You are on page 1of 89

Wireless NETWORKS

by

Ananth Ravindran
Assistant Professor

Sensor networks- Classification, MAC and Routing protocols

EC

20 43

On Demand routing protocols, Hybrid protocols, Wireless

Visit www.agniece.blog.com for further details

W IR

Characteristics of MANETs, Table-driven and Source-initiated

EL

ES S

NE

TW

ADHOC AND SENSOR NETWORKS


OR

KS

UNIT IV

Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

Model

ES S

NE

Adhoc And Sensor Networks

TW

OR
Ananth.R

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

No central router required. Each node will act as a router

Data takes multiple hops before reaching destination. each node communicates with other nodes directly or indirectly through intermediate nodes.
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

W IR

itself.

EL

ES S

NE

It does not have a definite Topology.

TW

Infrastructure-less dynamic multihop network

OR

KS

Mobile Adhoc network (MANET) or Wireless Sensor Network (WSN)

MANETs are basically peer-to-peer

wireless networks in

intermediate nodes

The network topology keeps changing when devices join or

Useful during disasters and for military operations.

EC

20 43

Useful for places with limited or no infrastructure.

Visit www.agniece.blog.com for further details

W IR

leave the network.

EL

ES S

NE

TW

forward manner from a source to an arbitrary destination, via

OR

which information packets are transmitted in a store-and-

KS

Ananth.R

DIFFICULTIES:

node itself but also its ability to forward packets.

EC

Efficient routing of data packets


Visit www.agniece.blog.com for further details Ananth.R

20 43

environments.

W IR

May not be able to replace batteries in hostile

EL

ES S

NE

Power failure of a mobile node not only affect the

TW

OR

Limited battery life of MANETs.

KS

Characteristics of MANETs
Nodes are free to move arbitrarily; thus, the network topology

noise, interference conditions, etc.. But MANETs are expected to provide a reasonable amount of data rate
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

Throughput depends on effects of multiple access, fading,

W IR

networks

EL

These have significantly lower capacity than infrastructured

ES S

2. Bandwidth-constrained and variable capacity links

NE

may change randomly and unpredictably.

TW

OR

KS

1. Dynamic topologies:

3. Energy-constrained operation:
means for their energy.

The is a possibility of eavesdropping, spoofing, and denial of service (DoS) attacks


Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

threats than wired networks.

W IR

MANETs are generally more prone to physical security

EL

4. Limited physical security:

ES S

optimization criteria may be energy Conservation

NE

For these nodes, the most important system design

TW

OR

KS

Most of nodes may rely on batteries or other exhaustible

Applications
TW
MANETs can be formed among soldiers on the ground or

entire communication infrastructure is in disarray.

EC

Restoring communications quickly is essential


Visit www.agniece.blog.com for further details Ananth.R

20 43

These arise as a result of natural disasters in which the

W IR

2. Crisis-management applications:

EL

ES S

to monitor activities in the area of interest

NE

fighter planes in the air, while sensors can be deployed

OR

1. Defense applications:

KS

3. Telemedicine:
MANETS may be useful for many medical applications from data gathering to surgical methods

4. Tele- geoprocessing applications:


(GIS), GPS, and high-capacity wireless mobile systems geoprocessing

Useful for environmental monitoring


Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

enables a new type of application referred to as tele-

W IR

EL

The combination of geographical information systems

ES S

NE

TW

OR

KS

5. Vehicular area network:


in providing emergency services and other information

Blocks of this database are transmitted in rapid sequence to a visualize the needed environment ahead of time

EC

20 43

vehicle, where a rendering program permits the occupants to

Visit www.agniece.blog.com for further details

W IR

EL

streets, buildings, etc of places.

ES S

A remote database contains the graphical representation of

NE

6. Virtual navigation:

TW

OR

KS

This is a growing and very useful application of ad hoc network

Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

Routing
NE

TW

OR
Ananth.R

KS

Routing
TW
packets from the source to the destination node

EC

destination is called routing protocol.

20 43

The process involved in delivering the data to the

Visit www.agniece.blog.com for further details

W IR

itself.

EL

neighbor to forward an incoming packet not destined for

ES S

Such an intermediate node has to decide to which

NE

OR

In a multihop network, intermediate nodes have to route

KS

Ananth.R

Routing in a MANET depends on many factors, including of a route request, and specific underlying characteristics that could serve as heuristics in finding the path efficiently.

