care of.
stations in each cell, which are in turn controlled by a "supervisor
host". 3. Round Trip Time (RTT) :
a. The wireless media exhibits longer latencies than wired media in
c. The supervisor host is connected to the wired network and serves
as the point where the connection is split. the case of satellite networks.
b. It is almost the same as in wired networks since radio waves travel
d A TCP client exists at the supervisor host.
at the speed of light which is same as the transmission speeds in
e. The TCP client receives the segment from the TCP sender and wired media.
passes it to an M - TCP client to send it to the wireless device.
c. Since the bandwidth is lower in wireless networks a packet takes
f. Thus, between the sender and the supervisor host, standard TCP longer to get transmitted in wireless networks.
is used, while M-TCP is used between the supervisor host and the
d This affects overall throughput and increases interactive delays.
wireless device.
e. Diff~rent ~ersions of TCP pour data in the network depending on
g. M-TCP is designed to recover quickly from wireless losses due to the mcommg acknowledgements, which depends on R'I'I'.
disconnections and to eliminate serial timeouts.
f. Thus networks (especially WANs) with high bandwidth-delay
h. TCP on the supervisor host does not accept ACK packets it receives product are severely affected.
until the wireless device has acknowledged them.
___,./.__
-
92UT-8) J
4. Mobility :
a
Wireless Networking
?t{obile Computing
a.
b.
Digital Audio Broadcasting (DAB)
Digital Video Broadcasting (DVB)
93 (IT-8) J
5. The sender repeats the three data blocks A, B and Cina cycle.
b. Solutions that take power consumption into account have a 1
cut advantage over the otherwise designed solutions. c ear. 6. Using a flat disk, all blocks are repeated one after another.
7. Every block is transmitted for an equal amount of time.
Que~'., Explain data broadcasting. The average waiting time for receiving a block is same for A, B and C.
8.
1
Answ.er 5J ] 9. Multi-disks distribute blocks that are repeated more often than others
I
evenly over the cyclic pattern.
Data broadcasting :
10. This minimizes the delay if a user wants to access. For example, block A.
1. Broadcast systems are classified as unidirectional distribution systems. A B C A B C Flat disk
These are considered as asymmetric communication systems.
A A B C A A Skewed disk
2. The reason for being asymmetric is bandwidth limitations, differences
in transmission power and cost factors. A B A C A B Multi disk
3. Symmetrical communication system provides communication in both
directions.
j
:~ ue ~-~,6: Explain mobile IP. List the entities of mobile IP.
__
discuss the features of1Pv4. J UPTU 2011-12, Marks 10] b. The home address of MN is advertised and known to CN.
c. CN does not know whether MN is in its home network or
..., ._ J
'A nswer, somewhere else.
Mobile IP: Re fer Q. 2.25, Page 93J, Unit-2. d. Therefore, CN sends the packet to MN with MN's home address as
Goals of mobile IP : destination IP address in the JP header.
1. Mobile JP was developed as a means for transparently dealing with At the MN's home network, the incoming JP datagraDl is intercepted by
2.
problems of mobile users. the home agent.
11111
96(IT-8) J
Wireless Networking 97(IT-8)J
r,{obile Computing
... --- ........ -----...:::
-, - ii. If the COA is co-located
/ Home \.
____
...
\network/
.... ' \
\
Tu»Deling and encapsulation :
A tunnel establishes a vi"rtual pipe for data packets between a tunnel
/ I 3.
/ I
1 Foreign : a. entry and a tunnel endpoint.
--~~met __ .•./ \ network 1 . tunnel are forwarded inside the tunnel and
\ I b Packets entermg a
\ , .... __ ... , . leave the tunnel unchanged. . .
c
.
Tunneling, .
i.e., sending a packet through a tunnel 1s achieved by
· using encapsulation. . .
. . the mechanism of taking a packet consisting of
cl. Encapsulatd1on lS d data and putting it into the data part of a new
Fig. 2.27.1: Pac:ke t "deliv~ ~<l!!:~m-the mobile node. packet hea er an
3.
The home agent discovers that MN is in foreign network. packet.
4.
A care-of-address has been allocated to MN by this foreign network and e. The reverse operatl·on, taking a packet. out of the data part of
this is available to the home agent. another packet, is called de-capsulat10n. . .
5. t . and de-capsulation are the operations
The home agent encapsulates the entire datagram inside a new f Encapsula1on · h typically
t 1
. performed when a packet is transferred from a hig er pr~ oco
datagram, withMN's care-of-address as destination IP address and this
new datagram is retransmitted by the home agent. layer to a lower layer or from a lower to a higher layer respectively.
6.
At the foreign network the foreign agent intercepts the incoming IP
packet. ~!t2:!8• IDiscuss the wireless application protocol. Also, write
7. the applications ofWAP.
The foreign agent strips off the outer IP header, and delivers the original
datagram to MN.
8.
MN intends to respond to this message and sends a message to CN. Wireless Application Protocol (WAP):
9.
Since CN is fixed in this example, therefore it has a fixed IP address. 1. WAP provides internet services for mobile and wireless devices.
10.
MN sends the packet through the foreign agent directly to the static IP 2. The goal ofWAP is to bring the internet content such as web pages and
address of CN. telephone services to digital cellular phone and other wireless terminals
Function of mobile IP : such as laptops and PDA's.
