Mohammad Ilyas0849313325, 9780849313325
Table of contents :
The Handbook of Ad hoc Wireless Networks……Page 2
Preface……Page 5
The Editor……Page 7
List of Contributors……Page 8
Table of Contents……Page 10
Abstract……Page 13
Contents……Page 0
1.1 Introduction……Page 14
1.2.1 Body Area Network……Page 15
1.2.2 Personal Area Network……Page 16
1.3 Technologies for Ad Hoc Networks……Page 17
1.4 IEEE 802.11 Architecture and Protocols……Page 18
1.4.1 IEEE 802.11 DCF……Page 19
1.4.1.1.1 Protocol Capacity……Page 20
1.4.1.1.2 MAC Delay……Page 21
1.4.2 IEEE 802.11 RTS/CTS……Page 22
1.4.2.1.1 Indoor Experiments……Page 23
1.4.2.1.2 Outdoor Experiments……Page 24
1.5.1 A Bluetooth Network……Page 26
1.5.1.1 Bluetooth Piconet Formation……Page 27
1.5.1.2 Bluetooth Scatternet……Page 28
1.5.2 Bluetooth Data Transmission……Page 29
1.5.2.1 Internet Access via Bluetooth: A Performance Evaluation Study……Page 30
References……Page 32
2.1 Introduction……Page 35
2.2.1 Shortest Path Multicast Tree……Page 37
2.2.2 Core-Based Trees Multicast Protocol……Page 38
2.3.1 On-Demand Multicast Routing Protocol (ODMRP)……Page 39
2.3.2 Multicast Ad Hoc On-demand Distance Vector Routing Protocol (Multicast AODV)……Page 40
2.3.3 Forwarding Group Multicast Protocol (FGMP)……Page 42
2.3.4 Core-Assisted Mesh Protocol……Page 43
2.4 Other Multicast Protocols in Mobile Ad Hoc Networks……Page 44
2.5.1 QoS Multicast……Page 46
2.5.2 Reliable Multicast……Page 47
2.6 Conclusions……Page 48
References……Page 49
3.1 Introduction……Page 51
3.2 The Ad Hoc Wireless Network: Operating Principles……Page 54
3.3 Routing in Mobile Ad Hoc Networks……Page 56
3.4 Routing with Quality of Service Constraints……Page 58
3.5 QoS Routing in Ad Hoc Networks……Page 62
3.6 QoS Routing with Security Constraints……Page 70
3.7 Conclusion and Areas of Future Research……Page 72
References……Page 73
Appendix……Page 79
4.1 Background……Page 80
4.2 Transmitter Power Control Mechanisms……Page 81
4.3 MAC-Layer Power Management……Page 83
4.4 Network-Layer Power Management……Page 86
4.4.1 Unicast Data Communications……Page 87
4.5.2 Operating System (OS)/Application Layer……Page 88
References……Page 89
5.1 Introduction……Page 91
5.2.1 The WANET Graph……Page 94
5.2.2 Spatial Reuse and Connectivity……Page 95
5.3 The Capacity of a WANET……Page 96
5.3.2 Stochastic Capacity……Page 97
5.3.2.1 Interference Analysis……Page 98
5.3.2.2 Saturation Throughput……Page 100
5.4.1The Model and Its Analysis……Page 103
5.4.2 Results and Discussion……Page 104
5.5.1 Single Hop Performance……Page 105
5.5.2 Performance of Ad Hoc Internets with Multihop TCP Connections……Page 107
5.6 Conclusion……Page 108
References……Page 109
Abstract……Page 110
6.1.1 Speech vs. Data: The Delay Issue……Page 111
6.1.4 Unequal Error Protection……Page 112
6.2 The Frequency-Flat, Slow Rayleigh Fading Channel……Page 113
6.2.1 The Robustness Issue……Page 114
6.2.2.1 No Delay Constraint: Infinite-Depth Interleaving……Page 115
6.3 Adaptive C/M Techniques……Page 116
6.4 Transmission with Multiple Antennas……Page 117
6.4.1 Preliminaries……Page 118
6.4.2.1 Deterministic Channel……Page 119
6.4.2.2 Ergodic Rayleigh Fading Channel……Page 121
6.4.3 Influence of Channel-State Information……Page 122
