The Handbook of Ad hoc Wireless Networks

Free Download

Authors:

Edition: 1

Series: The electrical engineering handbook series

ISBN: 9780849313325, 0-8493-1332-5

Size: 12 MB (12372596 bytes)

Pages: 556/556

File format:

Language:

Publishing Year:

Mohammad Ilyas9780849313325, 0-8493-1332-5

A relative newcomer to the field of wireless communications, ad hoc networking is growing quickly, both in its importance and its applications. With rapid advances in hardware, software, and protocols, ad hoc networks are now coming of age, and the time has come to bring together into one reference their principles, technologies, and techniques.The Handbook of Ad Hoc Wireless Networks does exactly that. Experts from around the world have joined forces to create the definitive reference for the field. From the basic concepts, techniques, systems, and protocols of wireless communication to the particulars of ad hoc network routing methods, power, connections, traffic management, and security, this handbook covers virtually every aspect of ad hoc wireless networking. It includes a section that explores several routing methods and protocols directly related to implementing ad hoc networks in a variety of applications.The benefits of ad hoc wireless networks are many, but several challenges remain. Organized for easy reference, The Handbook of Ad Hoc Wireless Networks is your opportunity to gain quick familiarity with the state of the art, have at your disposal the only complete reference on the subject available, and prepare to meet the technological and implementation challenges you’ll encounter in practice.

