[go: up one dir, main page]

Academia.eduAcademia.edu

MANET

Principles, Protocols, and Applications Second Edition Subir Kumar Sarkar T.G. Basavaraju C. Puttamadappa Ad Hoc Mobile Wireless Networks Principles, Protocols, and Applications Second Edition OTHER TELECOMMUNICATIONS BOOKS FROM AUERBACH Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications Subir Kumar Sarkar, T.G. Basavaraju, and C. Puttamadappa ISBN 978-1-4665-1446-1 Communication and Networking in Smart Grids Yang Xiao (Editor) ISBN 978-1-4398-7873-6 Delay Tolerant Networks: Protocols and Applications Athanasios V. Vasilakos, Yan Zhang, and Thrasyvoulos Spyropoulos ISBN 978-1-4398-1108-5 Emerging Wireless Networks: Concepts, Techniques and Applications Christian Makaya and Samuel Pierre (Editors) ISBN 978-1-4398-2135-0 Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios Josephina Antoniou and Andreas Pitsillides ISBN 978-1-4398-4808-1 Green Communications: Theoretical Fundamentals, Algorithms and Applications Jinsong Wu, Sundeep Rangan, and Honggang Zhang ISBN 978-1-4665-0107-2 Green Communications and Networking F. Richard Yu, Xi Zhang, and Victor C.M. Leung (Editors) ISBN 978-1-4398-9913-7 Green Mobile Devices and Networks: Energy Optimization and Scavenging Techniques Hrishikesh Venkataraman and Gabriel-Miro Muntean (Editors) ISBN 978-1-4398-5989-6 Handbook on Mobile Ad Hoc and Pervasive Communications Laurence T. Yang, Xingang Liu, and Mieso K. Denko (Editors) ISBN 978-1-4398-4616-2 IP Telephony Interconnection Reference: Challenges, Models, and Engineering Mohamed Boucadair, Isabel Borges, Pedro Miguel Neves, and Olafur Pall Einarsson ISBN 978-1-4398-5178-4 Multihomed Communication with SCTP (Stream Control Transmission Protocol) Victor C.M. Leung, Eduardo Parente Ribeiro, Alan Wagner, and Janardhan Iyengar ISBN 978-1-4665-6698-9 Multimedia Communications and Networking Mario Marques da Silva ISBN 978-1-4398-7484-4 Near Field Communications Handbook Syed A. Ahson and Mohammad Ilyas (Editors) ISBN 978-1-4200-8814-4 Next-Generation Batteries and Fuel Cells for Commercial, Military, and Space Applications A. R. Jha, ISBN 978-1-4398-5066-4 Physical Principles of Wireless Communications, Second Edition Victor L. Granatstein, ISBN 978-1-4398-7897-2 Security of Mobile Communications Noureddine Boudriga, ISBN 978-0-8493-7941-3 Smart Grid Security: An End-to-End View of Security in the New Electrical Grid Gilbert N. Sorebo and Michael C. Echols ISBN 978-1-4398-5587-4 Transmission Techniques for 4G Systems Mário Marques da Silva ISBN 978-1-4665-1233-7 Transmission Techniques for Emergent Multicast and Broadcast Systems Mário Marques da Silva, Americo Correia, Rui Dinis, Nuno Souto, and Joao Carlos Silva ISBN 978-1-4398-1593-9 TV Content Analysis: Techniques and Applications Yiannis Kompatsiaris, Bernard Merialdo, and Shiguo Lian (Editors) ISBN 978-1-4398-5560-7 TV White Space Spectrum Technologies: Regulations, Standards, and Applications Rashid Abdelhaleem Saeed and Stephen J. Shellhammer ISBN 978-1-4398-4879-1 LTE-Advanced Air Interface Technology Xincheng Zhang and Xiaojin Zhou ISBN 978-1-4665-0152-2 Wireless Sensor Networks: Current Status and Future Trends Shaiullah Khan, Al-Sakib Khan Pathan, and Nabil Ali Alrajeh ISBN 978-1-4665-0606-0 Media Networks: Architectures, Applications, and Standards Hassnaa Moustafa and Sherali Zeadally (Editors) ISBN 978-1-4398-7728-9 Wireless Sensor Networks: Principles and Practice Fei Hu and Xiaojun Cao ISBN 978-1-4200-9215-8 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com Ad Hoc Mobile Wireless Networks Principles, Protocols, and Applications Second Edition Subir Kumar Sarkar T.G. Basavaraju C. Puttamadappa CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2013 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20120725 International Standard Book Number-13: 978-1-4665-1447-8 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copyright. com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com Contents CHAPTER 1 INTRODUCTION 1.1 1.2 Fundamentals of Wireless Networks 1.1.1 Bluetooth 1.1.2 IrDA 1.1.2.1 Comparison of Bluetooth and IrDA 1.1.3 HomeRF 1.1.3.1 Comparison of Bluetooth with Shared Wireless Access Protocol (SWAP) 1.1.4 IEE 802.11 (WiFi) 1.1.5 IEE 802.16 (WiMAX) 1.1.6 Hotspots 1.1.6.1 Requirements to Use Wi-Fi Hotspots 1.1.6.2 Finding Wi-Fi Hotspots 1.1.6.3 Connection to Wi-Fi Hotspots 1.1.6.4 Dangers of Wi-Fi Hotspots 1.1.7 Mesh Networking 1.1.7.1 Limitation of Wireless Technology Wireless Internet 1.2.1 IP Limitations 1.2.2 Mobile Internet Protocol (IP) 1.2.2.1 Working of Mobile IP 1.2.3 Discovering the Care-of Address 1.2.4 Registering the Care-of Address 1.2.5 Authentication 1.2.6 Automatic Home Agent Discovery 1 1 2 3 4 5 6 8 9 9 10 10 10 11 11 12 12 14 15 16 21 22 22 24 v vi C O N T EN T S 1.2.7 1.2.8 Tunneling to the Care-of Address Issues in Mobile IP 1.2.8.1 Routing Ineiciencies 1.2.8.2 Security Issues 1.2.8.3 Ingress Filtering 1.2.8.4 User Perceptions of Reliability 1.2.8.5 Issues in IP Addressing 1.2.8.6 Slow Growth in the Wireless Local Area Network (WLAN) Market 1.2.8.7 Competition from Other Protocols 1.3 What Are Ad Hoc Networks? 1.3.1 Diference between Cellular and Ad Hoc Wireless Networks 1.3.2 Applications of Ad Hoc Wireless Networks 1.3.3 Technical and Research Challenges 1.3.3.1 Security Issues and Challenges 1.3.3.2 Diferent Types of Attacks on Multicast Routing Protocols 1.3.3.3 Interconnection of Mobile Ad Hoc Networks and the Internet 1.3.4 Issues in Ad Hoc Wireless Networks 1.3.4.1 Medium Access Control (MAC) Protocol Research Issues 1.3.4.2 Networking Issues 1.3.4.3 Ad Hoc Routing and Forwarding 1.3.4.4 Unicast Routing 1.3.4.5 Location-Aware Routing 1.3.4.6 Transmission Control Protocol (TCP) Issues 1.3.4.7 Network Security 1.3.4.8 Diferent Security Attacks 1.3.4.9 Security at Data-Link Layer 1.3.4.10 Secure Routing 1.3.4.11 Quality of Service (QoS) 1.3.4.12 Simulation of Wireless Ad Hoc Networks Bibliography CHAPTER 2 MAC L AY E R P R O T O C O L S 2.1 2.2 2.3 Introduction Important Issues and Need for Medium Access Control (MAC) Protocols 2.2.1 Need for Special MAC Protocols Classiication of MAC Protocols 2.3.1 Contention-Based MAC Protocols 24 25 25 26 26 26 27 27 28 28 30 30 32 33 35 36 36 37 37 38 38 41 42 42 43 45 46 46 49 50 51 51 52 54 55 56 C O N T EN T S Contention-Based MAC Protocols with Reservation Mechanisms 2.3.2.1 Multiple Access Collision Avoidance (MACA) 2.3.2.2 IEEE 802.11 MAC Scheme 2.3.2.3 Multiple Access Collision Avoidance by Invitation (MACA-BI) 2.3.2.4 Group Allocation Multiple Access with Packet Sensing (GAMA-PS) 2.3.3 MAC Protocols Using Directional Antennas 2.3.4 Multiple-Channel MAC Protocols 2.3.4.1 Dual Busy Tone Multiple Access (DBTMA) 2.3.4.2 Multichannel Carrier Sense Multiple Access (CSMA) MAC Protocol 2.3.4.3 Hop-Reservation Multiple Access (HRMA) 2.3.4.4 Multichannel Medium Access Control (MMAC) 2.3.4.5 Dynamic Channel Assignment with Power Control (DCA-PC) 2.3.5 Power-Aware or Energy-Eicient MAC Protocols 2.3.5.1 Power-Aware Medium Access Control with Signaling (PAMAS) 2.3.5.2 Dynamic Power-Saving Mechanism (DPSM) 2.3.5.3 Power-Control Medium Access Control (PCM) 2.3.5.4 Power-Controlled Multiple Access (PCMA) 2.4 Summary Reference Bibliography vii 2.3.2 CHAPTER 3 ROUTIN G PROTO C O L S 3.1 3.2 3.3 Introduction Design Issues of Routing Protocols for Ad Hoc Networks 3.2.1 Routing Architecture 3.2.2 Unidirectional Links Support 3.2.3 Usage of Superhosts 3.2.4 Quality of Service (QoS) Routing 3.2.5 Multicast Support Classiication of Routing Protocols 57 58 61 62 63 64 66 67 68 68 69 70 71 72 72 73 75 76 77 77 81 81 83 83 84 84 85 86 86 viii C O N T EN T S 3.3.1 3.3.2 3.3.3 3.3.4 3.4 3.5 Proactive, Reactive, and Hybrid Routing Structuring and Delegating the Routing Task Exploiting Network Metrics for Routing Evaluating Topology, Destination, and Location for Routing Proactive Routing Protocols 3.4.1 Wireless Routing Protocol (WRP) 3.4.1.1 Overview 3.4.1.2 Information Maintained at Each Node 3.4.1.3 Information Exchanged among Nodes 3.4.1.4 Routing-Table Updating 3.4.2 Destination-Sequence Distance Vector (DSDV) 3.4.3 Fisheye State Routing (FSR) 3.4.4 Ad Hoc On-Demand Distance Vector (AODV) 3.4.4.1 Path Discovery 3.4.4.2 Reverse Path Setup 3.4.4.3 Forward Path Setup 3.4.4.4 Route Table Management 3.4.4.5 Path Maintenance 3.4.4.6 Local Connectivity Management 3.4.5 Dynamic Source Routing (DSR) Protocol 3.4.5.1 Overview and Important Properties of the Protocol 3.4.5.2 Basic DSR Route Discovery 3.4.5.3 Basic DSR Route Maintenance 3.4.6 Temporally Ordered Routing Algorithm (TORA) 3.4.7 Cluster-Based Routing Protocol (CBRP) 3.4.8 Location-Aided Routing (LAR) 3.4.8.1 Route Discovery Using Flooding 3.4.9 Ant-Colony-Based Routing Algorithm (ARA) 3.4.9.1 Basic Ant Algorithm Hybrid Routing Protocols 3.5.1 Zone Routing Protocol (ZRP) 3.5.1.1 Motivation 3.5.1.2 Architecture 3.5.1.3 Routing 3.5.1.4 Route Maintenance 3.5.2 Zone-Based Hierarchical Link State (ZHLS) 3.5.2.1 Zone Map 3.5.2.2 Hierarchical Structure of ZHLS 87 89 90 90 91 92 93 94 95 96 96 98 101 101 102 103 104 105 106 106 107 107 110 111 112 113 113 115 115 116 116 116 117 119 120 120 121 121 C O N T EN T S Distributed Dynamic Routing (DDR) Protocol 3.6 Summary Bibliography ix 3.5.3 CHAPTER 4 M U LT I C A S T R O U T I N G P R O T O C O L S 4.1 4.2 4.3 Introduction Issues in Design of Multicast Routing Protocols Classiication of Multicast Routing Protocols 4.3.1 Tree-Based Multicast Routing Protocols 4.3.1.1 Source Tree-Based Multicast Protocols 4.3.1.2 Minimum Hop-Based Multicast Protocols 4.3.1.3 Minimum Link-Based Multicast Protocols 4.3.1.4 Stability-Based Multicast Protocols 4.3.1.5 Multicast Zone-Based Routing Protocol (MZRP) 4.3.1.6 Shared Tree-Based Multicast Protocols 4.3.1.7 Session-Speciic Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers (AMRIS) 4.3.2 Mesh-Based Multicast Routing Protocols 4.3.2.1 Source-Initiated Mesh-Based Multicast Protocols 4.3.2.2 Receiver-Initiated Mesh-Based Multicast Protocols 4.3.3 Source-Based Multicast Routing Protocol 4.3.3.1 FG Node Selection 4.3.3.2 Operation 4.4 QoS Routing 4.4.1 Multicast Routing in QoS 4.5 Energy-Eicient Multicast Routing Protocols 4.5.1 Metrics for Energy-Eicient Multicast 4.5.2 EEMRP: Energy-Eicient Multicast Routing Protocol 4.6 Location-Based Multicast Routing Protocols 4.6.1 Preliminaries 4.7 Summary Reference Bibliography 122 123 126 129 129 130 132 132 132 132 134 137 139 142 143 144 144 146 147 147 149 152 153 153 153 154 155 156 157 158 158 x CHAPTER 5 C O N T EN T S TR A N S P O R T P R O T O C O L S 5.1 5.2 Introduction TCP’s Challenges and Design Issues in Ad Hoc Networks 5.2.1 Challenges 5.2.1.1 Excessive Contention and Unfair Access at MAC Layer 5.2.2 Design Goals 5.3 TCP Performance over MANETs 5.3.1 TCP Performance 5.3.2 Other Problems 5.3.2.1 State Route Problem 5.3.2.2 MAC Layer Rate Adaptation Problem 5.4 Ad Hoc Transport Protocols 5.4.1 Split Approaches 5.4.2 End-to-End Approach 5.4.2.1 TCP Feedback (TCP-F) 5.4.2.2 TCP-ELFN 5.4.2.3 Ad Hoc-TCP 5.4.2.4 TCP-Bufering Capability and Sequencing Information (TCP-BUS) 5.5 Summary References Bibliography CHAPTER 6 Q UA L I T Y 6.1 6.2 6.3 6.4 6.5 OF S ERVICE Introduction Challenges 6.2.1 Hard-State versus Soft-State Resource Reservation 6.2.2 Stateful versus Stateless Approach 6.2.3 Hard QoS versus Soft QoS Approach Classiication of QoS Solutions 6.3.1 MAC Layer Solutions 6.3.1.1 Cluster TDMA 6.3.2 Network Layer Solutions QoS-Enabled Ad Hoc On-Demand Distance Vector Routing Protocol 6.4.1 QoS Extensions to AODV Protocol 6.4.1.1 Maximum Delay Extension Field 6.4.1.2 Minimum Bandwidth Extension Field 6.4.2 Advantages and Disadvantages QoS Frameworks for Ad Hoc Wireless Networks 6.5.1 QoS Models 161 161 162 162 163 168 169 169 171 171 172 172 172 174 175 176 177 179 182 183 183 185 185 185 187 188 188 189 189 189 191 191 191 192 192 192 193 194 C O N T EN T S 6.5.1.1 Flexible QoS Model for Mobile Ad Hoc Networks 6.6 INSIGNIA 6.6.1 Operation of INSIGNIA Framework 6.6.2 Advantages and Disadvantages 6.7 INORA 6.7.1 Coarse Feedback Scheme 6.7.2 Class-Based Fine Feedback Scheme 6.7.3 Advantages 6.8 Summary References Bibliography CHAPTER 7 E N E R GY M A N A G E M E N T S Y S T E M S 7.1 7.2 7.3 Introduction 7.1.1 Why Energy Management Is Needed in Ad Hoc Networks 7.1.2 Classiication of Energy Management Schemes 7.1.3 Overview of Battery Technologies 7.1.4 Principles of Battery Discharge 7.1.4.1 Depth of Discharge 7.1.5 Impact of Discharge Characteristics on Battery Capacity 7.1.5.1 Temperature Characteristics 7.1.5.2 Self-Discharge Characteristics 7.1.5.3 Efects of Internal Impedance 7.1.5.4 Discharge Rates 7.1.5.5 Battery Load 7.1.5.6 Duty Cycle 7.1.6 Battery Modeling 7.1.7 Battery-Driven System Design 7.1.7.1 Stochastic Model 7.1.8 Smart Battery System Energy-Eicient Routing Protocol 7.2.1 Proposed Energy-Eicient Medium Access Control Protocol 7.2.1.1 Design Criteria 7.2.1.2 Features of EE-MAC 7.2.1.3 Performance Transmission Power-Management Schemes 7.3.1 Power Management of Ad Hoc Networks 7.3.2 Basic Idea of the Power Cost Calculate Balance (PCCB) Routing Protocol 7.3.2.1 Routing Process of the PCCB Routing Protocol 7.3.3 Analysis of the PCCB Routing Protocol xi 195 196 198 200 200 201 201 202 203 204 204 207 207 207 208 210 211 211 212 212 213 215 217 218 218 219 221 223 224 226 227 227 228 229 229 230 231 232 235 x ii C O N T EN T S 7.3.4 MAC Protocol 7.3.5 Power Saving 7.3.6 Timing Synchronization Function 7.3.7 Power-Saving Function 7.3.8 Power-Saving Potential 7.4 Transmission Power Control 7.4.1 Adapting Transmission Power to the Channel State 7.4.2 MAC Techniques 7.4.3 Logical Link Control 7.5 AODV Protocol 7.5.1 Introduction 7.5.2 Route Discovery 7.5.3 Route Maintenance 7.6 Local Energy-Aware Routing Based on AODV (LEAR-AODV) 7.6.1 Introduction 7.6.2 Route Discovery 7.6.3 Route Maintenance 7.7 Power-Aware Routing Based on AODV (PAR-AODV) 7.7.1 Introduction 7.7.2 Route Discovery 7.7.3 Route Maintenance 7.8 Lifetime Prediction Routing Based on AODV (LPR-AODV) 7.8.1 Introduction 7.8.2 Route Discovery 7.8.3 Route Maintenance References CHAPTER 8 MOBILITY MODELS N E T WO RKS 8.1 8.2 8.3 FOR 235 236 237 237 239 240 241 242 244 246 246 246 247 247 247 247 248 248 248 249 249 249 249 250 250 252 M U LT I H O P W I R E L E S S Introduction Mobility Models 8.2.1 Random Walk Mobility Model 8.2.2 Random Waypoint 8.2.3 he Random Direction Mobility Model 8.2.4 A Boundless Simulation Area 8.2.5 Gauss–Markov 8.2.6 A Probabilistic Version of Random Walk 8.2.7 City Section Mobility Model Limitations of the Random Waypoint Model and Other Random Models 8.3.1 Mobility Models with Temporal Dependency 8.3.2 Mobility Models with Spatial Dependency 255 255 255 257 258 260 261 261 263 264 265 266 266 C O N T EN T S Mobility Models with Geographic Restriction 8.3.3.1 Pathway Mobility Model 8.3.3.2 Obstacle Mobility Model 8.3.3.3 Group Mobility Models 8.4 Summary References Bibliography x iii 8.3.3 CHAPTER 9 C R O S S - L AY E R D E S I G N I S S U E S 9.1 9.2 9.3 Introduction A Deinition of Cross-Layer Design Cross-Layer Design Principle 9.3.1 General Motivations for Cross-Layer Design 9.4 Proposals Involving Cross-Layer Design 9.4.1 Creation of New Communication Interfaces 9.4.1.1 Upward Information Flow 9.4.1.2 Downward Information Flow 9.4.1.3 Back and Forth Information Flow 9.4.2 Merging of Adjacent Layers 9.4.2.1 Design Coupling without New Interfaces 9.4.2.2 Vertical Calibration across Layers 9.5 Proposals for Implementing Cross-Layer Interactions 9.5.1 Direct Communication between Layers 9.5.2 A Shared Database across Layers 9.5.3 Completely New Abstractions 9.6 Cross-Layer Design: Is It Worth Applying It? 9.6.1 he von Neumann Architecture 9.6.2 Source-Channel Separation and Digital System Architecture 9.6.3 he OSI Architecture for Networking 9.7 Pitfalls of the Cross-Layer Design Approach 9.7.1 Cost of Development 9.7.2 Performance versus Longevity 9.7.3 Interaction and Unintended Consequences 9.7.4 Stability 9.8 Performance Objectives 9.8.1 Maximizing Total Capacity 9.8.2 Max–Min Fairness 9.8.3 Utility Fairness 9.9 Cross-Layer Protocols Bibliography C H A P T E R 10 A P P L I C AT I O N S 10.1 10.2 AND RECENT DE VELOPMENTS Introduction Typical Applications 10.2.1 PAN 267 267 268 269 269 271 271 275 275 275 276 277 278 278 279 280 280 280 280 280 281 281 281 282 282 282 283 283 283 283 284 284 285 285 286 286 287 287 290 293 293 295 296 xiv C O N T EN T S 10.3 Applications and Opportunities 10.3.1 Academic Environment Applications 10.3.2 Defense Applications 10.3.3 Industrial Environment Applications 10.3.4 Healthcare Applications 10.3.5 Search and Rescue Applications 10.3.6 Vehicular Ad Hoc Networks 10.4 Challenges 10.4.1 Security 10.5 Highlights of the Most Recent Developments in the Field 10.5.1 Sensors 10.5.2 Wireless Ad Hoc Sensor Networks 10.6 Summary Bibliography 297 297 298 299 300 301 301 302 304 306 307 307 307 308 1 I NTRODUCTI ON 1.1 Fundamentals of Wireless Networks Communication between various devices makes it possible to provide unique and innovative services. Although this interdevice communication is a very powerful mechanism, it is also a complex and clumsy mechanism, leading to a lot of complexity in present day systems. his not only makes networking diicult but also limits its lexibility. Many standards exist today for connecting various devices. At the same time, every device has to support more than one standard to make it interoperable between diferent devices. Take the example of setting up a network in oices. Right now, entire oice buildings have to make provisions for lengths of cable that stretch kilometers through conduits in the walls, loors, and ceilings to workers’ desks. In the last few years, many wireless connectivity standards and technologies have emerged. hese technologies enable users to connect a wide range of computing and telecommunications devices easily and simply, without the need to buy, carry, or connect cables. hese technologies deliver opportunities for rapid ad hoc connections, and the possibility of automatic, unconscious connections between devices. hey will virtually eliminate the need to purchase additional or proprietary cabling to connect individual devices, thus creating the possibility of using mobile data in a variety of applications. Wired local area networks (LANs) have been very successful in the last few years and now, with the help of these wireless connectivity technologies, wireless LANs (WLANs) have started emerging as much more powerful and lexible alternatives to the wired LANs. Until a year ago, the speed of the WLAN was limited to 2 megabits per second (Mbps), but with the introduction of these new standards, we are seeing WLANs that can support up to 11 Mbps in the industrial, scientiic, and medical (ISM) band. 1 2 A D H O C M O BIL E WIREL E S S NE T W O RKS here are many such technologies and standards, and notable among them are Bluetooth, Infrared Data Association (IrDA), HomeRF, and Institute of Electrical and Electronic Engineers (IEEE) 802.11 standards. hese technologies compete on certain fronts and are complementary in other areas. So, given the fact that so many technologies exist, which technology is the best and which solution should one select for a speciic application? To be able to understand this, we need to look at the strengths and weaknesses and also the application domains of each of these standards and technologies. he premise behind all these standards is to use some kind of underlying radio technology to enable wireless transmission of data, and to provide support for formation of networks and managing various devices by means of high-level software. Bluetooth, though quite new, has emerged as the forerunner in this so-called “battle between competing technologies” due to the kind of support it is getting from all sections of the industry. However, it must be kept in mind that the viability of a technology depends on the application context. 1.1.1 Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology designed to connect phones, laptops, personal digital assistants (PDAs), and other portable equipment with little or no work by the user. Unlike infrared, Bluetooth does not require line-of-sight positioning of connected units. he technology uses modiications of existing WLAN techniques but is most notable for its small size and low cost. Whenever any Bluetooth-enabled devices come within range of each other, they instantly transfer address information and establish small networks between each other, without the user being involved. Bluetooth is an open wireless technology standard for exchanging data over short distances from ixed and mobile devices, creating personal area networks (PANs) with high levels of security. It was created by telecom vendor Ericsson in 1994. It was originally thought of as a wireless alternative to RS-232 data cables. It can connect several devices and overcomes the problems of synchronization. At any given time, data can be transferred between the master and one other device. he master chooses which slave device to address. IN T R O D U C TI O N 3 It switches rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which slave to address, a slave is supposed to listen in each receive slot. Being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is diicult. Features of Bluetooth technology include the following: • Operates in the 2.56 GHZ ISM band, which is globally available (no license required) • Uses frequency hop spread spectrum (FHSS) • Can support up to eight devices in a small network known as a “piconet” • Omnidirectional, non-line-of-sight transmission through walls • 10–100 m range • Low cost • 1 mW power • Extended range with external power ampliier (100 m) 1.1.2 IrDA IrDA is an international organization that creates and promotes interoperable, low-cost infrared data interconnection standards. IrDA has a set of protocols covering all layers of data transfer and, in addition, has some network management and interoperability designs. IrDA protocols have IrDA DATA as the vehicle for data delivery and IrDA CONTROL for sending the control information. In general, IrDA is used to provide wireless connectivity technologies for devices that would normally use cables for connectivity. IrDA is a point-topoint, narrow angle (30° cone), ad hoc data transmission standard designed to operate over a distance of 0–1 m and at speeds of 9600 bits per second (bps) to 16 Mbps. Adapters now include the traditional upgrades to serial and parallel ports. Features of IrDA are as follows: • Range: from contact to at least 1 m and can be extended to 2 m; a low-power version relaxes the range objective for operation from contact through at least 20 centimeters (cm) 4 A D H O C M O BIL E WIREL E S S NE T W O RKS between low-power devices and 30 cm between low-power and standard-power devices. his implementation afords 10 times less power consumption. • Bidirectional communication is the basis of all speciications. • Data transmission from 9600 bps with primary speed or cost steps of 115 kilobits per second (kbps) and maximum speed of up to 4 Mbps. • Data packets are protected using a cyclic redundancy check (CRC) (CRC-16 for speeds up to 1.152 Mbps, and CRC-32 at 4 Mbps). Bluetooth and IrDA are both critical to the marketplace. Each technology has advantages and drawbacks and neither can meet all users’ needs. Bluetooth’s ability to penetrate solid objects and its capability for maximum mobility within the piconet allow for data exchange applications that are very diicult or impossible with IrDA. For example, with Bluetooth, a person could synchronize his or her phone with a personal computer (PC) without taking the phone out of a pocket or purse; this is not possible with IrDA. he omnidirectional capability of Bluetooth allows synchronization to start when the phone is brought into range of the PC. On the other hand, in applications involving one-to-one data exchange, IrDA is at an advantage. Consider an application where there are many people sitting across a table in a meeting. Electronic cards can be exchanged between any two people by pointing the IrDA devices toward each other (because of the directional nature). In contrast, because Bluetooth is omnidirectional in nature, the Bluetooth device will detect all similar devices in the room and the user would have to select the intended person from, say, a list provided by the Bluetooth device. On the security front, Bluetooth provides security mechanisms that are not present in IrDA. However, the narrow beam (in the case of IrDA) provides a low level of security. IrDA beats Bluetooth on the cost front. he Bluetooth standard deines layers 1 and 2 of the open system interconnection (OSI) model. he application framework of Bluetooth is aimed to achieve interoperability with IrDA and wireless access protocol (WAP). In addition, a host of other applications will be able to use the Bluetooth technology and protocols. 1.1.2.1 Comparison of Bluetooth and IrDA IN T R O D U C TI O N 5 1.1.3 HomeRF HomeRF is a subset of the International Telecommunication Union (ITU) and primarily works on the development of a standard for inexpensive radio frequency (RF) voice and data communication. he HomeRF Working Group has also developed the shared wireless access protocol (SWAP). SWAP is an industry speciication that permits PCs, peripherals, cordless telephones, and other devices to communicate voice and data without the use of cables. SWAP is similar to the carrier sense multiple access with collision avoidance (CSMA/CA) protocol of IEEE 802.11, but with an extension to voice traic. he SWAP system can operate either as an ad hoc network or as an infrastructure network under the control of a connection point. In an ad hoc network, all stations are peers and control is distributed between the stations and supports only data. In an infrastructure network, a connection point is required so as to coordinate the system and it provides the gateway to the public switched telephone network (PSTN). Walls and loors do not cause any problem in its functionality and some security is also provided through the use of unique network IDs. It is robust and reliable, and it minimizes the impact of radio interference. Features of HomeRF are as follows: • • • • • • • • • • Operates in the 2.45 GHz range of the unlicensed ISM band Range: up to 150 feet Employs frequency hopping at 50 hops per second Supports both a time division multiple access (TDMA) service to provide delivery of interactive voice and CSMA/CA service for delivery of high-speed data packets Capable of supporting up to 127 nodes Transmission power: 100 mW Data rate: 1 Mbps using 2 frequency-shift keying (FSK) modulation and 2 Mbps using 4 FSK modulation Voice connections: up to six full duplex conversations Data security: blowish encryption algorithm (over 1 trillion codes) Data compression: Lempel-Ziv Ross Williams 3 (LZRW3)-A algorithm 6 A D H O C M O BIL E WIREL E S S NE T W O RKS 1.1.3.1 Comparison of Bluetooth with Shared Wireless Access Protocol (SWAP) Currently, SWAP has a larger installed base compared to Bluetooth, but it is believed that Bluetooth is eventually going to prevail. Bluetooth is a technology to connect devices without cables. he intended use is to provide short-range connections between mobile devices and to the Internet via bridging devices to diferent networks (wired and wireless) that provide Internet capability. HomeRF SWAP is a wireless technology optimized for the home environment. Its primary use is to provide data networking and dial tones between devices such as PCs, cordless phones, Web tablets, and a broadband cable or digital subscriber line (DSL) modem. Both technologies share the same frequency spectrum but do not interfere with each other when operating in the same space. As far as comparison with IrDA is concerned, SWAP is closer to Bluetooth in its scope and domain, so the comparison between Bluetooth and IrDA holds good to a large extent between these two also. Comparisons of these technologies are given in Table 1.1. Wireless networks use inite resources, and a given geographical area with many wireless networks will degrade in performance as more users come on. For example, a building with 20 competing networks can cause interference and slow performance for all users. Wireless networks are lexible and can be deployed quickly using inexpensive radio equipment and antennas. he lexibility of being able to deploy a network rapidly means that many networks operating in the same area can “peer” or aggregate themselves into a larger network with more capacity to be used by users. Table 1.1 Comparison of Various Wireless Technologies PEAK DATA RATE RANGE RELATIVE COST VOICE NETWORK SUPPORT IEEE 802.11 2 Mbps 50 m Medium Via Internet protocol (IP) IrDA 16 Mbps <2 m Low Via IP Bluetooth 1 Mbps <10 m Medium HomeRF 1.6 Mbps 50 m Medium Via IP and cellular Via IP and PSTN DATA NETWORK SUPPORT Transmission control protocol (TCP)/IP Via point-to-point protocol (PPP) Via PPP TCP/IP IN T R O D U C TI O N 7 Wireless networks act in a similar manner to people discussing something in a public area. he discussion can be “heard” by others in the area with appropriate equipment. Security issues are thus pushed to the users, forcing the use of encryption and “safe computing” practices that are generally avoided by the public at large today. Wireless network speeds do not (yet) fare well against the gigabit speeds achieved by wired networks such as gigabit Ethernet or iber. However, wireless network technology is rapidly maturing, and new, open standards are emerging that will provide speeds comparable to those of iber and other infrastructures. Wireless network technologies based on IEEE 802.11 and 802.16 standards (wireless idelity [WiFi] and worldwide interoperability for microwave access [WiMax]) are not restricted to any one vendor and can be deployed by anyone with a basic understanding of the technology. Wireless networks are ideal for connecting many people without the expenses of deploying cable and human resources. Wireless networks provide mobility and access to information based on physical proximity. A typical wireless network consists of (1) an access point and (2) client wireless radios used by each subscriber. he access is a “central hub” device that provides service to 1–100 subscribers. Multiple access points may be required in larger geographic areas or to serve large groups of users. An access point can be connected to other access points or connected directly to the network that provides the connection to the Internet in one’s community. he access point is typically placed in a central location within view of a group of subscribers and within view of other access points or with a network link to a point of presence (POP). he access point manages the low of information between subscribers and to other elements in the network. It broadcasts a network service set ID (SSID), or network name, and handles limited security functions. When a subscriber links to the community wireless network, his or her subscriber radio is conigured to use the access point’s SSID and relevant security parameters. he subscriber radio then establishes a connection to the wireless network, and a data connection is created. A computer system is connected to a wireless device using an Ethernet cable. Information sent from the computer (or other computers on the same Ethernet network) is delivered to the wireless device: 8 A D H O C M O BIL E WIREL E S S NE T W O RKS • A transmitter sends radio signals with information to an antenna. • he antenna takes the radio signals and directs them into the air and directs the radio signal toward a speciic physical location. • A receiver hears the radio signals by way of its own antenna and converts them into a format that the computer can use. Once the radio signal leaves the transmitter’s antenna, it travels through the air and is picked up by receiving antennas. As the signal travels through the air, it loses its strength, eventually losing enough power that it cannot be accurately received. Wireless networks take many forms. VHF radio, FM-AM radio, cellular phones, and CB radios are all forms of wireless technology but have very speciic purposes (usually for the purpose of communicating verbal information). When we talk about wireless networking, it is about a breed of technology that is able to communicate data. Data can be voice, or Internet, or any other kind of computer information. his kind of wireless technology can be used to supplement or even replace existing wireless systems. here are many wireless technologies suitable for data networking. When the concept of using radio signals to connect various computers in a building was introduced, the IEEE formed a committee to set the standards for the technology. hat committee was called the 802.11 committee, and the various standards they developed are known as 802.11a, 802.11b, 802.11g, and so forth. his group of 802.11 standards became known as WiFi technology. Because WiFi technology quickly became popular, the cost of WiFi equipment has decreased rapidly. Many organizations and wireless Internet service providers (ISPs) have started with WiFi. 1.1.4 IEE 802.11 (WiFi) WiFi is a common wireless technology used by home owners, small businesses, and starting ISPs. WiFi devices are available “of the shelf ” from computer stores, and enhanced WiFi devices are designed for ISP use. Advantages of WiFi are as follows: • Ubiquitous and vendor neutral; any WiFi device will work with another regardless of the manufacturer IN T R O D U C TI O N 9 • Afordable cost • Hackable; many “hacks” exist to extend the range and performance of a WiFi network Disadvantages are as follows: • It is designed for LANs, not wide area networking (WAN). • It uses the CSMA mechanism. Only one wireless station can “talk” at a time, meaning one user can potentially hog all of the network’s resources. Applications such as video conferencing, voice over Internet protocol (VOIP), and multimedia can take down a network. 1.1.5 IEE 802.16 (WiMAX) WiMax is a superset of WiFi designed speciically for last-mile distribution and mobility. WiMax promises high speed (30+ Mbps). WiMax is a relatively new standard, so WiMax products are expensive. An advantage of WiMax is as follows: • Speciically designed for wide area networking Disadvantages of WiMax are the following: • New technology that has not passed the test of time (yet) • More expensive than WiFi 1.1.6 Hotspots Hotspots are wireless networks often run by businesses and individuals. hey are called “hotspots” because they provide a small coverage area for people to connect to community networks and the Internet; popular locations for hotspots include communal areas such as restaurants and cafes. Hotspots are also powerful tools for supporting tourism. Visitors to a hotspot can be presented with information about the local community, including upcoming events and even presentations of local artwork and artisan works. he BC Wireless Network Society of British Columbia, Canada, provides a service for a community wireless hotspot network. 10 A D H O C M O BIL E WIREL E S S NE T W O RKS Computers (and other devices) connect to hotspots using a Wi-Fi network adapter. Newer laptops contain built-in adapters, but most other computers do not. Wi-Fi network adapters can be purchased and installed separately. Depending on the type of computer and personal preferences, USB, PC card, express card, or even PCI card adapters can be used. Public Wi-Fi hotspots normally require a paid subscription. he sign-up process involves providing information regarding a credit card online or by phone and then choosing a service plan. Some service providers ofer plans that are working at thousands of hotspots throughout the country. Little technical information is also required to access Wi-Fi hotspots. he network name (SSID) distinguishes hotspot networks from each other. Encryption keys scramble the network traic to and from a hotspot. Most businesses require these. Service providers supply this proile information for their hotspots. 1.1.6.1 Requirements to Use Wi-Fi Hotspots Computers can automatically scan for hotspots within range of their wireless signal. hese scans identify the network name (SSID) of the hotspot, allowing the computer to initiate a connection. Instead of using a computer to ind hotspots, some people uses a separate gadget called a Wi-Fi inder. hese small devices scan for hotspot signals similarly to computers, and many provide some indication of signal strength to help pinpoint their exact location. Before traveling to a faraway place, the location of Wi-Fi hotspots can be found using online wireless hotspot inder services. 1.1.6.2 Finding Wi-Fi Hotspots he process for connecting to a Wi-Fi hotspot works similarly on home, business, and public wireless networks. With the proile (network name and encryption settings) applied on the wireless network adapter, initiation of connection is needed from the client’s computer operating system (or software that was supplied with the network adapter). Paid or restricted hotspot services will require the user to log in with a user name and password at the irst time of accessing the Internet. 1.1.6.3 Connection to Wi-Fi Hotspots IN T R O D U C TI O N 11 Although few incidents of hotspot security issues are reported, many people remain doubtful of their safety. Some caution is justiied as a hacker with good technical skills can break into the computer through a hotspot and potentially access personal data. Taking a few basic precautions will ensure reasonable safety when using Wi-Fi hotspots: 1.1.6.4 Dangers of Wi-Fi Hotspots 1. Research the public hotspot service providers and choose only reputable ones who use strong security settings on their networks. 2. Ensure that you do not accidentally connect to nonpreferred hotspots by checking your computer’s settings. 3. Finally, be aware of your surroundings and watch for suspicious individuals in the vicinity who may be reading your screen or even plotting to steal your computer. Wi-Fi hotspots are now the common form of Internet access. Connecting to a hotspot requires a wireless network adapter, knowledge of the proile information of that hotspot, and sometimes a subscription to a paid service. Computers and Wi-Fi inder gadgets are capable of scanning the nearby area for Wi-Fi hotspots and several online services allow one to ind faraway hotspot locations. Whether a home, business, or public hotspot is used, the connection process remains essentially the same. Likewise, as with any wireless network, security issues for Wi-Fi hotspots need to be managed. A homeowner or renter likely has several options for how to connect to the Internet. he connection method afects how a home network must be set up to support Internet connection sharing. 1.1.7 Mesh Networking Mesh networking is the holy grail of wireless networking. “Mesh” refers to many types of technology that enable wireless systems to ind each other automatically and self-conigure themselves to route information among themselves. Mesh is as organic as networks can get, but it is very immature. Several implementations exist (but are not compatible with each other). Mesh networking should be treated as experimental, but community wireless networks make provisions for using mesh technology either during early deployment (where it may turn out to be stable for 12 A D H O C M O BIL E WIREL E S S NE T W O RKS the needs of the community) or on an experimental basis. Most mesh products work under the Linux operating system and can use Prism 2.0 and 2.5 devices, or Atheros-based radios. Some popular mesh protocols are as follows: • AODV is an older protocol used by commercial and open source products such as LocustWorld. AODV appears to have many laws and is not necessarily recommended. • RoofNet is an experimental protocol from MIT that is being tested by community wireless networks throughout the world and appears to be very promising. he wireless radio spectrum is a inite resource. Many people can use the radio spectrum, but as more people use wireless networking, interference will increase. In some cases, you may even ind your competitors actively working to interfere with you. It is important to adopt a policy early on in network deployment to work with the community to resolve interference issues. Network operators should inform each other when setting up a new wireless system. In fact, if licensed wireless devices are used, it is necessary to coordinate with other wireless users. Although coordination is not required when using license-exempt wireless devices, it is a best practice to follow. 1.1.7.1 Limitation of Wireless Technology 1.2 Wireless Internet Wireless Internet has become possible through the evolution of portable computers and wireless connections over a mobile telephone network. However, the realization of a mobile computing environment requires a communication architecture that not only is compatible with the current architectures but also takes into account the speciic features of mobility and wirelessness. In the last few years, we have seen an increase in the use of Internet systems as well as an increase in mobile communications. Now, many services of high utility to the end users are based on the Internet technology. If a convergence of the mobile and Internet technologies can be achieved, it would be powerful in realizing vast economies of scale 13 IN T R O D U C TI O N as well as highly lexible service platforms. But, to manage a reliable wireless Internet, three kinds of constraints have to be studied: • he wireless operating environment • he existing Internet architecture • he limitation of the end devices Wireless networks are very interesting for • • • • Mobility Reduced installation time Increased reliability Long-term cost savings he Internet is a cooperatively run collection of computer networks that span the globe. It is also a vast collection of resources: people, information, and multimedia. he word Internet describes a number of agreements, arrangements, and connections. In fact, it is a network of networks—more precisely, a network of LANs. Each individual network has its own domain and has speciic resources and capabilities. Figure 1.1 shows a simple Internet connection. he Internet ofers a variety of services such as e-mail, keyboard-tokeyboard chatting, real-time voice and video communication, and transfer, storage, and retrieval of iles. he Internet uses a system of packet Office Office Office Phone Switch ISP ISP Figure 1.1 Internet connection. ISP 14 A D H O C M O BIL E WIREL E S S NE T W O RKS switching for data transfer and was designed to be highly robust. In case one section of the network became inoperable, packets could simply be sent over another route and reach their destination. An important part of the IP protocol is the IP addressing standards, which deine mechanisms to provide a unique address for each computer on the Internet. Users connect to an ISP via modems or integrated service digital networks (ISDNs) and the ISP routes the TCP/IP packets to and from the Internet. he characteristics of wireless networks showed us that to manage reliable wireless Internet, we deinitely have to consider the following subjects: • • • • • • • Speed of wireless link Scalability Mobility Limited battery power Disconnection (voluntary or involuntary) Replication caching Handover 1.2.1 IP Limitations he IP protocol has limitations due to the following characteristics: • To send a packet on the Internet, a computer must have an IP address. • his IP address is associated with the computer’s physical location. • TCP/IP protocol routes packets to their destination according to the IP address. his leads to a big limitation. Indeed, within TCP/IP, if the mobile user moves without changing its IP address, the routing is lost; changing its IP address results in lost connections. In both cases, packets are lost. his leads to an unreliable network. Regarding the speciic features of mobility and wirelessness, wireless Internet must do the following: • It should give mobile users the full Internet experience—not just a limited menu of specialized Web services or only e-mail. 15 IN T R O D U C TI O N • Voice telephony should migrate to the wireless Internet in due time. • It should be reasonably fast—at least 100,000 bps throughput per user (about what has proved commercially successful over dial-up lines), with a growth path to millions of bits per second. • It should work indoors and out, to both stationary and mobile users. (While drivers of vehicles should not be suring the web, they may listen to Internet radio stations.) • It should use power eiciently, since most devices will run on batteries or fuel cells for at least a few hours on a single charge. • It should scale up to support millions of active devices, or more, within a single metropolitan region. 1.2.2 Mobile Internet Protocol (IP) Mobile IP is an emerging set of protocols created by the Internet Engineering Task Force (IETF). Basically, it is a modiication to IP that allows nodes to continue to receive packets independently of their connection point to the Internet. Figure 1.2 shows a mobile node communicating with other nodes after changing its link-layer point of attachment to the Internet; it does not change its IP address. IP Host Mobile Node Tunnel Home Agent Figure 1.2 Datagram routing using mobile IP. Foreign Agent 16 A D H O C M O BIL E WIREL E S S NE T W O RKS However, mobile IP is not suitable for fast mobility and smooth handover between cells, and a few requirements are to be considered for its design. he messages used to transmit information about the location of a mobile node to another node must be authenticated to protect against remote redirection attacks. For making the processes more secure and more eicient, enhancements to the mobile IP technique, such as mobile IPv6 and hierarchical mobile IPv6 (HMIPv6) deined in RFC 5380, are being developed to improve mobile communications. Researchers create support for mobile networking without requiring any predeployed infrastructure as is currently required by mobile IP. One such example is the interactive protocol for mobile networking (IPMN), which promises supporting mobility on a regular IP network just from the network edges by intelligent signaling between IP at endpoints and an application layer module with improved quality of service. Researchers are also working to create support for mobile networking between entire subnets with support from mobile IPv6. One such example is the network mobility (NEMO) basic support protocol by the IETF Network Mobility Working Group, which supports mobility for entire mobile networks that move and attach to diferent points in the Internet. he protocol is an extension of mobile IPv6 and allows session continuity for every node in the mobile network as the network moves. Changes in IPv6 for mobile IPv6 include the following: • • • • A set of mobility options to include in mobility messages A new home address option for the destination options header A new type 2 routing header New Internet control message protocol for IPv6 (ICMPv6) messages to discover the set of home agents and to obtain the preix of the home link • Changes to router discovery messages and options and additional neighbor discovery options 1.2.2.1 Working of Mobile IP IP routes packets from a source endpoint to a destination by allowing routers to forward packets from incoming network interfaces to outbound interfaces according to information IN T R O D U C TI O N 17 available in the routing tables. he routing tables typically maintain the next-hop information for each destination IP address according to the number of networks to which that IP address is connected. he network number is derived from the IP address by masking of some of the low-order bits. hus, the IP address typically carries with it information that speciies the IP node’s point of attachment. To maintain existing transport-layer connections as the mobile node moves from place to place, it must keep its IP address the same. In TCP, connections are indexed by a quadruplet that contains the IP addresses and port numbers of both connection endpoints. Changing any of these four numbers will cause the connection to be disrupted and lost. On the other hand, correct delivery of packets to the mobile node’s current point of attachment depends on the network number contained within the mobile node’s IP address, which changes at new points of attachment. To change the routing requires a new IP address associated with the new point of attachment. Mobile IP has been designed to solve this problem by allowing the mobile node to use two IP addresses. In mobile IP, the home address is static and is used, for instance, to identify TCP connections. he care-of address changes at each new point of attachment and can be thought of as the mobile node’s topologically signiicant address; it indicates the network number and thus identiies the mobile node’s point of attachment with respect to the network topology. he home address makes it appear that the mobile node is continually able to receive data on its home network; the mobile IP requires the existence of a network node known as the home agent. Whenever the mobile node is not attached to its home network (and is therefore attached to what is termed a foreign network), the home agent gets all the packets destined for the mobile node and arranges to deliver them to the mobile node’s current point of attachment (see Figure 1.3). Whenever the mobile node moves, it registers its new care-of address with its home agent. To get a packet to a mobile node from its home network, the home agent delivers the packet from the home network to the care-of address. he further delivery requires that the packet be modiied so that the care-of address appears as the destination IP address. his modiication can be understood as a packet transformation or, more speciically, a redirection. When the packet arrives at the care-of address, the reverse transformation is applied so 18 A D H O C M O BIL E WIREL E S S NE T W O RKS Foreign Agent Home Agent Internet Figure 1.3 Mobile IP agents. that the packet once again appears to have the mobile node’s home address as the destination IP address. When the packet arrives at the mobile node, addressed to the home address, it will be processed properly by TCP or whatever higher level protocol logically receives it from the mobile node’s IP (that is, layer 3) processing layer. In mobile IP the home agent redirects packets from the home network to the care-of address by constructing a new IP header that contains the mobile node’s care-of address as the destination IP address. his new header then shields or encapsulates the original packet, causing the mobile node’s home address to have no efect on the encapsulated packet’s routing until it arrives at the care-of address. Such encapsulation is also called tunneling, which suggests that the packet burrows through the Internet, bypassing the usual efects of IP routing. A mobile node should minimize the number of administrative messages. Mobile IP must place no additional constraints on the assignment of IP addresses. he mobile IP protocol can be described with the following steps: Step 1: agent discovery Step 2: registration home agent Step 3: tunneling A mobile node operating away from home registers its new care-of address with its home agent through the exchange of a registration request and registration reply messages. he home agent tunnels the IN T R O D U C TI O N 19 information packets to the care-of address when the mobile node is away. Packets sent to the mobile node’s home address are intercepted by its home agent, which tunnels them to the appropriate care-of address. here, the packets are delivered to the mobile node. In the reverse direction, packets sent by the mobile node may be delivered to their destination using a standard IP routing scheme, without necessarily passing through the home agent. Mobile IP enables mobile computers to move about the Internet but remain addressable via their home network. Each mobile computer has an IP address (a home address) on its home network. Datagrams arriving for the mobile computer at its home network are subsequently repackaged for delivery to the mobile computer at its care-of address. he mobile computer informs its home agent about its current care-of address, using mobile IP registration protocols. When the home agent receives the mobile computer’s care-of address, it binds that address with the mobile computer’s home address, forming a binding that has an associated lifetime of validity. his process is called registration, and it is transacted between the mobile computer and the home agent each time the mobile computer changes its point of attachment and receives a new care-of address. Often, the care-of address is advertised by an entity known as a foreign agent, which is located near the mobile computer and relays the registration messages back and forth between the mobile node and the home agent. Other times, the mobile computer itself acquires a care-of address by other means (notably, via the dynamic host coniguration protocol [DHCP]) and assigns that care-of address to one of its own interfaces. his coniguration is known as “colocated careof address.” A mobile computer can easily switch between the two modes of operation depending upon the way in which care-of addresses are provided at its various points of attachment. Figure 1.4 shows a thumbnail sketch of a typical coniguration, where the foreign agent has advertised the care-of address used by the mobile computer; the foreign agent and home agent are presumably and typically located on diferent subnets that have no a priori relationship to each other. If the mobile computer had attached via DHCP, there would be no foreign agent, but there would still be (typically) no relationship between the home network and the new point of attachment of the mobile computer. 20 A D H O C M O BIL E WIREL E S S NE T W O RKS Foreign Agent Mobile Host rvice Request for Se For Sta eign A tus g to M ent R obi elays le H ost Foreign Agent Advertises Service Fore Foreign Agent Foreign Agent ign A g Requ ent Relay s Hom est to e Ag ent Home Agent ent s Ag enie e D m Ho ts or p e c Ac Figure 1.4 Registration operations in mobile IP. When a home agent has a valid binding for the mobile node and a datagram for the mobile computer arrives at the home network, the home agent receives the datagram, acting as a proxy agent for the mobile computer on the home network. he home agent subsequently tunnels (by encapsulation) the datagram to the mobile computer’s care-of address. he tunnel is the path between the home agent and the care-of address, and the care-of address is also known as the tunnel endpoint. After the datagram arrives at the tunnel endpoint, it is decapsulated and inal delivery is made to the mobile computer. When the mobile node has a colocated care-of address, the inal delivery is accomplished trivially. Because traic to the mobile node is controlled by correct operation of the mobile IP registration protocol, it is of essential importance that no corruption or intentional modiications of registration message data go undetected. If a malicious agent were able to register its own IP address as a false care-of address for the mobile node, the home agent would then route all the datagrams for the mobile node to the malicious agent instead. Clearly, the home agent must be able to ascertain that registration messages were issued authentically by the mobile node itself. his is accomplished by aixing a 128bit digital signature, computed by using message-digest algorithm 5 (MD5) as a one-way hash function to the registration messages, and IN T R O D U C TI O N 21 including protection against replay attacks in which a malicious node could record valid registrations for later replay, efectively disrupting the ability of the home agent to tunnel to the current care-of address of the mobile node at that later time. 1.2.3 Discovering the Care-of Address he mobile IP discovery process has been built on top of an existing standard protocol: router advertisement. Mobile IP discovery does not modify the original ields of existing router advertisements but simply extends them to associate mobility functions. hus, a router advertisement can carry information about default routers, just as before, and in addition carry further information about one or more care-of addresses. When the router advertisements are extended to contain the needed care-of address also, they are known as agent advertisements. Home agents and foreign agents typically broadcast agent advertisements at regular intervals (for example, once a second or once every few seconds). If a mobile node needs to get a care-of address and does not wish to wait for the periodic advertisement, the mobile node can broadcast or multicast a solicitation that will be answered by any foreign agent or home agent that receives it. Home agents use agent advertisements to make themselves known, even if they do not ofer any care-of addresses. However, it is not possible to associate preferences to the various care-of addresses in the router advertisement, as is the case with default routers. he IETF working group was concerned that dynamic preference values might destabilize the operation of mobile IP. Because no one could defend static preference assignments except for backup mobility agents, which do not help distribute the routing load, the group eventually decided not to use the preference assignments with the care-of address list. hus, an agent advertisement performs the following functions: • Allows for the detection of mobility agents • Lists one or more available care-of addresses • Informs the mobile node about special features provided by foreign agents—for example, alternative encapsulation techniques 22 A D H O C M O BIL E WIREL E S S NE T W O RKS • Lets mobile nodes determine the network number and status of their link to the Internet • Lets the mobile node know whether the agent is a home agent, a foreign agent, or both and therefore whether it is on its home network or a foreign network Mobile nodes use router solicitations to detect any change in the set of mobility agents available at the current point of attachment. (In mobile IP, this is then termed agent solicitation.) If advertisements are no longer detectable from a foreign agent that previously had ofered a care-of address to the mobile node, the mobile node should presume that the foreign agent is no longer within range of the mobile node’s network interface. In this situation, the mobile node should begin to hunt for a new care-of address, or possibly use a careof address known from advertisements that it is still receiving. he mobile node may choose to wait for another advertisement if it has not received any recently advertised care-of addresses, or it may send an agent solicitation. 1.2.4 Registering the Care-of Address Once a mobile node has a care-of address, its home agent must ind out about it. Figure 1.4 shows the registration process deined by mobile IP for this purpose. he process begins when the mobile node, possibly with the assistance of a foreign agent, sends a registration request with the care-of address information. When the home agent receives this request, it (typically) adds the necessary information to its routing table, approves the request, and sends a registration reply back to the mobile node. Although the home agent is not required by the mobile IP protocol to handle registration requests by updating entries in its routing table, doing so ofers a natural implementation strategy. 1.2.5 Authentication Registration requests contain parameters and lags that characterize the tunnel through which the home agent will deliver packets to the care-of address. Tunnels can be constructed in various ways. When a home agent accepts the request, it begins to associate the home IN T R O D U C TI O N 23 address of the mobile node with the care-of address, and maintains this association until the registration lifetime expires. he triplet that contains the home address, care-of address, and registration lifetime is called a “binding” for the mobile node. A registration request can be considered a “binding update” sent by the mobile node. To secure the registration request, each request must contain unique data so that two diferent registrations will, in practical terms, never have the same MD5 hash. Otherwise, the protocol would be susceptible to replay attacks, in which a malicious node could record valid registrations for later replay, efectively disrupting the ability of the home agent to tunnel to the current care-of address of the mobile node at that later time. To ensure that this does not happen, mobile IP includes within the registration message a special identiication ield that changes with every new registration. he exact semantics of the identiication ield depend on several details, which are described at greater length in the protocol speciication. Briely, there are two main ways to make the identiication ield unique. One is to use a time stamp; then, each new registration will have a later time stamp and thus difer from previous registrations. he other is to cause the identiication to be a pseudorandom number; with enough bits of randomness, it is highly unlikely that two independently chosen values for the identiication ield will be the same. When randomness is used, mobile IP deines a method that protects both the registration request and reply from replay, and calls for 32 bits of randomness in the identiication ield. If the mobile node and the home agent get too far out of synchronization for the use of time stamps, or if they lose track of the expected random numbers, the home agent will reject the registration request and include information to allow resynchronization within the reply. Using random numbers instead of time stamps avoids problems stemming from attacks on the network time protocol (NTP) that might cause the mobile node to lose time synchronization with the home agent or to issue authenticated registration requests for some future time that could be used by a malicious node to subvert a future registration. he identiication ield is also used by the foreign agent to match pending registration requests to registration replies when they arrive at the home agent and to be able subsequently to relay the reply to the mobile node. 24 A D H O C M O BIL E WIREL E S S NE T W O RKS he foreign agent also stores other information for pending registrations, including the mobile node’s home address, the mobile node’s media access control (MAC) layer address, the source port number for the registration request from the mobile node, the registration lifetime proposed by the mobile node, and the home agent’s address. he foreign agent can limit registration lifetimes to a conigurable value that it puts into its agent advertisements. he home agent can reduce the registration lifetime, which it includes as part of the registration reply, but it can never increase it. 1.2.6 Automatic Home Agent Discovery When the mobile node cannot contact its home agent, Mobile IP has a mechanism that lets the mobile node try to register with another unknown home agent on its home network. his method of automatic home agent discovery works by using a broadcast IP address instead of the home agent’s IP address as the target for the registration request. When the broadcast packet gets to the home network, other home agents on the network will send a rejection to the mobile node; however, their rejection notice will contain their address for the mobile node to use in a freshly attempted registration message. he broadcast is not an Internet-wide broadcast, but rather a directed broadcast that reaches only IP nodes on the home network. 1.2.7 Tunneling to the Care-of Address Figure 1.5 shows the tunneling operations in mobile IP. he default encapsulation mechanism that must be supported by all mobility agents using mobile IP is IP-within-IP. Using IP-within-IP, the home agent, the tunnel source, inserts a new IP header, or tunnel header, in front of the IP header of any datagram addressed to the mobile node’s home address. he new tunnel header uses the mobile node’s care-of address as the destination IP address, or tunnel destination. he tunnel source IP address is the home agent, and the tunnel header uses 4 as the higher level protocol number, indicating that the next protocol header is again an IP header. In IP-within-IP, the entire original IP header is preserved as the irst part of the payload of the tunnel header. herefore, to recover the original packet, the foreign 25 IN T R O D U C TI O N Src Dest Proto X MH ? Payload Foreign Agent Encapsulated Diagram Src Dest HA COM Proto 4 or 55 Src Dest Proto X MH ? Payload Home Agent Src X Dest Proto MH ? Payload Mobile Node Figure 1.5 Tunneling operations in mobile IP. agent merely has to eliminate the tunnel header and deliver the rest to the mobile node. Figure 1.5 shows that sometimes the tunnel header uses protocol number 55 as the inner header. his happens when the home agent uses minimal encapsulation 11 instead of IP-within-IP. Processing for the minimal encapsulation header is slightly more complicated than that for IP-within-IP because some of the information from the tunnel header is combined with the information in the inner minimal encapsulation header to reconstitute the original IP header. On the other hand, header overhead is reduced. 1.2.8 Issues in Mobile IP he most pressing outstanding problem facing mobile IP is that of security, but other technical as well as practical obstacles to deployment exist. he base mobile IP speciication has the efect of introducing a tunnel into the routing path followed by 1.2.8.1 Routing Ineiciencies 26 A D H O C M O BIL E WIREL E S S NE T W O RKS packets sent by the correspondent node to the mobile node. Packets from the mobile node, on the other hand, can go directly to the correspondent node with no tunneling required. his asymmetry is captured by the term triangle routing, where a single leg of the triangle goes from the mobile node to the correspondent node, and the home agent forms the third vertex controlling the path taken by data from the correspondent node to the mobile node. 1.2.8.2 Security Issues A great deal of attention is being focused on making mobile IP coexist with the security features coming into use within the Internet. Firewalls, in particular, cause diiculty for mobile IP because they block all classes of incoming packets that do not meet speciied criteria. Enterprise irewalls are typically conigured to block packets from entering via the Internet that appear to emanate from internal computers. Although this permits management of internal Internet nodes without great attention to security, it presents diiculties for mobile nodes wishing to communicate with other nodes within their home enterprise networks. Such communications, originating from the mobile node, carry the mobile node’s home address and would thus be blocked by the irewall. Mobile IP can be viewed as a protocol for establishing secure tunnels. Complications are also presented by ingress iltering operations. Many border routers discard packets coming from within the enterprise if the packets do not contain a source IP address conigured for one of the enterprise’s internal networks. Because mobile nodes would otherwise use their home address as the source IP address of the packets they transmit, this presents diiculty. Solutions to this problem in mobile IPv4 typically involve tunneling outgoing packets from the care-of address, but then the diiculty is how to ind a suitable target for the tunneled packet from the mobile node. he only universally agreed on possibility is the home agent, but that target introduces yet another serious routing anomaly for communications between the mobile node and the rest of the Internet. 1.2.8.3 Ingress Filtering he design of mobile IP is founded on the premise that connections based on TCP should survive cell changes. However, opinion is not unanimous on the need 1.2.8.4 User Perceptions of Reliability IN T R O D U C TI O N 27 for this feature. Many people believe that computer communications to laptop computers are suiciently bursty that there is no need to increase the reliability of the connections supporting the communications. he analogy is made to fetching web pages by selecting the appropriate URLs (uniform resource locators). If a transfer fails, people are used to trying again. his is tantamount to making the user responsible for the retransmission protocol and depends for its acceptability on a widespread perception that computers and the Internet cannot be trusted to do things right the irst time. Mobile IP creates the perception that the mobile node is always attached to its home network. his forms the basis for the reachability of the mobile node at an IP address that can be conventionally associated with its fully qualiied domain name (FQDN). If the FQDN is associated with one or more other IP addresses, perhaps dynamically, then those alternative IP addresses may deserve equal standing with the mobile node’s home address. Moreover, it is possible that such an alternative IP address would ofer a shorter routing path if, for instance, the address were apparently located on a physical link nearer to the mobile node’s care-of address, or if the alternative address were the care-of address itself. Finally, many communications are short-lived and depend on neither the actual identity of the mobile node nor its FQDN. hus, they do not take advantage of the simplicity aforded by use of the mobile node’s home address. hese issues surrounding the mobile node’s selection of an appropriate long-term (or not-so-long-term) address for use in establishing connections are complex and are far from being resolved. 1.2.8.5 Issues in IP Addressing 1.2.8.6 Slow Growth in the Wireless Local Area Network (WLAN) Market Mobile IP has been engineered as a solution for WLAN location management and communications, but the WLAN market has been slow to develop. It is diicult to make general statements about the reasons for this slow development, but with the recent ratiication of the IEEE 802.11 MAC protocol, WLANs may become more popular. Moreover, the bandwidth for wireless devices has been constantly improving, so radio and infrared devices on the market today ofer multiple megabyte-per-second data rates. Faster wireless 28 A D H O C M O BIL E WIREL E S S NE T W O RKS access over standardized MAC layers could be a major catalyst for growth of this market. Mobile IP may well face competition from alternative tunneling protocols such as PPTP and L2TP. hese other protocols, based on point-to-point protocol (PPP), ofer at least portability to mobile computers. If these alternative methods are made widely available, it is unclear if the use of mobile IP will be displaced or instead made more immediately desirable as people experience the convenience of mobile computing. In the future, it is also possible that mobile IP could specify use of such alternative tunneling protocols to capitalize on their deployment on platforms that do not support IP-within-IP encapsulation. 1.2.8.7 Competition from Other Protocols 1.3 What Are Ad Hoc Networks? An ad hoc network is a collection of wireless mobile nodes (or routers) dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. he routers are free to move randomly and organize themselves arbitrarily; thus, the network’s wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion, or may be connected to the Internet. Multihop, mobility, and large network size combined with device heterogeneity, bandwidth, and battery power make the design of adequate routing protocols a major challenge. Some form of routing protocol is in general necessary in such an environment, since two hosts that may wish to exchange packets might not be able to communicate directly, as shown in Figure 1.6. Mobile users will want to communicate in situations in which no ixed wired infrastructure is available. For example, a group of researcher’s en route to a conference may meet at the airport and require connecting to the wide area network, students may need to interact during a lecture, or iremen need to connect to an ambulance en route to an emergency scene. In such situations, a collection of mobile hosts with wireless network interfaces may form a temporary network without the aid of any established infrastructure or centralized administration. Since nowadays many laptops are equipped with IN T R O D U C TI O N 29 Ad hoc Network Figure 1.6 Mobile ad hoc networks. powerful CPUs, large hard-disk drives, and good sound and image capabilities, the idea of forming a network among these researchers, students, or members of a rescue team, who can easily be equipped with devices mentioned before, seems possible. Such networks received considerable attention in recent years in both commercial and military applications, due to the attractive properties of building a network on the ly and not requiring any preplanned infrastructure such as base station or central controller. A mobile ad hoc network (MANET) group has been formed within IETF. he primary focus of this working group is to develop and evolve MANET speciications and introduce them to the Internet standard track. he goal is to support mobile ad hoc networks with hundreds of routers and solve challenges in these kinds of networks. Some challenges that ad hoc networking is facing are limited wireless transmission range, hidden-terminal problems, packet losses due to transmission errors, mobility-induced route changes, and battery constraints. Mobile ad hoc networks could enhance the service area of access networks and provide wireless connectivity into areas with previously poor or no coverage (e.g., cell edges). Connectivity to wired infrastructure will be provided through multiple gateways with possibly diferent capabilities and utilization. To improve performance, the mobile host should have the ability to adapt to variation in performance and coverage and to switch gateways when this would be beneicial. To enhance the prediction of the best overall performance, a network-layer metric has better overview of the network. 30 A D H O C M O BIL E WIREL E S S NE T W O RKS Ad hoc networking brings features like easy connection to access networks, dynamic multihop network structures, and direct peer-topeer communication. he multihop property of an ad hoc network needs to be bridged by a gateway to the wired backbone. he gateway must have a network interface on both types of networks and be a part of both the global routing and the local ad hoc routing. Users could beneit from ubiquitous networks in several ways. User mobility enables users to switch between devices, migrate sessions, and still get the same personalized services. Host mobility enables the users’ devices to move around the networks and maintain connectivity and reachability. 1.3.1 Diference between Cellular and Ad Hoc Wireless Networks Table 1.2 gives the major diferences between cellular and ad hoc networks. 1.3.2 Applications of Ad Hoc Wireless Networks he ield of wireless networking emerges from the integration of personal computing, cellular technology, and the Internet. his is due to the increasing interactions between communication and computing, which is changing information access from “anytime, anywhere” to “all the time, everywhere.” At present, a large variety of networks exists, ranging from the well known infrastructure of cellular networks to noninfrastructure wireless ad hoc networks. Table 1.2 Differences between Cellular and Ad Hoc Wireless Networks CELLULAR NETWORK Infrastructure network Fixed, prelocated cell sites and base station Static backbone network topology Relatively caring environment and stable connectivity Detailed planning before base station can be installed High setup costs More setup time AD HOC WIRELESS NETWORK Infrastructure-less network No base station and rapid deployment Highly dynamic network topologies with multihop Hostile environment (noise, losses) and irregular connectivity Ad hoc network automatically forms and adapts to changes Cost effective Less setup time IN T R O D U C TI O N 31 he following are the applications of ad hoc wireless networks: • • • • • • • • • • Community network Enterprise network Home network Emergency response network Vehicle network Sensor network Education Entertainment Coverage extension Commercial and civilian environments Unlike a ixed wireless network, wireless ad hoc or on-the-ly networks are characterized by the lack of infrastructure. Nodes in a mobile ad hoc network are free to move and organize themselves in an arbitrary fashion. Each user is free to roam about while communicating with others. he path between each pair of users may have multiple links, and the radio between them can be heterogeneous. his allows an association of various links to be a part of the same network. Mobile ad hoc networks can operate in a stand-alone fashion or could possibly be connected to a larger network such as the Internet. Ad hoc networks are suited for use in situations where an infrastructure is unavailable or to deploy one is not cost efective. One of many possible uses of mobile ad hoc networks is in some business environments, where the need for collaborative computing might be more important outside the oice environment than inside, such as in a business meeting outside the oice to brief clients on a given assignment. Work has been going on to introduce the fundamental concepts of game theory and its applications in telecommunications. Game theory originates from economics and has been applied in various ields; it deals with multiperson decision making, in which each decision maker tries to maximize his utility. he cooperation of the users is necessary to the operation of ad hoc networks; therefore, game theory provides a good basis to analyze the networks. A mobile ad hoc network can also be used to provide applications for crisis management services, such as in disaster recovery, where the 32 A D H O C M O BIL E WIREL E S S NE T W O RKS entire communication infrastructure is destroyed and restoring communication quickly is crucial. By using a mobile ad hoc network, an infrastructure could be set up in hours instead of weeks, as is required in the case of wired-line communication. Another application example of a mobile ad hoc network is Bluetooth, which is designed to support a PAN by eliminating the need of wires between various devices, such as printers and personal digital assistants. he famous IEEE 802.11, or Wi-Fi protocol, also supports an ad hoc network system in the absence of a wireless access point. he idea of ad hoc networking goes back to the US Defense Advanced Research Projects Agency (DARPA) packet radio network, which was in used in the 1970s. A mobile ad hoc network is a collection of mobile devices establishing a short-lived or temporary network in the absence of a supporting structure. Mobile ad hoc networks can be used in establishing eicient, dynamic communication for rescue, emergency, and military operations. A commercial application, such as Bluetooth, is one of the recent developments utilizing the concept of ad hoc networking. Bluetooth is named after King Harald Blat (translated in English as King Harold Bluetooth), who ruled Denmark in the tenth century AD. Bluetooth was irst introduced in 1998. It uses radio waves to transmit wireless data over short distances and can support many users in any environment. Eight devices can communicate with each other in a piconet. Ten of these piconets can coexist at one time in the same coverage range of the Bluetooth radio. A Bluetooth device can act as both a client and a server. A connection must be established to exchange data between any two Bluetooth devices. To establish a connection, a device must request a connection with the other device. Bluetooth was based on the idea of advancing wireless interactions with various electronic devices. Devices like mobile phones, personal digital assistants, and laptops with the right chips could all communicate wirelessly with each other. However, it was later realized that a lot more is possible. 