You are on page 1of 81

0

Wired and wireless networks


Both traditional wired networks and wireless networks are formed by routers and hosts. ( routers are responsible for forwarding packets in the network and hosts may be sources or sinks of data ow) Fundamental difference between wired and wireless networks is the way that the network components communicate. : wired network relies on physical cables to transfer data. In a wireless network, the communication between different network components can be either wired or wireless. Advantage: Since wireless communication does not have the constraint of physical cables, it allows a certain freedom for the hosts and/or routers in the wireless network to move. Network components in a wireless network communicate with others using wireless channels.

Why use wireless communication?


Provides mobility A user can send or receive a message no matter where he or she is located Added convenience/reduced cost Enables communication without installing an expensive infrastructure Can easily set-up temporary LANs( eg. Disaster situations, Office moves) Developing nations utilize cellular telephony rather than laying twisted-pair wires to each home Only use resources when sending or receiving a signal

Wireless environments

Frequency ranges for wireless networks


Different radio frequency (RF) spectrum ranges are used in wireless networks, 27.5-29.5 GHz for the Local Multipoint Distribution System (LMDS) 2.5-2.7 GHz for the Multipoint Multichannel Distribution System 5.15-5.35 GHz and 2.4-2.58 GHz for IEEE 802.11a and 802.11b Signal strength in a wireless medium decreases when the signal travels further.

Traditional vs mobile IP

in wired or wireless networks, hosts or a subnet as a whole may move from one location to another. Traditional networks require re-congurations of IP addresses used by these mobile hosts or subnets at the new locations. A network enabled with Mobile IP allows these mobile hosts or subnets to move around without any manual address reconguration. Moreover, those roaming nodes can remain connected with others while they are moving. Since Mobile IP also supports a certain mobility in the network, we can consider it as a potential technique to support routing in some types of MANETs.

Wireless network using mobile IP

Types of wireless networks


As the radio range is usually limited and the network components may have some mobility, the topology of a wireless network can vary with time. Based on relative mobility of hosts and routers, three different types of wireless networks.

Types of wireless networks

WiFi / 802.11 Two modes: Centralized: wireless local area data network Peer-to-peer: MAC/PHY for ad hoc networks Ad hoc networks Multi-hop peer-to-peer networks Hybrid networks Unicast, multicast and broadcast networks Wireless sensor networks Different applications uses different n/w topologies Converge-cast, unicast, broadcast and multicast networks

Types of wireless networks


Fixed wireless network: Fixed hosts and routers use wireless channels to communicate with each other and form a xed wireless network. Example is a wireless network formed by xed network devices using directed antennas

Types of wireless networks


Wireless network with xed access points:
Mobile hosts use wireless channels to communicate with xed access points, which may act as routers for those mobile hosts, to form a mobile network with xed access points. Example is a number of mobile laptop users in a building that access xed access points.

10

Types of wireless networks


Mobile ad hoc network. A mobile ad hoc network is formed by mobile hosts. Some of these mobile hosts are willing to forward packets for neighbors. Examples include vehicle-to-vehicle and ship-toship networks that communicate with each other by relying on peer-to-peer routings

11

12

Mobile ad hoc networks

A collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services Often ad-hoc network topology is dynamicnodes enter and leave the network continuously No centralized control or fixed infrastructure to support network configuration or reconfiguration Example scenarios for MANETs Meetings Emergency or disaster relief situations Military communications Wearable computers Sensor networks

13

Mobile ad hoc networks

Mobile nodes have limited communication range Reduces battery drain Enables spatial reuse of limited bandwidth --increased network capacity To connect all nodes in the network, each node is a Packet source, Packet sink, Router Nodes must route packets for other nodes to keep the network fully connected In MANETs, a big problem is how to determine where a destination node is located relative to a sending node

14

Mobile ad hoc networks


Route-finding is a current area of much research Want to determine an optimal way to find optimal routes Dynamic links Broken links must be updated when a node moves out of communication range with another node New links must be formed when a node moves into communication range with another node Based on this new information, routes are modified Frequency of route change is a function of node mobilty

15

Network topologies

16

Centralized topology

17

Network topologies

18

Fully connected peer-to-peer

19

20

21

22

Why Ad Hoc Networks ?