EC

destination

20 43

of

most appropriate neighbor for any given packet

Visit www.agniece.blog.com for further details

W IR

Routing is facilitated by routing tables, which has the list

EL

ES S

NE

TW

OR

modeling of the topology, selection of routers, initiation

KS

Ananth.R

Requirement of routing protocol


TW
alternative routes if a node connectivity fails. by minimizing the actual length between the source and intermediate nodes.

3. Give the nodes the best possible response time and sessions between user applications.
Visit www.agniece.blog.com for further details Ananth.R

EC

throughput. This is especially important for interactive

20 43

W IR

EL

destination through use of the lowest number of

ES S

NE

2. Route network traffic through the path with least cost

OR

KS

1. Provide the maximum possible reliability by selecting

Types
TW
1. Proactive or table-driven routing protocols 2. Reactive or on-demand routing protocols.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

OR

KS
Ananth.R

Table-driven routing protocols


information from each node to every other node in the

changes in network topology It is proactive in the sense that when a packet needs to be immediately used.
Visit www.agniece.blog.com for further details Ananth.R

EC

forwarded, a route will be already available and can be

20 43

W IR

These tables were updated regularly with respect to the

EL

ES S

The routing information is kept in different routing tables.

NE

network.

TW

OR

Table-driven routing protocols maintain up-to-date routing

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

The route is discovered by sending route-request will forward the request to their neighbors,and so on

node, it responds by a route-reply packet back to the

EC

Optimized Link State Routing Protocol (OLSR).


Visit www.agniece.blog.com for further details Ananth.R

20 43

E.g Destination-Sequenced Distance Vector (DSDV),

W IR

source node via the same route

EL

ES S

NE

Once the route-request reaches the destination

TW

OR

KS

packets from a source to its neighbor nodes, which

Dis Advantages
route requests.

This will cause an enormous amount of traffic in the network

EC

20 43

Visit www.agniece.blog.com for further details

W IR

network and will increase with the size of the

EL

ES S

NE

TW

The route is found by flooding the network with

OR

KS
Ananth.R

On-demand routing protocols.


TW
This maintains information only for active routes Only when a node requires a route to a

Once a route has been established the searching process will be halted

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

destination, a route discovery process is initiated

ES S

NE

OR

KS
Ananth.R

EC

Dynamic Source Routing(DSR)


Visit www.agniece.blog.com for further details Ananth.R

20 43

e.g. ADHOC On Demand Vector(AODV),

W IR

2. Hop-by-hop routing

EL

ES S

1. Source routing and

NE

TW

OR

On-Demand routing protocols can be classified into two categories:

KS

In Source routed on-demand protocols each data destination. Therefore, each intermediate node forwards of each packet

packet has to carry more details about the network.


Visit www.agniece.blog.com for further details Ananth.R

EC

each route will be more and the header of each data

20 43

in large networks the number of intermediate nodes in

W IR

The major drawback with source routing protocols is that

EL

ES S

NE

these packets according to the information in the header

TW

OR

packets carry the complete path from source to

KS

Hop-by-hop routing
the destination address and the next hop address. So each intermediate node uses its routing table to

EC

adaptable to the dynamically changing environment.


Visit www.agniece.blog.com for further details Ananth.R

20 43

The advantage of this strategy is that routes are

W IR

forward each data packet towards the destination.

EL

ES S

NE

TW

In hop-by-hop routing each data packet only carries

OR

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

PROTOCOLS

TW

OR
Ananth.R

KS

Types
TW
Destination-Sequenced Distance-Vector Routing

2. Reactive or on-demand routing protocols.


Dynamic Source Routing Temporarily Ordered Routing Algorithm Associativity-Based Routing
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

W IR

Ad Hoc On-Demand Distance Vector Routing

EL

ES S

NE

Cluster Head Gateway Switch Routing

OR

KS

1. Proactive or table-driven routing protocols

Destination-Sequenced Distance-Vector Routing


every possible destination in the network and the number of Each such entry in the table is marked with a sequence The sequence numbers allow the mobile node to distinguish stale routes from new ones, and help avoid formation of routing loops

EC

20 43

Visit www.agniece.blog.com for further details

W IR

number assigned by the destination node.

EL

ES S

hops to the destination

NE

TW

Each mobile node maintains a routing table with a route to

OR

KS
Ananth.R

The sequence number of the information received about the destination and a new sequence number unique to the broadcast
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

W IR

EL

destination

ES S

The number of hops required to reach the

NE

TW

The destination address.