1.3.3 Technical and Research Challenges Mobile ad hoc networks pose several technical and research challenges that need to be addressed. Ad hoc architecture has many beneits, IN T R O D U C TI O N 33 such as self-reconiguration and adaptability to high variable mobile characteristics such as power and transmission conditions, traic distributions, and load balancing. hese beneits pose new challenges. hese mainly reside in the unpredictability to network topology due to mobility of nodes that, coupled with the local broadcast capability, causes a set of concerns in designing a communication system on top of ad hoc wireless networks. Many potential approaches have been proposed to deal with this issue: distributed MAC and dynamic routing, wireless service location protocol, wireless dynamic host coniguration protocol, distributed admission call control, and quality of service (QoS)-based routing technique. 1.3.3.1 Security Issues and Challenges Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wire line networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network topology. hese challenges clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. LAYER Application layer Transport layer Network layer Link layer Physical layer SECURITY ISSUES Detecting and preventing viruses, worms, malicious codes, and application abuses Authenticating and securing end-to-end communications through data encryption Protecting the ad hoc routing and forwarding protocols Protecting the wireless MAC protocol and providing link-layer security support Preventing signal jamming denial-of-service attacks A fundamental vulnerability of MANETs comes from their open peer-to-peer architecture. Unlike wired networks that have dedicated routers, each mobile node in an ad hoc network may function as a router and forward packets for other nodes. he wireless channel is accessible to both legitimate network users and malicious attackers. 34 A D H O C M O BIL E WIREL E S S NE T W O RKS As a result, there is no clear line of defense in MANETs from the security design perspective. he boundary that separates the inside network from the outside world becomes blurred. here is no well deined place/infrastructure where we may deploy a single security solution. Moreover, portable devices, as well as the system security information they store, are vulnerable to compromises or physical capture, especially low-end devices with weak protection. Attackers may sneak into the network through these subverted nodes, which pose the weakest link and incur a domino efect of security breaches in the system. he stringent resource constraints in MANETs constitute another nontrivial challenge to security design. he wireless channel is bandwidth constrained and shared among multiple networking entities. he computation capability of a mobile node is also constrained. For example, some low-end devices, such as PDAs, can hardly perform computation-intensive tasks like asymmetric cryptographic computation. Because mobile devices are typically powered by batteries, they may have very limited energy resources. he wireless medium and node mobility pose far more dynamics in MANETs compared to the wire-line networks. he network topology is highly dynamic as nodes frequently join or leave the network and roam in the network on their own will. he wireless channel is also subject to interferences and errors, exhibiting volatile characteristics in terms of bandwidth and delay. Despite such dynamics, mobile users may request for anytime, anywhere security services as they move from one place to another. hese characteristics of MANETs clearly make a case for building multifence security solutions that achieve both broad protection and desirable network performance. he security solution should • Spread across many individual components and rely on their collective protection power to secure the entire network; the security scheme adopted by each device has to work within its own resource limitations in terms of computation capability, memory, communication capacity, and energy supply • Span diferent layers of the protocol stack, with each layer contributing to a line of defense; no single-layer solution is possible to thwart all potential attacks IN T R O D U C TI O N 35 • hwart threats from both outsiders, who launch attacks on the wireless channel and network topology, and insiders, who sneak into the system through compromised devices and gain access to certain system knowledge • Encompass all three components of prevention, detection, and reaction that work in concert to guard the system from collapse • Be practical and afordable in a highly dynamic and resourceconstrained networking scenario 1.3.3.2 Diferent Types of Attacks on Multicast Routing Protocols 1.3.3.2.1 Rushing Attack Many demand-driven protocols such as on-demand multicast routing protocol (ODMRP), multicast ad hoc on-demand distance vector (MAODV), and adaptive demand-driven multicast routing protocol (ADMR), which use the duplicate suppression mechanism in their operations, are vulnerable to rushing attacks. When source nodes lood the network with route discovery packets to ind routes to the destinations, each intermediate node processes only the irst nonduplicate packet and discards any duplicate packets that arrive at a later time. Rushing attackers, by skipping some of the routing processes, can quickly forward these packets and be able to gain access to the forwarding group. First, a black hole attacker needs to invade into the forwarding group—for example, by implementing rushing attack—to route data packets for some destination to itself. hen, instead of doing the forwarding task, the attacker simply drops all of the data packets that it receives. his type of attack often results in a very low packet delivery ratio. 1.3.3.2.2 Black Hole Attack Upon receiving a packet, an intermediate node records its ID in the packet before forwarding the packet to the next node. However, if an attacker simply forwards the packet without recording its ID in the packet, it makes two nodes that are not within the communication range of each other believe that they are neighbors (i.e., one hop away from each other), resulting in a disrupted route. 1.3.3.2.3 Neighbor Attack 36 A D H O C M O BIL E WIREL E S S NE T W O RKS 1.3.3.2.4 Jellyish Attack Similarly to the black hole attack, a jellyish attacker irst needs to intrude into the forwarding group and then it delays data packets unnecessarily for some amount of time before forwarding them. his results in signiicantly high end-to-end delay and delay jitter and thus degrades the performance of real-time applications. he interconnection of mobile ad hoc networks to ixed IP networks is one of the topics receiving more attention within the MANET working group of the IETF as well as in many research projects funded by the European Union. Several solutions have recently been proposed, but at this time it is unclear which ones ofer the best performance compared to the others. In addition to introducing the main challenges, design options that need to be considered are discussed in detail in this text. 1.3.3.3 Interconnection of Mobile Ad Hoc Networks and the Internet 1.3.4 Issues in Ad Hoc Wireless Networks Diferent types of terminals form most of the ad hoc networks—for example, PDA-like devices, mobile phones, two-way pagers, sensors or desktop computers—with diferent capabilities in terms of maximum transmission power, energy availability, mobility patterns, and QoS requirements. Ad hoc networks are generally heterogeneous in terms of terminals and services ofered. In terms of energy and power, one has to consider not only node heterogeneity in terms of transmission power and energy availability, but also varying communication ranges, such as sleeping or active modes and the existence of energy supplies. Ad hoc networks raise new issues concerning security and privacy. Ad hoc networks inherit some of the traditional problems of wireless communication and wireless networking: • he wireless medium does not have proper boundaries outside which nodes are known to be unable to receive network frames. • he wireless channel is weak, unreliable, and unprotected from outside signals, which may cause lots of problems to the nodes in the network. • he wireless channel has time-varying and asymmetric propagation properties. IN T R O D U C TI O N 37 • Hidden-nodes and exposed-nodes problems may occur. Wireless multiple access can be categorized into random access (e.g., CSMA, CSMA with collision detection [CSMA/CD]) and controlled access (e.g., TDMA and token-based schemes). Random access will be suitable for ad hoc networks because of lack of infrastructure support. In addition, as the basis for its standards, the IEEE 802.11 WLAN committee selected the CSMA/CA scheme. he Bluetooth technology that is designed to support beyond data traic and delay sensitive applications (e.g., audio and video) adopted the TDMA scheme with an implicit token-passing scheme for the slots assignment. he use of Bluetooth and IEEE 802.11 is not optimized in multihop environments. hese technologies are used for single hop wireless personal area networks (WPANs) and WLANs, respectively. he design of MAC protocols for a multihop ad hoc environment is a hot research issue. 1.3.4.1 Medium Access Control (MAC) Protocol Research Issues Most of the main functionalities of the networking protocols need to be redesigned. Networking protocols uses one-hop transmission services provided by the enabling technologies to construct end-to-end delivery service from sender needs to locate the receiver inside the network. he purpose of the location services is to map to its current location in the network dynamically. Current solutions generally adopted to manage mobile terminals in infrastructure networks are inadequate and new approaches are to be found for mobile management. A simple solution to node location is based on looding the location query through the network. his approach is suitable only for limited size networks. Controlling the looding area can help to reine the technique. his can be achieved by gradually increasing the number of hops involved in the looding propagation until the node is located. he looding approach constitutes a reactive location service in which no location information is maintained inside the network. he location information service maintenance cost is negligible and all the complexity is associated with query operations. On the other hand, proactive location services subdivide the complexity in the two phases. Proactive services construct and maintain inside the network data 1.3.4.2 Networking Issues 38 A D H O C M O BIL E WIREL E S S NE T W O RKS structures that store the location information of each node. By exploiting the data structures, the query operations are highly simpliied. he highly dynamic nature of a mobile ad hoc network results in frequent and unpredictable changes of network topology, adding diiculty and complexity to routing among the mobile nodes. he challenges and complexities, coupled with the critical importance of routing protocol in establishing communications among mobile nodes, make routing area the most active research area with the MANET domain. Numerous routing protocols and algorithms have been proposed. heir performance under various network environments and traic conditions has been studied and compared. Several surveys and comparative analyses of MANET routing protocols have been published. he classiication of the routing protocols can be done via the type of cast property—that is, whether they use a unicast, multicast, geocast, or broadcast routing protocol. 1.3.4.3 Ad Hoc Routing and Forwarding A primary goal of unicast routing protocols is the correct and eicient route establishment and maintenance between a pair of nodes so that messages may be delivered reliably and in a timely manner. MANET characteristics make the direct use of these protocols infeasible. MANET routing protocols must operate in networks with highly dynamic topologies where routing algorithms run on resource-constrained devices. MANET routing protocols are typically subdivided into two main categories: proactive routing protocols and reactive protocols. Proactive routing protocols are derived from distance-vector and link-state protocols. hey maintain consistent and updated routing information for every pair of network nodes by proactively propagating route updates at ixed time intervals. As the routing information is usually maintained in tables, these protocols are also referred to as “table-driven protocols.” 1.3.4.4 Unicast Routing “Proactive routing protocol” is the constant maintaining of a route by each node to all other network nodes. he route creation and maintenance are performed through both periodic and event-driven messages. he various proactive 1.3.4.4.1 Proactive Routing Protocols IN T R O D U C TI O N 39 protocols are destination-sequenced distance-vector (DSDV), optimized link-state routing (OLSR), and topology dissemination based on reverse path forwarding (TBRPF). he DSDV protocol is a distance-vector protocol with extensions to make it suitable to MANET. Every node maintains a routing table with one route recorded. To avoid routing loops, a destination sequence number is used. A node increments its sequence number whenever a change occurs in its neighborhood. he OLSR protocol is an optimization for MANET of legacy linkstate protocols. he key point of the optimization is the multipoint relay (MPR). By looding a message to its MPRs, a node is guaranteed that the message, when retransmitted by the MPRs, will be received by all its two-hop neighbors. TBRPF is a link-state routing protocol that employs a diferent overhead reduction technique. Each node computes a shortest-path tree to all other nodes; however, to optimize bandwidth, only part of the tree is propagated to neighbors. he isheye state routing (FSR) protocol is also an optimization over link-state algorithms using isheye technique. FSR propagates linkstate information to other nodes in the network based on how far away the nodes are. With these protocols, to reduce overhead, the route between two nodes is discovered only when it is needed. here are diferent types of reactive routing protocols such as dynamic source routing (DSR), ad hoc on-demand distance vector (AODV), temporally ordered routing algorithm (TORA), associatively based routing (ABR), and signal stability routing (SSR). DSR is a loop-free, source-based, on-demand routing protocol where each node maintains a route cache that contains the source routes learned by the node. he route discovery process is initiated only when a source node does not already have a valid route to the destination in its route cache; entries in the route cache are continually updated as new routes are learned. Source routing is used for packet forwarding. AODV is another reactive improvement of the DSDV protocol. AODV minimizes the number of route broadcasts by creating routes on demand, as opposed to maintaining a complete list of routes as in the DSDV algorithm. Similarly to DSR, route discovery 1.3.4.4.2 Reactive Routing Protocols 40 A D H O C M O BIL E WIREL E S S NE T W O RKS is initiated on demand, and the route request is then forwarded by the source to the destination. TORA is another source-initiated, on-demand routing protocol built on the concept of link reversal of the directed acyclic graph (ACG). In addition to being loop free and bandwidth eicient, TORA has the property of being highly adaptive and quick in route repair during link adaptation and quick in route repair during link failure, while providing multiple routes for any desired source-destination pair. he ABR protocol is also a loop-free protocol built using a new routing metric termed “degree of association stability” in selecting routes, so that the route discovered can be longer lived and thus more stable and requiring fewer subsequent updates. he limitation of ABR comes mainly from a periodic used to establish the association stability metrics, which may result in additional energy consumption. he signal stability algorithm (SSA) is basically an ABR protocol with the additional property of routes selection using the signal strength of the link. 1.3.4.4.3 Hybrid Protocols In addition to proactive and reactive protocols, another class of unicast routing protocols that can be identiied is hybrid protocols. he zone-based hierarchical link-state routing protocol (ZRP) is an example of a hybrid protocol that combines both proactive and reactive approaches, thus trying to bring together the advantages of the two approaches. ZRP deines around each node a zone that contains the neighbors within a given number of hops from the node. Proactive and reactive algorithms are used by the node to route packets within and outside the zone, respectively. Multicasting is an eicient communication service for supporting multipoint applications. Two main approaches are used for multicast routing in ixed networks: groupshared tree and source-speciic tree. In the group share, a single tree is constructed for the whole group. he source-speciic approach maintains, for each source, a tree toward all its receivers. here are two types of multicast protocols: MAODV and ad hoc multicast routing protocol utilizing increasing ID numbers (AMRIS). Both are 1.3.4.4.4 Multicast Routing IN T R O D U C TI O N 41 on-demand protocols and construct a shared delivery tree to support multiple senders and receivers within a multicast session. he topology of a wireless mobile network can be very dynamic, and hence the maintenance of a connected multicast routing tree may cause large overheads. To avoid this, a diferent approach based on meshes has been proposed. Meshes are more suitable for dynamic environments because they support more connectivity than trees; thus, they support multicast trees. here are two types of mesh-based multicast routing protocols included: core-assisted mesh protocol (CAMP) and the on-demand multicast routing protocol (ODMRP). hese protocols build routing meshes to disseminate multicast packets within groups. he diference is that ODMRP uses looding to build the mesh, while CAMP uses one or more nodes to assist in building the mesh, instead of looding. During forwarding operations, location-aware routing protocols use the nodes position provided by global positioning system (GPS) or other mechanisms. Speciically, a node selects the next hop for packets forwarding by using the physical position of its one-hop neighbors and the physical position of the destination node. Location-aware routing does not require router establishment and maintenance. No routing information is stored. he use of geo-location information avoids network-wide searches, as both control and data packets are sent toward the known geographical coordinates of the destination node. hree main strategies can be identiied in location-aware routing protocols: greedy forwarding, directed looding, and hierarchical routing: 1.3.4.5 Location-Aware Routing Greedy forwarding: In this type of strategy, a node tries to forward the packet to one of its neighbors that is closer to the destination. If more than one node is closer, diferent choices are possible. If, on the other hand, no neighbor is closer, new rules are included in the greedy strategies to ind an alternative route. Direct looding: Directing looding nodes forward the packets to all neighbors that are located in the direction of the destination. Distance routing efect algorithm for mobility 42 A D H O C M O BIL E WIREL E S S NE T W O RKS (DREAM) and location aid routing (LAR) are two routing algorithms that apply this principle. Hierarchical routing: he location proxy routing protocol and the terminode routing protocol are hierarchical routing protocols in which routing is structured in two layers. Both protocols apply diferent rules to long- and short-distance routing, respectively. Location-aware routing is used for routing on long distances, while when a packet arrives close to the destination a proactive distance-vector scheme is adopted. TCP is an efective connection-oriented transport control protocol that provides the essential low control and congestion control required to ensure reliable packet delivery. Numerous enhancements and optimizations have been proposed over the past few years to improve TCP performance for infrastructure-based WLANs and cellular networking environments. Infrastructure-based wireless networks are one-hop wireless networks where a mobile device uses the wireless medium to access the ixed infrastructure. he mobile multihop ad hoc environment brings fresh challenges to the TCP protocol. he main research areas and open issues include the following: 1.3.4.6 Transmission Control Protocol (TCP) Issues • • • • Impact of mobility Node interaction MAC layer Impact of TCP congestion window size Interaction between MAC protocols he wireless ad hoc nature of the MANET brings new security challenges to the network design. Wireless networks are generally more vulnerable to information and physical security threats than ixed wired networks. Vulnerability of channels and nodes, absence of infrastructure, and dynamically changing topology make ad hoc network security a diicult task. Broadcast wireless channels allow message eavesdropping and injection. he absence of infrastructure makes the classic security solutions based on certiication authorities and online servers inapplicable. Routing the packets in a secured environment is another challenge. 1.3.4.7 Network Security IN T R O D U C TI O N 43 Securing wireless ad hoc networks is a highly challenging issue. here are certain speciic vulnerable attacks to the ad hoc context. Performing communication in free space exposes an ad hoc network and eavesdrop or inject messages. Ad hoc network attacks can be classiied into active and passive attacks. A passive attack does not inject any message, but listens to the channel. A passive attack tries to discover valuable information and does not produce any new traic in the network. In case of active attack, messages are inserted into the network; such attacks involve actions such as replication, modiication, and deletion of exchanged data. In ad hoc networks, active attacks are impersonation, denial of service (DoS) and disclosure: 1.3.4.8 Diferent Security Attacks Impersonation: In this type, nodes may join the network undetectably or send false routing information, masquerading as some other trusted node. A black hole attack falls in this category: Here, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. Denial of service: Attacks like routing table overlow and sleep deprivation fall in this category. Disclosure attack: A location disclosure attack can reveal something about the physical location of nodes or the structure of the network. Two types of security mechanism can be generally applied: preventive and detective. Preventive mechanisms are typically based on key-based cryptography. Key distribution is at the center of prevent mechanisms, since no central authority, no centralized trusted third party, and no central server are available ad hoc. Detective mechanisms have to monitor and rely on the audit trace that is limited to communication activities taking place within the radio range. In fabrication attacks, for disturbing the network operation or to consume other node resources, an intruder generates false routing messages, such as routing updates and route error messages. A number of fabrication-based attacks exist: 1.3.4.8.1 Attacks Using Fabrication 44 A D H O C M O BIL E WIREL E S S NE T W O RKS Resource consumption attack: In this attack, a malicious node deliberately tries to consume the resources (e.g., battery power, bandwidth, etc.) of other nodes in the network. he attacks could be in the form of unnecessary route request control messages, very frequent generation of beacon packets, or forwarding of stale information to nodes. Rushing attack: On-demand routing protocols that use the route discovery process are vulnerable to this type of attack. An attacker node that receives a route request packet from the source node loods the packet quickly throughout the network before other nodes, which also receive the same route request packet, can react. Nodes that receive the legitimate route request packet assume those packets to be duplicates of the packet already received through the attacker node and hence discard those packets. Any route discovered by the source node would contain the attacker node as one of the intermediate nodes. Hence, the source node would not be able to ind secure routes. Black hole attack: Here, a malicious node falsely advertises a good path (e.g., shortest path or most stable path) to the destination node during the path-inding process. he intension of the malicious nodes could be to hamper the path-inding process or to interrupt all the data packets being sent to the concerned destination node. Gray hole attack: he gray hole attack has two phases. In the irst phase, a malicious node exploits the AODV protocol to advertise itself as having a valid route to a destination node with the intention of intercepting packets, even though the route is fake. In the second phase, the node drops the intercepted packets with a certain probability. his attack is more diicult to detect than the black hole attack where the malicious node drops the received data packets with certainty. A gray hole may exhibit its malicious behavior in diferent ways. It may drop packets coming from (or destined to) certain speciic node(s) in the network while forwarding all the packets for other nodes. Another type of gray hole node may behave maliciously for some time duration by dropping packets but may switch to normal behavior later. A gray hole may also IN T R O D U C TI O N 45 exhibit a behavior that is a combination of these two, thereby making its detection even more diicult. Wormhole attack: In a wormhole attack, an attacker receives packets at one point in the network, forwards them to another point in the network, and then replays them into the network from that point. For tunneled distances longer than the normal wireless transmission range of a single hop, it is simple for the attacker to make the tunneled packet arrive with better metric than a normal multihop route. It is also possible for the attacker to forward each bit over the wormhole directly, without waiting for an entire packet to be received before beginning to tunnel the bits of the packet, in order to minimize delay introduced by the wormhole. Due to the nature of wireless transmission, the attacker can create a wormhole even for packets not addressed to itself, since it can overhear them in wireless transmission and tunnel them to the colluding attacker at the opposite end of the wormhole. If the attacker performs this tunneling honestly and reliably, no harm is done; the attacker actually provides a useful service in connecting the network more eiciently. he wormhole puts the attacker in a very powerful position relative to other nodes in the network, and the attacker could exploit this position in a variety of ways. he attack can also still be performed even if the network communication provides conidentiality and authenticity, and even if the attacker has no cryptographic keys. Furthermore, the attacker is invisible at higher layers; unlike a malicious node in a routing protocol, which can often easily be named, the presence of the wormhole and the two colluding attackers at either endpoint of the wormhole are not visible in the route. he wireless medium access protocol implements mechanisms based on cryptography to avoid unauthorized accesses and to enhance the privacy on radio links. he analysis on IEEE 802.11 and Bluetooth can be discussed in brief. Security in the IEEE 802.11 standard is provided by the wired equivalent privacy (WEP) scheme, which supports both data encryption and integrity. Key is a 40-bit secret key that is shared by all the 1.3.4.9 Security at Data-Link Layer 46 A D H O C M O BIL E WIREL E S S NE T W O RKS devices of a WLAN or is a pairwise secret key shared only by two communicating devices. Bluetooth uses cryptographic security mechanisms implemented in the data-link layer. A key management service provides each device with a set of symmetric cryptographic keys required for the initialization of a secret channel with another device, the execution of an authentication protocol, and the exchange of encrypted data on the secret channel. Malicious nodes can disrupt the correct functioning of a routing protocol by modifying routing information, fabricating false routing information, and impersonating other nodes. he secure routing protocol (SRP) is an extension that is applied to several existing reactive routing protocols. SRP is based on assumption of the existence of a security association between the sender and receiver based on a shared secret key negotiated at the connection setup. SRP ights against the attacks that disrupt the route discovery process. A node initiating a route discovery is able to identify and discard false routing information. Ariadne is a secure ad hoc routing protocol based on DSR and the timed eicient stream loss-tolerant authentication (TESLA) protocol. he authenticated routing for ad hoc network (ARAN) protocol is an on-demand, secure, malicious action carried out by third parties in the ad hoc environment. ARAN is based on certiicates received from a trusted certiicate server before joining the ad hoc network. Secure eicient ad hoc distance (SEAD) is a proactive secure routing protocol based on a routing table update message. he basic idea is to authenticate the sequence number and the metric ield of a routing table update message using one-way hash functions. Hash chains and digital signature are used by the secure ad hoc on-demand distance vector (SAODV) mechanism. 1.3.4.10 Secure Routing he ability of networks to provide QoS depends on the intrinsic characteristics of all the network components, from transmission links to MAC and network layers. Wireless links have a low and highly variable capacity, and high loss rates. Topologies are highly dynamic. Random access-based MAC protocols have no QoS support. 1.3.4.11 Quality of Service (QoS) IN T R O D U C TI O N 47 QoS on a MANET is not suicient to provide a basic routing functionality. Other aspects that should also be taken into consideration are bandwidth constraints due to a shared media; dynamic topology, since nodes are mobile and the topology may change; and power consumption due to limited batteries. For wired networks there are two approaches to obtain QoS: overprovisioning and network traic engineering. Overprovisioning consists of the network operator ofering a huge amount of resources such that the network can accommodate all the demanding applications. Network traic engineering classiies ongoing connections and treats them according to a set of established rules. Two proposals belonging to this class have been done inside the IETF: (1) integrated services (IntServ) and (2) diferentiated services (DifServ). IntServ is a reservation-oriented method where users request the QoS parameters they need. he resource reservation protocol (RSVP) has been proposed by IETF to set up resource reservations for IntServ. Opposite to IntServ, DifServ is a reservation-less method. Using DifServ, service providers ofer a set of diferentiated classes of QoS to their customers to support various types of applications. IPv4 TOS octet or the IPv6 traic class octet is used to mark a packet to receive a particular QoS class. In general, the wire-based QoS models are not appropriate for MANETs. Overprovisioning, for instance, may not be possible because resources are scarce. IntServ/RSVP may require unafordable storage and processing for MNs (mobile nodes), and signaling overhead. Difserv, on the other hand, is a lightweight overhead model that may be more suitable for MANETs. However, Difserv organization in customers and service providers does not it the distributed nature of MANETs. his has motivated numerous QoS proposals targeted to MANETs. Quality of service for a network is measured in terms of guaranteed amount of data that a network transfers from one place to another in a given real-time slot, such as audio and video. his poses a number of diferent technical challenges. he size of the ad hoc network is directly related to the quality of service of the network. If the size of the mobile ad hoc network is large, it might make the problem of network control extremely dificult. Communication between two participating nodes in mobile 48 A D H O C M O BIL E WIREL E S S NE T W O RKS ad hoc networks can be seen as a complex end-to-end channel that changes routes with time. In a mobile ad hoc network, a number of diferent routes with various levels of node capacity and power may be available for a source to transmit data to the destination. As a result, not all routes are capable of providing the same level of quality of service that can meet the requirements of mobile users. Moreover, even if the selected route between a source and the destination meets the user requirements, the network error characteristics are expected to vary with time due to the dynamic nature of mobile ad hoc networks. Mobile ad hoc networks are expected to play an important role in the deployment of future wireless communication systems. herefore, it is extremely important that these networks should be able to provide eicient quality of service that can meet the vendor requirements. To provide eicient quality of service in mobile ad hoc networks, there is a solid need to establish new architectures and services for routine network controls. Variable link conditions are intrinsic characteristics in most mobile ad hoc networks. Rerouting among mobile nodes causes network topology and traic load conditions to change dynamically. Given the nature of MANET, it is diicult to support real-time applications with appropriate QoS. In some cases it may be impossible to guarantee strict QoS requirements. But, at the same time, QoS is of great importance in MANETs since it can improve performance and allow critical information to low even under diicult conditions. Recent research activities have shown the importance of providing the QoS mechanism at multiple layers in the protocol stack. QoScapable MACs and cross-layer design are emerging as potential solutions for QoS in MANET. QoS routing can be used by MANET routing protocols to select diferent paths to a destination depending on the packet characteristics. QoS MAC protocols solve the problems of medium contention, support reliable unicast communications, and provide resource reservation for real-time traic in a distributed wireless environment. Numerous MAC protocols and improvements have been proposed that can provide QoS guarantees to real-time traic in a distributed wireless environment, including the GAMA/PR protocol and the black burst (BB) contention mechanism. IN T R O D U C TI O N 49 1.3.4.12 Simulation of Wireless Ad Hoc Networks Traditional modeling and simulation tools include NS2 (and recently NS3), OPNET modeler, and Jetsam. hese tools focus primarily on the simulation of the entire protocol stack of the system. But the need for a more advanced simulation methodology is always there. Agent-based modeling and simulation ofers this paradigm. Not to be confused with multiagent systems and intelligent agents, agent-based modeling originated from the social sciences, where the goal was to evaluate and view large-scale systems with numerous interacting “agents” or components in a wide variety of random situations to observe global phenomena. Unlike traditional AI systems with intelligent agents, agent-based modeling is similar to the real world. Agentbased models are thus efective in modeling biologically inspired and nature-inspired systems. In these systems, the basic interactions of the components in the system, also called a complex adaptive system, are simple but result in advanced global phenomena such as emergence. Problems 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13 1.14 1.15 1.16 Give the features of IrDA with suitable illustrations. Compare and contrast Bluetooth with IrDA. List the features of HomeRF. Explain a typical wireless network with a suitable illustration. Describe the advantages and disadvantages of WiFi and WiMax. Discuss the technology deployed in wireless Internet. Give the limitations of IP. Discuss the working of datagram routing using mobile IP. Explain the main issues involved in mobile IP. What are ad hoc networks? Explain. Diferentiate between cellular and ad hoc wireless networks. Give the applications of ad hoc networks. Discuss in detail the technical and research challenges in ad hoc networks. Describe the issues in ad hoc networks. Explain the security problems in ad hoc networks. Describe the features of Bluetooth. 50 1.17 1.18 1.19 1.20 1.21 1.22 1.23 1.24 1.25 1.26 1.27 A D H O C M O BIL E WIREL E S S NE T W O RKS What is Bluetooth? Why is the technology called Bluetooth? How is Bluetooth used? What is a personal area network (PAN)? Compare and contrast WiFi and WiMax. Explain the functionalities of the WiFi hotspots. How can WiFi hotspots be found? What are the dangers of WiFi hotspots? Explain the diferent types of attacks in ad hoc networks. Explain the QoS issues in ad hoc networks. Describe the diferent simulation tools used in ad hoc networks. Bibliography Barrett, C. et al. 2002. Characterizing the interaction between routing and MAC protocols in ad-hoc networks. Proceedings of MobiHoc, pp. 92–103. Broch, J. et al. 1998. A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of Mobicom, pp. 85–97. Frodigh, M. et al. 2000. Wireless ad hoc networking: he art of networking without a network. Ericsson Review, issue no. 4. Haas, Z. J. et al., eds. 1999. Special issue on wireless ad hoc networks. IEEE Journal on Selected Areas in Communications 17 (8). Larsson, T., and N. Hedman. 1998. Routing protocols in wireless ad-hoc networks—A simulation study. Master’s thesis at Lulea University of Technology, Stockholm. Ramanathan, R. 2001. Making ad hoc networks density adaptive. Proceedings of MILCOM, pp. 957–961. Ramanathan, S., and M. Steenstrup. 1996. A survey of routing techniques for mobile communications networks. Baltzer/ACM Mobile Networks and Applications 1:89–104. Ramasubramanian, V. et al. 2003. SHARP: A hybrid adaptive routing protocol for mobile ad hoc networks. Proceedings of 4th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Annapolis, MD, June 3–6. Roux, N. et al. 2000. Cost adaptive mechanism to provide network diversity for MANET reactive routing protocols. Proceedings of MILCOM. Royer, E. M., and C.-K. Toh. 1999. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications April: 46–55. 2 MAC L AYER P ROTOCOLS 2.1 Introduction he simplicity in deployment makes mobile ad hoc networks (which do not require any infrastructure) suitable for a variety of applications, such as collaborative computing, disaster recovery, and battle ield communication. With the proliferation of communications and computing devices, such as mobile phones, laptops, or PDAs, personal area networking (PAN), which is an ad hoc networking-based technology, has recently gained much interest. In ad hoc networks, transmitters use radio signals for communication. Generally, each node can only be a transmitter (TRX) or a receiver (RX), one at a time. Communication among mobile nodes is limited within a certain transmission range. And nodes share the same frequency domain to communicate. So, within such ranges, only one transmission channel is used, covering the entire bandwidth. Unlike wired networks, packet delay is caused not only by the traic load at the node, but also by the traic load at the neighboring nodes, which is called “traic interference.” Medium access control (MAC) protocols play an important role in the performance of the mobile ad hoc networks (MANETs). A MAC protocol deines how each mobile unit can share the limited wireless bandwidth resource in an eicient manner. he source and destination could be far away and each time packets need to be relayed from one node to another in multihop fashion, a medium has to be accessed. Accessing media properly requires only informing the nodes within the vicinity of transmission. MAC protocols control access to the transmission medium. heir aim is to provide an orderly and eicient use of the common spectrum. hese protocols are responsible for per-link connection establishment (i.e., acquiring the medium) and per-link connection cancellation (i.e., releasing the medium). 51 52 A D H O C M O BIL E WIREL E S S NE T W O RKS One of the fundamental challenges in MANET research is how to increase the overall network throughput while maintaining low energy consumption for packet processing and communications. he low throughput is attributed to the harsh characteristics of the radio channel combined with the contention-based nature of MAC protocols commonly used in MANETs. Regarding the MAC protocol for a wireless mobile ad hoc network, the following performance measures should be considered: • hroughput and delay: hroughput is generally measured as the percentage of successfully transmitted radio link level frames per unit time. Transmission delay is deined as the interval between the frame arrival time at the MAC layer of a transmitter and the time at which the transmitter realizes that the transmitted frame has been successfully received by the receiver. • Fairness: Generally, fairness measures how fair the channel allocation is among the lows in the diferent mobile nodes. he node mobility and the unreliability of radio channels are the two main factors that impact fairness. • Energy eiciency: Generally, energy eiciency is measured as the fraction of the useful energy consumption (for successful frame transmission) to the total energy spent. • Multimedia support: his is the ability of a MAC protocol to accommodate traic with diferent service requirements, such as throughput, delay, and frame loss rate. 2.2 Important Issues and Need for Medium Access Control (MAC) Protocols here are several important issues in ad hoc wireless networks. Most ad hoc wireless network applications use the industrial, scientiic, and medical (ISM) band, which is free of licensing formalities. Since wireless is a tightly controlled medium, it has limited channel bandwidth that is typically much less than that of wired networks. Also, the wireless medium is inherently error prone. Even though a radio may have suicient channel bandwidth, factors such as multiple access, signal fading, and noise and interference can cause the efective throughput M AC L AY ER P R O T O C O L S 53 in wireless networks to be signiicantly lower. Since wireless nodes may be mobile, the network topology can change frequently without any predictable pattern. Usually the links between nodes would be bidirectional, but there may be cases when diferences in transmission power give rise to unidirectional links, which necessitate special treatment by the MAC protocols. Ad hoc network nodes must conserve energy as they mostly rely on batteries as their power source. he security issues should be considered in the overall network design, as it is relatively easy to eavesdrop on wireless transmission. Routing protocols require information about the current topology so that a route from a source to a destination may be found. However, the existing routing schemes, such as distance vector- and link state-based protocols, lead to poor route convergence and low throughput for dynamic topology. herefore, a new set of routing schemes is needed in the ad hoc wireless context. he MAC layer, sometimes also referred to as a sublayer of the data-link layer, involves the functions and procedures necessary to transfer data between two or more nodes of the network. It is the responsibility of the MAC layer to perform error correction for anomalies occurring in the physical layer. he layer performs speciic activities for framing, physical addressing, and low and error controls. It is responsible for resolving conlicts among diferent nodes for channel access. Since the MAC layer has a direct bearing on how reliably and eiciently data can be transmitted between two nodes along the routing path in the network, it afects the quality of service (QoS) of the network. he design of a MAC protocol should also address issues caused by mobility of nodes and an unreliable time-varying channel. Design goals of the MAC protocol include the following: • he operation of the protocol should be distributed. • he protocol should provide QoS support for real-time traic. • he access delay, which refers to the average delay experienced by any packet to get transmitted, must be kept low. • he available bandwidth must be utilized eiciently. • he protocol should ensure fair allocation of bandwidth to nodes. • Control overhead must be kept as low as possible. • he protocol should minimize the efects of hidden and exposed terminal problems. 54 A D H O C M O BIL E WIREL E S S NE T W O RKS • he protocol must be scalable to large networks. • he protocol should have power control mechanisms. • he protocol should have mechanisms for adaptive data rate control. • he protocol should try to use directional antennas. • he protocol should provide synchronization among nodes. 2.2.1 Need for Special MAC Protocols he popular carrier sense multiple access (CSMA) MAC scheme and its variations, such as CSMA with collision detection (CSMA/ CD) developed for wired networks, cannot be used directly in the wireless networks, as explained later. In CSMA-based schemes, the transmitting node irst senses the medium to check whether it is idle or busy. he node defers its own transmission to prevent a collision with the existing signal if the medium is busy. Otherwise, the node begins to transmit its data while continuing to sense the medium. However, collisions occur at receiving nodes. Since signal strength in the wireless medium fades in proportion to the square of distance from the transmitter, the presence of a signal at the receiver node may not be clearly detected at other sending terminals if they are out of range. As illustrated in Figure 2.1, node B is within the range of nodes A and C, but A and C are not in each other’s range. Let us consider the case where A is transmitting to B. Node C, being out of A’s range, cannot detect a carrier and may therefore send data to B, thus causing a collision at B. his is referred to as the hidden-terminal problem, as nodes A and C are hidden from each other. Let us now consider another case where B is transmitting to A. Since C is within B’s range, it senses a carrier and decides to defer its own transmission. However, this is unnecessary because there is no way that C’s transmission can cause any collision at receiver A. his is referred to as the exposed-terminal problem, since B’s being exposed to C caused the latter to defer its transmission needlessly. MAC schemes are designed to overcome these problems. M AC L AY ER P R O T O C O L S A Transmit range of A C B Transmit range of B 55 Transmit range of C Figure 2.1 Illustration of hidden- and exposed-terminal problems. 2.3 Classification of MAC Protocols his section describes the classiication of MAC protocols and the various factors considered for classiication. Various MAC schemes developed for wireless ad hoc networks can be classiied as shown in Figure 2.2. In contention-free schemes (e.g., time division multiple access [TDMA], frequency division multiple access [FDMA], and code division multiple access [CDMA]), certain assignments are used to avoid contentions. Contention-based schemes, on the other hand, are aware of the risk of collisions of transmitted data. Since Medium Access Control Contention Free (Polling, Token Based, TDMA CDMA FDMA) Contention Based Reservation/Collision Resolution Random Access Non-Carrier Sensing (ALOHA, Slotted ALOHA) Use of Control Packet (MACA, MACAW) Carrier Sensing (CSMA) Use of Control Packets and Carrier Sensing (FAMA, CSMA/CA, IEEE802.11) Figure 2.2 Classification of MAC protocols. 56 A D H O C M O BIL E WIREL E S S NE T W O RKS contention-free MAC schemes are more applicable to static networks and/or networks with centralized control, this chapter focuses on contention-based MAC schemes. Another category depends on energy-eicient protocols at all layers of the network model. Hence, MAC protocols that are power aware are needed. Another class of MAC protocols uses directional antennas. he advantage of this method is that the signals are transmitted only in one direction. he nodes in other directions are therefore no longer prone to interference or collision efects, and spatial reuse is facilitated. Several MAC schemes have been proposed for unidirectional links. Users will demand some level of QoS from MANET, such as end-to-end delay, available bandwidth, probability of packet loss, etc. However, the lack of centralized control, limited bandwidth channels, node mobility, power or computational constraints, and the error-prone nature of the wireless medium make it very diicult to provide efective QoS in ad hoc networks. Since the MAC layer has a direct bearing on how reliably and eiciently data can be transmitted from one node to the next along the routing path in the network, it afects the QoS of the network. Several QoS-aware MAC schemes are discussed in this chapter. Another classiication is based on the number of channels used for data transmission. Single-channel protocols set up reservations for transmissions and subsequently transmit their data using the same channel or frequency. Many MAC schemes use a single channel. Multiple-channel protocols use more than one channel in order to coordinate connection sessions among the transmitter and receiver nodes. 2.3.1 Contention-Based MAC Protocols hese protocols concentrate on the collisions of transmitted data. his includes two categories: random access and dynamic reservation/collision resolution protocols. 1. With random access-based schemes, such as ALOHA, a node may access the channel as soon as it is ready. Naturally, more than one node may transmit at the same time, causing M AC L AY ER P R O T O C O L S 57 collisions. ALOHA is more suitable under low system loads with large numbers of potential senders and it ofers relatively low throughput. A variation of ALOHA, termed slotted ALOHA, introduces synchronized transmission time slots similar to TDMA. In this case, nodes can transmit only at the beginning of a time slot. he introduction of time slots doubles the throughput as compared to the pure ALOHA scheme, with the cost of necessary time synchronization. he CSMA-based schemes further reduce the possibility of packet collisions and improve the throughput. 2. Dynamic reservation/collision resolution protocols: To solve the hidden- and exposed-terminal problems in CSMA, researchers have come up with many protocols that are contention based but involve some forms of dynamic reservation/ collision resolution. Some schemes use the request-to-send/ clear-to-send (RTS/CTS) control packets to prevent collisions (e.g., multiple access collision avoidance [MACA] and MACA for wireless LANs [MACAW]). he contention-based MAC schemes can also be classiied as sender-initiated versus receiver-initiated, single-channel versus multiple-channel, power-aware, directional antenna-based, unidirectional link-based, and QoS-aware schemes, as mentioned before. One distinguishing factor for MAC protocols is whether they rely on the sender initiating the data transfer or the receiver requesting the same. As mentioned previously, the dynamic reservation approach involves the setting up of some sort of a reservation prior to data transmission. If a node that wants to send data takes the initiative of setting up this reservation, the protocol is considered to be a sender-initiated protocol. Most schemes are sender initiated. In a receiver-initiated protocol, the receiving node polls a potential transmitting node for data. If the sending node indeed has some data for the receiver, it is allowed to transmit after being polled. 2.3.2 Contention-Based MAC Protocols with Reservation Mechanisms he dynamic reservation approach involves the setting up of some sort of a reservation prior to data transmission. If a node that wants 58 A D H O C M O BIL E WIREL E S S NE T W O RKS to send data takes the initiative of setting up this reservation, the protocol is considered to be a sender-initiated protocol. Most schemes are sender initiated. In a receiver-initiated protocol, the receiving node polls a potential transmitting node for data. If the sending node indeed has some data for the receiver, it is allowed to transmit after being polled. he MACA by invitation (MACA-BI) and receiver-initiated busy tone multiple access (RI-BTMA) are examples of such schemes. he MACA protocol overcomes the hidden and exposed terminal problems. MACA uses two short signaling packets. he key idea of the MACA scheme is that any neighboring node that overhears an RTS packet has to defer its own transmissions until some time after the associated eight CTS packet would have inished, and that any node overhearing a CTS packet would defer for the length of the expected data transmission. In a hidden-terminal scenario, as explained in Section 2.2, C will not hear the RTS sent by A, but it would hear the CTS sent by B. Accordingly, C will defer its transmission during A’s data transmission. Similarly, in the exposed-terminal situation, C would hear the RTS sent by B, but not the CTS sent by A. herefore, C will consider itself free to transmit during B’s transmission. It is apparent that this RTS-CTS exchange enables nearby nodes to reduce the collisions at the receiver, not the sender. Collisions can still occur between diferent RTS packets, though. If two RTS packets collide for any reason, each sending node waits for a randomly chosen interval before trying again. his process continues until one of the RTS transmissions elicits the desired CTS from the receiver. MACA is efective because RTS and CTS packets are signiicantly shorter than the actual data packets, and therefore collisions among them are less expensive compared to collisions among the longer data packets. However, the RTS-CTS approach does not always solve the hidden terminal problem completely, and collisions can occur when different nodes send the RTS and the CTS packets. Let us consider an example with four nodes A, B, C, and D in Figure 2.3. Node A sends an RTS packet to B, and B sends a CTS packet back to A. At C, however, this CTS packet collides with an RTS packet sent by D. herefore, C has no knowledge of the subsequent data transmission from A to B. While the data packet is being transmitted, D sends 2.3.2.1 Multiple Access Collision Avoidance (MACA) 59 M AC L AY ER P R O T O C O L S A B Time 0 RT S Time 1 S CT C S RT CT S Time 2 Time 3 Collision Da ta CTS D S RT CT S Time 4 Collision Figure 2.3 Illustration of failure of RTS-CTS mechanism in solving hidden- and exposed-terminal problems. out another RTS because it did not receive a CTS packet in its irst attempt. his time, C replies to D with a CTS packet that collides with the data packet at B. In fact, when hidden terminals are present and the network traic is high, the performance of MACA degenerates to that of ALOHA. Another weakness of MACA is that it does not provide any acknowledgment of data transmissions at the data-link layer. If a transmission fails for any reason, retransmission has to be initiated by the transport layer. his can cause signiicant delays in the transmission of data. 2.3.2.1.1 Applications for MACA If MACA proves efective, it may make single-frequency amateur packet radio networks practical. Although it would still be preferable for ixed backbones to use separate, dedicated channels or point-to-point links whenever possible, the ability to create usable, ad hoc, single-frequency networks could be very useful in certain situations. hese include user access channels (such as 145.01 MHz in many areas) and in temporary portable and mobile operations where it is often infeasible to coordinate multifrequency networks in advance. his would be especially useful for emergency situations in remote areas without dedicated packet facilities. 2.3.2.1.2 Weaknesses of MACA • When hidden terminals are present and the network traffic is high, the performance of MACA degenerates to that of ALOHA. 60 A D H O C M O BIL E WIREL E S S NE T W O RKS • MACA does not provide any acknowledgment of data transmissions at the data-link layer. If a transmission fails for any reason, retransmission has to be initiated by the transport layer. his can cause signiicant delays in the transmission of data. 2.3.2.1.3 Wireless (MACAW) Multiple access with collision avoid- ance for wireless (MACAW) is a slotted MAC protocol widely used in ad hoc networks. Furthermore, it is a foundation of many other MAC protocols used in wireless sensor networks (WSNs). he IEEE 802.11 RTS/CTS mechanism is adopted from this protocol. It uses the RTS-CTS-DS-DATA-ACK frame sequence for transferring data, sometimes preceded by an RTS-RRTS frame sequence, in view to provide a solution to the hidden-terminal problem. Although protocols based on MACAW, such as S-MAC, use carrier sense in addition to the RTS/CTS mechanism, MACAW does not make use of carrier sense. Principles of operation. Assume that node A has data to transfer to node B. Node A initiates the process by sending a request to send (RTS) frame to node B. he destination node (node B) replies with a clear to send (CTS) frame. After receiving CTS, node A sends data. After successful reception, node B replies with an acknowledgment frame (ACK). If node A has to send more than one data fragment, it has to wait a random time after each successful data transfer and compete with adjacent nodes for the medium using the RTS/CTS mechanism. Any node overhearing an RTS frame (for example, node F or node E in the illustration) refrains from sending anything until CTS is received or after waiting a certain time. If the captured RTS is not followed by CTS, the maximum waiting time is the RTS propagation time and the destination node turnaround time. Any node overhearing a CTS frame refrains from sending anything for the time until the data frame and ACK should have been received (solving the hidden-terminal problem), plus a random time. Both the RTS and CTS frames contain information about the length of the DATA frame. Hence, a node uses that information to estimate the time for the data transmission completion. Before sending a long DATA frame, node A sends a short data-sending (DS) frame, which provides information about the length of the DATA frame. Every station that overhears this frame knows that the RTS/CTS exchange was M AC L AY ER P R O T O C O L S 61 successful. An overhearing station, which might have received RTS and DS but not CTS, defers its transmissions until after the ACK frame should have been received plus a random time. To sum up, a successful data transfer (A to B) consists of the following sequence of frames: 1. “Request to send” (RTS) frame from A to B 2. “Clear to send” (CTS) frame from B to A 3. “Data sending” (DS) frame from A to B 4. DATA fragment frame from A to B 5. Acknowledgment (ACK) frame from B to A MACAW is a nonpersistent slotted protocol, meaning that after the medium has been busy—for example, after a CTS message—the station waits a random time after the start of a time slot before sending an RTS. his results in fair access to the medium. If, for example, nodes A, B, and C have data fragments to send after a busy period, they will have the same chance to access the medium since they are in transmission range of each other. 2.3.2.1.4 Floor Acquisition Multiple Access (FAMA) FAMA is another MACA-based scheme that requires every transmitting station to acquire control of the loor (i.e., the wireless channel) before it actually sends any data packet. Unlike MACA or MACAW, FAMA requires that collision avoidance be performed at both the sender and receiver nodes. To “acquire the loor,” the sending node sends out an RTS using either nonpersistent packet sensing (NPS) or nonpersistent carrier sensing (NCS). he receiver responds with a CTS packet, which contains the address of the sending node. Any station overhearing this CTS packet knows about the station that has acquired the loor. he CTS packets are repeated long enough for the beneit of any hidden sender that did not register another sending node’s RTS. he authors recommend the NCS variant for ad hoc networks since it addresses the hidden-terminal problem efectively. he IEEE 802.11 speciies two modes of MAC protocol: distributed coordination function (DCF) mode (for ad hoc networks) and point coordination function (PCF) mode (for centrally coordinated infrastructure-based networks). he 2.3.2.2 IEEE 802.11 MAC Scheme 62 A D H O C M O BIL E WIREL E S S NE T W O RKS DCF in IEEE 802.11 is based on CSMA with collision avoidance (CSMA/CA), which can be seen as a combination of the CSMA and MACA schemes. he protocol uses the RTS-CTS-DATA-ACK sequence for data transmission. he protocol not only uses physical carrier sensing, but also introduces the novel concept of virtual carrier sensing. his is implemented in the form of a network allocation vector (NAV), which is maintained by every node. he NAV contains a time value that represents the duration up to which the wireless medium is expected to be busy because of transmissions by other nodes. Since every packet contains the duration information for the remainder of the message, every node overhearing a packet continuously updates its own NAV. Time slots are divided into multiple frames and there are several types of interframe spacing (IFS) slots. In increasing order of length, they are the short IFS (SIFS), point coordination function IFS (PIFS), DCF IFS (DIFS), and extended IFS (EIFS). he node waits for the medium to be free for a combination of these diferent times before it actually transmits. Diferent types of packets can require the medium to be free for a diferent number or type of IFS. For instance, in ad hoc mode, if the medium is free after a node has waited for DIFS, it can transmit a queued packet. Otherwise, if the medium is still busy, a back-of timer is initiated. he initial back-of 10 value of the timer is chosen randomly from between 0 and CW-1, where contention window (CW) is the width of the contention window in terms of time-slots. After an unsuccessful transmission attempt, another back-of is performed with a doubled size of CW as decided by a binary exponential back-of (BEB) algorithm. Each time the medium is idle after DIFS, the timer is decremented. When the timer expires, the packet is transmitted. After each successful transmission, another random back-of (known as postbackof) is performed by the transmission-completing node. A control packet such as RTS, CTS, or ACK is transmitted after the medium has been free for SIFS. In typical sender-initiated protocols, the sending node needs to switch to receive mode (to get CTS) immediately after transmitting the RTS. Each such exchange of control packets adds to turnaround time, reducing the overall throughput. MACA-BI [1] is a receiver-initiated 2.3.2.3 Multiple Access Collision Avoidance by Invitation (MACA-BI) M AC L AY ER P R O T O C O L S 63 protocol that reduces the number of such control packet exchanges. Instead of a sender waiting to gain access to the channel, MACA-BI requires a receiver to request the sender to send the data, by using a “ready-to-receive” (RTR) packet instead of the RTS and the CTS packets. herefore, it is a two-way exchange (RTR-DATA) as against the three-way exchange (RTS-CTS-DATA) of MACA. Because the transmitter cannot send any data before being asked by the receiver, there has to be a traic prediction algorithm built into the receiver so that it can know when to request data from the sender. he eiciency of this algorithm determines the communication throughput of the system. he algorithm proposed by the authors piggybacks the information regarding packet queue length and data arrival rate at the sender in the data packet. When the receiver receives these data, it is able to predict the backlog in the transmitter and send further RTR packets accordingly. here is a provision for a transmitter to send an RTS packet if its input bufer overlows. In such a case, the system reverts to MACA. he MACA-BI scheme works eiciently in networks with predictable traic patterns. However, if the traic is bursty, the performance degrades to that of MACA. 2.3.2.4 Group Allocation Multiple Access with Packet Sensing (GAMA-PS) GAMA-PS incorporates features of contention-based as well as contention-free methods. It divides the wireless channel into a series of cycles. Every cycle is divided in two parts for contention and group transmission. Although the group transmission period is further divided into individual transmission periods, GAMA-PS does not require clock or time synchronization among diferent member nodes. Nodes wishing to make a reservation for access to the channel employ the RTS-CTS exchange. However, a node will back of only if it understands an entire packet. Carrier sensing alone is not suicient reason for backing of. GAMA-PS organizes nodes into transmission groups, which consist of nodes that have been allocated a transmission period. Every node in the group is expected to listen in on the channel. herefore, there is no need for any centralized control. Every node in the group is aware of all the successful RTS-CTS exchanges and, by extension, of any idle transmission periods. Members of the transmission group take turns transmitting data, and every node is expected to 64 A D H O C M O BIL E WIREL E S S NE T W O RKS send a begin transmission period (BTP) packet before actual data. he BTP contains the state of the transmission group, position of the node within that group, and the number of group members. A member station can transmit up to a ixed length of data, thereby increasing eiciency. he last member of the transmission group broadcasts a transmit request (TR) packet after it sends its data. Use of the TR shortens the maximum length of the contention period by forcing any station that might contend for group membership to do so at the start of the contention period. GAMA-PS assumes that there are no hidden terminals. As a result, this scheme may not work well for mobile ad hoc networks. When there is not enough traic in the network, GAMA-PS behaves almost like CSMA. However, as the load grows, it starts to mimic TDMA and allows every node to transmit once in every cycle. 2.3.3 MAC Protocols Using Directional Antennas In the case of MAC protocols for ad hoc networks, omnidirectional antennas, which transmit and receive radio signals from all directions, are typically used. All other nodes in the vicinity remain silent. But the directional antennas attain higher gain and restrict the broadcast to a meticulous direction. Packet reception at a node with directional antennas is not exaggerated by intervention from other directions. Accordingly, depending on the direction of transmission, it is possible that two pairs of nodes located in each other’s vicinity be in contact simultaneously. For the other untouched directions, this leads to a better spatial reuse. But these antennas’ providing the correct direction and turning it into real time is not a trivial task. Moreover, new protocols would need to be planned to take advantage of the new features provided by directional antennas because the current protocols (e.g., IEEE 802.11) cannot beneit from these features. Currently, directional antenna hardware is considerably bulkier and more expensive than omnidirectional antennas of comparable capabilities. Applications involving large military vehicles, however, are appropriate candidates for wireless devices using such antenna systems. he use of higher frequency bands (e.g., ultra-wideband M AC L AY ER P R O T O C O L S 65 transmission) will reduce the size of directional antennas. Many schemes have been proposed with this idea: 1. With packet radio networks and directional antennas, the slotted ALOHA scheme involves multiple directional antennas. In the context of beam-forming directional antennas, channel-access models, link power control, and directional neighbor discovery are required. 2. hrough the use of special control packets, every node dynamically stores some information about its neighbors and their transmission schedules. his allows a node to guide its antenna appropriately based on the ongoing transmissions in the neighborhood. Using the directional antennas to apply a new form of link-state based routing is also proposed. 3. Using directional antennas, a directional MAC (D-MAC) scheme uses the familiar RTS-CTS-Data-ACK sequence where only the RTS packet is sent using a directional antenna. hough every node is assumed to be prepared with several directional antennas, only one of them is allowed to transmit at any given time, depending on the location of the intended receiver. Here, every node is aware of its own location as well as the locations of its direct neighbors. his scheme gives better throughput than IEEE 802.11 by allowing concurrent transmissions that are not possible in current MAC schemes. 4. In the IEEE 802.11 protocol, every node has multiple antennas. Any node that has data to send irst sends out an RTS in all directions using every antenna. he intended receiver also sends out the CTS packet in all directions using all the antennas. he original sender is now able to discriminate which antenna picked up the strongest CTS signal and understands the relative direction of the receiver. he data packet is sent using the corresponding directional antenna in the direction of the intended receiver. hus, the participating nodes need not know their location information in advance. Only one radio transceiver in a node can transmit and receive at any instant of time. his scheme can attain up to a two to three times better average throughput than CSMA/CA with the RTS/CTS scheme (using omnidirectional antennas). 66 A D H O C M O BIL E WIREL E S S NE T W O RKS 5. Another scheme is multihop RTS MAC (M-MAC) for transmission on multihop paths. As directional antennas have a higher gain and transmission range than omnidirectional antennas, a node that is far away from another node communicates directly. For communicating with distant nodes, M-MAC uses multiple hops to send RTS packets to establish a link, but the subsequent CTS, data, and ACK packets are sent in a single hop. his protocol can achieve better throughput and end-to-end delay than the basic IEEE 802.11 and the D-MAC schemes. Depending on the topology coniguration and low patterns of the system, the performance also varies. Directional antennas bring in three new problems: (1) new kinds of hidden terminals, (2) higher directional interference (problems due to nodes that are in a straight line), and (3) deafness (where routes of two lows share a common link). hese problems depend on the topology and low patterns. With node mobility, the performance of these schemes will degrade. Some of the current protocols imprecisely assume that the gain of the directional antenna is the same as that of the omnidirectional antenna. But, none of them considers the efect of transmission power control, use of multiple channels, and support for real-time traic. 2.3.4 Multiple-Channel MAC Protocols he high probability of collision with the number of nodes is a major problem for the single shared channel scheme. his problem can be solved with multichannel approaches. As seen in the classiication, some multichannel schemes use a dedicated channel for control packets (or signaling) and one separate channel for data transmissions. hey set up busy tones on the control channel, one with small bandwidth consumption, so that nodes are conscious of the ongoing transmissions. Another approach is to use multiple channels for data packet transmission, which has the following advantages: M AC L AY ER P R O T O C O L S 67 1. Use of a number of channels potentially increases the throughput, as the maximum throughput of a single channel scheme is limited by the bandwidth of that channel. 2. Transmissions of data on diferent channels do not get in the way of each other, and multiple transmissions can take place together in the same region. his leads to drastically fewer collisions. 3. It is easier to support QoS by using multiple channels. In real time, a multiple data channel MAC protocol has to assign diferent channels to diferent nodes. he subject of medium access still needs to be resolved. his involves deciding, for instance, the time slots at which a node would get access to a particular channel. In certain cases, it may be necessary for all the nodes to be harmonized with each other, whereas in other instances, it may be possible for the nodes to negotiate schedules among themselves. he details of some of the multiple channel MAC schemes are discussed next. In the schemes of exchange of RTS/CTS dialogue, these control packets themselves are prone to collisions. hus, in the presence of hidden terminals, there remains a risk of data packet destruction due to collision. he DBTMA scheme efectively solves the hidden- and exposed-terminal problems by out-of-band signaling. Data transmission is happening on the single shared wireless channel. It builds upon earlier work on the busy tone multiple access (BTMA) and the receiver-initiated busy tone multiple access (RI-BTMA) schemes. For managing access to the common medium, DBTMA decentralizes the responsibility and does not require time synchronization among the nodes. Again, for setting up transmission requests, DBMTA sends RTS packets on data channels. Afterward, two diferent busy tones on a separate narrow channel are used to shield the transfer of the RTS and data packets. he sender of the RTS sets up a transmit-busy tone (BTt). Correspondingly, the receiver sets up a receive-busy tone (BTr) in order to acknowledge the RTS, without using any CTS packet. Any node that senses an existing BTr or BTt defers from sending its own RTS over the channel. herefore, both of these busy tones together guarantee protection from collision from other nodes in 2.3.4.1 Dual Busy Tone Multiple Access (DBTMA) 68 A D H O C M O BIL E WIREL E S S NE T W O RKS the vicinity. hrough the use of the BTt and BTr in combination, exposed terminals are able to initiate data packet transmissions. Simultaneously, hidden terminals can reply to RTS requests as data transmission occurs between the receiver and sender. However, the DBTMA scheme does not use ACK to acknowledge the received data packets. It requires supplementary hardware involvement. 