Professional Documents
Culture Documents
Today, many people carry numerous portable devices, such as laptops, data communication, which is advancing
mobile phones, PDAs and mp3 players, for use in their professional and both in terms of technology and usage/pen-
private lives. For the most part, these devices are used separatelythat etration, is a driving force, thanks to the In-
is, their applications do not interact. Imagine, however, if they could inter- ternet and the success of second-generation
act directly: participants at a meeting could share documents or presenta- cellular systems. As we look to the horizon,
we can finally glimpse a view of truly ubiq-
tions; business cards would automatically find their way into the address
uitous computing and communication. In
register on a laptop and the number register on a mobile phone; as com- the near future, the role and capabilities of
muters exit a train, their laptops could remain online; likewise, incoming e- short-range data transaction are expected to
mail could now be diverted to their PDAs; finally, as they enter the office, grow, serving as a complement to traditional
all communication could automatically be routed through the wireless large-scale communication: most man-
corporate campus network. machine communication as well as oral com-
These examples of spontaneous, ad hoc wireless communication munication between human beings occurs
between devices might be loosely defined as a scheme, often referred to at distances of less than 10 meters; also, as
as ad hoc networking, which allows devices to establish communication, a result of this communication, the two
anytime and anywhere without the aid of a central infrastructure. Actually, communicating parties often have a need to
ad hoc networking as such is not new, but the setting, usage and players exchange data. As an enabling factor,
license-exempted frequency bands invite
are. In the past, the notion of ad hoc networks was often associated with
the use of developing radio technologies
communication on combat fields and at the site of a disaster area; now, (such as Bluetooth) that admit effortless and
as novel technologies such as Bluetooth materialize, the scenario of ad inexpensive deployment of wireless com-
hoc networking is likely to change, as is its importance. munication.
In this article, the authors describe the concept of ad hoc networking In terms of price, portability and usabil-
by giving its background and presenting some of the technical challenges ity and in the context of an ad hoc network,
it poses. The authors also point out some of the applications that can be many computing and communication de-
envisioned for ad hoc networking. vices, such as PDAs and mobile phones, al-
ready possess the attributes that are desir-
able. As advances in technology continue,
Introduction these attributes will be enhanced even fur-
ther.
Numerous factors associated with technol- Finally, we note that many mobile phones
ogy, business, regulation and social behav- and other electronic devices already are or
ior naturally and logically speak in favor of will soon be Bluetooth-enabled. Conse-
wireless ad hoc networking. Mobile wireless quently, the ground for building more com-
plex ad hoc networks is being laid. In terms
of market acceptance, the realization of a
BOX A, ABBREVIATIONS
critical mass is certainly positive. But per-
haps even more positiveas relates to the
AODV Ad hoc on-demand distance IP Internet protocol
vector ISM Industrial Scientific Medical band end-useris that consumers of Bluetooth-
AP Access point (2.4 GHz) enabled devices obtain a lot of as-yet unrav-
ARQ Automatic repeat request LAN Local area network elled ad hoc functionality at virtually no cost.
BGP Border gateway protocol LAP LAN access point
CSMA/CA Carrier sense multiple access with MAC Media access control What is an ad hoc network?
collision avoidance MANET Mobile ad hoc network
DARPA Defense Advanced Research MIPMANET Mobile IP MANET Perhaps the most widespread notion of a mo-
Projects Agency MT Mobile terminal bile ad hoc network is a network formed
DSDV Destination-sequenced distance NC Notebook computer without any central administration which
vector OSPF Open shortest path first consists of mobile nodes that use a wireless
DSR Dynamic source routing PAN Personal area network
DSSS Direct-sequence spread PDA Personal digital assistant interface to send packet data. Since the nodes
spectrum PRnet Packet radio network in a network of this kind can serve as routers
FA Foreign agent QoS Quality of service and hosts, they can forward packets on be-
FEC Forward error correction RIP Routing information protocol half of other nodes and run user applications.