OR

A new route broadcast contains:

KS

If multiple routes are available for the same destination the Any updates in the routing tables are periodically broadcast in The amount of traffic generated by these updates can be huge types of packets (a) Full Dump (b) Incremental dump A full dump packet carries all the available routing units (NPDUs). information and can require multiple network protocol data

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

To alleviate this problem, the updates are made through two

ES S

NE

the network to maintain table consistency

TW

OR

KS
Ananth.R

route with the smaller hops is used.

When there is only occasional movement, smaller information since the last full dump.

The incremental packets fit into a standard NPDU and hence decrease the amount of traffic generated.

EC

routing information packets

20 43

maintain all the information sent in the incremental

Visit www.agniece.blog.com for further details

W IR

The nodes maintain a separate table in which they

EL

ES S

NE

TW

OR
Ananth.R

KS

incremental packets are used to relay only the change in

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

Cluster Head Gateway Switch Routing


NE

TW

OR
Ananth.R

KS

Instead of a flat network, Cluster Head Gateway Switch

access, routing, and bandwidth allocation. Identification of appropriate clusters and selection of CHs is

distributed algorithm within the cluster to elect a node as the CH

EC

20 43

Once clusters have been defined, it is desirable to use a

Visit www.agniece.blog.com for further details

W IR

quite complex

EL

ES S

NE

TW

Cluster Heads control a group of ad hoc nodes and channel

OR

Routing uses Cluster Heads

KS
Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

When two CHs come into contact, or When a node moves out of contact with all other CHs.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

In this a new selection process is initiated only

ES S

algorithm is used

NE

TW

Least Cluster Change (LCC) clustering

OR

KS

To avoid frequent Cluster Head selection a the

Ananth.R

another CH, and so on until the packet reaches the CH of the destination
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

From there it is routed to the gateway node, then to

W IR

A packet sent by a node is first transmitted to its CH.

EL

ES S

range of two or more CHs.

NE

Gateway nodes are those within communication

TW

OR

cluster-head-to-gateway routing approach.

KS

CGSR uses a modified DSDV to use a hierarchical

EC

destination

20 43

determine the next hop required to reach any

Visit www.agniece.blog.com for further details

W IR

They also maintains a routing table to

EL

ES S

for each node in the network.

NE

TW

table (CMT), which stores the destination CH

OR

Each node in this maintain a cluster member

KS

Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

Wireless Routing Protocol


NE

TW

OR
Ananth.R

KS

Routing table

Message retransmission list (MRL) table

EC

20 43

Visit www.agniece.blog.com for further details

W IR

Link-cost table

EL

ES S

NE

Distance table

TW

OR

Each node in this maintain four tables

KS
Ananth.R

EC

Maintains the cost factor associated with the routes


Visit www.agniece.blog.com for further details Ananth.R

20 43

Link-cost table

W IR

Maintains the various paths available

EL

ES S

Routing table

NE

required to reach other nodes

TW

OR

Maintains the details about the number of hops

KS

Distance table

Message retransmission list (MRL) table

sequence number of the update message,

EC

and a list of updates sent in the update message


Visit www.agniece.blog.com for further details Ananth.R

20 43

an acknowledgment-required flag vector

W IR

a retransmission counter,

EL

ES S

NE

MRL has a

TW

OR

The MRL records the retransmitted messages

KS

sends the new node a copy of its routing table

EC

sent by a node convey its existence to the neighbors


Visit www.agniece.blog.com for further details Ananth.R

20 43

certain time to ensure connectivity. The messages

W IR

Anode must send messages to its neighbors within a

EL

ES S

NE

node, it adds the new node to its routing table and

TW

When a node receives a hello message from a new

OR

KS

Nodes discover each other through hello messages.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

Source-Initiated On-Demand Routing


NE

TW

OR
Ananth.R

KS

This maintains information only for active routes discovery process is initiated

As a result, the number of broadcasts required to create the routes is minimized


Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

table exchanges

W IR

routing information, nor do they participate in the routing

EL

The nodes that are not on a particular path do not maintain

ES S

NE

Only when a node requires a route to a destination, a route

TW

OR

KS

Ad Hoc On-Demand Distance Vector Routing (AODV)

When a source needs to send a message to a destination it Source sends a route request (RREQ) packet to all its neighbors, and so on, until either the destination

number and a broadcast ID, which is incremented each time Sequence numbers are used to ensure that all routes are loop-free

