Académique Documents
Professionnel Documents
Culture Documents
Networks
A network is a group of nodes that are connected to each other for the purpose of
TYPES OF NETWORKS
• WIRED NETWORKS
• WIRELESS NETWORKS
Twisted-Pair Wire - This is the most widely used medium for telecommunication.
Twisted-pair wires are ordinary telephone wires which consist of two insulated
copper wires twisted into pairs and are used for both voice and data transmission.
The use of two wires twisted together helps to reduce crosstalk and electromagnetic
induction. The transmission speed range from 2 million bits per second to 100
Coaxial Cable – These cables are widely used for cable television systems, office
buildings, and other worksites for local area networks. The cables consist of copper
or aluminum wire wrapped with insulating layer typically of a flexible material with
a high dielectric constant, all of which are surrounded by a conductive layer. The
range from 200 million to more than 500 million bits per second. One advantage of
coax over other types of transmission line is that in an ideal coaxial cable the
1
electromagnetic field carrying the signal exists only in the space between the inner
Fiber Optics – These cables consist of one or more thin filaments of glass fiber
wrapped in a protective layer. It transmits light which can travel over long distance
The speed of fiber optics is hundreds of times faster than coaxial cables and
.
FIGURE-1.1
use of electrical conductors or wires. The distances involved may be short (a few
2
meters as in television remote control) or long (thousands or millions of kilometers
for radio communications). When the context is clear, the term is often shortened to
computer networks, network terminals, etc.) which use some form of energy (e.g.
radio frequency (RF), infrared light, laser light, visible light, acoustic energy, etc.) to
FIGURE 1.2
1.3 TYPES OF WIRELESS NETWORKS
• CELLULAR NETWORKS
• AD HOC NETWORK
3
CHAPTER 2
Cellular Networks
A cellular network is a radio network made up of a number of radio cells (or just cells)
each served by at least one fixed-location transceiver known as a cell site or base station.
These cells cover different land areas to provide radio coverage over a wider area than
the area of one cell, so that a variable number of portable transceivers can be used in any
one cell and moved through more than one cell during transmission.The cellular network
has gone through three generations. The first generation of cellular networks is analog in
nature. To accommodate more cellular phone subscribers, digital TDMA (time division
multiple access) and CDMA (code division multiple access) technologies are used in the
second generation (2G) to increase the network capacity. With digital technologies,
digitized voice can be coded and encrypted. Therefore, the 2G cellular network is also
more secure. The third generation (3G) integrates cellular phones into the Internet world
switching voice transmission. The 3G cellular networks have been deployed in some
parts of Asia, Europe, and the United States since 2002 and will be widely deployed in
The first generation of analog cellular systems included the Advanced Mobile Telephone
System (AMPS) which was made available in 1983. A total of 40MHz of spectrum was
allocated from the 800MHz band by the Federal Communications Commission (FCC) for
4
AMPS. It was first deployed in Chicago, with a service area of 2100 square miles. AMPS
offered 832 channels, with a data rate of 10 kbps. Although omni directional antennas
were used in the earlier AMPS implementation, it was realized that using directional
antennas would yield better cell reuse. In fact, the smallest reuse factor that would fulfill
the 18db signal-to-interference ratio (SIR) using 120-degree directional antennas was
found to be 7. Hence, a 7-cell reuse pattern was adopted for AMPS. Transmissions from
the base stations to mobiles occur over the forward channel using frequencies between
869-894 MHz. The reverse channel is used for transmissions from mobiles to base
multiple access technology, such as TDMA (time division multiple access) and CDMA
(code division multiple access). Global System for Mobile Communications, or GSM,
systems are GSM, Cordless Telephone (CT2), Personal Access Communications Systems
(PACS), and Digital European Cordless Telephone (DECT). A new design was
the use of base station controllers (BSCs) lightens the load placed on the MSC (mobile
switching center) found in first-generation systems. This design allows the interface
between the MSC and BSC to be standardized. Hence, considerable attention was
carrier could employ different manufacturers for the MSC and BSCs. In addition to
5
enhancements in MSC design, the mobile-assisted handoff mechanism was introduced.
By sensing signals received from adjacent base stations, a mobile unit can trigger a
The move into the 2.5G world will begin with General Packet Radio Service (GPRS).