1. Mobile agent discovery : 3. In 1997, Ericsson, Motorola, Nokia founded WAP forum to frame
standards and protocol specification.
a The process of detecting a mobility agent is quite similar to that by
internet nodes to detect routers running Internet Control Message 4. WAPintegrates a light weight web browser into hand-held devices called
Protocol (ICMP) messages according to Router Discovery (RFC MICRO browser with limited computing and memory capacity.
1256). 5. Several constraints in mobile wireless network in order to access internet
from mobile phone are :
b. The basic operation involves periodic broadcasts of advertisements
by the routers onto their directly attached sub-networks. a. Size and weight of mobile equipment (portable).
2. Registration : b. Restricted user interface (small keypad and displays, lower memory).
a. Having received a COA, the MN has to register with HA. c. Limited bandwidth and lower reliability due to high error data.
b. The main purpose of the registration is to inform the HA of the cl. Different WAP sets (different screen size and features) .
current location for correct forwarding of packets. e. Different wireless bearer network like GSM, CDMA, GPRS.
c. Registration can be done in two different ways depending on the f. Security and integrity of user data, protection of services.
location of the COA:
6. The basic objectives of the WAP is to bring diverse internet content (for
i. IftheCOAisatFA example, web pages, push services) and other data services (for example,
98(IT-8)J Wireless Networking
5• WJJ'
- 99(1T-8)J
defines a set of ~tandard components that enable collllilunicat:
between mobile termmals and network servers ' including.·
•
tandard naming mode~ =. WWW-standard URui are used to
7. Moreover, a protocol suit should enable global wireless communicatio a. 1~d ti·fy WAP content on ongm servers.WWW ·standard,,,,..
en . al . . vl\18are
across different wireless network technologies, for example GSMn used to identify Joe resources ma device, for example, call control
CDPD, UMTS etc. ' ' functions.
8. The forum is embracing and extending existing standards and
Co tent typing : All WAP content is given a specific type consistent
technologies of the internet wherever possible and is creating
b, .: WWW typing. This allows WAP user agents to correctly process
framework for the development of contents and applications that scat : e content based on its type.
across a very wide range of wireless bearer networks and wirelese8
device types. dard content formats : WAP content formats are based on
C.
WAP applications : technology and include display markup, calendar
information, electronic business card objects, images and scripting
1. Handling information of all types.
language.
2. Access to e-mail and chat.
3. Weather information. cL Standard communication protocols: WAP communication
protocols enable the communication of browser requests from the
4. Information about currency rates. mobile terminal to the network web server.
5. Online music support ofWAP multimedia etc.
(1 i. IEEES00.11
ti Client
I Encoded
Request
Gateway
,.-
IRequest
I Origin Server ii.
~'e;~,.·
WAP applications IUPTU 2011-12, Marks 10 I
Encoders - \ 51 • .
and
Encoded
Response
II Decoders I IResponse
(content)
I IEEE 802.11 : Refer Q. 2.12, Page 69J, Unit-2.
WAP applications: Refer Q. 2.28, Page 97J, Unit-2.
II
100 (IT-8) J Wireless Networki
ng
r,1obile
. Computing 101 UT-8) J
9'1e 2.31. JDiscuss the basic principle ofWAP protocol architecture. Wireless ~arkup language (~).: A lightweight markup
a. Janguage, s1;1111Jar to HTML, but optmuzed for USe in hand-held
Write down the applications ofWAP. IUPTU 2013-14, M ~ mobile termmals.
4.
of-service attacks harder to accomplish and protects the ~Illa!.
protocol layers. Pper
l
166(JT-8)J
ii- An adhoc network grew out of packet radio network.
iii It requires more battery power to maintain full connectivity between
[}>ART·l]
nodes.
Mhoc Network, Localization, MAC Issues, Routing Protocols The wireless range is smaller.
· .,,..c,vi n o_r:tination Si ' jv.
Becomes more vulnerable for intrusion.
-
v.
-
- consecutive packets associated with a given message may take different
L
LJl,~ Ufl,L':._ • ..,_ ..,r -•
vi.
coNCEPT OUTLINE :
PART-1
- routes to destination.
Adhoc network has limited computational power.
.
©
control base station.
Manet is a self-configuration wireless adhoc network of mobile
..
nodes.
Global state routing is based on link state routing.
DSDV is a proactive distance vector routing protocol.
I
Questions-Answers f P'.ig
= . IU
,..,.,.=-7.~1;7:Adh
~. .-oc -netw
- or~k.J
~-----
[Que 5.2.] Describe the classification of wireless adhoc network.
--- .j
Que 5.1. , What do you mean by adhoc networks ? What are the
characteristics of adhoc network ?