EC

20 43

the node initiates a RREQ

Visit www.agniece.blog.com for further details

W IR

EL

Each node has a unique sequence

ES S

NE

neighbors, the latter forward the request to all their

TW

OR

KS
Ananth.R

initiates a route discovery process.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

Intermediate nodes reply only if they have a route to the destination.

the first copy of the RREQ

As the RREP travels back on the reverse path, the nodes on

EC

this path set up their forward route


Visit www.agniece.blog.com for further details Ananth.R

20 43

W IR

EL

(RREP) message back to the neighbor from which it received

ES S

intermediate/destination node sends a unicast route-reply

NE

node with a fresh enough route to the destination, the

TW

Once the RREQ reaches the destination or an intermediate

OR

KS

EC

neighbors, and so on until the source node is reached

20 43

failure notification to their own active upstream

Visit www.agniece.blog.com for further details

W IR

neighbors notice the movement and propagate a link

EL

If the nodes along the route move, their upstream

ES S

destination.

NE

TW

discovery procedure to find new routes to the

OR

When a source node moves, it can reinitiate the route-

KS

Ananth.R

Dynamic Source Routing


they are aware of in cache

As the new routes are discovered, the cache is updated

EC

20 43

route maintenance

Visit www.agniece.blog.com for further details

W IR

route discovery and

EL

ES S

The protocol works in two main phases:

NE

TW

In this the mobile nodes maintain all source routes that

OR

KS
Ananth.R

When a mobile has a message to send, it consults the destination the message

broadcasting a route-request packet The route request contains the destination address, the source address, and a unique identification number

EC

20 43

Visit www.agniece.blog.com for further details

W IR

Else the mobile initiates a route discovery by

EL

ES S

NE

If an active route to destination exists, it is used to send

TW

OR
Ananth.R

KS

route cache to determine whether it has a route to the

Each node that receives the route request checks whether it

packet only if it has not seen the packet before and its own

with a route to the destination, a route reply is generated`


Visit www.agniece.blog.com for further details Ananth.R

EC

When the route request reaches the destination or a node

20 43

address was not already in the route record.

W IR

EL

To minimize the number of broadcasts, a node rebroadcasts a

ES S

links

NE

the packet and then rebroadcasts the packet on its outgoing

TW

If it does not, it adds its own address to the route record of

OR

KS

has a route to the destination.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

Sensor Node Deployment


NE

TW

OR
Ananth.R

KS

A single sensor may have a limited sensing range, and phenomenon in a given area might require deployment

least one adjacent sensor can receive the data correctly. So node deployment plays a vital role in the lifetime of a network.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

To transfer data from one sensor to another, we need at

EL

ES S

covered.

NE

of several sensors so that the area can be completely

TW

OR

KS

sensing of an event or monitoring of a particular

Ananth.R

Types
TW
1. Randomly Deployed Sensor Networks 2. Regularly Deployed Sensor Networks

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

OR

KS
Ananth.R

Random
TW EC 20 43
Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

OR
Ananth.R

KS

Regular
TW EC 20 43
Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

OR
Ananth.R

KS

Classification of Sensor Networks


The nodes in this network periodically switch on their sensors and transmitters, sense the environment, and transmit data of interest. Thus, they provide a snapshot of the relevant parameters at

In this scheme, the nodes react immediately to sudden and drastic changes in the value of a sensed attribute. As such, these are well suited for time-critical applications.
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

2. Reactive networks:

W IR

periodic data monitoring.

EL

regular intervals and are well suited for applications requiring

ES S

NE

TW

OR

KS

1. Proactive networks:

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

Medium Access Control Protocols for Wireless Sensor Networks


NE TW

OR

KS
Ananth.R

EC

Fairness not so important

20 43

Latency, throughput, bandwidth

Visit www.agniece.blog.com for further details

W IR

EL

Adaptability to changes in network topology

ES S

Scalability

NE

TW

Energy Efficient

OR
Ananth.R

KS

Properties of a Well Defined MAC Protocol

WSNs are typically composed of a large number of low-cost,

geographical area in an ad hoc fashion and without careful

Harnessing the potential benefits of WSNs requires a high-level of self-organization and coordination among the sensors

for WSNs becomes crucial for wireless sensor nodes to carry out successfully the mission for which they are deployed
Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

The design of efficient communications and network protocols

W IR

EL

ES S

NE

planning

TW

OR

KS

low-power, multifunctional wireless devices deployed over a

Communication among wireless sensor nodes is usually characteristic of this channel that only a single node can Therefore, shared access of the channel requires the The objective of the MAC protocol is to regulate access to the shared wireless medium such that the performance

EC

requirements of the underlying application are satisfied


Visit www.agniece.blog.com for further details Ananth.R

20 43

W IR

establishment of a MAC protocol among the sensor nodes.