Table of contents :
The Handbook of Ad hoc Wireless Networks……Page 2
Preface……Page 5
The Editor……Page 7
List of Contributors……Page 8
Table of Contents……Page 10
Contents……Page 0
Abstract……Page 13
1.1 Introduction……Page 14
1.2.1 Body Area Network……Page 15
1.2.2 Personal Area Network……Page 16
1.3 Technologies for Ad Hoc Networks……Page 17
1.4 IEEE 802.11 Architecture and Protocols……Page 18
1.4.1 IEEE 802.11 DCF……Page 19
1.4.1.1.1 Protocol Capacity……Page 20
1.4.1.1.2 MAC Delay……Page 21
1.4.2 IEEE 802.11 RTS/CTS……Page 22
1.4.2.1.1 Indoor Experiments……Page 23
1.4.2.1.2 Outdoor Experiments……Page 24
1.5.1 A Bluetooth Network……Page 26
1.5.1.1 Bluetooth Piconet Formation……Page 27
1.5.1.2 Bluetooth Scatternet……Page 28
1.5.2 Bluetooth Data Transmission……Page 29
1.5.2.1 Internet Access via Bluetooth: A Performance Evaluation Study……Page 30
References……Page 32
2.1 Introduction……Page 35
2.2.1 Shortest Path Multicast Tree……Page 37
2.2.2 Core-Based Trees Multicast Protocol……Page 38
2.3.1 On-Demand Multicast Routing Protocol (ODMRP)……Page 39
2.3.2 Multicast Ad Hoc On-demand Distance Vector Routing Protocol (Multicast AODV)……Page 40
2.3.3 Forwarding Group Multicast Protocol (FGMP)……Page 42
2.3.4 Core-Assisted Mesh Protocol……Page 43
2.4 Other Multicast Protocols in Mobile Ad Hoc Networks……Page 44
2.5.1 QoS Multicast……Page 46
2.5.2 Reliable Multicast……Page 47
2.6 Conclusions……Page 48
References……Page 49
3.1 Introduction……Page 51
3.2 The Ad Hoc Wireless Network: Operating Principles……Page 54
3.3 Routing in Mobile Ad Hoc Networks……Page 56
3.4 Routing with Quality of Service Constraints……Page 58
3.5 QoS Routing in Ad Hoc Networks……Page 62
3.6 QoS Routing with Security Constraints……Page 70
3.7 Conclusion and Areas of Future Research……Page 72
References……Page 73
Appendix……Page 79
5.1 Introduction……Page 88
5.2.1 The WANET Graph……Page 91
5.2.2 Spatial Reuse and Connectivity……Page 92
5.3 The Capacity of a WANET……Page 93
5.3.2 Stochastic Capacity……Page 94
5.3.2.1 Interference Analysis……Page 95
5.3.2.2 Saturation Throughput……Page 97
5.4.1The Model and Its Analysis……Page 100
5.4.2 Results and Discussion……Page 101
5.5.1 Single Hop Performance……Page 102
5.5.2 Performance of Ad Hoc Internets with Multihop TCP Connections……Page 104
5.6 Conclusion……Page 105
References……Page 106
Abstract……Page 107
6.1.1 Speech vs. Data: The Delay Issue……Page 108
6.1.4 Unequal Error Protection……Page 109
6.2 The Frequency-Flat, Slow Rayleigh Fading Channel……Page 110
6.2.1 The Robustness Issue……Page 111
6.2.2.1 No Delay Constraint: Infinite-Depth Interleaving……Page 112
6.3 Adaptive C/M Techniques……Page 113
6.4 Transmission with Multiple Antennas……Page 114
6.4.1 Preliminaries……Page 115
6.4.2.1 Deterministic Channel……Page 116
6.4.2.2 Ergodic Rayleigh Fading Channel……Page 118
6.4.3 Influence of Channel-State Information……Page 119
6.4.3.4 CSI at the Transmitter and at the Receiver……Page 120
6.4.4.2 Alamouti Scheme……Page 121
6.4.5 Coding for Multiple-Antenna Systems……Page 123
6.4.5.2 Pairwise Error Probability……Page 124
6.4.6 BLAST Architecture……Page 125
References……Page 126
7.1 Introduction……Page 128
7.2 A Brief Review of Traditional Routing Protocols for Wired Networks……Page 130
7.3 Unicast Routing Protocols for MANETs……Page 131
7.3.1.1 Tailoring Distance Vector Protocols: DSDV……Page 132
7.3.1.2 Tailoring Link-State Algorithm: OLSR……Page 133
7.3.1.4 Path-Finding Algorithms: WRP……Page 134
7.3.2 Reactive Protocols……Page 135
7.3.2.1 DSR……Page 136
7.3.2.2 AODV……Page 138
7.3.2.4 TORA……Page 139
7.3.2.5 ABR……Page 140
7.3.3 Hybrid Protocols: ZRP……Page 143
7.3.4 Position Aided Protocols: LAR……Page 144
7.4 Protocol Performance Analysis……Page 145
7.5 Conclusions……Page 146
References……Page 147
Abstract……Page 150
Geostationary Earth Orbit (GEO) Satellites……Page 151
Low Earth Orbit (LEO) Satellites……Page 152
8.1.2 Frequency Bands……Page 153
8.1.4 Basic Satellite Components……Page 155