Setting up of fixed access points and backbone infrast ructure is not always viable Infrastructure may not be present in a disaster area or war zone Infrastructure may not be practical for shortrange radios Bluetooth (range ~ 10m) Ad hoc networks: Do not need backbone infrastructure support Are easy to deploy (Useful when infrastructure is absent, destroyed or im practical )

23

Infrastructure Access

Access Points:
Provide

infrastructure access to mobile users Cover a fixed area Wired into LAN

24

25

Effect of mobility on protocol stack

Application new applications and adaptations Transport congestion and flow control Network addressing and routing Link media access and handoff Physical transmission errors and interference

26

Infrastructure Access

27

Problems
Access Point placement depends on wired network availability Obstructions make it difficult to provide total coverage of an area Site surveys are performed to determine coverage areas Security Concerns: rogue access points in companies etc.. Each Access Point has limited range

28

Peer to Peer Ad Hoc Mode

29

Peer to Peer Ad Hoc Mode

30

Problems

Communication is only possible between nodes which are directly in range of each other

31

Problems for both Infrastructure and Ad hoc Mode

If nodes move out of range of the access point (Infrastructure Mode) OR nodes are not in direct range of each other (Ad Hoc Mode) Then communication is not possible!!

32

802.11b specifies two main operating modes.

33

Is 802.11 Ad-hoc mode enough?

34

Multi-hop Infrastructure Access


Nodes might be out of range of the access point, But in range of other nodes. The nodes in range of the access point could relay packets to allow out of range nodes to communicate. NOT part of 802.11

35

Multi-hop Ad Hoc Network

If communication is required between two nodes which are out of range of each other, intermediary nodes can forward the packets. NOT part of 802.11

Source

Destination

36

Mechanisms required in a MANET

Multihop operation requires a routing mechanism designed for mobile nodes. Internet access mechanisms. Self configuring networks requires an address allocation mechanism. Mechanism to detect and act on, merging of existing networks. Security mechanisms.

37

What is an Ad hoc Network


Collection of mobile wireless nodes forming a network without the aid of any infrastructure or centralized administration Nodes have limited transmission range Nodes act as a routers

38

39

40

41

42

43

44

Features of the mobile ad hoc network


Unreliability of wireless links between nodes: Because of the limited energy supply for the wireless nodes and the mobility of the nodes, the wireless links between mobile nodes in the ad hoc network are not consistent for the communication participants. Constantly changing topology: Due to the continuous motion of nodes, the topology of the mobile ad hoc network changes constantly: the nodes can continuously move into and out of the radio range of the other nodes in the ad hoc network, and the routing information will be changing all the time because of the movement of the nodes. Lack of incorporation of security features in statically configured wireless routing protocol not meant for ad hoc environments. Because the topology of the ad hoc networks is changing constantly, it is necessary for each pair of adjacent nodes to incorporate in the routing issue so as to prevent some kind of potential attacks that try to make use of vulnerabilities in the statically configured routing protocol.

45

Ad Hoc Networks

Disaster recovery Battlefield Smart office Gaps in cellular infrastructure

Rapidly deployable infrastructure


Wireless: cabling impractical Ad-Hoc: no advance planning

Network of access devices


Wireless: untethered Ad-hoc: random deployment

Backbone network: wireless IP routers

Edge network: Sensor networks, Personal Area Networks (PANs), etc.

46

Many Applications
Ad hoc networks:
Do not need backbone infrastructure support Are easy to deploy Useful when infrastructure is absent, destroyed or impractical Infrastructure may not be present in a disaster area or war zone

Applications:
Military environments Emergency operations Civilian environments

taxi cab network meeting rooms sports stadiums

47

Examples of such networks

Sensor networks Automotive networks Military applications

48

Sensor networks

Networks deployed in random distribution Low power Delivering sensor data to a central site for some purpose

49

Traffic networks

Smart cars and smart roads Onboard systems talk to the road:
Map obstacles and delays Obtain maps Inform the road of its actions

50

Military applications

Combat regiment in the field Perhaps 4000-8000 objects in constant unpredictable motion Intercommunication of forces Proximity, function, plan of battle Special issues Low probability of detection Random association and topology

51

Mobile Ad-hoc Network


Self-configuring network of mobile routers (and associated hosts) connected by wireless links This union forms a random topology Routers move randomly free Topology changes rapidly and unpredictably Standalone fashion or connected to the larger Internet Suitable for emergency situations like natural or human-induced disasters, military conflicts, emergency medical situations, etc.