GPRS is a radio technology for GSM networks that adds packet-switching protocols,
shorter setup time for ISP connections, and the possibility to charge by the amount of
data sent, rather than connection time. Packet switching is a technique whereby the
information (voice or data) to be sent is broken up into packets, of at most a few Kbytes
each, which are then routed by the network between different destinations based on
addressing data within each packet. Use of network resources is optimized as the
resources are needed only during the handling of each packet. The next generation of data
heading towards third generation and personal multimedia environments builds on GPRS
and is known as Enhanced Data rate for GSM Evolution (EDGE). EDGE will also be a
significant contributor in 2.5G. It will allow GSM operators to use existing GSM radio
maximum speeds of 384 kbps with a bit-rate of 48 kbps per timeslot and up to 69.2 kbps
per timeslot in good radio conditions. EDGE will let operators function without a 3G
license and compete with 3G networks offering similar data services. Implementing
EDGE will be relatively painless and will require relatively small changes to network
hardware and software as it uses the same TDMA (Time Division Multiple Access)
frame structure, logic channel and 200 kHz carrier bandwidth as today's GSM networks.
6
As EDGE progresses to coexistence with 3G WCDMA, data rates of up to ATM-like
speeds of 2 Mbps could be available. GPRS will support flexible data transmission rates
as well as continuous connection to the network. GPRS is the most significant step
towards 3G.
Third-generation mobile systems are faced with several challenging technical issues, such
as the provision of seamless services across both wired and wireless networks and
universal mobility. In Europe, there are three evolving networks under investigation:
The use of hierarchical cell structures is proposed for IMT2000. The overlaying of cell
structures allows different rates of mobility to be serviced and handled by different cells.
Advanced multiple access techniques are also being investigated, and two promising
proposals have evolved, one based on wideband CDMA and another that uses a hybrid
defined the third generation (3G) of mobile telephony standards IMT-2000 to facilitate
growth, increase bandwidth, and support more diverse applications.For example, GSM
(the current most popular cellular phone standard) could deliver not only voice, but also
7
FIGURE 2.1
8
CHAPTER 3
Ad Hoc Networks
Ad hoc is a Latin phrase which means “for this purpose". It generally signifies a solution
designed for a specific problem or task, non-generalizable, and which cannot be adapted
to other purposes.A mobile ad hoc network (MANET), sometimes called a mobile mesh
Each device in a MANET is free to move independently in any direction, and will
therefore change its links to other devices frequently. Each must forward traffic unrelated
to its own use, and therefore be a router. The primary challenge in building a MANET is
route traffic.
FIGURE 3.1
9
Such networks may operate by themselves or may be connected to the larger Internet.
MANETs are a kind of wireless ad hoc networks that usually has a routeable networking
environment on top of a Link Layer ad hoc network. They are also a type of mesh
network, but many mesh networks are not mobile or not wireless. The growth of laptops
and 802.11/Wi-Fi wireless networking have made MANETs a popular research topic
since the mid- to late 1990s. Different protocols are then evaluated based on the packet
drop rate, the overhead introduced by the routing protocol, and other measures. A
because it does not rely on a preexisting infrastructure, such as routers in wired networks
participates in routing by forwarding data for other nodes, and so the determination of
which nodes forward data is made dynamically based on the network connectivity.
change rapidly and unpredictably. That leads towards the need of an effective
significantly lower capacity than wired ones. In addition, the actual throughput of
fading, noise, and interference conditions, etc.–is often much less than a radio’s
maximum transmission rate. One effect of the relatively low to moderate link
10
capacities is that congestion is typically the norm rather than the exception, so
demand from users will likely approach or exceed network capacity frequently.
infrastructure, mobile ad hoc users will demand similar services. These demands
applications rise.
may rely on batteries or other exhaustible means for their energy. For these nodes,
the most important system design criteria for optimization may be energy
large amount of energy to receive and decode entire packets. Limited physical
security Mobile wireless networks are generally more prone to physical security
threats than wired nets. The increased possibility of eavesdropping, spoofing, and
techniques are often applied within wireless networks to reduce security threats.
approaches.
reaching 1000 nodes in a sensor network. Thus, routing protocols should be able
11
CHAPTER 4
Power Management
Battery power is an important resource in ad hoc networks. It has been observed that in
ad hoc networks, energy consumption does not reflect the communication activities in the
backbone for global connectivity are oblivious to traffic characteristics. Nodes maintain
control messages and data transmission, these timers are set and refreshed on-demand.
