SlideShare a Scribd company logo
UNIT-III
SENSOR AND MESH NETWORKS
Sensor Networks – Role in Pervasive Computing – In Network
Processing and Data Dissemination – Sensor Databases – Data
Management in Wireless Mobile Environments –Wireless Mesh
Networks – Architecture – Mesh Routers – Mesh Clients –
Routing – Cross Layer Approach – Security Aspects of Various
Layers in WMN – Applications of Sensor and Mesh networks
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 1
SENSOR NETWORK
• Large networks of simple sensors
• Usually deployed randomly
• Very prone to failures
• Use broadcast paradigms to communicate with other sensors
• Collect information and send it to base station
• Must focus on power conservation, instead of QoS.
Energy=distance2
• Static: once deployed do not change.
• Dynamic: could move by themselves or by an external agent.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 2
Sensor node
power unit
sensing
unit
processing
storage transceiver
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1
3
Sensor node
power unit
sensing
unit
processing
storage transceiver
mobility
localization
energy scaravenging
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 4
Sensor characteristics
• consume low power
• autonomous
• operate in high volumetric densities
• adaptive to environment
• cheap
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 5
Transceiver unit
• Radio Frequency (RF)
more expensive and larger.
Interference omnidirectional antenna
directional antenna
• Optical laser beam (smart dust)
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 6
Transceiver unit
• Radio Frequency (RF)
more expensive and larger. Interference
omnidirectional antenna
directional antenna
• Optical laser beam (smart dust)
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 7
Transceiver unit
• Radio Frequency (RF)
more expensive and larger. Interference
omnidirectional antenna
directional antenna
• Optical laser beam (smart dust)
need line of sight for communication
no interference
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 8
Ex. Smart Dust:
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 9
ROLE IN PERVASIVE COMPUTING
Motivation:
• Future ‘pervasive applications’ need to adapt the variations of
context of execution, change of locations, change of devices,
change of hardware resources of devices, and so on
• Recent research efforts focused on designing new mobile
middleware systems capable of supporting mobility
• Apart from mobility, pervasive middleware will need to
operate under above-mentioned conditions of a radical change
• Few contemporary researches have indeed focused on some of
these requirement
• A qualitative difference between intended requirements and
practical achievements still remains there
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 10
Characteristics
• Pervasive middleware is characterized by following:
• Context awareness and service discovery
– learn the environment so that the interactions between
services and devices are made proper to get a desired
service
• Smartness and adaptation
– construct, manipulate and display environments, resources
and contents for any services
• Heterogeneity and integration
– handle different applications on different devices connected
to different network environments, and integrate a number
of parameters such as QoS, service reliability, invisibility
etc.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 11
• Programming interface
– address issues related to service adaptation and integration
• Disconnectivity
– protect services and applications from transient failures
when users or devices go out of the range of wireless
connectivity
• Security
– minimize threats to privacy, in spite of being pervasive
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 12
Design Components
• Three prime design components of a pervasive
middleware
• Proactive Knowledge on Environment
– discover proactively network bandwidth, nature of
communication, types of devices and their
functionalities
– Pervasive middleware will facilitate a transparent
communication model to applications to interact
flexibly with different devices in different network
environments
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 13
• Building Applications on Context-awareness
– develop systems, which determine user tasks in different
contexts, such as profile history, preferences, societal
behavior and environmental conditions
– An application is usually synthesized to suit tasks,
associated with components and services
• Appropriate Programming Interface
– express different activities, preferences of users, and
different characteristics of physical and functional
computing components
– the semantic modeling in pervasive middleware should
provide a uniform and common way to express context-
awareness for users’ various activities in their applications
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 14
Recent Research Efforts
Projects Key Issues
UIC Heterogeneity of devices and networks: It helps users to specialize to
the particular properties of different devices and network environments
RCSM Context awareness in applications during development and runtime
operation: It combines the characteristics of context awareness and ad
hoc communications in a way to facilitate running complex applications
on devices
Gaia Dynamic adaptation to the context of mobile applications: It supports
the development and execution of portable applications in active spaces
Nexus Heterogeneity in networks: It provides an infrastructure that supports
communication in heterogeneous network environments
Aura Distraction-free pervasive computing: It develops the system
architecture, algorithms, interfaces and evaluation techniques to meet the
goal of pervasive computing
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 15
Challenges
• Some of immediate challenges faced by the researchers are
charted below:
• Service discovery
– Research challenge would be to make use of a task (needs)
to discover services in an entire pervasive computing
environment that would be able to give services to users
based on QoS-aware specifications
– Example: L2imbo has developed a middleware to support
QoS in mobile applications. However, currently these
needs are taken into account locally only
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 16
• Context awareness
– Research challenge will be that N classes of applications
will have to adopt M numbers devices (N-to-M) instead of
doing a single new application to a group of devices (1-to-
M)
– Context (or extension) with respect to an application is to
bind and re-bind a number of pervasive devices to facilitate
the continuity of applications running on
– Example: In projects-RCSM, Lime, Tspaces- task
components interact with services by sharing a tuple space
or an event service or data-oriented services
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 17
• Adaptation
– Different adaptation schemes need different system
configurations that vary over time to accommodate
dynamic requirements of users
– Research challenge arises because adaptation must
often take place without human intervention or
‘minimum’ human intervention to achieve calm
computing
– Possible extensions of existing mobile middleware are
to include transformation and adaptation for content and
human interface in terms of context in applications
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 18
IN NETWORK PROCESSING AND DATA
DISSEMINATION
Conventional Methods
• Direct communication with the base station
– Sensor nodes communicate with the base station directly.