= - --
•'Answer ]
FoJlowing are the three types of wireless adhoc network:
1. Mobile Adhoc Network (MANETs)
2. Wireless Mesh Network (WMN)
IAnawer _ ,
1. In contrast to infrastructure based networks, in adhoc networks all 3. Wireless Sensor Network (WSN)
nodes are mobile and can be connected dynamically in an arbitrary 1. Mobile Adhoc Network (MANETs) :
a. A MANET is an autonomous collection of mobile users that
manner.
communicate over relatively bandwidth constrained wireless Jinks_
2. All nodes of these networks behave as routers and take part in discovery
and maintenance of routers to other nodes in the network. b. It is a self configuring network of mobile devices connected by
3. Ad.hoc networks are very useful in emergency search-and-rescue wireless Jinks.
operations, meetings or conventions in which persons wish to quickly c. Each device in a MANET is free to move independently in any
share information, and data acquisition operations in inhospitable terrain. direction and will therefore change its links to other devices
4. Adhoc networks are autonomous networks operating either in isolation frequently.
or as "stub networks" connecting to a fixed network. d Since the nodes are mobile, the network topology may change
5. They do not necessarily rely on existing infrastructure. rapidly and unpredictable over time.
e. The network is decentralized, where all network activity including
6. No "access point". Each node serves as a router and forwards packets discovering the topology and delivering messages must be executed
for other nodes in the network. by the nodes themselves, i.e., routing functionality wiJI be
7. Topology of the network continuously changes. incorporated into mobile nodes.
Characteristics of adhoc network :
i. An adhoc network comes up together when needed.
168(IT-8)J
Adhoc Networkt
---=:: Mobile Computing 169 !IT-8) J
2. Wireless Mesh Network (WMN) :
a. A WMN is a communication network made up of radio nod 5.
organized in a mesh topology. es The MANET organization depends upon the location of the nodes, their
connectivity, their service discovery capability and their ability to search
b. WMN often consist of mesh clients, mesh routers and gateways, and route messages using nearest node or nearby nodes.
C. The mesh clients are often laptops, cell phone and other wireles D E
devices while mesh routers forward traffic to and from the gatewa/ F
which may connect to the internet. 8
Sensor node Router
d A WMN can be seen as a special type of wireless adhoc network. Derive node
e. A wireless mesh network often has a more planned configuration
and may be deployed to provide dynamic and cost effective
connectivity over a certain geographic area. Hand-held PC
node
f. Mesh networks may involve either fixed or mobile devices. Mobile node
g. An important possible application for wireless mesh networks is
VOiP. ' \
\
BI Base station Router
h. By using a quality of service scheme, the wireless mesh may support or gateway
local telephone calls to be routed through mesh.
s. Wireless Sensor Network (WSN):
a. WSN consists of spatially distributed autonomous sensor to Description:
cooperatively monitor physical motion or conditions such as, 1. Fig. 5.3.1 demonstrates the adhoc network formed by the nodes A, B, C,
i. temperature of wireless sensor network was motivated by D,E, FandG.
military applications such as battle field surveillance and are, 2. It shows that each mobile device or sensor functions as a node with J
ii. now used in many industrial and civilian application areas, switch or router.
including : 3. An important characteristic of adhoc network architecture is that its
1. industrial process monitoring and control, machine , organization can change due to movement of a device or sensor.
2. health monitoring environment and habitat monitoring 4. In other words, the adhoc networks are self-organizing.
3. health care application 5. The following points illustrate how MANETs are established and how
they recognize themselves. '
4. home automation and
a. The network organization will change if D and E move away from
5. traffic control. each other such that they reach out of the range ofwireless coverage.
b. Two new adhoc netwo~ks will then be formed by (i) A, C and D, (ii)
Que 5~ What do you understand by Mobile Adhoc Networks A, G, F and E. The deVJces on two networks can still connect to each
1
(MANET) ? Describe some real life scenarios where it can be used. other through the co=on node A
IUPTU 201~~15, Marks 1oj Real life scenario :
1. Consider a bluetooth-enabled mobile device, a bluetooth-enabled
I.
. r:•... J
MANET is a self configuration wireless adhoc network of mobile nodes.
2.
computer, and internet with Wi-Fi connection at home.
There is a bluetooth-enabled computer connected to TCP/IP internet
and also to client printer at office.
2. Each node has a router or a switch connected by the wireless connection. 3. When the user carrying the device moves from office to home and
3. The union of connections is in an arbitrary topology. handheld PDA mobile device reaches near the home computer, an adhoc
network is established between the mobile device at home and printer
II
4. Network can function independently or connect to internet 1Pv4 or
at office through intermediate nodes: Wi-Fi, internet and office computer.
1Pv6.
'
--
Mobile Computing
Adhoc Networks 173UT-8) J
172(IT-8)J
Adhoc Routing Protocols
b. The result is frequent changes in topology, so the snapshots available
are valid for very small time only.
Table Driven Source-Initiated
In adboc network, the routing tables must reflect these changes. On-Demand
¼
C.
Hybrid
Routing algorithms for wired networks will either react very slowly f l
d.
or with too many updates for this type of topology. GSR DSDV WRP r-.--.-.
'·
AODV DSR LMR ABR .---1--.
Examples of adhoc network :
1. The decentralized nature ofwireless adboc network makes them suitable
for a variety of applications.
r7
HSR
FSR
c!sR
••
TORA SSR
!fg. 5.6.LRouti~ ~
EIGRP ZRP
+
ZHLS
~ sw~ J ii
iii
Wireless Routing Protocol (WRP)
Global State Routing (GSR)
(!/ In adhoc networks, nodes do not have a priori knowledge of topology of
network around them, they have to discover it. iv. Fisheye State Routing (FSR)
() The basic idea is that a new node (optionally) announces its presence v. Hierarchical State Routing (HSR)
and listens to broadcast announcements from its neighbours. vi. Zone-based Hierarchical Link State Routing
tJ The node learns about new near nodes and ways to reach them, and
may announce that it can also reach those nodes. 2.