2.3.4.2 Multichannel Carrier Sense Multiple Access (CSMA) MAC Protocol he total available bandwidth (W) is divided into N distinct channels of W/N bandwidth each by multichannel CSMA protocol. Here, N is lower than the number of nodes in the network. Also, the channels are divided based on either an FDMA or CDMA scheme. A transmitter uses carrier sensing to see if the channel it last used is free or not. If found to be free, the channel used last is utilized. Otherwise, another free channel is chosen at random. If no free channel is found, the node should pull back and retry later. Even when traic load is very high and adequate channels are not accessible, chances of collisions are somewhat reduced since each node tends to prefer its last used channel instead of simply choosing a new channel arbitrarily. his protocol is more eicient than single-channel CSMA schemes. Interestingly, the performance of this scheme is lower than that of the single-channel CSMA scheme at lower traic loads or when there are only a small number of active nodes for a long period of time. his happens due to the misuse of idling channels. he protocol is extended to select the best channel based on the signal power observed at the sender side. In ISM band, based on frequency hopping spread spectrum (FHSS) radios, HRMA is an eicient MAC protocol. For sending entire packets in the same hop, it uses time-slotting properties of very slow FHSS. For communication without intervention from other nodes, HRMA does not require carrier sensing; it employs a common frequency hopping sequence and also allows a pair of nodes to preserve a frequency hop (through the use of an RTS-CTS exchange). One of the N available frequencies in the network is reserved exclusively for synchronization. he remaining N – 1 frequencies are divided into 2.3.4.3 Hop-Reservation Multiple Access (HRMA) 69 M AC L AY ER P R O T O C O L S s.slot slot 1 SYN fo slot 2 HR RTS slot 3 slot 4 CTS f2 Figure 2.4 Structure of HRMA slot and frame. M = loor ((N – 1)/2) pairs of frequencies For every pair, the irst frequency is used for hop reservation (HR), RTS, CTS, and data packets, and the second frequency is used for ACK packets. HRMA is treated as a TDMA scheme, where time slots are assigned a speciic frequency and subdivided into four parts: synchronizing, HR, RTS, and CTS periods. Figure 2.4 shows the HRMA frame. All through the synchronization phase of every time slot, all idle nodes synchronize to each other. On the other three periods, they jump together on the common frequency hops that have been assigned to the time slots. First, the sender node sends an RTS packet to the receiver in the RTS period of the time slot. In that same time slot, the receiver sends a CTS packet to the sender in the CTS period. Now, the sender sends the data on the same frequency (at this time, the other idle nodes are synchronizing) and then hops to the acknowledgment frequency on which the receiver sends an ACK. If the data are large and require multiple time slots, the sender shows that in the header of the data packet. he receiver then sends an HR packet in the HR period of the next time slot, to lengthen the stipulation of the current frequency for the sender as well as the receiver. his indicates to the other nodes to omit this frequency in the hopping sequence. HRMA gets notably higher throughput than the slotted ALOHA in FHSS channels. It uses simple, half-duplex, slow-frequency hopping radios that are commercially available. On the other hand, it requires synchronization among the nodes, which is not proper for multihop networks. MMAC uses several channels by switching among them with dynamism. While the IEEE 802.11 protocol has intrinsic support for multiple channels in DCF mode, currently it utilizes only one channel. he prime cause 2.3.4.4 Multichannel Medium Access Control (MMAC) 70 A D H O C M O BIL E WIREL E S S NE T W O RKS is that hosts with a single half-duplex transceiver can only transmit or listen to one channel at a time. MMAC is a revision to the DCF in order to use multiple channels. Like the DPSM scheme, time is separated into multiple ixed-time beacon intervals. he commencement of every interval has a small ATIM window. In this window ATIM packets are exchanged between nodes for harmonization of the mission of appropriate channels to use in the subsequent time slots of that interval. In contrast to other multichannel protocols, MMAC needs only one transceiver. At the commencement of every beacon interval, every node synchronizes itself to all other nodes by tuning into a common synchronization channel on which ATIM packets are exchanged. During this period of time no data packet difusion is allowed. Moreover, every node keeps a preferred channel list (PCL) that stores the usage of channels within its transmission range and also allows for pointing priorities for those channels. When a node is sending a data packet, it sends out an ATIM packet to the receiver that includes the sender’s PCL. he receiver then compares the sender’s PCL with its own possession and selects a suitable channel to use. he response is given with an ATIM-ACK packet that includes the chosen channel in it. If the chosen channel is up to standard for the sender, it responds with an ATIM-RES (reservation) packet. Any other node that overhears an ATIM-ACK or ATIM-RES packet updates its own PCL. Afterward, the sender and receiver swap RTS/CTS messages on the selected channel prior to data exchange. Otherwise, if the selected channel is not proper for the sender, it has to hang back till the next beacon interval tries another channel. In terms of throughput performance, MMAC is better than IEEE 802.11 and DCA. It can also be incorporated with IEEE 802.11 PSM mode using only simple hardware. Nonetheless, the packet delays are also longer than DCA. Furthermore, it is not appropriate for multihop ad hoc networks because the nodes are synchronized. 2.3.4.5 Dynamic Channel Assignment with Power Control (DCA-PC) DCA-PC is an expansion of the DCA protocol that does not think about power control. It combines the concepts of power control and multiple-channel medium access in the framework of M AC L AY ER P R O T O C O L S 71 MANETs. Dynamically, channels are assigned to the hosts, when they require them. he bandwidth is divided into a control channel and multiple data channels, and every node is prepared with two halfduplex transceivers. For exchanging control packets (using maximum power), one transceiver operates on the control channel for reserving the data channel; the other switches between the data channels for exchanging data and acknowledgments (with power control). When a host wants a channel to converse with another, it engages itself in an RTS/CTS/RES switchover, where RES is a special reservation packet signifying the appropriate data channel to be used. Every node has a table of power levels for use while communication goes on with any other node. Based on the RTS/CTS exchanges on the control channel, these power levels are calculated. As entire node family always listen to the control channel, it can even update the power values with dynamism based on the other control exchanges going around it. Every node maintains a list of channel utilization information. his list informs the node which channel its neighbor is using and also the times of usage. DCA-PC has higher throughput than DCA. But, when the number of channels is increased beyond a point, the consequence of power control is considerably less for overloading of the control channel. In summing up, DCA-PC is an original efort for solving dynamic channel assignment and power control issues in an integrated fashion. 2.3.5 Power-Aware or Energy-Eicient MAC Protocols It is crucial to preserve energy and make use of power eiciently as mobile devices are battery power driven. Power preservation is considered across all the layers of the protocol stack. he following are the guiding principles for power conservation in MAC protocols: 1. Collisions should be avoided since they are the major basis of expensive retransmissions. 2. he transceivers consume most energy in active mode, so they should remain in standby mode (or switched of) whenever possible. 72 A D H O C M O BIL E WIREL E S S NE T W O RKS 3. he transmitter should be controlled to a lower power mode instead of maximum power because that is enough for the destination node to obtain the transmission. he particulars of some chosen schemes are discussed next. 2.3.5.1 Power-Aware Medium Access Control with Signaling (PAMAS) he basic idea behind PAMAS is that all the RTS-CTS interactions are performed over the signaling channel and the data transmissions are kept apart over a data channel. he destination node starts sending out a busy tone over the signaling channel for receiving a data packet. When the power is down, nodes start listening to the signaling channel by assuming that it is most advantageous for them to power down their transceivers. For assuring that there are no power drops, every node makes its own decision whether or not to power of so that there is no drop in the throughput. When a node has nothing to transmit, it powers itself of and realizes that its neighbor is transmitting. A node also powers itself of if at least one neighbor is transmitting and another is receiving at the same time. here are quite a few rules to decide the span of a power-down state. his scheme is used with other protocols like FAMA. he use of ACK and transmission of multiple packets improves the performance of PAMAS. he radio transceiver turnaround time, which is not negligible, is measured in the PAMAS scheme. 2.3.5.2 Dynamic Power-Saving Mechanism (DPSM) he concept of sleep and wake states of nodes is used in DPSM for preserving power. It is a type of the IEEE 802.11 scheme where it uses dynamically sized ad hoc traic indication message (ATIM) windows for achieving longer dozing times of nodes. he IEEE 802.11 DCF mode is a powersaving mechanism where time is divided into beacon intervals used to synchronize nodes. At the commencement of each beacon interval, all nodes must stay wakeful for a ixed period of time known as the ATIM window, which announces the status of packets ready for transmission to the receiver nodes. hese announcements are made through ATIM frames and are acknowledged via ATIM-ACK packets during the same beacon interval. Figure 2.5 shows the method. Performance sufers in M AC L AY ER P R O T O C O L S A ATIM Data ATIM window B ATIM-ACK C 73 ACK Dozing ATIM window Beacon interval ATIM window ATIM window Next beacon interval Figure 2.5 Power-saving mechanism for DCF. terms of throughput and energy consumption if the size of the ATIM window is kept ixed. Each node dynamically and independently chooses the length of the ATIM window in DPSM. As a consequence, every node ends up with a diferently sized window. After participating in the transmission of packets announced in the prior ATIM frame, it allows the sender and receiver nodes to go into sleep mode instantly. Contrasting to the DCF method, they do not stay awake for the whole beacon interval. After the current window expires, the length of the ATIM window is enlarged if some packets queued in the outgoing bufer have still not been sent. Again, each data packet carries the current length of the ATIM window and any nodes that eavesdrop on this information may decide to alter their own window length based on the received information. In terms of power saving and throughput, DPSM is more eicient than IEEE 802.11 DCF. Nonetheless, IEEE 802.11 and DPSM are not appropriate for multihop ad hoc networks as they take for granted that the clocks of the nodes are synchronized and the network is connected. hree variations of DPSM for multihop MANETs are available that use asynchronous clocks. Node A announces a bufered packet for B using an ATIM frame. Node B replies by sending an ATIM-ACK and both A and B stay awake during the entire beacon interval. he actual data transmission from A to B is completed during the beacon interval; since C does not have any packet to send or receive, it dozes after the ATIM window. Alternating sleep and wake states for nodes were used in the previous concepts for power control. In PCM, the RTS and CTS packets are sent by means of the maximum power on hand, while the data and ACK 2.3.5.3 Power-Control Medium Access Control (PCM) 74 A D H O C M O BIL E WIREL E S S NE T W O RKS CS Zone for CTS CS Zone for RTS A TR for RTS Range of Data Figure 2.6 range. D TR for CTS H E Range of ACK G Illustration of power control scheme: CS = carrier sense and TR = transmission packets are sent with the minimum power needed for communication. An example is shown in Figure 2.6. Node D sends the RTS to node E at transmit power level Pmax and includes this value in the packet. E measures the genuine signal strength Pr of the received RTS packet. Founded on Pmax, Pr and the noise intensity at its location, E then calculates the minimum power level, Psuf, that is truly enough for use by D. Now, when E responds with the CTS packet using the maximum power it has, it includes Psuf that D consequently uses for data transmission. G is capable of hearing this CTS packet and defers its own transmissions. E also includes the power level, which it uses for the transmission in the CTS packet. D then follows a similar process and computes the least required power level that would get a packet from E to itself. It includes this value in the data packet so that E can use it to send the ACK. PCM also stipulates that the source node transmit the DATA packet from time to time at the maximum power level so that nodes in the carrier sensing range, such as A, may sense it. PCM thus gets energy savings without any throughput deprivation. he operation of the PCM scheme needs an accurate assessment of the signal strength of the received packet. hus, the dynamics of wireless signal M AC L AY ER P R O T O C O L S 75 spread due to fading and shadowing efects degrade its performance. Another downside of this scheme is the complications in implementing frequent changes in the transmit power levels. PCMA relies on controlling transmission power of the sender. hen the intended receiver is able to decipher the packet. Interference with other neighboring nodes that are not involved in the packet exchange is avoided. PCMA uses two channels, one for sending busy tones and the other for data and control packets. Power control method in PCMA is used to increase channel eiciency all the way through spatial frequency reuse rather than only rising battery life. As a result, an important concern for the transmitter and receiver pair is to settle on the minimum power level required for the receiver to decode the packet, while distinguishing it from noise/interference. So as not to trouble the ongoing reception of the receiver by any potential transmitter, the receiver advertises its noise tolerances. In the conventional methods for collision avoidance, a node is either permitted for transmission or not, depending upon the outcome of carrier sensing. In PCMA, this method is generalized to a surrounded power model. he sender sends a Request_Power_To_ Send (RPTS) packet in the data channel to the receiver before the transmission of data. he receiver responds with an Accept_Power_To_Send (APTS) packet in the data channel. his RPTS-APTS switching is used for the determination of minimum transmission power level, which causes a successful packet reception at the receiver. After this exchange, the genuine data are transmitted and acknowledged with an ACK packet. Every receiver sets up a special busy tone as a periodic pulse in separate channels. he signal power of this busy tone advertises to the other nodes the added noise power the receiver node can bear. When a sender monitors the busy-tone channel, it is doing something similar to carrier sensing, as in CSMA/CA model. When a receiver sends out a busy-tone pulse, it is doing something similar to sending out a CTS packet. he RPTS-APTS exchange is equivalent to the RTS-CTS exchange. But the major diference is that the RPTSAPTS exchange does not force other hidden transmitters to back of. Collisions are resolved by the use of an appropriate back-of policy. 2.3.5.4 Power-Controlled Multiple Access (PCMA) 76 A D H O C M O BIL E WIREL E S S NE T W O RKS 2.4 Summary his chapter has focused on ad hoc wireless networks with respect to MAC protocols. Many schemes and their prominent features were discussed. Particularly, it has concentrated on the issues of collision resolution, power conservation, multiple channels, and advantages of using directional antennas. he individuality and operating principles of several MAC schemes were discussed. While some of them are general-purpose protocols (such as MACA, MACAW, etc.), others focus on speciic features such as power control (PAMAS, PCM, etc.) or the use of dedicated technology like directional antennas (D-MAC, multihop RTS MAC, etc.). Most of these schemes, however, are not designed especially for networks with mobile nodes. On the contrary, the transaction time at the MAC layer is moderately short. he consequence of mobility will become less signiicant as the available channel bandwidth continues to grow. Problems 2.1 Explain the need of MAC protocols for ad hoc networks. 2.2 Discuss the various factors that need to be considered while measuring the performance of the MAC protocol for ad hoc networks. 2.3 With a neat diagram, explain hidden- and exposed-node problems. 2.4 Give the classiication of MAC protocols with a suitable example. 2.5 Describe contention-based MAC protocols with an example. 2.6 Explain contention-based MAC protocols with reservations. 2.7 Describe the MACA protocol with a suitable example. 2.8 Explain briely the two modes of operation in the IEEE 802.11 MAC scheme. 2.9 Discuss the operation of multiple access collision avoidance by invitation (MACA-BI) with an illustration. 2.10 How would group allocation multiple access with packet sensing (GAMA-PS) work well with ad hoc networks? Explain. 2.11 Describe MAC protocols using directional antennas in detail. 2.12 Explain the advantage of multiple-channel MAC protocols. M AC L AY ER P R O T O C O L S 77 2.13 Discuss the advantage of power-aware or energy-eicient MAC protocols. 2.14 Explain power-aware medium access control with signaling (PAMAS) with an example. 2.15 Explain how the dynamic power-saving mechanism (DPSM) is an eicient MAC protocol in ad hoc networks. 2.16 Discuss power-control medium access control (PCM) and power-controlled multiple access (PCMA). 2.17 What are the design goals of the MAC protocol? 2.18 Describe the applications of the MACA protocol. 2.19 Discuss the weaknesses of the MACA protocol. 2.20 Explain the principle of operation of the MACAW protocol. Reference 1. Talucci, F., and M. Gerla. 1997. MACA-BI (MACA by invitation). A wireless MAC protocol for high speed ad hoc networking. Proceedings of IEEE ICUPC. Bibliography Abramson, N. 1970. he ALOHA system—Another alternative for computer communications. Proceedings of Fall Joint Computer Conference 37:281–285. Akyildiz, I. F., J. McNair, L.C. Martorell, R. Puigjaner, and Y. Yesha. 1999. Medium access control protocols for multimedia traic in wireless networks. IEEE Network 13:39–47. Bhargavan, V., A. Demers, S. Shenker, and L. Zhang. 1994. MACAW: A media access protocol for wireless LANs. Proceedings of ACM SIGCOMM, 212–225. Chakrabarti, S., and A. Mishra. 2001. QoS issues in ad hoc wireless networks. IEEE Communications Magazine 39 (2): 142–148. Chen, B., K. Jamieson, H. Balakrishnan, and R. Morris. 2001. Span: An energy-eicient coordination algorithm for topology maintenance in ad hoc wireless networks. ACM MOBICOM, July. Chen, K. C. 1994. Medium access protocols of wireless LANs for mobile computing. IEEE Network 8 (5): 50–63. Chockalingam, A., and M. Zorzi. 1998. Energy eiciency of media access protocols for mobile data networks. IEEE Transactions on Communications 46 (11): 1418–1421. Crow, B. P., I. Widjaja, J. G. Kim, and P. T. Sakai. 1997. IEEE 802.11 wireless local area networks. IEEE Communications Magazine: 116–126. 78 A D H O C M O BIL E WIREL E S S NE T W O RKS Fullmer, C. L., and J. J. Garcia-Luna-Aceves. 1995. Floor acquisition multiple access (FAMA) for packet-radio networks. Proceedings of ACM SIGCOMM, Cambridge, MA, Aug. 28–Sep. 1. Gallager, R. G. 1985. A perspective on multi access channels. IEEE Transactions on Information heory 31 (2): 124–142. Goldsmith, A. J., and S. B. Wicker. 2002. Design challenges for energy-constrained ad hoc wireless networks. IEEE Wireless Communications 9 (4): 8–27. Haas, Z. J., and J. Deng. 2002. Dual busy tone multiple access (DBTMA)—A multiple access control scheme for ad hoc networks. IEEE Transactions on Communications 50 (6): 975–984. Haas, Z. J., and S. Tabrizi. 1998. On some challenges and design choices in ad hoc communications. Proceedings of IEEE MILCOM98. Vol. 1. IEEE 802.11 Working Group. 1997. Wireless LAN medium access control (MAC) and physical layer (PHY) speciication. IETF MANET Working Group. http://www.ietf.org/html.charters/manetcharter.html Jung, E.-S., and N. H. Vaidya. 2002. An energy-eicient MAC protocol for wireless LANs. IEEE INFOCOM. ———. 2002. A power control MAC protocol for ad hoc networks. ACM International Conference on Mobile Computing and Networking (MOBICOM), Sept. Karn, P. 1990. MACA—A new channel access method for packet radio. ARRL/ CRRL Amateur Radio 9th Computer Networking Conference, Sept. 22. Kleinrock, L., and F. A. Tobagi. 1975. Packet switching in radio channels: Part I—Carrier sense multiple access modes and their throughput-delay characteristics. IEEE Transactions on Communications 23:1400–1416. ———. 1975. Packet switching in radio channels: Part II—he hidden terminal problem in carrier sense multiple access and busy tone solution. IEEE Transactions on Communications 23:1417–1433. Monks, J., V. Bharghavan, and W. Hwu. 2001. A power controlled multiple access protocol for wireless packet networks. IEEE INFOCOM, April. Muir, A., and J. J. Garcia-Luna-Aceves. 1998. An eicient packet sensing MAC protocol for wireless networks. Mobile Networks and Applications 3 (3): 221–234. O’Hara, B., and Petrick, A. 1999. IEEE 802.11 handbook: A designer’s companion. New York: IEEE Press. Perkins, C. E. 2001. Ad hoc networking. Boston, MA: Addison-Wesley. Poojary, N., S. V. Krishnamurthy, and S. Dao. 2001. Medium access control in a network of ad hoc mobile nodes with heterogeneous power capabilities. Proceedings of IEEE ICC 3:872–877. Ramanathan, R., and R. R. Hain. 2000. Topology control of multihop wireless networks using transmit power adjustment. IEEE INFOCOM 2:404–413. Rodoplu, V., and T. H. Meng. 1999. Minimum energy mobile wireless networks. IEEE Journal on Selected Areas in Communication 17 (8): 1338–1344. M AC L AY ER P R O T O C O L S 79 Royer, E. M., and C. K. Toh. 1999. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6 (2): 46–55. Sidhu, G., R. Andrews, and A. Oppenheimer. 1989. Inside AppleTalk. Boston, MA: Addison-Wesley. Singh, S., and C. S. Raghavendra. 1998. PAMAS—Power aware multiaccess protocol with signaling for ad hoc networks. ACM Computer Communications Review 28 (3): 5–26. Sivalingam, K. M., M. B. Srivastava, and P. Agrawal. 1997. Low-power link and access protocols for wireless multimedia networks. IEEE VTC, May. Smith, W. M., and P. S. Ghang. 1996. A low power medium access control protocol for portable multi-media systems. hird International Workshop Mobile Multimedia Communications, Sept. 25–27. Tang, Z., and J. J. Garcia-Luna-Aceves. 1999. Hop-reservation multiple access (HRMA) for ad-hoc networks. IEEE INFOCOM, 1999. Toh, C.-K. 2002. Ad hoc mobile wireless networks: Protocols and systems. Englewood Clifs, NJ: Prentice Hall. Tseng, Y.-C., C.-S. Hsu, and T.-Y. Hsieh. 2002. Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks. Proceedings of IEEE INFOCOM, 2002. Wattenhofer, R., L. Li, P. Bahl, and Y. M. Wang. 2001. Distributed topology control for power eicient operation in multihop wireless ad hoc networks. IEEE INFOCOM 3:1388–1397. Woesner, H., J. P. Ebert, M. Schlager, and A. Wolisz. 1998. Power saving mechanisms in emerging standards for wireless LANs: he MAC level perspective. IEEE Personal Communications 5 (3): 40–48. Wu, C., and V. O. K. Li. 1987. Receiver-initiated busy-tone multiple access in packet radio networks. Proceedings of ACM SIGCOMM Conference, pp. 336–342. Ye, W., J. Jeidemann, and D. Estrin. 2002. An energy-eicient MAC protocol for wireless sensor networks. Proceedings of IEEE INFOCOM, 2002. 3 ROUTING P ROTOCOLS 3.1 Introduction With the advances of wireless communication technology, lowcost and powerful wireless transceivers are widely used in mobile applications. Mobile networks have attracted signiicant interest in recent years because of their improved lexibility and reduced costs. Compared to wired networks, mobile networks have unique characteristics. In mobile networks, node mobility may cause frequent network topology changes, which are rare in wired networks. In contrast to the stable link capacity of wired networks, wireless link capacity continually varies because of the impacts from transmission power, receiver sensitivity, noise, fading, and interference. Additionally, wireless mobile networks have a high error rate, power restrictions, and bandwidth limitations. Mobile networks can be classiied into infrastructure networks and mobile ad hoc networks according to their dependence on ixed infrastructures. In an infrastructure mobile network, mobile nodes have wired access points (or base stations) within their transmission range. he access points compose the backbone for an infrastructure network. In contrast, mobile ad hoc networks are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore, the network may experience rapid and unpredictable topology changes. Additionally, because nodes in a mobile ad hoc network normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence, routing paths in mobile ad hoc networks potentially contain multiple hops, and every node in mobile ad hoc networks has the responsibility to act as a router. Mobile ad hoc networks originated from the US Defense Advanced Research Projects Agency (DARPA) packet radio network (PRNet) and Suran projects. Because they are independent of 81 82 A D H O C M O BIL E WIREL E S S NE T W O RKS pre-established infrastructure, mobile ad hoc networks have advantages such as rapid and easy deployment, improved lexibility, and reduced costs. Mobile ad hoc networks are appropriate for mobile applications either in hostile environments, where no infrastructure is available, or in temporarily established mobile applications that are cost crucial. In recent years, application domains of mobile ad hoc networks have gained increasing importance in nonmilitary public organizations and in commercial and industrial areas. he typical application scenarios include rescue missions, law enforcement operations, cooperating industrial robots, traic management, and educational operations on campus. Active research work for mobile ad hoc networks is carried on mainly in the ields of medium access control, routing, resource management, power control, and security. Because of the importance of routing protocols in dynamic multihop networks, a lot of mobile ad hoc network routing protocols have been proposed in the last few years. here are some challenges that make the design of mobile ad hoc network routing protocols a tough task: 1. In mobile ad hoc networks, node mobility causes frequent topology changes and network partitions. 2. Because of the variable and unpredictable capacity of wireless links, packet losses may happen frequently. 3. he broadcast nature of the wireless medium introduces the hidden-terminal and exposed-terminal problems. 4. Because mobile nodes have restricted power, computing, and bandwidth resources, ad hoc networks require efective routing schemes. As a promising network type in future mobile applications, mobile ad hoc networks are attracting more and more researchers. his chapter gives the state-of-the-art review for typical routing protocols for mobile ad hoc networks, including unicast and classical mobile ad hoc network (MANET) unicast and multicast routing algorithms, and popular classiication methods. R O U TIN G P R O T O C O L S 83 3.2 Design Issues of Routing Protocols for Ad Hoc Networks he major design issues in mobile ad hoc networks are discussed in this section. 3.2.1 Routing Architecture he routing architecture of self-organized networks can be either hierarchical or lat. In most self-organized networks, the hosts will be acting as independent routers, which implies that routing architecture should conceptually be lat (i.e., each address serves only as an identiier and does not convey any information about where one host is topologically located with respect to any other node). In a lat self-organized network, mobility management is not necessary since all of the nodes are visible to each other via routing protocols. In lat routing algorithms such as the destination sequence distance vector (DSDV) and the wireless routing protocol (WRP), the routing tables have entries to all hosts in the self-organized network. In a lat routing algorithm, routing overhead increases at a faster rate when the size of the network increases. Hence, to control channel reuse spatially (in terms of frequency, time, or spreading code) and reduce routing information overhead, some form of hierarchical scheme should be employed. Clustering is the most common technique employed in hierarchical routing architectures. he idea behind hierarchical routing is to divide the hosts of self-organized networks into a number of overlapping or disjointed clusters. One node is elected as cluster head for each cluster. his cluster head maintains the membership information for the cluster. Other nodes that are present in the cluster will be treated as ordinary nodes. When these nodes want to send a packet, the nodes can send the packet to the cluster head that routes the packet toward the destination. Cluster head gateway switch routing (CGSR) and the cluster-based routing protocol (CBRP) belong to this type of routing scheme. Hierarchical routing involves cluster management and address/mobility management. 84 A D H O C M O BIL E WIREL E S S NE T W O RKS 3.2.2 Unidirectional Links Support Even though it is assumed that every routing protocol is bidirectional, a number of factors will make wireless links unidirectional: • Diferent radio capabilities: Diferent nodes can have diferent transmit powers and receiving power within a network. • Interference: his is due to either hostile jammers or friendly interference, which will reduce a nearby receiver’s sensitivity. For example, host X can receive packets from host Y as there is very little interference in X’s vicinity. However, Y may be in the vicinity of an interference node and therefore cannot receive packets from X. So, the link between X and Y is directed from Y to X. • Message broadcast requirement: For upward links, satellitebased transmitters are used. he upward links use diferent types of alternative paths. • Mute mode: An extreme instance, applicable only in tactical mobile networks, is when hosts cannot transmit due to an impending threat. In such a case, they still need to receive information, but cannot participate in bidirectional communications. • he state of link direction is time varying: In a state diagram, if the wireless communication is represented, the state of the wireless link may be either a persistent or a transient phenomenon. he duration of the stay in a particular state may depend on a function of ofered traic, terrain, and energy availability in the nodes. 3.2.3 Usage of Superhosts It is true that in all the available routing protocols, all the nodes in a particular network will share same bandwidth available for whole network and other facilities. But in some cases, some hosts will include preponderant bandwidth, guaranteed power supply, and high-speed wireless links. Such hosts are referred to as superhosts. For example, a company in a military environment consists of a number of walking soldiers equipped with low-capacity man-pack radios and a few tanks having high-capacity vehicular radios. hese types of self-organized networks have two-tier network architectures: backbone area and subarea. he backbone area is composed of superhosts. R O U TIN G P R O T O C O L S 85 It can be assumed that superhosts do not have much mobility compared to normal hosts, because they have to maintain the stability of the backbone. Normal hosts need not make routing decisions. For example, a satellite host (a superhost) can easily collect the routing information from the normal hosts’ geographical locations, build the routing table, and propagate these routes. he example is analogous to a person on stage likely having a much better view of the wireless network throughout an auditorium. 3.2.4 Quality of Service (QoS) Routing For most of the previous routing protocols, optimization was done only on the basis of the metric: hop distance. In the case of datagram service, this parameter may be suicient. But in the case of MANETs, which are self-organized networks and are dynamic, it may be diicult to perform eicient resource utilization or to execute critical real-time applications in such environments. For these reasons, it is necessary to provide QoS routing support in order to control the total traic that can low into the network efectively. In QoS routing, routing will be established between nodes according to resource availability in the network as well as the QoS requirement of lows. For all the requests, they may not have the same QOS parameters. herefore, QoS routing means that the path selection will be based on availability of resources and eicient resource utilization. hus, QoS routing will consider multiple constraints and provide better load balance by allocating traic on diferent paths, subject to the QoS requirement of diferent traic. On the other hand, current routing protocols seem to favor routing traic based on shortest path, thereby causing a bottleneck. In self-organized networks, there are many metrics to be considered: (1) most reliable path, (2) most stable path, (3) maximum total power remained path, (4) maximum available bandwidth path, etc. It is desirable to select the routes with minimum cost based on these metrics rather than only to provide the shortest path based on the hop distance. 86 A D H O C M O BIL E WIREL E S S NE T W O RKS 3.2.5 Multicast Support In multicast routing, which is a network layer function, data packets from a source reach a group of many destinations. As we know, multicast routing is a network layer function that constructs paths along which data packets from a source are distributed to reach many, but not all, destinations in a communication network. hen, multicast routing sends a single copy of a data packet simultaneously to multiple receivers over a communication link that is shared by the paths to the receivers. Multicast supports group communication, especially in the case of MANETs, where the network is self-organized, where bandwidth is limited, and where energy is constrained. MANETs consists of several cooperative work groups. he deployment of multicast routing in self-organized networks will provide collaborative visualization and multimedia conference as well as information dissemination in critical situations such as disaster or military scenarios. Multicast routing in self-organized networks became an active research topic only very recently; much research has focused on designing the unicast routing protocols. However, a self-organized network is better suited to multicast than unicast routing because of its broadcast characteristics. Having multicast routing in self-organized networks poses new challenges. Traditional multicast protocols are not suitable for this environment for the following reasons: 1. he source oriented protocols are ineicient as the source originates the route request moves. 2. As the nodes in the self-organized networks move, they change the topology of the networks; because of this, routing may be diicult. 3. Transient loops may form during spanning tree reconiguration. 4. Since the communication is to a group of nodes, maintaining too much multicast-related state information puts much pressure on both storage capacity and power, and these resources are severely limited in handheld devices in self-organized networks. 3.3 Classification of Routing Protocols Designing an eicient and reliable multicast routing protocols is a very challenging problem, because of the MANET characteristics like R O U TIN G P R O T O C O L S 87 limited resources. An intelligent routing strategy is required to use limited resources eiciently while at the same time being adaptable to changing network conditions such as network size, traic density, and network partitioning. Apart from this, it should provide diferent levels of QoS to diferent types of applications and users. In wired networks, link-state and distance-vector algorithms are commonly used. In link-state routing, each node maintains an up-todate view of the network by periodically broadcasting the link-state costs of its neighboring nodes to all other nodes using a looding strategy. When each node receives an update packet, it updates its view of the network and its link-state information by applying a shortest-path algorithm to choose the next hop node for each destination. But these protocols are not well suited for large MANETs. Since the periodic or frequent route updates in large networks may consume a signiicant part of the available bandwidth, increase channel contention, and may require each node to recharge its power supply frequently. To overcome the problems associated with the protocols of wired networks, a number of routing protocols have been proposed for MANETs. hese protocols can be classiied into three diferent groups: global, or proactive; on demand, or reactive; and hybrid. In proactive routing protocols, the routes to all the destinations (or parts of the network) are determined at the start-up and maintained by using a periodic route update process. In reactive protocols, routes are determined when they are required by the source using a route discovery process. Hybrid routing protocols combine the basic properties of two classes of protocols into one. hat is, they are both reactive and proactive in nature. Each group has a number of diferent routing strategies, which employ a lat or a hierarchical routing structure. Classiication methods are required to help researchers and designers to study, compare and analyze mobile ad hoc routing protocols. hese characteristics mainly are related to the information exploited for routing, when this information is acquired, and the roles that nodes may take in the routing process. 3.3.1 Proactive, Reactive, and Hybrid Routing One of the most popular methods to distinguish mobile ad hoc network routing protocols is based on how routing information is acquired 88 A D H O C M O BIL E WIREL E S S NE T W O RKS and maintained by mobile nodes. Using this method, mobile ad hoc network routing protocols can be divided into proactive routing, reactive routing, and hybrid routing. In a proactive routing protocol, nodes in the network calculate routes to all reachable nodes a priori and try to maintain consistent, up-to-date routing information. A proactive routing protocol is also called a “table-driven” protocol. herefore, a source node can get a routing path immediately if it needs one. In proactive routing protocols, all nodes have to maintain the information about the network topology. For any change that occurs in the network topology, the updates must be propagated throughout the network to communicate the change. Most proactive routing protocols proposed for mobile ad hoc networks have inherited most of the properties from algorithms used in wired networks. To adapt to the dynamic features of mobile ad hoc networks, necessary modiications have been made on traditional wired network routing protocols. he major overhead of proactive routing algorithms is whether the request is there or not; regardless, up-to-date network topology is maintained. In the next section, we introduce several typical proactive mobile ad hoc network routing protocols, such as the wireless routing protocol (WRP), the DSDV protocol, and the isheye state routing (FSR) protocol. Reactive routing protocols for mobile ad hoc networks are also called “on-demand” routing protocols. In a reactive routing protocol, routing paths are searched only when necessary. A route discovery operation invokes a route-determination procedure. he discovery procedure terminates when either a route has been found or no route is available after examination for all route permutations. In reactive routing protocols, less control overhead will be there as the routes will not be calculated a priori. Reactive protocols have better scalability than proactive routing protocols as the route calculation is done when the request is made. In a mobile ad hoc network, active routes may be disconnected due to node mobility. herefore, route maintenance is an important operation of reactive routing protocols. However, when using reactive routing protocols, source nodes may sufer from long delays for route searching before they can forward data packets. he Dynamic R O U TIN G P R O T O C O L S 89 source routing (DSR) and ad hoc on-demand distance vector routing (AODV) are examples for reactive routing protocols for mobile ad hoc networks. In hybrid routing protocols, the merits of both proactive and reactive routing protocols are combined. In hybrid routing protocols for mobile ad hoc networks, proactive routing approaches are exploited in hierarchical network architectures and reactive routing approaches are exploited in diferent hierarchical levels. In this chapter, the zone routing protocol (ZRP), zone-based hierarchical link-state (ZHLS) routing protocol, and hybrid ad hoc routing protocol (HARP) will be introduced and analyzed as examples of hybrid routing protocols for mobile ad hoc networks. 3.3.2 Structuring and Delegating the Routing Task Another classiication method is based on the roles that nodes may have in a routing scheme. In a uniform routing protocol, all mobile nodes have the same role, importance, and functionality. Examples of uniform routing protocols include WRP, DSR, AODV, and DSDV. Uniform routing protocols normally assume a lat network structure. In a nonuniform routing protocol for mobile ad hoc networks, some nodes carry out distinct management and/or routing functions. Normally, distributed algorithms are exploited to select these special nodes. In these routing protocols, routing approaches are related to hierarchical network structures to facilitate node organization and management. hese protocols can be further divided based on the way the organization of the nodes is done and management and routing functions are performed. Following these criteria, nonuniform routing protocols for mobile ad hoc networks are divided into zone-based hierarchical routing, cluster-based hierarchical routing, and corenode-based routing. In zone-based routing protocols, diferent zone constructing algorithms are exploited for node organization (e.g., some zone constructing algorithms use geographical information). Dividing the network into zones efectively reduces the overhead for routing information maintenance. Mobile nodes in the same zone know how to reach each other with smaller cost compared to maintaining routing information for all nodes in the whole network. In some zone-based routing protocols, speciic nodes act as gateway nodes and carry out interzone 90 A D H O C M O BIL E WIREL E S S NE T W O RKS communication. he ZRP and ZHLS are zone-based hierarchical routing protocols for mobile ad hoc networks. A cluster-based routing protocol uses speciic clustering algorithms for cluster head election. Mobile nodes are grouped into clusters and cluster heads take the responsibility for membership management and routing functions. CGSR will be introduced in a future section as an example of cluster-based mobile ad hoc network routing protocols. Some cluster-based mobile ad hoc network routing protocols potentially support a multilevel cluster structure, such as hierarchical state routing (HSR). In core-node-based routing protocols, critical nodes are selected dynamically and carry out special functions, such as routing path construction and control or data packet propagation. Core-extraction distributed ad hoc routing (CEDAR) is a typical core-node-based mobile ad hoc network routing protocol. 3.3.3 Exploiting Network Metrics for Routing Most of the routing protocols in MANET’s use “hop number” as a metric for classifying the routing protocols. his means that if multiple routes are available for the same path, then the path with lowest hop number will be considered. If all wireless links in the network have the same failure probability, short routing paths are more stable than the long ones and can obviously decrease traic overhead and reduce packet collisions. Diferent mobile applications have diferent QOS requirements for diferent characteristics like packet routing and forwarding. QOS routing protocols can use metrics that are used in wired networks, such as bandwidth, delay, delay jitter, packet loss rate, etc. As an example, bandwidth and link stability are used in CEDAR as metrics for routing path construction. 3.3.4 Evaluating Topology, Destination, and Location for Routing In a topology-based routing protocol for mobile ad hoc networks, nodes collect network topology information for making routing decisions. Other than topology-based routing protocols, there are some destination-based routing protocols proposed in mobile ad hoc networks. R O U TIN G P R O T O C O L S 91 In a destination-based routing protocol, a node only needs to know the next hop along the routing path when forwarding a packet to the destination. For example, DSR is a topology-based routing protocol. AODV and DSDV are destination-based routing protocols. he availability of global positioning system (GPS) or similar locating systems allows mobile nodes to access geographical information easily. In location-based routing protocols, the distance between a packet forwarding node and the destination, along with the node mobility, can be used in both route discovery and packet forwarding. Existing location-based routing approaches for mobile ad hoc networks can be divided into two schemes. In the irst case, the nodes send packets to the destination based on the corresponding node’s location information and they will not use any extra information. In the second case, the protocols use both location information and topology information. Location aided routing (LAR) and the distance routing efect algorithm for mobility (DREAM) are typical location-based routing protocols proposed for mobile ad hoc networks. 3.4 Proactive Routing Protocols A proactive routing protocol is also called a table-driven routing protocol. Using a proactive routing protocol, nodes in a mobile ad hoc network continuously evaluate routes to all reachable nodes and attempt to maintain consistent, up-to-date routing information. herefore, a source node can get a routing path immediately if it needs one. In proactive routing protocols, each and every node needs to maintain the up-to-date information about the network topology so that if any link fails or any topology change happens, the information can be propagated to related nodes. Most of the proactive routing protocols discussed for mobile ad hoc networks have inherited properties from algorithms used in wired networks. To adapt to the dynamic features of mobile ad hoc networks, necessary modiications have been made on traditional wired network routing protocols. Using proactive routing algorithms, mobile nodes proactively update network state and maintain a route regardless of whether data traic exists or not. he overhead of these types of routing protocols is always knowing the up-to date information about the network. In the 92 A D H O C M O BIL E WIREL E S S NE T W O RKS following sections, we will discuss several typical proactive mobile ad hoc network routing protocols, such as • • • • • Wireless routing protocol (WRP) Destination sequence distance vector (DSDV) Fisheye state routing (FSR) Hierarchical state routing (HSR) Topology broadcast reverse forwarding (TBRF) 3.4.1 Wireless Routing Protocol (WRP) WRP is a proactive routing protocol that uses the updated version of Bellman–Ford distance vector routing algorithm adaptable to the mobile and ad hoc feature of MANETs. In WRP, each node maintains a distance table and a routing table. Using WRP, each mobile node maintains a distance table, a routing table, a link-cost table, and a message retransmission list (MRL). An entry in the routing table contains the distance to a destination node, the predecessor, and the successor along the paths to the destination, and a tag to identify its state (i.e., whether it is a simple path, a loop, or invalid). Storing predecessor and successor in the routing table helps to detect routing loops and avoid the counting-to-ininity problem, which is the main shortcoming of the original distance-vector routing algorithm. A mobile node creates an entry for each neighbor in its link-cost table. he entry contains cost of the link connecting to the neighbor and the number of time-outs since an error-free message was received from that neighbor. In WRP, using update messages, mobile nodes exchange routing. Updated messages can be sent either periodically or whenever linkstate changes happen. he MRL contains information about which neighbor has not acknowledged an update message. If needed, the update message will be retransmitted to the neighbor. To ensure connectivity, if there has been no change in its routing table since the last update, a node is required to send a “hello” message. On receiving an update message, the node modiies its distance table and looks for better routing paths according to the updated information. In WRP, a node checks the consistency of its neighbors after detecting any link change. A consistency check helps to eliminate loops R O U TIN G P R O T O C O L S 93 and speed up convergence. If too many tables are to be maintained in WRP, it needs more memory; hence it can be treated as major drawback of this protocol. Moreover, as a proactive routing protocol, it has a limited scalability and is not suitable for large mobile ad hoc networks. 3.4.1.1 Overview To describe the working of the protocol, a network can be modeled as a graph, G (V, E), where V is the set of nodes and E is the set of links connecting the nodes. Each node represents a router and involves components such as a processor, local memory, and input and output queues with unlimited capacity. In a wireless network, a node has radio connectivity with multiple nodes and a single physical radio link connects a node with many other nodes. However, for the purposes of routing-table updating, a node, A, can consider another node, B, as an adjacent node if there is radio connectivity between A and B and A receives update messages from B. Accordingly, we map a physical broadcast link connecting multiple nodes into multiple point-to-point functional links deined for these node paths that are considered to be neighbors of each other. A positive weight is assigned in each direction for a bidirectional link. All messages received (transmitted) by a node are put in an input (output) queue and are processed in irst in–irst out (FIFO) order. All the update messages are received in the order in which they are transmitted. WRP is designed so as to work on top of the MAC environment. Updated messages can be lost or sometimes become corrupted because of changes in radio connectivity or jamming. Reliable transmission of update messages is implemented by means of retransmissions. After receiving an update message free of errors, a node is required to send a positive acknowledgment (ACK) indicating that it has good radio connectivity and has processed the update message. Instead of sending the update message to each and every node, n, of the radio channel, a node can send a single update message to inform all its neighbors about changes in its routing table; however, each such neighbor sends an ACK to the originator node. In addition to ACKs, the connectivity can also be ascertained with the receipt of any message from a neighbor (which need not be an update message). To ensure that connectivity with a neighbor still exists when there are no transmissions or routing table or update ACKs, periodic update 94 A D H O C M O BIL E WIREL E S S NE T W O RKS messages without any routing table changes are sent to the neighbors. he time interval between two such null update messages is the HelloInterval. If a node fails to receive any type of message from a neighbor for a speciied amount of time (e.g., three or four times the HelloInterval, known as the Router-DeadInterval), the node must assume that connectivity with that neighbor has been lost. For the purpose of routing, each node maintains a distance table, a routing table, a link-cost table, and a message retransmission list. he distance table of the node, i, is a matrix containing, for each destination, j, and each neighbor of i (say, k), the distance to j (Dijk) and the predecessor (pijk) reported by k. he routing table of a node i is a vector with an entry for each known destination j that speciies the following: 3.4.1.2 Information Maintained at Each Node • • • • • he destination’s identiier he distance to the destination (Dij) he predecessor of the chosen shortest path to j (pij) he successor (sij) of the chosen shortest path to j A marker (tagij) used to update the routing table that speciies whether the entry corresponds to a simple path (tagij = correct), a loop (tagij = error), or a destination that has not been marked (tagij = null) he link-cost table of node i lists the cost of relaying information through each neighbor, k, and the number of periodic update periods that have elapsed since node i received any error-free messages from k. he cost of a failed link is considered to be ininity. he cost of a link could simply be 1, relecting the hop count, or the addition of the latency over the link plus some constant bias. he cost of the link from i to k, (i, k), is denoted by lik. he information about the retransmissions is also maintained in the message retransmission list (MRL), where the mth entry consists of the following: • he sequence number of an update message • A retransmission counter that is decremented every time node i sends a new update message R O U TIN G P R O T O C O L S 95 • An ACK-required lag (denoted by aikm) that speciies whether node k has sent an ACK to the update message represented by the retransmission entry • he list of updates sent in the update message he preceding information permits node i to know which updates of an update message (each update message contains a list of updates) have to be retransmitted and which neighbors should be requested to acknowledge such retransmission. Node i retransmits the list of updates in an update message when the retransmission counter of the corresponding entry in the MRL reaches zero. he retransmission counter of a new entry in the MRL is set equal to a small number (e.g., three or four). In WRP, nodes exchange routing-table update messages that propagate only from a node to its neighbors. An update message contains the following information: 3.4.1.3 Information Exchanged among Nodes • he identiier of the sending node • A sequence number assigned by the sending node • An update list of zero or more updates or ACKs to update messages (An update entry speciies a destination, a distance to the destination, and a predecessor to the destination. An ACK entry speciies the source and sequence number of the update message being acknowledged.) • A response list of zero or more nodes that should send an ACK to the update message When the update messages are sent, if the space is not large enough to contain all the updates and ACKs that a node wants to report, they are sent in multiple update messages. An example of this event can be the case in which a node identiies a new neighbor and sends its entire routing table. he response list of the update message is used to avoid the situation in which a neighbor is asked to send multiple ACKs to the same update message, simply because some other neighbor of the node sending the update did not acknowledge. he irst transmission of an update message must ask all neighbors to send an ACK, of course, and this is accomplished by specifying the 96 A D H O C M O BIL E WIREL E S S NE T W O RKS neighbor’s address, which consists the all-neighbors address, which consists of all ones. When the update message reports no updates, the empty address is speciied; this address consists of all zeros and instructs the receiving nodes not to send an ACK in return. his type of update message is used as a “hello message” from a node to allow its neighbors to know that they maintain connectivity, even if no user messages or routing-table updates are exchanged. A node can decide to update its routing table after either receiving an update message from a neighbor or detecting a change in the status of a link to a neighbor. When a node, i, receives an update message from its neighbor, k, it processes each update and ACK entry of the update message in order. In WRP, a node checks the consistency of predecessor information reported by all its neighbors each time it processes an event involving a neighbor, k. In contrast, all previous path-inding algorithms check the consistency of the predecessor only for the neighbor associated with the input event. his unique feature of WRP accounts for its fast convergence after a single resource failure or recovery as it eliminates more temporary looping situations than previous path-inding algorithms. 3.4.1.4 Routing-Table Updating 3.4.2 Destination-Sequence Distance Vector (DSDV) DSDV is a proactive unicast mobile ad hoc network routing protocol. he DSDV protocol makes us of the traditional Bellman–Ford algorithm. However, in order to adopt to mobile ad hoc networks, the routing mechanisms are improved. In routing tables of DSDV, an entry stores the next hop toward a destination, the cost metric for the routing path to the destination, and a destination sequence number that is created by the destination. To distinguish stale paths from fresh ones, sequence numbers are used; sequence numbers also avoid route loops. DSDV can have routing updates based on either time or event. Every node periodically transmits updates including its routing information to its immediate neighbors. A routing table can be updated in two ways: a “full dump” (the full routing table is included inside the update) or an incremental update (which contains only those entries that, with a metric, have been changed since the last update was sent). R O U TIN G P R O T O C O L S 97 Routing information is advertised by broadcasting or multicasting the packets, which are transmitted periodically and incrementally as topological changes are detected (e.g., when stations move within the network). Data are also kept about the length of time between arrival of the irst and arrival of the best route for each particular destination. Based on these data, a decision may be made to delay advertising routes that are about to change soon, thus damping luctuations of the route tables. he advertisement of routes that may not have stabilized yet is delayed in order to reduce the number of rebroadcasts of possible route entries that normally arrive with the same sequence number. he DSDV protocol requires each mobile station to advertise its own routing table to each of its current neighbors (for instance, by broadcasting its entries). he entries in this list may change fairly dynamically over time, so the advertisement must be made often enough to ensure that every mobile computer can almost always locate every other mobile computer of the collection. In addition, each mobile computer agrees to relay data packets to other computers upon request. his agreement places a premium on the ability to determine the shortest number of hops for a route to a destination; if the nodes are in sleep node, they are not disturbed. In this way a mobile computer may exchange data with any other mobile computer in the group, even if the target of the data is not within range for direct communication. If the notiication of which other mobile computers are accessible from any particular computer in the collection is done at layer 2, then DSDV will work with whatever higher layer (e.g., network layer) protocol might be in use. he data broadcast by each mobile computer will contain its new sequence number and the following information for each new route: • he destination’s address • he number of hops required to reach the destination • he sequence number of the information received regarding that destination, as originally stamped by the destination he routing table also contains the network address and the hardware address of the node transmitting the routing tables, within the headers of the packet. he routing table will also include a sequence 98 A D H O C M O BIL E WIREL E S S NE T W O RKS number created by the transmitter. Routes with more recent sequence numbers will be preferred for making the forwarding decisions. A route with a sequence number equal to an existing route is chosen if it has a “better” metric and the existing route is discarded or stored as less preferable. he metrics for routes chosen from the newly received broadcast information are each incremented by one hop. Newly recorded routes are scheduled for immediate advertisement to the current mobile host’’s neighbors. Routes that show an improved metric are scheduled for advertisement at a time that depends on the average settling time for routes to the particular destination under consideration. Advantages of DSDV include the following: • DSDV is an eicient protocol for route discovery. • Route discovery latency is very low. • Loop-free paths are guaranteed in DSDV. Disadvantages of DSDV include: • To maintain network topology at each node, DSDV needs to send a lot of control messages. • DSDV generates a high volume of traic for high-density and highly mobile networks. 3.4.3 Fisheye State Routing (FSR) FSR is an implicit hierarchical routing protocol. It uses the “isheye” technique proposed by Kleinrock and Stevens. In this technique, they tried to reduce the size of information required to represent graphical data. he eye of a ish captures with high detail the pixels near the focal point. he detail decreases as the distance from the focal point increases. In routing, the isheye approach translates to maintaining accurate distance and path quality information about the immediate neighborhood of a node, with progressively less detail as the distance increases. he functionality of FSR is similar to linked state routing (LSR), where it maintains a topology map at each node. he diference with LSR is the way in which routing information is disseminated. In LSR, whenever a topology change happens, link-state packets are generated and looded into the network. But in case of FSR, link-state packets R O U TIN G P R O T O C O L S 99 are not looded. Instead, maintain a link-state table is maintained based on the up-to-date information received from neighboring nodes, and they periodically exchange it with their local neighbors only (no looding). Because of this exchange process, the table entries with larger sequence numbers replace the ones with smaller sequence numbers. he method of exchange used in FSR resembles the vector exchange in distributed Bellman–Ford (DBF) (or, more precisely, DSDV), where the distance updates happen through the time stamp or sequence number assigned by the node originating the update. But in the case of FSR, link states rather than distance vectors are propagated. Moreover, as in LSR, a full topology map is kept at each node and shortest paths are computed using this map. In the case of a wireless environment, a radio link between mobile nodes may experience frequent disconnects and reconnects. he LSR protocol releases a link-state update for each such change, which loods the network and causes excessive overhead. FSR avoids this problem by using periodic, instead of event-driven, exchange of the topology map, which reduces the control message overhead. When network size grows large, the update message could consume a considerable amount of bandwidth, which depends on the update period. Because of this, in order to reduce the size of update messages without seriously afecting routing accuracy, FSR uses the isheye technique. Figure 3.1 illustrates the application of isheye in a mobile wireless network. In this igure, the circles with diferent shades of gray deine the isheye scopes with respect to the center node (node 11). he scope is deined as the set of nodes that can be reached within a given number of hops. In our case, three scopes are shown for one, two, and more than two hops, respectively. Nodes are color coded as black, gray, and white accordingly. he number of levels and the radius of each scope will depend on the size of the network. he reduction of routing overhead is obtained by using diferent exchange periods for diferent entries in the routing table. More precisely, entries corresponding to nodes within the smaller scope are propagated to the neighbors with the highest frequency. Referring to Figure 3.2, entries in bold are exchanged most frequently. he rest of the entries are sent out at a lower frequency. As a 10 0 A D H O C M O BIL E WIREL E S S NE T W O RKS 2 8 5 3 1 9 9 6 4 7 10 12 13 18 11 36 14 24 15 16 19 17 Hop = 2 21 Hop > 2 22 23 20 29 27 25 Hop = 1 26 35 28 30 32 34 31 Figure 3.1 Scope of fisheye. result, a considerable fraction of link-state entries are suppressed in a typical update, thus reducing the message size. his strategy produces timely updates from near stations, but creates large latencies from stations afar. However, the imprecise knowledge of the best path to a distant destination is compensated by the fact that the route becomes progressively more accurate as the packet gets closer to its destination. As the network size grows large, a “graded” frequency update plan must be used across multiple scopes to keep the overhead low. TT 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} HOP 1 0 1 1 2 2 0 1 3 2 4 5 Figure 3.2 Message reduction using fisheye. TT 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} TT 0:{1} 1:{0,2,3} 2:{5,1,4} 3:{1,4} 4:{5,2,3} 5:{2,4} HOP 2 1 2 0 1 2 HOP 2 2 1 1 0 1 R O U TIN G P R O T O C O L S 101 he FSR concept originates from the global state routing (GSR) protocol. GSR can be viewed as a special case of FSR in which there is only one isheye scope level. As a result, the entire topology table is exchanged among neighbors. Clearly, this consumes a considerable amount of bandwidth when network size becomes large. hrough updating link-state information with diferent frequencies, depending on the scope distance, FSR scales well to large network size and keeps overhead low without compromising route computation accuracy when the destination is near. By retaining a routing entry for each destination, FSR avoids the extra work of “inding” the destination (as in on-demand routing) and thus maintains low single-packet transmission latency. As mobility increases, routes to remote destinations become less accurate. However, when a packet approaches its destination, it inds increasingly accurate routing instructions as it enters sectors with a higher refresh rate. 3.4.4 Ad Hoc On-Demand Distance Vector (AODV) An ad hoc network is a distributed system without any centralized access point or framed infrastructure. AODV is an algorithm working for the operation of such ad hoc networks. Each mobile host operates as a specialized router and routes are obtained as needed. he AODV routing algorithm is quite suitable for a dynamic selfstarting network as required by users wishing to utilize ad hoc networks. AODV provides loop-free routes even while repairing broken links. Because the protocol does not require global periodic routing advertisements, the demand is less than in those protocols that do necessitate such advertisements. 3.4.4.1 Path Discovery he path discovery process is initiated whenever a source node needs to communicate with another node for which it has no routing information in its table. Every node maintains two separate counters: a node sequence number and a broadcast ID. he source node initiates path discovery by broadcasting a route request (RREQ ) packet to its neighbors. he RREQ contains the following ields: <source_addr source sequence# broadcast id dest_addr dest sequence# hop cnt > 10 2 A D H O C M O BIL E WIREL E S S NE T W O RKS he pair <source_addr, broadcast_id> uniquely identiies an RREQ. broadcast_id is incremented whenever the source issues a new RREQ. Each neighbor either satisies the RREQ by sending a route reply (RREP) back to the source or broadcasts the RREQ to its own neighbors after increasing the hop_cnt. Notice that a node may receive multiple copies of the same route broadcast packet from various neighbors. When an intermediate node receives an RREQ , if it has already received an RREQ with the same broadcast_id and source address, it drops the redundant RREQ and does not rebroadcast it. If a node cannot satisfy the RREQ , it keeps track of the following information in order to implement the reverse path setup as well as the forward path setup that will accompany the transmission of the eventual RREP: <dest_ IP_addr, Source_IP_addr, Broadcast_ID,Expiration_ time, Source_sequence#> here are two sequence numbers (in addition to the broadcast_id) included in an RREQ: the source sequence number and the last destination sequence number known to the source. he source sequence number is used to maintain freshness information about the reverse route to the source; the destination sequence number speciies how fresh a route to the destination must be before it can be accepted by the source. As the RREQ travels from a source to various destinations, it automatically sets up the reverse path from all nodes back to the source, as illustrated in Figure 3.3. To set up a reverse path, a node records the address of the neighbor from which it received the irst copy of the RREQ. hese reverse path route entries are maintained for at least enough time for the RREQ to traverse the network and produce a reply to the sender. 3.4.4.2 Reverse Path Setup A A B Id = 2 A, B Id = 2 C A, B, C Id = 2 D A, B, C, D Id = 2 Figure 3.3 Route discovery example: node A is the initiator, and node E is the target. E 10 3 R O U TIN G P R O T O C O L S Eventually, an RREQ will arrive at a node (possibly the destination itself) that possesses a current route to the destination. he receiving node irst checks that the RREQ was received over a bidirectional link. If an intermediate node has a route entry for the desired destination, it determines whether the route is current by comparing the destination sequence number in its own route entry to the destination sequence number in the RREQ. If the RREQ’s sequence number for the destination is greater than that recorded by the intermediate node, the intermediate node must not use its recorded route to respond to the RREQ. Instead, the intermediate node rebroadcasts the RREQ. he intermediate node can reply only when it has a route with a sequence number that is greater than or equal to that contained in the RREQ. If it does have a current route to the destination and if the RREQ has not been processed previously, the node then unicasts an RREP packet back to the neighbor from which it received the RREQ. An RREP contains the following information: 3.4.4.3 Forward Path Setup <source_addr, dest_addr, dest_sequence #, hop_cnt, lifetime> By the time a broadcast packet arrives at a node that can supply a route to the destination, a reverse path has been established to the source of the RREQ. As the RREP travels back to the source, each node along the path sets up a forward pointer to the node from which the RREP came, updates its time-out information for route entries to the source and destination, and records the latest destination sequence number for the requested destination. Figure 3.4 represents the forward path setup as the RREP travels from the destination, D, to the source node, S. Nodes that are not along the path determined by the RREP will time out after ACTIVE_ROUTE_TIMEOUT(3000 ms) and will delete the reverse pointers. A B C D E Figure 3.4 Route maintenance example: Node C is unable to forward a packet from A to E over its link to next-hop D. 10 4 A D H O C M O BIL E WIREL E S S NE T W O RKS A node receiving an RREP propagates the irst RREP for a given source node toward that source. If it receives further RREPs, it updates its routing information and propagates the RREP only if the RREP contains either a greater destination sequence number than the previous RREP or the same destination sequence number with a smaller hop count. It suppresses all other RREPs received. his decreases the number of RREPs propagating toward the source while also ensuring the most up-to-date and quickest routing information. he source node can begin data transmission as soon as the irst RREP is received and can later update its routing information if it learns of a better route. In addition to the source and destination sequence numbers, other useful information is also stored in the route table entries and is called the soft state associated with the entry. Associated with reverse path routing entries is a timer, called the route request expiration timer. he purpose of this timer is to purge reverse path routing entries from those nodes that do not lie on the path from the source to the destination. he expiration time depends upon the size of the ad hoc network. Another important parameter associated with routing entries is the route caching time-out, or the time after which the route is considered to be invalid. In each routing table entry, the address ofactive neighbors through which packets for the given destination are received is also maintained. A neighbor is considered active for that destination if it originates or relays at least one packet for that destination within the most recent active time-out period. his information is maintained so that all active source nodes can be notiied when a link along a path to the destination breaks. A route entry is considered active if it is in use by any active neighbors. he path from a source to a destination, which is followed by packets along active route entries, is called an “active path.” A mobile node maintains a route table entry for each destination of interest. Each route table entry contains the following information: Another important parameter associated with routing entries is the route caching time-out, or the time after which the route is considered to be invalid. In each routing table entry, the address of active neighbors through which packets for the given destination are received is 3.4.4.4 Route Table Management R O U TIN G P R O T O C O L S 10 5 also maintained. A neighbor is considered active for that destination if it originates or relays at least one packet for that destination within the most recent active time-out period. his information is maintained so that all active source nodes can be notiied when a link along a path to the destination breaks. A route entry is considered active if it is in use by any active neighbors. he path from a source to a destination, which is followed by packets along active route entries, is called an “active path.” A mobile node maintains a route table entry for each destination of interest. Each route table entry contains the following information: • • • • • • Destination Next hop Number of hops (metric) Sequence number for the destination Active neighbors for this route Expiration time for the route table entry Each time a route entry is used to transmit data from a source toward a destination, the time-out for the entry is reset to the current time plus active route time-out. If a new route is ofered to a mobile node, the mobile node compares the destination sequence number of the new route to the destination sequence number for the current route. he route with the greater sequence number is chosen. If the sequence numbers are the same, then the new route is selected only if it has a smaller metric (fewer numbers of hops) to the destination. Movement of nodes not lying along an active path does not afect the routing to that path’s destination. If the source node moves during an active session, it can reinitiate the route discovery procedure to establish a new route to the destination. When either the destination or some intermediate node moves, a special RREP is sent to the afected source nodes. Periodic hello messages can be used to ensure symmetric links, as well as to detect link failures. Once the next hop becomes unreachable, the node upstream of the break propagates an unsolicited RREP with a fresh sequence number—that is, a sequence number that is one greater than the previously known sequence number—and hop count to all active upstream 3.4.4.5 Path Maintenance 10 6 A D H O C M O BIL E WIREL E S S NE T W O RKS neighbors. hose nodes subsequently relay that message to their active neighbors and so on. his process continues until all active source nodes are notiied. It terminates because AODV maintains only loopfree routes and there are only a inite number of nodes in the ad hoc network. When the source node receives the broken link if the source still requires restarting of the discovery process of inding the route to destination, it can start. To determine whether a route is still needed, a node may check whether the route has been used recently as well as inspect upper level protocol control blocks to see whether connections remain open using the indicated destination. If the source node or any other node along the previous route decides that it would like to rebuild the route to the destination, it sends out an RREQ with a destination sequence number of one greater than the previously known sequence number to ensure that it builds a new viable route and that no nodes reply if they still regard the previous route as valid. Whenever a node receives a broadcast from a neighbor it updates its local connectivity information to ensure that it includes this neighbor. In the event that a node has not sent any packets to all of its active downstream neighbors within a hello interval, it broadcasts a hello message to its neighbors. he node’s sequence number is not changed for hello message transmissions. his hello message is prevented from being rebroadcast outside the neighborhood of the node because it contains a Time_To_Live (TTL) value of one. Neighbors that receive this packet update their local connectivity information to the node. Receiving a broadcast or a hello from a new neighbor or failing to receive allowed hello loss consecutive hello messages from a node previously in the neighborhood is an indication that the local connectivity has changed. 