– Energy consuming.
• Multi-hop Scheme
– Transmit through some other intermediate nodes.
– Energy consuming.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 19
Clustering Hierarchy
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 20
Low Energy Adaptive Clustering Hierarchy
(LEACH)
• Designed for sensor networks where an end-user wants to remotely
monitor the environment. Where the data from the individual nodes
must be sent to a central base station, often located far from the sensor
network.
• Desirable properties for protocols on these networks:
– Use 100’s – 1000’s of nodes
– Maximize system lifetime
– Maximize network coverage
– Use uniform, battery operated nodes
• The use of distributed cluster formation and local processing to reduce
global communication along with randomized rotation of the cluster-
heads allows LEACH to achieve the desired properties while being
energy-efficient.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 21
SENSOR DATABASES
Why Databases and Sensors?
•All applications depend on data processing
•Declarative query language over sensors attractive
– Application specific solutions difficult to built and deploy
•Want “to combine and aggregate data streaming from motes.”
– Sounds like a database…
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 22
New Problems In Sensor Databases
• Sensors unreliable
– Come on and offline, variable bandwidth
• Sensors push data
• Sensors stream data
• Sensors have limited memory, power, bandwidth
– Communication very expensive
• Sensors have processors
• Sensors very numerous
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 23
Components of A Sensor Database
• Server Side
– Query Parser
– Catalog
– Query Optimizer
– Query Executor
– Query Processor
• Sensor Side
– Catalog ‘Advertisements’
– Query Processor
– Network Management
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 24
Why Mobile Data Management?
• Wireless Connectivity and use of PDA’s, handheld computing
devices on the rise
• Workforces will carry extracts of corporate databases with
them to have continuous connectivity
• Need central database repositories to serve these work groups
and keep them fairly upto-date and consistent
DATA MANAGEMENT IN WIRELESS
MOBILE ENVIRONMENTS
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 25
Mobile Data Applications
• Sales Force Automation - especially in
pharmaceutical industry, consumer goods,
parts
• Financial Consulting and Planning
• Insurance and Claim Processing - Auto,
General, and Life Insurance
• Real Estate/Property Management -
Maintenance and Building Contracting
• Mobile E-commerce
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 26
Mobility – Impact on DBMS
• Handling/representing fast-changing data
• Scale
• Data Shipping v/s Query shipping
• Transaction Management
• Replica management
• Integrity constraint enforcement
• Recovery
• Location Management
• Security
• User interfaces
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 27
• Most RDBMS vendors support the mobile scenario - but no
design and optimization aids
• Specialized Environments for mobile applications:
Sybase Remote Server
Synchrologic iMOBILE
Microsoft SQL server - mobile application support
Oracle Lite
Xtnd-Connect-Server (Extended Technologies)
Scoutware (Riverbed Technologies)
DBMS Industry Scenario
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 28
WIRELESS MESH NETWORKS
• A wireless mesh network (WMN) is a communications
network made up of radio nodes organized in a mesh topology.
• Wireless mesh networks often consist of
– mesh clients
– mesh routers
• Mesh routers contain additional routing functionality due to the
presence of wireless interface card in them
• Nodes have two functions:
– Generate/terminate traffic
– Route traffic for other nodes
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 29
Characteristics of Wireless mesh networks
• Multihop Wireless network.
• Support for adhoc networking and capability of self forming,
self healing and self organization.
• Mobility dependence on the type of mesh node.
• Multiple types of network access.
• Dependence of power consumption constraints on the type of
mesh nodes
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 30
Why WMN?
• Multi-hop wireless network
• Support for ad-hoc networking, and capability of self-
forming, self healing and self organization.
• Multiple types of network access
• Mobility dependence on the type of mesh nodes
• Compatibility and interpretability with existing wireless
technologies
• Compatibility and inter operability with existing
wireless networks
• Dedicated routing and configuration
• Mobility
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 31
WIRELESS MESH NETWORKS
ARCHITECTURE
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 32
Types of WMN
• Infrastructure/ Backbone WMN
• Client WMN
• Hybrid WMN
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 33
Infrastructure/Backbone WMN
• Mesh routers form an mesh infrastructure among
themselves.
