department of computer and it engineering university of kurdistan computer networks ii
DESCRIPTION
Department of Computer and IT Engineering University of Kurdistan Computer Networks II Wireless Networks By: Dr. Alireza Abdollahpouri. Outline. Basic Concepts of Wireless Networks Applications of Wireless Networks Overview of Research Topics. Outline. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/1.jpg)
Department of Computer and IT EngineeringDepartment of Computer and IT EngineeringUniversity of KurdistanUniversity of Kurdistan
Computer Networks IIWireless Networks
By: Dr. Alireza AbdollahpouriBy: Dr. Alireza Abdollahpouri
![Page 2: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/2.jpg)
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
2
![Page 3: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/3.jpg)
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
3
![Page 4: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/4.jpg)
4
Wireless Communications
There is no physical link in wireless networks. Signals are transmitted on a certain frequency, propagate in the space and are captured by the receiver tuned to the same frequency.
Wireless communication is normally broadcast communication, i.e., all nodes within the transmission range of a particular node can receive the transmitted packets.
Transmissions in a common neighborhood will interfere with each other. If the Signal-to-Interference-Noise-Ratio (SINR) in the receiver is large enough, a packet can be correctly decoded.
![Page 5: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/5.jpg)
5
Wireless Communications
![Page 6: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/6.jpg)
6
Electromagnetic wave
![Page 7: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/7.jpg)
7
ELECTROMAGNETIC SPECTRUM
![Page 8: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/8.jpg)
8
I’ve Upgraded
To Wireless
Wireless Attracts Many Users
![Page 9: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/9.jpg)
Elements of a Wireless Network
network infrastructure
wireless hosts laptop, PDA, IP phone run applications may be stationary (non-
mobile) or mobile wireless does not
always mean mobility
9
![Page 10: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/10.jpg)
network infrastructure
base station typically connected
to wired network relay - responsible
for sending packets between wired network and wireless host(s) in its “area” e.g., cell towers,
802.11 access points
Elements of a Wireless Network
10
![Page 11: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/11.jpg)
network infrastructure
wireless link typically used to
connect mobile(s) to base station
also used as backbone link
multiple access protocol coordinates link access
various data rates, transmission distance
Elements of a Wireless Network
11
![Page 12: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/12.jpg)
12
Mobility vs. Throughput
![Page 13: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/13.jpg)
Wireless Propagation Channel(s)
Multipath propagation: signals reach the receiver via multiple paths.
Outdoor indoor
13
![Page 14: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/14.jpg)
Shadowing
14
A
A B C D
B
CD
![Page 15: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/15.jpg)
Radio Propagation
15
(Reflection effect)اثر بازتابي : اين اثر نيز به خاطر وجود موانع بزرگ )در مقايسه با طول موج سيگنال تابش شده(
است. در اين حالت سيگنال تابش شده پس از برخورد به مانع بزرگ منعكس مي گردد. اما سيگنال منعكس شده داراي توان كمتري نسبت به سيگنال اصلي است.
(Scattering effect)اثر پخشي : اگر اندازه مانع در حدود طول موج يا كمتر از طول موج سيگنال تابيده شده باشد، مانع مي تواند باعث پخش شدن موج تابيده شده شود. بنابراين موج تابيده شده به چند موج
ضعيف تر شكسته مي شود. (Refraction effect)اثر شکست :
اين اثر به دلیل ورود سیگنال از یک محیط به محیط دیگر به وجود می آید.
![Page 16: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/16.jpg)
16QAM
64QAM
SNR
25
20
15
10
5
0
-5
Distance
Distance Sensitivity in Wireless Networks
QPSK
16
![Page 17: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/17.jpg)
Adaptive Modulation and Coding
To provide a tradeoff between throughput and
robustness
AMC
Th
rou
gh
pu
t
Ro
bu
stn
ess
17
![Page 18: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/18.jpg)
18
Antennas
![Page 19: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/19.jpg)
Limitations of the Wireless Environment Limitations of the Wireless Network
limited communication bandwidth frequent disconnections heterogeneity of fragmented networks
Limitations Imposed by Mobility route breakages lack of mobility awareness by system/applications
Limitations of the Mobile Device short battery lifetime limited capacities
19
![Page 20: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/20.jpg)
20
Wireless Networks
Single-hop wireless networks: cellular network, wireless LAN.
Multi-hop wireless networks: mobile ad hoc network, wireless mesh network, wireless sensor network.