8.1.5 Effects of Space……Page 156
8.2 Orbital Characteristics……Page 157
8.3.1 VSAT Networks……Page 160
8.3.2 Fixed Satellite Service……Page 162
8.3.3 Mobile Satellite Service……Page 163
Iridium……Page 165
Globalstar……Page 166
ICO……Page 168
8.3.4 Satellite Radio……Page 169
8.3.5 Satellite-Based Internet……Page 171
References……Page 172
9.1 Cellular Networks……Page 175
9.1.1.2.1 BSS (Base Station Subsystem)……Page 176
9.1.1.3 SMS (Short Message Service) and WAP (Wireless Application Protocol)……Page 177
9.1.3 GPRS (General Packet Radio Service) and EDGE (Enhanced Data for GSM Evolution)……Page 178
9.1.4.2 CDMA2000 (Code Division Multiple Access 2000)……Page 179
9.1.5 Conclusion……Page 180
9.3.1 Bluetooth……Page 181
9.3.5 LMDS (Local Multipoint Distribution Service)……Page 182
9.4.1 Mobile IP……Page 183
9.5 Conclusion……Page 184
References……Page 185
10.1 Introduction……Page 187
10.2 Towards Ad Hoc GSM Communications……Page 188
10.3.1 A-GSM Network Entities……Page 189
Integrated Dual Mode Terminals……Page 190
10.3.2 Protocol Layering……Page 191
Resource Manager……Page 192
Measurements……Page 193
Handover Initiation……Page 194
Handover Control……Page 196
10.4 System Comparisons……Page 198
Acknowledgment……Page 199
References……Page 201
11.1 Introduction……Page 202
11.2.2 Bluetooth Wireless Technology……Page 204
11.3.1 Key IEEE 802.11 MAC-Layer Features……Page 206
11.3.2 Key IEEE 802.11 PHY-Layer Features……Page 207
Bluetooth Protocol Stack……Page 208
Bluetooth Topologies……Page 210
11.4 Trends in Wireless Networking……Page 211
11.5 Chapter Summary……Page 212
References……Page 213
12.1 Introduction……Page 214
12.2.1 Classification……Page 215
12.2.3 Proactive Location Services……Page 216
12.3 Routing……Page 219
12.3.1 Greedy Routing……Page 220
12.3.3 Hierarchical Routing……Page 223
12.4 Application Scenario……Page 224
12.5 Conclusions……Page 225
References……Page 226
13.1 Introduction……Page 228
13.2 Previous Work……Page 229
13.3 The Virtual Base Stations (VBS) Architecture……Page 230
13.3.1 VBS Illustrated……Page 231
13.3.2 Some VBS Properties……Page 232
13.4 VBS Routing……Page 234
13.4.1 VBS Routing Illustrated……Page 235
13.4.2 VBS Proactive-Reactive (VBS-PR) Routing……Page 237
References……Page 238
Abstract……Page 240
14.2 Brief Survey of Basic Ad Hoc Routing Protocols……Page 241
14.3 Multi-Scope Routing……Page 242
14.4 Protocol Hybridization……Page 243
14.5 Framework Tuning……Page 244
14.6.1 Local Proactive (Intrazone) Routing……Page 245
14.6.2 Bordercast-Based Global Reactive (Interzone) Routing……Page 247
14.8 IZR Introduction……Page 248
14.9 IZR Details……Page 249
14.9.1 Intrazone Routing Protocol (IARP)……Page 250
14.9.2 Bordercast Resolution Protocol (BRP)……Page 251
14.9.3 Zone Radius Determination Algorithm……Page 252
References……Page 256
Abstract……Page 258
15.1 Introduction……Page 259
15.2.1 Topology-Related Protocols……Page 260
15.2.3 QoS-Based Adaptive Routing……Page 262
15.3.2.1 Path Finding……Page 263
15.3.2.2 Packet Forwarding and Load Balancing……Page 264
15.3.3.1 Performance of UDP Traffic……Page 265
15.3.3.2 Performance of TCP Traffic……Page 266
15.3.4 Discussion……Page 268
15.4 The QoS-MSR Protocol……Page 269
15.4.1 The Implementation of QoS Route Discovery……Page 270
15.4.2 QoS Route Maintenance……Page 271
15.4.3 Multiple Bandwidth Splitting Reservation (MBSR)……Page 272
15.4.4 Performance Evaluation……Page 274
15.5 Concluding Remarks……Page 276
References……Page 277
Abstract……Page 279
16.1 Introduction……Page 280
16.1.3 Path Strategies, Metrics, Memorization, Guaranteed Delivery, Location Updates, and Robustness……Page 281
16.2.2 Guaranteed Delivery with Memorization……Page 284
16.3 Assisted Routing Algorithms……Page 285
16.2.1 Greedy Routing Schemes……Page 283
16.4.3 Doubling Circles Routing……Page 286
16.5.1 Request Zone Routing……Page 287
16.5.2 Intelligent Flooding for Destination Search……Page 288
16.5.3 Quorum Based Strategy……Page 289
References……Page 290
17.1 Introduction……Page 293
17.3.1 Basic Techniques……Page 294