FHSS Frequency-hopping spread RREP Route reply
spectrum RREQ Route request
The roots of ad hoc networking can be
FTP File transfer protocol RTS Request to send traced back as far as 1968, when work on the
GPRS General packet radio service SIG Special interest group ALOHA network was initiated (the objec-
H2 See HiperLAN/2 TDD Time-division duplex tive of this network was to1 connect educa-
HA Home agent UMTS Universal mobile tional facilities in Hawaii). Although fixed
HiperLAN/2 High-performance radio LAN type 2 telecommunications system
IEEE Institute of Electrical and WCDMA Wideband code-division multiple stations were employed, the ALOHA pro-
Electronic Engineering access tocol lent itself to distributed channel-
IETF Internet Engineering Task Force WLAN Wireless LAN access management and hence provided a
Figure 1.
At an airport, where people can access
local- and wide-area networks, ad hoc
Blutooth connections are used to inter-
WCDMA indoor connect carried devices, such as PDAs,
base station WCDMA mobile phones and notebook
HiperLAN/2 computers. For instance, a user might
access point MT retreive e-mail via a HiperLAN/2 interface
to a notebook computer in a briefcase,
but read messages and reply to them via
his or her PDA.
His PAN
His PAN
PDA
Her PAN
Bluetooth MT
PDA MT
NC
NC PDA
multihop Piconet
Bluetooth
used to forecast water pollution or to pro-
scatternet vide early warning of an approaching tsuna-
Residential (WLL)
MANET mi.6
Internet
PAN
Short-range ad hoc networks can simplify
PAN intercommunication between various mo-
* Infrastructure mode
PRnet bile devices (such as a cellular phone and a
** Ad hoc mode PDA) by forming a PAN, and thereby elim-
inate the tedious need for cables. This could
MIPMANET Transport
Mobile IP for mobile ad hoc networks (MIP-
MANET)14 is designed to give nodes in ad
hoc networks
access to the Internet; and Foreign agent Home agent
the services of mobile IP. Mobile IP
The solution uses mobile IP foreign agents
as access points to the Internet to keep track
of the ad hoc network in which any given
node is located, and to direct packets to the
edge of that ad hoc network.
The ad hoc routing protocol is used to de- IP
liver packets between the foreign agent and
the visiting node. A layered approach that
employs tunneling is applied to the outward Ad hoc network IP network
data flow, to separate the mobile IP func-
tionality from the ad hoc routing protocol Figure 8
Figure 8 illustrates how mobile IP and An overview of the MIPMANET architecture.
ad hoc routing functionality are layered. This
makes it possible for MIPMANET to pro-
vide Internet access by enabling nodes to se-
lect multiple access points and to perform
seamless switching between them. In short, the only traffic that will enter the ad hoc net-
MIPMANET works as follows: work from the Internet is traffic that is tun-
Nodes in an ad hoc network that want In- neled to the foreign agent from a registered
ternet access use their home IP addresses nodes home agent. Likewise, traffic that
for all communication, and register with leaves the ad hoc network is tunneled to the
a foreign agent. foreign agent from a registered node. This
To send a packet to a host on the Inter- results in a separation between, and thereby
net, the node in the ad hoc network tun- the capacity to control, traffic that is local
nels the packet to the foreign agent. in the ad hoc network and traffic that enters
To receive packets from hosts on the In- the ad hoc network.
ternet, packets are routed to the foreign
agent by ordinary mobile IP mechanisms.
The foreign agent then delivers the pack-
Radio layer implications
ets to the node in the ad hoc network.
Nodes that do not require Internet access Why multiple hops?
interact with the ad hoc network as though In dealing with an unreliable wireless
it were a stand-alone networkthat is, broadcast medium, special radio consid-
they do not require data regarding routes erations should be addressed in the com-
to destinations outside the ad hoc network. munication system of an ad hoc network, to
If a node cannot determine from the IP ensure reliable and efficient operation. One
address whether or not the destination is way of doing this is to employ multihop-
located within the ad hoc network, it will ping, which facilitates the reuse of re-
first search for the visiting node within sources in both the spatial and temporal do-
the ad hoc network before tunneling the mains, provided that the nodes which par-
packet. ticipate in the network are reasonably well
By using tunneling, MIPMANET can in- distributed in space.15 In contrast, single-
corporate the default route concept into on- hop networks mainly share the channel re-
demand ad hoc routing protocols, such as sources in the temporal domain. Figure 9
AODV and DSR, without requiring any shows a schematic depiction of the spatial
major modifications. Packets addressed to interference in multihopping and single-
destinations that are not found within the hopping scenarios. Each case considers an
ad hoc network are tunneled to foreign identical situation with respect to node dis-
agents. In MIPMANET, only registered vis- tribution, sources, and destinations. In the
iting nodes are given Internet access, thus multihopping scenario, packets are routed
Example of power-
controlled transmit
range
Figure 9
Comparison of multihop networking with Source
single-hop networking. Both examples Destination
have an identical distribution of network Relay
Other node
nodes.
