+ All Categories
Home > Documents > Chapter 15

Chapter 15

Date post: 30-Dec-2015
Category:
Upload: quincy-mcneil
View: 16 times
Download: 2 times
Share this document with a friend
Description:
Chapter 15. Recent Advances. Outline. Ultra-Wideband Technology. Multimedia Services Requirements. Mobility Management for Integrated Systems. Multicast in Wireless Networks. MANET Route Maintenance/Repair. Design Issues in Sensor Networks. Bluetooth Networks Low Power Design XML - PowerPoint PPT Presentation
53
1 Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. Chapter 15 Recent Advances
Transcript

1Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Chapter 15

Recent Advances

2Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Outline

Ultra-Wideband Technology. Multimedia Services Requirements. Mobility Management for Integrated Systems. Multicast in Wireless Networks. MANET Route Maintenance/Repair. Design Issues in Sensor Networks. Bluetooth Networks Low Power Design XML Threats and Security Issues

3Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Ultra-Wideband Technology (UWB)

UWB Radio : Radio System having large bandwidth. Bandwidth > 25% of center frequency or > 1 GHz.

Wide bandwidth makes it possible to share spectrum with other users with certain co-coverage sense.

Wide band signals are natural for location determination applications.

4Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

UWB Basics – Time Modulated (TM-UWB)

Basic element: Ultra short monocycle wavelet. Wavelet pulse width between 0.2 and 1.5 nsecs. Center frequency between 5 GHz and 600 MHz. Pulse-to-pulse interval between 25 and 1000 nsecs.

System uses pulse position modulation. No Intermediate frequency stage.

Reduces complexity. Single bit of information is spread over multiple

monocycels.

5Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

TM-UWB Modulation and DSC-UWB

Pulse position modulation Positions signal one quarter cycle early or late relative

to the nominal PN coded location or pulse polarity. Modulation further smoothes the spectrum of the

signal, thus making the system less detectable. Direct Sequence phase Coded (DSC)-UWB

Wavelet pulse trains at duty cycles approaching that of a sine wave carrier are direct sequence modulated to spread the signal. A PN sequence provides spectrum spreading, channelization and modulation.

6Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

UWB Signal Propagation

Generally follow a free space propagation law. Millions of coded pulses transmitted per second. Emissions below conventional receiver noise floor

and across an ultra wide bandwidth. Very low extant RF signature, providing intrinsically

secure transmissions. Low probability of detection and interception.

7Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

UWB Capabilities

Communications: Noise like spectral characteristics of UWB signals

enables secure communication with less detection. Suitable for robust in-building communications.

Advanced Radar Sensing: Through the wall radar, terrain mapping radar,

ground penetrating radar. Precision Location and Tracking:

Remote, secure and real time tracking system.

8Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

UWB Applications

High Performance Wireless Home Network To support a bit rate of at least 50 Mbps. Simultaneous data transmission from multiple digital

devices, high speed and affordable connectivity between devices and full motion video.

An UWB Communication link for Unmanned Vehicle applications UWBs low cost, all-digital design, small size , light

weight , LPI/D (probability of interception or detection) and AJ (anti-jam) makes it ideal for unmanned vehicle applications.

9Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

UWB Advantages - Limitations

UWB radio systems have large bandwidth (> 1 GHz). UWB has potential to address today’s “spectrum drought”. Emissions below conventional level. Single technology with 3 distinct capabilities. Secure transmission, low probability of interception or

detection and anti-jam immunity. Not appropriate for a WAN (Wide Area Network)

deployment such as wireless broadband access. UWB devices are power limited

10Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multimedia Service Requirements

Two trends distinguish multimedia requirements with respect to telecommunications – increasing demand for bandwidth, and a transparent support for user mobility.

On today’s internet, 90% of the traffic uses TCP, while 80% of the networking is done over the IP network.

Hence, multimedia streaming over IP has become a major issue.

The QoS of a network is defined by various parameters such as bandwidth, latency, jitter, packet loss and packet delay.

11Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multimedia Service Requirements

ETSI (European Telecommunications Standardization Institute) has introduced four classes of services with class 1 being best efforts service and class 4 being QoS guaranteed service.

Some standards need to be defined in the following areas to form complete streaming systems – media codecs, transport protocols, media control, file formats, and capability exchange.

Media codecs are comprised of MPEG-1, MPEG-2, and MPEG-4.

MPEG-1 and MPEG-2 are limited to audio/video compression.

12Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multimedia Service Requirements

MPEG-4 on the other hand describes the coded representation of natural and synthetic multimedia objects.

The objects may include images, video, audio, text, graphics, and animation.

