Download Lecture1.1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Airborne Networking wikipedia , lookup

Wireless security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Mobile and Wireless Computing
Lecture 1: Preliminaries

Lecture 1.1 : Introduction to mobile ad hoc
networks

Lecture 1.2 : Introduction to networking and
wireless communication
&
A brief overview of the course
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
The Importance of Mobile and Wireless Computing

There is tremendous technological advance in
producing small and smart devices.

It is a natural consequence that such devices
work in a collaborative way.

However, users carry around many such smart
devices and they are not fixed in the sense of a
desktop computer.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Networking without an Infrastructure

Hence, there is a need for networking such
mobile devices without any infrastructural
support.

Cellular phones work with infrastructural support
like mobile phone towers and satellite
communication.

However, such support comes at a cost like preregistration with a mobile service provider etc.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Networking Anywhere and Anytime

On the other hand, there is a growing demand of
using networks of mobile devices anywhere and
anytime.

In many situations, the Internet may not be an
efficient solution.

For example, a collection of people trying to
communicate in a hotel or conference hall.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Smart Devices

Another important application of wireless
communication is the use of small smart
devices.

The number of embedded devices in appliances
and vehicles is increasing at a rapid rate.

There is a growing need of networking such
embedded devices without infrastructural
support.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Sensor Dust

Sensor dust is a collection of small and
inexpensive devices which work through
collaboration.

Thousands of such devices can be used for
applications like : environmental data collection,
weather forecasting, measuring toxicity levels at
hazardous sites etc.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Sensor Dust

NASA has planned a sensor dust deployment for
its 2007 Mars mission for monitoring Martian
climate.

The purpose of a sensor dust is to collect data
through inexpensive sensor devices and gather
this data in a base station for analysis.

Sensor dust is typically deployed in places
where there is no infrastructural support.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Ad hoc Networks

This course is about ways of information
exchange in a network of mobile and wireless
nodes without any infrastructural support.

Such networks are often called ad hoc networks
to emphasize that they do not depend on
infrastructural support.

The purpose of an ad hoc network is to set up
(possibly) a short-lived network for a collection of
nodes.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Ad hoc Networks

Most network operations involve exchange of
information among the computers participating
in a network.

There are numerous protocols for networks with
infrastructural support , starting from LANs,
Ethernets and global networks like the Internet.

However, most of these protocols do not work
well for ad hoc networks.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Routing in an Ad hoc Network

If all the wireless nodes are within the
transmission range of each other, routing is
easy. Every node can listen to all transmissions.

However, this is not true in most situations, due
to short transmission range. Hence, most ad hoc
neworks are multi-hop.

A message from a source node must go through
intermediate nodes to reach its destination.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Routing in multi-hop networks

All nodes cooperate in delivering messages
across the network.

The nodes must collect local neighbourhood
information in order to make global routing
decisions.

This situation is quite different from wired
networks where the routing decisions are made
based on the infrastructure.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
An Example
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Personal Area Network (PAN)

The aim of a PAN is to create a very localized
network for devices associated with a single
person.

Such devices include PDAs, virtual reality
devices and laptop computers.

Such devices usually need not have connection
to the wider internet, but they should be able to
network among themselves.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Bluetooth

Mobility becomes much more important when
there is a need to network between several
PANs.

Bluetooth is a short-range radio technology for
wireless connectivity of PDAs and other similar
devices.

If each device is equipped with a Bluetooth
radio, it is possible to connect upto 8 such
devices into a piconet.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Scatternets

When there are more than eight devices,
Bluetooth can be used to form multiple piconets.

These piconets can be connected together into
a scatternet.

Mobility is again an issue if individual piconets
are not static.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Factors Affecting Ad hoc Networking

There are several factors specifically important
for ad hoc networking :
–
–
–
–
Address assignment
Scalability
Power budget versus latency
Incompatible standards
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Addressing Problems

Nodes in an ad hoc network are assumed to
have addresses that are preassigned.

These addresses are not directly related to the
current positions of the nodes relative to the
overall network.

This is significantly different from the way
addresses are assigned within the Internet.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Addressing within the Internet

Routing within the Internet depends on the
ability to collect reachability information to IP
nodes.

All the nodes within the same network share the
same routing prefix.

Nearby networks have similar routing prefixes.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Hierarchy of Addresses

Smaller prefixes sit at the higher levels of the
hierarchy.

Reachability to all nodes within the hierarchy
can be described by advertising a single,
smallest routing prefix.

The key to the scalability of the internet is the
collection of routing information in hierarchies.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Addressing in Ad hoc Networks

Such a hierarchy is typically not available for ad
hoc networks.

It is possible to introduce this hierarchy by
controlling the IP addresses of the mobile nodes.

However, this requires that the IP addresses
change depending on the movement of the
nodes.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Addressing in Ad hoc Networks

However, changing IP addresses introduces
extensive changes in the routing tables.

It is not clear whether maintaining a hierarchy is
useful since it causes major revisions of the
routing tables.

There may be major limitations for ad hoc
network protocols for large collections of nodes.
With increased mobility, route maintenance will
consume a major part of the bandwidth.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Scalability

Ad hoc networks are not as easily scalable as
the Internet. Loss of hierarchy introduces larger
routing tables.

Hence, we have to look for other means of
introducing hierarchy by not using IP addresses.

Hence, IP based protocols must maintain
additional routing information.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Other Scalability Issues

Since routing tables change as the nodes move,
control messages have to be sent around the
network to maintain the current connectivity
information.

The control messages have to be sent more
often if mobility is high.

If the network has a large number of highly
mobile nodes, the control messages take up a
lot of bandwidth.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Role of Control Messages

Efficient routing protocols should try to send less
number of control messages for maintaining
connectivity information.

Otherwise, there will be no bandwidth left for
sending useful messages.

Also, processing a large number of control
messages put a heavy load on individual nodes.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Evaluating Protocols for Ad hoc Networks

If the nodes are slow in processing control
messages, they may generate more control
messages and hence flood the network.

Routing protocols must be evaluated carefully
with increased number of nodes and increased
mobility to see their effect on control mesages.

The network should settle down fast (or
converge) when a node moves.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Power Budget versus Latency

One of the key issues in ad hoc networks is
power management.

Most nodes in an ad hoc network are powered
by batteries. Batteries cannot be recharged
easily in many cases.

Each node participates in two kinds of activities,
sending and receiving messages useful for itself
and forwarding messages for other nodes.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Power Management

The second activity is essential for maintaining
an ad hoc network, since nodes should forward
messages in a multi-hop network.

However, the battery-power of a node will
deplete fast if there are too many control
messages to forward.

A node may refuse to forward messages if its
power level is too low.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Energy-efficient Protocols

Hence, routing protocols should be designed to
be energy-efficient.

However, good routing decisions can only be
taken if the nodes have good knowledge of the
network topology.

On the other hand, the nodes need to send
more control messages for maintaining topology
information.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing
Incompatible Standards

There are many different proocols and
engineering solutions existing for ad hoc
networks.

IETF (Internet Engineering Task Force) is
currently evaluating several protocols and
standards within its MANET (Mobile Ad hoc
Network) working group.
Institute for Computer Science, University of Freiburg
Western Australian Interactive Virtual Environments Centre (IVEC)