vii. Clusterhead Gateway Switched Routing (CGSR)
Reactive routing protocol :
4. As time goes on, each node knows about all other nodes and one or
a. The on-demand routing protocols take a lazy approach to routing.
more ways how to reach them.
b. In contrast to table-driven routing protocols, all up-to-date routes
5. These routing protocols can be divided into three categories based on are not maintained at every node, instead the routes are created
when and how the routes are discovered : when required.
a. Pro•active routing or table driven protocols c. When a source wants to send to a destination, it invokes the route
b. Reactive routing or On demand routing protocols discovery mechanisms to find the path to the destinations.
c. Hybrid (Pro-active/reactive)
........-
Mobile Computing
Adhoc Networks 175(1T-8) J
174(IT-S)J
The route remains valid till the destination is reachable or until the
d Difference b~tween adhoc network and other network: Refer Q. 5.5,
route is no longer needed.
There are some on-demand routing protocols as discussed below : page 17oJ, Urut-5.
e. The advantages of an adhoc network include :
i. Adhoc On-demand Distance Vector Routing (AODV)
l. Separation from central network administration.
ii Cluster Based Routing Protocol (CBRP)
_ Self-configuring nodes are also routers.
iii Dynamic Source Routing Protocol (DSR) 2
_ Self-healing through continuous re-configuration.
iv. Temporally Ordered Routing Protocol (TORA) 3
_ Scalability incorporates the addition of more nodes.
v. Associativity Based Routing (ABR) 4
Mobility allows adhoc networks created on the fly in any situation where
vi. Signal Stability Routing (SSR) 5
· there are multiple wireless devices.
~_! 5~ Compare table-driven and on-demand routing protocols. _ Flexible adhoc can be temporarily setup at anytime, in any place.
6
. 1.,ower getting-started costs due to decentralized administration.
7
tAnswer.J
Comparison of table-driven and on-demand routing protocols :
8
The nodes in adhoc network need not reply on any hardware and
· software. So, it can be connected and communicated quickly.
l. Attempts to maintain
consistent, up-to-date
information from each node
A route is built only when
required. ~-
~swer] , ...........
Global State Routing (GSR):
Global State Routing (GSR) is based on link state (LS) routing.
to every other node in the 1.
network. It takes the idea oflink state routing but improves it by avoiding flooding
2.
No periodic updates. Control of routing messages.
2. Constant propagation of
information is not propagated 3. In link state routing method, each node floods the link state information
routing information
unless there is a change in thP. directly into the whole network (global flooding) once a link change
periodically even when
topology change does not topology. between itself and its neighbours is detected.
occur. 4. For each destination node, the topology and table contain link state
Does not incur substantial traffic information as reported by the destination and time stamp of information.
3. Incurs substantial traffic and
and power consumption 5. If links change quickly at high-mobility, frequent global flooding will
power consumption, which is
compared to table-driven routing lead to huge control overhead (large amount of small packets) where
generally scarce in mobile
protocols. routing messages are generated on a link change as in link state protocols.
computer.
First packet latency is more as 6. GSR could be described as being based on link state routing, which has
4. First packet latency is less the advantage ofrouting accuracy, and the dissemination method used
compared to table-driven because
when compared with on- in Distributed Bellman-Ford (DBF) to avoid inefficient flooding like in
a route needs to be built.
demand protocols.
link state routing.
A route to every other node Not available.
5. 7. In GSR every node maintains:
in adhoc network is always a. A neighbour list: The neighbour list of a node contains the list of
available.
its neighbours.
b. A topology table : For each destination node, the topology table
5.9. JName the main differences between adhoc network and contains the link state information as reported by the destmahon
other network. What advantages do adhoc networks offer? Explain and the timestamp of the information.
in detail by giving suitable el<Jllllple. IUPTU 2013-14, Marks 10J
......--
Adhoc Networks
176(1T-S)J j\1obile Computing 177 (IT-8) J
c. A next hop table : For each destination, th~ next h?P ~ble contains
the next hop to which the packets for this destmatton must be ~ e t w o r k nodes periodically broadcast their routing tables in order
3. to propaga~ topolo~ ~owledge throughout the network. A part from
forwarded .
this perio~c !ransnuss1on, a stati~n (node) also transmits its routing
d. A distance table: The distance table contains the shortest distance table if a significant change occurs m topology.
to each destination node.
The propagation of routing table's results in large overhead. To solve
8. Initially, each node learns about its neighbours by examining each 4
· this problem, two types of updates are defined:
received packet and then builds up its neighbour list.
a. Full dump update
9. On receiving a link state message from its neighbours, every node
updates the link state information in its topology table. b. Incremental update
10. Link state packets with larger sequence numbers replace the older ones 5 In full dump update, stations (nodes) transmit full routing table. Since
with smaller sequence numbers. So, every node learns the entire · routing table is large, a full update typically involves more than one
network topology. packet broadcast.
Advantages ofGSR: 6_ Incremen~al updat~s are ~ransmitting_between full dumps and convey
only that information which was earned over a single packet. Here a
1. GSR reduces the control overhead as it avoids flooding for disconnects/ unique sequence number is also assigned by the transmitter after
reconnects and updates are time triggered than event triggered.
updation. In a network of a slowly changing topology, full dump are
2. The routing accuracy ofGSR is superior to the traditional DBF. rarely used, since the incremental dumps are able to convey the slow
Disadvantages of GSR : topologies changes.
