Adhoc Assignment 1 Answer
Adhoc Assignment 1 Answer
and real-time data requires explicit support from the MAC protocol.
Resource reservation: The provisioning of QoS defined by
parameters such as
bandwidth, delay, and jitter requires reservation of resources such
as
bandwidth, buffer space, and processing power.
Ability to measure resource availability: In order to handle the
resources
such as bandwidth efficiently and perform call admission control
based on their
availability, the MAC protocol should be able to provide an
estimation of
resource availability at every node. This can also be used for
making
congestion control decisions.
Capability for power control: The transmission power control
reduces the
energy consumption at the nodes, causes a decrease in interference
at
neighboring nodes, and increases frequency reuse.
Adaptive rate control: This refers to the variation in the data bit
rate achieved
over a channel. A MAC protocol that has adaptive rate control can
make use of
a high data rate when the sender and receiver are nearby &
adaptively reduce
the data rate as they move away from each other.
1.3.2 Routing
1.3.3 Multicasting
It plays important role in emergency search & rescue operations
& in military
communication. Use of single link connectivity among the nodes in
a multicast group
QoS-aware routing
Finding the path is the first step toward a QoS-aware routing
protocol.
The parameters that can be considered for routing decisions are,
Network throughput.
Packet delivery ratio.
Reliability.
Delay.
Delay jitter.
Packet loss rate.
Bit error rate.
1.3.6 Self-Organization
One very important property that an ad hoc wireless network
should exhibit is
organizing & maintaining the network by itself.
Neighbour discovery.
Topology organization &
Topology reorganization (updating topology information)
1.3.7 Security
Security is an important issue in ad hoc wireless network as the
information can be
hacked.
Attacks against network are two types
Passive attack → Made by malicious node to obtain information
transacted in
the network without disrupting the operation.
Active attack → They disrupt the operation of network.
Further active attacks are two types
External attack: The active attacks that are executed by nodes
outside the
network.
Internal attack: The active attacks that are performed by nodes
belonging to
the same network.
1.3.10 Scalability
Scalability is the ability of the routing protocol to scale well in a
network with a large
number of nodes.
It requires minimization of control overhead & adaptation of the
routing protocol to
the network size.
1.3.11 Deployment Considerations
The deployment of a commercial ad hoc wireless network has
the following benefits
when compared to wired networks
Low cost of deployment
Reconfigurability
The cost involved in reconfiguring a wired network covering a
Metropolitan Area Network (MAN) is very high compared to that
of an
ad hoc wireless network covering the same service area.
Clearly, the cost of each sensor node has to be kept low for the global
metrics to be
acceptable. Depending on the application of sensor network, large number
sensors
might be scattered randomly over an environment, such as weather monitoring.
If the overall cost was appropriate for sensor networks and it will be more
acceptable
and successful to users which need careful consideration.
Limited Bandwidth
Bandwidth limitation directly affects message exchanges among sensors,
and
synchronization is impossible without message exchanges.
Sensor networks often operate in a bandwidth and performance constrained
multi-hop
wireless communications medium. Presently, wireless communication is
limited to a
data rate in the order of 10–100 Kbits/second.
Scalability to large scale of deployment
In some applications, tens of thousands of sensors might be deployed. At
any time
numbers of nods can be increased or decreased. A synchronization scheme
should
scale well with increasing number of nodes and/or high density in the network.
Fault-Tolerance
In a hostile environment, a sensor node may fail due to physical damage or
lack of
energy (power). If some nodes fail, the protocols that are working upon must
accommodate these changes in the network. As an example, for routing or
aggregation protocol, they must find suitable paths or aggregation point in case
of
these kinds of failures.
Multi-hop communication
The need for multi-hop communication arises due to the increase in the size
of
wireless sensor networks. In such settings, sensors in one domain communicate
with
sensors in another domain via an intermediate sensor that can relate to both
domains.
Communication can also occur as a sequence of hops through a chain of pair-
wise
adjacent sensors.
Design Constraints
The primary goal of wireless sensor design is to create smaller, cheaper, and
more
efficient devices.
A variety of additional challenges can affect the design of sensor nodes and
wireless
sensor networks. WSN have challenges on both software and hardware design
models
with restricted constraints.
An energy consumption model for sensors based on the observation that the
energy
consumption would likely be dominated by the data communications
subsystem.
Table 2.1 reproduces their model. The energy level is mentioned by Joules.
Table 2.1 Radio Characteristics, Classical model
where αamp and βamp are constants depending on process technology and
amplifier
architecture.