6.4.3.4 CSI at the Transmitter and at the Receiver……Page 123
6.4.4.2 Alamouti Scheme……Page 124
6.4.5 Coding for Multiple-Antenna Systems……Page 126
6.4.5.2 Pairwise Error Probability……Page 127
6.4.6 BLAST Architecture……Page 128
References……Page 129
7.1 Introduction……Page 131
7.2 A Brief Review of Traditional Routing Protocols for Wired Networks……Page 133
7.3 Unicast Routing Protocols for MANETs……Page 134
7.3.1.1 Tailoring Distance Vector Protocols: DSDV……Page 135
7.3.1.2 Tailoring Link-State Algorithm: OLSR……Page 136
7.3.1.4 Path-Finding Algorithms: WRP……Page 137
7.3.2 Reactive Protocols……Page 138
7.3.2.1 DSR……Page 139
7.3.2.2 AODV……Page 141
7.3.2.4 TORA……Page 142
7.3.2.5 ABR……Page 143
7.3.3 Hybrid Protocols: ZRP……Page 146
7.3.4 Position Aided Protocols: LAR……Page 147
7.4 Protocol Performance Analysis……Page 148
7.5 Conclusions……Page 149
References……Page 150
Abstract……Page 153
Geostationary Earth Orbit (GEO) Satellites……Page 154
Low Earth Orbit (LEO) Satellites……Page 155
8.1.2 Frequency Bands……Page 156
8.1.4 Basic Satellite Components……Page 158
8.1.5 Effects of Space……Page 159
8.2 Orbital Characteristics……Page 160
8.3.1 VSAT Networks……Page 163
8.3.2 Fixed Satellite Service……Page 165
8.3.3 Mobile Satellite Service……Page 166
Iridium……Page 168
Globalstar……Page 169
ICO……Page 171
8.3.4 Satellite Radio……Page 172
8.3.5 Satellite-Based Internet……Page 174
References……Page 175
9.1 Cellular Networks……Page 178
9.1.1.2.1 BSS (Base Station Subsystem)……Page 179
9.1.1.3 SMS (Short Message Service) and WAP (Wireless Application Protocol)……Page 180
9.1.3 GPRS (General Packet Radio Service) and EDGE (Enhanced Data for GSM Evolution)……Page 181
9.1.4.2 CDMA2000 (Code Division Multiple Access 2000)……Page 182
9.1.5 Conclusion……Page 183
9.3.1 Bluetooth……Page 184
9.3.5 LMDS (Local Multipoint Distribution Service)……Page 185
9.4.1 Mobile IP……Page 186
9.5 Conclusion……Page 187
References……Page 188
10.1 Introduction……Page 190
10.2 Towards Ad Hoc GSM Communications……Page 191
10.3.1 A-GSM Network Entities……Page 192
Integrated Dual Mode Terminals……Page 193
10.3.2 Protocol Layering……Page 194
Resource Manager……Page 195
Measurements……Page 196
Handover Initiation……Page 197
Handover Control……Page 199
10.4 System Comparisons……Page 201
Acknowledgment……Page 202
References……Page 204
11.1 Introduction……Page 205
11.2.2 Bluetooth Wireless Technology……Page 207
11.3.1 Key IEEE 802.11 MAC-Layer Features……Page 209
11.3.2 Key IEEE 802.11 PHY-Layer Features……Page 210
Bluetooth Protocol Stack……Page 211
Bluetooth Topologies……Page 213
11.4 Trends in Wireless Networking……Page 214
11.5 Chapter Summary……Page 215
References……Page 216
12.1 Introduction……Page 217
12.2.1 Classification……Page 218
12.2.3 Proactive Location Services……Page 219
12.3 Routing……Page 222
12.3.1 Greedy Routing……Page 223
12.3.3 Hierarchical Routing……Page 226
12.4 Application Scenario……Page 227
12.5 Conclusions……Page 228
References……Page 229
13.1 Introduction……Page 231
13.2 Previous Work……Page 232
13.3 The Virtual Base Stations (VBS) Architecture……Page 233
13.3.1 VBS Illustrated……Page 234
13.3.2 Some VBS Properties……Page 235
13.4 VBS Routing……Page 237
13.4.1 VBS Routing Illustrated……Page 238