1. Its main disadvantage is large size of the routing message. Advantages of DSDV:
2. Entire topology table is broadcasted with each update considerable 1. It is suitable for creating adhoc network with small number of nodes.
amountofbandwidthisconsumed. ' 2. Since no formal specification of this algorithm is present, so there is no
commercial implementation of this algorithm.
~~J!I] Write short note on destination sequenced distance Disadvantages ofDSDV:
vector routing (DSDV). j."VPT~ -201 i?1}a;+i'4afJt~.1()1 1. DSDV requires a regular update of its routing tables, which uses up
battery power and a small amount of bandwidth even when the network
is idle.
Destination sequence distance vector routing (DSDV) : DSDV is the 2. DSDV is not suitable for highly dynamic networks.
extension to Bellman-Ford routing algorithm. Th.:s routing protocol was
developed in 1994 by C. Perkins and it is a proactive distance vector routing Examples of DSDV in operation:
protocol. This protocol guarantees loop freeness. 1. Consider MH4 in Fig. 5.11.1. Table 5.11.1 shows a possible structure of
InDSDV: the forwarding table which is maintained at MH,.
1. Each node maintains a routing table that contains the information 2. Suppose the address of each mobile host is represented as ~ -Suppose
regarding all possible routes within a network, the number of hops of further that all sequence numbers are denoted as SNNN_MH; where
each route and the sequence of each node. MH; specifies the computer that created the sequence number and
2. SNNN is a sequence number value.
This sequence number assigned by the destination node of the route,
shows how old the route is. The lower the sequence number, the older 3. Also suppose that there are entries for all other mobile hosts with
the route is. When a node A needs to select a route to node B it checks sequence numbers SNNN_MH., before MH 1 moves away from MR,..
its routing table. If more than one such route is found, the newer one is 4. The install time field helps to determine when to delete the stale routes.
used and if more than one route shares the same sequence number 5.
than the shortest route is chosen. With this protocol, the deletion of stale routes, rarely occur since the
detection of link breakages should propagate through the adhoc network
immediately.
.....-
(3. 8~ ~
f"isbeY
= el~
e State Routing <FSR) :
.
FSR is an 1I11provement of GSR (both are based on the link state protocol).
l. The large size of update messages in GSR wastes a considerable amount
2. of network bandwidth.
MH, I
---- ________________________',
I · represent graphical data.
: 4. The eye of a fish captures with high detail of the pixels near the focal
point.
5_ The detail decreases as the distaoce from the focal point increases.
[F~s:ii1? Movement_~ r ~ g£,_i@i
:]'sne!'!ii:!Q 6 In routing, the Fisheye approach translates to maintain the
Structure of the MH. forwarding table : · accurate distance and path quality information about the immediate
Table 5.11.1. neighbourhood of a node , with progressively less detail a s the
distance increases.
Destination Next Hop Sequence Install Flags Metric Stable Data 6 Here nodes maintain a link state table based on the up-to-<late information
Number · received from neighbouring nodes, and periodically exchange it with
their local neighbours only.
MH, MH, S406_MH, TOOl_MH, 2 Ptrl_MH,
MH, MH, S128_MH, TOOl_MH, 1 Ptrl_MH, 7. In FSR, every up-to-date message does not contain information about
MH, MH, S564_MH, TOOl_MH, 2 Ptrl_MH, all nodes in the network. Here the information about closer node is
MH, MH, S710_MH, TOOl_MH, 0 Ptrl_MH, exchanged more frequently than it is done about farther nodes, thus
MH, MH, S392_MH, T002_MH, 2 reducing the update message size.
MH, Ptrl_MH,
MH, S076_MH, TOOl_MH, 1 Ptrl_MH,
MH, MH, S128_Mll, T002_MH, 2 8. The centre node has most up-to-date information about all the nodes in
Ptrl_MH,
MH, MH, S050_MH, T002_MH, 3 the inner circle and the accuracy of information decreases as the distance
Ptrl_MH,
from node increases.
Now suppose that MR. moves into the general vicinity of MB, and 9. This procedure of dividing network into different scope levels is done at
MH.,. and away from others especially (MH2 ). The new internal each node meaning that it is independent on the central entity.
forwarding tables at MB. then appears as shown in Table 5.11.2.
Table 5.11.2. 10. Even if a node does not have accurate information about far away
D estination Next Hop Sequence nodes, the packets will he routed correctly because the route information
Install Flags Metric Stable Data becomes more and more accurate as the packet gets closer to the
Number destination.
MH, MH, S516_MH, 11. When network size grows large, the update message could consume
TOOl_MH, M 3
MH, S238_MH, TOOI _MH, Ptrl_MH, considerable amount of bandwidth, which depends on the update period.
MH, S674_MH, 1 Ptrl_MH,
TOOI_MH,
MH, MH, S820_MH, 2 Ptrl_Mff, 12. In order to reduce the size of update messages without seriously affecting
MH, TOOI _MH, 0
MH, S502_MH, T002_MH, Ptrl__MH, routing accuracy, FSR uses the Fisheye technique.
MH, MH, S186_MH, 2 Ptrl_MH,
MH, TOOI_MH, 1 13. Fig. 5.12.1 illustrates the application of Fisheye in a mobile, wireless
MH. S238_MH, T002_MH, Ptrl_MH, network.