2.3.3 Software
Energy is the scarcest resource of WSN nodes, and it determines the lifetime
of
WSNs. WSNs may be deployed in large numbers in various environments,
including
remote and hostile regions, where ad hoc communications are a key
component.
For this reason, algorithms and protocols need to address the following
issues:
Increased lifespan
Robustness and fault tolerance
Self-configuration
Lifetime maximization: Energy/Power Consumption of the sensing device
should be
minimized and sensor nodes should be energy efficient since their limited
energy
resource determines their lifetime. To conserve power, wireless sensor nodes
normally power off both the radio transmitter and the radio receiver when not
in use
2.3.4 Routing protocols
Wireless sensor networks are composed of low-energy, small-size, and low-
range
unattended sensor nodes. Recently, it has been observed that by periodically
turning
on and off the sensing and communication capabilities of sensor nodes, we can
significantly reduce the active time and thus prolong network lifetime.
However, this duty cycling may result in high network latency, routing
overhead, and
neighbour discovery delays due to asynchronous sleep and wake-up
scheduling.
These limitations call for a countermeasure for duty-cycled wireless sensor
networks
which should minimize routing information, routing traffic load, and energy
consumption.
2.3.5 Operating systems
Operating systems for wireless sensor network nodes are typically less
complex than
general-purpose operating systems.
They more strongly resemble embedded systems, for two reasons. First,
wireless
sensor networks are typically deployed with a particular application in mind,
rather
than as a general platform. Second, a need for low costs and low power leads
most
wireless sensor nodes to have low-power microcontrollers ensuring that
mechanisms
such as virtual memory are either unnecessary or too expensive to implement.
2.4 WSN Application Examples
Wireless sensor network (WSN) refers to a group of spatially dispersed and
dedicated
sensors for monitoring and recording the physical conditions of the
environment and
organizing the collected data at a central location.
Wireless sensor networks can be used to monitor and track elders and
patients for
health care purposes, which can significantly relieve the severe shortage of
health care
personnel and reduce the health care expenditures in the current health care
systems.
For example sensors can be deployed in a patient’s home to monitor the
behaviors of
the patient. It can alert doctors when the patient falls and requires immediate
medical
attention.
An example of this is ‘artificial retina’ which helps the patient in detecting
the
presence of light and the movement of objects.
2.4.4 Home Intelligence
Wireless sensor networks can be used to provide more convenient and
intelligent
living environments for human beings.
For example, wireless sensors can be used to remotely read utility meters in
a home
like water, gas, electricity and then send the readings to a remote centre
through
wireless communication
2.4.5 Industrial Process Control
In industry, WSNs can be used to monitor manufacturing process or the
condition of
manufacturing equipment.
For example, chemical plants or oil refiners can use sensors to monitor the
condition
of their miles of pipelines. These sensors are used to alert in case of any
failures
occurred.
2.4.6 Agriculture
Sensors used in smart farming are known as agriculture sensors.
These sensors provide data which assist farmers to monitor and optimize
crops by
adapting to changes in the environmental conditions. These sensors are
installed on
weather stations, drones and robots used in the agriculture industry.
2.4.7 Structural Monitoring
Wireless sensors can be used to monitor the movement within buildings and
infrastructure such as bridges, flyovers, embankments, tunnels etc... enabling
Engineering practices to monitor assets remotely without the need for costly
site
visits, as well as having the advantage of daily data, whereas traditionally this
data
was collected weekly or monthly, using physical site visits, involving either
road or
rail closure in some cases.
Duty cycle is measured as the ratio of the listening period length to the wake-up
period length which gives an indicator of how long a node spends in the listening
period.
For example, the node A transmit a short beacon at the beginning of its listen period to
indicate its willingness to receive packets. Another method is to let node B send
frequent request packets until one of them hits A’s listen period and is really answered
by A. However, in either case, node A only receives packets during its listen period. If
node A itself wants to transmit packets, it must acquire the target’s listen period. A
whole cycle consisting of sleep period and listen period is also called a wakeup
period.
Important Observations
By choosing a small duty cycle, the transceiver is in sleep mode most of the
time, avoiding idle listening and conserving energy.
By choosing a small duty cycle, the traffic directed from neighbouring nodes
to a given node concentrates on a small time window (the listen period) and in
heavy load situations significant competition can occur.
Choosing a long sleep period induces a significant per-hop latency, since a
prospective transmitter node has to wait an average of half a sleep period
before the receiver can accept packets. In the multi-hop case, the per-hop
latencies add up and create significant end-to-end latencies.
Sleep phases should not be too short lest the start-up costs outweigh the
benefits.
