Program: B.E Subject Name: Mobile Computing Subject Code: EC-8003 Semester: 8th
Program: B.E Subject Name: Mobile Computing Subject Code: EC-8003 Semester: 8th
Program: B.E Subject Name: Mobile Computing Subject Code: EC-8003 Semester: 8th
E
Subject Name: Mobile Computing
Subject Code: EC-8003
Semester: 8th
Downloaded from be.rgpvnotes.in
Types of MANET
Characteristics of MANET
In MANET, each node acts as both host and router. That is it is autonomous in
behavior.
Multi-hop radio relaying- When a source node and a destination node for a message
is out of the radio range, the MANETs are capable of multi-hop routing.
Distributed nature of operation for security, routing and host configuration. A
centralized firewall is absent here.
The nodes can join or leave the network anytime, making the network topology
dynamic in nature.
Mobile nodes are characterized by less memory, power and lightweight features.
The reliability, efficiency, stability, and capacity of wireless links are often inferior
when compared with wired links. This shows the fluctuating link bandwidth of
wireless links.
Mobile and spontaneous behaviour which demands minimum human intervention to
configure the network.
All nodes have identical features with similar responsibilities and capabilities and
hence it forms a completely symmetric environment.
High user density and large level of user mobility.
ANET Challenges
It includes:
The wireless link characteristics are time-varying in nature: There are transmission
impediments like fading, path loss, blockage and interference that adds to the
susceptible behaviour of wireless channels. The reliability of wireless transmission is
resisted by different factors.
Limited range of wireless transmission – The limited radio band results in reduced
data rates compared to the wireless networks. Hence optimal usage of bandwidth is
necessary by keeping low overhead as possible.
Packet losses due to errors in transmission – MANETs experience higher packet loss
due to factors such as hidden terminals that results in collisions, wireless channel
issues (high bit error rate (BER)), interference, frequent breakage in paths caused by
mobility of nodes, increased collisions due to the presence of hidden terminals and
uni-directional links.
Route changes due to mobility- The dynamic nature of network topology results in
frequent path breaks.
Frequent network partitions- The random movement of nodes often leads to the
partition of the network. This mostly affects the intermediate nodes.
The application of this wireless network is limited due to the mobile and ad hoc nature.
Similarly, the lack of a centralized operation prevents the use of firewall in MANETs. It also
faces a multitude of security threats just like wired networks. It includes spoofing, passive
eavesdropping, denial of service and many others. The attacks are usually classified on the
basis of employed techniques and the consequences.
These are similar to wireless ad hoc networks in the sense that they rely on wireless
connectivity and spontaneous formation of networks so that sensor data can be transported
wirelessly. WSNs are spatially distributed autonomous sensors to monitor physical or
environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively
pass their data through the network to a main location. The more modern networks are bi-
directional, also enabling control of sensor activity. The development of wireless sensor
networks was motivated by military applications such as battlefield surveillance; today such
networks are used in many industrial and consumer applications, such as industrial process
monitoring and control, machine health monitoring, and so on.
The WSN is built of "nodes" – from a few to several hundreds or even thousands, where
each node is connected to one (or sometimes several) sensors. Each such sensor network
node has typically several parts: a radio transceiver with an internal antenna or connection
to an external antenna, a microcontroller, an electronic circuit for interfacing with the
sensors and an energy source, usually a battery or an embedded form of energy harvesting.
A sensor node might vary in size from that of a shoebox down to the size of a grain of dust,
although functioning "motes" of genuine microscopic dimensions have yet to be created.
The cost of sensor nodes is similarly variable, ranging from a few to hundreds of dollars,
depending on the complexity of the individual sensor nodes. Size and cost constraints on
sensor nodes result in corresponding constraints on resources such as energy, memory,
computational speed and communications bandwidth. The topology of the WSNs can vary
from a simple star network to an advanced multi-hop wireless mesh network. The
propagation technique between the hops of the network can be routing or flooding.
The example shows a mobile host connected via a wireless link to an access point
(AP). Also access node is connected to the internet via the wired Internet.
Standard TCP is used to connect to the AP from fixed computer. No computer over
the internet recognises any change to the TCP.
Page no: 5 Follow us on facebook to get real-time updates from RGPV
Downloaded from be.rgpvnotes.in
The Access point acts as a proxy of mobile host and terminates the TCP connection.
Therefore, the fixed computer now sees the AP as mobile host; on other hand the
mobile host sees AP as the fixed computer.
In between the AP and the mobile host a special TCP adapted to wireless links is
used.
A change is TCP is not needed as even as unchanged TCP produces the same round
trip time.