over intermediate relays. However, the sin- requires. In essence, the key to conserving
gle-hop network sends the data directly energy is to control the transmit power, in
from the source to destination. The circles order to compensate for path losses that
in the figure indicate a power-controlled occur when a message is sent between adja-
range of the transmitting nodes. The fig- cent nodes.
ure also depicts inactive nodesthese In a network scenario with little data traf-
nodes are not involved as sources, destina- fic, the overall power consumption can be
tions, or intermediate relays. From this fig- reduced by approximately a factor of N-1,
ure, we get the feeling that the multihop where N is the number of equidistant hops
scenario provides greater spectral efficien- between the source and the destination, and
cy (bit/s/Hz/m2). is the propagation constant. In theory,
is equal to 2 for free space propagation. But
Comparison of multiple hops and for realistic environments, it is often as-
single hops signed a value of 3 or 4. To derive the rela-
Whether multihopping is necessary, suit- tionship N-1, we first describe propagation
able or even possible depends on factors such loss (L) in terms of its relationship to dis-
as the number and distribution of terminals tance (R):
in the network, relative traffic density, radio
channel characteristics, practical communi- L=Const R
cation limitations, and reasons for optimiz- For correct reception at a given level of re-
ing certain parameters. Under some cir- ceiver noise, a minimum receiving power
cumstances, a multihop network might ac- PRX_min is required. Accordingly, the
tually degenerate into a single-hop network. transmit power for one hop over distance R
One obvious reason for employing multi- is (stated somewhat simplistically):
hopping is to provide connectivity, since
some terminals might be out of range of each PTX_1=PRX_min Const R
other, and cannot therefore form a single-
hop network. If the distance (R) is divided into N hops,
then each individual hop requires
Multihop characteristicsforwarding
In a multihop scenario, it makes sense not PTX_N=PRX_min Const (R/N)
to waste more energy than what each hop This is a factor N less than a long single
LAN
PAN 1
Bluetooth LAN
access point
S S
M
M
PAN 2 Figure 12
S S A scatternet with three interconnected
piconets, in which two are PANs and one
M S is used to provide network access to the
two PANs via a Bluetooth LAN access
point. In this scenario, the letters M and S
indicate the distribution of master and
slave units.
system makes Bluetooth very robust against scatternet forming and maintenance;
interference, new piconets gain substantial- scatternet-wide packet forwarding; and
ly more capacity than they lose as a result of intra- and interpiconet scheduling.
increased interference between them.
Scatternet forming
Scatternet functionality To have an efficient infrastructure for IP net-
The concept of scatternets offers a flexible working on Bluetooth, piconets and scatter-
way of creating Bluetooth networks and in- nets must be able to adapt to the connec-
troduces a number of Bluetooth-specific tivity, traffic distribution, and node mobil-
functions. Ideally, these functions should be ity in the network. This is mainly achieved
kept in the background to keep them from by setting up new piconets or terminating
bothering the user of the Bluetooth network others, in order to attain the optimal scat-
and to facilitate applications development. ternet topology. In this context, optimal
The Bluetooth networking functions fall refers to a scatternet that, for instance, yields
into three main areas: minimum delay or maximum throughput.
Figure 13
A scatternet with three interconnected piconets. Via a GPRS/UMTS cellular phone, one
piconet provides IP network access to the other two piconets.
IP backbone
GPRS
PAN 1
S
S
M
M
PAN 2
S S
S
M
Figure 14
A Bluetooth scatternet where the net-
working functionality is handled within the
IP layer (that is, by IP routing).
IP hosts and
routers
Slave 3
Slave 1
Figure 15
A Bluetooth scatternet where networking
is handled within a Bluetooth networking
layer, which provides a broadcast seg-
ment to the IP hosts.
IP hosts
Bluetooth networking
layer
Slave 3
Slave 1
REFERENCES