MPEG-4 audio capabilities include tools for speech, audio, voice synthesis, composition and scalability.

Two file formats are found in MPEG-4. One is based on the Apple quick time format and the other is based on the Microsoft ASF (Advanced Stream Format).

13Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multimedia Service Requirements

HTTP (Hyper Text Transfer Protocol) is a very simple and widely used way to stream media files.

Works with regular web servers and does not require a special media server.

In MPEG-4 systems, the transport streams is divided into 4 layers – compression layer, synchronization layer, flexmux layer and transport layer.

A media control protocol needs to support issues of file seek, bandwidth scalability and live streaming.

14Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Some Multimedia Protocols

The Real-time streaming protocol (RTSP) establishes and controls time synchronized streams of continuous media such as audio and video.

The Session initiating protocol (SIP) is an application-layer control protocol for creating, modifying and terminating sessions with one or more users.

IP broad-band networks have also caught the attention of researchers in recent times.

15Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

The next generation of wireless mobile networks have been designed to support both real-time and non real-time service.

Mobility management has to be taken into consideration while designing the infrastructure.

Mobility management features two tasks - location management and handoff management.

Efficient handoff design schemes are essential in ensuring good QoS in integrated wireless networks.

Criteria for handoff initiation need to be selected carefully.

16Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

Some handoff criteria currently in use are word error indicator, received signal strength and quality indicator.

Handoff strategy for integrated wireless networks has to be different for different services. As an example, handoff interruptions in real-time services are very undesirable.

On the other hand, interruptions are not so critical in non real-time applications.

In order to provide better QoS with limited frequency spectrum reuse, various handoff schemes have been proposed.

17Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

Some guard channels in each BS are reserved for handoff request calls. Such a request will have a higher priority over an originating call.

The guard channels are subject to availability. In a queuing based priority handoff scheme, each BS has

one or more queuing buffers for all incoming calls. A call is serviced immediately if there is an available channel.

Otherwise, the call is stored in a queue and is not dropped/blocked.

When a channel is released, the first call in the queue is picked.

18Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

The queue operates on a first-in-first-out basis. Current issues of interest are: How many queues should be

allocated to a BS, and what kind of service call should be included into the queue?

One way of giving priority reservation to real-time service handoff requests is to reserve a number of channels for real-time service handoff requests.

Queues are allowed for real-time service handoff requests and non-real-time service handoff requests.

A non-real-time request can be transferred to another queue when the MS moves out of the cell.

19Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

A service dependent priority handoff scheme for integrated wireless networks has been proposed in [27, 28].

Calls are divided into four different service types: originating real-time service calls, originating non-real-time service calls, non real-time service handoff request calls and real-time service handoff request calls.

Correspondingly, the channels in each cell are divided into three groups, one each for real-time service calls, non real-time service calls and overflowed handoff requests from the previous two groups.

20Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

Some channels are reserved exclusively for real-time service handoff requests.

Hence, real-time service handoff requests have priority over non-real-time service handoff requests and all handoff requests have priority over originating calls.

Current issues of interest include the introduction of a preemptive priority procedure that gives real-time service handoff requests a higher priority over non real-time service handoff requests.

Individual queues will be added for both real-time and non real-time requests.

21Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Mobility Management

The non real-time service handoff requests waiting in the queue can be transferred from the current base station to one of the target base stations when the mobile user moves out of the current cell before it gets service.

22Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Range Based MoM (RBMoM) An enhancement of MoM. RBMoM provides a trade off between the shortest delivery path

and the frequency of the multicast tree reconfiguration. It selects a router called multicast home agent (MHA), which is

responsible for tunneling multicast packets to FA to which the MH is currently subscribed within its service range.

If a mobile host is out of service range, then an MHA handoff will occur.

Every MH can have only one MHA, which changes dynamically as per the location of the MH, whereas the HA of an MH never changes.

23Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Multicast for Mobility Protocol (MMP): It combines Mobile IP and CBT where the former

controls communication up to the foreign network, and the latter manages movement of hosts inside them.

It assumes the foreign domain to form a hierarchy of multicast supporting routers.

Similar to the concept of FA, base stations acting as a multicast router transmit periodic beacons, which include one multicast care-of address.

24Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Multicast for Mobility Protocol (MMP) (cont’d): Upon acquiring a care-of address, the MH sends a

registration message to the base station, which triggers a multicast tree join and transmits a CBT join request to the core.

The core takes care of relaying the registration request to the HA of the MH by replacing the CoA to its own address, thus hiding the multicast part of the protocol and acting as a sole foreign agent.

25Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Reliable Multicast Data Distribution Protocol (RMDP): Uses Forward Error Correction (FEC) and Automatic

Retransmission reQuest (ARQ) information to provide reliable transfer. Redundant information is inserted into the FEC, often enabling a receiver to reconstruct the original packet.

