Sie sind auf Seite 1von 40

Wireless Ad Hoc Networks

Guide: Mrs. Meenakshi .S Asst.Professor Dept. of CSE RITM PresentedBy: Goni Basappa K 5WE09SNZ08 MTech(PT) Sem IV
RITM-MTech Seminar by Goni Basappa K

Agenda
Abstract Introduction to ad hoc networks General Ad Hoc Network Characteristics Ad Hoc Network Applications Implementation of ad hoc networks IP-Layer Mobile Routing Routing protocols in the MANETs Routing Security problems References
RITM-MTech Seminar by Goni Basappa K

Abstract

In this seminar I present about the Wireless Ad Hoc Networks

RITM-MTech Seminar by Goni Basappa K

Introduction to ad hoc networks

RITM-MTech Seminar by Goni Basappa K

Introduction to ad hoc networks


Ad hoc is a Latin Phrase which means "for this purpose". It generally signifies a solution designed for a specific problem or task, non-general sable and which cannot be adapted to other purposes. --source wikipedia A wireless ad hoc network is a collection of autonomous nodes or terminals that communicate with each other by forming a multi hop radio network and maintaining connectivity in a decentralized manner. Since the nodes communicate over wireless links, they have to contend with the effects of radio communication, such as noise, fading, and interference. In addition, the links typically have less bandwidth than in a wired network

RITM-MTech Seminar by Goni Basappa K

Introduction to ad hoc networks (cont)


Each node in a wireless ad hoc network functions as both a host and a router, and the control of the network is distributed among the nodes. The network topology is in general dynamic, because the connectivity among the nodes may vary with time due to node departures, new node arrivals, and the possibility of having mobile nodes. Hence, there is a need for efficient routing protocols to allow the nodes to communicate over multihop paths consisting of possibly several links in a way that does not use any more of the network "resources" than necessary. The vision of mobile ad hoc networking is to support robust and efficient operation in mobile wireless networks by incorporating routing functionality into mobile nodes.
RITM-MTech Seminar by Goni Basappa K

Introduction to ad hoc networks (cont)


Such networks are envisioned to have dynamic, sometimes rapidly-changing, random, multihop topologies which are likely composed of relatively bandwidth-constrained wireless links. Within the Internet community, routing support for mobile hosts is presently being formulated as "mobile IP" technology. This is a technology to support nomadic host "roaming", where a roaming host may be connected through various means to the Internet other than its well known fixedaddress domain space.
RITM-MTech Seminar by Goni Basappa K

Introduction to ad hoc networks (cont)


The host may be directly physically connected to the fixed network on a foreign subnet, or be connected via a wireless link, dial-up line, etc. Supporting this form of host mobility (or nomadicity) requires address management, protocol interoperability enhancements and the like, but core network functions such as hop-by-hop routing still presently rely upon preexisting routing protocols operating within the fixed network. In contrast, the goal of mobile ad hoc networking is to extend mobility into the realm of autonomous, mobile, wireless domains, where a set of nodes--which may be combined routers and hosts--themselves form the network routing infrastructure in an ad hoc fashion
RITM-MTech Seminar by Goni Basappa K

General Ad Hoc Network Characteristics

RITM-MTech Seminar by Goni Basappa K

General Ad Hoc Network Characteristics


Instantly deployable, re-configurable (No fixed infrastructure) Created to satisfy a temporary need. Node portability (eg: sensors), mobility Limited battery power (Energy-constrained operation: Some or all of the nodes in a MANET may rely on batteries or other exhaustible means for their energy. ) Multi-hopping ( to save power, overcome obstacles, enhance spatial spectrum reuse, etc.) The nodes may be located in or on airplanes, ships, trucks, cars, perhaps even on people or very small devices, and there may be multiple hosts per router
RITM-MTech Seminar by Goni Basappa K

Ad hoc characteristics (cont)


A MANET is an autonomous system of mobile nodes. Ad Hoc Networks are self organizing, self healing, distributed networks which most often employ wireless transmission techniques. Dynamic topologies: Nodes are free to move arbitrarily. Bandwidth-constrained, variable capacity links: Wireless links will continue to have significantly lower capacity than their hardwired counterparts. Limited physical security: Mobile wireless networks are generally more prone to physical security threats than are fixed- cable nets.
RITM-MTech Seminar by Goni Basappa K

Ad hoc characteristics (cont)


The increased possibility of eavesdropping, spoofing, and denial-of-service attacks should be carefully considered. The decentralized nature of network control in MANETs provides additional robustness against the single points of failure of more centralized approaches. These characteristics create a set of underlying assumptions and performance concerns for protocol design which extend beyond those guiding the design of routing within the higher-speed, semi-static topology of the fixed Internet
RITM-MTech Seminar by Goni Basappa K

Example wireless Ad hoc network diagram

RITM-MTech Seminar by Goni Basappa K

Applications

RITM-MTech Seminar by Goni Basappa K

Ad Hoc Network Applications


When properly combined with satellite-based information delivery, MANET technology can provide an extremely flexible method for establishing communications for fire/safety/rescue operations or other scenarios requiring rapidly-deployable communications with survivable, efficient dynamic networking.