17.3.2 AODV-Specific Techniques……Page 295
17.3.4 Other Techniques……Page 296
17.4 Thoughts and Suggestions for Future Research……Page 300
References……Page 302
18.1 Introduction……Page 304
18.2.1 LAR (Location-Aided Routing)……Page 305
18.2.2 GPSR (Greedy Perimeter Stateless Routing)……Page 306
18.2.4 GEDIR (Geographic Distance Routing)……Page 307
18.3.1 Zone-Based Routing Protocol……Page 308
18.3.2 GRID……Page 309
18.4 Location-Aware Applications of MANET……Page 310
18.4.1 Geocast……Page 311
18.4.3 Location-Assisted Broadcasting in MANET……Page 312
18.4.4 Location-Assisted Tour Guide……Page 313
References……Page 315
19.1 Introduction……Page 317
19.2.1 Mobile IP (MIP)……Page 318
19.2.3 HAWAII……Page 320
19.2.4 Cellular IP (CIP)……Page 321
19.3 TCP and Mobility……Page 322
19.3.1 TCP Reno Congestion Control Mechanism……Page 323
Connection Segmentation……Page 324
TCP Snooping……Page 326
Distinguishing Congestion Losses from Those Due to Bit Error……Page 327
19.3.3 Generic TCP Extensions……Page 329
References……Page 330
Abstract……Page 332
20.1.3 Challenges of Multicast in Ad Hoc Networks……Page 333
20.2.3 Fundamentals of Multicast……Page 334
20.3.1 Traditional Multicast Protocols……Page 335
20.4.1 The Aim of the Proposed Protocol……Page 336
20.4.3 Types of Membership and Node Classification……Page 337
20.4.5 Joining Multicast Session……Page 338
20.4.6. Maintaining Multicast Mesh……Page 340
20.5.1Simulation Setup……Page 342
20.5.2 Experimental Results……Page 343
References……Page 345
21.1 Introduction……Page 347
21.2.1 Dynamic Source Routing (DSR) Protocol……Page 348
21.2.2 Ad Hoc On-Demand Distance Vector (AODV) Routing Protocol……Page 349
21.3 Global Positioning System……Page 350
21.4.1 Stable Zone and Caution Zone……Page 351
21.4.2 AODV-RRS Protocol Description……Page 352
21.4.4 Variations of AODV-RRS……Page 354
21.5 Performance Evaluation……Page 355
References……Page 359
22.1 Introduction……Page 361
22.2 Medium Access and Energy Conservation……Page 362
22.3 Routing and Energy Efficiency in Wireless Ad Hoc Networks……Page 365
22.5 Summary and Conclusions……Page 368
References……Page 369
23.1 Introduction……Page 371
23.2.1 Tree-Based Multicast……Page 372
23.2.2 Mesh-Based Multicast……Page 374
23.3.1 Energy Efficiency via Adaptive Transmission Power Control……Page 375
23.3.2 Energy Savings by Avoiding Broadcast-Based Multicast……Page 377
Example Network Model (Static Ad Hoc Network)……Page 378
23.4 Conclusion……Page 380
References……Page 381
24.1 Introduction……Page 383
24.2 System Environment……Page 385
24.3 Energy-Conserving Grid Routing Protocol……Page 387
24.3.2 Gateway Maintenance……Page 388
24.3.3 Route Discovery and Data Delivery……Page 390
24.3.4 Route Maintenance……Page 391
24.4 Simulation……Page 392
References……Page 396
Abstract……Page 398
25.2 Routing Protocols for Ad Hoc Networks……Page 399
25.2.2 Source-Initiated On-Demand Driven Protocols……Page 400
25.3 Routing Protocols for Balanced Energy Consumption……Page 402
25.3.2 APR (Alternate Path Routing) Protocol……Page 403
25.3.4 FAR (Flow Augmentation Routing) Protocol……Page 404
25.3.5 OMM (Online Max-Min Routing) Protocol……Page 405
25.3.6 PLR (Power-Aware Localized Routing) Protocol……Page 406
25.3.7 SPAN Protocol……Page 407
25.3.8 GAF (Geographic Adaptive Fidelity) Protocol……Page 408
25.4 Conclusion……Page 409
References……Page 410
26.1 Introduction……Page 412
26.2 Existing Work and Our Design Rationale……Page 413
26.3.2 DA Generation and Dynamic Domain Formation……Page 415
26.3.4 QoS Information Collection and Prediction……Page 416
26.3.5 Discovery Query……Page 417
26.4.1 Simulation Environment……Page 418
26.4.3 Quality of Service……Page 419
26.5 Conclusions and Future Work……Page 420
References……Page 421
Abstract……Page 423
27.1 Introduction to Multimedia Mobile Ad Hoc Communications……Page 424
27.2 Overview of Quality-of-Service (QoS) Routing……Page 425
27.3 A General Framework for QoS Routing in MANETs……Page 427
27.3.1 MANET Routing……Page 428