13.4.2 VBS Proactive-Reactive (VBS-PR) Routing……Page 240
References……Page 241
Abstract……Page 243
14.2 Brief Survey of Basic Ad Hoc Routing Protocols……Page 244
14.3 Multi-Scope Routing……Page 245
14.4 Protocol Hybridization……Page 246
14.5 Framework Tuning……Page 247
14.6.1 Local Proactive (Intrazone) Routing……Page 248
14.6.2 Bordercast-Based Global Reactive (Interzone) Routing……Page 250
14.8 IZR Introduction……Page 251
14.9 IZR Details……Page 252
14.9.1 Intrazone Routing Protocol (IARP)……Page 253
14.9.2 Bordercast Resolution Protocol (BRP)……Page 254
14.9.3 Zone Radius Determination Algorithm……Page 255
References……Page 259
Abstract……Page 261
15.1 Introduction……Page 262
15.2.1 Topology-Related Protocols……Page 263
15.2.3 QoS-Based Adaptive Routing……Page 265
15.3.2.1 Path Finding……Page 266
15.3.2.2 Packet Forwarding and Load Balancing……Page 267
15.3.3.1 Performance of UDP Traffic……Page 268
15.3.3.2 Performance of TCP Traffic……Page 269
15.3.4 Discussion……Page 271
15.4 The QoS-MSR Protocol……Page 272
15.4.1 The Implementation of QoS Route Discovery……Page 273
15.4.2 QoS Route Maintenance……Page 274
15.4.3 Multiple Bandwidth Splitting Reservation (MBSR)……Page 275
15.4.4 Performance Evaluation……Page 277
15.5 Concluding Remarks……Page 279
References……Page 280
Abstract……Page 282
16.1 Introduction……Page 283
16.1.3 Path Strategies, Metrics, Memorization, Guaranteed Delivery, Location Updates, and Robustness……Page 284
16.2.2 Guaranteed Delivery with Memorization……Page 287
16.3 Assisted Routing Algorithms……Page 288
16.2.1 Greedy Routing Schemes……Page 286
16.4.3 Doubling Circles Routing……Page 289
16.5.1 Request Zone Routing……Page 290
16.5.2 Intelligent Flooding for Destination Search……Page 291
16.5.3 Quorum Based Strategy……Page 292
References……Page 293
17.1 Introduction……Page 296
17.3.1 Basic Techniques……Page 297
17.3.2 AODV-Specific Techniques……Page 298
17.3.4 Other Techniques……Page 299
17.4 Thoughts and Suggestions for Future Research……Page 303
References……Page 305
18.1 Introduction……Page 307
18.2.1 LAR (Location-Aided Routing)……Page 308
18.2.2 GPSR (Greedy Perimeter Stateless Routing)……Page 309
18.2.4 GEDIR (Geographic Distance Routing)……Page 310
18.3.1 Zone-Based Routing Protocol……Page 311
18.3.2 GRID……Page 312
18.4 Location-Aware Applications of MANET……Page 313
18.4.1 Geocast……Page 314
18.4.3 Location-Assisted Broadcasting in MANET……Page 315
18.4.4 Location-Assisted Tour Guide……Page 316
References……Page 318
19.1 Introduction……Page 320
19.2.1 Mobile IP (MIP)……Page 321
19.2.3 HAWAII……Page 323
19.2.4 Cellular IP (CIP)……Page 324
19.3 TCP and Mobility……Page 325
19.3.1 TCP Reno Congestion Control Mechanism……Page 326
Connection Segmentation……Page 327
TCP Snooping……Page 329
Distinguishing Congestion Losses from Those Due to Bit Error……Page 330
19.3.3 Generic TCP Extensions……Page 332
References……Page 333
Abstract……Page 335
20.1.3 Challenges of Multicast in Ad Hoc Networks……Page 336
20.2.3 Fundamentals of Multicast……Page 337
20.3.1 Traditional Multicast Protocols……Page 338
20.4.1 The Aim of the Proposed Protocol……Page 339
20.4.3 Types of Membership and Node Classification……Page 340
20.4.5 Joining Multicast Session……Page 341
20.4.6. Maintaining Multicast Mesh……Page 343