EL

ES S

NE

transmit a message at any given time.

TW

OR

achieved by means of a unique channel. It is the

KS

Protocol Architecture
TW EC 20 43
Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

OR
Ananth.R

KS

1. Schedule-based protocols

sensors.

A single radio channel is shared by all nodes and

EC

allocated on demand
Visit www.agniece.blog.com for further details Ananth.R

20 43

W IR

EL

These avoid preallocation of resources to individual

ES S

2. Contention-based MAC-layer protocols

NE

TW

Channel access is limited to one sensor node at a time

OR

Access to the channel is based on a schedule.

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

Schedule-Based Protocols

TW

OR
Ananth.R

KS

SMACS is a MAC protocol to enable the formation of random synchronization among the network

(Frequency Hopping )method. Each node in the network maintains a TDMA-like frame, neighbors.

EC

referred to as a superframe, for communication with known

20 43

Visit www.agniece.blog.com for further details

W IR

EL

A key feature of SMACS is its use of a hybrid TDMA/FH

ES S

NE

network topologies without the need to establish global

TW

OR

KS

1. Self-Organizing Medium Access Control for Sensornets (SMACS)

Ananth.R

The size of each frame is not fixed and may vary in time for a

assigning a time slot to this link. The selection of time slots is such that the node talks only to

EC

neighbors at each time slot.

20 43

Visit www.agniece.blog.com for further details

W IR

EL

Each node establishes a link to each neighbor discovered by

ES S

nodes.

NE

neighborhood discovery procedure to detect neighboring

TW

SMACS requires that each node regularly execute a

OR

KS
Ananth.R

single node and also from node to node.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

LEACH takes a hierarchical approach and organizes nodes into

Only the cluster head transmits data outside the cluster. The cluster head node sets up a TDMA schedule and transmits

This schedule prevents collisions among data messages.


Visit www.agniece.blog.com for further details Ananth.R

EC

this schedule to all nodes in its cluster.

20 43

W IR

EL

cluster head.

ES S

Within each cluster, nodes take turns to assume the role of a

NE

clusters

TW

OR

KS

2. Low-Energy Adaptive Clustering Hierarchy (LEACH)

Clusters
TW
Larger Nodes denote Cluster Heads Visit www.agniece.blog.com for further details

EC

20 43

W IR

EL

ES S

NE

OR
Ananth.R

Base Station

KS

This allows each cluster node to turn off their radio

Each cluster is assigned a unique spreading code, which is

reduce interference with nearby clusters


Visit www.agniece.blog.com for further details Ananth.R

EC

Nodes are also required to adjust their transmit powers to

20 43

cluster head

W IR

used by all nodes in the cluster to transmit their data to the

EL

ES S

NE

achieved using direct-sequence spread spectrum (DSSS),

TW

Communications between a node and its cluster head are

OR

KS

components until its allocated time slots.

Upon receiving data packets from its cluster nodes, the cluster head aggregates the data before sending them to the base station.

Before transmitting data to the base station, the cluster head must sense the channel to ensure that no other cluster head is currently transmitting data using the base station spreading code If the channel is sensed busy, the cluster head delays the data transmission until the channel becomes idle

EC

http://en.wikipedia.org/wiki/Low_Energy_Adaptive_Clustering_Hierarchy

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

achieved using fixed spreading code and CSMA

OR

The communication between a cluster head and a base station is

KS

Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

Random Access-Based Protocols

TW

OR
Ananth.R

KS

coordination among the nodes accessing the channel.

EC

20 43

listening, overhearing, and excessive control overhead

Visit www.agniece.blog.com for further details

W IR

protocols, however, remains low due to collisions, idle

EL

The energy efficiency of contention-based MAC-layer

ES S

NE

TW

known as contention-based protocols, require no

OR

Traditional random access MAC-layer protocols, also

KS

Ananth.R

1. Power Aware Multi-access Protocol With Signaling (PAMAS)

reduce energy waste caused by idle listening


Visit www.agniece.blog.com for further details Ananth.R

EC

The protocol does not, however, provide mechanisms to

20 43

transceivers.