3.4.4.6 Local Connectivity Management 3.4.5 Dynamic Source Routing (DSR) Protocol he DSR protocol is a simple and eicient routing protocol designed speciically for use in multihop wireless ad hoc networks. In DSR each node dynamically discovers a path to the destination. Each data R O U TIN G P R O T O C O L S 10 7 packet sent carries in its header the complete information about the list of nodes that it has to traverse to reach the destination and avoids the need for up-to-date routing information in the intermediate nodes through which the packet is forwarded. By including this source route in the header of each data packet, other nodes forwarding or overhearing any of these packets may also easily cache this routing information for future use. he DSR protocol is composed of two mechanisms that work together to allow the discovery and maintenance of source routes in the ad hoc network: 3.4.5.1 Overview and Important Properties of the Protocol • Route discovery is the mechanism by which a node, S, wishing to send a packet to a destination node, D, obtains a source route to D. Route discovery is used only when S attempts to send a packet to D and does not already know a route to D. • Route maintenance is the mechanism by which node S is able to detect, while using a source route to D, if the network topology has changed such that it can no longer use its route to D because a link along the route no longer works. When route maintenance indicates that a source route is broken, S can attempt to use any other route it happens to know to D, or it can invoke route discovery again to ind a new route. Route maintenance is used only when S is actually sending packets to D. 3.4.5.2 Basic DSR Route Discovery When some node S originates a new packet destined to some other node D, it places in the header of the packet a source route giving the sequence of hops that the packet should follow on its way to D. Normally, S will obtain a suitable source route by searching its route cache of routes previously learned, but if no route is found in its cache, it will initiate the route discovery protocol to ind a new route to D dynamically. In this case, we call S the initiator and D the target of the route discovery. For example, Figure 3.3 illustrates an example route discovery in which a node A is attempting to discover a route to node E. To initiate the route discovery, A transmits a ROUTE REQUEST message as a single local broadcast packet, which is received by (approximately) 10 8 A D H O C M O BIL E WIREL E S S NE T W O RKS all nodes currently within wireless transmission range of A. Each ROUTE REQUEST message identiies the initiator and target of the route discovery and contains a unique request id determined by the initiator of the REQUEST. Each ROUTE REQUEST also contains a record listing the address of each intermediate node through which this particular copy of the ROUTE REQUEST message has been forwarded. his route record is initialized to an empty list by the initiator of the route discovery. When another node receives a ROUTE REQUEST, if it is the target of the route discovery, it returns a ROUTE REPLY message to the initiator of the route discovery, giving a copy of the accumulated route record from the ROUTE REQUEST; when the initiator receives this ROUTE REPLY, it caches this route in its route cache for use in sending subsequent packets to this destination. If this node receiving the ROUTE REQUEST has recently seen another ROUTE REQUEST message from this initiator bearing this same request ID, or if it inds that its own address is already listed in the route record in the ROUTE REQUEST message, it discards the REQUEST. Otherwise, this node appends its own address to the route record in the ROUTE REQUEST message and propagates it by transmitting it as a local broadcast packet (with the same request ID). In returning the ROUTE REPLY to the initiator of the route discovery, such as node E replying back to A in Figure, node E will typically examine its own route cache for a route back to A, and if one is found, will use it for the source route for delivery of the packet containing the ROUTE REPLY. Otherwise, E may perform its own route discovery for target node A, but to avoid possible ininite recursion of route discoveries, it must piggyback this ROUTE REPLY on its own ROUTE REQUEST message for A. It is also possible to piggyback other small data packets, such as a transmission control protocol (TCP) synchronization (SYN) packet, on a ROUTE REQUEST using this same mechanism. Node E could also simply reverse the sequence of hops in the route record that it is trying to send in the ROUTE REPLY and use this as the source route on the packet carrying the ROUTE REPLY itself. For MAC protocols such as IEEE 802.11 that require a bidirectional frame exchange as part of the MAC protocol, this route reversal is preferred as it avoids the overhead of a possible second route R O U TIN G P R O T O C O L S 10 9 discovery, and it tests the discovered route to ensure that it is bidirectional before the route discovery initiator begins using the route. However, this technique will prevent the discovery of routes using unidirectional links. In wireless environments where the use of unidirectional links is permitted, such routes may in some cases be more eicient than those with only bidirectional links, or may be the only way to achieve connectivity to the target node. When a route discovery is initiated, the source node maintains a copy of the original packet in a local bufer called the send bufer. he send bufer contains a copy of each packet that cannot be transmitted by this node because it does not yet have a source route to the packet’s destination. Each packet in the send bufer is stamped with the time that it was placed into the bufer and is discarded after residing in the send bufer for some time-out period; if necessary for preventing the send bufer from overlowing, a FIFO or other replacement strategy can also be used to evict packets before they expire. While a packet remains in the send bufer, the node should occasionally initiate a new route discovery for the packet’s destination address. However, the node must limit the rate at which such new route discoveries for the same address are initiated, since it is possible that the destination node is not currently reachable. In particular, due to the limited wireless transmission range and the movement of the nodes in the network, the network may at times become partitioned, meaning that there is currently no sequence of nodes through which a packet could be forwarded to reach the destination. Depending on the movement pattern and the density of nodes in the network, such network partitions may be rare or may be common. If a new route discovery was initiated for each packet sent by a node in such a situation, a large number of unproductive ROUTE REQUEST packets would be propagated throughout the subset of the ad hoc network reachable from this node. To reduce the overhead from such route discoveries, we use exponential back-of to limit the rate at which new route discoveries may be initiated by any node for the same target. If the node attempts to send additional data packets to this same node more frequently than this limit, the subsequent packets should be bufered in the send buffer until a ROUTE REPLY is received, but the node must not initiate a new route discovery until the minimum allowable interval between 110 A D H O C M O BIL E WIREL E S S NE T W O RKS new route discoveries for this target has been reached. his limitation on the maximum rate of route discoveries for the same target is similar to the mechanism required by Internet nodes to limit the rate at which ad hoc routing protocol REQUESTs are sent for any single target IP address. When originating or forwarding a packet using a source route, each node transmitting the packet is responsible for conirming that the packet has been received by the next hop along the source route; the packet is retransmitted (up to a maximum number of attempts) until this conirmation of receipt is received. For example, in the situation illustrated in Figure, node A has originated a packet for E using a source route through intermediate nodes B, C, and D. In this case, node A is responsible for receipt of the packet at B, node B is responsible for receipt at C, node C is responsible for receipt at D, and node D is responsible for receipt inally at the destination E. he conirmation of receipt can be provided as in a standard part of the MAC protocol or by a possible acknowledgment (e.g., node B conirms whether the packet has reached node C by overhearing at the time when C forwards the packet to D). If neither of these conirmation mechanisms is available, the node transmitting the packet may set a bit in the packet’s header to request a DSR-speciic software acknowledgment be returned by the next hop. his software acknowledgment will normally be transmitted directly to the sending node, but if the link between these two nodes is unidirectional, this software acknowledgment may travel over a diferent, multihop path. If the packet is retransmitted by some hop the maximum number of times and no receipt conirmation is received, this node returns a ROUTE ERROR message to the original sender of the packet, identifying the link over which the packet could not be forwarded. For example, in Figure 3.3, if C is unable to deliver the packet to the next hop D, then C returns a ROUTE ERROR to A, stating that the link from C to D is currently “broken.” Node A then removes this broken link from its cache; any retransmission of the original packet is a function for upper layer protocols such as TCP. 3.4.5.3 Basic DSR Route Maintenance R O U TIN G P R O T O C O L S 111 For sending such a retransmission or other packets to this same destination E, if A has another route to E in its route cache (for example, from additional ROUTE REPLYs from its earlier route discovery, or from having overheard suicient routing information from other packets), it can send the packet using the new route immediately. Otherwise, it may perform a new route discovery for this target. 3.4.6 Temporally Ordered Routing Algorithm (TORA) TORA is a distributed routing protocol. Its intended use is for routing of Internet protocol (IP) datagrams within an autonomous system. he protocol’s reaction is structured as a temporally ordered sequence of difusing computations, each computation consisting of a sequence of directed link reversals. he protocol is highly adaptive, eicient, and scalable; it is well suited for use in large, dense mobile networks. Depending upon the topological changes, ordering of the algorithm reaction will change subsequently in this protocol. In order to suit the operation in various environmental challenges, TORA was designed with the following properties: • • • • Distributed in nature Provides loop-free and multiple routes Establishes routes quickly Minimizes communication TORA can be separated into three basic functions: creating routes, maintaining routes, and erasing routes: • Creating a route from a given node to the destination requires establishment of a sequence of directed links leading from the node to the destination. his function is only initiated when a node with no directed links requires a route to the destination. hus, creating routes essentially corresponds to assigning directions to links in an undirected network or portion of the network. he method used to accomplish this is an adaptation of the query/reply process, which builds a directed acyclic graph (DAG) rooted at the destination. 112 A D H O C M O BIL E WIREL E S S NE T W O RKS • Maintaining routes refers to reacting to topological changes in the network in a manner such that routes to the destination are re-established within a inite time—meaning that its directed portions return to a destination-oriented DAG within a inite time. • his leads to the third function: erasing routes. Upon detection of a network partition, all links must be marked as undirected to erase invalid routes. TORA accomplishes these three functions through the use of three distinct control packets: query (QRY), update (UPD), and clear (CLR). QRY packets are used for creating routes, UPD packets are used for both creating and maintaining routes, and CLR packets are used for erasing routes. 3.4.7 Cluster-Based Routing Protocol (CBRP) CBRP is a routing protocol designed for mobile ad hoc networks. he protocol divides the nodes of the ad hoc network into two-hopdiameter clusters in a distributed manner. A cluster head is elected for each cluster to maintain cluster information. Intercluster routes are discovered dynamically using the cluster membership information kept at each cluster head. Because of the cluster concept, this protocol eiciently minimizes the looding traic during route discovery and speeds up this process as well. Furthermore, this protocol works for unidirectional links and uses these links for both intracluster and intercluster routing. he two major new features that have been added to the protocol are route shortening and local repair. Both features make use of the two-hop topology information maintained by each node through the broadcasting of HELLO messages. he route shortening mechanism dynamically shortens the source route of the data packet being forwarded and informs the source about the better route. Local route repair patches a broken source route automatically and avoids route rediscovery by the source. When a routing protocol is designed for ad hoc networks, the many challenges of dynamically changing topology and infrastructure that make IP subnetting ineicient. However, routing protocols that are R O U TIN G P R O T O C O L S 113 lat (i.e., have no hierarchy) might sufer from excessive overhead when scaled up. Finally, links in mobile networks could be asymmetric at times. CBRP has the following features: • It is a fully distributed operation. • here is less looding traic during the dynamic route discovery process. • here is explicit exploitation of unidirectional links that would otherwise be unused. • Broken routes can be repaired locally without rediscovery. • Suboptimal routes can be shortened as they are used. In these protocols, clusters are introduced to minimize updating overhead during topology change. However, the overhead for maintaining up-to-date information about the whole network’s cluster membership and intercluster routing information at each and every node in order to route a packet is considerable. As network topology changes from time to time due to node movement, the efort to maintain such up-to-date information is expensive and rarely justiied, as such global cluster membership information is obsolete long before it is used. 3.4.8 Location-Aided Routing (LAR) he LAR protocols use location information to reduce the search space for a desired route. Limiting the search space results in fewer route discovery messages. In order to improve performance of routing protocols by using location information, we show how a route discovery protocol based on looding can be improved by describing the route discovery algorithm using looding. Consider that a source node, S, needs to ind a route to destination node D. Node S broadcasts a route request (RREQ ) message to all its neighbors. On receiving a route request message, a node (say, X) compares the desired destination with its own identiier. If a comparison matches, then the request is for a route to itself (i.e., node X). Otherwise, node X broadcasts the request to its neighbors 3.4.8.1 Route Discovery Using Flooding 114 A D H O C M O BIL E WIREL E S S NE T W O RKS C A S Route request F D B E Figure 3.5 Illustration of location aided routing (LAR). to avoid redundant transmissions of route requests. Node X only broadcasts a particular route request once (repeated reception of a route request is detected using sequence numbers). Figure 3.5 illustrates this algorithm. In this igure, node S needs to determine a route to node D. herefore, node S broadcasts a route request to its neighbors. When nodes B and C receive the route request, they forward it to all their neighbors. When node F receives the route request from B, it forwards the request to its neighbors. However, when node F receives the same route request from C, node F simply discards the route request. As the route request is propagated to various nodes, the path followed by the request is included in the route request packet. Using the looding algorithm, provided that the intended destination is reachable from the sender, the destination should eventually receive a route request message. On receiving the route request, the destination responds by sending a route reply message to the sender; this message follows a path that is obtained by reversing the path followed by the route request received by D (the route request message includes the path traversed by the request). he destination may not receive the route request due to unreachability of a node or due to loss of route request because of transmission errors. In such cases, the sender needs to be able to reinitiate route discovery. herefore, when a sender initiates route discovery, it sets a time-out. If, within the time-out interval a route reply is not reached, then a new route discovery is initiated. Time-out may 115 R O U TIN G P R O T O C O L S occur if the destination does not receive a route request, or if the route reply message from the destination is lost. 3.4.9 Ant-Colony-Based Routing Algorithm (ARA) ARA is a new on-demand routing algorithm for ad hoc networks. he protocol is based on group intelligence—especially on the ant colony base. his routing protocol is highly adaptive, eicient, and scalable. he main goal in the design of the protocol was to reduce the overhead for routing. Ant algorithms are multiagent systems consisting of agents with the behavior of individual ants, as shown in Figure 3.6. he basic idea of the ant colony optimization is taken from the food searching behavior of ants. When ants are on their way to search for food, they start from their nest and walk toward the food. When an ant reaches an intersection, it has to decide which branch to take next. While walking, ants deposit pheromone, which marks the route taken. he concentration of pheromone deposited on a certain path is an indication of its usage. With time the concentration of pheromone decreases due to difusion efects. his property is important because it is integrating a dynamic component into the path-searching process. Figure 3.6 shows a scenario with two routes from the nest to the food place. At the intersection, the irst ants randomly select the next branch. Because the lower route is shorter than the upper one, the ants that take this path will reach the food place irst. On their way back to the nest, the ants again have to select a path. After a short time, the pheromone concentration on the shorter path will be higher than on the longer path, because the ants using the shorter path will increase the pheromone concentration faster. he shortest path will thus be identiied and eventually all ants will use this one. 3.4.9.1 Basic Ant Algorithm Nest Figure 3.6 Behavior of individual ants. Food 116 A D H O C M O BIL E WIREL E S S NE T W O RKS his behavior of the ants can be used to ind the shortest path in networks. Especially, the dynamic component of this method allows a high adaptation to changes in mobile ad hoc network topology, since in these networks the existence of links is not guaranteed and link changes occur very often. 3.5 Hybrid Routing Protocols Hybrid routing protocols are a new generation of protocol that are both proactive and reactive in nature. hese protocols are designed to increase scalability by allowing nodes with close proximity to work together to form some sort of a backbone to reduce the route discovery overheads. In hybrid routing protocols, a proactive method is employed to maintain routes for nearby nodes; a reactive or route discovery method is used for faraway nodes. Most hybrid protocols proposed to date are zone based, which means that the network is partitioned or seen as a number of zones by each node. Others group nodes are formed into trees or clusters. A number of diferent hybrid routing protocols have been proposed for MANETs: • • • • • Zone routing protocol (ZRP) Zone-based hierarchical link state (ZHLS) Scalable location updates routing protocol (SLURP) Distributed spanning trees-based routing protocol (DST) Distributed dynamic routing (DDR) 3.5.1 Zone Routing Protocol (ZRP) he advantages of both proactive and reactive approaches are combined by maintaining an up-to-date topological map of each zone centered at each node. Within the zone, routes can be immediately found by using a proactive method. 3.5.1.1 Motivation Proactive routing uses excess bandwidth to maintain routing information, while reactive routing involves long routerequest delays. Reactive routing also ineiciently loods the entire network for route determination. ZRP aims to address the problems 117 R O U TIN G P R O T O C O L S by combining the best properties of both approaches. ZRP can be classed as a hybrid reactive/proactive routing protocol. In an ad hoc network, it can be assumed that the largest part of the traic is directed to nearby nodes. herefore, ZRP reduces the proactive scope to a zone centered on each node. In a limited zone, the maintenance of routing information is easier. Further, the amount of routing information that is never used is minimized. Still, nodes farther away can be reached with reactive routing. Since all nodes proactively store local routing information, route requests can be more eiciently performed without querying all the network nodes. In spite of using the zones, ZRP makes use of lat view over the network. Because of this, the organization overhead of maintaining hierarchical networks can be avoided. Nodes belonging to diferent subnets must send their communication to a subnet that is common to both nodes. his may congest parts of the network. ZRP can be categorized as a lat protocol because the zones overlap. Hence, optimal routes can be detected and network congestion can be reduced. he zone routing protocol, as its name implies, is based on the concept of zones. For each node, a separate routing zone is speciied, and the zones of neighboring nodes overlap. he routing zone has a radius ρ expressed in hops. he zone thus includes the nodes, whose distance from the node in question is, at most, h hops. An example routing zone is shown in Figure 3.7, where the routing zone of S includes the nodes A–I, but not K. In the illustration, the radius is marked as a circle around the node in question. 3.5.1.2 Architecture H G C B D A S F E J Figure 3.7 Example of a routing zone with r = 2. I K 118 A D H O C M O BIL E WIREL E S S NE T W O RKS he nodes of a zone are divided into peripheral nodes and interior nodes. he nodes whose minimum distance to the central node is exactly equal to the zone radius ρ are called peripheral nodes. he nodes whose minimum distance is less than ρ are interior nodes. In Figure 3.7, the nodes A–F are interior nodes; the nodes G–J are peripheral nodes and the node K is outside the routing zone. Note that node H can be reached by two paths: one with a length two hops and one with a length of three hops. he node is, however, within the zone because the shortest path is less than or equal to the zone radius. By adjusting the transmission power of the nodes, the number of nodes in the routing zone can be regulated. Lowering the power reduces the number of nodes within direct reach and vice versa. he number of neighboring nodes should be suicient to provide adequate reachability and redundancy. On the other hand, a too large coverage results in many zone members and the update traic becomes excessive. Further, large transmission coverage adds to the probability of local contention. ZRP refers to the locally proactive routing protocol as the intrazone routing protocol (IARP) and the globally reactive routing protocol as the interzone routing protocol (IERP). Instead of broadcasting packets, ZRP uses a concept called bordercasting. Bordercasting directs query requests to the border of the zone by the information provided by IARP. he bordercast packet delivery service is provided by the bordercast resolution protocol (BRP). BRP uses a map of an extended routing zone to construct bordercast trees for the query packets. Alternatively, it uses source routing based on the normal routing zone. By employing query control mechanisms, route requests can be directed away from areas of the network that already have been covered. ZRP relies on a neighbor discovery protocol (NDP) to detect new neighbor nodes and link failures provided by the media access control (MAC) layer. NDP transmits “HELLO” beacons at regular intervals. Upon receiving a beacon, the neighbor table is updated. Neighbors for which no beacon has been received within a speciied time are removed from the table. If the MAC layer does not include an NDP, the functionality must be provided by IARP. he relationship between the components is illustrated in Figure 3.8. Route updates are triggered by NDP, which notiies IARP when the neighbor table is updated. IERP uses the routing table of IARP to respond to route 119 R O U TIN G P R O T O C O L S ZRP                        Figure 3.8 Zone routing protocol architecture. queries. IERP forwards queries with BRP, which uses the routing table of IARP to guide route queries away from the query source. 3.5.1.3 Routing if any node wants to send the packet it irst checks whether the destination is within its local zone, using information provided by IARP. If it is within the zone, the packet can be routed proactively. Reactive routing is used if the destination is outside the zone. he process of reactive routing is divided into two phases: the route request phase and the route reply phase. In the route request, the source sends a route request packet to its peripheral nodes using BRP. If the receiver of a route request packet knows the destination, it responds by sending a route reply back to the source. Otherwise, it continues the process by bordercasting the packet. In this way, the route request spreads throughout the network. If several copies of the same route request are received by a node, these are considered redundant and are discarded. he reply is sent by any node that can provide a route to the destination. To be able to send the reply back to the source node, routing information must be collected when the request is sent through the network. he information is recorded either in the route request packet or as next-hop addresses in the nodes along the path. he zone radius is an important property for the performance of ZRP. If a zone radius of one hop is used, routing is purely reactive. If the radius approaches ininity, routing is reactive. he selection of radius is a trade-of between the routing eiciency of proactive routing and the increasing traic for maintaining the view of the zone. 12 0 A D H O C M O BIL E WIREL E S S NE T W O RKS Route maintenance is especially important in ad hoc networks, where links are broken and established as nodes move relatively to each other with limited radio coverage. In purely reactive routing protocols, until the new route is available, if any link fails, packets are dropped or, in some cases, delayed. In ZRP, the knowledge of the local topology can be used for route maintenance. Link failures and suboptimal route segments within one zone can be bypassed. Incoming packets can be directed around the broken link through an active multihop path. Similarly, the topology can be used to shorten routes—for example, when two nodes have moved within each other’s radio coverage. For source-routed packets, a relaying node can determine the closest route to the destination that is also a neighbor. Sometimes, a multihop segment can be replaced by a single hop. If next-hop forwarding is used, the nodes can make locally optimal decisions by selecting a shorter path. 3.5.1.4 Route Maintenance 3.5.2 Zone-Based Hierarchical Link State (ZHLS) ZHLS is a hierarchical routing protocol, and it is a zone-based hierarchical LSR protocol that makes use of location information in a novel peer-to-peer hierarchical routing approach. he network is divided into zones that do not overlap. Aggregating nodes into zones conceals the detail of the network topology. Initially, each node knows its own position and therefore zone ID through GPS. After the network is established, each node knows the low-level (node level) topology about node connectivity within its zone and the high-level (zone level) topology about zone connectivity of the whole network. A packet is forwarded by specifying the hierarchical address—zone ID and node ID—of a destination node in the packet header. When compared to other hierarchical protocols, there are no cluster heads in this protocol. he high-level topological information is distributed to all nodes (i.e., in a peer-to-peer manner). his peerto-peer characteristic avoids traic bottleneck, prevents single point of failure, and simpliies mobility management. Similar to ZRP, ZHLS is a hybrid reactive/proactive scheme. It is proactive if the destination is within the same zone of the source. Otherwise, it is reactive because it has to search the location to ind the zone ID of the destination. R O U TIN G P R O T O C O L S 121 ZHLS requires GPS, which is not similar to ZRP and maintains a high-level hierarchy for interzone routing. Location search is performed by unicasting one location request to each zone. Routing is done by specifying the zone ID and the node ID of the destination, instead of specifying an ordered list of all the intermediate nodes between the source and the destination. Intermediate link breakage may not cause any subsequent location search. Since the network consists of nonoverlapping zones in ZHLS, frequency reuse is readily deployable in ZHLS. he network is divided into zones under ZHLS. By making use of certain geolocation techniques such as GPS, each node knows its physical location; then, it can determine its zone ID by mapping its physical location to a zone map, which has to be worked out at the design stage. he size of the zone depends on as the following characteristics: node mobility, network density, transmission power, and propagation characteristics. he partitioning can be based on simple geographic partitioning or on radio propagation partitioning. he geographic partitioning is much simpler and does not require any measurement of radio propagation characteristics, whereas the radio propagation partitioning is more accurate for frequency reuse. 3.5.2.1 Zone Map Two levels of topology are deined in ZHLS: node level topology and zone level topology. A physical link exists if any two nodes are within the communication range. he node level topology (Figure 3.9) provides the information on how the nodes are connected together by these physical links. For example, in Figure 3.9, if node “a” wants to send a data packet to node “i, ” the data must pass through a–b–c–f. If there is at least one physical link connecting any two zones, a virtual link then exists. To facilitate this hierarchical routing, two types of link-state packets (LSPs) are received by each node: node LSPs and zone LSPs. he node LSP of a particular node contains a list of its connected neighbors and is propagated locally within its zone. he zone LSP contains a list of its connected zones and is propagated globally throughout the network. 3.5.2.2 Hierarchical Structure of ZHLS 12 2 A D H O C M O BIL E WIREL E S S NE T W O RKS I K C D B H J S A E G F Figure 3.9 Node-level topology. 3.5.3 Distributed Dynamic Routing (DDR) Protocol DDR is a hybrid approach based on zones that are not overlapped. In these types of protocols, each node is required to know only the next hop to all the nodes within its zone. his reduces routing information and bandwidth utilization. Each node keeps only the zone connectivity of its neighboring zones. he zone size again depends on the availability of neighbors. he zone names in DDR are assigned dynamically by some selected zone members. DDR avoids broadcasting by sending only the necessary information embedded in beacons to the neighboring nodes. he DDR also reduces maintenance cost and radio resource consumption overhead and leads to a stand-alone network. As there is no concept of network in DDR, there is no chance of a single point of failure. he working of the DDR protocol can be divided into six phases: preferred neighbor election, intratree clustering, intertree clustering, forest construction, zone naming, and zone partitioning. Based on the information received at the beacon, each of these phases is executed. Each of these phases is executed based on information received in the beacon message. A node can determine its neighbor based on ID number and the degree of neighboring nodes. After this, a forest is constructed by connecting each node to its preferred neighbor. Next, the intratree clustering algorithm is initiated to determine the structure of the zone and to build up the intratree routing table. his is then followed by the intertree algorithm to determine the connectivity with the neighbor- R O U TIN G P R O T O C O L S 12 3 ing zones. hen a zone name is assigned depending on ID number, node degree, or node stability during its lifetime in the zone. By making use of diferent networks, a forest is constructed that contains a set of trees from a zone. he network is partitioned into a set of nonoverlapping dynamic zones constructed via gateway nodes. So the whole network can be seen as a set of connected zones. he size of the zone increases or decreases dynamically depending on some network failure such as node density/mobility, rate of connection/disconnection, and transmission process. 3.6 Summary Mobile networks can be classiied into infrastructure networks and mobile ad hoc networks according to their dependence on ixed infrastructures. In an infrastructure mobile network, mobile nodes have wired access points (or base stations) within their transmission range. he access points compose the backbone for an infrastructure network. In contrast, mobile ad hoc networks are autonomously selforganized networks without infrastructure support. he routing architecture of self-organized networks can be either hierarchical or lat. In most self-organized networks, the hosts will be acting as independent routers, thus implying that routing architecture should conceptually be lat; that is, each address serves only as an identiier and does not convey any information about one host being topologically located with respect to any other node. Mobility management is not often necessary in a lat, self-organized network, as all of the nodes are visible to each other via routing protocols. All existing routing protocols assume that all mobile hosts have the same properties based on the spirit of a self-organized network as a collection of “equal” peers opportunistically using each other’s services to communicate. Although this is true in some circumstances, in some situations the network will include hosts with preponderant bandwidth, guaranteed power supply, and high-speed wireless links. Such hosts are referred to as superhosts. QoS routing provides support to control efectively the total traic that can low into the network. QoS routing is a routing mechanism under which paths for lows are determined according to resource availability in the network as well as the QoS 12 4 A D H O C M O BIL E WIREL E S S NE T W O RKS requirement of lows. QoS routing means that it selects routes with suicient resources for the requested QoS parameters. Multicast routing sends a single copy of a data packet simultaneously to multiple receivers over a communication link that is shared by the paths to the receivers. he sharing of links in the collection of the paths to receivers implicitly deines a tree used to distribute multicast packets. In contrast to unicast routing, multicast routing is a very useful and eicient way to support group communication. his is especially the case in self-organized networks where bandwidth is limited and energy is constrained. In addition, a self-organized network often consists of several cooperative work groups. A proactive routing protocol is also called a “table-driven” routing protocol. In these protocols, nodes try to evaluate the routing tables continuously to maintain consistent, up-to-date routing information. herefore, a source node can get a routing path immediately if it needs one. Reactive routing protocols for mobile ad hoc networks are also called “on-demand” routing protocols. In a reactive routing protocol, routing paths are searched only when necessary. A route discovery operation invokes a route determination procedure. he discovery procedure terminates when either a route has been found or no route is available after examination for all route permutations. Hybrid routing protocols are proposed to combine the merits of both proactive and reactive routing protocols and overcome their shortcomings. Normally, hybrid routing protocols for mobile ad hoc networks exploit hierarchical network architectures. Proper proactive routing approaches and reactive routing approaches are exploited in diferent hierarchical levels. Problems 3.1 Explain the classiication of mobile ad hoc networks based on infrastructure. 3.2 Discuss briely the design issues in developing a routing protocol. 3.3 List the factors that will make wireless links unidirectional in ad hoc networks. R O U TIN G P R O T O C O L S 12 5 3.4 Give suitable reasons why a traditional multicast routing protocol cannot be used in ad hoc networks. 3.5 Explain a proactive routing protocol with suitable examples. 3.6 Describe a wireless routing protocol with a neat diagram. 3.7 Discuss how routing is done using the destination-sequenced distance-vector protocol. 3.8 Explain how multipoint relays are used in the optimized linkstate routing protocol. 3.9 How is message reduction done in isheye state routing? 3.10 Explain a reactive routing protocol with an example. 3.11 Explain the ad hoc on-demand distance-vector routing protocol with a proper illustration. 3.12 Describe dynamic source routing used in ad hoc networks. 3.13 How is the temporally ordered routing algorithm used to route the packets in ad hoc networks? 3.14 Explain how the cluster-based routing protocol reduces overhead packets in ad hoc networks. 3.15 Discuss location-aided routing with an appropriate example. 3.16 With a suitable real-time example, explain the ant-colonybased routing algorithm. 3.17 Explain hybrid routing protocols with an example. 3.18 Explain the zone routing protocol with a neat diagram. 3.19 Discuss the zone-based hierarchical link-state routing protocol deployed in ad hoc networks. 3.20 Describe the scalable location updates routing protocol using a suitable example. 3.21 How does a distributed spanning trees-based routing protocol work well in ad hoc networks, and what are its disadvantages? 3.22 Explain distributed dynamic routing with a suitable example. 3.23 Explain the pros and cons of the DSDV routing protocol. 3.24 Discuss the pros and cons of the DSR protocol. 3.25 Describe the IMEP protocol in brief. 3.26 Discuss the beneits and disadvantages of the STAR protocol. 12 6 A D H O C M O BIL E WIREL E S S NE T W O RKS Bibliography Abolhasan, M., T. Wysocki, and E. Dutkiewicz. 2004. A review of routing protocols for mobile ad hoc networks. Elsevier Journal of Ad Hoc Networks 2 (1): 1–22. Adams, A., J. Nicholas, and W. Siadak. 2003. Protocol independent multicast—Dense mode (PIM-DM): Protocol speciication (revised). IETF draft, February 2003. Basagni, S., I. Chlamtac, V. R. Syrotivk, and B. A. Woodward. 1998. A distance efect algorithm for mobility (DREAM). Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM’98), Dallas, TX, 1998. Bellur, B., R. G. Ogier, and F. L Templin. 2003. Topology broadcast based on reverse-path forwarding routing protocol (TBRPF). Internet draft, draftietf-manet-tbrpf-06.txt (work in progress). Corson, M. S., and A. Ephremides. 1995. A distributed routing algorithm for mobile wireless networks. ACM/Baltzer Wireless Networks 1 (1): 61–81. Corson, S., and J. Macker. RFC 2501: Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. Internet draft (draft-ietf-manet-issues-01.txt). Das, S., C. Perkins, and E. Royer. 2000. Performance comparison of two ondemand routing protocols for ad hoc networks. INFOCOM 2000, pp. 3–12. ———. 2002. Ad hoc on demand distance vector (AODV) routing. Internet draft (draft-ietf-manetaodv-11.txt), work in progress. Fenner, F., M. Handley, H. Holbrook, and I. Kouvelas. 2002. Protocol independent multicast—Sparse mode (PIM-SM): Protocol speciication (revised). IETF draft, December 2002. Ford, L. R., and D. R. Fulkerson. 1962. Flows in networks. Princeton, NJ: Princeton University Press. Gerla, M. 2002. Fisheye state routing protocol (FSR) for ad hoc networks. Internet draft (draftietf-manet-aodv-03.txt), work in progress. Geunes, M., U. Sorges, and I. Bouazizi. 2002. ARA: he ant-colony based routing algorithm for MANETs. ICPP Workshop on Ad Hoc Networks (IWAHN 2002), August, pp. 79–85. Hass, Z. J., and R. Pearlman. 1999. Zone routing protocol for ad-hoc networks. Internet draft (draftietf-manet-zrp-02.txt), work in progress. Hedrick, C. 1988. RFC 1058: Routing information protocol. Network Working Group, June 1988. IETF MANET charter. http://www.ietf.org/html.charters/manet-charter.html Jaquet, P., P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot. 2001. Optimized link state routing protocol for ad hoc networks. IEEE INMIC, Pakistan. Jiang, M., J. Ji, and Y. C. Tay. 1999. Cluster-based routing protocol. Internet draft (draft-ietfmanet-cbrp-spec-01.txt), work in progress. R O U TIN G P R O T O C O L S 12 7 Joa-Ng, M., and I-T. Lu. 1999. A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications 17 (8): 1415–1425. Johnson, D., D. Maltz, and J. Jetcheva. 2002. he dynamic source routing protocol for mobile ad hoc networks. Internet draft (draft-ietf-manetdsr-07.txt), work in progress. Ko, Y. B., and N. H. Vaidya. 1998. Location aid routing (LAR) in mobile ad hoc networks. Proceedings of the ACM/IEEE MOBICOM, Oct. 1998. Liu, C., and J. Kaiser. 2005. A survey of mobile ad hoc network routing protocols. University of Ulm technical report series, no. 2003-08, University of Ulm, Germany. Lu, Y., W. Wang, Y. Zhong, and B. Bhargava. 2003. Study of distance vector routing protocols for mobile ad hoc networks. Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom’03). Meyer, R. A. PARSEC user manual. Los Angeles, CA: UCLA Parallel Computing Laboratory (http://pcl.cs.ucla.edu). Moy, J. 1994. RFC 1584: Multicast open shortest path irst (MOSPF). Network Working Group. ———. 1998. RFC 2328: OSPF version 2. Network Working Group. Murthy, S., and J. J. Garcia-Luna-Aceves. 1995. A routing protocol for packet radio networks. Proceedings of the First Annual ACM International Conference on Mobile Computing and Networking, Berkeley, CA, pp. 86–95. Nikaein, N., C. Bonnet, and N. Nikaein. 2001. HARP: Hybrid ad hoc routing protocol. Proceedings of IST 2001: International Symposium on Telecommunications, Tehran, Iran. Nikaein, N., H. Laboid, and C. Bonnet. 2000. Distributed dynamic routing algorithm (DDR) for mobile ad hoc networks. Proceedings of the MobiHOC 2000: First Annual Workshop on Mobile Ad Hoc Networking and Computing. NS-2, http://www.isi.edu/nsnam/ns/ OPNET Inc., http://www.opnet.com Park, V., and S. Corson. 1997. Temporally ordered routing algorithm (TORA), version 1, functional speciication. ETF Internet draft. Pei, G., M. Gerla, X. Hong, and C. Chiang. 1999. A wireless hierarchical routing protocol with group mobility. Proceedings of Wireless Communications and Networking, New Orleans, LA. Perkins, C. E., and T. J. Watson. 1994. Highly dynamic destination sequenced distance vector routing (DSDV) for mobile computers. ACM SIGCOMM ’94 Conference on Communications Architectures, London. Radhakrishnan, S., N. S. V. Rao, G. Racherla, C. N. Sekharan, and S. G. Batsell. 1999. DST: A routing protocol for ad hoc networks using distributed spanning trees. IEEE Wireless Communications and Networking Conference, New Orleans, LA. 12 8 A D H O C M O BIL E WIREL E S S NE T W O RKS Ramanathan, R., and M. Steenstrup. Hierarchically organized, multihop mobile wireless networks for quality of service. ACM/Baltzer Mobile Networks and Applications 3 (1): 101–119. Royer, E., and C-K. Toh. 1999. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6:46–55. Scalable Networks Inc. QualNet simulator software (http://www.scalablenetworks.com). Sinha, P., R. Sivakumar, and V. Bharghaven. 1999. CEDAR: A core-extraction distributed ad hoc routing algorithm. IEEE INFOCOM. Tanenbaum, A. S. 1996. Computer networks, 3rd ed. Upper Saddle River, NJ: Prentice Hall. Waitzman, D., C. Partridge, and S. Deering. 1988. RFC 1075: Distance vector multicast routing protocol. Network Working Group. Woo, S-C., and S. Singh. 2001. Scalable routing protocol for ad hoc networks. Wireless Networks 7 (5): 513–529. 4 M ULTI CAST ROUTIN G P ROTO CO L S 4.1 Introduction Wireless communication technology has been developed with two primary models. One is the ixed infrastructure-based model in which many of the nodes are mobile and connected through ixed backbone nodes using a wireless medium. Another model is the mobile ad hoc network (MANET). MANETs can be deined as a collection of mobile nodes (MNs) that are self-organizing and cooperative to ensure eicient and accurate packet routing between nodes (and to the base station also). here are no speciic routers, servers, or access points for MANETs. Because of their speed and ease of deployment, robustness, and low cost, MANETs can be applied in ields such as military applications (i.e., to create a temporary network in the battleield); search and rescue operations; temporary networks within meeting rooms; airports; vehicle-to-vehicle communication in smart transportation; establishing personal area networks connecting mobile devices like mobile phones, laptops, and smart watches; and other wearable computers, etc. To develop a routing protocol for wireless environments with mobility is very diferent from and more complex than developing those for wired networks with static nodes. he main problem in mobile ad hoc networks is limited bandwidth and frequent change in the topology. Although there are lots of routing protocols that can be used for unicast and multicast communication within MANETs, it observes that any one protocol cannot it in all the diferent scenarios, diferent topologies, and traic patterns of mobile ad hoc networks applications. For example, proactive routing protocols are very useful for small-scale MANETs with 12 9 13 0 A D H O C M O BIL E WIREL E S S NE T W O RKS high mobility, while reactive routing protocols are very useful for a large-scale MANETs with moderate or fewer topology changes. Another set of routing protocols, known as hybrid routing protocols, will try to balance between the two—for example, proactive for neighborhoods and reactive for far away. Apart from this multicast is another category of routing protocol in MANETs that eiciently supports the group communication with the high throughput. he use of multicasting within MANETs has many beneits. It can decrease the cost of wireless communication and increase the eiciency and throughput of the wireless link between two nodes whenever multiple copies of the same messages are sent by the inherent broadcasting properties of wireless transmission. In place of sending the same data through multiple unicasts, multicasting decreases channel capacity consumption, sender nodes and router processing, energy utilization, and data delivery delay, which are important for MANETs. If the mobile nodes in the MANET move too quickly, they have to be repaired in order to broadcast to achieve node-to-node communication. Each of the routing protocols has its advantages and disadvantages with regard to speciic applications. he routing protocols should be designed in such a way that they minimize control traic overhead; at the same time, they should be capable of rapidly linking failure and addition caused by node movements. Multicasting consists of concurrently sending the same message from one source to multiple destinations; it can be used in video conferencing, distance education, cooperative work, video on demand, replicated database updating and querying, etc. 4.2 Issues in Design of Multicast Routing Protocols 1. Scalability: A multicast protocol is scalable with constraints. 2. Address coniguration: Diferent multicast groups have different addresses; reuse of a multicast group’s address does not happen. Node movement causes synchronization of multicast addresses—a diicult task. 3. Multicast service support: Multicast participants should be able to join or leave the group on their own. MULTI C A S T R O U TIN G P R O T O C O L S 131 4. Security: he intruder should be stopped from joining an ongoing multicast session or receiving packets from other sessions. 5. Traic control: he traic should be eiciently distributed from central node to other members of the MANET. 6. QoS (quality of service): Multicast routing protocols should be designed in a way that satisies a set of performance measures in terms of end-to-end delay, jitter, and available bandwidth. 7. Power control: Routing protocols must use less power as much as possible. 8. Multiple accesses: Most of the multicast protocols are designed for single source multicasting. In multiple source multicasting, each multicast source will induce its own overhead for multicast routing and waste network resources. Depending on the topology used for communication, the multicast protocols can be classiied as tree-based and mesh-based protocols. In tree-based protocols, only one route exists between a source and a destination and hence these protocols are eicient in terms of the number of link transmissions. here are two major categories of treebased protocols: source tree based (the tree is rooted at the source) and shared tree based (the tree is rooted at a core node and all communication from the source nodes to the receiver nodes is routed through this core node). he shared tree-based multicast protocols are more scalable with respect to the number of sources; these protocols sufer under a single point of failure, the core node. On the other hand, source tree-based protocols are more eicient in terms of traic distribution. In mesh-based multicast routing, multiple routes exist between the source node and each of the receivers of the multicast group. A receiver node receives several copies of the data packets: one copy through each of the multiple paths. Mesh-based multicast routing protocols provide robustness in the presence of node mobility— however, at the expense of a larger number of link transmissions, leading to ineicient bandwidth usage. he mesh-based protocols are classiied into source-initiated and receiver-initiated protocols depending on the entity (source or receiver) that initiates mesh formation. 13 2 A D H O C M O BIL E WIREL E S S NE T W O RKS 4.3 Classification of Multicast Routing Protocols 4.3.1 Tree-Based Multicast Routing Protocols In this section, we describe a representative protocol from each of the following major categories of source tree-based multicast routing protocols: (1) minimum hop based, (2) minimum link based, (3) stability based, and (4) zone based. 4.3.1.1 Source Tree-Based Multicast Protocols he minimum hopbased multicast routing protocols aim for a minimum hop path between the source node and every receiver node that is part of the multicast group. Each receiver node is connected to the source node on the shortest (i.e., the minimum hop) path, and the path is independent of the other paths connecting the source node to the rest of the multicast group. he multicast extension to the ad hoc on demand distance vector (MAODV) protocol is a classical example of minimum hop-based multicast routing protocols for MANETs. In this subsection, we describe the working of MAODV in detail. 4.3.1.2 Minimum Hop-Based Multicast Protocols Example: he Multicast Extension to the Ad Hoc On-Demand Distance Vector (MAODV) Protocol Tree formation (expansion) phase. In MAODV, if a receiver node wants to join a multicast tree, it will join through a node that is a minimum hop path to the source. he receiver that wishes to join the multicast group broadcasts a route-request (RREQ ) message. If the node that receives the RREQ message is not part of the tree, then the node broadcasts the message and establishes the reverse path by storing the state information, consisting of the group address, requesting the node ID and the sender node ID in a temporary cache. If the node that has received the message is a member of the multicast tree, the received node sends back a route-reply (RREP) message on the shortest path to the receiver. In the RREP message, the information about the number of hops from the node itself to the source is revealed. he receiver that wants to join the group receives several RREP messages and selects the member node that lies on the shortest path to the source. he receiver node sends a multicast activation (MACT) message to the selected MULTI C A S T R O U TIN G P R O T O C O L S 13 3 member node along the chosen route. he route setup happens when the member node and all the intermediate nodes in the chosen path update their multicast table with state information from the temporary cache. Working. In Figure 4.1, we illustrate tree formation (expansion) under the MAODV protocol using an example. Here, the multicast tree is already established between the source node, S, and the two receivers, R1 and R2, of the multicast group. A node is considered a multicast tree node if it is a source, receiver, or intermediate node of the multicast tree. Now, consider a new member, node R3, joining as the receiver of the multicast group. To become part of the multicast tree, R3 broadcasts a route request (RREQ) control packet to its neighbors. If a neighbor node is a multicast tree node, it does not further propagate the RREQ packet; otherwise, it broadcasts the packet to its neighbors. he multicast tree node that receives an RREQ packet waits for a certain time period to receive any more RREQ packets and then responds back with a route reply (RREP) packet on the shortest (minimum hop) path to the initiator (R3). In the RREP packet, the tree node also includes the number of hops between itself and the source. In our example, intermediate tree node I1 (on the shortest path from S to R2) and the receivers R1 and R2 respond back with RREP packets to R3. he number of hops on the shortest path from R3 to each of R1 and R2 is 4, whereas the number of hops from I1 to R3 is 3. Also, the number of hops from S to R1 and R2 on the shortest path is, respectively, 2 and 3; the number of S I4 R2 I2 Intermediate tree node I1 R1 I6 I3 I8 I7 Non-participating node I 10 I9 Intermediate non-tree nodes forwarding the control packets Multicast group Member, tree node Multicast tree link RREQ packet I5 R3 RREP packet MACT packet Figure.4.1 MAODV: receiver joining a multicast tree. 13 4 A D H O C M O BIL E WIREL E S S NE T W O RKS hops from S to I1 is 1. Considering all these, the shortest path from R3 to the source S would be the path that goes through the intermediate tree node I1. Hence, R3 decides to join the multicast tree through I1 and sends a multicast activation (MACT) message to I1. he intermediate nodes I5 and I8 that forwarded all of the three control packets (RREQ, RREP, and MACT) now become part of the multicast tree. Tree maintenance phase. he tree is maintained by the expanding ring search (ERS) approach, using the RREQ, RREP, and MACT messages. he downstream node of a broken link is responsible for initiating ERS to issue a fresh RREQ for the group. his RREQ contains the hop count of the requesting node from the multicast source node and the last known sequence number for that group. It can be replied to only by the member nodes whose recorded sequence number is greater than that indicated in the RREQ and whose hop distance to the source is smaller than the value indicated in the RREQ. 4.3.1.3 Minimum Link-Based Multicast Protocols he minimum linkbased multicast protocols try to have a minimum number of links overall in the multicast tree connecting a source node to all the receiver nodes of the multicast group. Such a tree would use the bandwidth eiciently and facilitate simultaneous use of the wireless channel for several node pairs whose communications will not interfere with each other. he bandwidth eicient multicast routing protocol (BEMRP) is an example of a minimum link-based source-tree multicast routing protocol, since the protocol tries to minimize the number of additional links that get incorporated when a new receiver node joins an already existing multicast tree. In this subsection, the working of BEMRP is discussed in detail. Example: Bandwidth-Eicient Multicast Routing Protocol (BEMRP) Tree formation (expansion) phase. According to BEMRP, a node wanting to join the multicast group opts for the nearest forwarding node in the existing tree, rather than choosing a minimum hop count path from the source of the multicast group. Because of this, the number of newly added links in the multicast tree is minimum, which leads to savings in the network bandwidth. Multicast tree construction is receiver initiated. If a node wishes MULTI C A S T R O U TIN G P R O T O C O L S 13 5 to join the multicast group as a receiver, the node starts looding the join control packets targeted toward the nodes that are currently members of the multicast tree. After receiving the irst join control packet, the member node waits for some amount of time before sending a reply packet. he member node sends a reply packet on the path traversed by the join control packet, with the minimum number of intermediate forwarding nodes. he node that wants to join as receiving node collects the reply packets from diferent member nodes and sends a reserve packet on the path that has a minimum number of forwarding nodes from the member node to itself. Working. he working of BEMRP is illustrated using an example shown in Figure 4.2. Let us consider a minimum link multicast tree connecting the source node S and the two receivers R1 and R2 of the multicast group (the darkened links shown in Figure 4.3 form the multicast tree). Similarly to MAODV, a tree node can be either a multicast group member (source and receiver nodes) or an intermediate node in the tree. If a third node, R3, wants to join the multicast group, it broadcasts the join control packets in its neighborhood and the packets get forwarded until they are received by a tree node. After receiving the irst join control packet, the tree node waits for a while and sends back a reply packet on the path that has the minimum hop count to the initiator of the join control packet (R3). However, unlike MAODV, the number of hops from the responding tree node to the source of the multicast group is not R2 R1 I2 S Intermediate tree node I1 Intermediate non-tree nodes forwarding the control packets I6 I3 I4 Multicast group Member, tree node I8 I7 Non-participating node I 10 Multicast tree link I9 I5 Reply packet R3 Figure 4.2 Join packet BEMRP: receiver joining a multicast tree. Reserve packet 13 6 A D H O C M O BIL E WIREL E S S NE T W O RKS I 11 Non-participating node S 8 10 7 I4 R2 4 I2 9 4 I1 I6 R1 Intermediate tree node 6 9 I3 5 11 12 I8 I7 2 I 10 8 I9 3 I5 8 3 8 7 R3 Intermediate non-tree nodes forwarding the MBQ packet Multicast group Member, tree node Multicast tree link MBQ packet MBQ-Reply packet Associativity Threshold = 6 Figure 4.3 ABAM: source-initiated tree construction. included in the reply packet and only the hop count of the path from the tree node to the receiver is included. he receiving node R3 collects all the reply packets and decides to join the multicast tree through the closest tree node (I1) so that the number of new links (three, in this case) that will be added to the multicast tree will be the minimum. he node R3 sends a reserve packet to the chosen intermediate tree node and the nodes of the links traversed by this reserve packet during path detection are now part of the minimum link-based multicast tree. Note that if node R3 had chosen to send the reserve packet to the source S directly by responding to its reply packet, R3 would have been connected to the source on a minimum hop path. However, such a path to the already existing multicast tree would create an addition of four new links to the tree and hence R3 prefers to go through I1 (which has resulted in only three new links added to the tree). he trade-of is that the number of hops from the source S to the receiver R3 is now ive and this is larger than the minimum number of hops between S and R3 in the network. Tree maintenance phase. BEMRP is a hard-state-based tree maintenance approach, since it has to provide more bandwidth eiciency (i.e., a member node transmits control packets only after a link breaks). BEMRP uses two schemes to recover from link failures: the broadcast-multicast scheme, in which the upstream node of the broken link is responsible for inding a new route to the previous downstream node; and the local rejoin scheme, in MULTI C A S T R O U TIN G P R O T O C O L S 13 7 which, if any broken link is there, it tries to rejoin the multicast group using a limited looding of the join control packets. Stability-based multicast protocols aim for a long-living tree connecting the source node to the receiver nodes of the multicast group. Each receiver node, at the time of joining the tree, selects the most stable path to the source node. his would minimize the number of tree reconigurations. To ind the stable path, it uses metrics that are a measure of the longevity of the links in the network. Metrics such as predicted link expiration time (LET), link ainity, and associativity ticks have been used by the routing protocols for determining stable paths as well as stable trees. Here, one such multicast routing protocol called the associativity-based ad hoc multicast (ABAM) routing protocol is discussed. 4.3.1.4 Stability-Based Multicast Protocols Example: Associativity-Based Ad Hoc Multicast (ABAM) Routing Protocol Formation (expansion) phase. his is the stability of link associativity ticks, which is the number of beacons periodically received from that neighbor since the link was formed. Each node stores the value of the associativity ticks with its neighbors. Multicast tree construction is source initiated and it can be repaired or expanded through receiver-initiated broadcast queries. he tree construction phase is initiated by the source node by broadcasting a multicast broadcast query (MBQ) message in the network to inform all prospective receiver nodes. he intermediate node appends associativity ticks if it receives the MBQ message and then rebroadcasts it. Upon receiving several MBQ messages through diferent paths, a receiver node of the multicast group selects the most stable path and sends an MBQ-reply packet along the selected path. he most stable path is the path with the largest proportion (i.e., percentage) of stable links. If the value of the associativity ticks is greater than or equal to the associativity threshold, calculated based on the node velocity and transmission range per node, then the link is called stable. In case of a tie (i.e., if two or more paths have the same largest proportion of stable links), then the minimum hop path among the contending paths is chosen. After receiving MBQ-reply packets from each receiver of the group, the source 13 8 A D H O C M O BIL E WIREL E S S NE T W O RKS sends multicast MC-setup messages to all receivers in order to establish the multicast tree. Working. he working examples presented so far in the previous sections (on MAODV and BEMRP) have been receiver initiated. Receiver-initiated tree repair and expansion of ABAM would also be similar. In the case of ABAM, the route selection metric adopted by the tree node receiving the join query packets would be based on the associativity ticks of the links traversed by the join query packets. he tree node chooses the path with the largest proportion of stable links and sends a join reply packet. A working example that is source initiated and based on the concept of choosing paths with the largest proportion of stable links is presented here. As shown in Figure 4.3, the source node S initiates a broadcast query reply cycle of the MBQ packets. In the diagram, associativity tick value is represented as link weight. he associativity threshold value is assumed to be six. If the associativity tick value for a link is greater than or equal to the threshold, the link is said to be “stable”; otherwise, it is unstable. If any multicast receiver node receives MBQ packets across several paths, it calculates the proportion of stable links on each of these paths and chooses the path with the largest proportion of stable links. Tree maintenance phase. Tree maintenance is by using a local query reply cycle. If any link breaks, it attempts to ix a route to the receiver node by broadcasting a local query message with TTL value of one. When the receiver node receives the local query message, it responds with a local reply message. he upstream node then sends the MC-setup message to the receiver. he responsibility of ixing the route to the receiver is transferred if the upstream node cannot ind a route to the receiver; then it transfers the responsibility of ixing the route to its immediate upstream node on the path from the receiver to the source. With TTL value set to two, this upstream node then initiates a broadcast of the local query message. his procedure is continued until the timer at the receiver node expires and it broadcasts a join query message to join the multicast group. he join query message is broadcast by a newly joining receiver node or a receiver node that got cut of from the multicast tree and could not join the tree using a local query reply cycle. he join query message propagates until it reaches a tree node. During its propagation, the forwarding nodes append their node ID and the associativity tick values with the downstream node from which the message was received. When a tree node receives a speciic join MULTI C A S T R O U TIN G P R O T O C O L S 13 9 query message (identiied using a sequence number) for the irst time, it waits for a while to receive the join query messages along diferent paths, chooses the path with the largest proportion of stable links, and sends a join reply message on the selected stable path. he receiver node conirms its participation in the multicast session by sending a reserve message on the path traversed by the join reply message. MZRP is the multicast extension of the unicast zone routing protocol (ZRP), a hybrid of both proactive and reactive routing strategies. A zone in the network comprises nodes that are within two or three hops from each other. Multiple zones exist in the network and often these zones overlap with each other. A border node is the node that is part of more than one zone. ZRP makes use of proactive routing for intrazone communication and, for interzone communication, it uses the combination of proactive and reactive routing protocols. For example, if the source and destination nodes are in the same zone, then proactive routing protocol is used. Otherwise, if they are in diferent zones, the source node has to utilize the proactive routing protocols implemented in their respective zones and a reactive routing protocol implemented for interzone communication. ZRP does not depend on any speciic proactive and reactive routing protocol for intrazone and interzone communication. Similarly, MZRP does not depend on any underlying unicast routing protocol. he proactive routing mechanism within a zone is implemented through periodic beacon exchange and the reactive routing mechanism to communicate across diferent zones is realized through on-demand looding and multicast tree construction. Node advertisement and zone initialization. Every node advertises to the other zone members by broadcasting an advertisement packet, and its propagation is controlled using a time-to-live (TTL) value that is usually set to the zone radius. he nodes that receive the advertisement packet make an entry for the source in their zone routing table and update their neighbor table with the upstream node that sent the advertisement packet. ZRP operates in a soft state (i.e., nodes remove the route entry of a particular node that fails to send periodic advertisement 4.3.1.5 Multicast Zone-Based Routing Protocol (MZRP) 14 0 A D H O C M O BIL E WIREL E S S NE T W O RKS F E Group member D Tree-create S A Non-group member C Tree-create ACK B Figure 4.4 Multicast tree creation inside a zone. packets to indicate its presence in the zone). hus, topology changes within a zone are often localized and not broadcast to other zones. Multicast tree creation inside a zone. Multicast tree creation within a zone (illustrated in Figure 4.4) is done as follows: he initial node or the source node broadcasts a tree-create packet, which contains a session ID, with a TTL value set to the radius of the zone. After receiving the tree-create packet, any node creates a multicast route entry with an empty list of downstream nodes and the upstream node is set to the node that sent the tree-create packet. Any node within the zone that wants to be a receiver of the multicast session responds with a tree-create-ACK (acknowledge) packet and the packet travels back to the source on the reverse path traversed by the tree-create packet. On this path any intermediate node that receives the tree-create-ACK packet for a multicast session for which an entry has already been created in its routing table updates the downstream node list by adding the ID of the neighbor node from which the tree-create-ACK packet was received. 4.3.1.5.1 Extension of the Multicast Tree to the Entire Network If the multicast tree is to be extended to the entire network (refer to Figure 4.5), the source node at a tree-propagate packet will be sent by the source node to the border nodes of its own zone. A border node that receives a tree-propagate packet creates a route entry for the session in its multicast table and initiates the zone-wide broadcast of a tree-create packet. Any node interested in joining the zone responds with a tree-create-ACK packet that is duly forwarded by the border 141 MULTI C A S T R O U TIN G P R O T O C O L S A G ! "! Non-group member C B D G F E I H J S P K Q N R O L T M Figure 4.5 Extension of the multicast tree to the entire network. node to the multicast source. A network-wide TTL value is speciied indicating the number of zones it can be forwarded to. A border node decrements this TTL value by one and, when it reaches zero, the tree-propagate packet is sent to the other border nodes within that zone. After the construction of a multicast tree, the source node starts sending data on the tree, which will be propagated through the nodes across zones, according to the downstream list maintained by intermediate nodes. Multicast tree maintenance is by soft state. Periodically, for every interval, the source node sends a tree-refresh packet. Any node that gets disconnected from the tree sends a join packet, identifying the multicast session, to all of its zone nodes. Any other node of the multicast tree that has not disconnected responds with a join-ACK packet and adds the neighbor node that sent the join packet to the list of downstream nodes. A similar procedure is adopted at all the nodes that receive the join and/ or join-ACK packets. Figure 4.6 (adapted from reference 1) illustrates the rejoin process within a zone. After sending the join packet, if any disconnected node does not receive the join-ACK packet within a limited time, it sends 4.3.1.5.2 Zone and Multicast Tree Maintenance 14 2 A D H O C M O BIL E WIREL E S S NE T W O RKS Connection to the multicast tree F E Group member G H A D C Non-group member Join Join-ACK Tree link B Figure 4.6 Zone and multicast tree maintenance. a join-propagate packet to all of its border nodes, which in turn send join packets to all their zone nodes. his process will be continued until a border node gets a join-ACK packet, which is forwarded to the disconnected member node. A receiver node disconnects from the multicast session by sending a tree-prune message to its upstream node in the tree. he upstream node will remove the receiver node from its list of downstream nodes for the tree; if the list becomes empty after the removal and the node is not an interested receiver node (i.e., has been just an intermediate tree node), then the node sends a tree-prune message to its upstream node further up in the tree 4.3.1.6 Shared Tree-Based Multicast Protocols In shared tree-based protocols, a single tree is constructed where the central control point is called the rendezvous point (RP). he mobility in MANETs will be typically in two levels, with a set of nodes moving fast and the rest of the nodes moving relatively very slowly. he RP is often chosen to be the slowest moving node in a MANET so that the shared tree can be maintained irrespective of the mobility of the source nodes. he RP is connected to the receiver nodes of the multicast session and the source nodes send the data packets to the RP based on the underlying unicast routing protocol. Still, shared tree-based protocols are known to yield a lower throughput compared to per-source tree-based protocols. A compromise solution called “adaptive-tree multicast” is applicable wherein if the receivers request the source, the source node may construct its own MULTI C A S T R O U TIN G P R O T O C O L S 14 3 rooted tree to deliver the packets on the shortest path. In this section, the study of the shared-tree wireless multicast (ST-WIM) protocol, ad hoc multicast routing protocol utilizing increasing ID numbers (AMRIS), and the ad hoc multicast routing protocol (AMRoute) as representatives of the cluster-based, session-speciic, and IP (Internet protocol) multicast session-based protocols. 4.3.1.7 Session-Speciic Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Numbers (AMRIS) AMRIS provides a unique session- speciic multicast session member ID (msm id) to each participant. he msm id indicates the logical height of a node in the multicast delivery tree rooted at the sender that has the smallest msm id (Sid) in the tree. All other nodes in the tree have an msm id that is higher than that of its parent. In case of a multiple sender environment, the Sid is elected among the senders. AMRIS uses the underlying MAC layer beaconing mechanism to detect the presence of neighbors. Tree initialization phase. During the tree initialization, the Sid broadcasts a new-session message (containing the Sid, msm id, and other routing metrics) in its neighborhood. If a node receives the newsession message, it updates the msm id in the message with a newly computed larger value that is also used to identify the node in the tree. If more than one new-session message is received from several neighbors within a random jitter amount of time, then the message with the best routing metric is selected and updated with a newly computed msm id value. he updated new-session message is then rebroadcast. his strategy can be used to prevent broadcast storms. Note that the newly computed msm ids are not consecutive and the gaps can be used to repair the delivery tree locally. To join the multicast group, a downstream node X sends a unicast join-request message to a randomly chosen neighbor node that is also a potential parent node (having a lower msm id)—say, Y. If node Y already has become part of the multicast tree, then Y sends a joinACK message to X. Otherwise, Y forwards the join-request message to a set of potential parents of itself. his process continues until the join-request message reaches a parent node that is part of the multicast delivery tree. A join-ACK message is sent by the parent node to node X, which conirms the participation of node X in the multicast session by sending back a join-conf message to the parent node. 14 4 A D H O C M O BIL E WIREL E S S NE T W O RKS Tree maintenance phase. Upon link failure, the downstream node (with a relatively higher msm id) is responsible for rejoining the multicast tree. Before broadcasting a join-request message, the downstream node of a broken link attempts to ind potential parent nodes by locally repairing the route using an expanded-ring search process. he join-request message is broadcast with a TTL value that restricts the number of hops the message can propagate. If a node that wants to rejoin a muticast tree has no valid msm id, it calculates msm id for itself based on the msm ids of its neighboring node’s msm id and then joins the multicast tree through the branch reconstruction process explained before. he beacon update period at the MAC layer has to be chosen properly to avoid detection of microterm breakages that can unnecessarily trigger the branch reconstruction process and incur a lot of control overhead. 4.3.2 Mesh-Based Multicast Routing Protocols A mesh is a set of nodes in the network such that all the nodes in the mesh forward multicast packets via scoped looding. As stated before, mesh-based protocols are more robust to link failures than treebased protocols. Mesh-based protocols can be either source initiated or receiver initiated. In most of the cases, the forwarding mesh in source-initiated protocols is a union of per-source meshes, while receiver-initiated mesh protocols form a single shared mesh for all the sources. Here, we discuss the source-initiated meshbased multicast routing protocols and, in the next section, we discuss the receiver-initiated mesh-based protocols. In the category of source-initiated mesh-based multicast routing protocols, we discuss the well known on-demand multicast routing protocol (ODMRP) along with its extensions to handle high mobility and low node density (i.e., sparse networks). 