Wednesday, January 23, 2013

Ad Hoc Networks Technologies and Protocols

Contents
List of Figures xi
xvii
List of Tables
Contributing Authors xix
Preface xxi
Acknowledgments xxiii
1
1
Ad Hoc Networks
Mario Gerla
1
1.1. Introduction and Definitions
1.1.1 Wireless Evolution 3
1.1.2 Ad hoc Networks Characteristics 4
1.1.3 Wireless Network Taxonomy 5
6
1.2. Ad Hoc Network Applications
1.2.1 The Battlefield 7
The Urban and Campus Grids: a case for opportunistic ad
1.2.2
hoc networking 10
12
1.3. Design Challenges
1.3.1 Cross Layer Interaction 12
1.3.2 Mobility and Scaling 13
Evaluating Ad Hoc Network Protocols - the Case for a Testbed 15
1.4.
Overview of the Chapters in this Book 17
1.5.
1.6. Conclusions 21
22
References
2
23
Collision Avoidance Procotols
J. J. Garcia-Luna-Aceves and Yu Wang
25
2.1. Performance of collision avoidance protocols 26
2.1.1 Approximate Analysis
35
2.1.2 Numerical Results
2.1.3 Simulation Results 39
Framework and Mechanisms for Fair Access in IEEE 802.11 44
2.2.
46
2.2.1 The Fairness Framework
2.2.2 Topology-Aware Fair Access 48
2.2.3 Simulation Results 54
58
2.3. Conclusion