20.5.1Simulation Setup……Page 345
20.5.2 Experimental Results……Page 346
References……Page 348
21.1 Introduction……Page 350
21.2.1 Dynamic Source Routing (DSR) Protocol……Page 351
21.2.2 Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol……Page 352
21.3 Global Positioning System……Page 353
21.4.1 Stable Zone and Caution Zone……Page 354
21.4.2 AODV-RRS Protocol Description……Page 355
21.4.4 Variations of AODV-RRS……Page 357
21.5 Performance Evaluation……Page 358
References……Page 362
22.1 Introduction……Page 364
22.2 Medium Access and Energy Conservation……Page 365
22.3 Routing and Energy Efficiency in Wireless Ad Hoc Networks……Page 368
22.5 Summary and Conclusions……Page 371
References……Page 372
23.1 Introduction……Page 374
23.2.1 Tree-Based Multicast……Page 375
23.2.2 Mesh-Based Multicast……Page 377
23.3.1 Energy Efficiency via Adaptive Transmission Power Control……Page 378
23.3.2 Energy Savings by Avoiding Broadcast-Based Multicast……Page 380
Example Network Model (Static Ad Hoc Network)……Page 381
23.4 Conclusion……Page 383
References……Page 384
24.1 Introduction……Page 386
24.2 System Environment……Page 388
24.3 Energy-Conserving Grid Routing Protocol……Page 390
24.3.2 Gateway Maintenance……Page 391
24.3.3 Route Discovery and Data Delivery……Page 393
24.3.4 Route Maintenance……Page 394
24.4 Simulation……Page 395
References……Page 399
Abstract……Page 401
25.2 Routing Protocols for Ad Hoc Networks……Page 402
25.2.2 Source-Initiated On-Demand Driven Protocols……Page 403
25.3 Routing Protocols for Balanced Energy Consumption……Page 405
25.3.2 APR (Alternate Path Routing) Protocol……Page 406
25.3.4 FAR (Flow Augmentation Routing) Protocol……Page 407
25.3.5 OMM (Online Max-Min Routing) Protocol……Page 408
25.3.6 PLR (Power-Aware Localized Routing) Protocol……Page 409
25.3.7 SPAN Protocol……Page 410
25.3.8 GAF (Geographic Adaptive Fidelity) Protocol……Page 411
25.4 Conclusion……Page 412
References……Page 413
26.1 Introduction……Page 415
26.2 Existing Work and Our Design Rationale……Page 416
26.3.2 DA Generation and Dynamic Domain Formation……Page 418
26.3.4 QoS Information Collection and Prediction……Page 419
26.3.5 Discovery Query……Page 420
26.4.1 Simulation Environment……Page 421
26.4.3 Quality of Service……Page 422
26.5 Conclusions and Future Work……Page 423
References……Page 424
Abstract……Page 426
27.1 Introduction to Multimedia Mobile Ad Hoc Communications……Page 427
27.2 Overview of Quality-of-Service (QoS) Routing……Page 428
27.3 A General Framework for QoS Routing in MANETs……Page 430
27.3.1 MANET Routing……Page 431
27.3.3 QoS Manager……Page 432
27.3.4 Bandwidth Calculation……Page 434
Case I……Page 435
27.3.5 Slot Assignment Phase……Page 436
Rule II: Time Slot Assignment for Inter-Cluster Flows……Page 437
27.3.6 Bandwidth Reassignment Channel Allocation Policy……Page 438
27.4.1System Model……Page 439
Performance Metrics……Page 440
System Performance……Page 441
27.5 Conclusions……Page 444
References……Page 446
28.1 Introduction……Page 449
28.2.2 Node Mobility and Lack of Infrastructure……Page 451
28.3.1 FQMM……Page 452
28.4 Framework Architecture of FQMM……Page 454
28.4.2 Control and Management Plane……Page 455
28.5.1 Service Prioritization in MANET……Page 456