4.3.2.1 Source-Initiated Mesh-Based Multicast Protocols 4.3.2.1.1 On-Demand Multicast Routing Protocol (ODMRP) ODMRP is a mesh-based multicast routing protocol based on the notion of a forwarding group (shown in Figure 4.7)—a set of nodes that forward data on the shortest paths between any two multicast members. Multicast group membership and routes are established and MULTI C A S T R O U TIN G P R O T O C O L S 14 5 FG FG Multicast member nodes FG Forwarding group nodes FG FG FG Forwarding group Figure 4.7 Concept of forwarding zone. updated by the source on an on-demand basis. his leads to reduction in channel/storage overhead and an increase in scalability. A soft-state approach is used for mesh maintenance and member nodes are not required to send leave messages explicitly while quitting a group. A performance comparison of the major ad hoc multicast routing protocols shows ODMRP to be the most advantageous and preferred protocol in mobile wireless networks. ODMRP can also operate independently as an eicient unicast routing protocol. ODMRP operates through a request phase and a reply phase. he source nodes, which are not aware of routes or membership, broadcast a join-data packet. When any node receives the join-data packet for the irst time, its routing table is updated by storing the upstream node ID and rebroadcasts the packet. he multicast receiver, after receiving a nonduplicate join-data packet, creates and broadcasts a join-reply packet in its neighborhood. When a node receives the join-reply packet, it checks if it is listed as the next node ID in the packet. If it is, the node is located on the path to the source and becomes part of the forwarding group. An FG (forwarding group) lag is set in its routing table and the node broadcasts its own join-reply packet. In this way, the join-reply packet will be forwarded by the FG member nodes until it reaches the multicast source on the shortest path. A forwarding group is built as a result of this source-receiver route construction and update process. If any node wants to leave a multicast group, it can respectively stop sending the join-query and join-reply packets meant for that group. If an FG 14 6 A D H O C M O BIL E WIREL E S S NE T W O RKS member node does not receive a join-reply packet before a time-out period, the node demotes itself to a nonforwarding node of the mesh. Receiverinitiated mesh protocols are more robust to node mobility as they attempt to maintain a shared mesh involving all the source nodes of the multicast group. he multicast source nodes forward packets on the reverse shortest path from the receiver nodes to the source. his section reviews the work of the receiver-initiated multicast mesh protocol: the core-assisted mesh protocol (CAMP). 4.3.2.2 Receiver-Initiated Mesh-Based Multicast Protocols 4.3.2.2.1 Core-Assisted Mesh Protocol (CAMP) In CAMP the nodes can be categorized into three types: duplex, simplex, and nonmembers. Duplex nodes will be similar to regular mesh nodes with functionality the same as mesh routing protocols. Simplex members are able to forward packets from the source nodes to the rest of the mesh, but they cannot respond for any membership query packets. CAMP maintains one or more core nodes per mesh. A node interested in joining the multicast mesh irst queries its neighbor nodes to see if any of them are part of the mesh. If none of the neighbors are part of the mesh, the node will send the join-request messages by looding targeted toward the core nodes of the mesh. Upon receiving a nonduplicate join-request message, a duplex member node, which is also called core node, responds with a join-ACK message that is propagated back to the initiator of the join-request message. If the core nodes are not able to provide eicient dissemination paths, CAMP lets core nodes leave the multicast mesh. A core node leaves the multicast group by broadcasting a quit notiication message to its neighbors. A receiver node periodically checks whether the multicast data packets traverse the reverse shortest path back to the source. If this is not the case, the receiver node sends a heart-beat or the push-join message along the reverse shortest path to the source. A member node (including the receiver node) forwards the heart-beat message to its successor node on the reverse shortest path if the latter is already a member of the mesh; otherwise, the member node sends a push-join message to the neighbor successor node asking it to join the multicast mesh and waits for an ACK from that node. Duplex members respond with a regular ACK, while simplex members send an ACK-simplex MULTI C A S T R O U TIN G P R O T O C O L S 147 message. If no ACK is received within a certain time, the push-join message is propagated further until a member node that is directly connected to the source is reached. he member nodes of a mesh are allowed to select their “anchor” nodes, which are required to rebroadcast any nonredundant data packets received. he member nodes can periodically refresh their “anchor” nodes by broadcasting updates. Any neighbor node that is not interested can deny the “anchor” request or discontinue from that role. CAMP requires the support of the underlying unicast routing protocol to provide route updates. Because of this, CAMP prefers to coexist with an underlying unicast routing protocol called wireless routing protocol (WRP), which marks a subset of destinations as unreachable during periods of network reconvergence. CAMP piggybacks its control messages onto the back of WRP updates and the control overhead is bound to increase exponentially with traic. We cannot use CAMP directly with unicast routing protocols based on the Bellman–Ford algorithm; extensions are needed to work with ondemand routing protocols. 4.3.3 Source-Based Multicast Routing Protocol he source-based multicast routing protocol operates in a loop-free manner and tries to minimize both routing and storage overhead in order to provide robustness to host mobility, adaptability to wireless channel luctuation, and optimization of network resource use. SRMP is a mesh-based, multicast routing protocol; a mesh structure is established on demand to connect group members, and a multicast mesh provides at least one path from each source to each receiver in the multicast group. Route selection is established through a multicast mesh, started at the multicast receiver. he concept of FG (forwarding group) nodes is used during mesh establishment. he FG is a set of selected nodes responsible for forwarding multicast data between any number of pairs. he choice of FG nodes and how they are selected and maintained is the key challenge in eicient multicasting. SRMP achieves a compromise between the size of the selected 4.3.3.1 FG Node Selection 14 8 A D H O C M O BIL E WIREL E S S NE T W O RKS nodes and the availability and stability of the selected paths. SRMP applies eicient FG node selection criteria through deining four metrics: association stability, link signal strength, battery life, and link availability. • Association stability: To measure how long the node is stable with respect to its neighbor, this metric is used. It was irst introduced in the ABR protocol and is known as the degree of association stability. Association stability is calculated by each node with respect to each neighbor through the use of an associativity ticks ield stored in the node’s Neighbor_Stability_Table. It is incremented each time the node receives a beacon indicating a neighbor’s existence. A node is considered stable with respect to a neighbor when the accumulated associativity ticks value corresponding to this neighbor fulills a predeined threshold. • Link signal strength: To measure the signal strength between each node and its neighbors this metric is used, which indicates connectivity strength. SRMP uses this metric to select links that ofer stronger connectivity between nodes. Signal strength is calculated according to the level of strength the beacon is received and classiied as weak or strong. • Battery life: his metric calculates the current battery power, which is a decreasing function of time and processed packets. • Link availability: his metric is used during path selection; here, prediction-based link availability estimation is used. he following data structures are used in SRMP: • he Neighbor_Stability_Table gathers continuous node-neighbor information. • he Multicast_Message_Duplication_Table that identiies each received Join-request or data packet, • he Multicast_Routing_Cache stores all possible routes from each node to each multicast group. • he Receiver_Multicast_Routing_Table is maintained at each receiver for each multicast group, and stores the used route between each receiver and each source MULTI C A S T R O U TIN G P R O T O C O L S Neighbor Type Associativity Ticks Signal Strength 14 9 Link Availability Table 3: Neighbor_Sability_Table Sequence Number Source ID Type Table 4: Multicast_Message_Duplication_Table Group ID Source ID Route to Source Timer Table 5: Receiver_Multicast_Routing_Table Group ID Type Route to Receiver Timer Table 6: Multicast_Routing_Cache 4.3.3.2 Operation Similarly to all on-demand routing protocols, the request phase and a reply phase are involved in the operation of a protocol. he request phase involves a route discovery phase to ind a route to reach the multicast group. During the reply phase, diferent routes to multicast groups are set up through FG node selection and mesh construction. In the request phase, a source node that is not a member of the multicast group wants to join the group; it starts a route discovery procedure by broadcasting a join-request packet to a neighbor. his join-request packet contains the ID of the source node in a source-ID ield, the multicast group-ID and destination ID ields, and sequence number ield. Reply phase and mesh construction. When a join-request packet is received by the corresponding receiver, it checks for stability among its neighbors, including associativity ticks’ signal strength and link availability. After satisfying all the metrics for the predeined thresholds, the receiver selects a neighbor as FG node and sets it as a member in the neighbor-stability table. he receiver sends a join-reply packet to this FG node, storing the multicast group ID in a source ield and the ID of the requesting ield as destination ID ield. A source route also accumulates during join-reply propagation in a route record ield in the packet. An FG node receiving a join-reply irst creates an entry to the multicast group in its Multicast_Routing_Cache, setting its state as FG 15 0 A D H O C M O BIL E WIREL E S S NE T W O RKS node and copying the reversed accumulated route in the received joinreply. It then performs the same previous steps for selecting FG nodes among neighbors. his process continues until reaching the source, constructing a mesh of FG nodes that connect group members. A source receiving a join-reply packet creates an entry to the multicast group in its Multicast_Routing_Cache. More than one join-reply may be received by the source for the same multicast group. Hence, multiple routes can be stored for the same multicast group. After mesh creation, new join-request packets may receive replies from any FG member node having unexpired routes to the requested multicast group. In this case, the FG node sends the join-reply following the same previous selection among neighbors. Data transmission. he shortest path route is selected to transmit data. If more than one shortest path routes are found, the freshest route is selected. Data packets carry in their headers the selected route indicating the sequence of hops to be followed. Each FG node receiving a data packet forwards this packet if it stores in its cache at least one valid route toward the multicast group and the packet is not duplicated. his leads to an attractive feature in SRMP: preventing packets transmission through stale routes and minimizing traic overhead. he process continues until reaching all multicast receivers. A multicast receiver receiving a data packet for the irst time creates an entry in its Receiver_Multicast_Routing_Table. To guarantee data transmission to all multicast receivers, nodes duplicate transmission if the selected route leads directly to the multicast group. We deine duplication in transmission as selecting one more route following same previous criteria and transmitting data to both routes. Maintenance. Route maintenance deals with reporting and recovering routing problems, keeping the lifetime of a route as long as possible. For this purpose, SRMP addresses four mechanisms: providing multicast mesh refreshment, link breaks detection and repair, continuous node-neighbor information, and pruning allowing any node to leave the group. Two new messages are introduced: the multicastRERR (route error) message and the leave group message. Neighbor existence mechanism. SRMP uses MAC layer beacons to provide each node with neighbors’ existence information. Upon reception of neighbors’ beacons, creating or updating Neighbor_ Stability_Table entries takes place via incrementing the associativity MULTI C A S T R O U TIN G P R O T O C O L S 151 ticks and setting the signal strength according to the level of strength of the beacon that is received. In addition, link availability is updated by continuous prediction for links’ availability toward neighbors. If no beacons are received by a node from a neighbor up to a certain period of time, the node indicates the neighbor’s movement and updates its stability table ields toward it. Mesh refreshment mechanism. his follows a simple mechanism making use of data packet propagation and requiring no extra control overhead. Each time the source transmits a data packet, in its cache it updates the timer of the used route. Typically, an FG node forwarding this packet scans the packet header and refreshes in its cache the corresponding route entry timer. Furthermore, a multicast receiver scans the header of each received data packet, refreshing its corresponding table entry timer to the source. Periodically, each node checks its timers and purges out expired multicast group entries, preventing stale route storage. In addition, it checks its neighbor table, deleting from its cache routes to multicast groups for which it possesses no more members. Link repair mechanism. With the help of MAC layer support, SRMP detects link failures during data transmission. In this case, two mechanisms are addressed: maintaining routes when a link fails between two FG nodes and maintaining routes when a link fails between a multicast receiver and an FG node. In fact, mesh reconigurations are not needed if the stability characteristics together with high battery life paths are valid throughout the lifetime of the multicast communications. A link’s failure occurs between two FG nodes; the node detecting failure reports it to the original source following the same procedure of link failure recovery in the DSR protocol. First, it generates a multicast-RERR packet indicating the broken link in a broken link ield in this packet. hen, it deletes from its cache any routes containing the broken link. In turn, nodes on the way to the source that receive this packet clean their caches from all routes containing the broken link. When links fail between an FG node and a multicast receiver, an alternative approach is applied. Simply, the FG node detecting failure deletes the receiver membership from its Neighbor_Stability_Table. When the FG node possesses no more members for the multicast group, it deletes routes to this group from its cache and sends to all its neighbors a multicast-RERR packet reporting the failure. he broken 15 2 A D H O C M O BIL E WIREL E S S NE T W O RKS link ield in this packet stores the link between the failure detector FG node and the multicast group. Each neighbor, receiving this packet, cleans its cache from routes containing the broken link. he process is repeated until all member nodes in the mesh are visited. Pruning mechanism. An efective pruning mechanism is implemented by SRMP, allowing a member node to leave the multicast session. It mainly deals with two cases: FG node pruning and multicast receiver pruning. A multicast source wishing to leave a multicast group simply stops transmitting data to this group, deleting from its cache entries concerning this group. If a node wishes to leave a multicast group, it sends a leave group message to its member neighbors, deleting from its table all entries corresponding to this group. he leave group message carries the ID of the multicast session in a multicast group ID ield and the ID of the member neighbor to which the message is sent in a neighbor ID ield. he neighbor node receiving this message cancels in its turn the receiver membership from its Neighbor_Stability_Table. When this node has no more members for a multicast group, it sends in its turn a multicast-RERR message to its member neighbors following previous procedure in link failure. SRMP performs better compared to other protocols by introducing no extra control overhead and eicient repair and pruning mechanisms. 4.4 QoS Routing In a wireless network, as communication happens through radio packets, direct communication is allowed only between direct nodes, if the nodes are to be communicated which are distant, communication should happen through multihop nodes. As the real-world applications need QOS support, QOS routing is helpful in multicasting. Since network topology changes very frequently in MANETs, QOS routing in MANETs is diicult. Another challenge in QoS for real-time applications is associated with design of the MAC protocol. Because the topology changes dynamically, it is diicult to provide reservation, central controller, etc. he requirement for QoS in MANETs is to ind a route through the network that is capable of supporting a requested level of QoS. When existing network topology changes, new routes can support existing QoS and respond to the changes in available resources. MULTI C A S T R O U TIN G P R O T O C O L S 15 3 QoS in MANETs is highly dependent on routing and medium access control. A CDMA/TDMA channel model is used in a MAC layer for most of the implementations of unicast routing with QoS. It is diicult to implement CDMA/TDMA in a real network due to issues of code and synchronization between the nodes. Even though highly synchronized solutions are used in MANETS, they may fail when nodes become mobile and they will also be expensive. 4.4.1 Multicast Routing in QoS A node that has data to send starts a session by broadcasting a session initiation as a quality of service route request (QRREQ ) with TTL greater than zero. he intermediate node rebroadcasts the QRREQ , if it has bandwidth, until TTL is equal to zero. he destination node receives QRREQ and sends a QoS route reply (QRREP) to the source. Forward group and member management. When an intermediate node receives QRREQ from a source, it stores the source ID and sequence number in the cache to detect any duplicate message. It rebroadcasts the QRREQ and the routing table is updated. 4.5 Energy-Efficient Multicast Routing Protocols he network lifetime is a key design factor of MANETs. To prolong the lifetime of MANETs, one is forced to attain the trade-of of minimizing the energy consumption and load balancing. In MANETs, energy waste resulting from retransmission due to high frame error rate (FER) of a wireless channel is signiicant. 4.5.1 Metrics for Energy-Eicient Multicast 1. Minimum energy constraint: In routing protocols, we need to minimize energy consumed by reducing the energy consumption through all intermediate nodes through which the packet passes. For example, from n to n K, the packets are passing through intermediate nodes, where n is the source and n1, n2, 15 4 A D H O C M O BIL E WIREL E S S NE T W O RKS n3…are intermediate nodes. hen, the energy consumed for all transmissions for packet j is ej = (ni), where i is from 1 to k; the goal is to minimize the ej. 2. Maximize time to network partition: As soon as one node in the path dies, the network is said to be partitioned, and the power consumed for each of these networks will be more. herefore, the aim is to maximize the partition time. 3. Minimize the variance in node power levels: he idea is to treat all nodes as important nodes and balance the node energy level equally. 4. Minimize cost per packet: Choose the path into nodes as intermediate nodes, which have enough energy to reduce the cost. Energy-eicient multicast routing protocols have the following unique characteristics: 1. Energy in wireless nodes is crucial because of the limited capacity of the battery. 2. Since nodes can move in a random way, there is frequent path failure. 3. Wireless channels have limited and more variable bandwidth compared to wired networks. 4.5.2 EEMRP: Energy-Eicient Multicast Routing Protocol In this protocol it is assumed that the routing forwarding decision should be based on a node’s energy level. Measurement of time and energy. he following formula used to ind the energy level in each node. Energy (E) = power × time (4.1) hat is, when a node is transmitting or receiving a packet, the energy consumption is directly proportional to transmitting or receiving power and the transmitted time. he time is calculated as Time = 8 × packet size/bandwidth Substituting Equation 4.2 in Equation 4.1, (4.2) MULTI C A S T R O U TIN G P R O T O C O L S 15 5 Etx = Ptx × 8 × packet size/bandwidth (4.3) Erx = Prx × 8 × packet size/bandwidth (4.4) where Etx and Erx are energy consumed when the packet is transmitted and received, respectively. Ptx and Prx are power consumed when the packet is transmitted and received, respectively. he energy consumed when nodes are forwarding a packet is equal to the sum of transmitting and receiving the packet: Et = Etx + Erx (4.5) When a node participates in forwarding a packet, the net energy is calculated as Energy = E – Et (4.6) When a node does not participate in forwarding a packet, the net energy is calculated as Energy = E – Es (4.7) where Es is sleeping node energy. When a node does not participate in forwarding a packet, the net power is calculated as Power (P) = power – battery sleep power (4.8) In this protocol, the energy of each node is calculated and inds the optimal route based on the energy information that is available in the node cache. he node satisies the threshold level chosen for packet transmission. Experiments show that 70% of energy can be saved eiciently if it is implemented for a multicasting environment. When the number of nodes is increased, energy consumption is linear. 4.6 Location-Based Multicast Routing Protocols In conventional multicasting algorithms, a collection of hosts that register to a particular group is considered a multicast group (i.e., if a host wants to receive a multicast message, irst it has to join a particular group). When any hosts want to send a message to such a group, they simply multicast it to the address of that group. All the group members then receive the message. 15 6 A D H O C M O BIL E WIREL E S S NE T W O RKS A geocast is delivered to the set of nodes within a speciied geographical area; unlike other multicast schemes, here the multicast group contains the set of nodes within a speciied area. he set of nodes in a multicast region is known as a location-based multicast group and may be used for sending a message that is of interest to everyone in the speciied area. Two approaches are used to implement a location-based multicast. In a multicast tree, all nodes belonging to a multicast region belong to the multicast tree. he tree has to be updated whenever the nodes enter or leave the multicast region. In the second approach, a multicast tree is not maintained, but it uses a looding scheme. In general, location-based multicast utilizes location information to reduce the multicast overhead. Location information is provided through a global positioning system (GPS), even though GPS does not provide accuracy up to 100%. Here, it is assumed that the error is not there. 4.6.1 Preliminaries Multicast region and forwarding zone. Assume that a node, S, wants to multicast a message to all nodes that are currently located within a certain geographical area. he node S multicasts a data packet at time t0, and the nodes X, Y, and Z are located within that multicast region. All three members are expected to receive the multicast data packet sent by node S. Accuracy is calculated by the ratio of number of group members that actually receive the multicast data packet and number of group members that were in the multicast region. Forwarding zone. Node S deines “forwarding” zone (implicitly or explicitly) for the multicast data packet. A node forwards a multicast data packet only if it belongs to forwarding zone. Location-based scheme 1. Sender S explicitly speciies the forwarding zone in its multicast data packet. Location-based scheme 2. he forwarding zone will not be speciied explicitly, the node S includes three pieces of information with its multicast data packet: • Multicast region speciication • Location of the geometrical center (Xc,Yc) of the multicast region, distance of any node z from (Xc,Yc). MULTI C A S T R O U TIN G P R O T O C O L S 15 7 • Coordinates of sender S(Xs,Ys) When a node I receives the multicast packet from node S, I determines if it belongs to a multicast region. If node I is in a multicast region, it accepts the multicast packet. hen it calculates its distance from location (Xc,Yc), denoted as DISTi. For some parameter ∂, if DISTs + ∂ ≥ DISTi, then node I forwards the packet to its neighbors. Before forwarding, node I replaces the (Xs,Ys) as (X i,Yi). Otherwise, if DISTs + ∂ < DISTi, node I sees whether S is within a multicast region. If it is, then it will forward the packet; otherwise, it will discard it. 4.7 Summary Any multicast routing protocol in MANETs tries to overcome some diicult problems, which can be categorized under basic issues or considerations. All protocols have their own advantages and disadvantages. One constructs multicast trees to reduce end-to-end latency. Multicast tree-based routing protocols are eicient and satisfy scalability issues; however, they have several drawbacks in ad hoc wireless networks due to the mobile nature of nodes that participate during multicast sessions. he mesh-based protocols provide more robustness against mobility and save the large size of control overhead used in tree maintenance. Most protocols of this type rely on frequent broadcasting, which may lead to a scalability problem when the number of sources increases. Hybrid multicast provides protocols, which are tree based as well as mesh based, and gives the advantages of both types. It is really diicult to design a multicast routing protocol considering all these issues. Problems 4.1 Is hop length always the best metric for choosing paths? In an ad hoc network with a number of nodes, each difering in mobility, load generation characteristics, interference level, and so forth, what other metrics are possible? 15 8 A D H O C M O BIL E WIREL E S S NE T W O RKS 4.2 Link-level broadcast capability is assumed in many of the multicast routing protocols. Are such broadcasts reliable? Give some techniques that could be used to improve the reliability of broadcasts. 4.3 What are the two basic approaches for maintenance of the multicast tree in bandwidth-eicient multicast protocol (BEMRP)? Which of the two performs better? Why? 4.4 What are the two diferent topology maintenance approaches? Which of the two approaches is better when the topology is highly dynamic? Give reasons for your choice. 4.5 How is the node energy level calculated in the EEMRP protocol? Reference 1. Vijay, D., Deepinder, S., A multicast protocol for mobile ad hoc networks. 2001. IEEE Conference on Communication 3: 886–891. Bibliography Ballardie, A. 1997. Core based trees (CBT version 2) multicast routing. Internet Request for Comment 2. Basagni, S., I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward. 1998. A distance routing elect algorithm for mobility (dream). Proceedings of IEEE/ACM MOBICOM’98, pp. 76–84, October 1998. Bommaiah, E., M. Liu, A. McAuley, and R. Talpade. AMRoute: Ad hoc multicast routing protocol. IETF MANET (draft-talpade-manet-amroute-00. txt), August 1998. Broch, J., D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva. 1998. A performance comparison of multihop wireless ad hoc network routing protocols. Proceedings of ACM/IEEE MOBICOM’98, pp. 85–97. CMU Monarch Project. Mobility Extensions to ns-2, 1999. Available from http://www.monarch.cs.cmu.edu/ Das, S. R., R. Castaneda, J. Yan, and R. Sengupta. 1998. Comparative performance evaluation of routing protocols for mobile, ad hoc networks. Proceedings of IEEE IC3N’98, pp. 153–161. Garcia-Luna-Aceves, J. J., and E. L. Madruga. 1999. A multicast routing protocol for ad hoc networks. Proceedings of IEEE INFOCOM’99, New York, pp. 784–792. ———. 1999. he core-assisted mesh protocol. IEEE Journal on Selected Areas in Communication 17 (8): 1380–1394. MULTI C A S T R O U TIN G P R O T O C O L S 15 9 Gerla, M., and S. J. Lee. On-demand multicast routing protocol for mobile ad-hoc networks. Available from http://www.cs.ucla.edu/NRL/wireless/ Jacquet, P., P. Minet, A. Laouiti, L. Viennot, T. Clausen, and C. Adjih. 202. Multicast optimized link state routing. IETF MANET draft-ietfmanet-olsr-molsr-01.txt Joa-Ng, M., and L. T. Lu. 1999. A peer-to-peer zone based two-level link state routing for mobile ad hoc networks. IEEE Journal in Selected Areas in Communications (special issue on wireless ad hoc networks) 17 (8): 1415–1425. Jogendra Kumar, G. B. Application-independent based multicast routing protocols in mobile ad hoc network (MANET). Pant Engineering College, Pauri Garhwal, Uttarakhand, India. Johansson, P., T. Larsson, N. Hedman, B. Mielczarek, and M. Degermark. 1999. Scenario-based performance analysis of routing protocols for mobile adhoc networks. Proceedings of IEEE/ACM MOBICOM’99, pp. 195–206. Ko, Y. B., and N. H. Vaidya. 1998. Location-aided routing in mobile ad hoc networks. Proceedings of IEEE/ACM MOBICOM’98, pp. 66–75. Lee, S., J. M. Gerla, and C. C. Chiang. 1999. On-demand multicast routing protocol. Proceedings of IEEE WCNC’99, New Orleans, pp. 1298–1302. Lee, S. J., M. Gerla, and C. K. Toh. 1999. A simulation study of table-driven and on-demand routing protocols for mobile ad-hoc networks. IEEE Network 13 (4): 48–54. Lee, S. J., W. Su, and M. Gerla. 1999. Ad hoc wireless multicast with mobility prediction. Proceedings of IEEE ICCCN99, Boston, MA, Oct. Lee, S. J., W. Su, J. Hsu, M. Gerla, and R. Bagrodia. 2000. A performance comparison study of ad hoc wireless multicast protocols. Proceedings of the IEEE Infocom 2000. Liu, M., R. Talpade, A. McAuley, and E. Bommaiah. AMRoute: Ad hoc multicast routing protocol. Technical report, CSHCN T. R. 99-1, University of Maryland. Royer, E. M., and C. E. Perkins.1999. Multicast operation of the ad hoc on demand distance vector routing protocol. ACM MOBICOM. Saghir, M., Wan, T-C., and Budiarto, R. 2006. Multicast routing with quality of service in mobile ad hoc networks. Proceedings of the International Conference on Computer and Communication Engineering, ICCCE’06 I:9– 11 May 2006, Kuala Lumpur, Malaysia. Siva Rammurty, C., and B. S. Manoj. 2008. Ad hoc wireless networks architectures and protocols, Pearson Education India, 878 pp. Viswanath, K., Obraczka, K., and Gene Tsudik, G. Exploring mesh- and treebased multicast routing protocols for MANETs. University of California, Santa Cruz Computer Engineering Department. Wu, C. W., and Y. C. Tay. 1999. AMRIS: A multicast protocol for ad hoc wireless networks. Proceedings of IEEE MILCOM’99, Atlantic City. 5 TR ANSP ORT P ROTO CO L S 5.1 Introduction he transport layer acts as a liaison between the upper layer protocols and the lower layer protocols. To make this separation possible, the transport layer is independent of the physical network. he objectives of transport layer protocols include end-to end delivery of entire message, addressing, reliable delivery, low control, and multiplexing. Two distinct transport-layer protocols are UDP and TCP. he user datagram protocol (UDP) provides an unreliable, connectionless service to the invoking application. he second of these protocols, TCP (transport control protocol), on the other hand, ofers several additional services to applications. First and foremost, it provides reliable data transfer. Using low control, sequence numbers, acknowledgments, and timers, TCP’s guarantee of reliable data transfer ensures that data are delivered from sending process to receiving process, correctly and in order. TCP thus converts IP’s unreliable service between end systems into a reliable data transport service between processes. TCP also uses congestion control. In principle, TCP permits TCP connections traversing a congested network link to share that link’s bandwidth equally. his is done by regulating the rate at which the sending-side TCPs can send traic into the network. UDP trafic, on the other hand, is unregulated. An application using UDP transport can send traic at any rate it pleases, for as long as it pleases. he conventional transport layer protocols that are used in wired networks are inadequate for ad hoc wireless networks because of inherent problems such as mobility, multihop route failure, hiddenand exposed-station problems, etc. that are always associated with the ad hoc networks. For example, wireless links sufer from high link error rate and TCP might interpret the packet loss caused by link error as congestion. Because of the mobility of the nodes, frequent 161 16 2 A D H O C M O BIL E WIREL E S S NE T W O RKS failure and change in the route are quite certain. his route failure in turn disturbs the current TCP control mechanisms. In response to these challenges, numerous modiications and optimizations have been proposed over the last few years to improve the performance of TCP in ad hoc networks. he irst half of this chapter discusses TCP challenges and design issues in ad hoc networks, TCP performance over mobile ad hoc networks (MANETs), and other performance. he second half focuses on transport layer protocols for ad hoc wireless networks. 5.2 TCP’s Challenges and Design Issues in Ad Hoc Networks 5.2.1 Challenges his section discusses how TCP performance degrades in ad hoc networks. his is because TCP has to face new challengers for many reasons, such as lossy channels at the physical layer, excessive contention and unfair access at the MAC (medium access control) layer, path asymmetry, network portion, failure in routes, and power constraints. • Lossy channels. In ad hoc networks, wireless channels can become unavailable for several reasons. • Signal attenuation. his is due to decrease in the intensity of the electromagnetic energy at the receiver because of the long distance between it and the source of transmission. • Doppler shift. he relative velocity of the transmitter and the receiver is the main reason for a Doppler shift. he efect of the shift is always undesirable as there is a shift in frequency of the arriving signal, which in turn complicates the reception of the signal. • Multipath fading. he radiated electromagnetic wave is always subjected to relection and difraction because of surrounding objects and obstacles. his causes the signal to travel over multiple paths from transmitter to receiver. Multipath propagation can further result in variations in the amplitude, phase, and geographical angle of the signal receiver at a receiver. 16 3 T R A NS P O R T P R O T O C O L S Fortunately, the reliable link layer protocols efectively increase the successful transmission ratio in wireless channels and mitigate the impact of lossy wireless channels on TCP performance. Of course, this done by implementing techniques: automatic repeat request (ARQ ) and forward error correction (FEC). It may be noted that the packets that are transmitted over a fading channel may cause malfunctioning of the routing protocol. Application of DSDV (destination sequence distance vector) and AODV (ad hoc on-demand distance vector routing) protocols in a real network would not provide a stable multihop route because of multipath fading behavior of the channel. In ad hoc networks, contention-based MAC protocols such as IEEE 802.11, where the neighboring modes contend for the shared wireless channels before transmitting, have been widely deployed. here are three important problems: the hidden terminal, the exposed terminal, and channel capture. 5.2.1.1 Excessive Contention and Unfair Access at MAC Layer 5.2.1.1.1 Hidden and Exposed Station Problems We referred to hidden- and exposed-station problems in the previous section. It is time now to discuss these problems and their efects. Hidden-station problem. Figure 5.1 shows examples of the hidden-station problem. Station B has a transmission range, shown by the left oval (sphere in space); every station in this range can hear any signal transmitted by station B. Station C has a transmission range shown by the right oval (sphere in space); every station located in this range can hear any signal transmitted by C. Station C is outside the transmission range of B; likewise, station B is outside the transmission Range of C Range of B B A C Figure 5.1 Hidden-node problem. B and C are hidden from each other with reference to A. 16 4 A D H O C M O BIL E WIREL E S S NE T W O RKS range of C. Station A, however, is in the area covered by both B and C; it can hear any signal transmitted by B or C. Assume that station B is sending data to station A. In the middle of this transmission, station C also has data to send to station A. However, station C is out of B’s range and transmissions from B cannot reach C; therefore, C thinks the medium is free. Station C sends its data to A, which results in a collision at A because this station is receiving data from both B and C. In this case, we say that stations B and C are hidden from each other with respect to A. Hidden stations can reduce the capacity of the network because of the possibility of collision. he solution to the hidden-station problem is the use of the handshake frames like RTS (request to send) and CTS (clear to send). Exposed-station problem. Now consider a simulation that is the inverse of the previous one: the exposed-station problem. In this problem a station refrains from using a channel when it is in fact available. In Figure 5.2, station A is transmitting to station B, and station C has some data to send to station D that can be sent without interfering with the transmission from A to B. However, station C is exposed to transmission from A; it hears what A is sending and thus refrains from sending. In other words, C is too conservative and wastes the capacity of the channel. he handshaking message of RTS and CTS cannot help in this case. Station C hears the RTS from A, but does not hear the CTS from B. After hearing the RTS from A, station C can wait for a time so that the CTS from B reaches A; it then sends an RTS to D to show that it needs to communicate with D. Both stations B and Range of A Range of B B A C D Range of C Figure 5.2 Exposed-node problem. C is exposed to transmission from A to B. 16 5 T R A NS P O R T P R O T O C O L S Exposed to A’s Transmission A B RTS C D RTS CTS RTS RTS CTS Data Data Time Time Collision here Time Time Figure 5.3 Handshaking messages during exposed-node problem. A may hear this RTS, but station A is in the sending state, not the receiving state. Station B, however, responds with CTS. he problem is here. If station A has started sending its data, station C cannot hear the CTS from station D because of the collision; it cannot send its data to D and remains exposed until A inishes sending its data, as Figure 5.3 shows. Channel capture. In addition, the aggressive behavior of TCP and its poor interaction with the MAC layer further exacerbate the unfairness situation. In extreme cases, a few TCP lows capture the channel, and other TCP lows cannot access it for some amount of time, leading to similar false link failure. Path asymmetry. Path asymmetry in TCP-based wireless ad hoc networks can be classiied as the following types: • Bandwidth asymmetry. his type of asymmetry is found in satellite networks in which forward and backward data low in diferent paths with diferent speeds. In ad hoc networks, this can happen as well, since not necessarily all nodes have the same interface speed. So, even if a common path is used in both directions of a given low, they do not necessarily have the same bandwidth. In addition, as the routing protocols can assign diferent paths for forward and backward traic, asymmetry is certain in wireless ad hoc networks. 16 6 A D H O C M O BIL E WIREL E S S NE T W O RKS • Loss rate asymmetry. his type of asymmetry takes place when the backward path is considerably more lossy than the forward path. In ad hoc networks, this can be a serious issue as all links involved are wireless, which is highly error prone and dependent on local constraints that can vary from place to place and also due to the mobile nature of the network. • Media access asymmetry. his can occur due to the characteristics of the shared wireless medium used in ad hoc networks. Speciically, in this kind of network, TCP ACKs have to contend for the medium along with TCP data, and this may cause excessive delay as well as discarding on TCP ACKs. • Route asymmetry. Unlike the preceding three forms of asymmetry, where forward and backward paths can be the same, route asymmetry implies distinct paths in both directions. Route asymmetry is associated with the possibility of different transmission ranges for the nodes in this scenario. In fact, the transmission range of each node depends on its instantaneous battery power level, which, in most cases, is likely to vary over time. he inconvenience with diferent transmission ranges is that it can lead to conditions in which the forward data follow a considerably shorter path than the backward data (TCP ACK). Due to lack of power in one (or more) of the communications with the destination, it has to communicate through a multihop connection. However, multihop connections are prone to be low-throughput efective. Consequently, the TCP ACKs may face considerable disruption. Furthermore, mobility and variation in the battery power level make the problem even worse since they may cause frequent route change. To summarize, all these types of asymmetry may ultimately result in damaging the forward throughput and lead to inaccuracy on RTT estimation. In order to improve TCP performance, three techniques have been proposed that may be useful in ad hoc networks: 16 7 T R A NS P O R T P R O T O C O L S 1. TCP header compression is based on the fact that most of the ield of TCP header compression has been proposed to reduce the size of TCP ACK packets in the backward path. 2. ACK iltering reduces the number of TCP ACKS transmitted in the backward path. his scheme takes advantage of the fact that the ACK packets are cumulative. 3. ACK congestion control causes the receiver to control the congestion on the backward path. Network partition. Mobile terminals in ad hoc networks can be regarded as simple graphs in which mobile terminals are the “vertices” and a successful transmission between two terminals is an edge. Whenever there is a disconnection in such a graph because of random movement of mobile nodes in an ad hoc wireless network, this can lead to network partitions. Energy-contained operation of nodes is also another cause for network partition; as is evident from Figure 5.4, when node D moves away from node C, this results in a partition of the network. he TCP agent of node A cannot receive the TCP ACK transmitted by F. If the partition persists for a duration greater than retransmission time-out (RTO) of the node A, the TCP agent stores the exponential back-of, which consists of doubling the RTO whenever the time-out expires. TCP has no information about the time of network reconnection. his lack of information may lead to long idle periods during which the network is connected but TCP is in the back-of state. Routing failures. Node mobility and contention on the wireless channel are the two important causes of routing failure. he reestablishment of route and its duration after route failure in ad hoc networks depends on facts like mobility pattern of mobile nodes, traic characteristics, and the underlying routing protocol. As already discussed Move(1) B A D C Figure 5.4 Example for network partition. Move(2) F E 16 8 A D H O C M O BIL E WIREL E S S NE T W O RKS in the previous section, TCP senders do not have information on the route reestablishment event, throughput a session delay will designed because of large idle time. Also, if the new route established is not comparable with old route, then TCP will come across a large luctuation in routed trip time (RTT). In ad hoc networks, routing protocols that depend on broadcast Hello messages to ind neighbor nodes may sufer from the “communication gray zones” problem. In such zones, data messages cannot be exchanged even if a neighbor’s node are reachable as is indicated by Hello messages and control framer. his is how routing protocols will experience routing failures. Lundgren et al. [1] have conducted experiments and have subsequently concluded that the origin of this problem is heterogeneous transmission routes, absence of ACKs for broadcast packets, small packet size of Hello messages, and luctuations of wireless links. Power constraints. Mobile nodes are battery powered devices and, because of mobility, nodes have limited power supply due to which processing power is limited. his is a major issue in ad hoc wireless networks, as each node acts as a router and as an end station; obviously, additional energy is required to forward and reradiate the packets. It is the responsibility of TCP to use this scarce power source in an “eicient” manner—that is, minimizing the number of unwanted retransmissions at the transport layer as well as at the link layer. In ad hoc wireless networks, there are two correlated power problems: power saving and power control. Power saving strategies have been investigated at several levels of mobile nodes, including power layer transmission, operation systems, and applications. Power control is achieved by adjusting the transmission power of mobile devices. Power control can be jointly used with routing and transporting agents to improve the performance of ad hoc networks. Power constraint communications reveal also the problem of cooperation between nodes, as nodes may not participate in routing and forwarding procedures in order to save battery power. 5.2.2 Design Goals • he transport layer protocol should maximize the throughput per connection. T R A NS P O R T P R O T O C O L S 16 9 • he transport layer protocol should provide fairness across competing lows. • he transport layer protocol should have reduced e-connection setup and connection maintenance overheads. he protocol must facilitate scalability in large networks by reducing the requirements for setting up and maintaining the connections • he protocol should provide means and measures for congestion control and low control in the ad hoc wireless network. • he protocol should be able to ofer both reliable and unreliable connections. • he protocol should be able to adapt to the mobility and change in topology of the ad hoc wireless network. • One of the important resources must be used eiciently. • he protocol should be aware of limitations and resource constraints. • Like any other layers in a network, this protocol should make use of information from the lower layer. • he protocol should ofer a well-deined cross-layer interaction framework. • his protocol should also maintain end-to-end semantics. 5.3 TCP Performance over MANETs 5.3.1 TCP Performance In this section the TCP performance over mobile ad hoc networks is discussed. he efect and impact of mobility on TCP throughput in MANETs has been investigated by Monks, Sinha, and Bharghavan [2]. According to their simulation report, nodes move according to the random-way point model with pause time of 0 s. he speed of the node was uniformly distributed in [0.9v–1.1v] for some mean speed v. By applying the dynamic source routing (DSR) algorithm at the routing layer, the author reports that when the speed increases from 2 to 10 m/s, the throughput drops sharply. However, it is found that there is only a slight drop in throughput when the mean speed is increased from 10 to 30 m/s. Also, the authors remark that, for a given mean speed, certain mobility patterns result in throughput close 17 0 A D H O C M O BIL E WIREL E S S NE T W O RKS to zero, even though the other mobility patterns are able to achieve high throughput. After careful analysis of the simulation trace of patterns with throughput, the authors found that the TCP senders’ routing protocol is unable to recognize and lush out stale routes from its cache, which in turn leads to repeated failures in routing and TCP retransmission time-outs. hey found that, most of the time, the TCP sender and receiver are close to each other. From the nature of the mobility patterns, the authors observed that, as the sender nodes and receiver nodes move closer to each other, DSR can maintain a valid route by shortening the existing route before a routing failure occurs. But, as sender and receiver move away from each other, DSR waits until a failure occurs to lengthen a route. he route failure induces up to a TCP-window’s worth of packet losses and the subsequent route discovery process may result in repeated TCP time-outs, which are called “serial time-outs.” Losses that are induced by mobility of nodes may cause TCP invocation of congestion control that deteriorates the TCP throughput. So, in order to prevent such TCP invocation, the authors suggest using the explicit link failure notiication technique. One of the main problems that TCP has over MANETs is that “TCP treats loss induced by route failure as signs of network congestion.” Anantharaman et al. [3] identify a number of factors that contribute to the degradation of TCP throughput when nodes are mobile. he two important factors that are responsible for such degradation of TCP performance are 1. MAC failure detection latency 2. Route recomputation latency MAC failure detection latency is deined as the amount of time spent before the MAC concludes a link failure. he authors found that in the case of the IEEE 802.11 protocol, this latency is small and independent of the speed of the moving nodes, when the load is light (one TCP connection). However, in the case of high loads, they observed that the value of this latency is magniied and becomes a function of the node’s speed. Route computation latency is deined as the time taken to recompute the route after a link failure. hey found that, as for MAC failure T R A NS P O R T P R O T O C O L S 171 detection latency, the route computation latency increases with the load and becomes a function of the node’s speed in the high load case. Also, the authors identify another problem, called MAC packet arrival, that is related to routing protocols. In fact, when a link failure is detected, the link failure is sent to the routing agent of the packet that triggered the detection. If other sources are using the same link in the path to their destinations, the node that detects the link failure has to wait till it receives a packet from these sources before they are informed of the failure. his also contributes to the delay after a source realizes that a path is broken. Dyer and Boppana [4] report simulation results on the performance of TCP Reno over three diferent routing protocols (ad hoc on demand vector [5], dynamic source routing [6], and ADV [7]). It is found that ADV performs well under a variety of mobility patterns and topologies. Furthermore, they propose a heuristic technique called ixed RTO to improve the performance of on-demand routing protocols (AODV and DSR). According to this technique, the TCP’s performance degrades when the multipath routing protocol SMR [8] is used. Multipath routing afects TCP by two factors: the inaccuracy of the average RTT measurement that leads to more premature time-outs and the out-of-order packet delivery via diferent paths, which triggers duplicated ACK, which in turn triggers TCP congestion control. 5.3.2 Other Problems he mobility nodes and change in topology may tend to change in routes, as a result of which there is a need for updating routes as soon as possible. he TCP sender is very slow change in topologies, the router from its cache, resulting in very frequent failure in routing. And intermediate nodes may reply to route requests with these state routes in their cache. his complicates the problem of routing, and the problem gets still worse when neighbor nodes overhear the state routed in replies. herefore, state routes are spread throughout the network, causing further route failure in the network. he ultimate efect is an adverse efect on TCP performance. It can be solved by adjusting the route cache timing depending on route failure route. 5.3.2.1 State Route Problem 17 2 A D H O C M O BIL E WIREL E S S NE T W O RKS he MAC layer adaptation algorithm is supposed to increase the throughput when there is a high channel rate. But a poor rate adaptation algorithm could decrease the throughput. he multiplicative increase–multiplicative decrease rate algorithm causes the periodic retransmissions of TCP packets. his further causes network trashing on wireless local networks. Because of MAC layer retransmission, there will be a waste of channel resources, so there is a need for a better rate adaptation algorithm. here are many problems that cause TCP performance degradation in mobile ad hoc networks, among which the following are more important: 5.3.2.2 MAC Layer Rate Adaptation Problem • he ability of TCP to distinguish between packet losses due to congestion route failure • he TCP sufering from frequent route failure • he contention on the channel • he unfairness problem of the TCP 5.4 Ad Hoc Transport Protocols 5.4.1 Split Approaches he fairness and throughput of TCP sufer when it is used in mobile area networks; that is, as length of the path increases, the overall degradation of throughput also increases. he short connections (i.e., in terms of path length) enjoy an unfair advantage over long connections, which means the short connections generally obtain higher throughput as compared with longer connections. his can also lead to unfairness among TCP sessions, where one session may obtain much higher throughput than other sessions. his unfairness problem is further worsened by the use of the MAC protocol, which is commonly used in ad hoc networks. his MAC protocol is described in the IEEE 802.11 standard. One speciic problem that is induced by the explanations of back-of mechanisms of the IEEE 802.11 MAC protocol is the “channel capture efect.” Because of this efect, the most data-intense connection dominates the multiple access wireless channels. If there are multiple data-intense connections, the irst connection “captures” the channel until it has transported all of its data to the destinations. T R A NS P O R T P R O T O C O L S 173 his leads to unfairness to the connection that begins later or further away from the point of contention. Hence, once again, the connections with a large number of hops are at a disadvantage. he spilt-TCP approach provides a unique solution to this problem; the scheme splits the transport layer objectives into congestion control and reliable packet delivery. Congestion control is a local phenomenon due to high contention and high traic load in local regions. In the mobile ad hoc wireless network environment, this demands a local solution. At the same time, reliable packet delivery is an end-to-end acknowledgment. In addition to splitting the transport layer functionalities, splitTCP splits long TCP connections into shorter localized segments or zones. his is done in order to improve the performance in terms of fairness. To substantiate this idea, the split-TCP scheme uses a number of selected intermediate nodes between these localized segments known as proxy nodes. Using this scheme, if a packet needs to be transmitted, the proxy node receives the TCP packets; when it intercepts TCP packets, it reads the content of packets, bufers them in its local bufer, and send on acknowledgment to the source (or previous proxy node). his acknowledgment is known as local acknowledgment (LACK) and the proxy node takes over the responsibility of delivering the packets further, at an appropriate rate, to the next local segments. Upon the receipt of a LACK (from the next proxy or from the inal destination), a proxy will purge the packet from its bufer. he forwarded packet could possibly be intercepted again by another proxy and so on. In this scheme, there is no change in the end-to-end acknowledgment system of TCP, meaning that the source will not clear a packet from its bufer unless it is acknowledged by a cumulative ACK from the destination. However, it may be noted that the overhead incurred in including infrequent end-to-end ACKs in addition to the LACKs is extremely small and can be considered to be acceptable, given the advantages of split TCP. In Figure 5.5, node S initiates a TCP session to the node D. Nodes p1 and p2 are chosen as proxy nodes. he number of proxy nodes in a TCP session is determined by the length of the path between source and destination nodes. 174 A D H O C M O BIL E WIREL E S S NE T W O RKS Message flows through the first stage from S to P1 S C A B Message flows through the second stage from P1 to P2 P2 P1 D LACK message from P1 to S Figure 5.5 Message flows through the third stage from P2 to D E F G D LACK message from P2 to P1 LACK message from D to P2 TCP with proxies p1 and p2. he proxy node p1, upon receipt of each TCP from the source node S, acknowledges with a LACK packet and bufers the received packets. his bufered packet is forwarded to the next proxy (in this case, node p2) at a rate proportional to the rate of arrival of LACKs from the next proxy node or destination. he source keeps transmitting about purges a packet from its buffer only upon receipt of an end-to-end ACK for that packet from the destination. (Note that this might be indicated in a cumulative ACK for a plurality of packets.) his scheme essentially splits the transport layer functionalities into those of congestion control and end-to-end reliability. Correspondingly, the transmission control window at the TCP ender is split into two windows: the congestion window and the end-toend window. he congestion window will always be a subwindow of the end-to-end window. While the congestion window changes in accordance with the rate of arrival of LACKs for the next proxy, the end-to-end window will change in accordance with the rate of arrival of end-to-end ACKs from the destination. 5.4.2 End-to-End Approach he end-to-end approach mainly addresses the problem of a TCP’s misinterpretation of packet losses due to route failure due to network congestion in mobile ad hoc networks. T R A NS P O R T P R O T O C O L S 17 5 In order to improve the performance of an ad hoc wireless network, traditional TCP has been modiied. TCP feedback employs a feedback-based approach. he TCP sender gets TCP-F, which relies on the support of a reliable link layer and routing protocol. It is the responsibility of the routing protocol to repair the broken links within a desirable time period. TCP-F intends to minimize the throughput degradation resulting from rapid change in mobility of topology due to the mobility of mobile hosts. he frequent change in topology of mobile nodes leads to packet losses. TCP misinterprets such losses as congestion and invokes congestion control, leading to unnecessary retransmission and degradation of throughput. In feedback-based TCP, whenever an intermediate node detects the link break, the intermediate nodes sends a route failure notiication (RFN) packet toward the sender. his intermediate node maintains the information about all the RFN packets it has originated so far and updates its routing table accordingly. When a TCP sender receives the RFN, the sender goes into the snooze state. As soon as it enters the snooze state, the sender stops sending any more packets to the destination, freezes all of its timers, freezes its congestion window, and sets up a route failure timer, which is the time required to reestablish with the route. he route failure timer that is thus initiated is dependent on network size, network topology, and network protocol. When this timer expires, the sender changes its state from the snooze to the achieve state and, of course, the sender node receives the information regarding reestablishment of the route from an intermediate node through a route re-establishment notiication (RRN) packet. As soon as a sender gets the RRN packet, it transmits all the packets in its bufer, assuming that the network is back to its active or connected state. Figure 5.6 clearly explains the operation of the TCP-F protocol. his igure shows a TCP session set up between nodes S and D. When the intermediate link between node IN2 and D fails, the intermediate node originates an RFN packet and sends that packet in the reverse direction toward the source. After receiving the RFN packet, the source node enters a snooze state. It remains in its snooze state till it receives another packet called the RRN packet. his notiies about reestablishment of the link. Advantages include the following: 5.4.2.1 TCP Feedback (TCP-F) 17 6 A D H O C M O BIL E WIREL E S S NE T W O RKS IN1 S D IN2 a. TCP-F connection from S to D-TCP-session is established between S and D S IN1 IN2 X D RFN RFN b. Link IN2-D breaks and originate RFN-sender enters to snooze-state S IN1 RRN IN2 D RRN c. Link IN2-D reestablished. RRN have been sent to the sender Figure 5.6 Operation of TCP-F protocol. • Simple feedback brings a good solution to minimize the problem due to frequent failure in the links. • It is a good congestion control mechanism. he following is a disadvantage: • Implementation of feedback-based TCP requires modiication to existing TCP libraries. 5.4.2.2 TCP-ELFN TCP-ELFN is similar to TCP-F; however, in contrast to TCP-F, the evolution of the proposal is based on a real interaction between TCP and the routing protocol. Such interaction is required to inform the TCP agent about link and route failures so that it can avoid responding to the failure as if to congestion. In TCP-ELFN, the explicit link failure notiication (ELFN) packet is originated by the intermediate node detecting path breaks upon detection of a link failure to the sender. To implement an ELFN message, the route failure message of DSR is modiied to carry a payload similar to a “host unreachable” ICMP (Internet control message protocol) message. Upon receiving an ELFN, the TCP sender disables its retransmission timers and enters into a “standby” state by freezing the regular transmission of packets until the connection is reestablished. hen the transmission is resumed. During this node of standby, the TCP sender periodically sends a small packet to probe the network to see if a route has been established. Upon reception of an acknowledgment packet T R A NS P O R T P R O T O C O L S 17 7 for the probe packets, it comes out of standby mode and restores the retransmission timer and continues to perform regular transmission of packets. Similarly to TCP-F and TCP-ELFN, ATCP (ad hoc transmission control protocol) utilizes a network layer feedback mechanism with which the TCP sender can come to know the status of a network path through which TCP packets are propagated. he TCP sender can be put into a persistence state, congestion control state, or retransmit state, depending upon the feedback information that it gets from intermediate nodes. As soon as a network partition is noticed by an intermediate node, the TCP sender enters the persistence state, where it avoids unnecessary retransmissions. During this state, the TCP sender sets TCP’s congestion window size to one in order to ensure that TCP does not continue to use old congestion window values. his forces TCP to probe the correct value of the congestion window to be used for the new route. If an intermediate node encounters packet loss due to error, then the ATCP immediately retransmits it without invoking the congestion control algorithm. In order to be compatible with widely deployed TCP-based networks, ATCP provides this feature without modifying the traditional TCP. ATCP is shown in Figure 5.7 and it is implemented as a thin layer between network layer and transport layer without any changes in the existing TCP protocol. he import function of the ATCP layer keeps track of the packet sent and received by the TCP sender, the state of the network, and the state of the TCP sender. As shown in the ATCP state diagram, the four possible states are normal, congested, loss, and disconnected. ATCP at the sender is in the normal state. In this state, ATCP does nothing and it remains invisible. In a lossy channel, it is likely that some packets are lost or may arrive out of order. his receiver generates duplicate ACKs. In the case of traditional TCP, upon reception of three consecutive duplicate ACKs, it transmits the ofending segment and shrinks the congestion window. But ATCP in its normal state counts the number of duplicate ACKs received for any segment. When it sees that three duplicate ACKs have been received, it does not forward the third duplicate ACK, but puts TCP in persist node and ATCP in the loss state. Hence, the TCP sender avoids invoking congestion control. 5.4.2.3 Ad Hoc-TCP 178 A D H O C M O BIL E WIREL E S S NE T W O RKS Receive Destination Unreachable ICMP CWND Disconnected Receive dup ACK or packet from receiver TCP sender put in persist state 1 Receive ECN TCP Transmits a packet )$*+,-.,/ Figure 5.7 #$%&'( New ACK RTO about to expire OR 3 dup ACKs Loss ATCP Retransmits segments in TCP’s buffer State transition diagram for ATCP at sender. In the loss state ATCP transmits the unacknowledged segments from TCP’s send bufer. When a new ACK arrives from the TCP receiver, ATCP forwards that ACK to TCP, which also removes TCP from the persist node. ATCP then returns to its normal state. When the ATCP sender is in the loss state, receipt of an ECN message changes it to a congested state. In addition to this transition, the ATCP sender removes the TCP sender from the persist state. When the network detects congestion, the ECN lag is set in ACK and data packets. Let us assume that a TCP receives this message when in its normal state. ATCP moves into its congested state and does nothing. It ignores any duplicate ACKs that arrive. In other words, ATCP does not interfere with TCP’s normal congestion behavior. After TCP transmits a new segment, ATCP returns to its normal state. Mobility of nodes in ad hoc networks causes route failure or a transient network partition. When this happens, ATCP expects the network layer to detect these and inform the ATCP sender through an ICMP destination unreachable message. When ATCP receives this message, it puts the TCP sender into persist mode and itself enters the disconnected state. It continues to be in the DISCONN state until it is connected and receives any data or duplicate ACKs. On the occurrence of any of these events, ATCP changes to the normal state. TCP periodically generates probe packets and this is done in order of the path. he receipt of an ICMP T R A NS P O R T P R O T O C O L S 179 DUR message in loss state or congested state causes a transition to the DISCONN state. When ATCP puts TCP into the persist state, it sets the congestion window to one segment. his is done in order to make TCP probe for the new congestion when the new route is available. ATCP ofers two important advantages: 1. Signiicant improvement in TCP performance while maintaining the end-to-end semantics of TCP 2. Compatibility with traditional TCP Its disadvantages include: 1. Dependence on network layer to detect route failure and network partitions 2. Inclusions of a thin ATCP layer to the TCP/IP protocol stack that need changes in inter foretimes 5.4.2.4 TCP-Bufering Capability and Sequencing Information (TCPBUS) TCP-BUS is similar to TCP-F and TCP-ELFN and it uses the network feedback to detect route failure and to take react suitably to such failures. his incorporates bufering capability in mobile nodes and uses associatively based routing (ABR) as a routing scheme. TCP-BUS makes use of some of the special messages such as localized query (LQ ) and REPLY, deined as part of ABR for inding a partial path. hese control messages are modiied and intended to carry TCP connection and segment information. At the source, the TCP-BUS sender transmits its segments in the same manner as general TCP, when there are no feedback messages. However, upon the detection of a path break, an intermediate node called the pivot node (PN) originates an explicit route disconnection (ERDN) feedback message. he ERDN feedback message is sent back to the TCP-BUS sender. When a source receives the ERDN feedback message, it stops sending data packets. In addition, it freezes all timer values and window sizes as in TCP-F. Packets in transit at the intermediate from TCP-BUS sender to the PN are bufered until a new partial path from this intermediate node to the TCP-BUS receiver is formed by the pivot node. he timers for all the bufered packets at various intermediate nodes, source nodes, 18 0 A D H O C M O BIL E WIREL E S S NE T W O RKS and pivot nodes use time at values proportional to round-trip time (RTT). his is required to avoid unnecessary retransmissions. he nodes between TCP-BUS sender and PN can request the TCP-BUS sender to transmit any of the lost packets selectively. Upon detection of a path break, the downstream node originates as a route notiication (RN) packet to the TCP-BUS destination node, which is forwarded by all the downstream nodes in the path. his in turn invalidates the old partial path and lushes out bufered packets along that path. he ERDN packet is sent to the TCP-BUS sender in a reliable way using an implicit acknowledgment and retransmission mechanism. he PN node includes the sequence number of the TCP segment belonging to the low that is currently at the head of its queue in the ERDN packet. he PN also attempts to ind a new partial path to the TCP-BUS receiver. Availability of such a partial path to a destination is explicitly intimated to a TCP-BUS sender through a route successful notiication (RSN) message. TCP-BUS uses the route reconiguration mechanism of ABR to set the partial route to the receiver node. his needs other routing protocols to be modiied to support TCP-BUS. he control messages LQ and REPLY are modiied to carry the sequence number of the segment at the need of the queue bufered at PN and sequence number of the last successful segment the TCPBUS receiver received. he LQ packet carries the sequence number of the last successful segment the TCP-BUS receiver received. his makes the TCP-BUS receiver understand the packets lost in transition and those bufered at the intermediate nodes. his is used to avoid fast retransmission packet delivery. Upon a successful LQ-REPLY process to obtain a new route to the TCP-BUS receiver, PN informs the TCP-BUS sender of the new partial path using the ERSN packet. When the TCP-BUS sender receives an ERSN packet, it resumes the data transmission. Since there is a chance for ERSN packet loss due to congestion in the network, it needs to be sent reliably. hat TCP-BUS sender also periodically originates probe packets to check the availability of a path to the destination. Figure 5.8 shows an illustration of the propagation of ERDN and RN messages when a link between nodes 4 and 12 fails. 181 T R A NS P O R T P R O T O C O L S TCP-BUS Receiver 8O4 8O5 01234 5367 8O3 8O2 8O7 8O6 =:3;75 <15; 8O0 >?0 6@4@ A39 BCD8 8L 8S 8K 8M 8N 8O1 8R 87493:; <15; C8 EF 8Q CB0EH 879 I@:41@< I@4J 8O 8P TCP-BUS sender Figure 5.8 Operation of TCP-BUS. When a TCP-BUS sender receives the ERSN message, it understands, for the sequence number of the last successfully received packets at the destination and the sequence number of packets at the head of the queue at PN, that the packets will be delayed further and hence uses a selective acknowledgment strategy instead of fast retransmission. he last packets are retransmitted by the TCP-BUS sender. During the retransmission of this last packet, the network congestion between the TCP-BUS sender and PN is handled in a way similar to that in traditional TCP. Advantages include: • Improved performance • Uses of bufering, sequence numbering, and selective acknowledge, thus avoiding fast retransmission Disadvantages include: • More dependency on routing protocol and bufer at intermediate nodes • Performance adversely afected in the event of failure of intermediate nodes 18 2 A D H O C M O BIL E WIREL E S S NE T W O RKS Table 5.1 Comparison between Different End-to-End Approaches TCP-F ELFN ATCP TCP-BUS High BER packet loss Route failure (RF) detection Not handled Not handled Handled Not handled RFN packet freezes TCP Sender state ELFN packet freezes TCP Sender state ERDN packet freezes TCP Sender state Route reconstruction (RR) detection RRN packet resumes TCP to normal state Not handled Old CW and RTO Probing mechanism ICMP “destination unreachable” freezes TCP Sender state Probing mechanism Not handled Old CW and RTO Handled Reset for each new route Not handled Old CW and RTO Not handled Not handled Not handled Handled Emulation; no routing protocol considered Simulation Experimental; no routing protocol considered Simulation Packet reordering Congestion window and retransmission time-out (RTO) after RR Reliable transmission of control messages Evaluation ERSN packet resumes TCP to normal state Table 5.1 gives an illustration of the comparison among the diferent end-to-end approaches of TCP protocols. 5.5 Summary his chapter discussed the major challenges that a transport layer protocol faces in mobile ad hoc wireless networks. he important design goals of a transport layer protocol were listed, and the chapter also provided a classiication of existing transport layer solutions. TCP is one of the important and most widely used transport layer protocols and is regarded as the backbone of today’s Internet. It provides endto-end, reliable, byte-streamed, in-order delivery of packets to nodes. Because TCP was designed to handle problems present in traditional wired networks, many of the issues that are present in dynamic topology networks such as ad hoc wireless networks are not addressed. T R A NS P O R T P R O T O C O L S 18 3 his causes reduction of throughput when TCP is used in ad hoc wireless networks. It is very important to use TCP in ad hoc wireless networks as it is important in seamless communication with the Internet whenever and wherever it is available. his chapter provided a discussion on the major reasons for the degradation in the performance of traditional TCP in ad hoc wireless networks and explained a number of recently proposed solutions to improve TCP’s performance. References 1. Lundgren et al. 2. Monks, J. P., P. Sinha, and V. Bharghavan. 2000. Limitations of TCPELFN for ad hoc networks. Workshop on Mobile and Multimedia Communication, Marina del Rey, CA, Oct. 2000. 3. Anantharaman et al. 4. Dyer, T. D., and R. Bopanna. 2001. A comparison of TCP performance over three routing protocols for mobile ad hoc net works. Proceedings of ACM MOBIHOC 2001, Long Beach, CA, Oct. 2001. 5. Perkins, C., and T. Watson. 1994. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in Proceedings of ACM SIGCOMM, London, UK. 6. Johnson, D., D. Maltz, and Y. Hu. 2003 (Internet draft). he dynamic source routing protocol for mobile ad hoc networks (DSR). 7. Boppana, R., and S. Konduru. 2001. An adaptive distance vector routing algorithm for mobile, ad hoc networks, in Proceedings of IEEE INFOCOM, Anchorage, AK. 2001. 8. Lu, S., and M. Gerla, Split multipath routing with maximally disjoint paths in ad hoc networks, in Proceedings of IEEE ICC, Helsinki, Finland. 9. Holland, G., and N. Vaidya. 2002. Analysis of TCP Performance over mobile ad hoc networks, ACM Wireless Networks, 8 (2): 275–288. 10. Ramakrishnan, K., S. Floyd, and D. Black. 2001. he Addition of Explicit Congestion Notiication (ECN) to IP. Bibliography Bakre, A., and B. Badrinath. 1995. I-TCP: Indirect TCP for mobile hosts. Proceedings of 15th International Conference on Distributed Computing Systems (ICDCS), Vancouver, BC, Canada, May. Bakshi, B., P. Krishna, N. H. Vaidya, and D. K. Pradhan. 1997. Improving performance of TCP over wireless networks. Proceedings of 17th International Conference on Distributed Computing Systems (ICDCS), Baltimore, MD, May. 18 4 A D H O C M O BIL E WIREL E S S NE T W O RKS Balakrishnan, H., and S. Seshan. 1995. Wireless networks. Proceedings of ACM MOBICOM, Berkeley, CA, Nov. Chandran, K., S. Raghunathan, S. Venkatesan, and R. Prakash. 1998. A feedback-based scheme for improving TCP performance in ad-hoc wireless networks. Proceedings of International Conference on Distributed Computing Systems, Amsterdam, May, pp. 472–479. Chen, T., and M. Gerla. 1998. Global state routing: A new routing scheme for ad hoc wireless networks. Proceedings of IEEE ICC’98, Aug., pp. 171–175. Chiang, C. C., H. K. Wu, W. Liu, and M. Gerla. 1997. Routing in clustered multihop mobile wireless networks with fading channel. Proceedings of IEEE Singapore International Conference on Networks SICON’97, April, pp. 197–212. Corson, M. S., and J. Macker. 1999. Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations. Request for Comments 2501, IETF, Jan. Das, S. R., R. Castaneda, and J. Yan. 1998. Comparative performance evaluation of routing protocols for mobile ad hoc networks. Feeney, L. M. 1999. A taxonomy for routing protocols in mobile ad hoc networks. SICS technical report T99/07, Oct. 1999 (http://citeseer.ist.psu. edu/feeney99 t axonomy.html). Gerla, M., X. Hong, and G. Pei. 2001. Fisheye state routing protocol (FSR) for ad hoc networks. IETF draft. Handley, M., C. Bormann, B. Adamson, and J. Macker. 2003. NACK oriented reliable multi-cast (NORM) protocol building blocks. Internet draft, RMT Working Group (draft-ietf-rmt-bb-norm-05.txt). Henderson, T., and R. Katz. 1997. Satellite transport protocol (STP): An SSCOP-based transport protocol for datagram satellite net works. Proceedings of 2nd Workshop on Satellite-Based Information Systems (WOSBIS), Budapest, Hungary. Jaquet, P., P. Muhlethaler, and A. Qayyum. 2001. Optimized link-state routing protocol. IETF draft. Jiang, X., and T. Camp. 2002. A review of geocasting protocols for a mobile ad hoc network. Grace Hopper Celebration (GHC) (http://toilers.mines.edu/papers/pdf/Geocast-Review). Koksal, C. E., and H. Balakrishnan. 2000. An analysis of short-term fairness in wireless media access protocols (poster). Proceedings of ACM SIGMETRICS, Measurement and Modeling of Computer Systems, Santa Clara, CA, pp. 118–119. Liu, J., and S. Singh. 