References 60
3
63
Routing in Mobile Ad Hoc Networks
Mahesh K. Marina and Samir R. Das
63
Introduction
3.1.
Flooding 65
3.2.
66
3.2.1 Efficient Flooding Techniques
68
3.3. Proactive Routing
69
3.3.1 Distance Vector Protocols
3.3.2 Link State Protocols 70
3.3.3 Performance of Proactive Protocols 71
72
3.4. On-demand Routing
3.4.1 Protocols for On-Demand Routing 72
3.4.2 Optimizations for On-demand Routing 75
3.4.3 Performance of On-Demand Routing 77
77
3.5. Proactive Versus On-demand Debate
79
3.5.1 Hybrid Approaches
80
Location-based Routing
3.6.
3.6.1 Location-based Routing Protocols 81
3.6.2 Location Service Protocols 84
Concluding Remarks 84
3.7.
References 86
4
Multicasting in Ad Hoc Networks
Prasant Mohapatra‚ Jian Li‚ and Chao Gui
Introduction
4.1.
4.2. Classifications of Protocols
4.2.1 Dealing with Group Dynamics
4.2.2 Dealing with Network Dynamics
4.3. Multicasting Protocols
4.3.1 Multicast operations of AODV (MAODV)
4.3.2 Reliance on More Nodes
4.3.3 Reliance on Backbone Structure
4.3.4 Stateless Multicasting
4.3.5 Overlay Multicasting
4.3.6 Location Aided Multicasting
4.3.7 Gossip-Based Multicasting
Broadcasting
4.4.
Protocol Comparisons
4.5.
4.5.1 Network Size
4.5.2 Network Mobility
4.5.3 Multicast Group Size
4.6. Overarching Issues
4.6.1 Energy Efficiency
4.6.2 Reliable Multicasting
4.6.3 QoS-AwareMulticasting
4.6.4 Secure Multicasting
4.7. Conclusions and Future Directions 119
References 119
5
123
Transport Layer Protocols in Ad Hoc Networks
Karthikeyan Sundaresan‚ Seung-Jong Park‚ Raghupathy Sivakumar
Introduction 124
5.1.
TCP and Ad-hoc Networks
5.2. 125
5.2.1 TCP Background 126
5.2.2 Window-based Transmissions 127
5.2.3 Slow Start 129
5.2.4 Loss-based Congestion Indication 131
5.2.5 Linear Increase Multiplicative Decrease 132
5.2.6 Dependence on ACKs and Retransmission Timeouts 132
5.2.7 Absolute Impact of Losses 134
5.3. Transport Layer for Ad-hoc Networks: Overview 135
Modified TCP
5.4. 137
TCP-aware Cross-layered Solutions
5.5. 140
Ad-hoc Transport Protocol
5.6. 146
Summary 150
5.7.
References 151
6
153
Energy Conservation
Robin Kravets and Cigdem Sengul
Energy Consumption in Ad Hoc Networks 155
6.1.
6.1.1 Point-to-Point Communication 155
6.1.2 End-to-End Communication 157
6.1.3 Idle Devices 157
6.1.4 Energy Conservation Approaches 158
Communication-Time Energy Conservation 158
6.2.
6.2.1 Power Control 158
6.2.2 Topology Control 161
6.2.3 Energy-Aware Routing 172
Idle-time Energy Conservation 176
6.3.
6.3.1 Communication Device Suspension 176
6.3.2 Power Management 186
190
6.4. Conclusion
190
References
7
Use of Smart Antennas in Ad Hoc Networks
Prashant Krishnamurthy and Srikanth Krishnamurthy
Introduction
7.1.
Smart Antenna Basics and Models
7.2.
7.2.1 Antennas in Brief
7.2.2 Impotant Antenna Parameters
7.2.3 Directional Antenna Models
Medium Access Control with Directional Antennas
7.3.
7.3.1 The IEEE 802.11 MAC Protocol in Brief
7.3.2 Directional Transmissions and the IEEE 802.11 MAC protocol 203
7.3.3 Directional Medium Access Control with Omni-Directional
Receptions 204
7.3.4 Adding directional receptions: Directional Virtual Carrier
Sensing 206
7.3.5 The impact of increased directional range 208
7.3.6 The Multi-hop RTS MAC Protocol (MMAC) 210
7.3.7 Dealing with Deafness: The Circular RTS message 213
7.3.8 Other Collision Avoidance MAC Protocols 214
7.3.9 Scheduled Medium Access Control 215
217
7.4. Routing with Directional Antennas
7.4.1 On Demand Routing Using Directional Antennas 217
7.4.2 The Impact of Directional Range on Routing 218
7.4.3 A Joint MAC/Routing Approach 221
7.4.4 Remarks 222
7.5. Broadcast with Directional Antennas 222
7.5.1 Performance Issues in Broadcasting 223
7.5.2 Broadcast schemes with directional antennas 224
7.6. Summary 226
References 226
8
229
QoS Issues in Ad-hoc Networks
Prasun Sinha
Introduction
8.1. 229
Definition of QoS
8.2. 232
Physical Layer
8.3. 232
8.3.1 Auto Rate Fallback (ARF) 233
8.3.2 Receiver-Based Auto Rate (RBAR) 233
8.3.3 Opportunistic Auto Rate (OAR) 234
8.4. Medium Access Layer 234
8.4.1 802.11 Distributed Coordination Function (DCF) 234
8.4.2 802.11 Point Coordination Function (PCF) 236
8.4.3 The QoS Extension: 802.11e 236
8.4.4 QoS Support using DCF based Service Differentiation 238
8.5. QoS Routing 239
8.5.1 Core Extraction based Distributed Ad-hoc Routing (CEDAR) 240
8.5.2 Ticket based routing 241
8.6. QoS at other Networking Layers 242
Inter-Layer Design Approaches
8.7. 242
8.7.1 INSIGNIA 243
8.7.2 Cross-Layer Design for Data Accessibility 243
Conclusion
8.8. 244
References 246
9
Security in Mobile Ad-Hoc Networks
Yongguang Zhang‚ Wenke Lee
9.1. Vulnerabilities of Mobile Ad Hoc Networks

Contents ix
9.2. Potential Attacks 251
Attack Prevention Techniques
9.3. 253
9.3.1 Key and Trust Management: Preventing External Attacks 253
9.3.2 Secure Routing Protocols: Preventing Internal Attacks 254
9.3.3 Limitations of Prevention Techniques 255
9.4. Intrusion Detection Techniques 256
9.4.1 Architecture Overview 256
9.4.2 A Learning-Based Approach 259
9.4.3 Case Study: Anomaly Detection for Ad-Hoc Routing Proto-
cols 261
Conclusion 264
9.5.
References 265
Index

No comments:

Post a Comment