Unit Iii Routing Protocols and Transport Layer in Ad Hoc Wireless Networks
Unit Iii Routing Protocols and Transport Layer in Ad Hoc Wireless Networks
Unit Iii Routing Protocols and Transport Layer in Ad Hoc Wireless Networks
Networks.
INTRODUCTION
Bandwidth Constraint
Abundant bandwidth is available in wired networks due to the
advent of fiber optics and due to the exploitation of wavelength
division multiplexing (WDM) technologies.
In a wireless network, the radio band is limited, and hence the
data rates it can offer are much less than what a wired network can
offer.
This requires that the routing protocols use the bandwidth
optimally by keeping the overhead as low as possible.
The limited bandwidth availability also imposes a constraint on
routing protocols in maintaining the topological information.
ISSUES IN DESIGNING A ROUTING PROTOCOL
Ex: consider figure 1. Here, if both node A and node C transmit to node B at
the same time, their packets collide at node B. This is due to the fact that both
node A and C are hidden from each other, as they are not within the direct
transmission range of each other and hence do not know about the presence of
each other.
Solution for this problem include medium access collision avoidance (MACA):
Transmitting node first explicitly notifies all potential hidden nodes about the
forthcoming transmission by means of a two way handshake control protocol
called RTS-CTS protocol exchange. This may not solve the problem completely
but it reduces the probability of collisions.
Medium access collision avoidance for wireless (MACAW):
1. An improved version of MACA protocol.
2. Introduced to increase the efficiency.
3. Requires that a receiver acknowledges each successful reception of data
packet.
Successful transmission is a four-way exchange mechanism, RTS-CTS-Data-ACK,
as illustrated in figure 2.
ISSUES IN DESIGNING A ROUTING PROTOCOL
Resource Constraints
Two essential and limited resources are battery life and processing power.
Devices used in adhoc wireless networks require portability, and hence they
also have size and weight constraints along with the restrictions on the power
source.
Increasing the battery power and processing ability makes the nodes bulky and
less portable.
Characteristics of an Ideal Routing Protocol
1. Induced Traffic:
In a path having multiple link, the traffic at any given link (or
path) due to the traffic through neighbouring links (or paths) is
referred to as induced traffic.
This is due to the broadcast nature of the channel and the
location-dependent contention on the channel.
Induced Traffic affects the throughput achieved by the transport
layer protocol.
2. Induced throughput unfairness:
This refers to the throughput unfairness at the transport layer
due to the throughput/delay unfairness existing at the lower layer
such as the n/w and MAC layers.
A transport layer should consider these in order to provide a fair
share of throughput across contending flows
ISSUES IN DESIGNING A TRANSPORT LAYER PROTOCOL
5. Interpretation of congestion:
Clarification of network congestion as used in traditional
networks is not appropriate in ad hoc networks.
This is because the high error rates of wireless channel, location-
dependent contention, hidden terminal problem, packet collisions
in the network, path breaks due to mobility of nodes, and node
failure due to drained battery can also lead to packet loss in ad hoc
wireless networks
6. Completely decoupled transport layer:
Another challenge faced by Transport layer protocol is the
interaction with the lower layers.
Cross-layer interaction between the transport layer and lower
layers is important to adapt to the changing network environment
ISSUES IN DESIGNING A TRANSPORT LAYER PROTOCOL
7. Dynamic topology:
Experience rapidly changing network topology due to mobility of
nodes.
Leads to frequent path breaks, partitioning and remerging of
networks & high delay in reestablishment of paths
Performance is affected by rapid changes in network topology.
DESIGN GOALS OF A TRANSPORT LAYER PROTOCOL
In figure 1, source node initiates the RouteRequest to the flooded for finding a route to the
destination node
Solid lines represent stable links. Dotted lines represent unstable links. ABR uses
stability information only during the route selection process at the destination node.If a
link break occurs at an intermediate node, the node closer to the source, which detects the
break, initiates a local route repair process.
In this process, the node locally broadcasts a route repair packet, termed the local query
(LQ) broadcast, with a limited time to live (TTL), as shown in figure 2. This way a broken
link is bypassed locally without flooding a new RouteRequest packet in the whole
network.
ON-DEMAND ROUTING PROTOCOLS
6. Signal Stability-Based Adaptive Routing Protocol (SSA)
Uses signal stability as the prime factor for finding stable routes.
This protocol is beacon-based, in which signal strength of the
beacon is measured for determining link stability.
The signal strength is used to classify a link as stable or unstable.
This protocol consists of two parts: forwarding protocol (FP) and
dynamic routing protocol (DRP).
These protocols use an extended radio interface that measures
the signal strength from beacons.
DRP maintains the routing table by interacting with the DRP
processes on other hosts.
FP performs the actual routing to forward a packet on its way to
the destination.
Every node maintains a table that contains the beacon count and
the signal strength of each of its neighbors.
ON-DEMAND ROUTING PROTOCOLS
If a node receives strong beacons, then link is classified as
strong/stable link. The link is otherwise classified as weak/unstable
link.
Each node maintains a table called the signal stability table
(SST) which is based on the signal strengths of its neighbors’
beacons.
This table is used by the nodes in the path to the destination to
forward the incoming RouteRequest over strong links for finding
the most stable end-to-end path.
A source node which does not have a route to the destination
floods the network with RouteRequest packets.
SSA protocol process a RouteRequest only if it is received over
a strong link.A RouteRequest received through a weak link is
dropped without being processed.
The destination selects the first RouteRequest packet received
over strong links. The destination initiates a RouteReply packet to
ON-DEMAND ROUTING PROTOCOLS