MH. MH, S160_MH, T002 MH,
2 Ptrl_MH,
3 Ptrl MIi, 14. The number of levels and the radius of each scope will depend on the
size of the network.
@ue ;tiD Explain Fisheye state routing. Also, give the advantages
and disadvantages. 15. The reduction of routing update overhead is obtained by using different
exchange periods for different entries in routing table.
Ad.hoc Networq
180(IT-8)J --...:: ?Jobile Computing 181 (IT-8) J
=---- information when needed. FSRfunctionality is similar to link state 88 it
maintains a full topology map at each node.
The topology labels are send to local neighbours only. Sequence numbers
2. are used for entry replacements and for loop free routing
The Fisheye scope mes~ag~ updat~ scheme is highly accurate for
3. . er scope node as entnes m the routmg table corresponding to nodes
~hin the smallest scope are send to the neighbours may blur due to
:nger exchange interval but there is no need to find the destination
firstly.
tages of FSR :
,l\dv;;R is suitable for large and highly networked environment.
~: It is robust to host mobility.
3. Reduce routing and update traffic.
isadvantages ofFSR: .
D Routing table storage 1s complex.
l. FSR does not provide any kind of security.
2.
I PART·2 I
00,~ lJ Dynamic Source Routing (DSR), Adhoc on Demand Distance
16. More precisely, entries corresponding to nodes within the smaller scope Vector Routing (AOVD), Temporary Ordered Routing Algorithm
-- ------
are propagated to the neighbours with the highest frequency. (TORA), QOS in Adhoc Networks Applications.
)!
Tl' Hop
CONCEPT OUTLINE: PART-2
TT
0 : (1) Hop
~:;~\,3) :
; (5: 1, 4) 2
• Dynamic source routing is a source routed on-demand routing
protocol in ad.hoc networks.
2
'-
1 : (0, 2, 3 )
1 3 : (1, 4) 0 • AODV minimizes the number of broadcasts by creating routes
2 : (5, 1, 4)
0 4 : (5, 2, 3) on-demand as opposed to DSDV.
3 : (1, 4) 1l - - - - - - 3I 5 : (2, 4) 2 • TORA is a source initiated on-demand routing algorithm.
I
4 : (5, 2, 3)
2 I I TI' • Static routing is simply the process of manually entering routes
5 : (2, 4) I I ) Hop into a device's routing table via a configuration file that is loaded
2 I I O ; (1
2 when the routing device start up.
f":\ l : (0,2, 3) 2 Dynamic routing protocols are supported by software applications
--------- 4 2 : (5, 1, 4) 1 running on the routing device which dynamically learn network
'-, ,' 3 : (1,4) 1 destination and how to get to them.
'' ,, 4 : (5, 2, 3) 0
© 5 :(2,4)
Questlons-AnsWers
Fig. 5.12.2. Message reduction using Fisheye.
Long ,l\nswer Type and Medium AnsWer Type Questions
Protocol operation :
1. Fisheye state routing is a table-driven or proactive routing protocol. It is
based on link state routing and able to immediately providing route
--===============~-==-
- 182 (IT-8) J
OR ~ teristic of Manet:
Explain the following terms : cbarac ssofpat hdi scoveryand path mam . te nancem
. DSRroutingprotocols
.
i. Global State Routing (GSR) Theproce
follows :
ii. Dynamic Source Routing (DSR) are as ute discovery :
iii. Destination Sequence Distance Vector routing (DSDV) 1. Ro Route discovery allows any host to dynamically discover the route
@trV 2014-15, M a r ~ a. to any destination in the adhoc network.
. .
~
- 186(IT-S)J
-
Adhoc Networks
........-
~ er]
The path discovery and path maintenance of AODV is done as follows :
Path discovery :
1. AODV uses a broadcast route discovery mechanism. Path discovery
process is initiated when a node requires to communicate with a node
for which it has no route by broadcasting a route request (RREQ) packet
containing the source address, source sequence number, broadcast ID
destination address, destination sequence number, hop count to it~
neighbours.
2. Hop count is initially Oand is incremented by each node as it forwards
the RREQ towards the destination.
_- - - + Represents transmission ofRREQ
'" ' ,/
,' ,<
¾,«-~,,__(''
',A /
JG,_
) ,C
-\..- -----·«
,H
- N
~_)Represents a node that has received RREQ for D from S
Node C receives RREQ from G and H but does not forward it again,
because node C has already forwarded RREQ once.
...
I
•worka :r,fobile Computing 1890T-8) J
1ss(IT-8) J Adhoc Ne'--
Forward links are setup when RREP travels along the reverse path.
,....-----.... Represents a link on the forward path
l~~E' • © Datadeliv:~~:
_/-\_ ,,>-~~--------·
'B) J-
/1,,._ ,-/\ ·~r-1
I (' _/- --,_:-\. I$~
9,--.,G~ ii.__ ,. . _
\ , 1 B, (c~ (~~- ,~
- ',, I
, - / \ /'-'--.. / ,J~.._n>--@
,-s~----.,-i, ·-~ . ___,_ < -yG< .. - l -
--/--\ /'-- ......,!:' •--~~1~-~i'-
.... _ ,_,
-1...
(A,/
--,
J-\
'B, IC,._
- / - - ·-----
-
,I .......
G
/ \ --,,
-- .... ----7M
J , . _ _ , __
'--~
·• l!'!«-·U eJ;:j
Routing table entries is used to forward data packet. Route is not
----...., HI --,
--
included in packet header.