52

wireless ad hoc network


wireless ad hoc network is a decentralized wireless network The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. Each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. The earliest wireless ad hoc networks were the "packet radio" networks (PRNETs) from the 1970s, sponsored by DARPA after the ALOHAnet project.

53

Mobile Ad-hoc Network

Ad-hoc network versus Mobile Ad-hoc network


Increase

of mobile applications Additional challenges Changes to the network topology Need of extreme network flexibility Answer = Mobile Ad-hoc Network

While MANETs are self contained, they can also be tied to an IP-based global or local network Hybrid MANETs

54

wireless ad hoc network

Minimal configuration and quick deployment make ad hoc networks suitable for emergency situations like natural disasters or military conflicts. The presence of a dynamic and adaptive routing protocol will enable ad hoc networks to be formed quickly. Wireless ad hoc networks can be further classified by their application: mobile ad hoc networks (MANETs) wireless mesh networks wireless sensor networks.

55

Classes of Wireless Ad Hoc Networks


Three distinct classes

Mobile Ad Hoc Networks (MANET)

possibly highly mobile nodes power constrained relatively immobile severely power constrained nodes large scale rapidly deployable wireless infrastructure largely immobile nodes

Wireless Ad Hoc Sensor/Device Networks


Wireless Ad Hoc Backbone Networks


Common attributes:
Ad hoc deployment, no infrastructure Routes between Source-Destination nodes may contain multiple hops

56

MANET: Mobile Ad hoc Networks


A collection of wireless mobile nodes dynamically forming a network without any existing infrastructure and the relative position dictate communication links (dynamically changing).

From DARPA Website

57

History of MANETs
Earliest MANETs were called packet radio networks, sponsored by DARPA (1970) These packet radio systems predated the Internet and were part of motivation of the original IP suite Later DARPA experiments included the Survivable Radio Network (SURAN) project (1980s) 1990s the advent of inexpensive 802.11 radio cards for personal computer Current MANETs are designed primary for military utility; examples include JTRS (Joint Tactical Radio System) and NTDR (Near-Term Digital Radio).

58

Rapidly Deployable Networks


Failure of communication networks is a critical problem faced by first responders at a disaster site

major switches and routers serving the region often damaged cellular cell towers may survive, but suffer from traffic overload and dependence on (damaged) wired infrastructure for backhaul

In addition, existing networks even if they survive may not be optimized for services needed at site

significant increase in mobile phone traffic needs to be served first responders need access to data services (email, www,...) new requirements for peer-to-peer communication, sensor net or robotic control at the site

Motivates need for rapidly deployable networks that meet both the above needs -> recent advances in wireless technology can be
harnessed to provide significant new capabilities

59

mobile ad hoc network (MANET),

A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring network of mobile devices connected by wireless links Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic

60

mobile ad hoc network (MANET)


A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. The network is decentralized, where all network activity including discovering the topology and delivering messages must be executed by the nodes themselves, i.e., routing functionality will be incorporated into mobile nodes.

61

Mobile Ad Hoc Networking (MANET)


-

Dynamic topologies Bandwidth-constrained Asymmetric links with variable capacity Energy constrained Multiple technologies can be used simultaneously

62

Mobile Ad Hoc Networks (MANET)


Host movement frequent Topology change frequent
B

No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes.

63

The manet problem

Mobile
Random

and perhaps constantly changing

Ad-hoc
Not

engineered

Networks
Elastic

data applications which use networks to communicate

64

Mobile Ad Hoc Networks

Formed by wireless hosts which may be mobile

Without (necessarily) using a pre-existing infrastructure Routes between nodes may potentially contain multiple hops

65

Mobile Ad Hoc Networks

May need to traverse multiple links to reach a destination

66

Mobile Ad Hoc Networks (MANET)

Mobility causes route changes

67

Why Ad Hoc Networks ?

