will only work

Download Report

Transcript will only work

MANETS
Justin Champion
Room C203, Beacon Building
Tel 3292,
[email protected]
Content

Introduction
 Why
consider this
 Types of Network
 Issues in transferring data

Conclusion
Why is this a consideration

So far in lectures we have looked at cellular
networks
 These
are infrastructure based
The access points to the network never move
 The contents within the network will always be in the
same point
 The nodes once issued with a IP address will always
be connected at the same point

 The
university uses a fixed infrastructure network
 The Internet is based on a known structure to
route information between points
Infrastructure Based Network
B
HS1 HS2 OK1 OK2 PS
HS1 HS2 OK1 OK2 PS
1 2 3 4 5 6 7 8 9101112
COLACTSTA-
CONSOLE
Router
A
1 2 3 4 5 6 7 8 9101112
COLACTSTA-
CONSOLE
Other Types of Networks

PicoNets
 These
are a small network of a number of nodes
communicate
 Good example is Bluetooth with 1 master and 7
slaves communicating

Scatternets
 A Scatternet
is several Piconets sharing one
common device

These are all examples of adhoc networks
 Commonly
know as MANETS
Scatternet
PicoNet
PicoNet
device
device
device
device
device
device
device
PicoNet
device
device
device
device
device
device
Why is this a consideration

With mobile networks the infrastructure can
change
 Consider
the previous diagram of a Scatternet
 If all devices are accessing the network through
an access point

This will be fixed as a point into the network

As long as the device is within range
 AdHoc
networking consists of when there is no
set infrastructure

These are referred to as MANET’s

Mobile Ad hoc Networks (MANETS)
MANETS – why ?

Why ?
 By
having common communication standards
Allows all of the devices to communicate with each
other
 Wireless standards will be covered in another week

 No
installation required
The parties communicating can get together to transfer
information
 No prior knowledge of each other is required
 No agreement or identification is needed to start the
communications

MANETS –Common use

Usage
 Business meeting
 All of the parties at the meeting can receive the presentations
being used
 Business details can be exchanged
 Game players
 Come together for the game to play
 Afterwards then move to another group and join that game
 Sensor networks
 Where a number of wireless nodes are distributed
 Emergency Service use
 Allows a network to set quickly until full infrastructure can be
arranged
MANETS – $100 laptop

Designed to allow educational computing
power in regions of the world that currently
can not have it



This should connect them to the Internet and allow
people access to resources we take for granted
http://www.laptop.org/
Using a single connection to get all devices
networking

Each device will talk to its neighbours


http://www.silicon.com/research/specialreports/opens
ource/0,3800004943,39156063,00.htm
Uruguay has purchased 100,000 of these 29th Oct 07
 http://news.bbc.co.uk/1/hi/technology/7068084.st
m
MANETS – Usage

LANDroid
http://www.darpa.mil/ipto/solicitations/open/07-46_PIP.pdf
 Generating
a MANET and adjusting itself to
ensure optimal communications
MANET Demo
 All

Devices are in range
All devices receive all communications
Sending from A to C is
straightforward as no packet
routing is required
Range
A
B
Hand held computer
Hand held computer
C
Hand held computer
MANET Demo
 A wants

to communicate with C
Packets can be sent through B
Range
Range
Range
Hand held computer
Hand held computer
Hand held computer
A
B
C
Difficulties

Difficulty comes from
 Routing

Finding a route through the network
 Battery

Life
Other users could be using your limited battery
capability
 Security

information
Concerns
The routing party could also be taking copies of any
data transferred
Routing in a MANET
Range
Hand held computer
Range
Range
B
Hand held computer
Hand held computer
C
A
No Route from A to C !
Routing in a MANET

The nature of mobile networks indicates that
nodes move
 This
means that a route to a particular point may
also change
 Special protocols are used to keep the routing
table current

AdHoc routing protocols which come in two varieties
Re-active
 Only finds a route as and when required
 Pro-Active
 These always search for the best or better routes

Routing in a MANET

Examples of adhoc routing protocols
 Complete

en.wikipedia.org/wiki/Ad_hoc_protocol_list
 Example

techniques
Pro-active


list of all techniques
Wireless Routing Protocol (WRP)
Re-active

Temporarily Ordered Routing Algorithm (TORA)
Routing using WRP

Wireless Routing Protocol (WRP)
 Is

a table driven method of communicating
Each of the nodes will have a table which contains all
routes in the network

 The
For WRP these are four tables, Routing, distance, route cost
and message retransmission
method is proactive so
The routes are worked out before they are needed
 They are constantly updated



Giving a overhead to the network and the battery of the device
Even routes which may never be needed are
calculated and stored
Routing using WRP

WRP operates by
 Each
node must send a “hello” message within a
certain time-frame

If receiving nodes do not know the “hello” message
node the routing table is updated of all receiving nodes
 Each
node will forward the list of known routes to
all other neighbour nodes
Neighbour nodes are the ones within range of
transmissions
 The list is sent out periodically
 Sent out immediately in the event of a change to the
network

Routing using TORA

Temporally Ordered Routing Algorithm (TORA)
 Routes
are only created as required
 Packets are sent out asking for the destination node
This packet is then forwarded to each neighbouring node
 Until the destination is found or a break is discovered

 This
method may produce multiple routes to a
single destination

This is potentially good for load sharing
Sensor Network

These are a number of nodes distributed within an area

The nodes can be any size



Small would be located in a building to detect fire
Large would be placed at location detecting ground movements
An example from Intel is used to monitor ship vibration


They need

A source of power




http://www.intel.com/research/exploratory/sensornetwork_operation.htm
Battery or mains
Processing and detecting capabilities
Wireless Communication to transfer the information
A good research paper on this subject

http://ieeexplore.ieee.org/iel5/7384/32301/01507522.pdf?isnumber=&arn
umber=1507522, 2005

This link will only work within the university network
Sensor Network

These are a number of nodes distributed within an area

Instead of a few detectors, this uses a large number of small
detectors
Fire Detectors in a
Building
Fire Alarm
Central
Detector
Sensor(s)
Security

Forwarding packets allows multiple nodes to
get access to the data
 Security
is required if the data is confidential
 Easiest method is the use of Internet Protocol
Security (IPSEC)
Although available for IPv4, it is now mandatory for the
use of IPv6
 Either the data within the packet can be encrypted or


The entire packet can be placed inside another packet
encrypting everything
Security

Without security of some kind
 How

Consider the fire example previously


would you know a message is genuine
What would stop someone from sending a spurious signal to
active the fire system
Ensure your data is confidential

A
Are you happy for node B to be able to read/store everything
you send?
B
Packet 1
Packet 2
Packet 3
C
Battery

Mobile devices by there nature are battery
powered
 This



gives a limited amount of power to the device
The biggest use of this power is the wireless networking
Using adhoc networking some of the parties will drain the
battery without any benefit! (node B in the example below)
Also throughput is limited, so if B wishes to communicate part
of the available network speed is being used

It is about fair sharing of resources, with each device benefiting
A
B
Battery Power
C
Conclusion

We have looked at
 Networking
models
PicoNets
 ScatterNets
 MANETS


Considerations