Professional Documents
Culture Documents
Infrastructure Networks:
Fixed, wired backbone
Mobile communicates directly with access points
Suitable for locations where access points can be placed
Example : Cellular networks
Cellular Networks
Fixed infrastructure-based
Infrastructureless
Centralized routing
Distributed routing
1. Ad hoc network begins with at least two nodes broadcasting their presence (beaconing) with their respective
address information
2. Beaconing messages are control messages. If node A is able to establish a direct communication with node B
verified by appropriate control messages between them, they both update their routing tables
3. Third node C joins the network with its beacon signal. Two scenarios are possible:
i.
A & B both try to determine if single hop communication is feasible
ii.
Only one of the nodes e.g. B tries to determine if single hop communication is feasible and establishes
a connection
4. The distinct topology updates consisting of both address and the route updates are made in three nodes
immediately.
5. In first scenario, all routes are direct i.e. A->B, B->C, and A->C (Lets assume bi-directional links)
6. In the second scenario, the routes are updated
i.
First between B & C,
ii.
then between B & A,
iii.
Then between B & C again confirming that A and C both can reach each other via B
MANET Applications:
Disaster relief
Earthquakes, tsunamis, hurricanes
Wiped out infrastructure
Search & rescue
Community Mesh networks
Access extensions
Personal Area Networks(PANs)
cell phone, laptop, ear phone, wrist watch
Ad hoc Gaming (on subway, cafes, etc.)
Military applications
Civilian environments
taxi cab network
meeting rooms
sports stadiums
boats, small aircraft
Wireless sensor networks
Collaborative computing
Major Issues and Challenges in MANET:
Hidden terminal problem
Exposed terminal problem
Channel efficiency
Access delay and fairness
Host is no longer an end system - can also be an acting intermediate system
Hidden Terminal Problem: Hidden nodes in a wireless network refer to nodes that are out of range of other nodes or
a collection of nodes. The nodes And C are hidden to each other in figure. The problem is when nodes A and C start to
send packets simultaneously to the node B. Because the nodes A and C are out of range of each other and so cannot
detect a collision while transmitting, Carrier sense multiple access with collision detection (CSMA/CD) does not work,
and collisions occur, which then corrupt the data received. To overcome the hidden node problem, RTS/CTS
handshaking is implemented in conjunction with the Carrier sense multiple access with collision
avoidance (CSMA/CA) scheme.
IEEE 802.11 uses 802.11 RTS/CTS acknowledgment and handshake packets to partly overcome the hidden node
problem. RTS/CTS is not a complete solution and may decrease throughput even further, but adaptive
acknowledgments from the base station can help too.
The comparison with hidden stations shows that RTS/CTS(Request to Send/ Clear to Send) packages in each traffic
class are profitable (even with short audio frames, which cause a high overhead on RTS/CTS frames).
Exposed Terminal Problem: The exposed terminal problem occurs when a node is prevented from sending packets
to other nodes due to a neighboring transmitter. Consider an example of 4 nodes labeled R1, S1, S2, and R2, where the
two receivers are out of range of each other, yet the two transmitters in the middle are in range of each other. Here, if a
transmission between S1 and R1 is taking place, node S2 is prevented from transmitting to R2 as it concludes
after carrier sense that it will interfere with the transmission by its neighbor S1. However note that R2 could still
receive the transmission of S2 without interference because it is out of range of S1.
IEEE 802.11 RTS/CTS mechanism helps to solve this exposed terminal problem only if the nodes are synchronized
and packet sizes and data rates are the same for both the transmitting nodes. When a node hears an RTS (Request to
Send) from a neighboring node, but not the corresponding CTS (Clear to Send), that node can deduce that it is an
exposed node and is permitted to transmit to other neighboring nodes.