Ease of deployment

Speed of deployment
Decreased dependence on infrastructure

68

Challenges
Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard)

69

Vulnerabilities in Mobile Ad Hoc Networks Lack of Secure Boundaries:


there is no clear secure boundary in the mobile ad hoc network, when compared with the clear line of defense in the traditional wired network. The vulnerability originates from : freedom to join, leave and move inside the network Lack of secure boundaries makes the mobile ad hoc network susceptible to the attacks. They suffers from all-weather attacks, which can come from any node that is in the radio range of any node in the network, at any time, and target to any other node(s) in the network.

70

Vulnerabilities in Mobile Ad Hoc Networks Lack of Secure Boundaries:


the various link attacks can jeopardize the mobile ad hoc network, which make it even harder for the nodes in the network to resist the attacks. Attacks include passive eavesdropping, active interfering, leakage of secret information, data tampering, message replay, message contamination, and denial of service

71

Vulnerabilities in Mobile Ad Hoc Networks Threats from Compromised nodes Inside the Network attacks that aim to gain the control over the nodes themselves by some unrighteous means and then use the compromised nodes to execute further malicious actions. This vulnerability can be viewed as the threats that come from the compromised nodes inside the network. because of the mobility of the ad hoc network, a compromised node can frequently change its attack target and perform malicious behavior to different node in the network, thus it is very difficult to track the malicious behavior performed by a compromised node especially in a large scale ad hoc network.

72

Vulnerabilities in Mobile Ad Hoc Networks Restricted Power Supply due to the mobility of nodes in the ad hoc network, the nodes in the ad hoc network will reply on battery as their power supply method. (nodes in the wired network need not consider the power supply problem because they can get electric power supply) The problem caused by the restricted power supply is denial-of-service attacks. Adversary nodes knows that the target node is battery-restricted, either it can continuously send additional packets to the target and ask it routing those additional packets, or it can induce the target to be trapped in some kind of timeconsuming computations. Thus the target node will be out of service to all the n service requests since it runs out of power.

73

Vulnerabilities in Mobile Ad Hoc Networks Scalability the traditional wired network scaling is generally predefined when it is designed and will not change much during the use scale of ad hoc network keeps changing all the time: because of the mobility of the nodes in the mobile ad hoc network, (hardly predict how many nodes there will be in the network in the future). As a result, the protocols and services that are applied to the ad hoc network such as routing protocol and key management service should be compatible to the continuously changing scale of the ad hoc network. scale

74

Vulnerabilities in Mobile Ad Hoc Networks Threats from Compromised nodes Inside the Network

Therefore, threats from compromised nodes inside the network are far more dangerous than the attacks from outside the network, and these attacks are much harder to detect because they come from the compromised nodes, which behave well before they are compromised. An example of this threats Byzantine failures encountered in the routing protocol for the mobile ad hoc network

75

Vulnerabilities in Mobile Ad Hoc Networks Lack of Centralized Management Facility the absence of centralized management machinery makes the detection of attacks a very difficult problem because it is not easy to monitor the traffic in a highly dynamic and large scale ad hoc network . It is rather common in the ad hoc network that benign failures, such as path breakages, transmission impairments and packet dropping, happen frequently. Therefore, malicious failures will be more difficult to detect, especially when adversaries change their attack pattern and their attack target in different periods of time.

76

Vulnerabilities in Mobile Ad Hoc Networks Lack of Centralized Management Facility lack of centralized management machinery will impede the trust management for the nodes in the ad hoc network . In mobile ad hoc network, all the nodes are required to cooperate in the network operation, while no security association (SA2) can be assumed for all the network nodes. Some algorithms in the mobile ad hoc network rely on the cooperative participation of all nodes and the infrastructure. Because there is no centralized uthority, and decision- making in mobile ad hoc network is sometimes decentralized, the adversary can make use of this vulnerability and perform some attacks that can break the cooperative algorithm

77

Multihop Routing
Traverse multiple links to reach a destination

78

MANET

Mobility causes route changes

79

Hybrid Communication Networks


Satellite overlay High speed backbone network

MANET

No fixed infrastructure

Fixed/static infrastructure

80

Variations
Fully symmetric vs. asymmetries in
Transmission

ranges

Battery

life Processing capability Speed, patterns, and predictability of movement Ability to act as multihop relay Ability to act as leaders of a cluster of nodes

Coexistence with an infrastructure Variations in traffic characteristics


Bit

rate, timeliness Unicast/multicast/geocast Addressing (host, content, capability)

You might also like