,__
'--"---,-i~ '~-~nL ig.ie5.17·. ~ Write short note on Temporally Ordered Routing
-0
Node D does not forward RREQ, because node Dis the intended target Algorithm (TORA). !
UPTU 2011-12, Mazka 10 j
of the RREQ. OR
Route reply in AODV: Describe route discovery and route maintenance mechaniBJD of
~l,or'\/_/~~-~J•
AODV and TORA.
,~ s:wer .• .J
AODV: Refer Q . 5 .16, Page 185.J, Unit-5.
'C)4-..._,G' \
(~, /- ;>- 'y- ,,;~ TORA:
--...,H __/ ,K, 1. The TORA is a source initiated on-demand routing algorithm.
,_...._________,I' - EP 2. It is a highly adaptive, efficient and scalable distributed routing algorithm
,_,
- - - - Represents links
. on pa th taken by RR
AODV: based on the concept of link reversal.
+
Forwardpao thsetup1n
3. This protocol is mainly designed to minimize the reaction to topology
changes.
~ ,-[s;,.. __ 'lE;.__
, ..------..~ 4. TORA is proposed for highly dynamic mobile, multihop wireless
_/1
}l. ,- L networks .
,- /- ',,_, F~- , .-- M,
--< '-~,
1 B, ,,,,,,, ,,,,,,.-- --, J '- 5. TORA finds multiple routes from a source node to a destination node .
r'c,____ 6. The main feature of TORA is that the control messages are localized to
(A'
'-'-....,
• ('
,_H ~
_;,t-
-- /-
,_I I
7 G~
-----
,_,
•K
•,~~
N 7-
8.
a very small s et of nodes n~ar the occurrence of a topological change.
To this, the nodes maintain routing information about aqjacent nodes.
Each node has a quintuple associated with it : Logical time of a link
failure , a reference indicator bit, a propagation ordering parameter, the
unique ID of the node that defined new reference level.
........-
~ -
9
190(IT-S)J
_ In this protocol a logically separate copy of TORA is run for each
destination node of the network.
-
Adhoc Networks
-
l'dobile Computing
/;:;'\(l\ri,\.
7) (0,1)
191 (IT-8) J
~~-) / 7 c.
reference level.
T~is resu_lts in the propagation of that reference level by
ne1ghbourmg nodes as shown in Fig. 5.17.3.
SourceQ:~ Links are reversed to reflect the change in adapting to the new
(-, -)
d
reference level.
This has the same effect as reversing the direction of one or more
e.
links when a node has no down stream links.
3. Route erasure :
a. In the route erasure phase, TORA floods a broadcast clear packet
Fig.,_~ 11:.!: 1:'.roya,¥,!~(fil oft~e QRY, packet through the net\';'._o.&~- (CLR) throughout the network to erase invalid routes.
The source broadcast a QRY packet with the destination node's id b. In TO RA there is a potential for oscillations to occur, especially
init. when multiple sets of coordinating nodes are concurrently detecting
f. A node with a non-NULL height responds with a UDP packet that partitions, erasing routes and building new routes based on each
has its height in it. other.
g. A nodt: receiving a UDP packet sets its height to one more than c. Because TORA uses internodal coordination, its instability probfom
that of the node that generated the UDP. is similar to the •count-to-infinity" problem in distance vector routing
protocols, except that such oscillations are temporary and route
h. A node with higher height is considered up stream and a node with
lower height down stream. convergence will ultimately occur.
!!I
.
......--
Adhoc Networks bile ColllPuting
192(1T-8) J ---:::: ?,{o 193 !IT-8) J
. and dynamic routing :
5t11tlC • •
tic rout1Ilg.
StB Static routwg· is . 1y the process of manuall
· simp .
1. device's routing table via a configuration file [~n~nng routes into a
18
routing device start up. t loaded when the
(0,0) .As an alternative, these routes can be entered by
......
8 2. vvho configures the routes manually. anetworkadministrator
Destination Since these manually configured, routes do not change afte
3. -"gured (unless a human changes them) they call , r_ they are
cOI.U-' . . . are ed static' rouws.
tatic routing 1s the simplest form of routmg· but it•18
4 S . • · 1.. a manual process
______.,.....__._.,,..__<'II~ . Static routing IS appropnate w=n !°u have very few devices to confi .
5. and vvhen you know the routes will probably never cbange. gure
I.fig. 5.17.3..l?oute @!1--!Ptenance_&t~OM. 6 Static routing also does ~ot handle failures in external networks well
· because any route that 1s confi~ manually must be updated to
~t:5~8,1.JExp~ hybrid routing protocols. reconfigured manually to fix or repair any lost connectivity.
J)ynaDlic routing :
1.
tl!-
Hybrid routing protocols combines the advantages of both table-driven
1. DynaJlliC routing pro_tocols ~e sup~rted by software applications
running on the routmg device which dynamically learn network
and on-demand routing. destinations and how to get to them and also advertise those definitions
2. In this the distance vector routing (DVR) works by sharing its knowledge to other routers.
of entire network with its neighbours and link state routing (LSR) tell _ This advertisement function all~ws all the routers to learn about all
every router on the network about its closest neighbours so it is the 2
the destination networks that enst.
combination of both DVR and LSR.