Military Automated battlefield


RITM-MTech Seminar by Goni Basappa K

Ad Hoc Network Applications (cont)


Civilian Disaster Recovery (flood, fire, earthquakes etc) Law enforcement (crowd control) Homeland defense Search and rescue in remote areas Environment monitoring (sensors) Space/planet exploration Commercial Sport events, festivals, conventions Ad hoc collaborative computing (Bluetooth) Sensors on cars (car navigation safety); sensors on cows Networked video games at amusement parks, etc
RITM-MTech Seminar by Goni Basappa K

Ad Hoc Network Applications (cont)


Opportunistic ad hoc extensions (of Wireless Internet) Indoor W-LAN extended coverage Indoor network appliances (Bluetooth, Home RF) Hot spots (Mesh Networks) Campus, shopping mall, etc Urban grid Wireless ad hoc networks can be further classified by their application: Mobile ad hoc networks Wireless mesh networks Wireless sensor networks
RITM-MTech Seminar by Goni Basappa K

Implementation of ad hoc networks

RITM-MTech Seminar by Goni Basappa K

Implementation of ad hoc networks


RFCs for MANET are 2501,5444. A mobile ad hoc network (MANET) is a type of wireless adhoc network , and is a self-configuring network of mobile devices connected by any number of wireless links. Every device in a MANET is also a router because it is required to forward traffic unrelated to its own use. Each MANET device is free to move independently, in any arbitrary direction, and thus each device will potentially change its links to other devices on a regular basis. The primary challenge for building a MANET is for each device to continuously maintain the information required to properly route traffic. Such networks may operate in a standalone fashion, or may be connected to the larger internet.
RITM-MTech Seminar by Goni Basappa K

Implementation of ad hoc networks (cont)


Ad hoc applications provide truly wireless solutions Ad hoc mode allows users to spontaneously form a wireless LAN. For example, a group of people with 802.11-equipped laptops may gather for a business meeting at their corporate headquarters. In order to share documents such as presentation charts and spreadsheets, they could easily switch their NICs to ad hoc mode to form a small wireless LAN within their meeting room. Another example is when you and your associates are waiting for a flight at the airport, and you need to share a relatively large PDF file. Through ad hoc mode, you can easily transfer the file from one laptop to another.
RITM-MTech Seminar by Goni Basappa K

Implementation of ad hoc networks (cont)


Most installed wireless LANs today utilize "infrastructure" mode that requires the use of one or more access points. With this configuration, the access point provides an interface to a distribution system (e.g., Ethernet), which enables wireless users to utilize corporate servers and Internet applications. As an optional feature, however, the 802.11 standard specifies "ad hoc" mode, which allows the radio network interface card (NIC) to operate in what the standard refers to as an independent basic service set (IBSS) network configuration. With an IBSS, there are no access points. User devices communicate directly with each other in a peer-to-peer manner.
RITM-MTech Seminar by Goni Basappa K

Implementation of ad hoc networks (cont)


Some product vendors are beginning to base their solutions on ad hoc mode. As an example, Mesh networks offers a wireless broadband network system based on 802.11 ad hoc mode and a patented peer-to-peer routing technology. This results in a wireless mesh topology where mobile devices provide the routing mechanisms in order to extend the range of the system. For example, a user on one side of the building can send a packet destined to another user on the far side of the facility, well beyond the point-to-point range of 802.11, by having the signal hope from client device to client device until it gets to its destination This can extend the range of the wireless LAN from hundreds of feet to miles, depending on the concentration of wireless users.

RITM-MTech Seminar by Goni Basappa K

IP-Layer Mobile Routing

RITM-MTech Seminar by Goni Basappa K

IP-Layer Mobile Routing


An improved mobile routing capability at the IP layer can provide a benefit similar to the intention of the original Internet, viz. "an interoperable internetworking capability over a heterogeneous networking infrastructure". In this case, the infrastructure is wireless, rather than hardwired, consisting of multiple wireless technologies, channel access protocols, etc. Improved IP routing and related networking services provide the glue to preserve the integrity of the mobile internet work segment in this more dynamic environment.
RITM-MTech Seminar by Goni Basappa K

IP-Layer Mobile Routing (cont)


A real benefit to using IP-level routing in a MANET is to provide network-level consistency for multihop networks composed of nodes using a *mixture* of physical-layer media; i.e. a mixture of what are commonly thought of as subnet technologies. A MANET node principally consists of a router, which may be physically attached to multiple IP hosts (or IP-addressable devices), which has potentially *multiple* wireless interfaces--each interface using a *different* wireless technology. Thus, a MANET node with interfaces using technologies A and B can communicate with any other MANET node possessing an interface with technology A or B.