28.5.2 Service Differentiation in MANET……Page 459
References……Page 462
29.1 Introduction……Page 465
29.2.1 Set-Covering Scheme……Page 466
29.2.2 Independent-Transmission-Set (IT-Set) Scheme……Page 467
29.3.1 Protocol 1……Page 469
29.3.2 Protocol 2……Page 471
29.4 All-to-All Broadcast Protocols……Page 472
29.5 Simulation Results……Page 474
References……Page 476
Abstract……Page 478
30.1 Introduction……Page 479
30.2 Vulnerable Nature……Page 480
30.3.1 Availability……Page 481
30.3.8 Isolation……Page 482
30.3.15 Key Management……Page 483
30.4 Attacks in Wireless Ad Hoc Networks……Page 484
30.4.2 Impersonation……Page 485
30.4.6 Attacks Against Secure Routing……Page 486
External Attacks……Page 487
30.4.8 Types of Attacks: Summary……Page 488
30.5.2 Key Management……Page 489
A Distributed Asynchronous Key Management Service……Page 490
NTM – A Progressive Trust Negotiation Scheme……Page 491
A Scheme For Learning, Storing, and Distributing Public Keys……Page 493
Securing Ad Hoc Jini-Based Services……Page 494
A Robust Scalable Ubiquitous Security Scheme……Page 495
Another Robust Membership Management Scheme……Page 496
Another Robust Scalable Ubiquitous Security Scheme……Page 497
30.5.3 Intrusion Detection……Page 498
Intrusion Detection and Response Architecture……Page 499
An Intrusion Detection Model for Security Enhancement in AODV Protocol……Page 500
TIARA……Page 501
An End-To-End Data Authentication Scheme……Page 502
Authentication, Authorization, and Accounting (AAA)……Page 503
Countering Internal Attacks……Page 504
Secure Distance-Vector Routing Protocols……Page 505
Mitigating Routing Misbehavior……Page 506
Security-Aware Ad Hoc Routing (SAR)……Page 507
Internet MANET Encapsulation Protocol……Page 508
Secure Message Transmission (SMT) Protocol……Page 509
Optimized Link State Routing Protocol……Page 510
An Authenticated Link-Level Ad Hoc Routing Protocol……Page 511
Secure Routing Protocol……Page 512
Reducing Overhead in Link State Routing……Page 514
A Subscriptionless Service Architecture……Page 515
Group Collaboration……Page 516
The Archipelago Project……Page 517
30.5.7 Network Management……Page 518
30.6.1 Network-Layer Security……Page 519
30.6.4 Access Control……Page 520
30.6.7 Routing Security……Page 521
30.6.8 Open Issues……Page 522
Glossary……Page 523
References……Page 525
31.1 Introduction……Page 529
31.2 Security Goals……Page 530
31.3 Threats and Challenges……Page 531
31.4 Trust Management……Page 533
31.5 Secure Routing……Page 536
The Neighbor Lookup Protocol……Page 537
The Basic Secure Route Discovery Procedure……Page 538
The SRP Extension……Page 539
31.6 Secure Data Forwarding……Page 540
31.6.1 Secure Message Transmission Protocol……Page 541
31.7 Discussion……Page 543
References……Page 544
32.1 Introduction……Page 546
32.2.1 Security Requirements……Page 547
32.2.2 Cryptography Basis……Page 548
32.2.3 Key Management……Page 549
32.3.1 Access Control Policy……Page 550
32.5 Routing Security……Page 551
32.5.2 End-to-End Routing Authentication……Page 552
32.5.4 Security Metrics for Routing Path……Page 553
32.6 Key Distribution……Page 554
32.6.2 Democratic Key Distribution……Page 555
32.7 Future Directions……Page 557
References……Page 558
Reviews
There are no reviews yet.