A router using dynamic routing will learn the routes to all networks
3. Hybrid routing protocols use distance vectors for more accurate metrics 3.
that are directly connected to the device.
to determine the best paths to destination networks and report routing
4. The router will learn routes from other routers that ruo the same
information only when there is a change in the topology of the network.
routing protocol (RIP, RIP2, BGP etc.).
4. Hybrid routing allows for rapid convergence but requires less processing
5. Each router will then sort through its list of routers and select one or
power and memory as compared to link state routing.
more best routes for each network destination the router knows.
Some examples of hybrid routing protocols are :
6. Dynamic routing protoccls will then distribute this 'best route'
a EIGRP (Enhanced Interior Gateway Routing Protocol), developed information to other routers running the same routing protocol,
by CISCO. thereby extending the information on what network exist and can be
b. ZRP (Zone Routing Protocol). reached.
7. This gives dynamic routing protocols the ability to adapt to logical
if,;e;p;Jp~JExplain with example: network topology changes, equipment failure or network outages on
i. Proactive routing and reactive routing protocols the fly.
ii. State and dynamic routing Source routing: Refer Q. 5.13, Page 182.J, Unit-5
Write down the key issues, objectives and criteria of
iii. Source routing IUPTU 2012·13, Marks'lo,j
QOS routing. ~ U 2015-16, Marks~
IUPTU 2015-16, Mark!i 02,!
[&i(1r~ijjj e::,.
11..:'n
fver :·
i l. l
Issues ~f QOS routing : Issues of QoS routing in adhoc networks :
Proactive routing and reactive routing protocols : Refer Q. 5.7,
:age 173.J, Unit-5.
"
'1111'\,
,.....
1111
1. Dynamic varying network topology ()ther aspects should also be taken . . l95 UT-8) J
2. Imprecise state information
i. constraints due to a shared medi:1collBl~ration8Uch 8
JJlobile and the topology may chan' YDa!nic topology / bandWidth
3. Scarce resources uJJlited batteries. ge and J>Ower COil!UJn1: ..MNs are
~•wn due to
4. Absence of communication infrastructure or wiJ'ed networks there are two
3. . • ·
Frov1s1orung d approaches to .
5. Lack of centralized control
P . . an. network
. traffic enirin .
-..-eenng. obtain QoS .· an over
6. Power limitations over provis1orung consists of the netw
7. Heterogeneous nodes and networks
4· ....... unt of resources such that the n tworkk operator offenng
· ah
....- 0 · Ii· e or can uge
deJJlanding app cations. accommodate all the
8. Error prone shared radio channel
JnStead, network traffic engineering cl•··"' .
9. Hidden terminal problem 5. h din t aoowes ongoing .
treats t em accor g o a set of established rul es. connections and
10. Insecure medium Two proposals belonging to this class has be d
Objectives and criteria of QoS routing : 6· Integrated Service (IntServ) and Differentia: insid~ the IETF :
. t· . ce (Dif!Berv)
1. To meet QoS requirements of end users. 1ntServ 1s a reserva 10n onented method wh ·
7· QoS parameters they need. ere UBers request for the
2. To optimize network resource usage.
3. To gracefully degrade network performance under heavy load. . The resource reservation.protocol (RSVP) has bee n proposed by IETF to
8 set up resource reservations for IntServ.
4. Difficulties arise because node mobility can cause frequent network
topology changes. _ Opposite to IntServ, DiflServ is a reservation-less method.
9
5. Channels can have high error rates, the jitter rate is high and several _ Using Diff~erv, service providers offe~ a set of differentiated classes of
10 QoS to their customers to support vanous types of applications.
different applications can be sharing the use of the communication
medium. I( ll. JPv6 traffic class octet is used to mark a packet to receive a particular
Criteria of QoS routing classification : QoS class.
1. Routing information update mechanism such as proactive/table-driven, 12. In general, the specific aspects of MANETs make the wire-based QoS
reactive/on-demand and hybrid. ' models not appropriate for MANETs.
13. Over-provisioning, for instance, may not be possible because resources
2. Proactive table based routing scheme : It requires each node of the
network to maintain tables to store routing information. are scarce.
14. IntServ/RSVP may require unaffordable storage and processing for MNs,
3. Reactive on-demand source based routing : Routes are created when
necessary. Route will be maintained until it is no longer needed. and signaling overhead.
15. DiflServ on the other hand, is a light weight overhead mod£! that may
4. Use of information for routing such as information of past history,
be more suitable for MANETs.
prediction.
16. However, DiffeServ organization in customers and service providers
5. State maintenance such as local, global.
does not fit the distributed nature ofMANETs.
~ e 5.21. j How can we obtain quality of service on MANET?
Oi .~ t,~-t;_.,~
OR - '"'·, ti
VERY IMPORTANT QUESTIONS
Explain the mechanisms to address quality of services issues in
Following,~ sti(!nB are very important, These questioff!
IUPTU 2015-16, Marks 10]
-
MANET. '!'4Y beasJ,ed in your SESSIONALS as well as
e;ii;i!"·',•, "-'~
,~ .,!~
I UNIVERSITY EXAMJNATION,
-
1. For obtaining QoS (Quality of Service) on a MANET, it is not sufficient
to provide a basic routing functionality. Q. 1. What do you mean by adhoc network?
196.::....::_(.:__I_T_-8_:_)_J_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __A_dh_oc Netw
-=-
Mm Refer Q. 5.1.