23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Routing in Wireless Networks 4-5<br />

• On some occasions, a mobile user may experience a link outage in some situations, such as driving<br />

through a tunnel or being in an elevator. During these periods, the user has no radio connectivity,<br />

and if such periods have a duration greater than application timers, ongoing <strong>communication</strong>s<br />

may be aborted.<br />

• Delay jitter may be caused by a number of reasons when using wireless technologies.<br />

• Some or all of the nodes will be powered by batteries, which means that energy saving is an important<br />

factor when dealing with this type of network. As energy consumption is directly proportional<br />

to the distance between hosts (proportional to radius squared), single-hop transmissions between<br />

two hosts require a lot of power, causing interference with other hosts. To avoid this problem in routing,<br />

two hosts can use a multi-hop transmission to communicate with each other via other nodes<br />

in the network.<br />

• Problems related to security are accentuated in wireless networks. As it is a shared environment to<br />

which anybody can have access, confidentiality of data is an important consideration.<br />

• When we work with wireless networks, we must consider some problems such as hidden terminals,<br />

which occur when there are two nodes within <strong>communication</strong> range of a third node but not<br />

of each other. Both may try to communicate with the third node simultaneously and might not<br />

detect any interference in the wireless medium. Thus, the signals collide at the third node, which<br />

will not be able to receive the transmissions from either node [P99]. The typical solution is that the<br />

terminals coordinate their transmissions, by means of request to send/clear to send (RTS/CTS).<br />

• Supposing node B communicates with node A, and node C wants to transmit a packet to node D.<br />

During the transmission between node B and node A, node C perceives the channel as busy.<br />

Node C falsely concludes that it may not send to node D, even though both transmissions<br />

would succeed. Bad reception would only occur in the zone between node B and node C,<br />

where neither of the receivers are located. That is the problem of the exposed terminals, and<br />

this together with the hidden terminal cause significant reduction of network throughput<br />

when the traffic load is high.<br />

4.3 routing Protocol Families for Ad Hoc Networks<br />

MANET routing protocols are traditionally divided into three main categories [AWD04] depending on<br />

the type of information being exchanged and the frequency with which it is done: proactive or global<br />

protocols, reactive or on-demand protocols, and hybrid protocols. The first group aims to maintain upto-date<br />

routing information in the nodes through periodic control message exchange, while the second<br />

attempts to find routes on demand. There are also hybrid routing protocols, which combine features<br />

from both proactive and reactive approaches.<br />

4.3.1 Proactive Routing Protocols<br />

In proactive routing protocols, each node keeps the routing tables constantly up-to-date. The routing<br />

tables contain the routing information for every other node in the network, which is updated periodically<br />

and when there are changes in the topology of the network. The routing information can be kept<br />

in different routing tables depending on the routing protocol. Proactive techniques typically use<br />

algorithms such as distance vector and link state.<br />

This type of protocol will operate in networks in which it is necessary for the route discovery procedure<br />

to not have excessive latency, and this type of protocol is appropriate in terms of consumption of<br />

resources such as bandwidth and energy. In most of the proactive routing protocols, the control message<br />

overhead grows as O(N 2 ), where N represents the number of nodes in the network.<br />

The difference between these protocols is in the manner that the routing information is updated,<br />

detected, and the type of information that is stored in each routing table.<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!