• Provides backbone for clients and enables integration of
WMNs with existing wireless networks and Internet
through gateway/bridge functionalities.
• Clients connect to mesh router with wireless link or
Ethernet
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 34
Infrastructure/Backbone WMN
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 35
Client WMN
• Client nodes constitute peer-to-peer network, and perform
routing and configuration functionalities as well as provide
end-user applications to customers, ”mesh routers are not
required”
• Multi-hop routing.
• Client nodes have to perform additional functions such as
routing and self-configuration.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 36
Client WMN
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 37
Hybrid WMN
• A combination of infrastructure and client meshing.
• Infrastructure provides connectivity to other networks such as
the Internet, Wi-Fi, WiMAX, cellular, and sensor networks;
• Mesh clients can access the network through mesh routers as
well as directly meshing with other mesh clients.
• The routing capabilities of clients provide better connectivity
and coverage
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 38
Hybrid WMN
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 39
Protocol Design
• Physical Layer
• Mac Layer
• Network Layer
• Transport Layer
• Application Layer
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 40
Physical Layer
• Orthogonal frequency multiple access (OFDM) has
significantly increased the speed of IEEE 802.11 from 11
mbps to 54 mbps.
• Ultra-wide band (UWB) can achieve much higher rate for
short-distance applications.
• MIMO can increase system capacity by three times or even
more.
• Frequency agile or cognitive radios can achieve much better
spectrum utilization.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 41
MAC Layer
Differences between WMNs MACs and Wireless Networks
MACs
• MACs for WMNs are concerned with more than one hop
communication
• MAC must be distributed and collaborative, and must
work for multipoint-to-multipoint communication.
• Network self-organization is needed for better collaboration
between neighboring nodes and nodes in multi-hop distances.
• Mobility affects the performance of MAC.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 42
Routing Layer
Features of routing protocol for WMNs:
• Multiple Performance Metrics
– Hop-count is not an effective routing metric.
– Other performance metrics, e.g., link quality and round trip
time (RTT), must be considered.
• Scalability
– Routing setup in large network is time consuming.
– Node states on the path may change.
– Scalability of routing protocol is critical in WMNs.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 43
Routing Layer
• Robustness
– WMNs must be robust to link failures or congestion.
– Routing protocols need to be fault tolerant with link
failures and can achieve load balancing.
• Adaptive Support of Both Mesh Routers and Mesh Clients
– Mesh routers : minimal mobility, no constraint of power
consumption, routing is simpler
– Mesh clients : mobility, power efficiency, routing is
complicated
– Need to design a routing protocol that can adaptively
support both mesh routers and mesh clients.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 44
Transport layer: research issues
• Cross-layer Solution to Network Asymmetry
– Routing protocol can select an optimal path for both data
and ACK packets.
– MAC layer and error control may need to treat TCP data
and ACK packets differently.
• Adaptive TCP
– WMNs will be integrated with the Internet and various
wireless networks such as IEEE 802.11, 802.16, 802.15,
etc.
– Same TCP is not effective for all networks.
– Applying different TCPs in different networks is a
complicated and costly approach, and cannot achieve
satisfactory performance.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 45
Application layer
Applications supported by WMNs:
• Internet Access
– Advantages of WMNs: low cost, higher speed, and easy
installation.
• Distributed Information Storage and Sharing
– Data sharing between nodes within WMNs
– Query/retrieve information located in distributed database
servers.
• Information Exchange across Multiple Wireless Networks.
– Cellular phone talks Wi-Fi phone through WMNs,
– Wi-Fi user monitors the status of wireless sensor networks.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 46
When WMN?
• Broadband home networking
• Community and neighborhood networking
• Enterprise networking
• Wireless mesh networks
• Transportation systems
• Building automation
• Health and medical systems
• Security surveillance systems
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 47
MESH ROUTER
• Routers are used to direct data traffic from one place, or node,
to another. Each router has a specific set of locations from
which it can accept data, and a specific set of locations to
which it can send data
• A mesh, or multi-hop network, is a highly decentralized way
of organizing nodes that does not require predetermined paths
between them. Such networks are made possible by mesh
routers, which adjust, in real time, the locations with which
they can communicate.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 48
MESH CLIENTS
• The mesh clients are often laptops, cell phones
and other wireless devices.
• Necessary routing capability
• No bridging, single wireless interface --
hardware platform &software much simpler
• High variety of devices, e.g. laptop/desktop
PC, pocket PC, PDA, IP phone etc.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 49
ROUTING
• The design of the routing protocols for WMNs is still an area
of research although there are many routing protocols that are
available for ad hoc networks.
• However, an optimal routing protocol for WMNs must possess
features like:
– multiple performance metrics
– scalability
– robustness and
– efficient routing with mesh infrastructure.