In the event that such information is not enough, an ARQ is sent to the multicast source which in turn, multicasts the requested packet to all receivers.

26Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Reliable Multicast Data Distribution Protocol (RMDP) (cont’d): In RMDP, a data object to be transmitted is a file,

identified by a unique name, say its Uniform Resource Locator (URL).

The file has a finite size, and is split into packets of s bytes each. RMDP uses an (n, k) encoder with n >> k to generate packets for transmission, and assumes the existence of a multicast network which provides unreliable, but efficient delivery of data packets.

27Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Reliable Multicast Data Distribution Protocol (RMDP) (cont’d): Limitations:

In RMDP, data encoding/decoding is done through software resulting in a processing overhead and, therefore, performance degradation.

In case of burst errors, a lot of ARQ packets are generated. This triggers a substantial amount of retransmission packets, which are multicast to all receivers.

28Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Reliable Mobile Multicast Protocol (RM2): RM2 is a hierarchical protocol, which divides a

multicast tree into sub-trees where subcasting within these smaller regions is applied using a tree of retransmission servers (RSs).

RS have a retransmission subcast address shared by its members and which may be dynamically configured using IETF’s MADCAP (Multicast Address Dynamic Client Allocation Protocol).

29Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

Reliable Mobile Multicast Protocol (RM2) (cont..): In order to guarantee end-to-end reliability, the

receivers are required to send NACKs, pointing out the packets to be retransmitted. In other words, RM2 implements selective packet retransmission.

RM2 adopts a retransmission algorithm that dynamically switches between unicast and multicast modes to save network and wireless resources.

30Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Multicast in Wireless Networks

A Comparison of IP based Wireless Multicast Routing Protocols

  

Mobility Protocol

 

Optimal Routing Reliability

Packet Redundancy

Multicast Protocol

Dependency

Join & Graft delays

Remote Subscription

    Mobile IP

 

Yes 

No 

No Independent 

Yes

Bi-directional Tunneling

 

No 

No 

Yes Independent

 

No

MoM No No Minimal Independent No

MMP No No Minimal CBT No

Mobicast Yes No Minimal Independent Yes

RMDP No Yes Yes Independent Yes

RM2 Yes Yes No Independent Yes

31Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Destination node

Source node

Node Movement

A

B

C

D

Original path

New path

Localized Route Repair

32Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Localized Route Repair

The major task of routing mobile stations in a MANET is to find a route to the destination MS quickly.

Route maintenance/repair are also major issues in such networks as they aim at the reduction of the data losses that may occur otherwise.

Existing protocols such as DSR, and AODV stick with a fixed route between a source destination pair till it is expired or broken.

Route maintenance addresses the problem that arises when a route becomes bad/broken due to host mobility.

33Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Localized Route Repair

With route optimization, mobile hosts need to collect as much fresh information as possible with the least cost.

In the event of a route failure, a local route recovery process is performed before the problem is reported to the source. An illustrative example is shown.

Node B moves away from the current route between the source and the destination. Node A, on finding its connection to B broken, broadcasts a ROUTE_REQ packet with a small hop limit.

34Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Localized Route Repair

In the next step, nodes near A send a normal ROUTE_REPLY packet to rebuild the route. The initiator of the ROUTE_REQ sets a timer so that it can send a normal route error packet to sources node if the broken route is not rebuilt.

Various route repair techniques for MANETs demonstrate the effect of relative node velocity, node density, and communication range on the scalability of a routing protocol.

35Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Robustness Stability against task dynamics Scalability Energy efficiency Providing quality of service for time critical

applications

Sensor Network Design Challenges

36Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

COUGAR, which was developed at Cornell is a model for distributed query execution in sensor networks.

Fantastic data LLC (logical Link Control) have developed a Web database system which adapts to data criticality requirements and power consumption.

Sensor Network Databases

37Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Sensor Networks require efficient beam-forming algorithm to collaborate and aggregate the data that they gather periodically.

The algorithms and methods employed for collaborative sensing strongly influence the overall performance of ad hoc networked sensors

Collaborative Information Processing

38Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

TinyOS developed at Berkeley is an ultra-low power sensor network platform that enables low cost deployment of the sensor network.

MagnetOS developed at Cornell is a single system image (SSI) operating system in which the entire ad hoc network looks like a single Java virtual machine.

OS Design for Sensor Networks

39Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Bluetooth Networks

Bluetooth wireless technology enables links between mobile computers, mobile phones, portable handheld devices, and connectivity to the internet.