Nodes that are not involved in data delivery may go to sleep as supported by the MAC
protocol. This soft state is aggregated across multiple flows and its maintenance requires
general desirable to turn the radio off when it is not in use. Motivated
12
networks by turning off devices that are not required for global
forwards data for other nodes and participates in high-level routing and
each node in the network, buffer data and wake up sleeping nodes.
13
detrimental to the operation of the whole network. To achieve reduced
DSDV is a hop-by-hop distance vector routing protocol. It is proactive and each node has
to periodically broadcast routing updates. The key advantage of DSDV over traditional
sequence numbers. Each DSDV node maintains a routing table listing the “next hop” for
each reachable destination. DSDV tags each route with a sequence number and each node
in the network advertises an increasing even sequence number for itself. When a node
decides its route to a destination is broken, it advertises the route to infinite metric and a
sequence number one greater than its sequence number for the route that has broken
14
(making an odd sequence number). This causes any node routing packets through node to
incorporate the infinite-metric route into its routing table until node hears a route to node
with a higher sequence number. DSDV uses triggered route updates when the topology
changes. The transmission of updates is delayed to introduce a softening effect when the
networks.The main contribution of the algorithm was to solve the routing loop problem.
Each entry in the routing table contains a sequence number, the sequence numbers are
DSR is a reactive protocol that uses source routing rather than hop-by-hop routing, with
each packet to be routed carrying in its header the complete, ordered list of nodes through
which the packet must pass. The key advantage of source routing is that intermediate
nodes do not need to maintain up-to-date routing information in order to route the packets
they forward, since the packets themselves already contain all the routing decisions. This
fact, coupled with the on-demand nature of the protocol, eliminates the need for the
periodic route advertisement and neighbor detection packets present in other protocols.
However, routing overhead is bigger. The DSR protocol consists of two mechanisms:
Route Discovery and Route Maintenance. Route Discovery is the mechanism by which a
node ns wanting to send a packet to a destination node obtains a path. To perform a Route
Discovery, the source node ns broadcasts a Route Request packet that is flooded through
the network in a controlled manner and is answered by a Route Reply packet from either
the destination node or another node that knows a route to the destination. To reduce the
cost of Route Discovery, each node maintains and actively uses a cache of source routes
15
it has learned or overheard. That way, the frequency and propagation of Route Requests
the network topology has changed such that it can no longer use its route to the
destination node because two nodes listed in the route have moved out of range of each
other. When Route Maintenance indicates a source route is broken, nodes are notified
with a Route Error packet. The sender ns can attempt to use any other route to node
already in its cache or can invoke Route Discovery again to find a new path. A DSR node
is able to learn routes by overhearing packets not addressed to it (the promiscuous mode).
However, this feature requires an active receiver in the nodes, which may be rather power
AODV is essentially a combination of both DSR and DSDV. It borrows the basic on
demand mechanism of Route Discovery and Route Maintenance from DSR, plus the use
of hop-by-hop routing, sequence numbers, and periodic beacons from DSDV. When a
node needs a route to some destination node, it broadcasts a Route Request message to its
neighbors, including the last known sequence number for that destination. The Route
Request is flooded until it reaches a node that knows a route to the destination. Each node
that forwards the Route Request creates a reverse route for itself back to node. When the
Route Request reaches a node with a route to node, that node generates a Route Reply
that contains the number of hops necessary to reach node and the sequence number for
node most recently seen by the node generating the Reply. Each node that participates in
forwarding this reply back toward the originator of the Route Request creates a forward
route to node. The state created in each node along the path is hop-by-hop state; that is,
16
each node remembers only the next hop and not the entire route, as would be done in
source routing. In order to maintain routes, AODV normally requires that each node
periodically transmit a HELLO message, with a default rate of once per second. Failure
that the link to the neighbor is down. Alternatively, the AODV specification briefly
suggests that a node may use physical layer or link layer methods to detect link breakages
to nodes that it considers neighbors When a link goes down, any upstream node that has
CHAPTER 5
Network Simulator-2
and wireless (local and satellite) networks, etc. The simulator is event-
methods and uses Tcl and Object Tcl shell as interface allowing the
links and shared media. A rich set of protocol objects can then be
essentially a centralized discrete event scheduler to schedule the events such as packet
17
and timer expiration. The centralized event scheduler cannot accurately emulate “events
occurred at the same time”, instead, it can only handle events occurred one by one in
time. However, this is not a serious problem in most network simulations, because the
events here are often transitory. Besides, ns-2 implements a variety of network
components and protocols. Notably, the wireless extension, derived from two
• Nodes do not move significantly over the length of time they transmit or receive a
packet. This assumption holds only for mobile nodes of high-rate and low-speed.