W IR

transmitting or receiving packets to turn off their radio

EL

CTS packets to allow nodes currently not actively

ES S

The protocol combines the use of a busy tone with RTS and

NE

using a separate signaling channel

TW

OR

PAMAS avoids overhearing among neighboring nodes by

KS

2. Sparse Topology And Energy Management (STEM)

wake-up radio channel.

The wake-up signal channel acts like a paging signal.

remain awake long enough to receive a session of packets.


Visit www.agniece.blog.com for further details Ananth.R

EC

When a node is awakened from its sleeping mode, it may

20 43

W IR

EL

When a node has data to transmit, it begins transmitting on the

ES S

another node is desired

NE

A node turns off its data radio channel until communication with

TW

up radio channel

OR

This uses two radio channels: a data radio channel and a wake-

KS

3. Timeout-MAC (T-MAC)
Used for applications characterized by low message rate To avoid collision and ensure reliable transmission, T-MAC communicate with each other listening by transmitting all messages in bursts of variable length.

EC

20 43

The basic idea of the T-MAC protocol is to reduce idle

Visit www.agniece.blog.com for further details

W IR

EL

nodes use RTS, CTS, and acknowledgment packets to

ES S

NE

and low sensitivity to latency

TW

OR

KS
Ananth.R

Hybrid Routing Protocols


NE
CEDAR -- Core Extraction Distributed Ad hoc Routing Protocol ZHLSZone based Hierarchical link state routing protocol

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

ZRPZone Routing Protocol

TW

OR
Ananth.R

KS

CEDAR

of service a link could provide.

nodes they dominate.


Visit www.agniece.blog.com for further details Ananth.R

EC

computation for the links with other core nodes on behalf of the

20 43

Core nodes which are dominators of normal nodes do the route

W IR

EL

The selection of routes is done with the consideration of the quality

ES S

links.

NE

set of nodes called the core tries to maintain stable high-bandwidth

TW

hierarchical routing approach

OR

KS

Core Extraction Distributed Ad Hoc Routing Protocol

The communication between core nodes is unicast.

A core node which needs a route tries to reach the furthest away core The furthest away core node also does a similar route computation. The path along the route is recorded in an array and the path from core node to core node are concatenated to form the final path

EC

20 43

Visit www.agniece.blog.com for further details

W IR

node on the shortest-widest path .

EL

ES S

Route computation:

NE

TW

OR

Links

between

core

nodes

are

called

KS

There will be a core node at every3 hops

virtual

links

Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

+ performs both routing and QoS guarantee. - core nodes becomes performance bottleneck.

NE

TW

OR
Ananth.R

Advantages & Disadvantages

KS

ZRP
Zone Routing Protocol It is either a proactive or reactive protocol

And using a reactive protocol for communication between these neighborhoods (Interzone Routing Protocol(IERP)).

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

local neighborhood (Intrazone Routing Protocol (IARP)),

ES S

It takes the advantage of pro-active discovery within a node's

NE

TW

OR
Ananth.R

KS

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

ZRP divides its network in different zones

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

Overlapping zones may cause more overhead. Decision on hop radius

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

Disadvantages

ES S

NE

an on demand protocol

TW

less control overhead as in a proactive protocol or

OR

KS
Ananth.R

Advantage

ZHLS
Based On The GPS

On the other hand, the protocol is reactive when the destination Clustering).

But in ZHLS the network is divided in non overlapping zones..


Visit www.agniece.blog.com for further details Ananth.R

EC

20 43

node isn't within the zone from the source node (Interzone

W IR

EL

zone (Intrazone Clustering).

ES S

The protocol is proactive when the destination node is in the same

NE

ZHLS is similar to the Zone Routing Protocol.

TW

OR

KS

Zone-Based Hierarchical Link State Protocol

Unlike other hierarchical protocol, there is no zone head.

Global positioning system.

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

The node knows its position and zone ID because of the

ES S

zone connectivity of the whole network.

NE

Each node only knows the connectivity within its zone and the

TW

transmission power and propagation characteristics.

OR

KS

The zone size depend on node mobility, network density,

Ananth.R

EC

20 43

Visit www.agniece.blog.com for further details

W IR

EL

ES S

NE

TW

OR
Ananth.R

KS

You might also like