![Page 21: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/21.jpg)
Wireless Mesh Networks (WMN)
Mesh nodes
21
![Page 22: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/22.jpg)
Wireless Mesh Networks (WMN)
22
![Page 23: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/23.jpg)
23
Wireless Sensor Networks (WSN)
Sensor nodes
![Page 24: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/24.jpg)
24
Wireless Sensor Networks (WSN)
![Page 25: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/25.jpg)
25
Wireless Multi-hop (Mesh vs. Sensor)
Bandwidth is limited (tens of kbps)
In most applications, fixed nodes
Energy efficiency is an issue
Resource constrained Most traffic is user-to-
gateway
Wireless Sensor Networks Wireless Mesh Networks
Bandwidth is generous (>1Mbps)
Some nodes mobile, some fixed
Normally not energy limited
Resources are not an issue
Most traffic is user-to-gateway
![Page 26: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/26.jpg)
26
Relaying for (a) Throughput enhancement, and (b) Coverage extension
Relaying
![Page 27: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/27.jpg)
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
27
![Page 28: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/28.jpg)
28
Applications
Broadband home networking.
Community networking.
![Page 29: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/29.jpg)
Applications - Biomedical
29
![Page 30: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/30.jpg)
Habitat Monitoring on Great Duck Island http://www.greatduckisland.net/
Intel Research Laboratory at Berkeley initiated a collaboration with the College of the Atlantic in Bar Harbor and the University of California at Berkeley to deploy wireless sensor networks on Great Duck Island, Maine (in 2002)
Monitor the microclimates in and around nesting burrows used by the Leach's Storm Petrel
Goal : habitat monitoring kit for researchers worldwide
30
![Page 31: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/31.jpg)
Applications - Habitat monitoring
31
![Page 32: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/32.jpg)
FireBug
Wildfire Instrumentation System Using Networked Sensors Allows predictive analysis of evolving fire behavior Firebugs: GPS-enabled, wireless thermal sensor motes based on TinyOS that
self-organize into networks for collecting real time data in wild fire environments
Software architecture: Several interacting layers (Sensors, Processing of sensor data, Command center)
A project by University of California, Berkeley CA.32
![Page 33: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/33.jpg)
33
Metropolitan area networks
Transportation systems
Applications
![Page 34: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/34.jpg)
34
Applications
Emergency ResponseSource: www.meshdynamics.com
![Page 35: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/35.jpg)
35
Many Other Applications
Remote monitoring and control
Public transportation Internet access
Multimedia home networking
Source: www.meshnetworks.com
(now www.motorola.com).
![Page 36: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/36.jpg)
Outline
Basic Concepts of Wireless Networks
Applications of Wireless Networks
Overview of Research Topics
36
![Page 37: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/37.jpg)
37
Overview of Research Topics
Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 38: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/38.jpg)
38
Advanced Physical Layer Techniques
Multiple-antenna systems
Combination of different modulation and coding rates
Using OFDM and UWB for high speed transmission
Using Multi-antenna systems like: MIMO, Smart antenna
Software Antenna: Programmable RF bands, Channel access modes and channel modulation
![Page 39: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/39.jpg)
39
PHY - Modulation
Existing modulations work well (OFDM, DSSS, FSK, etc.).
UWB may be an interesting alternative for short distances (480 Mbps up to 1.6 Gbps at distances up to a few meters)
Spread spectrum solutions are preferred as they tend to have better reliability in the face of Fading (very important for mobile applications) Interference (more of a factor than in any other
wireless system)
![Page 40: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/40.jpg)
40
PHY – Smart Antennas
Background Implemented as an array of
omnidirectional antennas By changing the phase,
beamforming can be achieved
The result is a software steered directional antenna
Omnidirectionalantenna
Variabledelay
Signal totransmit
Radiation Pattern
Directionchanged bythe delays
![Page 41: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/41.jpg)
41
PHY-Smart Antennas Advantages
Low power transmissions Battery not a big
concern in many applications
Enables better spatial reuse and, hence, increased network capacity
![Page 42: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/42.jpg)
42
PHY-Smart Antennas Advantages (cont.)
Punch-through links Better delays Less packet loss Better data rates Less power
![Page 43: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/43.jpg)
43
PHY-Smart Antennas Advantages (cont.)
Better SNR Better data rates Better delays Better error rates
![Page 44: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/44.jpg)
44
PHY-Smart Antennas Disadvantages
Specialized hardware Specialized MAC (difficult
to design) Difficult to track mobile
users
![Page 45: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/45.jpg)
45
PHY – Transmission Power Control
Too low Too high Just right
GW GWGW
Transmission power can control network topology
![Page 46: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/46.jpg)
46
PHY – Transmission Power Control (cont.)
Optimization CriteriaNetwork capacityDelayError ratesPower consumption
The ideal solution will depend onNetwork topologyTraffic load
![Page 47: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/47.jpg)
47
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 48: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/48.jpg)
48
MAC: A Simple Classification
WirelessMAC
Centralized Distributed
Guaranteedor
controlledaccess
Randomaccess
On Demand MACs, Polling
SDMA, FDMA, TDMA
Aloha, CSMA/CA
![Page 49: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/49.jpg)
49
MAC – MultichannelWhat?