• The routing protocols for ad hoc networks is equipped with
some of these features, but non of them possesses all of the
above.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 50
• Multi Radio Routing
– In a multi-radio link quality source routing (MR-LQSR) a
new performance metric , weighted cumulative expected
transmission time (WCETT) , is incorporated.
– Both link quality metric and the minimum hop count are
accounted for in WCETT which provides a good tradeoff
between delay and throughput.
• Multi-Path Routing:
– Better load balancing and providing high fault tolerance are
the two main objectives of using multi-path routing.
– Multiple paths are selected between source and the
destination
– This provides better fault tolerance as when a link is
broken another path can be chosen.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 51
– This enhances efficiency since without waiting to set up a
new routing path, the end-to-end delay, throughput, and
fault tolerance can be improved.
– Complexity is the major hurdle of multi-path routing.
• Geographical routing
- This kind of routing scheme forwards packets only by
using the position information of the nodes in the vicinity
and in the destination node unlike the topology based
schemes.
- This suggests that there is less impact on the geographic
routing due to a topology change than the other routing
protocols.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 52
CROSS-LAYER APPROACH
• Cross-layer optimization is an escape from the pure
waterfall-like concept of the OSI communications model with
virtually strict boundaries between layers.
• The cross layer approach transports feedback dynamically via
the layer boundaries to enable the compensation for e.g.
overload, latency or other mismatch of requirements and
resources by any control input to another layer but that layer
directly affected by the detected deficiency.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 53
SECURITY ASPECTS OF VARIOUS LAYERS IN
WMN
• various possible attacks on different layers of the
communication protocol stack for WMNs and their
corresponding defense mechanisms.
• First, it identifies the security vulnerabilities in the physical,
link, network, transport, application layers.
• Furthermore, various possible attacks on the key management
protocols, user authentication and access control protocols,
and user privacy preservation protocols are presented.
• Security schemes for WMNs are still not ready. Due to the
distributed nature of WMN, there is no centralized authority
that can be fully trusted and can distribute a public key.
• Capacity, scalability, and QoS are considered as the major
weakness of current WMN technology.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 54
APPLICATIONS OF SENSOR NETWORK
• Area monitoring
• Health care monitoring
• Environmental/Earth monitoring
• Air quality monitoring
• Air pollution monitoring
• Forest fire detection
• Landslide detection
• Water quality monitoring
• Natural disaster prevention
• Industrial monitoring
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 55
APPLICATIONS OF MESH NETWORK
• U.S. military forces are now using wireless mesh networking
to connect their computers, mainly ruggedized laptops, in field
operations.
• Electric meters now being deployed on residences transfer
their readings from one to another and eventually to the central
office for billing without the need for human meter readers or
the need to connect the meters with cables.
• The laptops in the One Laptop per Child program use wireless
mesh networking to enable students to exchange files and get
on the Internet even though they lack wired or cell phone or
other physical connections in their area.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 56
• Unique Mesh Dynamics Technology Benefits for Mining
Applications
• A miner location and tracking system based on Wi-Fi
• Remote Real Time Video Monitoring of Long wall Shearers.
IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 57

More Related Content

PPT
UNIT 4 MOBILE AND PERVASIVE COMPUTING NOTES
PPT
pervasive computing is a technology that prevade's the user environment
PDF
The common challenges of mobile internet for up coming generation
PDF
The common challenges of mobile internet for up coming generation
PPTX
Necos keynote UFRN Telecomday
PDF
Wireless sensor networks software architecture
PPT
Netkit
PDF
CSIR 5G Research
UNIT 4 MOBILE AND PERVASIVE COMPUTING NOTES
pervasive computing is a technology that prevade's the user environment
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
Necos keynote UFRN Telecomday
Wireless sensor networks software architecture
Netkit
CSIR 5G Research

Similar to UNIT 3 MOBIL;E AND PERVASIVE COMPUTING NOTES (20)

PDF
Ijarcet vol-2-issue-7-2297-2301
PDF
Ijarcet vol-2-issue-7-2297-2301
PDF
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
PPTX
Ubiquitous computing
PDF
NECOS - Concertation Meeting EUBrasilCloudFORUM
PDF
Week 8 Lecture Material.pdf Spftware defined Networking
PPT
Ukd2008 18-9-08 andrea
PDF
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
PPT
Synapseindia mobile apps cellular networks and mobile computing part1
PDF
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
PDF
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
PPT
sensor networks unit wise 4 ppt units ppt
PDF
Design of optimal system level for embedded wireless sensor unit
PDF
6 lte-a challenges and evolving lte network architecture
PDF
Grid computing notes
PDF
Module 1 Lec 1-6- WSN-EC6128.pdf
PDF
Task & resource self adaptive
PDF
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
PPT
ln13-dshhhhhhhhhhhhhhhhjjjjjjjjkkjjj.ppt
PPT
ln13-ds.pptefefdfdgdgerhfhgjhmmmmmmmmmmm
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
Ubiquitous computing
NECOS - Concertation Meeting EUBrasilCloudFORUM
Week 8 Lecture Material.pdf Spftware defined Networking
Ukd2008 18-9-08 andrea
NECOS Industrial Workshop Technical highlights by Prof. Alex Galis (Universit...