Despite using a frequency hopping scheme, bluetooth devices experience a drop in throughput due to interference because of WLAN and WPAN operations.

A mathematical model has been derived for packet success probability due to interference [46].

The interference in bluetooth networks has been found to be intermittent in nature.

40Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Bluetooth Interference

According to the IEEE 802.15.2 WG, two classes of coexistence mechanisms are possible – collaborative and non-collaborative.

If it is possible for the WLAN and WPAN to exchange information, then the collaborative mechanism may be used. Otherwise, the non-collaborative mechanism needs to be used.

An example of such a non-collaborative mechanism is IBLUES. It employs dynamic packet segmentation to mitigate interference effects on Bluetooth devices.

41Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Bluetooth Networks

Bluetooth standard defines different packet types to adjust to different application requirements.

They range from the single 1-slot packet to the FEC encoded 5-slot packet.

The onus of choosing the packet is on the application. The adaptation layer is responsible for receiving

messages from the upper layers and segmenting them into smaller pieces of data.

The small pieces of data can fit into the Bluetooth standard packet.

42Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Bluetooth Networks

According to a study, different packets should be employed according to the interference levels.

The Bluetooth communication substrate consists of a radio, baseband, link controller, and link manager layers.

Bluetooth specification alludes to the concept of internetworking multiple piconets called scatternets.

Some major challenges need to be addresses first – a) topology formation, b) link scheduling, and c) packet scheduling.

43Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Need for Low Power Design

Limited energy of ad hoc and sensor network nodes. Not easily replaceable after deployment in forests and

oceans. Slow progress in battery technology. Most of the times wireless devices are in a idle state or

doing very trivial work.

44Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Power Conservation Approaches

Turning off hardware if not in use (display screens etc). Going to sleep during idle periods. Reducing the voltage supply during periods of low

power operations.

45Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Dynamic Voltage Scaling (DVS)

For a sensor node processor consumes 30-50% of the battery power.

DVS is conserving processor power without significant performance degradation.

Pdynamic CVdd2 f

where, C: capacitance, f: frequency, Vdd: supply voltage. Therefore, reducing voltage reduces power consumption. Transmeta TM5400 or the “Crusoe” is the one of the few

processors which supports voltage scaling

46Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Future Applications

The need for the power conservation will increase for future video processing applications by wireless nodes.

Other applications such as image processing and sound processing will also need more power.

Therefore, conserving power is one of the important research areas today.

47Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

XML

Programming versus Markup Language

- One Process data and other Presents Data SGML (Standard Generalized Markup Language) Why XML, Why not Html ?

- HTML instructs Web Browser

- XML (eXtensible Markup Language) is low level syntax for representing structured data and this simple syntax could be used to support a wide variety of applications

48Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

WML (Wireless Markup Language)

XML Application Designed for low bandwidth and small display

devices Deck of cards concept Multiple Screens in single retrieval Predefined set of elements

49Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Threats and Security Issues

Larger security challenges present in wireless networks than in conventional wired networks.

Security is essential due to hackers, intruders, viruses, and industrial espionage.

Wireless networks are very dissimilar from wired networks.

Data is broadcast so that it can be received by all nodes in the vicinity.

Wireless networks operate under low battery powers, limited bandwidth, and higher costs.

50Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Attacks in Wireless Networks

Hence, it is very difficult to adapt security schemes from wired networks to wireless networks.

Three types of attacks exist in wireless networks – a) Active attack, b) Passive attack, and c) Accidental attack.

An active attack occurs when data modification or false data transmission takes place. Can be divided into four categories – a) masquerade, b) replay, c) message modification, and d) denial of service.

The object of a passive attack is to obtain information transmitted through the network.

51Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Attacks in Wireless Networks

Accidental attacks occur because of exposure due to the failure of components.

An eavesdropper is able to tap the communication into the wireless channels by positioning itself within the transmission range.

Networks are vulnerable to unauthorized access from the outside world. User authentication is an appropriate way to secure such networks.

May not be feasible to implement security schemes on wireless networks with very limited computational ability.

52Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Current Approaches

IEEE 802.11 defines two authentication schemes : open system authentication and shared key authentication.

No key management functions defined in 802.11 Secure key generation and distribution required by systems

containing authentication and identification schemes. Key distribution to the service provider via a backbone

network is being proposed. A scheme that assumes mutual trust among network nodes

while authenticating route reply messages has been proposed by Venkatraman and Agrawal in [60].

53Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved.

Current Approaches

A scheme has also been proposed to identify some internal attacks specific to the AODV routing protocol.

Current security mechanisms for wired networks are not applicable to wireless networks.

Hence, new techniques need to be developed to make wireless networks more secure and less vulnerable to attacks.


Recommended