27.3.3 QoS Manager……Page 429
27.3.4 Bandwidth Calculation……Page 431
Case I……Page 432
27.3.5 Slot Assignment Phase……Page 433
Rule II: Time Slot Assignment for Inter-Cluster Flows……Page 434
27.3.6 Bandwidth Reassignment Channel Allocation Policy……Page 435
27.4.1System Model……Page 436
Performance Metrics……Page 437
System Performance……Page 438
27.5 Conclusions……Page 441
References……Page 443
28.1 Introduction……Page 446
28.2.2 Node Mobility and Lack of Infrastructure……Page 448
28.3.1 FQMM……Page 449
28.4 Framework Architecture of FQMM……Page 451
28.4.2 Control and Management Plane……Page 452
28.5.1 Service Prioritization in MANET……Page 453
28.5.2 Service Differentiation in MANET……Page 456
References……Page 459
29.1 Introduction……Page 462
29.2.1 Set-Covering Scheme……Page 463
29.2.2 Independent-Transmission-Set (IT-Set) Scheme……Page 464
29.3.1 Protocol 1……Page 466
29.3.2 Protocol 2……Page 468
29.4 All-to-All Broadcast Protocols……Page 469
29.5 Simulation Results……Page 471
References……Page 473
Abstract……Page 475
30.1 Introduction……Page 476
30.2 Vulnerable Nature……Page 477
30.3.1 Availability……Page 478
30.3.8 Isolation……Page 479
30.3.15 Key Management……Page 480
30.4 Attacks in Wireless Ad Hoc Networks……Page 481
30.4.2 Impersonation……Page 482
30.4.6 Attacks Against Secure Routing……Page 483
External Attacks……Page 484
30.4.8 Types of Attacks: Summary……Page 485
30.5.2 Key Management……Page 486
A Distributed Asynchronous Key Management Service……Page 487
NTM – A Progressive Trust Negotiation Scheme……Page 488
A Scheme For Learning, Storing, and Distributing Public Keys……Page 490
Securing Ad Hoc Jini-Based Services……Page 491
A Robust Scalable Ubiquitous Security Scheme……Page 492
Another Robust Membership Management Scheme……Page 493
Another Robust Scalable Ubiquitous Security Scheme……Page 494
30.5.3 Intrusion Detection……Page 495
Intrusion Detection and Response Architecture……Page 496
An Intrusion Detection Model for Security Enhancement in AODV Protocol……Page 497
TIARA……Page 498
An End-To-End Data Authentication Scheme……Page 499
Authentication, Authorization, and Accounting (AAA)……Page 500
Countering Internal Attacks……Page 501
Secure Distance-Vector Routing Protocols……Page 502
Mitigating Routing Misbehavior……Page 503
Security-Aware Ad Hoc Routing (SAR)……Page 504
Internet MANET Encapsulation Protocol……Page 505
Secure Message Transmission (SMT) Protocol……Page 506
Optimized Link State Routing Protocol……Page 507
An Authenticated Link-Level Ad Hoc Routing Protocol……Page 508
Secure Routing Protocol……Page 509
Reducing Overhead in Link State Routing……Page 511
A Subscriptionless Service Architecture……Page 512
Group Collaboration……Page 513
The Archipelago Project……Page 514
30.5.7 Network Management……Page 515
30.6.1 Network-Layer Security……Page 516
30.6.4 Access Control……Page 517
30.6.7 Routing Security……Page 518
30.6.8 Open Issues……Page 519
Glossary……Page 520
References……Page 522
31.1 Introduction……Page 526
31.2 Security Goals……Page 527
31.3 Threats and Challenges……Page 528
31.4 Trust Management……Page 530
31.5 Secure Routing……Page 533
The Neighbor Lookup Protocol……Page 534
The Basic Secure Route Discovery Procedure……Page 535
The SRP Extension……Page 536
31.6 Secure Data Forwarding……Page 537
31.6.1 Secure Message Transmission Protocol……Page 538
31.7 Discussion……Page 540
References……Page 541
32.1 Introduction……Page 543
32.2.1 Security Requirements……Page 544
32.2.2 Cryptography Basis……Page 545
32.2.3 Key Management……Page 546
32.3.1 Access Control Policy……Page 547
32.5 Routing Security……Page 548
32.5.2 End-to-End Routing Authentication……Page 549
32.5.4 Security Metrics for Routing Path……Page 550
32.6 Key Distribution……Page 551
32.6.2 Democratic Key Distribution……Page 552
32.7 Future Directions……Page 554
References……Page 555

Reviews

There are no reviews yet.

Be the first to review “The Handbook of Ad hoc Wireless Networks”
Shopping Cart
Scroll to Top