Consider a node with the sending rate of 10Kbps and moving speed of 10m/s,
during its receiving a packet of 1500B, the node moves 12m. Thus, the
of the provided propagation models include Doppler effects, although they could.
The C++ classes of ns-2 network components and protocols are implemented in the
subdirectory “Ns-2” and the TCL library (corresponding to configurations of these C++
• Network Components
Network components are Node, Link, Queue, etc. Some of them are simple components,
that is, they corresponds to a single C++ object; The others are compound components,
that is, they combine multiple simple components, e.g. a Link component is composed of
18
all network components are created, plugged and configured by some TCL scripts (./ns-
FIGURE-5.1
19
CHAPTER 6
Output
• OUTPUT OF AODV
20
• OUTPUT OF DSDV
21
Summary and Conclusion
22
We present a power management framework that reduces energy
active mode longer than necessary, which will result in reduced energy
23
References
[1] Rong Zheng and Robin Kravets, “On-demand Power Management for
Ad Hoc
Networks,”in Proc. of IEEE INFOCOM, 2003.
[2] Samyak Shah, Amit Khandre, Mahesh Shirole and Girish Bhole, “Performance Evaluation
of
Ad Hoc Routing Protocols Using NS2 Simulation”in CoMPC,2008.
[4] C.-K. Toh,”Maximum Battery Life Routing to Support Ubiquitous Mobile Computing
in Wireless Ad Hoc Networks”, IEEE Communication Magazine, June 2001.
24
Appendix A: Source Code
#ns-random 0
25
set f [open 1_out.tr w]
$ns trace-all $f
create-god $val(nn)
-llType $val(ll) \
-macType $val(mac) \
-ifqType $val(ifq) \
-ifqLen $val(ifqlen) \
26
-antType $val(ant) \
-propType $val(prop) \
-phyType $val(netif) \
#-channelType $val(chan) \
-topoInstance $topo \
-agentTrace OFF \
-routerTrace ON \
-macTrace ON \
-movementTrace OFF \
-channel $chan_1 # \
#-channel $chan_2 \
#-channel $chan_3 \
#-channel $chan_4 \
#-channel $chan_5 \
#-channel $chan_6
proc finish {} {
global ns f f0 f1 f2 f3 namtrace
$ns flush-trace
close $namtrace
close $f0
close $f1
close $f2
close $f3
27
exec xgraph packets_received.tr packets_lost.tr
# proj_out2.tr proj_out3.tr
exit 0
proc record {} {
#Set The Time After Which The Procedure Should Be Called Again
28
#Re-Schedule The Procedure
29
$n(3) color "red"
30
$n(4) set X_ 0.0
31
$ns attach-agent $n(2) $sink2
32
$cbr set packetSize_ $size
return $cbr
$ns run
33
# DSDV PROGRAM CODE
set val(chan) Channel/WirelessChannel ;# channel type
#ns-random 0
$ns trace-all $f
34
$topo load_flatgrid 800 800
create-god $val(nn)
-llType $val(ll) \
-macType $val(mac) \
-ifqType $val(ifq) \
-ifqLen $val(ifqlen) \
-antType $val(ant) \
-propType $val(prop) \
-phyType $val(netif) \
#-channelType $val(chan) \
-topoInstance $topo \
-agentTrace OFF \
-routerTrace ON \
-macTrace ON \
35
-movementTrace OFF \
-channel $chan_1 # \
#-channel $chan_2 \
#-channel $chan_3 \
#-channel $chan_4 \
#-channel $chan_5 \
#-channel $chan_6
proc finish {} {
global ns f f0 f1 f2 f3 namtrace
$ns flush-trace
close $namtrace
close $f0
close $f1
close $f2
close $f3
# proj_out2.tr proj_out3.tr
exit 0
proc record {} {
36
set ns [Simulator instance]
#Set The Time After Which The Procedure Should Be Called Again
37
$ns color 4 brown
38
for {set i 0} {$i < $val(nn)} {incr i} {
39
$ns at 0.0 "$n(2) setdest 300.0 200.0 3000.0"
40
$ns attach-agent $n(1) $tcp1
return $cbr
41
#set cbr2 [attach-CBR-traffic $n(2) $sink3 1000 .015]
$ns run
42
43