* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Ad-hoc networks
Distributed firewall wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed operating system wikipedia , lookup
Wake-on-LAN wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Multiprotocol Label Switching wikipedia , lookup
Computer network wikipedia , lookup
Deep packet inspection wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Backpressure routing wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Airborne Networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken Overview Short introduction Example of a basic routing algorithm Routing protocols IP configuring Security Short introduction to wireless multihop networks Two or more nodes equipped with wireless communications and networking capability Base station is not necessary A node can communicate directly with another node that is immediately within radio range To communicate with nodes outside its own radio range an intermediate node is used to forward the packet The network is self-organizing and adaptive (autonomous distributed control is required) Nodes are able to detect the presence of other nodes and join them into the network The nodes don’t need to be of the same type (phone, PDA, laptop, sensor, etc.) Application areas Tactical military Emergencies Disaster relief Sensor Meetings/conferences Challenges Dynamic topologies Bandwidth-constrained, variable capacity links Energy-constrained Limited physical security Scalability Simple routing protocol example Propagation of routing table Routing and transmitting Routing table Each terminal has its own routing table (in proactive routing algorithms) Destination terminal A B C D … Next node A A E D … Position notification packet Used to make and update the Routing Table Broadcasted in a limited area Contents of the packet: ID of terminal Timestamp for the ID of hop Hop which the created created packet source terminal count the packet Renewal of Position Notification Packet A 1 B 2 A 1 A 1 A B A t =1 A t =2 A 1 C 3 D C A B B B A C C C t =3 t =4 Routing Table in D Routing G B E C To F Dest Next A B A B C E D E E F I G E H I I I D A I F H Routing Table in I Routing G B E C To F Dest Next A B D D C C D E D E F H G E H H I - D A I F H Routing Table in H Routing G B E C To F Dest Next A B I I C C D E I I F F G C H - I I D A I F H Basic transmitting procedure Request to send (RTS) Clear to send (CTS) Ready to receive (RTR) Topology problem Hidden terminal problem Exposed terminal problem Busy tones Ad Hoc routing protocols Proactive – Large overhead Reactive – Delay before first packet – Doesn’t scale Hybrid scheme – Clusters Destination Sequenced Distance Vector (DSDV) Periodic routing Distance vector – dest, next hop, distance, seq no Two ways to update neighbors – Full dump – Incremental update Dynamic Source Routing (DSR) On demand Source routing – Each packet contains full route Route discovery – Flood RREQ packets – RREP returned when route found Route maintenance – RERR when route is broken Ad-hoc On-demand Distance Vector (AODV) From DSR – Route discovery – Route maintenance From DSDV – Hop-by-hop routing – Sequence numbers Zone Routing Protocol (ZRP) Predefined zones – Centered around each node Proactive local routing Reactive global routing IP address assignment No centralized logic Small address room in IPv4 Network splitting Network merging Two approaches A leader – Responsible for all addresses Buddy system – Start with one node responsible for all addresses – Joining node gets half of the addresses from an existing node Routing security vulnerabilities Open medium Dynamic topology Distributed cooperation (absence of central authorities) Constrained capability (energy) Types of attacks Black hole Denial of service Routing table overflow Impersonation Energy consummation