Channels can be implemented by: TDMA (difficult due to lack
of synchronization) FDMA CDMA (code assignment is
an issue) SDMA (with directional
antennas) Combinations of the above
s2
s3
s1f
t
c
f
t
c
f
t
c
s2
s3
s1f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
f
t
c
![Page 50: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/50.jpg)
50
Increases network capacity
MAC – MultichannelWhy?
B = bandwidth of a channel
User bandwidth = B/2
Ch-1
Ch-1
1 2
34
User bandwidth = B
Ch-1
Ch-2
1 2
34
Chain bandwidth = B
Ch-1
Ch-2
1
2
3
![Page 51: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/51.jpg)
51
Multi-Hop Networks with Single Radio
Source Mesh Router Destination
With a single radio, a node can not transmit and receive simultaneously.
![Page 52: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/52.jpg)
52
Multi-Hop Networks with Multiple Radios
SourceMesh Router Destination
With two radios tuned to non-interfering channels, a node can transmit and receive
simultaneously.
![Page 53: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/53.jpg)
53
MAC – Research challenges
The scalability issue in multi-hop ad hoc networks has not been fully solved yet.
A MAC protocol for WNs must consider both scalability and heterogeneity between different network nodes.
Advanced bridging functions must be developed in the MAC layer
Development of MAC protocols with multiple QoS metrics such as delay, packet loss ratios and jitter
MAC/Physical Cross-layer design
![Page 54: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/54.jpg)
54
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 55: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/55.jpg)
55
Routing
Finds and maintains routes for data flows
The entire performance of the WN depends on the routing protocol
![Page 56: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/56.jpg)
56
Routing
An optimal routing protocol must capture the following features:
Multiple performance metrics Scalability Robustness (to link failure and congestion)
![Page 57: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/57.jpg)
57
Routing – different routing protocols
Routing protocols with various performance metrics
example : LQSR Multi-radio routing (using WCETT)
example: MR-LQSR Multi-path routing for load balancing and fault
tolerance Hierarchical routing Geographic routing
![Page 58: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/58.jpg)
58
Existing Routing Protocols Internet routing
protocols (e.g., OSPF, BGP, RIPv2) Well known and trusted Designed on the
assumption of seldom link changes
Without significant modifications are unsuitable for WNs in particular or for ad hoc networks in general.
Ad-hoc routing protocols (e.g., DSR, AODV, OLSR, TBRPF) Newcomers by
comparison with the Internet protocols
Designed for high rates of link changes; hence perform well on WNs
May be further optimized to account for WNs’ particularities
![Page 59: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/59.jpg)
59
Routing Protocols
Proactive protocols (OLSR , TBRPF) Determine routes independent of traffic pattern Traditional link-state and distance-vector routing
protocols are proactive
Reactive protocols (DSR , AODV) Maintain routes only if needed
Hybrid protocols
![Page 60: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/60.jpg)
60
Power-Aware Routing
Define optimization criteria as a function of energy consumption.
Minimize energy consumed per packet Maximize duration before a node fails due
to energy depletion
Example: LEACH Algorithm
![Page 61: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/61.jpg)
Routing – Hierarchical Routing
Organizes the mobile nodes into clusters
Each cluster is governed by a cluster-head
Only heads send messages to a BS
Suitable for data fusion Self-organizing
61
![Page 62: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/62.jpg)
62
It is assumed that every node knows it own and its network neighbors positions.
Compared to topology-based routing schemes, geographic routing schemes forward packets by only using the position information of nodes in the vicinity and the destination node.
Topology change has less impact on the geographic routing than other routing protocols.