2001. ATCP: TCP for mobile ad hoc networks. Communications 19 (7): 1300–1315. Madruga, E. L., and J. J. Garcia-Luna-Aceves. 2001. Scalable multicasting: he core-assisted mesh protocol. Mobile Networks and Applications 6 (2): 151–165. Murthy, S., and J. J. Garcia-Luna-Aceves. 1996. An eicient routing protocol for wireless networks. ACM Mobile Networks and Applications 1:183–197. 6 Q UALIT Y OF S ERV I CE 6.1 Introduction For supporting multimedia applications, it is desirable that an ad hoc network has a provision of quality of service (QoS). However, providing the QoS in a mobile ad hoc network is a challenging task. Quality of Service (QoS) means that the network should provide some kind of guarantee or assurance about the level or grade of service provided to an application. he deinition for QoS and the QoS parameter may be considered diferent for diferent applications, which purely depends upon speciic requirements of an application. For example, an application that is delay sensitive may require the QoS in terms of delay guarantees. Some applications may require that the packets should low at certain minimum bandwidth. In that case, the bandwidth will be a QoS parameter. he other application may require a guarantee that the packets are delivered from a given source to a destination reliably; then, reliability will be a parameter for QoS. 6.2 Challenges he characteristics of an ad hoc network pose several challenges in the provision of QoS. Some of these challenges are as follows: • Dynamically varying network topology. Since the nodes in an ad hoc wireless network do not have any restriction on mobility, the network topology changes dynamically. Hence the admitted QoS sessions may sufer due to frequent path breaks, thereby requiring such sessions to be re-established over new paths. he delay incurred in re-establishing a QoS session 18 5 18 6 • • • • • A D H O C M O BIL E WIREL E S S NE T W O RKS may cause some of the packets belonging to that session to miss their delay targets/deadlines, which is not acceptable for applications that have stringent QoS requirements. Imprecise state information. In most cases, the nodes in an ad hoc wireless network maintain both the link-speciic state information and low-speciic state information. he linkspeciic state information includes bandwidth, delay, delay jitter, loss rate, error rate, stability, cost, and distance values for each link. he low-speciic information includes session ID, source address, destination address, and QoS requirements of the low (such as maximum bandwidth requirement, minimum bandwidth requirement, maximum delay, and maximum delay jitter). he state information is inherently imprecise due to dynamic changes in network topology and channel characteristics. Hence, routing decisions may not be accurate, resulting in some of the real-time packets missing their deadlines. Lack of central coordination. Unlike wireless LANs and cellular networks, mobile ad hoc networks (MANETs) do not have central controllers to coordinate the activity of nodes. his further complicates QoS provisioning in MANETs. Error-prone shared radio channel. he radio channel is a broadcast medium by nature. During propagation through the wireless medium, the radio waves sufer from several impairments, such as attenuation, multipath propagation, and interference (from other wireless devices operating in the vicinity). Hidden-terminal problem. he hidden-terminal problem is inherent in MANETs. his problem occurs when packets originating from two or more sender nodes that are not within the direct transmission range of each other collide at a common receiver node. his necessitates retransmission of packets, which may not be acceptable for lows that have stringent QoS requirements. he RTS/CTS control packet exchange mechanism adopted in the IEEE 802.11 standard reduces the hidden-terminal problem only to a certain extent. Limited resource availability. As MANETs have limited resources such as bandwidth, battery life, storage space, and processing capability, they have to be utilized in a very Q UA LIT Y O F SERV I C E 18 7 eicient way. Out of these, bandwidth and battery life are considered as very critical resources, the availability of which signiicantly afects the performance of the QoS provisioning mechanism. Hence, eicient resource management mechanisms are required for optimal utilization of these scarce resources. • Insecure medium. Security in a wireless channel is considerably less, due to the broadcast nature of the wireless medium. Hence, security is an important issue in MANETs, especially for military and tactical applications. MANETs are susceptible to attacks such as eavesdropping, spooing, denial of service, message distortion, and impersonation. Without sophisticated security mechanisms, it is very diicult to provide secure communication guarantees. he design choices for providing QoS support are described below. 6.2.1 Hard-State versus Soft-State Resource Reservation In any QoS framework, QoS resource reservation is a very important component. (A QoS framework can be considered as a complete system that provides required/promised services to each user or application). It is responsible for reserving resources at all intermediate nodes along the path from the source to the destination as requested by the QoS session. QoS resource reservation mechanisms can be broadly classiied into two categories: hard-state and soft-state reservation mechanisms. In hard-state resource reservation schemes, resources are reserved at all intermediate nodes along the path from the source to the destination throughout the duration of the QoS session. If such a path is broken due to network dynamics, these reserved resources have to be released explicitly released by a deallocation mechanism. Such a mechanism not only introduces additional control overhead, but also may fail to release resources completely in case a node previously belonging to the session becomes unreachable. Due to these problems, soft-state resource reservation mechanisms, which maintain reservations only for small time intervals, are used. hese reservations get refreshed if packets belonging to the same low are received before the time-out period. 18 8 A D H O C M O BIL E WIREL E S S NE T W O RKS he soft-state reservation time-out period can be equal to packet interarrival time or a multiple of the packet interarrival time. If no data packets are received for the speciied time interval, the resources are deallocated in a decentralized manner without incurring any additional control overhead. hus, no explicit teardown is required for a low. he hard-state schemes reserve resources explicitly; hence, at high network loads, the call-blocking ratio will be high, whereas softstate schemes provide high call acceptance in a gracefully degraded fashion. 6.2.2 Stateful versus Stateless Approach In the stateful approach, each node maintains either global state information or only local state information; in the case of the stateless approach, no such information is maintained at the nodes. State information includes both the topology information and the low-speciic information. he source node can use a centralized routing algorithm to route packets to the destination if the global state information is available. he performance of the routing protocol depends on the accuracy of the global state information maintained at the nodes. Signiicant control overhead is incurred in gathering and maintaining global state information. On the other hand, if mobile nodes maintain only local state information (which is more accurate), distributed routing algorithms can be used. Even though control overhead incurred in maintaining local/ state information is low, care must be taken to obtain loop-free routes. In the case of the stateless approach, neither low-speciic nor linkspeciic state information is maintained at the nodes. hough the stateless approach solves the scalability problem permanently and reduces the burden (storage and computation) on nodes, providing QoS guarantees becomes extremely diicult. 6.2.3 Hard QoS versus Soft QoS Approach he QoS provisioning approaches can be broadly classiied into two categories: hard QoS and soft QoS approaches. If QoS requirements of a connection are guaranteed to be met for the whole duration of the session, the QoS approach is termed as a hard QoS approach. If the Q UA LIT Y O F SERV I C E 18 9 QoS requirements are not guaranteed for the entire session, the QoS approach is termed as a soft QoS approach. Keeping network dynamics of MANETs in mind, it is very diicult to provide hard QoS guarantees to user applications. hus, QoS guarantees can only be given within certain statistical bounds. Almost all QoS approaches available in the literature provide only soft QoS guarantees. 6.3 Classification of QoS Solutions Based on the interaction between the routing protocol and the MAC (media access control) protocol, QoS approaches can be classiied into two categories: independent and dependent QoS approaches. In the independent QoS approach, the network layer is not dependent on the MAC layer for QoS provisioning. he dependent QoS approach requires the MAC layer to assist the routing protocol for QoS provisioning. Finally, based on the routing information, update mechanisms are employed. 6.3.1 MAC Layer Solutions he MAC protocol determines which node should transmit next on the broadcast channel when several nodes are competing for transmission on that channel. Some of the MAC protocols that provide QoS support for applications in MANETs are described below. Gerla and Tsai proposed cluster TDMA [1] for supporting real-time traic in ad hoc wireless networks (AWNs). In bandwidth-constrained MANETs, the limited resources available need to be managed eiciently. To achieve this goal, a dynamic clustering scheme is used in cluster TDMA (time division multiple access). he available nodes in the network are split into diferent groups. Each group has a cluster head (elected by members of that group), which acts as a regional broadcast node and as a local coordinator to enhance the channel throughput. Every node within a cluster is one hop away from the cluster head. Formation of clusters and selection of cluster heads are done in a distributed manner. Clustering algorithms split the nodes into clusters such that they are interconnected and cover all the nodes. hree such algorithms used 6.3.1.1 Cluster TDMA 19 0 A D H O C M O BIL E WIREL E S S NE T W O RKS are the lowest ID algorithm, highest degree (degree refers to number of neighbors within transmission range of a node) algorithm, and least cluster change (LCC) algorithm. In the lowest ID algorithm, a node becomes a cluster head if it has the lowest ID among all its neighbors. In the highest degree algorithm, a node with a degree greater than the degrees of all its neighbors becomes the cluster head. In the LCC algorithm, the cluster head change occurs only if a change in network causes two cluster heads to come into one cluster or one of the nodes moves out of the range of all the cluster heads. In each cluster, the corresponding cluster head maintains a power gain 2 matrix. It contains the power gain lists of all the nodes that belong to a particular cluster. It is useful for controlling the transmission power and the code division within a cluster. he TDMA scheme is used within a cluster for controlling access to the channel. Further, it is possible for multiple sessions to share a given TDMA slot via CDMA (code division multiple access). Across clusters, either spatial reuse of the time slots or diferent spreading codes can be used to reduce the efect of intercluster interference. A synchronous time division frame is deined to support TDMA access within a cluster and to exchange control information. Each synchronous time division frame is divided into slots. Slots and frames are synchronized throughout the network. A frame is split into a control phase and a data phase. he data phase supports both real-time and best-efort traic. Based on the bandwidth requirement of the real-time session, a virtual circuit (VC) is set up by allocating suicient numbers of slots in the data phase. he remaining data slots (i.e., free slots) can be used by the best-efort traic using the slotted-ALOHA scheme. For each node, a predeined slot is assigned in the control phase to broadcast its control information. he control information is transmitted over a common code throughout the network. At the end of the control phase, each node will have learned, from the information broadcast by the cluster head, the slot reservation status of the data phase and the power gain lists of all its neighbors. his information helps a node to schedule free slots, verify the failure of reserved slots, and drop expired real-time packets. A fast reservation scheme is used in which a reservation is made when the irst packet is Q UA LIT Y O F SERV I C E 191 transmitted, and the same slots in the subsequent frames can be used for the same connection. If the reserved slots remain idle for a certain time-out period, then they are released. 6.3.2 Network Layer Solutions he bandwidth reservation and real-time traic support capability of MAC protocols can ensure reservation at the link level only; hence, the network layer support for ensuring end-to-end resource negotiation, reservation, and reconiguration is very essential. To assist QoS routing, the topology information can be maintained at the nodes of AWNs. he topology information needs to be refreshed frequently by sending link-state update messages, which consume precious network resources such as bandwidth and battery power. Otherwise, the dynamically varying network topology may cause the topology information to become imprecise. his trade-of afects the performance of the QoS routing protocol. As path breaks occur frequently in AWNs compared to wired networks where a link goes down very rarely, the path satisfying the QoS requirements needs to be recomputed every time the current path gets broken. he QoS routing protocol should respond quickly in the case of path breaks and recompute the broken path or bypass the broken link without degrading the level of QoS. 6.4 QoS-Enabled Ad Hoc On-Demand Distance Vector Routing Protocol Perkins, Royer, and Das [2] have extended the basic ad hoc on-demand distance vector (AODV) routing protocol to provide QoS support in AWNs. To provide QoS, packet formats have been modiied in order to specify the service requirements that must be met by the nodes forwarding a route request (RREQ ) or a route reply (RREP). 6.4.1 QoS Extensions to AODV Protocol Each routing table entry corresponds to a diferent destination node. he following ields are appended to each routing table entry: maxi- 19 2 A D H O C M O BIL E WIREL E S S NE T W O RKS mum delay, minimum available bandwidth, list of sources requesting delay guarantees, and list of sources requesting bandwidth guarantees. he maximum delay extension ield is interpreted diferently for RREQ and RREP messages. In an RREQ message, it indicates the maximum time (in seconds) allowed for a transmission from the current node to the destination node. In an RREP message, it indicates the current estimate of cumulative delay from the current intermediate node forwarding the RREP to the destination. Using this ield, the source node inds a path (if it exists) to the destination node satisfying the maximum delay constraint. Before forwarding the RREQ , an intermediate node compares its node traversal time (i.e., the time it takes for a node to process a packet) with the (remaining) delay indicated in the maximum delay extension ield. If the delay is less than node traversal time, the node discards the RREQ packet. Otherwise, the node subtracts node traversal time from the delay value in the extension and processes the RREQ as speciied in the AODV protocol. he destination node returns an RREP with the maximum delay extension ield set to zero. Each intermediate node forwarding the RREP adds its own node traversal time to the delay ield and forwards the RREP toward the source. Before forwarding the RREP packet, the intermediate node records this delay value in the routing table entry for the corresponding destination node. 6.4.1.1 Maximum Delay Extension Field Similarly, a minimum bandwidth extension ield is also proposed to ind a path (if it exists) to the destination node satisfying the minimum bandwidth constraint. A QOSLOST message is generated when an intermediate node experiences an increase in node traversal time or a decrease in the link capacity. he QOSLOST message is forwarded to all sources potentially afected by the change in the QoS parameter. 6.4.1.2 Minimum Bandwidth Extension Field 6.4.2 Advantages and Disadvantages he advantage of the QoS AODV protocol is the simplicity of extension of the AODV protocol that can potentially enable QoS Q UA LIT Y O F SERV I C E 19 3 provisioning. But, as no resources are reserved along the path from the source to the destination, this protocol is not suitable for applications that require hard QoS guarantees. Further, node traversal time is only the processing time for the packet; the major part of the delay at a node is contributed by packet queuing and contention at the MAC layer. Hence, a packet may experience much more delay than this when the traic load is high in the network. 6.5 QoS Frameworks for Ad Hoc Wireless Networks A framework for QoS is a complete system that attempts to provide required/promised services to each user or application. All components within this system cooperate together in providing the required services. he key component of any QoS framework is the QoS model that deines the way user requirements are met. he key design issue here is whether to serve users on a per-session basis or on a per-class basis. Each class represents an aggregation of users based on certain criteria. he other key components of the framework are QoS routing, which is used to ind all or some of the feasible paths in the network that can satisfy user requirements; QoS signaling for resource reservation; QoS medium access control; call admission control; and packet scheduling schemes. he QoS modules should react promptly to changes in the network state (topology changes) and low state (change in the end-to-end view of the service delivered). he functionality of each component and its role in providing QoS in MANETs are described below: • Routing protocol. he routing protocol is used to ind a path from the source to the destination and to forward the data packet to the next intermediate relay node. he routing protocol needs to work eiciently with other components of the QoS framework in order to provide end-to-end QoS guarantees. hese mechanisms should consume minimal resources in operation and react rapidly to changes in the network state and low state. • QoS resource reservation signaling. Once a QoS path is found, the resource reservation signaling protocol reserves the required 19 4 A D H O C M O BIL E WIREL E S S NE T W O RKS resources along that path. For example, for applications that require certain minimum bandwidth guarantees, a signaling protocol communicates with the MAC subsystem to ind and reserve the required bandwidth. On completion/termination of a session, the previously reserved resources are released. • Admission control. Even though a QoS feasible path may be available, the system needs to decide whether to serve the connection or not. If the call is to be served, the resources are reserved by the signal protocol; otherwise, the application is notiied of the rejection. When a new call is accepted, it should not jeopardize the QoS guarantees given to the already admitted calls. A QoS framework is evaluated based on the number of QoS sessions it serves and it is represented by the ACAR metric. Admission control ensures that there is no perceivable degradation in the QoS being ofered to the QoS sessions admitted already. • Packet scheduling. When multiple QoS connections are active at the same time through a link, the decision on which QoS low is to be served next is made by the scheduling scheme. For example, when multiple delay-constrained sessions are passing through a node, this module decides on when to schedule the transmission of packets when packets belonging to more than one session are pending in the transmission queue of the node. he performance of a scheduling scheme is relected by the percentage of packets that meet their deadlines. 6.5.1 QoS Models A QoS model deines the nature of service diferentiation. In wired network QoS frameworks, several service models have been proposed. Two of these models are the integrated services (IntServ) model [3] and the diferentiated services (DifServ) model. he IntServ model provides QoS on a per-low basis. he volume of information maintained at an IntServ-enabled router is proportional to the number of lows. Hence, the IntServ model is not scalable for the Internet, but it can be applied to small MANETs. But, per-low information is diicult to maintain precisely at a node in an ad hoc wireless network. he DifServ model was proposed in order to solve the scalability problem Q UA LIT Y O F SERV I C E 19 5 faced by the IntServ model. In this model, lows are aggregated into limited numbers of service classes. Each low belongs to one of the DifServ classes of service. hese two service models cannot be directly applied to MANETs because of unique characteristics such as continuously varying network topology, limited resource availability, and error-prone shared radio channel. Any service model proposed should irst decide upon what types of services are feasible in such networks. A hybrid service model for MANETs called FQMM is described below. his model is based on these two QoS models. he lexible QoS model for mobile ad hoc networks (FQMM) takes advantage of the per-low granularity of IntServ and aggregation of services into classes in DifServ. A source node, which is the originator of the traic, is responsible for traic shaping. Traic shaping is the process of delaying packets belonging to a low so that packets conform to a certain deined traic proile. he traic proile contains a description of the temporal properties of a low such as its mean rate (i.e., rate at which data can be sent per unit time on average) and burst size (which speciies in bits per burst how much traic can be sent within a given unit of time without creating scheduling concerns). he FQMM model provides per-low QoS guarantees for the high-priority lows while lower priority lows are aggregated into a set of service classes, as illustrated in Figure 6.1. his hybrid QoS model is based on the assumption that the percentage of lows requiring per-low QoS guarantees is much less than that of low-priority lows, which can be aggregated into a set of QoS classes. Based on the current traic load in the network, service level of a low may change dynamically from per low to per class and vice versa. 6.5.1.1 Flexible QoS Model for Mobile Ad Hoc Networks 6.5.1.1.1 Advantages and Disadvantages his model addresses the scalability problem by classifying the low-priority traic into service classes and it provides the ideal per-low QoS guarantees. his protocol addresses the basic problem faced by QoS frameworks and proposes a generic solution for MANETs that can be a base for a better QoS model. But issues such as decision upon traic classiication, allotment 19 6 A D H O C M O BIL E WIREL E S S NE T W O RKS TUVWXYZ VY[\] ^_[`` a VY[\] ^_[`` b VY[\] ^_[`` c VY[\] defUYUgVe[VUh `UYie]U jYXie`eXgegk l[kkYUk[VeXg Xm nXW` egVX [ `UV Xm `UYie]U ]_[``U`o pgVUkY[VUh `UYie]U jYXie`eXgegk ljUY nXW qXr ks[Y[gVUU` mXY VtU tektujYeXYeVv VY[\] ]_[``o Figure 6.1 FQMM model. of per-low or aggregated service for the given low, amount of traic belonging to per-low service, the mechanisms used by the intermediate nodes to get information regarding the low, and scheduling or forwarding of the traic by the intermediate nodes are as yet unresolved. 6.6 INSIGNIA he INSIGNIA QoS framework was developed for providing adaptive services in MANETs. Adaptive services support applications that require only a minimum quantitative QoS guarantee (such as minimum bandwidth), called base QoS. he service level can be extended later to enhanced QoS when suicient resources become available. Here, user sessions adapt to the available level of service without explicit signaling between the source–destination pairs. his framework can scale down, drop, or scale up user sessions adaptively based on network dynamics and user-supplied adaptation policies. A key component of this framework is the INSIGNIA inband signaling system, which supports fast reservation, restoration, and adaptation schemes to deliver the adaptive services. he signaling system is lightweight and responds rapidly to changes in the network topology and end-to-end QoS conditions. he INSIGNIA framework is depicted in Figure 6.2. he routing module is independent of other components and hence any existing routing protocol can be used. INSIGNIA assumes that 19 7 Q UA LIT Y O F SERV I C E Locally Originated/Delivered Packets In-band Signaling INSIGINIA Routing Module Admission Control Measurement/ Control Routing Updates Mobile Soft-State Channel State Data Packets Packet Forwarding Module Packet-drop Packet Scheduling Module MAC Shared Wireless Medium Figure 6.2 INSIGINIA QoS framework. the routing protocol provides new routes in case of topology changes. he in-band signaling module is used to establish, adapt, restore, and tear down adaptive services between source–destination pairs. It is not dependent on any speciic link layer protocol. In in-band signaling systems the control information is carried along with data packets and hence no explicit control channel is required. In the INSIGNIA framework, each data packet contains an optional QoS ield (INSIGNIA option) to carry the control information. he signaling information is encoded into this optional QoS ield. he in-band signaling system can operate at speeds close to those of packet transmissions and is therefore better suited for highly dynamic mobile network environments. he admission control module uses the soft-state approach to allocate bandwidth to lows based on the maximum/minimum bandwidth requested. he packet forwarding module classiies the incoming packets and delivers them to the appropriate module. If the packet has an INSIGNIA option, it is delivered to the INSIGNIA signaling module. Packets that are to be routed to other nodes are handled by the packet-scheduling module. he packets to be transmitted by a node are scheduled by the scheduler based on the forwarding policy. INSIGNIA uses a weighted round-robin service discipline. he 19 8 A D H O C M O BIL E WIREL E S S NE T W O RKS INSIGNIA framework is transparent to any underlying MAC protocol and uses a soft-state resource management mechanism for eicient utilization of resources. When an intermediate node receives a data packet with the RES (reservation) lag set for a QoS low and no reservation has been done until now, the admission control module allocates the resources based on availability. If the reservation has been done already, it is reconirmed. If no data packets are received for a speciied time-out period, the resources are deallocated in a distributed manner without incurring any control overhead. In setting the value for the time-out period, care should be taken to avoid false restoration (which occurs when the time interval is smaller than interarrival time of packets) and resource lockup (which occurs when the time interval is much greater than interarrival time of packets). 6.6.1 Operation of INSIGNIA Framework he INSIGNIA framework supports adaptive applications, which can be applications requiring best-efort service or applications with base QoS requirements or those with enhanced QoS requirements. Due to the adaptation of the protocol to the dynamic behavior of AWNs, the service level of an application can be degraded in a distributed manner if enough resources are not available. he INSIGNIA option ield contains the following information: service mode, payload type, bandwidth indicator, and bandwidth request. hese indicate the dynamic behavior of the low and the requirements of the application. he intermediate nodes take decisions regarding the low state in a distributed manner based on the INSIGNIA option ield. he service mode can be either best-efort (BE) or service requiring reservation (RES) of resources. he payload type indicates the QoS requirements of the application. It can be either base QoS for an application that requires minimum bandwidth or enhanced QoS for an application requiring a certain maximum bandwidth but that can operate with a certain minimum bandwidth below which they are useless. Examples of applications that require enhanced service mode are video applications that can tolerate packet loss and delay jitter to a certain extent. Q UA LIT Y O F SERV I C E 19 9 Table 6.1 How Service Mode, Payload Type, and Bandwidth Indicator Flags Reflect the Current Status of Flows SERVICE MODE BE RES RES PAYLOAD TYPE – Base QoS Enhanced QoS (EQoS) BW INDICATOR DEGRADING UPGRADING – MIN MAX – Base QoS→Be EQoS→BE EQoS→BQoS – BE→Base QoS BE→EQoS BQoS→EQoS he bandwidth indicator lag has a value of MAX or MIN, which represents the bandwidth available for the low. Table 6.1 shows how service mode, payload type, and bandwidth indicator lags relect the current status of lows. It can be seen from the table that the best-efort (BE) packets are routed as normal data packets. If QoS is required by an application, it can opt for base QoS, in which a certain minimum bandwidth is guaranteed. For that application, the bandwidth indicator lag is set to MIN. For enhanced QoS, the source sets the bandwidth indicator lag to MAX, but it can be downgraded at the intermediate nodes to MIN; the service mode lag is changed to BE from RES if suicient bandwidth is not available. he downgraded service can be restored to RES if suicient bandwidth becomes available. For enhanced QoS, the service can be downgraded to either BE service or RES service with base QoS. he downgraded enhanced QoS can be upgraded later, if all the intermediate nodes have the required (MAX) bandwidth. Destination nodes actively monitor ongoing lows, inspecting the bandwidth indicator ield of incoming packets and measuring the delivered QoS (for example, packet loss, delay, and throughput). Destination nodes send QoS reports (which contain information regarding the status of the ongoing lows) to source nodes. Route maintenance. Due to host mobility, an ongoing session may have to be rerouted in case of a path break. he low restoration process has to reestablish the reservation as quickly and eiciently as possible. During restoration, INSIGNIA does not preempt resources from the existing lows for admitting the rerouted lows. INSIGNIA supports three types of low restoration: immediate restoration, which occurs when a rerouted low immediately recovers its original reservation; degraded restoration, which occurs when a rerouted low is degraded 200 A D H O C M O BIL E WIREL E S S NE T W O RKS for a period (T) before it recovers its original reservation; and permanent restoration, which occurs when the rerouted low never recovers its original reservation. 6.6.2 Advantages and Disadvantages he INSIGNIA framework provides an integrated approach to QoS provisioning by combining in-band signaling, call admission control, and packet scheduling together. he soft-state reservation scheme used in this framework ensures that resources are quickly released at the time of path reconiguration. But, this framework supports only adaptive applications—for example, multimedia applications. Since this framework is transparent to any MAC protocol, the fairness and reservation scheme of the MAC protocol have a signiicant inluence in providing QoS guarantees. Also, as this framework assumes that the routing protocol provides new routes in the case of topology changes, the route maintenance mechanism of the routing protocol employed signiicantly afects the delivery of real-time traic. If enough resources are not available because of the changing network topology, the enhanced QoS application may be downgraded to base QoS or even to best-efort service. As this framework uses in-band signaling, resources are not reserved before the actual data transmission begins. Hence, INSIGNIA is not suitable for real-time applications that have stringent QoS requirements. 6.7 INORA INORA is a QoS framework for MANETs that makes use of the INSIGNIA in-band signaling mechanism and the TORA (temporally ordered routing algorithm) routing protocol. he QoS resource reservation signaling mechanism interacts with the routing protocol to deliver QoS guarantees. he TORA routing protocol provides multiple routes between a given source–destination pair. he INSIGNIA signaling mechanism provides feedback to the TORA routing protocol regarding the route chosen and asks for alternate routes if the route provided does not satisfy the QoS requirements. For resource reservation, a soft-state Q UA LIT Y O F SERV I C E 2 01 reservation mechanism is employed. INORA can be classiied into two schemes: the coarse feedback scheme and the class-based ine feedback scheme. 6.7.1 Coarse Feedback Scheme In this scheme, if a node fails to admit a QoS low either due to lack of minimum required bandwidth (BWmin) or because of congestion at the node, it sends an out-of-band admission control failure (ACF) message to its upstream node. After receiving the ACF message, the upstream node reroutes the low through another downstream node provided by the TORA routing protocol. If none of its neighbors are able to admit the low, it in turn sends an ACF message to its upstream node. While INORA is trying to ind a feasible path by searching the directed acyclic graph (DAG) following admission control failure at an intermediate node, the packets are transmitted as best-efort packets from the source to its destination. In this scheme, diferent lows between the same source–destination pair can take diferent routes. 6.7.2 Class-Based Fine Feedback Scheme In this scheme, the interval between BWmin and BWmax of a QoS low is divided into N classes, where BWmin and BWmax are the minimum and maximum bandwidths required by the QoS low. Consider a QoS low being initiated by the source node S to destination node D. Let the low be admitted with class m (m < N). 1. Let the DAG created by the TORA protocol be as shown in Figure 6.3. Let S→A→B→D be the path chosen by the TORA routing protocol. 2. INSIGNIA tries to establish soft-state reservations for the QoS low along the path. Assume that node A has admitted the low with class m successfully and node B has admitted the low with bandwidth of class l (l < m) only. 202 A D H O C M O BIL E WIREL E S S NE T W O RKS Path 1 A B Node Bottleneck node 2 th Pa S D Link Bottleneck link X Y Figure 6.3 INORA fine feedback scheme. Node A has admitted the flow with class m, but node B is able to give it class l (l < m). 3. Node B sends an admission report message (AR(l)) to upstream node A, indicating its ability to give only class l bandwidth to the low. 4. Node A splits the low in the ratio of l to ml and forwards the low to node B and node Y, in that ratio. 5. If node Y is able to give class (ml) as requested by node A, then the low of class m is split into two lows: one low with bandwidth of class l along the path S→A→B→D and the other with bandwidth of class (ml) along path S→A→Y→D. 6. If node Y gives only class n (n < ml), it sends an AR(n) message to the upstream node A. 7. Node A, realizing that its downstream neighbors are unable to give class m service, informs its ability to provide service class of (l + n) by sending an AR(l + n) to node S. 8. Node S tries to ind another downstream neighbor that might be able to accommodate the low with class (m(l + n)). 9. If no such neighbor is available, node S rejects the low. 6.7.3 Advantages INORA is better than INSIGNIA in that it can search multiple paths with fewer QoS guarantees. It uses the INSIGNIA in-band signaling mechanism. Since no resources are reserved before the actual data transmission begins and since data packets have to be transmitted as best-efort packets in case of admission control failure at the intermediate nodes, this model may not be suitable for applications that require hard-service guarantees. Q UA LIT Y O F SERV I C E 203 6.8 Summary he increased interest in MANETs in recent years has led to intensive research eforts that aim to provide QoS support over such infrastructure-less networks with unpredictable behavior. Generally, the QoS of any particular network can be deined as its ability to deliver a guaranteed level of service to its users and/or applications. hese service requirements often include performance metrics such as throughput, delay, jitter (delay variance), bandwidth, reliability, etc., and diferent applications may have varying service requirements. he performance metrics can be computed in three diferent ways: (1) concave (e.g., minimum bandwidth along each link), (2) additive (e.g., total delay along a path), and (3) multiplicative (e.g., packet delivery ratio along the entire route). In MANETs, the provision of QoS guarantees is much more challenging than in wire-line networks, mainly due to node mobility, multihop communications, contention for channel access, and a lack of central coordination. QoS guarantees are required by most multimedia and other time- or error-sensitive applications. he diiculties in the provision of such guarantees have limited the usefulness of MANETs. However, in the last decade, much research attention has focused on providing QoS assurances in MANET protocols. he QoS routing protocol is an integral part of any QoS solution since its function is to ascertain which nodes, if any, are able to serve applications’ requirements. Consequently, it also plays a crucial role in data session admission control. Problems 6.1 Quality of service is needed at all layers. Justify. 6.2 Describe the challenges and issues involved in providing QoS. 6.3 Give the classiications of QoS solutions. 6.4 Explain diferent types of QoS models with suitable illustrations. 6.5 Explain the FQMM model. 6.5 Discuss the INSIGNIA framework QoS model. 6.7 Describe the INORA framework with a suitable example. 204 A D H O C M O BIL E WIREL E S S NE T W O RKS References 1. IEEE 802.11 TGe. 2001. HCF ad hoc group recommendation–– Normative text to EDCF access category. TR-02/241r0. 2. Perkins, C. E., E. M. Royer, and S. R. Das. 2000. Quality of service for ad hoc on-demand distance vector routing (work in progress). IETF Internet draft (draft-ietf-manet-aodvqos-00.txt). Bibliography Bheemarjuna Reddy, T., I. Karthigeyan, B. S. Manoj, and C. Siva Ram Murthy. 2006. Quality of service provisioning in ad hoc wireless networks: A survey of issues and solutions. Ad Hoc Networks 4:83–124. Chen, S., and K. Nahrstedt. 1999. Distributed quality-of-service routing in ad hoc networks. IEEE Journal on Selected Areas in Communications 17 (8):1488–1504. Chen, Y., Y. Tseng, J. Sheu, and P. Kuo. 2002. On-demand, link state, multipath QoS routing in a wireless mobile ad-hoc network. Proceedings of European Wireless 2002, pp. 135–141. De, S., S. K. Das, H. Wu, and C. Qiao. 2002. Trigger-based distributed QoS routing in mobile ad hoc networks. ACM SIGMOBILE Mobile Computing and Communications Review 6 (3):22–35. IEEE 802.11 TGe. 2001. EDCF proposed draft text. TR-01/131r1, March 2001. ———. 2001. Hybrid coordination function (HCF)––Proposed updates to normative text of D0.1. TR-01/110r1, March 2001. ———. 2003. Proposed normative text for AIFS––Revisited. TR-01/270r0, February 2003. Lin, C. R. 2001. On-demand QoS routing in multihop mobile networks. Proceedings of IEEE INFOCOM 2001 3:1735–1744. Lin, C. R., and M. Gerla. 1999. Real-time support in multihop wireless networks. Wireless Networks 5 (2):125–135. Lin, C. R., and J. Liu. 1999. QoS routing in ad hoc wireless networks. IEEE Journal on Selected Areas in Communications 17 (8):1426–1438. Mangold, S., S. Choi, P. May, O. Klein, G. Hiertz, and L. Stibor. 2002. IEEE 802.11e wireless LAN for quality of service. Proceedings of the European Wireless 2002 1:32–39. Perkins, C. E., and P. Bhagwat. 1994. Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of ACM SIGCOMM 1994 24 (4):234–244. Perkins, C. E., and E. M. Royer. 1999. Ad hoc on-demand distance vector routing. Proceedings of IEEE Workshop on Mobile Computing Systems and Applications, February, pp. 90–100. Shah, S. H., and K. Nahrstedt. 2002. Predictive location-based QoS routing in mobile ad hoc networks. Proceedings of IEEE ICC 2002 2:1022–1027. Q UA LIT Y O F SERV I C E 205 Sheu, S., and T. Sheu. 2001. DBASE: A distributed bandwidth allocation/sharing/extension protocol for multimedia over IEEE 802.11 ad hoc wireless LAN. Proceedings of IEEE INFOCOM 2001 3:1558–1567. Vidhyashankar, V., B. S. Manoj, and C. Siva Ram Murthy. 2003. Slot allocation schemes for delay sensitive traic support asynchronous wireless mesh networks. Proceedings of HiPC 2003, December 2003. 7 ENERGY MANAGEMENT SYSTEMS 7.1 Introduction A mobile ad hoc network (MANET) is a collection of digital data terminals that can communicate with one another without any ixed networking infrastructure. Since the nodes in a MANET are mobile, the routing and power management become critical issues. Wireless communication has the advantage of allowing untethered communication, which implies reliance on portable power sources such as batteries. However, due to the slow advancement in battery technology, battery power continues to be a constrained resource, so power management in wireless networks remains an important issue. hough many proactive and reactive routing protocols exist for MANETs, the reactive dynamic source routing (DSR) protocol is considered an eicient protocol. But, when the network size is increased, it is observed that in DSR overhead and power consumption of the nodes in the network increase, which in turn drastically reduces the eiciency of the protocol. 7.1.1 Why Energy Management Is Needed in Ad Hoc Networks he energy management in ad hoc networks is a very important aspect of the overall management of ad hoc networks. he mobile wireless sensor nodes in the ield need to conserve energy and use it optimally in order to play the assigned role in an ad hoc network for a longer period of time Battery power is an important resource in ad hoc networks. It has been observed that in these networks, energy consumption does not relect the communication activities in the network. Many existing energy conservation protocols based on electing a routing backbone for global connectivity are oblivious to traic characteristics. 207 208 A D H O C M O BIL E WIREL E S S NE T W O RKS Various techniques, both in hardware and software, have been proposed to reduce energy consumption for mobile computing devices in wireless LANs [4,5]. In contrast, power management in ad hoc networks is a more diicult problem for two reasons. First, in ad hoc networks, a node can be both a data source/sink and a router that forwards data for other nodes and participates in highlevel routing and control protocols. Additionally, the roles of a particular node may change over time. Second, there is no centralized entity such as an access point to control and maintain the power management mode of each node in the network, bufer data, and wake up sleeping nodes. herefore, power management in ad hoc networks must be done in a distributed and cooperative fashion. A major challenge to the design of a power management framework for ad hoc networks is that energy conservation usually comes at the cost of degraded performance, such as lower throughput or longer delay. A naive solution that only considers power savings at individual nodes may turn out to be detrimental to the operation of the whole network. 7.1.2 Classiication of Energy Management Schemes he nodes in an ad hoc wireless network (AWN) are constrained by limited battery power for their operation. Hence, energy management is an important issue in such networks. he use of multihop radio relaying requires a suicient number of relaying nodes to maintain network connectivity. Hence, battery power is a precious resource that must be used eiciently in order to avoid early termination of any node. Energy awareness thus needs to be adopted by the protocols at all the layers in the protocol stack, and has to be considered one of the important design objectives for all the protocols in AWNs. Most energy management solutions for AWNs follow similar methodologies to increase the network lifetime, and we classify them as follows: • Battery management schemes • Transmission power management schemes • System power management schemes 209 ENER GY M A N AG EM EN T SYS T EM S Energy Management Schemes Transmission Power Management Schemes Battery Management Schemes DeviceDependent Schemes Data Link Layer Network Layer Modeling and shaping of battery discharge patterns [1] BAMAC [2] Traffic shaping [3] Data Link Layer RABR [4] System Power Management Schemes Network Layer Higher Layers Processor Power Management Schemes Minimum energy disjoint path routing [5] Congestion control and transmission policies at TCP/IP layer [6]. OS/ middleware approaches On-demand power management [7] Miscellaneous Device Management Schemes Gross-layer design Energy efficient multicast/ broadcast Clustering PSU [9] Load balancing QoS Learning techniques Figure 7.1 Taxonomy of energy management schemes. Figure 7.1 shows a schematic diagram of these classiications and lists an example under each of them. Maximizing the life of an AWN requires an understanding of the capabilities and limitations of energy sources of the nodes. Greater battery capacity leads to a longer lifetime of the nodes. Battery management is concerned with problems that lie in the selection of battery technologies, inding the optimal battery capacity, and scheduling the batteries to increase capacity. Transmission power management techniques attempt to ind an optimum transmission range for the nodes in the AWN. System power management, on the other hand, deals mainly with minimizing the power required by hardware peripherals of a node and incorporating low-power strategies into the protocols used in various layers of the protocol stack. It can be further divided into device and processor power management schemes. Although the energy management schemes for AWNs cannot be strictly classiied under the diferent layers of the open systems interconnection (OSI) protocol stack, as they reside in more than one layer, the classiication provided in this chapter is based on the highest layer in the protocol stack used by each of these protocols. A few other techniques, which do not fall into any of these categories, are classiied as miscellaneous schemes. 210 A D H O C M O BIL E WIREL E S S NE T W O RKS 7.1.3 Overview of Battery Technologies Batteries are an essential element of today’s electronics scene. Batteries are used in virtually all portable electronics devices, from mobile phones to laptop computers and MP3 players to lashlights. Without battery technology, many electronics devices would not be viable. As a result, battery technology and battery development are essential to today’s electronics. In recent years there has been a dramatic growth in the number of battery-powered items and this has resulted in many new developments in battery technology. he sheer volume of demand has meant that manufacturers are trying to improve their products to increase their share of the market. If they can achieve this, enormous returns can be made on their investment. With the huge demand for batteries, there is a wide variety of diferent battery and cell technologies available. hese range from the established nonrechargeable technologies such as zinccarbon and alkaline batteries to rechargeable batteries that have moved from nickel cadmium (NiCd) through nickel metal hydride (NiMH) cells to the newer lithium ion rechargeable batteries. With a huge need for batteries, there is a large amount of battery technology development under way, and new types of cells and batteries ofering even higher levels of performance will no doubt become available. Another area of battery technology that is becoming more important is the green or environmental aspects. Some of the old battery technologies contain chemicals which can be considered toxic. Now, new designs are seeking to use more environmentally friendly chemicals. Nickel cadmium cells are now considered environmentally unfriendly and are not as widely used as they were previously. Other batteries also contain harmful chemicals, and this is likely to have a signiicant impact on the direction of future developments. here are diferent types of batteries: • Nickel cadmium (NiCd) batteries and cells have been widely used in applications where electrical rechargeable power sources are needed. hese NiCd cells have been used for many applications where electronic equipment such as laptop computers, electronic games, mobile phones, and many other items of electronics equipment have needed a form of rechargeable power source. In addition to this, nickel ENER GY M A N AG EM EN T SYS T EM S 211 cadmium cells have also been widely used for lashlights and other small items of electronic equipment. NiCd cells are less widely used these days because of their use of cadmium, which has to be disposed of carefully when the battery life has been inished. hese environmental concerns, along with the fact that there are more eicient cells available, have brought about a decline in the use of nickel cadmium cells. • Nickel metal hydride (NiMH) batteries and cells have come into widespread use in recent years as a viable form of rechargeable battery. hese cells ofer almost identical characteristics to those provided by the older NiCd technology, but with the advantage that the NiMH cells do not have the same adverse environmental efects, and they are also able to provide a slightly higher level of energy density and therefore overall charge capacity. As a result, NiMH cells are now widely used, ofering high levels of performance. • Lithium ion (Li-ion) batteries are now being widely used for applications such as powering laptop computers, mobile phones, cameras, and many more devices. he high-energy density that Li-ion batteries provide enables the electronic devices they power to be recharged less frequently. Also, Li-ion batteries are comparatively light when compared to other forms of rechargeable cells and batteries. In view of their convenience, Li-ion batteries are widely used and there are a number of diferent manufacturers for these batteries. Accordingly, costs have fallen from their original high levels, although Li-ion batteries are still expensive. 7.1.4 Principles of Battery Discharge he purpose of a battery is to store and release energy at the desired time and in a controlled manner. his section examines discharges under diferent C-rates (discharge rates) and evaluates the depth to which a battery can safely be depleted. he end-of-discharge voltage for lead acid is 1.75 V/cell, a nickel-based system is 1.00 V/cell, and most Li-ion systems are 3.00 V/cell. At this level, roughly 95% of the energy is 7.1.4.1 Depth of Discharge 212 A D H O C M O BIL E WIREL E S S NE T W O RKS Table 7.1 Recommended End-of-Discharge Voltage under Normal and Heavy Loads END OF DISCHARGE LI-MANGANESE LI-PHOSPHATE LEAD ACID NICD/NIMH Normal load Heavy load 3.00 V/cell 2.70 V/cell 2.70 V/cell 2.45 V/cell 1.75 V/cell 1.40 V/cell 1.00 V/cell 0.90 V/cell spent and the voltage would drop rapidly if the discharge were to continue. To protect the battery from overdischarging, most devices prevent operation beyond the speciied end-of-discharge voltage. When removing the load after discharge, the voltage of a healthy battery gradually recovers and rises toward the nominal voltage. Diferences in the metal concentration of the electrodes enable this voltage potential when the battery is empty. An aging battery with elevated self-discharge cannot recover the voltage because of the parasitic load. A high load current lowers the battery voltage, so the end-ofdischarge voltage threshold should be set lower accordingly. Internal cell resistance, wiring, protection circuits, and contacts all add up to overall internal resistance. he cutof voltage should also be lowered when discharging at very cold temperatures; this compensates for the higher than normal internal resistance. Table 7.1 shows typical endof-discharge voltages of various battery chemistries. he lower end-of-discharge voltage on a high load compensates for the losses induced by the internal battery resistance. Some battery analyzers apply a secondary discharge (recondition) that drains the battery voltage of a nickel-based battery to 0.5 V/cell and lower, a cutof point that is below what manufacturers specify. hese analyzers (Cadex) keep the discharge load low to stay within an allowable current while in subdischarge range. A cell breakdown with a weak cell is possible and reconditioning would cause further deterioration in performance rather than making the battery better. his phenomenon can be compared to the experience of a patient to whom strenuous exercise is harmful. 7.1.5 Impact of Discharge Characteristics on Battery Capacity Cell performance can change dramatically with temperature. At the lower extreme, in batteries with 7.1.5.1 Temperature Characteristics 213 ENER GY M A N AG EM EN T SYS T EM S 3.5 55° 20° –20° Voltage 3 2.5 2 1.5 1 0 1 2 3 4 5 6 7 Discharge Time (Hrs) 8 9 10 Figure 7.2 Performance of lithium ion batteries with temperature. aqueous electrolytes, the electrolyte itself may freeze, setting a lower limit on the operating temperature. At low temperatures, lithium batteries sufer from lithium plating of the anode, causing a permanent reduction in capacity. At the upper extreme, the active chemicals may break down, destroying the battery. In between these limits, the cell performance generally improves with temperature. Figure 7.2 shows how the performance of lithium ion batteries deteriorates as the operating temperature decreases. Probably more important is that, for both high and low temperatures, the further the operating temperature is from room temperature the more the cycle life is degraded. he self-discharge rate is a measure of how quickly a cell will lose its energy while sitting on the shelf due to unwanted chemical actions within the cell. he rate depends on the cell chemistry and the temperature. Cell chemistry. he following shows the typical shelf life for some primary cells: 7.1.5.2 Self-Discharge Characteristics • Zinc carbon (Leclanché): 2 to 3 years • Alkaline: 5 years • Lithium: 10 years or more 214 A D H O C M O BIL E WIREL E S S NE T W O RKS Typical self-discharge rates for common rechargeable cells are as follows: • • • • Lead acid: 4% to 6% per month Nickel cadmium: 15% to 20% per month Nickel metal hydride: 30% per month Lithium: 2% to 3% per month Temperature efects. he rate of unwanted chemical reactions that cause internal current leakage between the positive and negative electrodes of the cell, like all chemical reactions, increases with temperature, thus increasing the battery self-discharge rate. Figure 7.3 shows typical self-discharge rates for a lithium ion battery. Internal impedance. he internal impedance of a cell determines its current carrying capability. A low internal resistance allows high currents. Battery equivalent circuit. he diagram in Figure 7.4 shows the equivalent circuit for an energy cell. • Rm is the resistance of the metallic path through the cell, including the terminals, electrodes, and interconnections. • Ra is the resistance of the electrochemical path, including the electrolyte and the separator. Storage Characteristics 100.0 Capacity Retention Ratio (%) 20°C 80.0 40°C 60°C 60.0 40.0 20.0 0.0 0 4 8 Storage Time (Weeks) Figure 7.3 Self-discharge rates for a lithium ion battery. 12 16 ENER GY M A N AG EM EN T SYS T EM S 215 Ra + Rm Cb R1 Figure 7.4 Equivalent circuit for an energy cell. • Cb is the capacitance of the parallel plates that form the electrodes of the cell. • Ri is the nonlinear contact resistance between the plate or electrode and the electrolyte. Typical internal resistance is in the order of milliohms. When current lows through the cell, there is an IR (current resistance) voltage drop across the internal resistance of the cell, which decreases the terminal voltage of the cell during discharge and increases the voltage needed to charge the cell, thus reducing its efective capacity as well as decreasing its charge/ discharge eiciency. Higher discharge rates give rise to higher internal voltage drops; this explains the lower voltage discharge curves at high C-rates. (See Section 7.1.5.4.) he internal impedance is afected by the physical characteristics of the electrolyte; the smaller the granular size of the electrolyte material is, the lower is the impedance. he grain size is controlled by the cell manufacturer in a milling process. Spiral construction of the electrodes is often used to maximize the surface area and thus reduce internal impedance. his reduces heat generation and permits faster charge and discharge rates. he internal resistance of a galvanic cell is temperature dependent, decreasing as the temperature rises due to the increase in electron mobility. he following graph is a typical example. 7.1.5.3 Efects of Internal Impedance 216 A D H O C M O BIL E WIREL E S S NE T W O RKS Lead Acid Battery Internal Resistance Vs Temperature Internal Resistance (Ohms) 3 2.5 2 1.5 1 0.5 0 –10 –5 0 5 10 15 20 25 Temperature (deg C) 30 35 40 hus, the cell may be very ineicient at low temperatures but the eiciency improves at higher temperatures due to the lower internal impedance as well as to the increased rate of the chemical reactions. However, the lower internal resistance unfortunately also causes the self-discharge rate to increase. Furthermore, cycle life deteriorates at high temperatures. Some form of heating and cooling may be required to maintain the cell within a restricted temperature range to achieve the optimum performance in high-power applications. he internal resistance of most cell chemistries also tends to increase signiicantly toward the end of the discharge cycle as the active chemicals are converted to their discharged state and hence are efectively used up. his is principally responsible for the rapid drop in cell voltage at the end of the discharge cycle. In addition, the Joule heating efect of the I2R losses in the internal resistance of the cell will cause the temperature of the cell to rise. he voltage drop and the I2R losses may not be signiicant for a 1000 mAh cell powering a mobile phone, but for a 100-cell, 200 Ah automotive battery they can be substantial. Typical internal resistance for a 1000 mA lithium mobile phone battery is around 100 to 200 mΩ and around 1 mΩ for a 200Ah lithium cell used in an automotive battery. Operating at the C-rate, the voltage drop per cell will be about 0.2 V in both cases (slightly less for the mobile phone). he I2R loss in the mobile phone will be between 0.1 and 0.2 W. In the automotive battery, however, the voltage drop across the whole battery will be 20 V and I2R power loss dissipated as heat within the battery will be 40 217 ENER GY M A N AG EM EN T SYS T EM S W per cell or 4 kW for the whole battery. his is in addition to the heat generated by the electrochemical reactions in the cells. As a cell ages, the resistance of the electrolyte tends to increase. Aging also causes the surface of the electrodes to deteriorate; the contact resistance builds up and, at the same, the efective area of the plates decreases, reducing its capacitance. All of these efects increase the internal impedance of the cell, adversely afecting its ability to perform. Comparing the actual impedance of a cell with its impedance when it was new can be used to give a measure or representation of the age of a cell or its efective capacity. Such measurements are much more convenient than actually discharging the cell and can be taken without destroying the cell under test. he internal resistance also inluences the efective capacity of a cell. he higher the internal resistance is, the higher are the losses while charging and discharging, especially at higher currents. his means that, for high discharge rates, the available capacity of the cell is lower. Conversely, if it is discharged over a prolonged period, the amp hour capacity is higher. his is important because some manufacturers specify the capacity of their batteries at very low discharge rates, which makes them look a lot better than they really are. he discharge curves for a lithium ion cell in the following graph show that the efective capacity of the cell is reduced if the cell is discharged at very high rates (or, conversely, increased with low discharge rates). his is called the capacity ofset and it is common to most cell chemistries. 7.1.5.4 Discharge Rates 4.5 CC 3.0 to 4.2 V at 25°C Voltage/V 4.0 3.5 1C 4.5C 9C 14C 18C 3.0 2.5 0 1 2 3 5 4 Capacity/Ah 6 7 8 218 A D H O C M O BIL E WIREL E S S NE T W O RKS 7.1.5.5 Battery Load Battery discharge performance depends on the load the battery has to supply. If the discharge takes place over a long period of several hours, as with some high-rate applications such as electric vehicles, the efective capacity of the battery can be as much as double the speciied capacity at the C-rate. his can be most important when dimensioning an expensive battery for high-power use. he capacity of low-power consumer electronics batteries is normally speciied for discharge at the C-rate, whereas the SAE (Society of Automotive Engineers) uses the discharge over a period of 20 hours (0.05 C) as the standard condition for measuring the amp hour capacity of automotive batteries. he following graph shows that the efective capacity of a deep discharge lead acid battery is almost doubled as the discharge rate is reduced from 1.0 to 0.05 C. For discharge times less than 1 hour (high C-rates) the efective capacity falls of dramatically. he efectiveness of charging is similarly inluenced by the rate of charge. Capacity and Discharge Time Capacity (Amp Hours) 300 250 200 150 100 50 0 1 2.3 3 5 8.3 20 Discharge Time (Hours) here are two conclusions to be drawn from this graph: • Care should be exercised when comparing battery capacity speciications to ensure that comparable discharge rates are used. • In an automotive application, if high current rates are used regularly for hard acceleration or for hill climbing, the range of the vehicle will be reduced. 7.1.5.6 Duty Cycle Duty cycles are diferent for each application. Electric vehicle (EV) and hybrid electric vehicle (HEV) applications impose particular, variable loads on the battery. Stationary batteries ENER GY M A N AG EM EN T SYS T EM S 219 used in distributed grid energy storage applications may have very large system on chip (SOC) changes and many cycles per day. It is important to know how much energy is used per cycle and to design for the maximum energy throughput and power delivery, not the average. 7.1.6 Battery Modeling Researchers around the world have developed a wide variety of models with varying degrees of complexity. hey capture battery behavior for speciic purposes, from battery design and performance estimation to circuit simulation. Electrochemical models [11–14], mainly used to optimize the physical design aspects of batteries, characterize the fundamental mechanisms of power generation and relate battery design parameters with macroscopic (e.g., battery voltage and current) and microscopic (e.g., concentration distribution) information. However, they are complex and time consuming because they involve a system of coupled time-variant spatial partial diferential equations [13]—a solution that requires days of simulation time, complex numerical algorithms, and battery-speciic information that is diicult to obtain because of the proprietary nature of the technology. he ield of battery modeling can be divided into the following two areas. 1. Estimation of battery performance. Given an already constructed battery, the problem is to estimate how that battery will perform under speciic conditions of interest to the user of the battery. his problem is typically addressed by testing batteries under the speciic conditions of interest and using a model to represent the test results. Approaches for representing test results range from simple statistical models to neural nets to complex, physics-based models. Basing the model on test data becomes problematical when testing becomes impractical (such as a 10- to 20-year life test). Real-time estimation of battery performance, an important problem in automotive applications, falls into this area. 2. Battery design. Here the problem is to estimate how the design of a battery impacts its performance. his is a diicult problem and can be only partly addressed because the 220 A D H O C M O BIL E WIREL E S S NE T W O RKS complexity of most battery systems deies characterization. Our inability to characterize the mechanisms involved in many battery chemistries limits the application of modeling to battery design. Instead, battery design relies heavily on the tried and true approach of build and test rather than on engineering principles. his build and test approach is practical because test cells are often inexpensive to build and key tests often can be carried out rapidly. In the short term, developing a battery by trial and error actually takes less time than determining how a battery works and using that mechanistic understanding for design. However, those aspects of battery operation that are understood well enough to model, such as temperature and current distribution, have undergone signiicant optimization. Such advances indicate that as our understanding of batteries increases and more aspects of battery operation become amenable to modeling, we may expect a dramatic acceleration in the pace of battery development. he area of battery performance estimation receives much more attention than the area of battery design. Battery performance can be estimated by a wide range of workers, while the area of battery design is limited mostly to battery developers. Battery developers consider design information highly proprietary and are reluctant to divulge such information to model developers, who, for the most part, still tend to be academics. Recently available, third-party battery design software provides some standard designs that can be studied openly and thus promotes development of the science of battery design. However, progress in the area of battery design has beneited most from the advent of lithium ion batteries. Lithium ion or rocking-chair batteries are the newest batteries and have the most well-understood battery chemistry. Both the positive and negative electrodes serve simply as hosts for lithium ions that transport through a binary electrolyte. his system can be readily modeled. For example, a recent paper [6] by a battery developer shows that a physics-based model can provide a remarkably accurate estimate of battery behavior. his understanding of lithium ion batteries has encouraged modelers to develop successful methodologies for design of charge/discharge performance and abuse tolerance (Figure 7.5). 2 21 ENER GY M A N AG EM EN T SYS T EM S 4 V(q) [Volts] 3.8 3.6 Full properties f± = 1 D = 3e–6 D = 3e–6, f± = 1 D = 3e–6, f± = 1, t± = 0.363 Li-ion cell 3.4 3.2 3 0 1 2 3 Capacity [Ah] Figure 7.5 Comparison of simulated discharge curve to experimental discharge curve for a Li-ion cell. 7.1.7 Battery-Driven System Design he activity of several components in a computing system is event driven. For example, the activity of display servers, communication interfaces, and user interface functions is triggered by external events, and it is often interleaved with long, idle periods. An intuitive way to reduce average power dissipated by the whole system consists of shutting down resources during periods of inactivity. In other words, one can adopt a dynamic power management (DPM) policy that dictates how and when various components should be shut down according to a system’s workload. Battery-operated portable appliances impose tight constraints on the power dissipation of their components. Such constraints are becoming tighter as complexity and performance requirements are pushed forward by user demand. Reducing power dissipation is a design objective also for stationary equipment, because excessive power dissipation implies increased cost and noise for complex cooling systems. Numerous computer-aided design techniques for low power have been proposed targeting digital, very large-scale integration (VLSI) circuits (i.e., chip-level designs). Almost every portable electronic appliance is far more complex than a single chip. Portable devices such as cellular telephones and laptop computers contain tens or even hundreds of components. To complicate the picture further, in 222 A D H O C M O BIL E WIREL E S S NE T W O RKS most electronic products, digital components are responsible for only a fraction of the total power consumed. Analog, electromechanical, and optical components are often responsible for the largest contributions to the power budget. One of the most successful techniques employed by designers at the system level is dynamic power management [8,9]. his technique reduces power dissipation by selectively turning of (or reducing the performance of) system components when they are idle (or partially unexploited). Building a complex system that supports dynamic power management is a diicult and error-prone process. Long trialand-error iterations cannot be tolerated when fast time to market is the main factor deciding the success of a product. To shorten the design cycle of complex power-managed systems, several hardware and software vendors are pursuing a long-term strategy to simplify the task of designing large and complex powermanaged systems. he strategy is based on a standardization initiative known as the advanced coniguration and power interface (ACPI). ACPI speciies an abstract and lexible interface between power-manageable hardware components (VLSI chips, disk drivers, display drivers, etc.) and the power manager (the system component that controls when and how to turn on and of functional resources). he ACPI interface speciication simpliies the task of controlling the operating conditions of the system resources, but it does not provide insight on how and when to power manage them. We call power-management policy (“policy” for brevity) a procedure that takes decisions upon the state of operation of system components and on the state of the system itself. he most aggressive policy (that we call eager policy) turns of every system component as soon as it becomes idle. Whenever the functionality of a component is required to carry out a system task, the component must be turned on and restored to its fully functional state. he transition between the inactive and the functional state requires time and power. As a result, the eager policy is often unacceptable because it degrades performance and may not decrease power dissipation. For instance, consider a device that dissipates 2 W in a fully operational state and no power when set into an inactive state. he transition from an operational to an inactive state is almost instantaneous (hence, it does not consume sizable power). However, the opposite ENER GY M A N AG EM EN T SYS T EM S 223 transition takes 2 s. During the transition, the power consumption is 4 W. his device is a highly simpliied model of a hard-disk drive (a more detailed model will be introduced later in this chapter). Clearly, the eager policy does not produce any power savings if the device remains idle for less than 4 s. Moreover, even if the idle time is longer than 4 s, transitioning the device to inactive state degrades performance. If the eager policy is chosen, the user will experience a 2 s delay every time a request for the device is issued after an idle interval. he choice of the policy that minimizes power under performance constraints (or maximizes performance under power constraint) is a constrained optimization problem that is of great relevance for low-power electronic systems. We call this problem policy optimization (PO). Several heuristic power-management policies have been investigated in the past, but no strong optimality result has been proven. Stochastic modeling-based approaches to DPM have been based on the framework of stationary discrete-time Markov chains, continuous-time Markov chains, or their variants. Irrespective of whether they are based on stationary discrete-time Markov chains, continuous-time Markov chains, or their variants, existing methodologies depend on modeling the input arrival process and the behavior of power-managed components by creating the stochastic matrices or generator matrices for these processes by hand, and then creating and solving optimization problems from those to optimize the average case. One novelty of this work is the behavior of the input generator and power-managed component, as well as the power manager, in a high-level probabilistic language for expressing stochastic state machines. his allows automatic generation of the matrices; the rest of the required computation for designing strategies is then carried out in the model checking framework. In the power manager, managed components are modeled using stochastic petri nets. his allows automatic generation of the stochastic matrices and the formulation of the optimization problems. hese exact optimization problems are meant to optimize the average energy usage while minimizing average delay. hey are usually validated by simulation to check for 7.1.7.1 Stochastic Model 224 A D H O C M O BIL E WIREL E S S NE T W O RKS the soundness of the modeling assumptions and efectiveness of the strategies in practice. Since probabilistic model checking is inherently exhaustive in its search among all possible scenarios, more useful information can be obtained about the design space than using simulation. For example, optimal bufer sizes, average delays, probabilities of various corner case scenarios, etc, and probability-based comparisons between various delay-cost possibilities (obtainable by competing DPM strategies) can easily be predicted. 7.1.8 Smart Battery System A smart battery system (SBS) is a speciication for determining accurate battery capacity readings. It allows operating systems to perform power-management operations based on remaining estimated run times. he speciications to these smart battery systems were developed by Duracell and Intel in 1994 and later deployed by several battery and semiconductor manufacturing companies. he smart battery system speciications or standards are looked after by the SBS forum, whose main objective is to create an open standard that enables systems to be aware of the batteries that power them, improve battery eiciency, etc. In a smart battery system, communication is carried over a system management bus (SMBus) two-wire communication bus. hrough this communication, the system also controls the amount that a battery must be charged. he SBS speciies the following components: 1. System management bus (SMBus). he system management bus is a speciic implementation of an I2C bus that describes protocols for data, device addresses, and additional electrical requirements designed to transport commands and information physically between the smart battery, SMBus host, smart battery charger, and other smart devices. 2. Battery data set. he smart battery data (SBD) set is a method to monitor a rechargeable battery pack. A special integrated circuit (IC) in the battery pack monitors the battery and reports information to the SMBus. his information might include type, model number, manufacturer, characteristics, ENER GY M A N AG EM EN T SYS T EM S 225 discharge rate, predicted remaining capacity, almost discharged alarm so that the system can shut down gracefully, temperature, and voltage to provide safe fast-charging. 3. Smart battery charger. his battery charger periodically communicates with a smart battery and alters its charging characteristics in response to information provided by the smart battery. 4. Smart battery system selector. his device arbitrates between two or more smart batteries. It controls the power and SMBus paths between the SMBus host, a smart battery charger, and the smart batteries. 5. Smart battery system manager. he smart battery system manager is a speciication that describes the requirements and the interface for a component or system of components that manages a number of smart batteries in a system. Figure 7.6 shows a block diagram of a smart battery system. Smart battery A or/and B are available to power the system. he smart battery charger and SMBus act as an added functionality to the Vcc, +12 V, –12 V DC Unregulated/ battery) System Power Supply Power Switch Note: ‹‡ œ š€|›ing/powering the system AC SB B idle x w “ ’‘   System Host AC-DC Converter (unregulated) Smart Battery B ‘ z•” zzy x w “ ’‘   Smart Battery System Manager SMBus ‘ z•” zzy SMBus Smart Battery A SMBus –„|—}†~˜| ™{š€|›„ {|}~}€ ‚ƒ„ ~† ‡€~~„|ˆ ‰€~€Š‹~€~Œ† „ŽŒ„†~† Figure 7.6 Smart battery system. SMSus Smart Battery Charger 226 A D H O C M O BIL E WIREL E S S NE T W O RKS embedded controller. he power path coniguration block is used by the SBSM to select which battery is used to power the system (i.e., to select smart battery A or smart battery B or a combination of both). he system’s designer selects the algorithm used, which is contained in the SBSM. If alternating current (AC) is present, the SBSM may choose to charge either smart battery A or B or both. Again, the algorithm used is contained entirely within the SBSM. he safety signal combiner ensures that the smart battery charger’s alternative safety signaling path is always maintained. he SMBus router ensures that the operating system can communicate with individual batteries as well as the composite of batteries being discharged simultaneously. here is no requirement for the composite battery data to be generated within the electrical circuit (EC). Other alternatives, such as a private interface between the EC and the operating system that would allow a custom driver to calculate composite battery data, are allowed. he SMBus router also ensures that the operating system receives all alarms from the battery or batteries being charged or discharged. 