Synapseindia mobile apps cellular networks and mobile computing part1
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
Digital_Notes___UNIT_5___EC8702___AD_HOC_AND__WIRELESS_SENSOR__NETWORKS.pdf.pdf
sensor networks unit wise 4 ppt units ppt
Design of optimal system level for embedded wireless sensor unit
6 lte-a challenges and evolving lte network architecture
Grid computing notes
Module 1 Lec 1-6- WSN-EC6128.pdf
Task & resource self adaptive
TASK & RESOURCE SELF-ADAPTIVE EMBEDDED REAL-TIME OPERATING SYSTEM MICROKERNEL...
ln13-dshhhhhhhhhhhhhhhhjjjjjjjjkkjjj.ppt
ln13-ds.pptefefdfdgdgerhfhgjhmmmmmmmmmmm
Ad

Recently uploaded (20)

PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Hazard Identification & Risk Assessment .pdf
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
Lesson notes of climatology university.
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
Complications of Minimal Access Surgery at WLH
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PDF
advance database management system book.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
Classroom Observation Tools for Teachers
PDF
Trump Administration's workforce development strategy
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Introduction to Building Materials
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
A systematic review of self-coping strategies used by university students to ...
Hazard Identification & Risk Assessment .pdf
Indian roads congress 037 - 2012 Flexible pavement
Lesson notes of climatology university.
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Practical Manual AGRO-233 Principles and Practices of Natural Farming
Complications of Minimal Access Surgery at WLH
Paper A Mock Exam 9_ Attempt review.pdf.
advance database management system book.pdf
RMMM.pdf make it easy to upload and study
Classroom Observation Tools for Teachers
Trump Administration's workforce development strategy
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Introduction to Building Materials
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
Ad

UNIT 3 MOBIL;E AND PERVASIVE COMPUTING NOTES

  • 1. UNIT-III SENSOR AND MESH NETWORKS Sensor Networks – Role in Pervasive Computing – In Network Processing and Data Dissemination – Sensor Databases – Data Management in Wireless Mobile Environments –Wireless Mesh Networks – Architecture – Mesh Routers – Mesh Clients – Routing – Cross Layer Approach – Security Aspects of Various Layers in WMN – Applications of Sensor and Mesh networks IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 1
  • 2. SENSOR NETWORK • Large networks of simple sensors • Usually deployed randomly • Very prone to failures • Use broadcast paradigms to communicate with other sensors • Collect information and send it to base station • Must focus on power conservation, instead of QoS. Energy=distance2 • Static: once deployed do not change. • Dynamic: could move by themselves or by an external agent. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 2
  • 3. Sensor node power unit sensing unit processing storage transceiver IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 3
  • 4. Sensor node power unit sensing unit processing storage transceiver mobility localization energy scaravenging IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 4
  • 5. Sensor characteristics • consume low power • autonomous • operate in high volumetric densities • adaptive to environment • cheap IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 5
  • 6. Transceiver unit • Radio Frequency (RF) more expensive and larger. Interference omnidirectional antenna directional antenna • Optical laser beam (smart dust) IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 6
  • 7. Transceiver unit • Radio Frequency (RF) more expensive and larger. Interference omnidirectional antenna directional antenna • Optical laser beam (smart dust) IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 7
  • 8. Transceiver unit • Radio Frequency (RF) more expensive and larger. Interference omnidirectional antenna directional antenna • Optical laser beam (smart dust) need line of sight for communication no interference IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 8
  • 9. Ex. Smart Dust: IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 9
  • 10. ROLE IN PERVASIVE COMPUTING Motivation: • Future ‘pervasive applications’ need to adapt the variations of context of execution, change of locations, change of devices, change of hardware resources of devices, and so on • Recent research efforts focused on designing new mobile middleware systems capable of supporting mobility • Apart from mobility, pervasive middleware will need to operate under above-mentioned conditions of a radical change • Few contemporary researches have indeed focused on some of these requirement • A qualitative difference between intended requirements and practical achievements still remains there IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 10
  • 11. Characteristics • Pervasive middleware is characterized by following: • Context awareness and service discovery – learn the environment so that the interactions between services and devices are made proper to get a desired service • Smartness and adaptation – construct, manipulate and display environments, resources and contents for any services • Heterogeneity and integration – handle different applications on different devices connected to different network environments, and integrate a number of parameters such as QoS, service reliability, invisibility etc. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 11
  • 12. • Programming interface – address issues related to service adaptation and integration • Disconnectivity – protect services and applications from transient failures when users or devices go out of the range of wireless connectivity • Security – minimize threats to privacy, in spite of being pervasive IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 12
  • 13. Design Components • Three prime design components of a pervasive middleware • Proactive Knowledge on Environment – discover proactively network bandwidth, nature of communication, types of devices and their functionalities – Pervasive middleware will facilitate a transparent communication model to applications to interact flexibly with different devices in different network environments IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 13
