* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Lecture1.1
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Computer network wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Airborne Networking wikipedia , lookup
Wireless security wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Mobile and Wireless Computing Lecture 1: Preliminaries Lecture 1.1 : Introduction to mobile ad hoc networks Lecture 1.2 : Introduction to networking and wireless communication & A brief overview of the course Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing The Importance of Mobile and Wireless Computing There is tremendous technological advance in producing small and smart devices. It is a natural consequence that such devices work in a collaborative way. However, users carry around many such smart devices and they are not fixed in the sense of a desktop computer. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Networking without an Infrastructure Hence, there is a need for networking such mobile devices without any infrastructural support. Cellular phones work with infrastructural support like mobile phone towers and satellite communication. However, such support comes at a cost like preregistration with a mobile service provider etc. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Networking Anywhere and Anytime On the other hand, there is a growing demand of using networks of mobile devices anywhere and anytime. In many situations, the Internet may not be an efficient solution. For example, a collection of people trying to communicate in a hotel or conference hall. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Smart Devices Another important application of wireless communication is the use of small smart devices. The number of embedded devices in appliances and vehicles is increasing at a rapid rate. There is a growing need of networking such embedded devices without infrastructural support. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Sensor Dust Sensor dust is a collection of small and inexpensive devices which work through collaboration. Thousands of such devices can be used for applications like : environmental data collection, weather forecasting, measuring toxicity levels at hazardous sites etc. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Sensor Dust NASA has planned a sensor dust deployment for its 2007 Mars mission for monitoring Martian climate. The purpose of a sensor dust is to collect data through inexpensive sensor devices and gather this data in a base station for analysis. Sensor dust is typically deployed in places where there is no infrastructural support. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Ad hoc Networks This course is about ways of information exchange in a network of mobile and wireless nodes without any infrastructural support. Such networks are often called ad hoc networks to emphasize that they do not depend on infrastructural support. The purpose of an ad hoc network is to set up (possibly) a short-lived network for a collection of nodes. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Ad hoc Networks Most network operations involve exchange of information among the computers participating in a network. There are numerous protocols for networks with infrastructural support , starting from LANs, Ethernets and global networks like the Internet. However, most of these protocols do not work well for ad hoc networks. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Routing in an Ad hoc Network If all the wireless nodes are within the transmission range of each other, routing is easy. Every node can listen to all transmissions. However, this is not true in most situations, due to short transmission range. Hence, most ad hoc neworks are multi-hop. A message from a source node must go through intermediate nodes to reach its destination. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Routing in multi-hop networks All nodes cooperate in delivering messages across the network. The nodes must collect local neighbourhood information in order to make global routing decisions. This situation is quite different from wired networks where the routing decisions are made based on the infrastructure. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing An Example Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Personal Area Network (PAN) The aim of a PAN is to create a very localized network for devices associated with a single person. Such devices include PDAs, virtual reality devices and laptop computers. Such devices usually need not have connection to the wider internet, but they should be able to network among themselves. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Bluetooth Mobility becomes much more important when there is a need to network between several PANs. Bluetooth is a short-range radio technology for wireless connectivity of PDAs and other similar devices. If each device is equipped with a Bluetooth radio, it is possible to connect upto 8 such devices into a piconet. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Scatternets When there are more than eight devices, Bluetooth can be used to form multiple piconets. These piconets can be connected together into a scatternet. Mobility is again an issue if individual piconets are not static. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Factors Affecting Ad hoc Networking There are several factors specifically important for ad hoc networking : – – – – Address assignment Scalability Power budget versus latency Incompatible standards Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Addressing Problems Nodes in an ad hoc network are assumed to have addresses that are preassigned. These addresses are not directly related to the current positions of the nodes relative to the overall network. This is significantly different from the way addresses are assigned within the Internet. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Addressing within the Internet Routing within the Internet depends on the ability to collect reachability information to IP nodes. All the nodes within the same network share the same routing prefix. Nearby networks have similar routing prefixes. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Hierarchy of Addresses Smaller prefixes sit at the higher levels of the hierarchy. Reachability to all nodes within the hierarchy can be described by advertising a single, smallest routing prefix. The key to the scalability of the internet is the collection of routing information in hierarchies. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Addressing in Ad hoc Networks Such a hierarchy is typically not available for ad hoc networks. It is possible to introduce this hierarchy by controlling the IP addresses of the mobile nodes. However, this requires that the IP addresses change depending on the movement of the nodes. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Addressing in Ad hoc Networks However, changing IP addresses introduces extensive changes in the routing tables. It is not clear whether maintaining a hierarchy is useful since it causes major revisions of the routing tables. There may be major limitations for ad hoc network protocols for large collections of nodes. With increased mobility, route maintenance will consume a major part of the bandwidth. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Scalability Ad hoc networks are not as easily scalable as the Internet. Loss of hierarchy introduces larger routing tables. Hence, we have to look for other means of introducing hierarchy by not using IP addresses. Hence, IP based protocols must maintain additional routing information. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Other Scalability Issues Since routing tables change as the nodes move, control messages have to be sent around the network to maintain the current connectivity information. The control messages have to be sent more often if mobility is high. If the network has a large number of highly mobile nodes, the control messages take up a lot of bandwidth. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Role of Control Messages Efficient routing protocols should try to send less number of control messages for maintaining connectivity information. Otherwise, there will be no bandwidth left for sending useful messages. Also, processing a large number of control messages put a heavy load on individual nodes. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Evaluating Protocols for Ad hoc Networks If the nodes are slow in processing control messages, they may generate more control messages and hence flood the network. Routing protocols must be evaluated carefully with increased number of nodes and increased mobility to see their effect on control mesages. The network should settle down fast (or converge) when a node moves. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Power Budget versus Latency One of the key issues in ad hoc networks is power management. Most nodes in an ad hoc network are powered by batteries. Batteries cannot be recharged easily in many cases. Each node participates in two kinds of activities, sending and receiving messages useful for itself and forwarding messages for other nodes. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Power Management The second activity is essential for maintaining an ad hoc network, since nodes should forward messages in a multi-hop network. However, the battery-power of a node will deplete fast if there are too many control messages to forward. A node may refuse to forward messages if its power level is too low. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Energy-efficient Protocols Hence, routing protocols should be designed to be energy-efficient. However, good routing decisions can only be taken if the nodes have good knowledge of the network topology. On the other hand, the nodes need to send more control messages for maintaining topology information. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Mobile and Wireless Computing Incompatible Standards There are many different proocols and engineering solutions existing for ad hoc networks. IETF (Internet Engineering Task Force) is currently evaluating several protocols and standards within its MANET (Mobile Ad hoc Network) working group. Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)