3.4 S-MAC
The S-MAC (Sensor-MAC) protocol provides mechanisms to avoid idle listening,
collisions, and overhearing.
S-MAC adopts a periodic wakeup scheme, with virtual cluster features as shown in
Figure 3.2. Basically a network is formed as a flat single-hop topology and S-MAC
utilises only one frequency channel for communication.
The listen period of S-MAC can be used to receive and transmit packets. The listen
period is fixed at 115 ms and the wake-up period can take up to hundreds of
milliseconds. Thus the sleep period is adjustable. Within a cluster, all the nodes are
synchronised such that all the nodes can wake up at the same time.
Figure 2 S-MAC Scheme
A node x’s listen period is subdivided into three different phases. There are
SYNCH Phase
RTS Phase
CTS Phase
SYNCH Phase
Node x accepts SYNCH packets from its neighbors. In these packets, the neighbors
describe their own schedule and x stores their schedule in a table (schedule table).
Node x’s SYNCH phase is subdivided into time slots and x’s neighbors contend
according to a CSMA scheme with additional backoff, that is, each neighbour y
wishing to transmit a SYNCH packet picks one of the time slots randomly and starts
to transmit if no signal was received in any of the previous slots.
In the other case, y goes back into sleep mode and waits for x’s next wakeup. In the
other direction, since x knows a neighbour y’s schedule, x can wake at appropriate
times and send its own SYNCH packet to y (in broadcast mode).
It is not required that x broadcasts its schedule in every of y’s wakeup periods.
However, for reasons of time synchronization and to allow new nodes to learn their
local network topology, x should send SYNCH packets periodically. The according
period is called synchronization period.
RTS Phase
Node x listens for RTS packets from neighbouring nodes. In S-MAC, the RTS/CTS
handshake is used to reduce collisions of data packets due to hidden-terminal
situations.
CTS Phase
Node x transmits a CTS packet if an RTS packet was received in the previous phase.
After this, the packet exchange continues, extending into x’s nominal sleep time.
3.4.1 Network Allocation Vector (NAV) Approach
In general, when competing for the medium, the nodes use the RTS/CTS handshake,
including the virtual carrier-sense mechanism, whereby a node maintains a NAV
(Network Allocation Vector) variable. The NAV mechanism can be readily used to
switch off the node during ongoing transmissions to avoid overhearing.
3.4.2 Virtual Cluster
The S-MAC protocol allows neighbouring nodes to agree on the same schedule and to
create virtual clusters. The clustering structure refers solely to the exchange of
schedules; the transfer of data packets is not influenced by virtual clustering.
The S-MAC protocol proceeds as follows to form the virtual clusters: A node x,
newly switched on, listens for a time of at least the (globally known) synchronization
period.
If x receives any SYNCH packet from a neighbour, it adopts the announced schedule
and broadcasts it in one of the neighbours’ next listen periods. In the other case, node
x picks a schedule and broadcasts it.
If x receives another node’s schedule during the broadcast packet’s contention period,
it drops its own schedule and follows the other one. It might also happen that a node x
receives a different schedule after it already has chosen one, for example, because bit
errors destroyed previous SYNCH packets.
If node x already knows about the existence of neighbors who adopted its own
schedule, it keeps its schedule and in the future has to transmit its SYNCH and data
packets according to both schedules.
On the other hand, if x has no neighbour sharing its schedule, it drops its own and
adopts the other one. Since there is always a chance to receive SYNCH packets in
error, node x periodically listens for a whole synchronization period to relearn its
neighbourhood. This makes the virtual cluster formation fairly robust.
3.4.3 Message Passing Approach
S-MAC also adopts a message-passing approach (illustrated in Figure 3.3), where a
message is a larger data item meaningful to the application. In-network processing
usually requires the aggregating node to receive a message completely.
On the other hand, on wireless media, it is advisable to break a longer packet into
several shorter ones.
S-MAC includes a fragmentation scheme working as follows. A series of fragments is
transmitted with only one RTS/CTS exchange between the transmitting node A and
receiving node B. After each fragment, B has to answer with an acknowledgment
packet. All the packets (data, ack, RTS, CTS) have a duration field and a
neighbouring node C is required to set its NAV field accordingly.
In S-MAC, the duration field of all packets carries the remaining length of the whole
transaction, including all fragments and their acknowledgments. Therefore, the whole
message shall be passed at once.
If one fragment needs to be retransmitted, the remaining duration is incremented by
the length of a data plus ack packet, and the medium is reserved for this prolonged
time. However, there is the problem of how a nonparticipating node shall learn about
the elongation of the transaction when he has only heard the initial RTS or CTS
packets.