  • 14. • Building Applications on Context-awareness – develop systems, which determine user tasks in different contexts, such as profile history, preferences, societal behavior and environmental conditions – An application is usually synthesized to suit tasks, associated with components and services • Appropriate Programming Interface – express different activities, preferences of users, and different characteristics of physical and functional computing components – the semantic modeling in pervasive middleware should provide a uniform and common way to express context- awareness for users’ various activities in their applications IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 14
  • 15. Recent Research Efforts Projects Key Issues UIC Heterogeneity of devices and networks: It helps users to specialize to the particular properties of different devices and network environments RCSM Context awareness in applications during development and runtime operation: It combines the characteristics of context awareness and ad hoc communications in a way to facilitate running complex applications on devices Gaia Dynamic adaptation to the context of mobile applications: It supports the development and execution of portable applications in active spaces Nexus Heterogeneity in networks: It provides an infrastructure that supports communication in heterogeneous network environments Aura Distraction-free pervasive computing: It develops the system architecture, algorithms, interfaces and evaluation techniques to meet the goal of pervasive computing IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 15
  • 16. Challenges • Some of immediate challenges faced by the researchers are charted below: • Service discovery – Research challenge would be to make use of a task (needs) to discover services in an entire pervasive computing environment that would be able to give services to users based on QoS-aware specifications – Example: L2imbo has developed a middleware to support QoS in mobile applications. However, currently these needs are taken into account locally only IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 16
  • 17. • Context awareness – Research challenge will be that N classes of applications will have to adopt M numbers devices (N-to-M) instead of doing a single new application to a group of devices (1-to- M) – Context (or extension) with respect to an application is to bind and re-bind a number of pervasive devices to facilitate the continuity of applications running on – Example: In projects-RCSM, Lime, Tspaces- task components interact with services by sharing a tuple space or an event service or data-oriented services IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 17
  • 18. • Adaptation – Different adaptation schemes need different system configurations that vary over time to accommodate dynamic requirements of users – Research challenge arises because adaptation must often take place without human intervention or ‘minimum’ human intervention to achieve calm computing – Possible extensions of existing mobile middleware are to include transformation and adaptation for content and human interface in terms of context in applications IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 18
  • 19. IN NETWORK PROCESSING AND DATA DISSEMINATION Conventional Methods • Direct communication with the base station – Sensor nodes communicate with the base station directly. – Energy consuming. • Multi-hop Scheme – Transmit through some other intermediate nodes. – Energy consuming. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 19
  • 20. Clustering Hierarchy IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 20
  • 21. Low Energy Adaptive Clustering Hierarchy (LEACH) • Designed for sensor networks where an end-user wants to remotely monitor the environment. Where the data from the individual nodes must be sent to a central base station, often located far from the sensor network. • Desirable properties for protocols on these networks: – Use 100’s – 1000’s of nodes – Maximize system lifetime – Maximize network coverage – Use uniform, battery operated nodes • The use of distributed cluster formation and local processing to reduce global communication along with randomized rotation of the cluster- heads allows LEACH to achieve the desired properties while being energy-efficient. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 21
  • 22. SENSOR DATABASES Why Databases and Sensors? •All applications depend on data processing •Declarative query language over sensors attractive – Application specific solutions difficult to built and deploy •Want “to combine and aggregate data streaming from motes.” – Sounds like a database… IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 22
  • 23. New Problems In Sensor Databases • Sensors unreliable – Come on and offline, variable bandwidth • Sensors push data • Sensors stream data • Sensors have limited memory, power, bandwidth – Communication very expensive • Sensors have processors • Sensors very numerous IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 23
  • 24. Components of A Sensor Database • Server Side – Query Parser – Catalog – Query Optimizer – Query Executor – Query Processor • Sensor Side – Catalog ‘Advertisements’ – Query Processor – Network Management IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 24
  • 25. Why Mobile Data Management? • Wireless Connectivity and use of PDA’s, handheld computing devices on the rise • Workforces will carry extracts of corporate databases with them to have continuous connectivity • Need central database repositories to serve these work groups and keep them fairly upto-date and consistent DATA MANAGEMENT IN WIRELESS MOBILE ENVIRONMENTS IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 25
  • 26. Mobile Data Applications • Sales Force Automation - especially in pharmaceutical industry, consumer goods, parts • Financial Consulting and Planning • Insurance and Claim Processing - Auto, General, and Life Insurance • Real Estate/Property Management - Maintenance and Building Contracting • Mobile E-commerce IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 26