Such segmentation methods can be used is connection between mobile node and
correspondent host when host is at the FA. So during handover, control transfers
from one FA to another FA in the nearby cell.
Acknowledgements:
Here the correspondent node (i.e. Sender) does not notice the wireless link or
segmentation of the connection.
The foreign Agent (FA) becomes or acts as a proxy and relays data in both directions.
When the CN sends data, FA sends back a acknowledgement to it.
When the mobile host receives a packet from FA, the mobile host also sends back an
acknowledgement
This acknowledgement is a local acknowledgement. It will not be forwarded to the
CN.
If a packet is lost in wireless transmission (i.e. no acknowledgement received) then
FA will try re-transmitting it again.
Advantages of I-TCP:
1. I-TCP does not require any changes in TCP protocol as used by the different hosts in
network.
2. Because of a strict partition between the two connections, transmission error on the
wireless link will not propagate to the wired link. Therefore, flow will always be in a
sequence.
3. The delay between the FA and Mobile host is small and if optimized properly, precise
time-outs can be used to carry out retransmission of lost packets.
4. Different solutions can be implemented ad tested between the FA and mobile host
without jeopardizing the stability of the internet.
5. With two partitions, we can use a different transport layer protocol in the second
half with the FA acting as a translator.
Disadvantages of I-TCP:
1. The end-to-end connection for which TCP has been designed will fail if the Foreign
Agent (FA) crashes.
2. The foreign agent (FA) must be a trusted entity as the TCP connections end at this
point.
3. In practical terms increased handover may latency may be much more problematic.
(During handover from old FA to new FA, some delay will occur. During this period,
some extra data will come at old FA. This data also needs to be send!!)
4.4.2 Snooping TCP
One of the main feature of I-TCP also goes on to become its major disadvantage i.e.
segmentation of TCP.
To overcome it but also to provide enhanced feature a new TCP was designed which
worked completely transparent and also left the TCP end-to-end connection intact.
The new idea for making an enhancement is to buffer the data close to the mobile
host to perform fast local retransmission in case of packet loss. A good place to carry
out this enhancement is at the foreign agent (FA).
Method (How?)
Here, the foreign agent instead of terminating all packet with destination mobile
host, it buffers (i.e. temporarily stores all these packets). In addition to this, it also
s oops ea h pa ket flowi g i oth the di e tio s fo eadi g a k owledge e ts.
Buffering towards the mobile host is carried out so that a retransmission can be done
in case of missing acknowledgements.
The FA buffers every packet until an acknowledgement is received from the mobile
host.
If the foreign agent does not receive an acknowledgement within the stipulated time,
the packet or the acknowledgement has been lost.
In such a situation, the FA can directly retransmit the packet without waiting for the
correspondent host.
Transparency:
To maintain transparency i.e. the communication happens only between the
o espo de t ode CN a d the o ile host, the FA does t se d
acknowledgement to the correspondent host as in I-TCP.
The acknowledgement is send by the Mobile host itself. The FA keeps on monitoring
it.
When the data flows for mobile host to CN, the FA snoops and checks the sequence
of acknowledgement number. If a gap is found, FA sends signal to re-transmit.
Advantages of Snoop-TCP:
The original TCP semantic i.e. end-to-end connection is preserved.
The correspondent node need not be changed as all the new enhancements are
made in the FA.
During handover form on cell to another, there is no need to transfer the previous
incoming data (as in I-TCP).
In handover, the next foreign Agent (FA) need not use the same enhancements used
here i.e. follow Snoop-TCP method.
Disadvantages of Snoop-TCP:
If any encryption is applied at both ends, the snooping and buffering process would
be a waste of time as no data can be read by FA.
Does not fully isolate wireless link error from the fixed network (e.g. problems like
congestion and interference may cause a delay in retransmission).
The Mobile host needs to be modified to handle the NACK signals (No
Acknowledgement) for reverse traffic (i.e. from MH to Sender)
Disadvantages:
M-TCP assumes low bit error which is not always true. So, any packet loss due to bit-
errors occurring, then its propagated to the sender.
Modifications are required for the MH protocol software.
TCP freezing: –
MAC layer is often able to detect interruption in advance .
MAC can inform TCP layer of upcoming loss of connection .
TCP stops sending, but does now not assume a congested link.
MAC layer signals again if reconnected ‰
Transaction-oriented TCP:
RFC1644, T-TCP, describes a TCP version to avoid this overhead
Connection setup, data transfer and connection release can be combined
Compare WAP Transaction Layer Protocol
Thus, only 2 or 3 packets are needed ‰
Advantage:
Efficiency ‰
Drawback:
Requires changed TCP
Mobility not longer transparent