7.2 Energy-Efficient Routing Protocol A network is a collection of interconnected nodes. It can be wired, wireless, or wired cum wireless. A wireless ad hoc network has no ixed infrastructure. Wireless mobile networks and devices are becoming increasingly popular because they provide user access to information and communication anytime and anywhere. Since each node can work as a host as well as a router, there is no need for a separate router. he mobile ad hoc network has dynamic topology, a feature that helps it to change rapidly and unexpectedly. Energy is a limiting factor in the case of ad hoc networks. Routing in these networks has some unique characteristics: 1. he energy of nodes is crucial and depends upon the battery, which has a limited power supply. 2. Nodes can move in an uncontrolled manner, so frequent route failures are possible. 3. Wireless channels have lower and more variable bandwidth compared to wired networks. ENER GY M A N AG EM EN T SYS T EM S 227 Energy-eicient design is very important in mobile ad hoc networks. MANETs consume more energy; as they have no ixed infrastructure, nodes should perform the operation of forwarding packets, along with routing. herefore, traic loads in MANETs are heavier than in any other wireless networks with ixed access points or base stations. For this reason, MANETs have more energy consumption. To make them more energy eicient, a trade-of is very necessary between diferent network performance criteria. To make a MANET more energy eicient, different protocols have been put forward, one of which is the energy-eicient medium access control (EE-MAC) protocol. he key idea behind this design is that most ad hoc networks are mostly data driven. Our goal in the EE-MAC protocol will be to reduce energy consumption without afecting its network performance. EE-MAC is based on the (IEEE) 802.11 standard, which is for wireless communication. 7.2.1 Proposed Energy-Eicient Medium Access Control Protocol his protocol elects master nodes that keep awake and act as a network backbone to transfer data. he other (slave) nodes sleep to conserve energy and wake up periodically to communicate with the masters. To balance energy consumption, a rotation mechanism of masters and slaves is used. EE-MAC uses some features of power serving mode (PSM). 7.2.1.1 Design Criteria he EE-MAC protocol is designed such that it contains enough master nodes to build the backbone of the network. Every node has at least one master nearby. Masters, collectively, are called the connected dominating set (CDS). he nodes in a network can fall under CDS or not. he nodes that fall under the CDS are masters, and the ones that do not are slaves. Slaves are free to sleep whenever they want, as they are not involved in the routing process. Depending on the local information, the master nodes’ algorithm is selected. To ensure that work is distributed fairly between master and slave, rotation is done according to an algorithm. his is very much needed because if rotation of master and slave is not done, a node will be overused and this may afect the network lifetime of an ad hoc network. If nodes are used as master and slave alternately, then we can have balance in energy consumption. 228 A D H O C M O BIL E WIREL E S S NE T W O RKS 7.2.1.2 Features of EE-MAC Some important features of EE-MAC are 1. Entering sleep mode earlier. One main drawback in PSM causes large energy consumption. Suppose that a node has some packets to send. It irst sends an ATIM frame to the destination; in response to this, both source (transmitter) and destination (receiver) will be awake in that beacon interval, no matter how many packets need to be transmitted. he node will be awake unnecessarily, even if the single packet needs to be transmitted. his disadvantage is overcome in EE-MAC, where the information regarding the remaining number of packets is sent to the destination. his allows the destination to know when it has received all pending packets. When the source and destination have sent or received all their packets, they can enter sleep mode until the beginning of the next beacon interval. 2. Priority processing of packets to slaves. When a node has a certain number of packets to send, it irst sends the packets to be sent for slave nodes. After transmitting the packets to the slave nodes, the packets destined for masters are transmitted. In brief, higher priority is given to slave nodes than to master nodes since this helps slave nodes to stay in sleep mode for a long time. 3. Prolonging the sleep period for slaves. he EE-MAC protocol is designed such that most of the packets are forwarded by masters, then slaves. To take advantage of this, each slave uses historical information to decide on its sleep time. Suppose that historical information has two consecutive beacon intervals and no packet is routed through slaves; these slaves decide to sleep for this time interval. 4. Additional MAC layer control. Nodes in an ad hoc network may move randomly as the topology selected will depend on the nearest possible route to the destination. hus, to adapt quickly to network topology changes, nodes inform neighbors regarding their status (i.e., whether they are acting as masters or as slaves) by using the power-management bit in the MAC header. Because the MAC headers can be heard ENER GY M A N AG EM EN T SYS T EM S 229 anywhere in the network, including request to send and clear to send packets, this information will help neighbors to know each other’s situation. he network performance of an ad hoc network is evaluated by following metrics: 7.2.1.3 Performance 1. Data packet delivery ratio. he ratio of the number of packets generated at the sources to the number of packets received by the destination is called data packet delivery ratio. his signiies the throughput of the network. his metric is useful to measure any degradation in the network throughput. 2. End-to-end delay. his involves cumulative delay in the system as all possible delays caused by bufering, queuing, and retransmitting data packets, along with data propagation delay and transfer delays. 3. Energy eiciency. Energy eiciency is formulated as Energy eiciency = total number of bits transmitted/total energy consumed where the total bits transmitted is calculated using application-layer data packets only, and total energy consumption is the sum of each node’s energy consumption during the simulation time. he unit of energy consumption is bit per joule, and the greater the number of bits per joule, the better is the energy eiciency achieved. 7.3 Transmission Power-Management Schemes he power-based connectivity deinition is a new concept in wireless ad hoc networks. It attempts to improve end-to-end network throughput and the average power consumption. his is due to the fact that, as power gets higher and the connectivity range increases, each node will reach almost all other nodes in a single hop. However, since higher powers cause a higher interference level, more collisions occur, and hence there will be more transmission attempts. By reducing the transmission power levels at each node such that the node can directly connect to only a small subset of the network, the interference zones are considerably reduced. 230 A D H O C M O BIL E WIREL E S S NE T W O RKS Various routing algorithms have been proposed for wireless ad hoc networks in the literature. hose algorithms are mainly focused on establishing routes and maintaining these routes under frequent and unpredictable connectivity changes. he implicit assumption in most of the earlier work is that nodes’ transmitted powers are ixed. To the best of our knowledge, there is no prior work that proposes the concept of mobile ad hoc nodes using diferent transmit powers. It is evident that this approach is restricted to ad hoc networks of relatively low mobility patterns. If the nodes are highly mobile, the power-management algorithm might fail to cope with the fast and sudden changes due to fading and interference conditions. We propose a power-management scheme that can be used in conjunction with traditional table-driven routing protocols, with possibly minor modiications. he performance measures are taken to be the end-toend network throughput and the average power consumption. 7.3.1 Power Management of Ad Hoc Networks An ad hoc network is wireless communication, which has the advantage of allowing untethered communication. his implies reliance on portable power sources such as batteries. However, due to the slow advancement in battery technology, battery power continues to be a constrained resource, so power management in wireless networks remains an important issue. Various techniques, both in hardware and software, have been proposed to reduce energy consumption. Power management in ad hoc networks is a more diicult problem for two reasons: 1. In ad hoc networks, a node can be both a data source/ sink and a router that forwards data for other nodes and participates in high-level routing and control protocols. Additionally, the roles of a particular node may change over time. 2. here is no centralized entity such as an access point to control and maintain the power-management mode of each node in the network, bufer data, and wake up sleeping nodes. herefore, power management in ad hoc networks must be done in a distributed and cooperative fashion. ENER GY M A N AG EM EN T SYS T EM S 2 31 Power management in ad hoc networks spans all layers of the communication protocol stack. Each layer has access to diferent types of information about the communication in the network and thus uses diferent mechanisms for power management. he MAC layer does power management using local information, while the network layer can take a more global approach based on topology or traic characteristics. We consider power-management approaches that save energy by turning of the radios of nodes in the network. Other energy conservation mechanisms such as topology control and power-controlled MAC protocols are considered orthogonal and the beneits can be combined. Similarly to ad hoc routing protocols, power-management schemes range from proactive to reactive. he extreme of proactive can be deined as always on (i.e. all nodes are active all the time) and the extremity of reactive can be deined as always of (i.e., all nodes are in power-saving mode by default) (see Figure 7.7). Given the dynamic nature of ad hoc networks, there needs to be a balance between proactiveness, which generally provides more eicient communication, and reactiveness, which generally provides better power saving. Other techniques to reduce power consumption are shown in Table 7.2. 7.3.2 Basic Idea of the Power Cost Calculate Balance (PCCB) Routing Protocol In ad hoc networks, designing an energy-eicient routing protocol is critical since nodes are power constrained. he PCCB (power cost calculate balance) routing protocol is proposed. he basic idea of PCCB is to utilize the “local multicast” mechanism and the energy boundary to select the route. Simulations show that the PCCB routing protocol can optimize power utilization and improve transmitting ratio. A PCCB network has a better performance than an AODV Proactive Reactive Energy–conserved CDS Always–off On–demand Figure 7.7 Design space of power-management schemes. Always–on 232 A D H O C M O BIL E WIREL E S S NE T W O RKS Table 7.2 Techniques to Reduce Power Consumption PROTOCOL LAYER Data-link layer Network layer Transport layer Application layer POWER-CONSERVATION TECHNIQUES Avoid unnecessary retransmission. Avoid collision in channel access whenever possible. Put “receive” in standby mode whenever possible. Use or allocate contiguous slots for transmission and reception whenever possible. Turn radio off (sleep) when not transmitting or receiving. Consider route relaying load. Consider battery life in route selection. Reduce frequency of sending control message. Optimize size of control headers. Have efficient route reconfiguration techniques. Avoid repeated retransmissions. Handle packet loss in a localized manner. Use power-efficient error control schemes. Adopt an adaptive mobile quality of service (QoS) framework. Move power-intensive computation from a mobile host to the base station. Use proxies for mobile clients. Proxies can be designed to make applications adapt to power or bandwidth constraints. Proxies can intelligently cache frequently used information, suppress video transmission and allow audio, and employ a variety of methods to conserve power. network. he PCCB routing protocol is feasible for the energy-constrained character of mobile ad hoc networks. 7.3.2.1 Routing Process of the PCCB Routing Protocol 7.3.2.1.1 Protocol Assumption he following assumptions are made to simplify the model: (1) A node can get the value of its current energy, and (2) the links are bidirectional. 7.3.2.1.2 Route Discovery PCCB is a source-initiated on-demand routing protocol. As a result, nodes that are not on a selected path do not maintain routing information or participate in routing table exchanges. he PCCB routing protocol uses the following ields with route table entry: 1. Destination node address 2. Destination sequence number (guarantees the loop freedom of all routes toward that node) 3. Valid destination sequence number lag 4. Power boundary (the minimum energy of all nodes in the route) 5. Hop count (the number of hops needed to reach a destination) 6. Next hop 7. Lifetime (the expiration or deletion time of the route) ENER GY M A N AG EM EN T SYS T EM S 233 he route discovery of the PCCB is as follows: 1. If there is no direct valid path between source and the destination, the source node initiates a path discovery process to locate other nodes. he source node disseminates a route request (RREQ ) to its neighbors. he RREQ includes information such as destination Internet protocol (IP) address, destination sequence number, power boundary, hop count, lifetime, etc. If no sequence number is known, the unknown sequence number lag must be set. he power boundary is equal to the source’s energy; it will forward the packet if it matches some conditions. 2. When a node receives the RREQ from its neighbors, it irst increments the hop count value in the RREQ by one, to account for the new hop through the intermediate node if the packet should not be discarded. he originator sequence number contained in the RREQ must be compared to the corresponding destination sequence number in the route table entry. If the originator sequence number of the RREQ is not less than the existing value, the node compares the power boundary contained in the RREQ to its current energy to get the minimum, and then it updates the power boundary of the RREQ with the minimum, which is the latest power boundary of this route. 3. Once the RREQ has arrived at the destination node or an intermediate node with an active route to the destination, the destination or intermediate node generates a route reply (RREP) packet and unicasts it back to the neighbor from which it received the RREQ. If the generating node is an intermediate node, it has an active route to the destination, the destination sequence number in the node’s existing route table entry for the destination is not less than the destination sequence number of the RREQ , and the “destination-only” lag is not set. If the generating node is the destination itself, it must update its own sequence number to the maximum of its current sequence number and the destination sequence number in the RREQ packet immediately before it originates an RREP in response to an RREQ. he destination node places its (perhaps newly incremented) sequence number into the 234 A D H O C M O BIL E WIREL E S S NE T W O RKS destination sequence number ield of the RREP and enters the value zero in the hop count ield of the RREP. When generating an RREP message, a node wipes the destination IP address, originator sequence number, and power boundary from the RREQ message into the corresponding ields in the RREP message. 4. When a node receives the RREP from its neighbors, it irst increments the hop count value in the RREP by one. As the RREP is forwarded back along the reverse path, the hop count ield is incremented by one at each hop. hus, when the RREP reaches the source, the hop count represents the distance, in hops, of the destination node from the source node. he originator sequence number contained in the RREP must be compared to the corresponding destination sequence number in the route table entry. If the originator sequence number of the RREP is not less than the existing value, the node compares the power boundary contained in the RREP to its current energy to get the minimum, and then it updates the power boundary of the RREP with the minimum, which is the latest power boundary of this route. Note: If the sequence number in the routing table is marked as invalid in the route table entry or the destination sequence number in the RREP is greater than the node’s copy of the destination sequence number, the intermediate node creates a new entry with the destination sequence number of the RREP and marks the destination sequence number as valid. he power boundary ield in the route table entry is set to the power boundary contained in the RREP. Note: If the originator sequence number contained in the RREP is equal to the existing destination sequence number in the node’s route table, the power boundary of the RREP must be compared to the corresponding power boundary in the route table entry. If the power boundary contained in the RREP is greater than the node’s copy of the power boundary, the power boundary in the entry is set to the value of the power boundary in the RREP. he next hop in the route entry is assigned to be the node from which the RREP is received, which is indicated by the source IP address ield in the IP header. he current node can subsequently use this route to forward data packets to the destination. ENER GY M A N AG EM EN T SYS T EM S 235 7.3.2.1.3 Route Maintenance According to the ad hoc on-demand distance vector (AODV) routing protocol, a node uses a HELLO message, which is a periodic local broadcast by a node to inform each mobile node in its neighborhood to maintain the local connectivity. If a node does not receive the HELLO message for a speciied interval of time, called HELLO-loss HELLO-interval (which will be in milliseconds), the node should assume that the link to this neighbor is currently lost. When this scenario occurs, the node should send a route error (RERR) message to all precursors indicating which link has failed. hen the source initiates another route search process to ind a new path to the destination or start the local repair. 7.3.3 Analysis of the PCCB Routing Protocol Since nodes that are not on a selected path do not maintain routing information or participate in routing table exchanges, the PCCB routing protocol is a pure on-demand routing protocol. PCCB allows mobile nodes to obtain routes quickly for new destinations and respond to link breakages and changes in the network topology in a timely manner. When a link breaks, PCCB causes the afected set of nodes to be notiied so that they are able to invalidate the routes using the lost link. PCCB uses power boundary as a selection criterion. If there are two routes to a destination, it is up to the requesting node to select a route that has a greater power boundary. he irst priority to choose the route in PCCB is to select the shortest path. hen power boundary metrics are considered. When the energy is almost exhausted, the operating system (OS) and basic input–output system (BIOS) will take actions in preparation for power down, which needs more power. he main advantage of the maximum power-boundary route is that it can reduce the additional information operations and conserve energy. 7.3.4 MAC Protocol A medium access control (MAC) protocol decides when competing nodes may access the shared medium (i.e., the radio channel) and tries to ensure that no two nodes are interfering with each other’s transmissions. In the unfortunate event of a collision, a MAC protocol 236 A D H O C M O BIL E WIREL E S S NE T W O RKS Network Data Link MAC Protocol Physical Layer 3 Layer 2 Layer 1 Figure 7.8 Network protocol stack (MAC layer). D C D C B B A A Figure 7.9 Hidden-terminal problem (left) and exposed-terminal problem (right). may deal with it through some contention resolution algorithm. he MAC protocol layer is shown in Figure 7.8. he two main problems or collisions faced are the exposed-terminal problem and the hidden-terminal problem. hese problems are depicted in Figure 7.9. In the hidden-terminal problem (left), communication is established, although it possibly interferes with packet reception of neighboring stations. In the exposed-terminal problem (right), no communication is established because of an ongoing communication between a pair of neighbor stations, although their communication will not be impaired. he IEEE 802.11 MAC protocol deals with this and other problems and fulills the requirements appropriately as mentioned before. he basic MAC protocol is similar to the 802.3 MAC protocol. 7.3.5 Power Saving In the IEEE 802.11 power-saving mechanism speciied for ad hoc networks, each station is synchronized by beacon frame transmission ENER GY M A N AG EM EN T SYS T EM S 237 at the beginning of a period called the beacon interval. he stations that successfully exchange control packets during the ATIM window start to transmit data immediately after the ATIM window expires. When network load is increased, the stations waste energy in contention and retransmission operations, which are signiicant sources of energy consumption and channel utilization degradation. A new beacon interval structure removes the ATIM window and divides the rest of the beacon interval into equal interval time slots. he distributed coordination function (DCF) with diferent interframe space and priority-based time-slot occupation is used to provide quality of service, increase time in the doze state, and decrease the number of collisions. 7.3.6 Timing Synchronization Function he timing synchronization function (TSF) is speciied in the IEEE 802.11 wireless local area network (WLAN) standard to fulill timing synchronization among users. A TSF keeps the timers for all stations in the same basic service set (BSS) synchronized. All stations should maintain a local TSF timer. Each mobile host maintains a TSF timer with a modulus 264 counting in increments of microseconds. he TSF is based on a 1 MHz clock and “ticks” in microseconds. On a commercial level, industry vendors assume the 802.11 TSF’s synchronization to be within 25 μs. Timing synchronization is achieved by stations periodically exchanging timing information through beacon frames. Each station in an independent basic service set (IBSS) should adopt a received timing if it is later than the station’s own TSF timer. All stations in the IBSS adopt a common value—a beacon period—that deines the length of beacon intervals or periods. his value, established by the station that initiates the IBSS, deines a series of target beacon transmission times (TBTTs) exactly a beacon period time unit apart. Time zero is deined to be a TBTT. 7.3.7 Power-Saving Function he IEEE 802.11 standard speciies two medium access methods: DCF (distribution coordination function), for a fully distributed protocol, and PCF (point coordination function) or a centralized protocol. 238 A D H O C M O BIL E WIREL E S S NE T W O RKS DCF is fundamental access method of the IEEE 802.11 MAC and should be implemented in all stations. On the other hand, PCF is an option access method, which is only usable in an infrastructure network. IEEE 802.11 deines two power saving mechanisms depending on the coniguration of network: infrastructure network (BSS) and ad hoc network (IBSS). he following subsections briely describe the DCF protocol and power-saving mechanism in IBSS. In the IEEE 802.11 distribution coordination function, a station with pending packets to transmit has to monitor the channel status before transmitting the data. If a channel is idle for a period, called distributed interframe space (DIFS), the station uniformly chose back-of time in range [0, cw], where CW is the size of the contention window. he value CW is set to CWmin at the irst transmitting attempt. he back-of time decreases when the channel is sensed to be idle, holds the same value when the channel is busy, and decreases again when the channel is sensed to be idle for DIFS. When the back-of time becomes zero, the station transmits the RTS packet. On reception of the RTS packet, the destination station responds with the CTS packet to the transmitting station. he transmitting station starts to send data after receiving the CTS packet. When the destination station receives a data packet successfully, it sends an ACK (acknowledgment) packet to the transmitting station to inform it of the successful reception. Any station in the network that overhears the RTS and CTS packets can update a network allocation vector (NAV) by information indicating the length of the packet to be transmitted in both packets. Note that before the transmit CTS packet, data packet, and ACK packet, the station waits for a short interframe space (SIFS) instead of DIFS. On the other hand, if back-of time in two or more stations reaches zero at the same time, a collision occurs when they send the RTS packet. In this case, the destination station will not receive the RTS packet and will not respond with the CTS packet. he transmitting station can detect the collision by absence of the CTS packet. Every time a collision is detected, the contention window is doubled to reduce the probability of collision again, up to the maximum value CWmax. he power-saving mechanism for an IBSS divided time into a constant interval named the beacon interval. At the start of the beacon interval, every wireless host has to stay awake for a ixed period, called ENER GY M A N AG EM EN T SYS T EM S Beacon Interval ATIM window 239 Beacon Interval ATIM window Power saving state Beacon ATIM DATA Frame Station A Station E ACK ACK Figure 7.10 Example of transmitting to a power-saving station in an IBSS network. the ATIM (ad hoc traic indication message) window. As described in the IEEE 802.11 standard, every station in the network is assumed to be fully connected and synchronized. Because of characteristics of the network, there is no unlimited power station playing a role to provide time synchronization. Every wireless host attempts to broadcast the beacon frame using a CSMA/CA mechanism at the start of the beacon interval to obtain synchronization. After receiving the beacon frame, the wireless host adjusts its local time to the time stamp of the beacon frame to synchronize with each other. During the ATIM window, the wireless host that bufers data for a station in power-saving mode announces an ATIM frame. On receiving the ATIM frame, the power-saving host must send ATIM-ACK back. After successfully transmitting the ATIM frame, both wireless hosts will stay in awake states for the whole beacon interval. After the end of the ATIM window, bufered data will be transmitted to a destination by the normal distribution coordination function protocol. At this point, a wireless station that has no bufered packet can change to doze mode if it does not receive an ATIM frame during the ATIM window. Figure 7.10 illustrates the example of transmitting data in an ad hoc network to a power-saving station. 7.3.8 Power-Saving Potential he efectiveness of the power-saving mechanism depends heavily on the values selected for the beacon and ATIM intervals, as well as the ofered load. If the ATIM window is too short, not enough traic 24 0 A D H O C M O BIL E WIREL E S S NE T W O RKS can be announced during the window—possibly not even enough to utilize the entire beacon interval. If the ATIM window is too long, not only are stations required to spend more time awake, but also more traic may be announced than can be sent in the remainder of the beacon interval. If the beacon interval is too short, the overhead of the sleep–wake cycle, beaconing, and traic announcements will be high. If the beacon interval is too long, many stations may attempt to announce traic at each ATIM window, such that many destinations will need to remain awake after the ATIM window. he key criterion is naturally the amount of power savings, but factors such as increased latency, decreased throughput, and unequal distribution of power consumption must also be taken into account. It is important to note that the percentage of time spent in the sleep state is only an indication of the actual energy savings, which will be reduced by the costs of the wake–sleep transition, beaconing, and ATIM traic, all of which increase as the beacon interval decreases. 7.4 Transmission Power Control Transmit power control is important in wireless ad hoc networks for at least two reasons: (1) It can impact on battery life, and (2) it can impact the traic-carrying capacity of the network. For the irst point, note that there is no need for N1 in Figure 7.11 to broadcast at 30 mW to send a packet to the neighboring N2, since N2 is within range even at 1 mW. hus, it can save on battery power. For the second point, suppose that in the same igure, N3 also wishes to broadcast a packet at the same time to N4 at 1 mW. If N1 broadcasts at 1 mW to N2, then both transmissions can be successfully received simultaneously, since N2 is not in the range of its interferer N3 (for its reception from N1), and N4 is not in the range of its interferer N1. However, if N1 broadcasts at 30 mW, then that interferes with N4’s reception from N3, so only one packet, from N1 to N2, is successfully transmitted. hus, power control can enhance the traic-carrying capacity. One wants an adaptive choice of power level by nodes in the network, which is implementable in a distributed asynchronous fashion by the nodes participating in the network. he next issue that arises is where in the layered hierarchy the power control for ad hoc networks its. he diiculty is that it infringes on several layers. ENER GY M A N AG EM EN T SYS T EM S 2 41 Range at 1 mW Range at 30 mW N3 N4 N1 N2 Figure 7.11 The need for power control. Clearly, power control impacts the physical layer due to the need for maintaining link quality. However, power control also impacts the network layer, as shown in Figure 7.11(a). If all nodes are transmitting at 1 mW, then the route from node N1 to node N5 is N1 → N2 → N3 → N4 → N5. However, if they all transmit at 30 mW, then one can choose the route N1 → N3 → N5. In addition, power control also impacts on the transport layer. In Figure 7.11(b), every time node N1 transmits at high power to node N2, it causes interference at N3 to the packets from N4. hus, there is a loss of several such packets on the link from N4 to N3. his impacts the congestion control algorithm regulating the low from source N4 to destination N5 via the intermediate relay node N3. he need for power control is thus obvious. 7.4.1 Adapting Transmission Power to the Channel State Depending on the channel state, transmission power can also be adapted on short time scales. herefore, if the channel quality is estimated as better, a lower transmission power is assigned, resulting in less interference and power consumption by the ampliier. 242 A D H O C M O BIL E WIREL E S S NE T W O RKS On the other hand, if the channel quality is estimated as worse, a higher transmission power is assigned or the transmission process might be stopped temporarily until the communication channel is good again. 7.4.2 MAC Techniques Power-saving techniques existing at the MAC layer consist primarily of sleep-scheduling protocols. he basic principle behind all sleepscheduling protocols is that lots of power is wasted listening on the radio channel while there is nothing there to receive. Sleep schedulers are used to duty cycle a radio between its on and of power states in order to reduce the efects of this idle listening. hey are used to wake up a radio whenever it expects to transmit or receive packets and sleep otherwise. Other power-saving techniques at this layer include battery-aware MAC protocols (BAMAC) in which the decision of who should send next is based on the battery level of all surrounding nodes in the network. Battery-level information is piggybacked on each packet that is transmitted, and individual nodes base their decisions for sending on this information. Sleep scheduling protocols can be broken up into two categories: synchronous and asynchronous. Synchronous sleep scheduling policies rely on clock synchronization between all nodes in a network, as seen in Figure 7.12. Senders and receivers are aware of when each other should be on and only send to one another during those time periods. hey go to sleep otherwise. Asynchronous sleep scheduling, on the other hand, does not rely on any clock synchronization between nodes whatsoever. Nodes can send and receive packets whenever they please, according to the MAC protocol in use. Figure 7.13 shows how two nodes running asynchronous sleep schedulers are able to communicate. Nodes wake up and go to sleep periodically in the same way they do for synchronous sleep scheduling. Since there is no time synchronization, however, there must be a way to ensure that receiving nodes are awake to hear the transmissions coming in from other nodes. Normally, preamble bytes are sent by a packet in order to synchronize the starting point of the incoming data stream between the transmitter and receiver. With asynchronous sleep scheduling, a signiicant 24 3 ENER GY M A N AG EM EN T SYS T EM S Transmitter: Awake Awake Asleep Asleep Send Packets Asleep Send Packets Receiver: Awake Awake Asleep Asleep Asleep Receive Packets Figure 7.12 Synchronous sleep scheduler. Transmitter Preamble Data Receiver Sleep Sleep Check the Channel Check the Channel and receive Figure 7.13 Asynchronous sleep scheduler. Check the Channel 24 4 A D H O C M O BIL E WIREL E S S NE T W O RKS number of extra preamble bytes are sent per packet in order to guarantee that a receiver has the chance to synchronize to it at some point. In the worst case, a packet will begin transmitting just as its receiver goes to sleep, and preamble bytes will have to be sent for a time equal to the receiver’s sleep interval (plus a little more to allow for proper synchronization once it wakes up). Once the receiver wakes up, it synchronizes to these preamble bytes and remains on until it receives the packet. 7.4.3 Logical Link Control he two most common techniques used to conserve energy at the link layer involve reducing the transmission overhead during the automatic repeat request (ARQ ) and forward error correction (FEC) schemes. Both of these schemes are used to reduce the number of packet errors at a receiving node. By enabling ARQ , a router is able automatically to request the retransmission of a packet directly from its source without irst requiring the receiver node to detect that a packet error has occurred. Results have shown that sometimes it is more energy eicient to transmit at a lower transmission power and have to send multiple ARQs than to send at a high transmission power and achieve better throughput. Integrating the use of FEC codes to reduce the number of retransmissions necessary at the lower transmission power can result in even more energy savings. Power management techniques exist that exploit these observations Hybrid scheme: With ARQ , the system performs well in good channels, but not in poor ones, whereas FEC performs consistently across channel conditions due to a lack of feedback, though it has the capability of trading of more protection for increased computational cost. herefore, the combined efect will create minimal energy consumed per useful bit over the code rate. Adaptive frame sizing: A diferent frame size can have a dramatic impact on the behavior of the ARQ protocol. In a noisy channel, a smaller packet will be preferable despite the excess overhead, since the packet loss rates of the larger packets will dominate. Turning this around, an argument can be made for low-power packet sizing. If we are to accept a ixed, low user level bit rate, we can trade of reduced power transmissions for packet throughput. ENER GY M A N AG EM EN T SYS T EM S 24 5 Other power-management techniques existing at the link layer are based on some sort of packet-scheduling protocol. By scheduling multiple packet transmissions`1 to occur back to back (i.e., in a burst), it may be possible to reduce the overhead associated with sending each packet individually. Preamble bytes only need to be sent for the irst packet in order to announce its presence on the radio channel, and all subsequent packets essentially piggyback this announcement. Packetscheduling algorithms may also reduce the number of retransmissions necessary if a packet is only scheduled to be sent during a time when its destination is known to be able to receive packets. By reducing the number of retransmissions necessary, the overall power consumption is reduced as well. Routing: In traditional cellular systems, the routing problem changes to the handover problem: Which access point should be selected to serve a mobile device? As a handover decision is usually based on the channel quality between mobile devices and access points, energy eiciency is at least implicitly considered in this process. From a system perspective, it could be conceivable that a handover decision that is energy conserving for a particular mobile device could be suboptimal when considering all mobiles together; this suboptimality could, for example, be due to a diferent interference situation in neighboring cells. he routing problem becomes much more diicult if multihop radio communication is considered. In such a multihop system, it is no longer clear which sequence of nodes should be traversed to reach a given destination. Several optimization metrics can be introduced to support this choice. A number of routing protocols have been developed to meet the speciic needs of such multihop networks—for example, proactive protocols like destination-sequenced distance vector (DSDV), which periodically sends route updates to learn all routes to a destination in the network; reactive protocols like dynamic source routing (DSR) and power-aware routing optimization (PARO), which start searching for the destination only if there is a packet to transmit; and hybrid schemes like AODV, FSR, and the temporally ordered routing algorithm (TORA). However, energy eiciency is not the prime target of these protocols. More recently, energy eiciency has moved into focus, particularly motivated by the vision of wireless sensor networks. A frequently used 24 6 A D H O C M O BIL E WIREL E S S NE T W O RKS concept is to assign routing and forwarding responsibilities to a node acting on behalf of a group of nodes (a “cluster”); routing and forwarding then only take place among these “cluster heads.” he choice of cluster heads can be based on the availability of resources (battery capacity) and is rotated among several nodes in many approaches. Examples of such clustered protocols are the zone routing protocol (ZRP) and low-energy adaptive clustering hierarchy (LEACH). Additionally, some routing protocols take the physical location of nodes into account (e.g., geographical adaptive idelity, or GAF). he challenge for all of these multihop routing protocols is the evaluation of the trade-of between energy savings by clever routing and the overhead required to obtain the routing information, particularly in the face of uncertainties induced by mobility, time-varying channels, and so forth. 7.5 AODV Protocol 7.5.1 Introduction he ad hoc on-demand distance vector (AODV) routing protocol provides a method of routing in mobile ad hoc networks. his means that routes are only established when needed to reduce traic overhead. AODV supports unicast, broadcast, and multicast without any further protocols. Link breakages can be locally repaired very eiciently. 7.5.2 Route Discovery When a source has data to transmit to an unknown destination, it broadcasts a route request (RREQ ) for that destination. At each intermediate node, when an RREQ is received, a route to the source is created. If the receiving node has not received this RREQ before, is not the destination, and does not have a current route to the destination, it rebroadcasts the RREQ. If the receiving node is the destination or has a current route to the destination, it generates a route reply (RREP). he RREP is unicast in a hop-by-hop fashion to the source. As the RREP propagates, each intermediate node creates a route to the destination. When the source receives the RREP, it records the route to the destination and can begin sending data. If multiple ENER GY M A N AG EM EN T SYS T EM S 2 47 RREPs are received by the source, the route with the shortest hop count is chosen. As data low from the source to the destination, each node along the route updates the timers associated with the routes to the source and destination, maintaining the routes in the routing table. If a route is not used for some period of time, the node removes the route from its routing table. 7.5.3 Route Maintenance Route maintenance is done as follows: If data are lowing and a link break is detected, a route error (RERR) is sent to the source of the data in a hop-by-hop fashion. As the RERR propagates toward the source, each intermediate node invalidates routes to any unreachable destinations. When the source of the data receives the RERR, it invalidates the route and reinitiates route discovery if necessary. 7.6 Local Energy-Aware Routing Based on AODV (LEAR-AODV) 7.6.1 Introduction he purpose of LEAR-AODV is to balance the energy consumption rates throughout the network. his is done by allowing the nodes to choose whether they will be part of a route or not. he choice is based on the remaining battery power that a node has. In other words, a node can chose to reduce its participation in data forwarding and therefore conserve power. he protocol incorporates a mechanism that is used to avoid shortage of forwarding nodes due to selish behavior. To make all of this possible, the route discovery and route maintenance procedures of AODV are modiied. 7.6.2 Route Discovery During route discovery, when an intermediate node receives a route request packet, it irst examines its remaining battery power. If it is less than some predetermined threshold, the route request packet is dropped and the node announces that by broadcasting an ADJUST_ hr packet. his automatically means that the node will not forward 24 8 A D H O C M O BIL E WIREL E S S NE T W O RKS the data packet on behalf of the source node that sent the route request. Otherwise, if the intermediate node has suicient battery power, it retransmits the packet. To that end, it is guaranteed that the destination node will receive a route request along a route of nodes with suicient battery power. 7.6.3 Route Maintenance he route maintenance procedure in AODV is triggered by the unavailability of a hop along a source-destination route. An intermediate node that identiies a missing hop reports back to the source node and, as a result, a new route discovery is initiated. In the case of LEAR-AODV, a route maintenance procedure could be initiated by a node with decreasing battery power. Nodes of the network are continuously checking their remaining battery power. If it becomes lower than the threshold value as a result of an ongoing data transfer, the node issues a route maintenance packet to the source node indicating that it will no longer be a part of the corresponding route. LEAR-AODV provides a mechanism for a real-time adjustment of the threshold battery power values. his is to avoid the situation in which route request packets do not reach the destination node due to low battery power of the intermediate nodes. In such a case, after an unsuccessful route request, the source node issues its following route request with an indication that the intermediate nodes must decrease the battery power threshold value. 7.7 Power-Aware Routing Based on AODV (PAR-AODV) 7.7.1 Introduction PAR-AODV assigns costs to each hop that lies on a source-destination route, based on the residual battery power of each node. Using these costs, all available routes are evaluated. he protocol uses the route that minimizes the following function: C(π, t) = ∑i∈π Ci(t) where (7.1) ENER GY M A N AG EM EN T SYS T EM S 24 9  F  Ci (t ) = ρi  i  a  Ei (t )  (7.2) and ρi is the transmit power of node i Fi is the full-charge battery capacity of the node i Et is the remaining battery capacity of node i in time t a is a positive weighting factor 7.7.2 Route Discovery During route discovery, prior to the transmission of a route request packet, each intermediate node calculates its link cost using Equation (7.2) and adds it to the header of the packet. hus, when the destination node receives the route request packet, it sends a route reply back to the source that contains the overall cost of the route. he source node selects the route that ofers the lowest cost. Additional compute-cost packets could be sent by the intermediate nodes in case they receive route request packets with a lower link cost than that currently in use. he compute_cost packets are sent to the destination node, which then informs the source node of the new, more cost-efective route, using a route reply. 7.7.3 Route Maintenance he route maintenance in PAR-AODV is the same as in LEARAODV. When any intermediate node has a lower battery level than its threshold value, any request is simply dropped. 7.8 Lifetime Prediction Routing Based on AODV (LPR-AODV) 7.8.1 Introduction he last of the power-aware routing protocols proposed is LPRAODV. It routes traic through paths with a predicted long lifetime. As in the case of PAR-AODV, the protocol assigns a cost to each link. he cost used by LPR-AODV is related to the battery lifetime of a node. he chosen route is the one that maximizes the function 250 A D H O C M O BIL E WIREL E S S NE T W O RKS maxπ (Tπ (t)) = maxπ (mini∈π (Ti(t))) (7.3) where Tπ(t) is the lifetime of path π and Ti(t) is the predicted lifetime of node i in path π. he battery lifetime prediction of a node is based on its past activities. A good indication of the amount of traic crossing the node is achieved by keeping a log of recent data-routing operations. Every time the node sends a data packet, it records its residual battery energy Ei(t) at the given time instance t. he node also logs its residual energy Ei(t) at time instance i when exactly N packets are sent/forwarded. 7.8.2 Route Discovery Similarly to LEAR-AODV, each intermediate node calculates its costs in terms of predicted lifetime Ti using the following formulas: Ti = Ei (t ) discharge _ ratei (t ) (7.4) where Dischargerate i (t ) = Ei (t ′) − Ei (t ) t − t′ (7.5) where Ei(t) is the remaining energy of node i at time t. he estimated node cost is inserted by the intermediate nodes in the header of the propagated route request packet. On reception of a route request, the destination node issues a route reply that contains the overall route cost. If an intermediate node receives a route request packet with lower cost, the destination node is informed by a compute_lifetime packet. hereafter, the destination node informs the source node about the new route with a route reply packet. 7.8.3 Route Maintenance As in the irst algorithms, route maintenance is needed when a node becomes out of direct range of a sending node or when there is a change in its predicted lifetime. In the irst case (node mobility), the mechanism is the same as in AODV. In the second case, the node ENER GY M A N AG EM EN T SYS T EM S 2 51 sends an RERR back to the source even when the predicted lifetime goes below a threshold level δ (Ti(t) = δ). his route error message forces the source to initiate route discovery again. his decision depends only on the remaining battery capacity of the current node and its discharge rate. Hence, it is a local decision. However, the same problem as in LEAR-AODV can occur. If the condition Ti(t) = δ is satisied for all the nodes, the source will not receive a single reply message even though a path between the source and the destination exists. To prevent this, we use the same mechanisms used in LEARAODV described earlier. he three algorithms are simulated and compared to the unmodiied AODV protocol under two diferent scenarios: ixed and mobile. he improved network lifetime is studied in terms of • he time taken for K nodes to die • he time taken for the irst node to die • he time taken for all nodes to die In the static case, the best performance is observed for LPR-AODV, where the irst node to switch of due to exhausted power resources under AODV routing appears 3244 s before a node malfunctions under LPRAODV. his protocol outperforms the others by taking into account the battery discharge rates in addition to residual battery capacity. In the mobile case, the LPR-AODV protocol once again ofers the best performance in terms of network lifetime extension. All three algorithms outperform the unmodiied AODV algorithms under all mobility instances with an average network life extension of 1033 s at node speed of 4 m/s. As in the case of EADSR, with increasing mobility, the energy consumption performance of the modiied versions of AODV converges to that of the original protocol. Problems 7.1 Why is energy management an important factor in ad hoc networks? 7.2 Explain how energy-management schemes are classiied in ad hoc networks. 7.3 Explain diferent battery management schemes for ad hoc networks. 252 A D H O C M O BIL E WIREL E S S NE T W O RKS 7.4 Briely explain the overview of battery technologies used for ad hoc networks. 7.5 Discuss the principles of battery discharge. 7.6 Discuss the impact of discharge characteristics on battery capacity. 7.7 Explain how a smart battery system can be implemented with an example. 7.8 Give an overview of battery-driven system design. 7.9 Describe the features and design criteria of the EE-MAC protocol. 7.10 Explain the analysis of the PCCB routing protocol. 7.11 Give a brief description of the timing synchronization function. 7.12 Explain the power-saving function used in power-saving mechanisms. 7.13 Describe logical link control for power transmission. 7.14 Give an overview of the AODV protocol. 7.15 Describe local energy-aware routing based on AODV. 7.16 Explain power-aware routing based on AODV. 7.17 Describe lifetime prediction routing based on AODV. References 1. Lahiri, K., A. Raghunathan, S. Dey, and D. Panigrahi. 2002. Batterydriven system design: A new frontier in low power design. ASP-DAC ’02: Proceedings of the 2002 Asia and South Paciic Design Automation Conference, p. 261. 2. Prabhu, B. J., A. Chockalingam, and V. Sharma. 2002. Performance analysis of battery power management schemes in wireless mobile devices. IEEE Wireless Communications and Networking Conference 2:825–831. 3. Nie, J., and Z. Zhou. 2004. An energy based power-aware routing protocol in ad hoc networks. IEEE International Symposium on Communications and Information Technology 1:280–285. 4. Senouci, S. M., and G. Pujolle. 2004. Energy eicient routing in wireless ad hoc networks. IEEE International Conference on Communications 7:4057–4061. 5. Langendoen, K., and G. Halkes. Energy-eicient medium access control, Delft University of Technology, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft, the Netherlands, he Embedded Systems Handbook. ENER GY M A N AG EM EN T SYS T EM S 253 6. Jayashree, S., and C. Siva Ram Murthy. 2007. A taxonomy of energy management protocols for ad hoc wireless networks. IEEE Communications Magazine 45:104–110. 7. Benchmarq Microelectronics Inc., Duracell Inc., Energizer Power Systems, Intel Corporation, Linear Technology Corporation, Maxim Integrated Products, Mitsubishi Electric Corporation, National Semiconductor Corporation, Toshiba Battery Co., Varta Batterie, AG. Smart battery system manager speciication. 1988. 8. Senouci, S. M., and G. Pujolle. 2004. Energy eicient routing in wireless ad hoc networks. IEEE International Conference on Communications 7:4057–4061. 9. Chen, M., and Gabriel A. Rincon-Mora. 2006. Accurate electrical battery model capable of predicting runtime and I–V performance. IEEE Transactions on Energy Conversion 21 (2): 504–511. 8 MOBILITY MODELS FOR MULTIHOP WIRELESS NETWORKS 8.1 Introduction In the simulation environment to test a new protocol for an ad hoc network, a mobility model needs to be used for representing the movements of the mobile nodes (mobile nodes) that will properly utilize the given protocol. hese models play a vital role in determining the protocol performance in MANET. Hence, it is essential to study and analyze the efects of various mobility models on the performance of the MANET protocols. Using a mobility model we try to mimic the real movements of the nodes using a particular networking scenario. he mobility models were primarily designed for representing the movement pattern of mobile users, and how their location, velocity, and acceleration change over time. he mobile nodes are inherently dynamic in nature and diferent kinds of mobility models have been proposed in order to capture various features of mobility of the nodes. 8.2 Mobility Models In the simulation environment we use the mobility models to describe the movements of the mobile nodes. hey deine the position, speed, and acceleration of the nodes at every moment in the simulation scenario. Based on the dependence of the movements, these mobility models can be classiied in • Entity mobility models (independent movements) • Group mobility models (dependent movements) We have basically two types of mobility models that are used in the simulation of networks: traces and synthetic models. Traces mobility models are those mobility patterns that are observed in real life 255 256 A D H O C M O BIL E WIREL E S S NE T W O RKS systems. In the case of a large number of nodes and a long observation period, they provide accurate information. New ad hoc network environments can not be easily modeled if traces have not yet been created. In such a scenario, synthetic models can be used. Synthetic models try to represent the behaviors of mobile nodes realistically without the use of traces. In the case of a synthetic model, the models need to be designed in such a way that they should change the speed and direction in a reasonable time slot. For example, we would not want the mobile nodes to travel in straight lines at constant speeds throughout the course of the entire simulation that does not match the behaviour of the real nodes. here are seven diferent synthetic entity mobility models for ad hoc networks: • he random walk mobility model (including its many derivatives) is a simple mobility model based on random directions and speeds. • he random waypoint mobility model includes pause times between changes in destination and speed. • he boundless simulation area mobility model converts a 2D rectangular simulation area into a torus-shaped simulation area. • he random direction mobility model forces the mobile nodes to travel to the edge of the simulation area before changing direction and speed. • he probabilistic version of the random walk mobility model utilizes a set of probabilities to determine the next position of a mobile node in such models. • he Gauss–Markov mobility model uses one tuning parameter to vary the degree of random nodes in the mobility pattern. • he city section mobility model is a simulation area that represents streets of a city. he irst two models —the random walk mobility model and the random waypoint mobility model—are commonly used by researchers. M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 257 8.2.1 Random Walk Mobility Model Einstein, in 1926, mathematically described the irst random walk mobility model (Figure 8.1). Many entities in nature move in extremely unpredictable ways, and the random walk mobility model was developed to ape this unpredictable movement. According to this mobility model, a mobile node moves from its current location to a new location by randomly choosing a new direction and speed. he new speed and direction are both chosen from pre-deined ranges. Each of the movements in this model takes place in either a constant time interval t or a constant distance traveled d, after which a new direction and speed are calculated. When a node reaches a simulation boundary, it “bounces” of the border of the simulation area with an angle that is determined by the incoming direction. he mobile node then follows this new path. Many variations of the random walk mobility Model have been developed including the 1-D, 2-D, 3-D, and d-D walks. his characteristic ensures that the random walk represents a mobility model that tests the movements of nodes around their starting points, without worrying about them wandering away never to return. he random walk mobility model does not keep or use the past locations and speed values; hence, it can be called a memory-less model. he current speed and direction of a mobile node are not 600 500 400 300 200 100 0 0 50 100 150 200 250 300 Figure 8.1 Traveling pattern of an mobile node using the 2-D random walk mobility model (time). 258 A D H O C M O BIL E WIREL E S S NE T W O RKS (x6, y6) (x5, y5) (x1, y1) (x7, y7) (x3, y3) (x4, y4) (x0, y0) (x2, y2) (x6, y6) Figure 8.2 Static nature of random walk mobility model. dependent on its past speed and direction. Because of this, it can generate unrealistic movements like sharp turns and sudden stops. Movement pattern of nodes in simulation is a random roaming pattern restricted to a small segment of the simulation area. Certain simulation studies based on this mobility model set the speciied time to one clock tick or the speciied distance to one step. From Figure 8.2 we observe the static nature obtained in the random walk mobility model if the mobile node is permitted to move 10 steps (not one) before changing direction. It may also be observed that the mobile node does not roam far from its initial position. he random walk mobility model is used widely in simulation. For further simpliication of the model, all the mobile nodes can be assigned the same speed. 8.2.2 Random Waypoint his model includes pause times between changes in direction and/ or speed. According to this model, a mobile node begins by residing at one location for a speciic period of time. At the expiration of this time duration, the node selects a random destination in the simulation area and a speed that is uniformly distributed between [minspeed and maxspeed]. he mobile node then moves toward the newly selected destination at the chosen speed. After reaching the destination it has to again wait for the speciied pause time before repeating the process. M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 259 600 500 400 300 200 100 0 0 50 100 150 200 250 300 Figure 8.3 Traveling pattern of a mobile node using the random waypoint mobility model. Figure 8.3 shows an example traveling pattern of a mobile node that uses the random waypoint mobility model. he node starts at a randomly chosen point or position (133, 180) whereas the speed of the mobile node is uniformly chosen between 0 and 10 m/s. It can also be observed that the movement pattern of a mobile node that uses the random waypoint mobility model is similar to the random walk mobility model if pause time is zero and [minspeed, maxspeed] = [speedmin, speedmax]. his mobility model has been widely used by diferent researchers. Moreover, the model is sometimes simpliied. For example, the random waypoint mobility model is used without pause times. In most of the performance evaluations using the random waypoint mobility model, the mobile nodes are initially distributed randomly around the entire simulation area. his initial random distribution of the nodes is not the same in which nodes distribute themselves while moving. he average mobile node neighbor percentage is the cumulative percentage of total mobile nodes that are a given mobile node’s neighbor. For example, if the network contains 50 mobile nodes and a node has 5 neighbors, then the node’s current neighbor percentage is 10%. A node is considered as a neighbor of another node if it is within the node’s transmission range. As can be seen from Figure 8.3, there is high variability during the irst 600 seconds of simulation time. his high variability in average mobile node neighbor percentage will cause a high variability in performance 260 A D H O C M O BIL E WIREL E S S NE T W O RKS results when the simulation results are calculated from relatively short simulation duration. In the following, we present three possible solutions to avoid this initialization problem is presented. First, the locations of the mobile nodes can be saved after a simulation has executed long enough to be past this initial high variability, and can be used as the initial starting point of the mobile nodes in all future simulations. Second, initially the mobile nodes can be distributed in a manner that maps to a distribution more common to the model. For example, initially placing the mobile nodes in a triangle distribution may result in the distribution of the nodes in the random waypoint mobility model more accurately than distributing the mobile nodes randomly in the simulation area. Lastly, the initial 1000 seconds of simulation time produced by the random waypoint mobility model in each simulation trial needs to be discarded. (Not considering the irst 1000 seconds of simulation time eliminates the initialization problem even if the mobile nodes move slowly. In other words, we can discard fewer seconds of simulation time for faster moving mobile nodes.) his approach has an added advantage over the irst solution proposed. Speciically, a random initial coniguration for each simulation is ensured by this simple solution. In this case, a performance evaluation is based on the random waypoint mobility model, and appropriate parameters need to be evaluated. For example, a multicast protocol for ad hoc networks can be evaluated by using the random waypoint mobility model. 8.2.3 he Random Direction Mobility Model In order to overcome density waves in the average number of neighbors produced by the random waypoint mobility model, the random direction mobility model was created. A density wave is considered as the clustering of nodes in one part of the simulation area. For the random waypoint mobility model, the clustering occurs near the center of the simulation region. In the case of random waypoint mobility model, the probability of a mobile node choosing a new destination— which is located in the center of the simulation region or a destination that requires traveling through the middle of the simulation region— is high. M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 2 61 8.2.4 A Boundless Simulation Area In the boundless simulation area mobility model, we ind a relationship between the previous direction of travel and velocity of a mobile node with its current direction of travel and velocity. In order to describe a mobile node’s velocity v and its direction θ, a velocity vector v = (v,θ) is speciied; the location of the mobile node is represented as (x; y). Changes in both the velocity vector and the position occur at every Δt time steps according to the following formulas: v(t + Δt) = min[max(v(t) + Δv,0),Vmax]; θ(t + Δt) = θ(t) + Δθ; x(t + Δt) = x(t) + v(t) * cosθ(t); y(t + Δt) = y(t) + v(t) * sinθ(t); Where Vmax referes to the maximum velocity deined in the simulation, Δv refers to the change in velocity, which is uniformly distributed between [-Vmax * Δt; Amax * Δt], Amax is the maximum acceleration of a given mobile node, Δθ is the change in direction, which is uniformly distributed between [-α * Δt; α * Δt], and α is the maximum angular change in the direction in which a mobile node is traveling. he boundless simulation area mobility model is also diferent in terms of how the boundary of a simulation area is handled. In case of all the mobility models previously discussed, mobile nodes relect of or stop moving once they reach a simulation boundary. But in the boundless simulation area mobility model, the mobile nodes that reach one end of the simulation region continue their movement and reappear on the opposite side of the simulation region. his technique creates a torus-shaped simulation area allowing mobile nodes to travel unobstructed (see Figures 8.4 and 8.5). 8.2.5 Gauss–Markov he Gauss–Markov mobility model was primarily designed for adapting to diferent levels of randomness through one tuning parameter. Initially, a current speed and direction are assigned to each mobile node. At ixed time intervals, n, movement of each node occurs by updating the speed and direction of the node. he value of speed and direction at the nth instance is determined depending upon their 262 A D H O C M O BIL E WIREL E S S NE T W O RKS (0, Ymax) (Xmax, Ymax) Closed Coverage Area (0, 0) (Xmax, 0) Figure 8.4 Rectangular simulation area mapped to a torus in the boundless simulation area mobility model. 600 500 400 300 200 100 0 Figure 8.5 model. 0 50 100 150 200 250 300 Traveling pattern of a mobile node using the boundless simulation area mobility respective values at the (n-1)st instance and a random variable according to the following equations sn = α sn−1 + (1 − α)s + (1 − α ) s dn = α dn−1 + (1 − α)d + (1 − α ) d 2 xn−1 2 xn−1 where sn and dn specify the value of the new speed and direction of the mobile node at time interval n; α, where 0 ≤ α ≤ 1, refers to the tuning parameter used to vary the randomness; s and d are constants representing the mean value of speed and direction as n → ∞; and sxn−1 and d xn−1 are random variables from a Gaussian distribution. Totally M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 263 random values (or Brownian motion) are obtained by setting α = 0 and linear motion is obtained by setting α = 1. Varying the value of α between 0 and 1, intermediate levels of randomness are obtained. At each time interval, the next location is determined depending on the current location, speed, and direction of movement. Speciically, at time interval n, an mobile node’s position can be obtained by the equations xn = xn–1 + sn–1 cos θ dn-1 yn = yn–1 + sn–1 cos θ dn-1 where (xn,yn) and (xn–1,yn–1) denote the x and y coordinates of the mobile node’s position at the nth and (n-1)st time intervals, respectively, and sn–1 and dn-1 denote the speed and direction of the mobile node, respectively, at the (n-1)st time interval. In order to ascertain that a mobile node does not remain near an edge of the grid for a long duration, the mobile nodes are forced away from an edge when they reach within a certain distance of the edge. his is achieved through the modiication of the mean direction variable d in the above direction equation. For example, when a mobile node is present near the right edge of the simulation area, the value of d is changed to 180 degrees. Consequently, the mobile node’s new direction is away from the right edge of the simulation area. 8.2.6 A Probabilistic Version of Random Walk In the case of Chiang’s mobility model, a probability matrix is used to determine the position of a particular mobile node in the next time step, which is represented by three diferent states for position x and three diferent states for position y. State 0 denotes the current (x or y) position of a mobile node, state 1 denotes the mobile node’s previous (x or y) position, and state 2 denotes the mobile node’s next position when the mobile node continues to move in the same direction. he probability matrix used is P(0, 0 )  P =  P(1, 0 ) P(2, 0)) P(0, 1) P(1, 1) P(2, 1) P(0, 2 )  P(1, 2 )  P(2, 2 ) 264 A D H O C M O BIL E WIREL E S S NE T W O RKS where each entry P(a,b) denotes the probability for a mobile node to go from state a to state b. hese values are used for updating both the mobile node’s x and y positions. In Chiang’s simulator, an average speed is preset for each node for their random movement. he following matrix contains the values Chiang used to calculate x and y movements: 0  P = 0.3 0.3 0.5 0.7 0 0.5  0 0.7 With these values, a mobile node may take a step in any of the four possible directions (i.e., north, south, east, or west) during its movement (i.e., no pause time). Moreover, the probability of the mobile node moving in the same direction is higher than the probability of the mobile node that changes directions. Also, the values deined prohibit movement between the previous and next positions without passing through the current location. A probabilistic rather than purely random movements is produced by this implementation, which may result in more realistic behaviors. For example, as people complete their day-to day activities they tend to continue their movement in a semi-constant forward direction. Rarely do they suddenly turn around to retrace their steps. Also, random steps are almost never taken hoping that they may eventually wind up somewhere relevant to their tasks. However, the task of selecting appropriate values of P(a;b) may be diicult, if not impossible, for an individual simulation scenario unless traces are available for a given movement scenario. 8.2.7 City Section Mobility Model In the case of the city section mobility model, the simulation scenario represents a section of a city where the ad hoc network exists. he type of city being simulated determines the streets and speed limits on the streets. For example, in the downtown area of the city the streets may form a grid and a high-speed highway near the border of the simulation area to represent a loop around the city. Under this mobility model every mobile node starts the simulation at a deined point on some street. It then randomly chooses the next destination, M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 265 also represented by a point on some street. he movement algorithm from the current position to the new destination inds a path that will produce the shortest travel time between the two points. Moreover, safe driving characteristics including speed limit and a minimum distance allowed between any two mobile nodes exist. After reaching the destination, the mobile node has to again pause for a speciied time and before randomly choosing another destination (i.e., a point on some street). After this the process is repeated. 8.3 Limitations of the Random Waypoint Model and Other Random Models he design characteristics of the random waypoint model and its variants try to mimic the movement of mobile nodes in a simpliied way. heir wide acceptability is mainly due the simplicity of implementation and analysis. However, this also results in certain limitations such that they may not adequately capture certain mobility characteristics of some realistic scenarios, including temporal dependency, spatial dependency and geographic restriction: • Temporal dependency of velocity. In random waypoint and other random models, the velocity of mobile node is considered as a memory-less random process, (i.e., the velocity of current movement is not dependent on the velocity of the previous movement). his may result in some extreme mobility behavior, such as sudden stop, sudden acceleration, and sharp turn, in the trace generated by the random waypoint model. However, in most of the real life scenarios, the speed of vehicles and pedestrians accelerate incrementally. Moreover, the change in direction is also smooth. • Spatial dependency of velocity. he mobile node is basically considered as an entity with independent movement in the case of the random waypoint and other random models. his kind of mobility model is categorized as an entity mobility model. However, in some scenarios, including battleield communication and museum touring, the movement pattern of a mobile node may vary under the inluence of certain 266 A D H O C M O BIL E WIREL E S S NE T W O RKS speciic “leader” node in its neighborhood. Consequently, the mobility of various nodes is indeed correlated. • Geographic restrictions of movement. In the random waypoint and other random models, the movement of the mobile nodes is free from any restrictions. However, in many realistic cases, especially for the urban area applications, the movement of a mobile node may be constrained by obstacles, buildings, streets, or freeways. he random waypoint model and its variants fail to represent these constraints. 8.3.1 Mobility Models with Temporal Dependency he physical laws of acceleration, velocity, and rate of change of direction constrain the mobility of a node. Hence, there may be a dependency between the current velocity of a mobile node and its previous velocity. hus, a correlation exists between the velocities of a single node at diferent time slots. his mobility characteristic is known as the temporal dependency of velocity. However, due to their memoryless nature of the random walk model, the random waypoint model and other variants are not capable of capturing this temporal dependency behavior. As a result, various mobility models considering temporal dependency are proposed. 8.3.2 Mobility Models with Spatial Dependency In the random waypoint model and other random models, the movement of a particular mobile node is independent of other nodes. For example the location, speed, and movement direction of mobile node are not afected by other nodes in the neighborhood. hese models are not capable of capturing many realistic scenarios of mobility. For example, on a freeway in order to avoid collision, the speed of a vehicle should not exceed the speed of the vehicle in front of it. In addition to this, in some speciic MANET applications such as disaster relief and battleield, team collaboration among users is necessary and the users are likely to follow the team leader. Hence, the mobility of a mobile node could be inluenced by the mobility of other neighboring nodes. As a correlation exists in space between the velocities of diferent nodes, we call this characteristic as the spatial dependency of velocity. M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 267 8.3.3 Mobility Models with Geographic Restriction In the random waypoint model, the nodes are allowed to move freely and randomly anywhere within the simulation area. In contrast, in most real life scenarios, it can be observed that a node’s movement is subject to the environment. Speciically, the motions of vehicles are bounded to the freeways or local streets in the urban area, and on campus the pedestrians may be blocked by the buildings and other obstacles. his may result in a pseudo-random movement pattern of the nodes on predeined pathways in the simulation area. In some recent works this characteristic has been addressed by integrating the paths and obstacles into mobility models. his kind of mobility model is known as a mobility model with geographic restriction. In order to integrate geographic constraints into the mobility model it is necessary to restrict the node movement to the pathways in the map. he map is predeined in the simulation area. Tian, Hahner, and Becker et al. utilize a random graph to model the map of city which can be either randomly generated or carefully deined depending on certain map of a real city. he buildings of the city are represented by the vertices of the graph whereas the edges model the streets and freeways between those buildings. Initially, the nodes are placed randomly on the edges of the graph. hen, for each node, a random next destination is chosen. he node then moves toward the selected destination following the shortest path along the edges. Upon arrival, the node pauses for T time and again chooses a new destination for the next movement. his procedure is repeated for the entire simulation duration. Unlike the random waypoint model where the nodes can move freely, the mobile nodes in this model are restricted to travel on the pathways. However, due to the random selection of the destination for each phase, a certain level of randomness still exists for this model. Consequently, in the graphbased mobility model, the nodes travel following a pseudo-random pattern on the pathways. Similarly, in the case of the freeway mobility model and Manhattan mobility model, the movement of mobile nodes is also restricted to the pathway in the simulation region. 8.3.3.1 Pathway Mobility Model 268 A D H O C M O BIL E WIREL E S S NE T W O RKS he obstacles in the simulation ield also play a major role as geographic constraint in mobility models. For avoiding the obstacles on the path of movement, it is necessary for the mobile node to change its trajectory. herefore, the movement behavior of mobile nodes is afected by the obstacles. Additionally, the obstacles also afect the way radio propagates. For example, for the indoor environment, typically, it is not possible for the radio system to propagate the signal through obstacles without severe attenuation. In the case of the outdoor environment, the radio is also subject to the radio shadowing efect. herefore, while integrating obstacles into the mobility model, we must carefully consider both its efect on node mobility and on radio propagation. Johansson, Larsson, and Hedman et al. developed three ‘realistic’ mobility scenarios to represent the movement of mobile users in real life, including 8.3.3.2 Obstacle Mobility Model 1. he conference scenario consists of 50 people attending a conference. he majority of them are static and a small number of people are moving with low mobility. 2. In the event coverage scenario, a group of highly mobile people or vehicles are modeled. Here the mobile nodes frequently change their positions. 