  • 27. Mobility – Impact on DBMS • Handling/representing fast-changing data • Scale • Data Shipping v/s Query shipping • Transaction Management • Replica management • Integrity constraint enforcement • Recovery • Location Management • Security • User interfaces IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 27
  • 28. • Most RDBMS vendors support the mobile scenario - but no design and optimization aids • Specialized Environments for mobile applications: Sybase Remote Server Synchrologic iMOBILE Microsoft SQL server - mobile application support Oracle Lite Xtnd-Connect-Server (Extended Technologies) Scoutware (Riverbed Technologies) DBMS Industry Scenario IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 28
  • 29. WIRELESS MESH NETWORKS • A wireless mesh network (WMN) is a communications network made up of radio nodes organized in a mesh topology. • Wireless mesh networks often consist of – mesh clients – mesh routers • Mesh routers contain additional routing functionality due to the presence of wireless interface card in them • Nodes have two functions: – Generate/terminate traffic – Route traffic for other nodes IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 29
  • 30. Characteristics of Wireless mesh networks • Multihop Wireless network. • Support for adhoc networking and capability of self forming, self healing and self organization. • Mobility dependence on the type of mesh node. • Multiple types of network access. • Dependence of power consumption constraints on the type of mesh nodes IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 30
  • 31. Why WMN? • Multi-hop wireless network • Support for ad-hoc networking, and capability of self- forming, self healing and self organization. • Multiple types of network access • Mobility dependence on the type of mesh nodes • Compatibility and interpretability with existing wireless technologies • Compatibility and inter operability with existing wireless networks • Dedicated routing and configuration • Mobility IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 31
  • 32. WIRELESS MESH NETWORKS ARCHITECTURE IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 32
  • 33. Types of WMN • Infrastructure/ Backbone WMN • Client WMN • Hybrid WMN IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 33
  • 34. Infrastructure/Backbone WMN • Mesh routers form an mesh infrastructure among themselves. • Provides backbone for clients and enables integration of WMNs with existing wireless networks and Internet through gateway/bridge functionalities. • Clients connect to mesh router with wireless link or Ethernet IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 34
  • 35. Infrastructure/Backbone WMN IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 35
  • 36. Client WMN • Client nodes constitute peer-to-peer network, and perform routing and configuration functionalities as well as provide end-user applications to customers, ”mesh routers are not required” • Multi-hop routing. • Client nodes have to perform additional functions such as routing and self-configuration. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 36
  • 37. Client WMN IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 37
  • 38. Hybrid WMN • A combination of infrastructure and client meshing. • Infrastructure provides connectivity to other networks such as the Internet, Wi-Fi, WiMAX, cellular, and sensor networks; • Mesh clients can access the network through mesh routers as well as directly meshing with other mesh clients. • The routing capabilities of clients provide better connectivity and coverage IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 38
  • 39. Hybrid WMN IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 39
  • 40. Protocol Design • Physical Layer • Mac Layer • Network Layer • Transport Layer • Application Layer IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 40
  • 41. Physical Layer • Orthogonal frequency multiple access (OFDM) has significantly increased the speed of IEEE 802.11 from 11 mbps to 54 mbps. • Ultra-wide band (UWB) can achieve much higher rate for short-distance applications. • MIMO can increase system capacity by three times or even more. • Frequency agile or cognitive radios can achieve much better spectrum utilization. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 41
  • 42. MAC Layer Differences between WMNs MACs and Wireless Networks MACs • MACs for WMNs are concerned with more than one hop communication • MAC must be distributed and collaborative, and must work for multipoint-to-multipoint communication. • Network self-organization is needed for better collaboration between neighboring nodes and nodes in multi-hop distances. • Mobility affects the performance of MAC. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 42
  • 43. Routing Layer Features of routing protocol for WMNs: • Multiple Performance Metrics – Hop-count is not an effective routing metric. – Other performance metrics, e.g., link quality and round trip time (RTT), must be considered. • Scalability – Routing setup in large network is time consuming. – Node states on the path may change. – Scalability of routing protocol is critical in WMNs. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 43
  • 44. Routing Layer • Robustness – WMNs must be robust to link failures or congestion. – Routing protocols need to be fault tolerant with link failures and can achieve load balancing. • Adaptive Support of Both Mesh Routers and Mesh Clients – Mesh routers : minimal mobility, no constraint of power consumption, routing is simpler – Mesh clients : mobility, power efficiency, routing is complicated – Need to design a routing protocol that can adaptively support both mesh routers and mesh clients. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 44