Routing – Geographic Routing
![Page 63: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/63.jpg)
63
Existing Routing Metrics are Inadequate
Source Mesh Router Destination
18 Mbps 18 Mbps
2 Mbps
11 Mbps 11 Mbps
Best path: 11 Mbps
Shortest path: 2 Mbps
Path with fastest links: 9 Mbps
Routing – metrics
![Page 64: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/64.jpg)
64
Link Metric: Expected Transmission Time (ETT)
Link loss rate = p Expected number of transmissions
Packet size = S, Link bandwidth = B Each transmission lasts for S/B
Lower ETT implies better link
ETXBS
ETT *
p-1
1 ETX
![Page 65: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/65.jpg)
65
ETT: Illustration
Source Destination
18 Mbps10% loss
11 Mbps5% loss
1000 Byte Packet
ETT : 0.77 ms
ETT : 0.40ms
18 Mbps50% loss
1000 Byte Packet
ETT : 0.77 ms
ETT : 0.89 ms
![Page 66: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/66.jpg)
66
Combining Link Metric into Path Metric
Add ETTs of all links on the path Use the sum as path metric
SETT = Sum of ETTs of links on path
Pro: Favors short paths
Con: Does not favor channel diversity
(Lower SETT implies better path)
![Page 67: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/67.jpg)
67
SETT does not favor channel diversity
Source
6 MbpsNo Loss
6 MbpsNo Loss
Mesh Router Destination
6 MbpsNo Loss
6 MbpsNo Loss
1.33ms 1.33ms
1.33ms1.33ms
Path Throughput SETT
Red-Red 3 Mbps 2.66 ms
Red-Blue 6 Mbps 2.66 ms
![Page 68: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/68.jpg)
68
Impact of Interference
Interference reduces throughput
Throughput of a path is lower if many links are on the same channel Path metric should be worse for non-diverse paths
Assumption: All links that are on the same channel interfere with one another Pessimistic for long paths
![Page 69: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/69.jpg)
69
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 70: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/70.jpg)
70
Impact of Transmission Errors
TCP can’t distinguish between packet losses due to congestion and transmission errors
Unnecessarily reduces congestion window
Throughput suffers
![Page 71: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/71.jpg)
71
TCP Problems
Causes for missing ACKs or loss packets in Wireless Networks:
Wireless transmission error Broken routes due to mobility (both users and wireless
routers) Delays due to MAC contention
![Page 72: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/72.jpg)
72
Impact of Multi-Hop Wireless Paths [Holland99]
0
200
400
600
800
1000
1200
1400
1600
1 2 3 4 5 6 7 8 9 10
Number of hops
TCPThroughtput(Kbps)
TCP Throughput using 2 Mbps 802.11 MAC
Connections over multiple hops are at
a disadvantage compared to shorter connections, because they have to contend for wireless access at each hop
![Page 73: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/73.jpg)
73
TCPEfficiency Solutions
Focus on eliminating the confusion between congestion loss and all other reasons
Many approaches developed for single-hop wireless systems Snoop I-TCP M-TCP
End to end SACK Explicit error notification Explicit congestion notification
(e.g. RED) Several solutions for multi-hop
A-TCP Freeze-TCP
![Page 74: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/74.jpg)
74
Split Connection Approach
Connection between wireless host MH and fixed host FH goes through base station BS
FH-MH = FH-BS + BS-MH
FH MHBS
Base Station Mobile HostFixed Host
![Page 75: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/75.jpg)
75
Split connection results in independent flow control for the two parts
Flow/error control protocols, packet size, time-outs, may be different for each part
Examples : I-TCP and M-TCP
Split Connection Approach
![Page 76: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/76.jpg)
76
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 77: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/77.jpg)
77
Application Layer
Improve existing Internet applications in order to work under the architecture of WNs.
Propose new application-layer protocols for distributed information sharing.
Develop Innovative applications for WNs.
![Page 78: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/78.jpg)
78
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 79: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/79.jpg)
79
Security Authentication
Prevent theft of service Prevent intrusion by
malicious users
Privacy - user data is at risk while on transit in the WN due to: Wireless medium Multi-hop
Reliability – protect: Routing data Management data Monitoring data Prevent denials of service
![Page 80: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/80.jpg)
80
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 81: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/81.jpg)
81
Network Management Monitor the “health” of
the network Determine when is time
to upgrade Either hardware New gateway
Detect problems Equipment failures (often
hidden by the self-repair feature of the network)
Intruders Manage the system
Source: www.meshdynamics.com
![Page 82: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/82.jpg)
82
Overview of Research Topics Physical Layer
MAC Layer
Network Layer
Transport Layer
Application Layer
Security
Network Management
Cross-layer design
![Page 83: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/83.jpg)
83
In order to provide satisfactory performance of a wireless network, MAC, routing, and transport protocols have to work together with the physical layer.
Cross-layer Design
![Page 84: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/84.jpg)
84
Cross-layer design can be performed in two ways:
1 - To improve the performance of a protocol layer by considering parameters in other protocol layers.
Example1: the packet loss rate in the MAC layer can be reported to the transport layer so that a TCP protocol is able to differentiate congestion from packet loss. Example2: the physical layer can report the link quality to a routing protocol as an additional performance metric for the routing algorithms.
2- To merge several protocols into one component.
Example: in ad hoc networks, MAC and routing protocols can be combined into one protocol in order to closely consider their interactions.
Cross-layer Design
![Page 85: Department of Computer and IT Engineering University of Kurdistan Computer Networks II](https://reader035.vdocument.in/reader035/viewer/2022062322/56814c4a550346895db95182/html5/thumbnails/85.jpg)
Questions!Questions!Questions!Questions!