3. In the disaster relief scenarios, some nodes move very fast whereas others move very slowly. For all the above mobility scenarios, obstacles in the form of rectangular boxes are randomly placed on the simulation region. It is required for the mobile node to select a proper movement trajectory for avoiding such obstacles. Additionally, when the radio propagates through an obstacle, it is assumed that the signal is fully absorbed by the obstacle. More speciically, if an obstacle resides within two nodes, the link between these nodes is considered as broken until one of them moves out of the shadowed area of the other. hus, under these efects, the three proposed mobility scenarios seem to difer from the commonly used random waypoint model. Jardosh, Belding-Royer, and Almeroth et al. also investigated the impact of obstacles on mobility modeling in detail. After taking into consideration the efects of obstacles into the mobility model, both the movement trajectories and the radio propagation of mobile nodes are somehow restricted. M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 269 In the simulation region, a number of obstacles are placed to model the buildings. hus, based on the locations of the building or obstacles, a Voronoi graph is computed to construct the pathways. he mobile nodes are restricted to move only on the pathways that interconnect the buildings. he pathways constructed by the Voronoi graph are equidistant from the nearby buildings. his observation is consistent with the real scenario where the pathways tend to lie halfway in-between the adjacent buildings. Additionally, in this model, the nodes (e.g., students on campus) are allowed to enter and exit buildings. After the construction of the pathway graph, the movements of mobile nodes are restricted on the pathways. his causes the mobile nodes to travel in a semi-deinitive (i.e., pseudo random) manner. When the mobile node moves towards its randomly selected new destination on the pathway graph, it follows the shortest path through the predeined pathway graph. In the Voronoi diagram this shortest path is calculated by Dijikstra’s algorithm. here are certain situations where it is necessary to model the behavior of mobile nodes as they move together. For example, in a battleield scenario, a group of soldiers may be assigned the task of searching a particular plot of land in order to destroy land mines, capture enemy attackers, or simply work together in a cooperative manner to accomplish a common goal. For modeling such situations, a group mobility model is highly essential to simulate this cooperative feature. 8.3.3.3 Group Mobility Models 8.4 Summary After examining the various mobility models, we have conducted a survey of the mobility modeling and analysis techniques systematically. In this chapter, a detailed discussion and study have been conducted not only for the random waypoint model and its variants, but also for several other mobility models with unique characteristics such as temporal dependency, spatial dependency, or geographic restriction. We believe that the set of mobility models considered here reasonably represent the state-of-the-art research and technology in this ield. After the detailed study of these mobility models, it can be observed 270 A D H O C M O BIL E WIREL E S S NE T W O RKS that the mobility models may have various properties and may exhibit diferent mobility features. Consequently, these mobility models may behave diferently and inluence the protocol performance in various ways. Hence, for proper evaluation of ad hoc protocol performance, it is necessary to use a rich set of mobility models instead of single the random waypoint model. Every model in the set has its own unique and speciic mobility characteristics. As a result, a proper method for correctly choosing a suitable set of mobility models is needed. he performance of an ad hoc network protocol can vary signiicantly under the inluence of diferent mobility models. Even under the same mobility model, the performance of an ad hoc network protocol can vary signiicantly when used with diferent parameters. he selection of a mobility model may require a data traic pattern that has signiicant efect on the protocol performance. For instance, when a group mobility model is simulated, then protocol evaluation should be carried out with a portion of the traic local to the group. Intra-group communication will have signiicant changes on a protocol’s performance, compared to the same mobility scenarios and all inter-group communication. For proper performance evaluation of an ad hoc network protocol we must use the mobility model that most closely matches the expected real-world scenario. In fact, the development of the ad hoc network protocol can be aided signiicantly by the anticipated realworld scenario. However, considering the development of ad hoc networks as a relatively new ield of research, it may be noted that it is still not clear what a realistic model is for a given scenario. Problems 8.1 8.2 8.3 8.4 8.5 8.6 Why are mobility models needed for a wireless environment? Give the classiication of mobility models. Justify the need for characterizations of mobility. Discuss the classiication of mobility patterns. Explain the column node model with a suitable example. Describe the random waypoint mobility model with an example. 8.7 What are the limitations of the random waypoint mobility model? M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 2 71 8.8 What are temporal dependency models? Explain. 8.9 Describe the Gauss–Markov mobility model with a neat diagram. 8.10 What are spatial dependency models? Explain with an example. 8.11 Explain the geographic restriction model with an illustration. References 1. Davies, V. 2000. Evaluating mobility models within an ad hoc network. Master’s thesis, Colorado School of Mines. 2. Tian, Hahner, Becker, et al. 3. Johansson, Larsson, Hedman, et al. 4. Jardosh, Belding-Royer, Almeroth, et al. Bibliography Aguayo, D., J. Bricket, S. Biswas, G. Judd, and R. Morris. 2004. Link-level measurements from an 802.11b mesh network. ACM SIGCOMM Computer Communication Review 34:121–132. Bar-Noy, A., I. Kessler, and M. Sidi. 1994. Mobile users: To update or not to update? Proceedings of the Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 570–576. Basagni, S., I. Chlamtac, V. R. Syrotiuk, and B.A. Woodward. 1998. A distance routing efect algorithm for mobility (DREAM). Proceedings of the ACM/ IEEE International Conference on Mobile Computing and Networking (MOBICOM), pp. 76–84. Bettstetter, C., G. Resta, and P. Santi. 2003. he node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing 2 (3): 257–269. Boleng, J. 2001. Normalizing mobility characteristics and enabling adaptive protocols for ad hoc networks. Proceedings of the Local and Metropolitan Area Networks Workshop (LANMAN), pp. 9–12. Broch, J., D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva. 1998. Multi-hop wireless ad hoc network routing protocols. Proceedings of the ACM/ IEEE International Conference on Mobile Computing and Networking (MOBICOM), pp. 85–97. Camp, T., J. Boleng, and V. Davies. 2002. A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing (WCMC): Special issue on mobile ad hoc networking: research, trends and applications 2:483–502. 272 A D H O C M O BIL E WIREL E S S NE T W O RKS Camp, T., J. Boleng, B. Williams, L. Wilcox, and W. Navidi. 2002. Performance evaluation of two location based routing protocols. Proceedings of the Joint Conference of the IEEE Computer and Communications Societies (INFOCOM) 3:1678–1687. Chiang, C. 1998. Wireless network multicasting. PhD thesis, University of California, Los Angeles. Chiang, C., and M. Gerla. 1998. On-demand multicast in mobile wireless networks. Proceedings of the IEEE International Conference on Network Protocols (ICNP), pp. 262–270. Fitzek, F., L. Badia, M. Zorzi, G. Schulte, P. Seeling, and T. Henderson. 2003. Mobility and stability evaluation in wireless multihop networks using multiplayer games. ACM NETGAMES ’03, Redwood City, CA. Garcia-Luna-Aceves, J. J., and E. L. Madrga. 1999. A multicast routing protocol for ad-hoc networks. Proceedings of the Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 784–792. Garcia-Luna-Aceves, J. J., and M. Spohn. 1999. Source-tree routing in wireless networks. Proceedings of the 7th International Conference on Network Protocols (ICNP), pp. 273–282. Gerharz, M., C. de Waal, M. Frank, and P. Martini. 2002. Link stability in mobile wireless ad hoc networks. Proceedings of the IEEE Conference on Local Computer Networks (LCN), Tampa, FL, pp. 230–239. Haas, Z. 1997. A new routing protocol for reconigurable wireless networks. Proceedings of the IEEE International Conference on Universal Personal Communications (ICUPC), pp. 562–565. Hong, X., M. Gerla, G. Pei, and C.-C. Chiang. 1999. A group mobility model for ad hoc wireless networks. Proceedings of ACM/IEEE MSWiM’99, Seattle, WA, pp. 53–60. Hui, P., A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. 2005. Pocket switched networks and human mobility in conference environments. Proceedings of the ACM SIGCOMM 2005 Workshop on Delay-Tolerant Networking (WDTN), Philadelphia, PA, pp. 244–251. IETF Mobile Ad Hoc Networking (MANET) Working Group. 2004. http:// www.ietf.org/html.charters/manet-charter.html. Jetcheva, J. G., Y.-C. Hu, S. PalChaudhuri, A. K. Saha, and D. B. Johnson. 2003. Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Pittsburgh, PA, pp. 32–43. Johnson, D. B., D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva. 2002. he dynamic source routing protocol for mobile ad hoc networks (DSR). Kotz, D., and K. Essien. 2005. Analysis of a campus-wide wireless network. Wireless Networks 11:115–133. Lenders, V., J. Wagner, and M. May. 2006. Measurements from an 802.11b mobile ad hoc network. Proceedings of the IEEE WoWMoM workshop on advanced experimental activities on wireless networks and systems (EXPONWIRELESS), Niagara-Falls/Bufalo, NY, pp. 519–524. M O BILIT Y M O D EL S F O R MULTIH O P WIREL E S S 2 73 McDonald, A. B., and T. Znati. 1999. A path availability model for wireless ad hoc networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) 1:35–40. McNett, M., and G. M. Voelker. 2005. Access and mobility of wireless PDA users. ACM SIGMOBILE Mobile Computing and Communications Review 9:40–55. Petrak, L., O. Landsiedel, and K. Wehrle. 2005. Framework for evaluation of networked mobile games. NetGames ’05, Hawthorne, New York, pp. 1–7. Sadagopan, N., F. Bai, B. Krishnamachari, and A. Helmy. 2003. PATHS: Analysis of PATH duration statistics and their impact on reactive MANET routing protocols. Proceedings of the Fourth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Annapolis, MD, pp. 245–256. Su, J., A. Chin, A. Popivanova, A. Goel, and E. de Lara. 2004. User mobility for opportunistic ad hoc networking. Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), English Lake District, UK, pp. 41–50. Tuduce, C., and T. Gross. 2005. A mobility model based on WLAN traces and its validation. Proceedings of INFOCOM, Miami, FL, 1:664–674. 9 C ROS S -L AYER D ESIG N I S SUES 9.1 Introduction As wireless communications and networking fast occupy center stage in research and development activity in the area of communication networks, the suitability of one of the foundations of networking—the layered protocol architecture—is coming under close scrutiny from the research community. It is repeatedly argued that although layered architectures have served well for wired networks, they are not suitable for wireless networks. To illustrate this point, researchers usually present what they call a cross-layer design proposal. Due to lack of coordination among the layers, the performance of layered architecture posed peculiar challenges in the area of ad hoc wireless networks. To overcome the limitations of layered architecture, cross-layer design was proposed; the idea here is to maintain the functionalities associated with the original layers but to allow coordination, interaction, and joint optimization of protocols crossing different layers. Compared to strict layered architecture, performance of cross-layer architecture is better with reference to protocol design done by dependency between protocol layers. Unlike layering, protocols at the diferent layers are designed independently because of several analyses of cross-layer design. From a literature survey of many IEEE papers, we came to know that there are many cross-layer design proposals that are weak in performance and implementation. 9.2 A Definition of Cross-Layer Design he open system interconnection (OSI) model is a seven-layered architecture recommended by the International Standards Organization 275 276 A D H O C M O BIL E WIREL E S S NE T W O RKS (ISO). It divides the overall networking task into layers and introduces a hierarchy of services to be provided by the individual layers. Each layer is associated with certain set of protocols providing communication among the corresponding layer between the computers and forbids direct communication between nonadjacent layers. In layered architecture, protocols are designed with respect to the rules of reference architecture, this means that the higher layer protocol only makes use of the services at the lower layers and is not concerned about the details of how the services are provided. Instead, protocols can be designed by violating the rules of reference architecture of OSI by allowing direct communication between protocols at nonadjacent layers. Such violations of a layered architecture by communicating with nonadjacent layers are called cross-layer design. 9.3 Cross-Layer Design Principle Figure 9.1 shows the traditional OSI layered architecture, the major mechanism in the success of the Internet. he OSI model is organized and divided into layers; each layer is built on top of the one below, and each layer should fulill a limited and well deined purpose. Each Application Application Presentation Presentation Session Session Transport Transport Network Network Data Link Data Link Physical Physical Figure 9.1 The layered OSI architecture. C R O S S - L AY ER D E SI G N IS SUE S 277 lower layer provides services to the respective layers above and it encapsulates the data by providing an abstract interface for its services. his has led to rapid growth in the development of a number of applications that drive the Internet. he dynamic nature of wireless networks makes layered architecture sufers from suboptimality and inlexibility because each layer has insuicient information about the network. It does not allow sharing of information among the layers dynamically. In wireless networks, layers must coordinate and adapt to the changes. his is the motivation behind the cross-layer design in ad hoc wireless networks. 9.3.1 General Motivations for Cross-Layer Design As discussed in the previous section, the presence of wireless links in the existing network motivates designers to violate the layered architecture principles because of unique problems created by wireless links. In turn, a wireless medium needs some of the requirements for communication of those facilities not supported by layered architecture. For instance, multiple packet reception is made by the physical layer at the same time. Figure 9.2 shows a block diagram of a new cross-layer design framework with information exchange between the diferent layers. At the link layer (lower layer), adaptive modulations are used to maximize the link rates under varying channel conditions. his extends the achievable capacity region of the network. Each point of this region indicates a possible assignment of the diferent link capacities. Based on link-state information (service), the medium access control (MAC; immediate upper layer) selects one point of the capacity region by assigning time slots, codes, or frequency bands to each of the links. he MAC layer operates jointly with the network layer to determine the set of network lows that minimize congestion. Solutions for capacity assignments and network lows are exchanged iteratively between two middle layers that constitute the core of the cross-layer framework (network and MAC layer). At the transport layer, congestion control and retransmission of packets takes place. Finally, the application layer determines the most eicient encoding rate. 2 78 A D H O C M O BIL E WIREL E S S NE T W O RKS Secure Coding and Packetization Application Layer Throughput Congestion-distortion Optimized Scheduling Transport Layer Network Layer Packet deadlines Rate-distortion preamble Traffic flows Congestion-optimized Routing MAC Layer Capacity Assignment Link Layer Adaptive Modulation Link capacities Figure 9.2 Cross-layer design framework with information exchange between different layers. 9.4 Proposals Involving Cross-Layer Design In this section we will study diferent architecture violations in order to improve the performance of the network in the cross-layer design. Following are the basic ways of violating the layered architecture: • • • • Creation of new interfaces Merging of adjacent layers Design coupling without new interfaces Vertical calibration across layers 9.4.1 Creation of New Communication Interfaces Communication interfaces deine the way that service primitives of a protocol provide services to its upper layer and use services from its lower layers. he interfaces are also called service access points (SAPs). he newly created communication interfaces are used for information sharing between the layers at runtime. Creation of new communication interfaces is a violation of layered architecture because this type of information sharing is not supported by layered architecture. 2 79 C R O S S - L AY ER D E SI G N IS SUE S Depending on the direction of information low, this category can be further divided into three subcategories: • Upward information low • Downward information low • Back and forth information low In the upward information low, the low of information from the lower layer to a higher layer protocol at runtime results in the creation of a new SAP from lower to higher layer, as shown in Figure. 9.3(a). For instance, if the endto-end transmission control protocol (TCP) path contains a wireless link, errors on the wireless link can trick the TCP sender into making erroneous inferences about the loss of a packet in the network, and as a result the performance deteriorates. Creating interfaces from the lower layers to the transport layer to enable explicit notiications helps such situations. For example, the loss of packet information from the TCP receiver to the transport layer at the TCP sender can explicitly tell the TCP sender to retransmit the packets if there is a loss of packets in the network. 9.4.1.1 Upward Information Flow Designed layer Interface for explicit notification from a lower layer to higher layer. Interface to set a lower layer parameter. Upward information flow.  Fixed layer Super layer Downward information flow. Back-and-forth information flow. Merging of adjacent layers. B C D Design coupling without new interfaces. The designed layer’s design is done keeping in mind the processing at the fixed layer, but no new interface is created. E Vertical calibration. F Figure 9.3 Illustrating the different kinds of cross-layer design proposals. The rectangular boxes represent the protocol layers 280 A D H O C M O BIL E WIREL E S S NE T W O RKS In the downward information low, low of information from the higher layer to the lower layer protocol at runtime results in the creation of a new SAP from higher to lower layer, as shown in Figure. 9.3(b). Here, the purpose is to provide hints to the lower layers about how the higher layer data processed. 9.4.1.2 Downward Information Flow Here, two layers are involved at the same time to perform diferent tasks. At runtime this is an iterative loop between the two layers, with the information lowing back and forth, as shown in Figure 9.3(c). Because of the complementary new interfaces, this clearly violates the layered architecture. 9.4.1.3 Back and Forth Information Flow 9.4.2 Merging of Adjacent Layers Another category of cross-layer design is merging of adjacent layers. In this category, merging of services provided by the essential layers is called a superlayer. his design does not require any creation of new communication interfaces. he created superlayer can communicate with the rest of the stack using interfaces that were already in the original layered architecture. his category involves the coupling of two or more layers without creating any extra new interfaces at runtime. his category is illustrated in Figure 9.3(e). it is not possible to replace one layer without making corresponding changes to another layer. 9.4.2.1 Design Coupling without New Interfaces In this category, as the name suggests, the parameter that spans across layers at runtime is adjusted, as illustrated in Figure 9.3(f). Performance of application layers depends upon the involvement of various parameters on the layers below it. herefore, it is believed that joint tuning can help to achieve better performance than the individual layer parameters. Parameters (as would happen had the protocols been designed independently) can achieve. 9.4.2.2 Vertical Calibration across Layers 2 81 C R O S S - L AY ER D E SI G N IS SUE S 9.5 Proposals for Implementing Cross-Layer Interactions Depending on cross-layer interaction, implementation can be divided into three categories: • Direct communication between layers • A shared database across layers • Completely new abstractions 9.5.1 Direct Communication between Layers As the name suggests, runtime information sharing allows layers to communicate directly with each other, as shown in Figure 9.4(a). Here, communication is transparent; this means making the variables at one layer visible to the other layer at runtime. Here, there are many ways in which the layers can communicate with one another via protocol header or extra information header. 9.5.2 A Shared Database across Layers As the name suggests, in this category a common database is available that can be accessed by all the layers, as illustrated in Figure 9.4(b). he common database is like a new layer providing the service of storage/retrieval of information to/from all the layers. his category is well suited to vertical calibration as discussed in earlier section. he main challenge in this category is to design new interactions between the diferent layers and a common database. A shared database žŸ interface Direct communication between the different layers A A shared database New abstractions Completely new abstractions (no more protocol layers) B Figure 9.4 Proposals for architectural blueprints for wireless communications. C 282 A D H O C M O BIL E WIREL E S S NE T W O RKS 9.5.3 Completely New Abstractions As this category suggests, this is a completely new abstraction with no more protocol layers, which we depict schematically in Figure 9.4(c). his category ofers lexibility during design as well as at runtime due to rich interactions between protocols. 9.6 Cross-Layer Design: Is It Worth Applying It? As discussed in earlier sections, layered architecture is not supportive and lexible in data sharing among layers for the dynamic nature of nodes in wireless networks. In order to overcome these limitations, here we discuss why cross-layer design should be approached in a careful manner. Although the layered architecture may not be optimal in the theoretical sense, the performance enhancement that it guarantees is the longevity of the system and low implementation costs. Examples of such layered architecture are found in the following subsections. 9.6.1 he von Neumann Architecture he von Neumann architecture (Figure 9.5) is the heart of most computer systems. It includes the independent functional units: the memory unit, control unit, arithmetic and logical unit, and input–output unit. he architecture makes it possible that hardware and software for the computer systems may be developed independently. his is one of the major reasons behind the rapid proliferation of computer systems. CPU ¡¢£¤¥-O ¤¥£¤¥ Memory Control Unit Arithmetic and Logical Unit Figure 9.5 The von Neumann architecture for computer systems. 283 C R O S S - L AY ER D E SI G N IS SUE S 9.6.2 Source-Channel Separation and Digital System Architecture In his seminal work on information theory, Shannon proved that the layers of source compression (source coding) and coding for reliable transmission over wireless channel (channel coding) may be implemented separately and independently. his implied that each new source of information (and the associated source encoder/decoder) may simply reuse the existing channel encoders/decoders, thus simplifying the implementation. In the same way, new (more eicient) channel encoders/decoders may be designed without worrying about the sources that would be using the channel. his architecture has fueled rapid development and proliferation of digital communication systems (Figure 9.6). 9.6.3 he OSI Architecture for Networking he OSI architecture (Figure 9.1) and its impact on development and proliferation of computer networks have been suiciently discussed in this chapter. he historical evidence thus seems to support layered design architectures. We now discuss some of the possible technical and economic disadvantages of cross-layer design. 9.7 Pitfalls of the Cross-Layer Design Approach 9.7.1 Cost of Development Source-coder (compression) Channel-coder (error protection) Channel he main aim of the cross-layer design is that it should be lexible according to the network state such that it optimizes the performance of applications. If the demands of two applications or environments of two instances of wireless network are radically diferent, then each of them would require a separate set of protocols. hus, the crosslayers would have to be handcrafted for each application and network scenario. Channeldecoder Source-decoder (decompression) Figure 9.6 Source-channel separation and the architecture of digital communication systems. 28 4 A D H O C M O BIL E WIREL E S S NE T W O RKS For example, consider two networks, N1 and N2. Suppose that in N1 the nodes are battery operated, while in N2 the nodes have an ininite source of power (e.g., connected to an electrical socket or operated on solar power). herefore, in N1 one of the objectives of the optimization would be to consume minimum energy, while in N2 this would not be valid. Although the protocol set of N1 would work ine in N2 also, this again would lead to suboptimal performance in N2, to counter which the cross-layer design was developed in the irst place. hus, handcrafting of protocols for each application and network would lead to high deployment costs and delays. 9.7.2 Performance versus Longevity he most popular argument in favor of sharing information among layers is that it leads to optimal performance. However, such a gain in performance is of a short-sighted nature because the technologies at each layer change rapidly. hus, every change of technology, the nature of information that is shared, and the actions that are taken would need to be changed. his is against the principle of longevity, which is considered an essential feature of any design. If we include the weight of longevity and cost while evaluating the overall performance of architecture, then the layered architecture may as well outperform the architectures that makes aggressive use of the cross-layer approach. 9.7.3 Interaction and Unintended Consequences he layered architecture allows limited and controlled interactions between the layers such that the job of designing or modifying a protocol at any level is simpliied. A cross-layered approach leads to many dependencies between various layers. he designer of a new protocol in a cross-layer system has to understand and take into account the interaction of various layers. In spite of a good understanding, a new protocol may lead to unintended consequences due to the presence of multiple adaptation loops. Such interactions need to be studied using dependency graphs. hus, design of a protocol in a cross-layered stack is much more challenging than the task of designing such a protocol in a layered stack. C R O S S - L AY ER D E SI G N IS SUE S 285 9.7.4 Stability As already mentioned, a cross-layer design leads to several adaptation loops. he complex interaction of these loops may endanger the stability of the system. Although cross-layer design ofers tremendous opportunities, at the same time it has several critical disadvantages that may hinder the proliferation of wireless networks. he crosslayer approach should thus be used with caution. Much functionality, like transmit power control and channel state estimation, is typical of wireless networks and requires a cross-layer approach. In cases where the cross-layer design is necessary, it should be ensured that the implementation is not very aggressive (i.e., does not rely too much on information exchanged among several layers). he placement of functions and the nature of the information exchanged between the layers must be kept to a minimum and must be critically analyzed. 9.8 Performance Objectives In the case of wireless ad hoc networks, performance objectives can be divided into two categories: • Power-based performance objectives that maximize network lifetime. A typical example is a sensor network. he traic requirement is low, and the main goal is to maintain a network in operation as long as possible. • Rate-based performance objectives. For these, the goal is to maximize low rates. Typical examples are wireless LANs, networks of computer peripherals, or home appliances. Here, we considered the wireless networks with best-efort trafic, focused on rate-based performance metrics, and analyzed the well-known rate-based performance metrics originally deined in the wired networking context: rate maximization, proportional fairness and max–min fairness, and some of their modiications. he three most frequently used design objectives for wireless networks are maximizing total capacity, max–min fairness, and utility fairness. 286 A D H O C M O BIL E WIREL E S S NE T W O RKS 9.8.1 Maximizing Total Capacity In designing a cellular system for mobile computing, maximum total capacity was traditionally used as the performance objective. In order to maximize the total capacity of a node, irst the best channel conditions in a given slot should send the data. Nodes that are further away will less frequently satisfy this constraint, but will still have a very good and positive throughput due to the random part of fading. However, if a node is very far away from the base station, its average rate will be very small and essentially it will not be able to communicate. A solution is found by assigning weights to each node rate such that a level of fairness is assured. he implicit assumption in this type of network is that an area with mobile nodes is well covered with base stations, so there is not a great variation in distances from the mobile nodes to the closest base stations. A similar direction was taken for high date rate (HDR) and code division multiple access (CDMA) networks. In the case of multihop wireless networks, the concept of assigning weights will not work because a node does not communicate with the closest base station but to an arbitrary destination in the network. A famous rate-based metric, based on the weighted sum of rates and used in multihop wireless settings, is a remedy for this type of problem. 9.8.2 Max–Min Fairness Max–min fair rate allocation is deined to be the low rate allocation in which every low has a bottleneck link. his rate allocation can be obtained using the well-known water-illing algorithm. However, it is not always obvious how to generalize the notion of a bottleneck link and the water-illing approach to an arbitrary problem. A simple example is a wireless ad hoc network. Even if every low has a bottleneck link, the allocation may not be max–min fair. In particular, by decreasing the transmit power of some links, one can decrease the interference on the receiver of one of the bottleneck links and thus increase the link’s rate. his way, a low will loosen its bottleneck, and one might be able to increase its rate. It is diicult to deine the concepts of a bottleneck link and of the water illing in the given 287 C R O S S - L AY ER D E SI G N IS SUE S example; furthermore, it is not obvious if the max–min fair rate allocation can be deined at all in this. 9.8.3 Utility Fairness Utility fairness is a diferent approach to fairness in wired networking. Every user is assigned a utility that is a function of its rate. he goal of a network is to maximize the sum of utilities of all users to improve network performance. By selecting utility functions, a designer can achieve diferent trade-ofs between eiciency and fairness. It can also be shown that TCP implements a form of utility fairness. Variants of utility fairness are used in existing wireless multihop network protocols. 9.9 Cross-Layer Protocols SI CROSS-LAYER FOCUS OF THE REFERRED CURRENT NO. PROTOCOL PROTOCOL ALGORITHMS ALGORITHMS A cross-layer A novel cross-layer 1 Single-tree algorithm Multiple-tree LIMITATIONS OF SIMULATOR Ns-2.2 algorithm PROTOCOL Investigate optimization optimization approach approach for that assumes a very different multiple tree construction efficient data simple MAC protocol algorithms gathering in and makes use of both wireless routing MAC layers sensor network information to reduce (WSN) congestion, improve delivery ratio, and optimize energy 2 A cross-layer Reduce the time spent on S-MAC approach for data moving (i.e., nodal D-MAC DCF CL-MAC design approach energy-efficient processing time drops T-MAC (cross-layer will be promising MAC layer in dramatically and thus MAC protocol) for MAC layer WSN energy consumption is design. For further reduced accordingly) research, more Energy efficiency, thorough scalability, adaptability simulation, and to changes of network theoretical topology, collision analysis should avoidance, channel conducted. utilization, latency, throughput, and fairness IEEE 802.11 OPNET This cross-layer 288 A D H O C M O BIL E WIREL E S S NE T W O RKS SI CROSS-LAYER FOCUS OF THE REFERRED CURRENT NO. PROTOCOL PROTOCOL ALGORITHMS ALGORITHMS 3 Cross-layer Focus on reducing the Maximum Extended LIMITATIONS OF SIMULATOR TinyOS PROTOCOL Future sensors protocols for energy loss due to idle throughput power-aware should be able to energy- listening, control algorithm routing increase their efficient WSN signaling congestion Maximum scheduling operational hot spots, packet lifetime algorithm lifetime collision, and conserve algorithm (EPARS) substantially the battery power before requiring maintenance. 4 Cross-layer Focus on reducing power Dynamic source Cross-layer energy- consumption in WSN energy- this approach efficient due to collision, efficient when the node is routing overhearing control routing mobile and talk (XLE2R) for packet overhead, and (XLE2R) about packet loss. prolonged ideal listening and over lifetime of emitting routing (DSR) OPNET Intend to implement WSN 5 Multicast *Instead of using dynamic Maximum Maximum lifetime routing and changing lifetime lifetime maximization paths during lifetime of multicast multicast using network the network, we problem problem with coding: a investigate the (MLMP) rate control cross-layer scenarios in which the approach source communication (MLMPRC) with the destinations, using all feasible paths in static scheme. Maximize the lifetime of energy-constrained wireless ad hoc for multicast application using network coding 6 A cross-layer Power control link layer E-AODV ER-AODV NS-2.33 R-AODV and routing protocol in energy- network layer to and more layer interaction for efficient maximize the network routing protocol routing in lifetime design mobile ad hoc networks 7 Mobility parameter approach for Cross-layer For successful delivery of PPM Numerical energy all data generated by FSK results efficiency source nodes to the sink analysis and node with minimal optimization in energy consumption WSN using PPM and FSK 289 C R O S S - L AY ER D E SI G N IS SUE S SI CROSS-LAYER FOCUS OF THE REFERRED CURRENT NO. PROTOCOL PROTOCOL ALGORITHMS ALGORITHMS 8 An Average the energy energy- consumed by the nodes efficient closer to the base cross-layer station, taking a cluster clustering scheme that the cluster scheme for head nodes could be WSN chosen based on the LIMITATIONS OF SIMULATOR AODV Cluster scheme NS-2 Minimum QoS PROTOCOL residual energy 9 Cross-layer Adaptive routing metric design for that helps in minimizing cumulative energy-aware QoS-aware the energy consumption energy routing routing energy- as well as meeting the efficient data real-time deadlines of reporting in the application NS-2 WSN 10 An The distributive feature of BMA energy- proposed MAC protocol efficient MAC is that it assigns a time E-TDMA protocol for slot to only one of the cluster-based source nodes all with event-driven the same data sensed WSN and to be sent. Thus, it application reduces data EA-TDMA TDMA Analytical expression transmission redundancy and achieves energy savings. 11 Review of the In-depth analysis of 1. Difficulties in cross-layer design cross-layer difficulties in 2. Categorization of cross-layer approach design in cross-layer design and 3. Layer trigger scheme with strict layering wireless ad the latest cross-layer 4. Joint optimization schemes cooperated b/w multiple layers hoc and approach for wireless 5. Full cross-layer design sharing the overall network status sensor network ad hoc and sensor network 12 Energy-efficient, Feedback mechanism of reliable communication control cross-layer packets in MAC layer to optimization address the issue of routing energy efficiency and protocol for reliability while WSN designing a tree-based energy-efficient routing algorithm to extend the network lifetime T-MAC EERCP NS-2 290 A D H O C M O BIL E WIREL E S S NE T W O RKS SI CROSS-LAYER FOCUS OF THE REFERRED CURRENT NO. PROTOCOL PROTOCOL ALGORITHMS ALGORITHMS 13 Self-optimized Energy level and velocity ACO autonomous metrics are trade-in IAR testing of a given routing from physical layer to ADR self-organized protocol for network layer while SC protocol in the real WSNs with discovering an optimal cross-layer route and also in architecture initialization process BIOSARP LIMITATIONS OF SIMULATOR NS-2 PROTOCOL The building and WSN test bed Problems 9.1 Deine a cross layer. 9.2 Explain the cross-layer design principle along with general motivations for cross-layer design. 9.3 Describe the proposals involving cross-layer design for ad hoc networks. 9.4 Explain proposals for implementing cross-layer interactions. 9.5 Discuss the fundamental advantages ofered by a layered architecture. 9.6 Explain some of the standard layered architectures with an example. 9.7 How is a performance objective met while designing a layered architecture? 9.8 Discuss the pitfalls of the cross-layer design approach. 9.9 Discuss some of the cross-layer protocols. Bibliography Boström, K. 2000. Shannon’s Source Coding heorem. 14469. Institute for Physics. University of Potsdam. Potsdam, Germany. Canli, T., F. Nait-Abdesselam, and A. Khokhar. 2008. A cross-layer optimization approach for eicient data gathering in wireless sensor networks. Networking and Communications Conference, INCC2008. IEEE International, pp. 101–106. DeCleene, B., V. Firoiu, M. Dorsch, and S. Zabele. 2005. Cross-layer protocols for energy-eicient wireless sensor networking. Military Communications Conference, MILCOM 2005. IEEE, 3:1477–1484. De Couto, D. et al. 2003. A high-throughput path metric for multi-hop wireless routing. Proceedings of MOBICOM. C R O S S - L AY ER D E SI G N IS SUE S 2 91 Dong, L., X. Wang, and S. Li. 2010. An energy eicient cross-layer clustering scheme for wireless sensor network. Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference, pp. 1–5. Fang, Y., and A. B. McDonald. 2002. Cross-layer performance efects of path coupling in wireless ad hoc networks: Power and throughput implications of IEEE 802.11 MAC. Proceedings of IEEE International Performance, Computing, and Communications Conference, pp. 281–290. Jarquin, O. S. 2004. Multi-hop radio networks in rough terrain: Some traicsensitive MAC algorithms. In Energy-eicient link assessment in wireless sensor networks, Proceedings InfoCom, 2004, ed. Keshavarzian et al. Kawadia, V., and R. Kumar. 2005. A cautionary perspective on cross-layer design. IEEE Wireless Communications 12:3–11. Khan, Z. A., M. Auguin, and C. Belleudy. 2010. Cross-layer design for QoS aware energy eicient data reporting in WSN. Wireless Communication Systems (ISWCS), 2010 7th International Symposium, pp. 526–530. Li, J. et al. 2003. Performance evaluation of modiied IEEE 802.11 MAC for multi-channel multihop ad hoc networks. Journal of Interconnection Networks 4 (30): 345–359. Liang, Y. 2010. Energy-eicient, reliable cross-layer optimization routing protocol for wireless sensor network. Intelligent Control and Information Processing (ICICIP), 2010 International Conference, pp. 493–496. Nilsson, A. 2004. Performance analysis of traic load and node density in ad hoc networks. Proceedings European Wireless, 2004. Raisinghani, W. T. et al. 2002. Improving TCP performance over mobile wireless environments using cross-layer feedback. Proceedings IEEE International Conference on Personal Wireless Communications, pp. 81–85. Raman, B. et al. 2001. Arguments for cross-layer optimizations in Bluetooth scatternets. Proceedings Symposium on Applications and the Internet, pp. 176–184. Ren, X., and J. Zhang. 2010. Review of the cross-layer design in wireless ad hoc and sensor networks. Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference, pp. 1–3. Shakkottai, S. et al. 2003. Cross-layer design for wireless networks. IEEE Communications 41:74–80. Srivastava, V., and M. Motani. 2005. Cross-layer design: A survey and the road ahead. IEEE Communications Magazine 43:112–119. Tang, Q., C. Sun, W. Huan, and Liang,Y. 2010. Cross-layer energy eiciency analysis and optimization in WSN. Networking, Sensing and Control (ICNSC), 2010 International Conference, pp. 138–142. Toumpis, S., and A. J. Goldsmith. 2003. Performance, optimization, and crosslayer design of media access protocols for wireless ad hoc networks. Proceedings IEEE ICC, 2003. Yu, X. 2004. Improving TCP performance over mobile ad hoc networks by exploiting cross-layer information awareness. Proceedings MobiCom, 2004. 292 A D H O C M O BIL E WIREL E S S NE T W O RKS Yu, Y. 2008. A cross-layer approach for energy eicient MAC layer in wireless sensor networks. Wireless Communications, Networking and Mobile Computing, 2008. WiCOM ’08. 4th International Conference, pp. 1–3. Yuen, W. et al. 2002. A simple but efective cross-layer networking system for mobile ad hoc networks. Proceedings IEEE PIMRC, 2002. Zuniga, M., and B. Krishnamachari. 2004. Analyzing the transitional region in low power wireless links. Proceedings SECON, 2004. 10 A PPLI CATIONS AND R ECENT D E V ELO PMENTS 10.1 Introduction Wireless ad hoc networking has achieved signiicant growth in the current decade. Due to the increased use of the Internet in our daily lives and the success of second-generation cellular systems, mobile wireless data communication have advanced both in terms of technology and usage/penetration. his has attracted the attention of the research communities toward truly ubiquitous computing and communication. As a complement to traditional large-scale communication, the demand for short-range data transactions is increasing fast as most man–machine communication as well as oral communication between human beings occurs at distances of less than 10 meters. his requires the exchange of huge volumes of data between the communicating parties. Wireless communication can be deployed quickly and at highly reduced cost with the introduction of developing radio technologies (such as Bluetooth) that use license-exempted frequency bands. Many computing and communication devices, such as personal digital assistants (PDAs) and mobile phones, have gained immense popularity due to their decreasing price, portability, and usability in the context of an ad hoc network. With the continuous advancement of technology, these devices will become cheaper and highly feature rich. Ad hoc wireless networks are self-conigurable communication networks in which the nodes move frequently, and they do not rely on any ixed infrastructure for communication between them. he network topology changes frequently due to the highly dynamic nature of the nodes. Due to the limited range of transmission, the mobile devices in such networks act as the host as well as the router. When the destination is outside the direct transmission range of the source, 293 294 A D H O C M O BIL E WIREL E S S NE T W O RKS the source node needs the help of the intermediate nodes for forwarding data to the destination. hese networks have dynamic topology, bandwidth-constrained variable capacity wireless links, energy-constrained devices, and limited physical security. Due to the ad hoc nature of these networks, they are highly useful for commercial and military applications. Also, because of infrastructure-less operation, these networks are particularly useful for providing communication support where no communication infrastructure exists or the previous infrastructure has been totally destroyed and establishing a new infrastructure is not possible. hey are especially useful in emergency situations, healthcare, home networking, and disaster recovery operations. With the growing need of speedy and reliable access to the information, communication networks are playing a major role in our society. Due to the recent technological advancements in information technology and easy availability of cheap mobile communication devices, the use of wireless communication networks has increased rapidly. his has caused tremendous growth of wireless networks and development of new applications for various wireless network scenarios. he development of mobile ad hoc wireless networks has resulted from the huge demand of anytime/anywhere access to information. Wireless ad hoc networks are essentially communication networks. hese networks play a vital role in emergency scenarios such as disaster situations like earthquakes, looding, etc., where the ixed network is destroyed and it is not possible to establish a new network quickly. As a result, rescue teams need to coordinate operations without the availability of ixed networks; mobile ad hoc networks are aptly suitable for such situations. Similarly, mobile ad hoc networks are highly essential for military operations where communication occurs in a hostile environment. Due to the limited range of transmission of the mobile nodes, they need to act as the host as well as the router. In cases when the nodes are within their direct transmission range, they can communicate directly. But when the destination is outside the direct transmission range of the source, the source node has to receive help from the intermediate nodes in order to forward the packet to the destination. For providing such multihop routing capability to the nodes, some form of routing protocol, which can address a diverse range of issues such as low bandwidth, mobility, and low power consumption, is necessary A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 295 in ad hoc networks. Due to the constant movement of the nodes, the mobile nodes in an ad hoc wireless network may move away from each other such that they are not able to maintain communication with others. In such a situation, an ad hoc network may be partitioned into two or more independent ad hoc networks. On the other hand, sometimes the mobile devices in two or more ad hoc networks may be in close proximity of each other and thus these networks may be combined into one larger ad hoc network. It becomes a huge challenge to manage such a highly dynamic networking environment. In the ield of mobile ad hoc networking, sensor networks have become hugely popular. he size of the mobile devices is very small in these sensor networks. hese devices can be as small as the size of a grain of rice and are self-suicient in all respects—transmitting, receiving, processing, and power. hese sensors can be programmed according to the need of any given application. his chapter discusses opportunities and challenges faced in development of ad hoc wireless networks. he next section discusses applications and opportunities that ad hoc wireless networks provide along with the challenges that they face. 10.2 Typical Applications Commercial ad hoc networks are highly essential in situations where no infrastructure (ixed or cellular) is available. Examples include rescue operations in remote areas in cases of natural disasters, or when local coverage must be deployed quickly at a remote construction site. Ad hoc networking could also serve as wireless public access in urban areas, due to its quick deployment and self-organizing feature. At the local level, participants at a conference can form an ad hoc network that links their notebooks or palmtop computers for sharing information. Ad hoc networks can also be appropriate for applications in home networks, where devices can communicate directly to exchange information, such as audio/video, alarms, and coniguration updates. hese networks may also be useful for environmental monitoring, where the networks could be used to forecast water pollution or to provide early warning of an approaching tsunami. A personal area network (PAN) can be constructed to simplify intercommunication between various mobile devices (such as a cellular phone 296 A D H O C M O BIL E WIREL E S S NE T W O RKS and a PDA) and thereby eliminate the tedious need for cables. his can also extend the mobility provided by the ixed network (that is, mobile Internet protocol [IP]) to widen the coverage of ad hoc network domain. 10.2.1 PAN A personal area network is a computer network established around an individual person. hese networks typically involve a mobile computer, a cell phone, and/or a handheld computing device such as a PDA. A person who has access to a Bluetooth PAN can use the GPRS/ UMTS mobile phone as a gateway to the Internet or to a corporate IP network, thus satisfying the need for anytime/anywhere access to the information while on the move. In addition, Bluetooth PANs can be interconnected with scatternets, thereby increasing the capacity. Figure 10.1 shows a scenario in which four Bluetooth PANs are used. A PAN can encompass several diferent access technologies distributed among its member devices, which exploit the ad hoc functionality in the PAN. For instance, a notebook computer can have a wireless LAN (WLAN) interface (such as IEEE 802.11 or HiperLAN/2) that provides network access when the computer is used indoors. hus, the PAN would beneit from the various access technologies residing in the member devices. With the maturity of the PAN concept, new devices and new access technologies can be incorporated into the PAN framework. It LAN Router Internet ª« ¬ª«­ª«®¯° IP network Router ¦§¨© Figure 10.1 PAN scenario with four interconnected PANs, two of which have an Internet connection via a Bluetooth LAN access point and a GPRS/UMTS phone. A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 297 will also eliminate the need to create hybrid devices, such as a PDA– mobile phone combination, because the PAN network will instead implement wireless integration. In this way, the short-range communication networks such as Bluetooth will play a major role in introducing the lexibility represented by the PAN concept. 10.3 Applications and Opportunities Ad hoc wireless networks are extremely useful for situations when there is a need for establishing a networking environment for a short time duration. hese networks ofer tremendous opportunities and can be used in numerous areas, particularly where a communication infrastructure is not available or it is diicult to establish the ixed infrastructure quickly. Typically, such applications include: • • • • • • Academic applications Defense (army, navy, air force) applications Industrial/corporate environment applications Healthcare applications Search and rescue operations in disaster situations Vehicular ad hoc networks here are many other applications where ad hoc wireless networks can be utilized. 10.3.1 Academic Environment Applications Due to their ability to deploy easily and quickly, mobile ad hoc networks have become extremely popular within the academic community. Most academic institutions have installed wireless communication networks in their campuses so that both students and teachers can avail themselves of the beneits of the ad hoc networking environment. Due to the huge popularity of laptops, PDAs, smart phones, etc. among students, they can easily get connected to an existing ad hoc network or form a new ad hoc network quickly. Such an environment makes the interaction among the students and faculty very convenient. For instance, a teacher entering a class with his or her laptop can easily form an ad hoc wireless communication network with the students that have their own devices. As part 298 A D H O C M O BIL E WIREL E S S NE T W O RKS of the same ad hoc network, the teacher can easily share lecture notes and assignments with the students and the students can submit their assignments and send their queries to the teacher. Sharing information among the class participants can be as easy as a click of a key on the keyboard. Due to the inherent mobile nature of the nodes in a mobile ad hoc network, these networks can also be of immense use while on a ield trip and or industrial visit. Staying in touch cannot be any easier than this. Also, during conferences or workshops, the participants can form a temporary ad hoc network between them that will allow them to share their research materials, slides, etc. 10.3.2 Defense Applications Defense operations take place in inhospitable terrains where communication infrastructure is not available. Wireless ad hoc and sensor networks are of urgent necessity in such situations. Diferent units involved in defense operations also need to maintain communication with each other while they are on the move. For example, air force planes lying in a formation may establish a temporary ad hoc wireless network for communicating with each other and for sharing images and data among themselves. In battleield scenarios, army groups on the move can also use ad hoc wireless networks for communicating among themselves. A nice feature of such a communication environment is that the ad hoc network moves as the individuals move or the planes ly. Information gathering is a highly crucial application of ad hoc wireless (particularly sensor) networks in military operations. Sensor networks can be deployed for intelligence gathering for defense purposes and they prove to be extremely efective. he sensors used for such applications are essentially disposable and are used for an application once. hey can be deployed by air or by other appropriate means in large quantities over a selected area chosen for intelligence gathering. Because of their small size, these sensors will remain suspended in the air for some time. During that time, they can gather information according to their programmed logic, process the information, share among other nearby sensors, reach a consensus, and transmit information to a central server. he central processing facility can then A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 299 analyze the gathered information and a decision about the next step can be made based on the analysis. Due to the rapid advancements in semiconductor technologies, the size of the electronic devices is getting smaller. At the same time, these devices are equipped with higher and higher processing power on tiny chips. hese advancements have led to the development of wearable computers. he idea of wearable computers is not that new, but the idea of a smart dress (that consists of many tiny computers [or sensors]) is relatively recent. In a smart dress, tiny computers are connected by tiny wires or by wireless means. hey can exchange information with each other, process the gathered information, and take an appropriate action according to their program. A smart dress may be programmed to monitor certain conditions and vital signs of an individual on a regular basis. his could become very useful for defense personnel in combat situations. he monitored information can be processed and appropriate action can be taken by the dress, if needed. A smart dress may even be able to indicate the exact location of the problem and call for help if the seriousness of the situation warrants that. 10.3.3 Industrial Environment Applications In industrial environments, wireless ad hoc networks play a major role in establishing communication between the diferent devices as well as between the employees for proper coordination of project activities. hey are especially useful for manufacturing environments. he need for interconnection between various electronic devices requires the deployment of networking facilities between them. Connecting these large numbers of devices using wired connection leads to cluttering. Also, a huge amount of space is wasted. his not only creates safety hazards but also adversely afects reliability. hese problems can be eliminated with the use of wireless communication networks. he infrastructure-less mode of operation of the ad hoc networks helps to reduce the cost. Also, such networks can be established within a very short span of time. he support for mobility of the ad hoc mobile networks allows the devices to be relocated easily. Also, the dynamic nature of the networks allows easy reconiguration of the networks based on the requirements. Employees carrying 300 A D H O C M O BIL E WIREL E S S NE T W O RKS handheld computers, smart phones, etc. can easily and quickly form an ad hoc network among themselves that enables them to maintain proper communication and to work together without the need to get all the employees assembled in a meeting room. his ensures proper coordination among the diferent work units. 10.3.4 Healthcare Applications In critical and emergency scenarios, exchanging information between the patient and the healthcare facilities is very helpful. A healthcare professional, in many situations, will be able to diagnose properly and accordingly be able to prepare a better treatment plan for an individual if he or she has access to video information rather than just audio or textual information. For example, with the help of video information, a doctor may better assess the relexes and coordination capability of a patient. In a similar way, a doctor can judge properly the severity of the injuries of a patient by visual information rather than by just audio or other descriptive information. Real-time ultrasound scans of a patient’s kidneys, heart, or other organs may prove to be very helpful in preparing a proper treatment plan for a patient who is being transported to a hospital prior to his or her arrival there. Such information can be transmitted through wireless communication networks from an ambulance to other healthcare professionals who are currently scattered at diferent places but are converging toward the hospital for treating the patient being transported. he concept of smart dress can also be used for monitoring health conditions of patients. Such dresses may become very useful for providing healthcare for our elderly population. Sometimes an ad hoc wireless network can be established within a (smart) home equipped with various sensors. his may be very useful for careful monitoring of homebound patients. On the basis of the information exchanged between various sensors monitoring the patient, some basic decisions may be taken that may be highly beneicial to the elderly population. hese activities include recognizing falls of human beings, monitoring the movement patterns inside a home, and recognizing an unusual situation and informing a relevant agency in order to ensure appropriate and timely help, if needed. A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 3 01 10.3.5 Search and Rescue Applications Ad hoc wireless networks can prove to be of enormous use for search and rescue operations in cases of natural disasters such as an earthquake, hurricane, lood, etc. In general, disasters leave a large population without power and communication capabilities due to the destruction of the infrastructure. Ad hoc wireless networks can be deployed in such situations quickly without the help of any ixed infrastructures and can provide communications among various relief organizations for coordinating their rescue activities. Wireless sensor networks can be of immense use in conducting searches for survivors and providing care in a timely manner. Rescue operations also use robots in searching for survivors. Wireless ad hoc networks can be used to establish communication between these robots for coordinating their activities. Depending on the size of the area afected by a disaster, an appropriate number of robots can be deployed. An ad hoc network can be established between them for searching the area and for information gathering in the shortest possible time. he information thus collected can be analyzed and processed, and appropriate relief/help can accordingly be readily directed where essential. 10.3.6 Vehicular Ad Hoc Networks With the huge proliferation of wireless technologies, mobile ad hoc networks have found widespread applications in the automobile industry. Nowadays, cars are equipped with diferent kinds of sensors, microcomputers, and wireless devices. his allows the formation of a new kind of mobile ad hoc network between the nearby moving vehicles or between vehicles and the roadside infrastructure. hese networks are known as vehicular ad hoc networks. hese networks are self-organizing and multihop and enable the exchange of data between the users in nearby vehicles. With the help of these networks, intelligent transportation systems (ITSs) can be built that provide several beneits to users in terms of road safety, collision prevention, traic scenario monitoring, congestion avoidance, infotainment, etc. Vehicular ad hoc networks are characterized by the high mobility of the vehicles, resulting in frequent and dynamic changes in the network topology. Due to this highly dynamic scenario, 302 A D H O C M O BIL E WIREL E S S NE T W O RKS routing is considered a challenging task in vehicular ad hoc networks. Hence, the design of eicient routing protocols to suit the needs of these networks has become a key issue. 10.4 Challenges Although mobile ad hoc networks ofer signiicant advantages over wired networks, there are several challenges that need to be addressed properly for fully obtaining the beneits. he nodes in a mobile ad hoc network are constrained due to the following: • • • • • • Limited battery power and longevity Limited communication bandwidth and capacity Information security Size of the mobile devices Communication overhead Highly dynamic topology Mobile communication devices are restricted in terms of the amount of power available. Due to their frequent mobility patterns, they cannot be connected to a constant source of power. hese devices are powered by small batteries, which can supply only a limited amount of energy. As a result, the mobile devices need to minimize the power usage in order to increase their lifetime. his has attracted the attention of the research community and the industry to the design of devices that consume less power and can adjust the strength of communication signals based on the distance between communicating points. In addition, eicient signal processing techniques and algorithms are being developed that will reduce power usage signiicantly. Due to the limited capacity of the communication medium, wireless networks sufer from bandwidth problems. his restricts the amount of information to be transmitted over a particular time duration. Eicient and innovative transmission techniques need to be invented to utilize the available bandwidth efectively and to increase the capacity. he use of eicient transmission techniques, such as CDMA, and the structure of cellular communication mechanisms are very helpful in efectively using the available capacity. However, there is still the need of more research in this area to provide more eicient A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 303 mechanisms for better utilization of the available communication bandwidth in the wireless communication environment. Due to less security of the wireless communication medium, ad hoc wireless networks are more prone to security threats than their wired counterparts. Achieving the desired information security level requires additional processing overhead, which will be a major problem for the mobile nodes due to their limited processing power. It also requires additional bandwidth for secured transmission. A signiicant amount of research is already going on for discovering mechanisms for ensuring secure information transfer while at the same time not being prohibitive in terms of overhead. With the advancements in semiconductor technologies, higher numbers of electronic components can be placed on smaller chips, which has led to the development of mobile devices that are more powerful and less power consuming. Due to the limited capacity of the wireless medium, minimizing the communication overhead for information transfer in ad hoc wireless networks has become one of the biggest and most formidable challenges. In order to ensure proper delivery of information, a path needs to be established between the source and the destination. Moreover, a procedure that will ensure the sharing of a common pool of resources, such as bandwidth, has to be established. One of the biggest challenges for designing routing protocols for mobile ad hoc networks is to handle the highly dynamic topology of these networks. For a source node to send information to a destination node, the source must be able to ind the location of the destination node as well as other intermediate nodes. But due to their highly dynamic nature, the mobile devices change their locations frequently. As a result, a route that is established at the initial phase of the information transfer between two mobile devices may not be the same at the later phase of the information exchange. In order to adapt to this highly dynamic scenario, the routing protocols must be dynamic and adaptive in nature and the nodes must maintain up-to-date routing information all the time. he routing protocols for mobile ad hoc networks are basically of two types: proactive and reactive. In the case of a proactive approach, the nodes need to maintain up-to-date routing information to all the nodes all the time. his requires the nodes to exchange the routing information between them periodically. he advantage 304 A D H O C M O BIL E WIREL E S S NE T W O RKS of this approach is that the devices will always have routes available to other devices. Timely and periodic exchange of routing information will ensure the availability of fresh routes. Moreover, due to the immediate availability of the routes, no time will be wasted in setting up the path between the source and the destination devices. his ultimately reduces the delivery time of the information from the source to the destination device. he disadvantage of the proactive approach is the high overhead due to the periodic exchange of routing information between all the devices, even when all the routes may not be required. In the case of a reactive approach, the routes to the destination are determined on an on-demand basis. he advantage of this approach is that the overhead incurred will be reduced as only the routes that are needed will be discovered. here is no need of periodic information exchange between the devices. However, this approach will sufer from more waiting time because routes will not be immediately available. he initial path setup takes a signiicant amount of time and, during this time, no packet can be sent to the destination due to the unavailability of routes. In order to combine the advantages of these approaches, many hybrid routing mechanisms have been introduced. However, the problem of inding the shortest routes with minimum overhead remains an open challenge. 10.4.1 Security Security is a major area of concern for mobile ad hoc networks due to the limited physical security of the wireless medium. Although some work has been done on security for MANETs, the research on MANET security is still in its early stage. he existing security schemes in MANET are basically attack based. Certain frequent attacks on mobile ad hoc networks are identiied irst, and then security schemes are developed to prevent only these known attacks. But these networks operate in the real world. Such scenarios keep on changing and, as a result, attackers may develop new types of security attacks. Due to the changing pattern of these attacks, the existing security schemes fail to keep the security of the system intact. One feasible solution to this problem would be to develop a multifence security solution. his type of solution ofers protection against a A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 305 broader area of malicious activities. When embedded into possibly every component in the network, it ofers in-depth protection in the form of multiple lines of defense against many known and unknown security threats. his kind of new approach to designing the security system is known as resiliency-oriented security design. It consists of several features: • his kind of security system tries to cover a broader problem area. Due to a multiline defense architecture, it is capable of handling not only the malicious attacks of known patterns, but also network faults that occur due to node misconiguration, extreme network overload, or operational failures. After careful observation, one can notice that all such faults, whether incurred by attacks by malicious users or by misconigurations, share some common symptoms from both network and end-user perspectives. herefore, on the basis of this common signature, the security system should be able to detect such attacks and take proper measures to thwart such attempts. • In terms of solution space, we can see that cryptography-based techniques ofer a subset of tool kits in the case of a resiliencyoriented design. We need to use other noncryptographically based techniques for ensuring resiliency. For example, more “protocol invariant” information may be piggybacked in the protocol messages. his allows the nodes participating in the message exchange to verify such information. Routing messages can be propagated through multiple paths by exploiting the rich connectivity of the network topology, and redundant copies of such messages may be checked to detect inconsistency of the operations of the protocol. • In the case of resiliency-oriented design, the focus has shifted from conventional intrusion prevention to intrusion tolerance. In the case of MANETs, certain degrees of intrusions or malicious attacks will always occur in the real world. herefore, the systems must be designed to be robust to protect against such security threats. Systems security should be designed with multiple levels of security so that the collapse of an individual fence will not cause the breakdown of the entire system. Even if an attacker is able to break through a 306 A D H O C M O BIL E WIREL E S S NE T W O RKS particular security level, the entire system should continue to function, possibly with graceful degradation. • Sometimes unexpected faults may occur and the solution should be able to handle such faults to some extent. We can ensure this by strengthening the correct operation mode of the network by implementing more redundancy at the protocol and system levels. At each step of the protocol operation, there must be checks to ensure that everything has been done correctly along the right track. Whenever we notice any deviation from valid operations, it should be treated with caution and an alarm should be raised. he system should query the identiied source for further veriication. his way, the protocol can distinguish right from wrong as it has complete knowledge about what is right but not necessarily knowing what is exactly wrong. his way the design can strengthen the correct operations and may even handle previously unknown threats tha may occur in runtime operations. Researchers working in diferent ields, such as wireless networking, mobile systems, and cryptography, need to work collaboratively in order to develop an efective evaluation methodology and tool kits to ensure the security of wireless ad hoc networks. 10.5 Highlights of the Most Recent Developments in the Field With recent advances in the electronics and telecommunication industries, electronic components have become cheaper, faster, and more reliable. his has caused tremendous growth in computing and communication technologies. Due to the huge availability and portability of highly mobile devices such as laptops, smart phones, PDAs, etc., there has been a huge demand for access to information while on the move. Both coverage and wireless sensor networks are intrinsically multidisciplinary research topics. herefore, a wide body of scientiic and technological work is related to research presented in this chapter. In this section, we briely cover only the most directly related areas: sensors, wireless ad hoc sensor networks, the coverage problem, and related sensor network problems such as location discovery and deployment. A P P LI C ATI O NS A N D REC EN T D E V EL O P M EN T S 307 10.5.1 Sensors A sensor is a device that can sense and measure a change in the physical condition of the environment, such as change of air pressure, temperature, etc. Although we have been using sensors in various applications for a long time, sensors have recently found an even wider range of applications with the emergence of microelectromechanical system (MEMS) sensors, which ofer small size, reduced cost, and high reliability, and due to the interconnection between the sensors and computer networks. Today, we ind extensive use of sensors everywhere—from home applications to space lights. 10.5.2 Wireless Ad Hoc Sensor Networks Due to their easy availability and reduced cost, wireless sensor networks have found a wide array of commercially viable applications. Because of their huge potential to be applied in a number of future applications, they have drawn the attention of the research community. he use of sensors in mobile ad hoc networks has practically caused a revolution in opening up a huge possibility in diverse ields of applications. Due to the infrastructure-less and self-conigurable nature of wireless ad hoc networks, they can be deployed very quickly without the help of any ixed infrastructure and they show high adaptability in highly dynamic scenarios. Due to the integration of easily available, low-cost, power-eicient, and reliable sensors in nodes of wireless ad hoc networks equipped with signiicant computational and communication resources, a diverse range of research and engineering vistas has opened up. With this emerging area of applications of the sensors in our various facets of life come the various challenges related to the new technical problems, including the need for new operating systems, DSP algorithms, integration with biological systems, and low-power architectural designs. 10.6 Summary With the huge inlux of highly mobile and portable devices and due to the infrastructure-less mode of operation of mobile ad hoc networks, 308 A D H O C M O BIL E WIREL E S S NE T W O RKS these networks are inding increasing applications in many areas, including disaster recovery, healthcare, defense, academic, and industrial environments. However, with the many advantages of the mobile ad hoc networks come many challenges that are still unresolved. he challenges are related to the constrained environment of the mobile ad hoc networks, which includes development of mechanisms for eicient use of limited bandwidth and channel capacity, developing smaller sized but feature-rich mobile devices, techniques for minimizing power consumption and hence extending network lifetime, developing algorithms for enhancing information security, and developing eicient routing procedures for inding better routes with less overhead. A signiicant amount of research is already going on in the ield of mobile ad hoc networking and still there is a huge scope of research in order to meet the challenges for solving open problems. Bibliography Yang, H., H. Y. Luo, F. Ye, S. W. Lu, and L. Zhang. 2004. Security in mobile ad hoc networks: Challenges and solutions. UC Los Angeles. Retrieved from http://escholarship.org/uc/item/5p89k583 Communications / Software Engineering The military, the research community, emergency services, and industrial environments all rely on ad hoc mobile wireless networks because of their simple infrastructure and minimal central administration. Now in its second edition, Ad Hoc Mobile Wireless Networks: Principles, Protocols, and Applications explains the concepts, mechanism, design, and performance of these highly valued systems. Following an overview of wireless network fundamentals, the book explores MAC layer, routing, multicast, and transport layer protocols for ad hoc mobile wireless networks. Next, it examines quality of service and energy management systems. Additional chapters cover mobility models for multihop ad hoc wireless networks as well as cross-layer design issues. Exploring Bluetooth, IrDA (Infrared Data Association), HomeRF, WiFi, WiMax, Wireless Internet, and Mobile IP, the book contains appropriate examples and problems at the end of each chapter to illustrate each concept. This second edition has been completely updated with the latest technology and includes a new chapter on recent developments in the ield, including sensor networks, personal area networks (PANs), smart dress, and vehicular ad hoc networks. Self-organized, self-conigured, and self-controlled, ad hoc mobile wireless networks will continue to be valued for a range of applications, as they can be set up and deployed anywhere and anytime. This volume captures the current state of the ield as well as upcoming challenges awaiting researchers. K14987 an informa business www.taylorandfrancisgroup.com 6000 Broken Sound Parkway, NW Suite 300, Boca Raton, FL 33487 711 Third Avenue New York, NY 10017 2 Park Square, Milton Park Abingdon, Oxon OX14 4RN, UK ISBN: 978-1-4665-1446-1 90000 9 781466 514461 w w w.crcpress.com