  • 45. Transport layer: research issues • Cross-layer Solution to Network Asymmetry – Routing protocol can select an optimal path for both data and ACK packets. – MAC layer and error control may need to treat TCP data and ACK packets differently. • Adaptive TCP – WMNs will be integrated with the Internet and various wireless networks such as IEEE 802.11, 802.16, 802.15, etc. – Same TCP is not effective for all networks. – Applying different TCPs in different networks is a complicated and costly approach, and cannot achieve satisfactory performance. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 45
  • 46. Application layer Applications supported by WMNs: • Internet Access – Advantages of WMNs: low cost, higher speed, and easy installation. • Distributed Information Storage and Sharing – Data sharing between nodes within WMNs – Query/retrieve information located in distributed database servers. • Information Exchange across Multiple Wireless Networks. – Cellular phone talks Wi-Fi phone through WMNs, – Wi-Fi user monitors the status of wireless sensor networks. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 46
  • 47. When WMN? • Broadband home networking • Community and neighborhood networking • Enterprise networking • Wireless mesh networks • Transportation systems • Building automation • Health and medical systems • Security surveillance systems IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 47
  • 48. MESH ROUTER • Routers are used to direct data traffic from one place, or node, to another. Each router has a specific set of locations from which it can accept data, and a specific set of locations to which it can send data • A mesh, or multi-hop network, is a highly decentralized way of organizing nodes that does not require predetermined paths between them. Such networks are made possible by mesh routers, which adjust, in real time, the locations with which they can communicate. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 48
  • 49. MESH CLIENTS • The mesh clients are often laptops, cell phones and other wireless devices. • Necessary routing capability • No bridging, single wireless interface -- hardware platform &software much simpler • High variety of devices, e.g. laptop/desktop PC, pocket PC, PDA, IP phone etc. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 49
  • 50. ROUTING • The design of the routing protocols for WMNs is still an area of research although there are many routing protocols that are available for ad hoc networks. • However, an optimal routing protocol for WMNs must possess features like: – multiple performance metrics – scalability – robustness and – efficient routing with mesh infrastructure. • The routing protocols for ad hoc networks is equipped with some of these features, but non of them possesses all of the above. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 50
  • 51. • Multi Radio Routing – In a multi-radio link quality source routing (MR-LQSR) a new performance metric , weighted cumulative expected transmission time (WCETT) , is incorporated. – Both link quality metric and the minimum hop count are accounted for in WCETT which provides a good tradeoff between delay and throughput. • Multi-Path Routing: – Better load balancing and providing high fault tolerance are the two main objectives of using multi-path routing. – Multiple paths are selected between source and the destination – This provides better fault tolerance as when a link is broken another path can be chosen. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 51
  • 52. – This enhances efficiency since without waiting to set up a new routing path, the end-to-end delay, throughput, and fault tolerance can be improved. – Complexity is the major hurdle of multi-path routing. • Geographical routing - This kind of routing scheme forwards packets only by using the position information of the nodes in the vicinity and in the destination node unlike the topology based schemes. - This suggests that there is less impact on the geographic routing due to a topology change than the other routing protocols. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 52
  • 53. CROSS-LAYER APPROACH • Cross-layer optimization is an escape from the pure waterfall-like concept of the OSI communications model with virtually strict boundaries between layers. • The cross layer approach transports feedback dynamically via the layer boundaries to enable the compensation for e.g. overload, latency or other mismatch of requirements and resources by any control input to another layer but that layer directly affected by the detected deficiency. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 53
  • 54. SECURITY ASPECTS OF VARIOUS LAYERS IN WMN • various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. • First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. • Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. • Security schemes for WMNs are still not ready. Due to the distributed nature of WMN, there is no centralized authority that can be fully trusted and can distribute a public key. • Capacity, scalability, and QoS are considered as the major weakness of current WMN technology. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 54
  • 55. APPLICATIONS OF SENSOR NETWORK • Area monitoring • Health care monitoring • Environmental/Earth monitoring • Air quality monitoring • Air pollution monitoring • Forest fire detection • Landslide detection • Water quality monitoring • Natural disaster prevention • Industrial monitoring IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 55
  • 56. APPLICATIONS OF MESH NETWORK • U.S. military forces are now using wireless mesh networking to connect their computers, mainly ruggedized laptops, in field operations. • Electric meters now being deployed on residences transfer their readings from one to another and eventually to the central office for billing without the need for human meter readers or the need to connect the meters with cables. • The laptops in the One Laptop per Child program use wireless mesh networking to enable students to exchange files and get on the Internet even though they lack wired or cell phone or other physical connections in their area. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 56
  • 57. • Unique Mesh Dynamics Technology Benefits for Mining Applications • A miner location and tracking system based on Wi-Fi • Remote Real Time Video Monitoring of Long wall Shearers. IFETCE/M.E (CSE) /I YEAR/I SEM/ NE7002/MPC/UNIT-III/PPT/VERSION1.1 57