RITM-MTech Seminar by Goni Basappa K

IP-Layer Mobile Routing (cont)


The multihop connectivity of technology A forms a physical- layer multihop topology, the multihop connectivity of technology B forms *another* physical-layer topology (which may differ from that of A's topology), and the *union* of these topologies forms another topology (in graph theoretic terms--a multigraph), termed the "IP routing fabric", of the MANET. MANET nodes making routing decisions using the IP fabric can intercommunicate using either or both physical-layer topologies simultaneously. As new physical-layer technologies are developed, new device drivers can be written and another physical-layer multihop topology can be seamlessly added to the IP fabric. Likewise, older technologies can easily be dropped. Such is the functionality and architectural flexibility that IP-layer routing can support, which brings with it hardware economies of scale.
RITM-MTech Seminar by Goni Basappa K

IP-Layer Mobile Routing (cont)


The concept of a "node identifier" (separate and apart from the concept of an "interface identifier") is crucial to supporting the multigraph topology of the routing fabric. It is what *unifies* a set of wireless interfaces and identifies them as belonging to the same mobile platform. This approach permits maximum flexibility in address assignment. Node identifiers are used at the IP layer for routing computations. In the near term, it is currently envisioned that MANETs will function as *stub* networks, meaning that all traffic carried by MANET nodes will either be sourced or sinked within the MANET. Because of bandwidth and possibly power constraints, MANETs are not presently envisioned to function as *transit* networks carrying traffic which enters and then leaves the MANET (although this restriction may be removed by subsequent technology advances). This substantially reduces the amount of route advertisement required for interoperation with the existing fixed Internet.

RITM-MTech Seminar by Goni Basappa K

IP-Layer Mobile Routing (cont)


For stub operation, routing interoperability in the near term may be achieved using some combination of mechanisms such as MANET-based any cast and mobile IP. Future interoperability may be achieved using mechanisms other than mobile IP. Interaction with Standard IP Routing will be greatly facilitated by usage of a common MANET addressing approach by all MANET routing protocols. Development of such an approach is underway which permits routing through a multi-technology fabric, permits multiple hosts per router and ensures long-term interoperability through adherence to the IP addressing architecture. Supporting these features appears only to require identifying host and router interfaces with IP addresses, identifying a router with a separate Router ID, and permitting routers to have multiple wired and wireless interfaces.
RITM-MTech Seminar by Goni Basappa K

Routing protocols in the MANETs

RITM-MTech Seminar by Goni Basappa K

Routing protocols in MANETs


Routing protocols of MANETs can be classified into two categories Table-driven On demand The routing protocols for a MANET are Destination-sequenced distance-vector routing protocol (DSDV) Ad hoc on-demand distance vector (AODV) Dynamic source routing protocol (DSR)
RITM-MTech Seminar by Goni Basappa K

On-Demand Routing Protocols


Routes are established on demand as requested by the source Only the active routes are maintained by each node Channel/Memory overhead is minimized Two leading methods for route discovery: source routing and backward learning (similar to LAN interconnection routing)
RITM-MTech Seminar by Goni Basappa K

Dynamic Source Routing (DSR)


Forwarding: source route driven instead of hop-by-hop route table driven No periodic routing update message is sent The first path discovered is selected as the route Two main phases Route Discovery Route Maintenance
RITM-MTech Seminar by Goni Basappa K

DSR - Route Discovery


To establish a route, the source floods a Route Request message with a unique request ID The Route Request packet picks up the node ID numbers Route Reply message containing path information is sent back to the source either by the destination, or intermediate nodes that have a route to the destination Each node maintains a Route Cache which records routes it has learned and overheard over time
RITM-MTech Seminar by Goni Basappa K

DSR - Route Maintenance


Route maintenance performed only while route is in use Monitors the validity of existing routes by passively listening to acknowledgments of data packets transmitted to neighboring nodes When problem detected, send Route Error packet to original sender to perform new route discovery
RITM-MTech Seminar by Goni Basappa K

Routing Security problems

RITM-MTech Seminar by Goni Basappa K

Routing Security problems


Attacks can be classified into passive and active attacks. Active attack can be further divided into external attacks and internal attacks. Some types of active attacks Black hole Denial of service Routing table overflow Impersonation Energy consummation Information disclosure

RITM-MTech Seminar by Goni Basappa K

Routing Security in MANETs


The External Attack Prevention Model (EAPM) secures the network from external attacks by implementing message authentication code to ensure integrity of route request packets. The Internal Attack Detection Model (IADM) is used to analyze local data traces gathered by the local data collection module and identify the misbehaving nodes in the network.
RITM-MTech Seminar by Goni Basappa K

References

RITM-MTech Seminar by Goni Basappa K

http://www.ietf.org/rfc/rfc2501.txt http://en.wikipedia.org.wiki/Mobile ad hoc network http://www.wi-fiplanet.com/tutorials/article.php/1451421 http://people.inf.ethz.ch/stuedip/doc/mobicom.pdf D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks," Mobile Computing, 1994.

RITM-MTech Seminar by Goni Basappa K

Thank you

RITM-MTech Seminar by Goni Basappa K

Das könnte Ihnen auch gefallen