Principles of Ad Hoc Networking presents a systematic introduction to the fundamentals of ad hoc networks.
An ad-hoc network is a small network, especially one with wireless or temporary plug-in connections. Typically, some of the network devices are part of the network only for the duration of a communications session or, in the case of mobile or portable devices, while in some close proximity to the rest of the network. These networks can range from small and static systems with constrained power resources to larger-scale dynamic and mobile environments. Wireless ad hoc networks facilitate numerous and diverse applications for establishing survivable dynamic systems in emergency and rescue operations, disaster relief and intelligent home settings.
Principles of Ad Hoc Networking:
Introduces the essential characteristics of ad hoc networks such as: physical layer, medium access control, Bluetooth discovery and network formation, wireless network programming and protocols.
Explains the crucial components involved in ad-hoc networks in detail with numerous exercises to aid understanding.
Offers key results and merges practical methodologies with mathematical considerations.
Principles of Ad Hoc Networking will prove essential reading for graduate students in Computer Science, Electrical Engineering, Applied Mathematics and Physics as well as researchers in the field of ad hoc networking, professionals in wireless telecoms, and networking system developers.
Check out www.scs.carleton.ca/~barbeau/pahn/index.htm for further reading, sample chapters, a bibliography and lecture slides!
Author(s): Michel Barbeau, Evangelos Kranakis
Publisher: Wiley
Year: 2007
Language: English
Pages: 277
Principles of Ad Hoc Networking......Page 4
Contents......Page 10
Preface......Page 14
Glossary......Page 20
1 Wireless Data Communications......Page 24
1.1 Signal representation......Page 25
1.2 Analog to digital conversion......Page 28
1.3 Digital to analog conversion......Page 31
1.4 Architecture of an SDR application......Page 32
1.5 Quadrature modulation and demodulation......Page 34
1.6 Spread spectrum......Page 37
1.7 Antenna......Page 40
1.8 Propagation......Page 42
1.9 Ultrawideband......Page 47
1.11 Exercises......Page 49
2 Medium Access Control......Page 52
2.1.1 General concepts......Page 53
2.1.2 Random variables and distributions......Page 55
2.1.3 Counting processes......Page 57
2.2.1 Delay models......Page 60
2.2.3 Birth–death processes......Page 61
2.2.4 M/M/1/∞ queuing system......Page 62
2.2.5 M/M/m/∞ queue: m servers......Page 64
2.2.6 Queues for channel allocation......Page 66
2.2.7 Queues with reserved channels for handoffs......Page 67
2.3 Multiple access......Page 68
2.3.1 Uncoordinated access......Page 69
2.3.2 Contention-based access......Page 70
2.4.1 Bit-map......Page 73
2.4.3 Splitting algorithms......Page 74
2.5 Carrier sense multiple access in IEEE 802.11......Page 75
2.5.1 Persistence......Page 76
2.5.2 Collision avoidance......Page 77
2.6 Medium access control in ad hoc networks......Page 78
2.6.2 Multiple access protocols......Page 79
2.6.3 Throughput analysis of NAMA......Page 80
2.7 Bibliographic comments......Page 81
2.8 Exercises......Page 82
3 Ad Hoc Wireless Access......Page 86
3.1.1 Architecture......Page 87
3.1.2 The Bluetooth asymmetric protocol......Page 90
3.1.3 Bluetooth protocol architecture (IEEE 802.15)......Page 93
3.2 Model for node discovery in Bluetooth......Page 94
3.2.2 Details of the node discovery model......Page 95
3.2.3 Protocols for node discovery......Page 97
3.2.4 Multiple nodes competing for air-time......Page 103
3.3.1 Bluetooth topology construction protocol......Page 106
3.3.2 Bluetree......Page 107
3.3.4 Bluenet......Page 108
3.3.6 Loop scatternet......Page 109
3.4 Mesh mode of WiMAX/802.16......Page 110
3.4.1 Scheduling......Page 112
3.4.2 Management messages......Page 113
3.4.3 Mesh network......Page 114
3.4.4 Sleep mode......Page 117
3.5 Bibliographic comments......Page 121
3.6 Exercises......Page 122
4.1 Structure of information......Page 126
4.2 Socket......Page 128
4.3 Parameters and control......Page 130
4.4 Receiving frames......Page 131
4.5 Sending frames......Page 132
4.6 Exercises......Page 134
5 Ad Hoc Network Protocols......Page 136
5.1 Normal IP routing......Page 137
5.2 The reactive approach......Page 139
5.3 The proactive approach......Page 144
5.4.1 Neighbor discovery protocol......Page 148
5.4.2 Intrazone Routing Protocol......Page 150
5.4.3 Interzone routing protocol......Page 153
5.5 Clustering......Page 156
5.6 Quality of service......Page 159
5.7 Sensor Network Protocols......Page 161
5.7.1 Flat routing......Page 162
5.7.3 Zigbee......Page 163
5.8 Exercises......Page 166
6 Location Awareness......Page 168
6.1 Geographic proximity......Page 169
6.1.1 Neighborhood graphs......Page 170
6.1.2 Relation between the neighborhood graphs......Page 173
6.2.1 Gabriel test......Page 174
6.2.2 Morelia test......Page 175
6.2.3 Half-space proximal test......Page 178
6.2.4 Spanner for nodes with irregular transmission ranges......Page 179
6.3.1 Compass routing in undirected planar graphs......Page 182
6.3.2 Face routing in undirected planar graphs......Page 183
6.3.3 Traversal of quasi-planar graphs......Page 184
6.3.4 Routing in eulerian directed planar graphs......Page 187
6.3.5 Routing in outerplanar graphs......Page 189
6.4.1 Radiolocation techniques......Page 190
6.4.2 Computing the geographic location......Page 193
6.4.3 Three/two neighbor algorithm......Page 194
6.4.4 Beyond distance one neighborhood......Page 196
6.5 Random unit disc graphs......Page 197
6.5.1 Poisson distribution in the plane......Page 198
6.5.2 Connectivity and k-connectivity......Page 199
6.5.3 EuclideanMST......Page 201
6.5.5 Delaunay triangulations......Page 202
6.6 Coverage and connectivity with directional sensors......Page 203
6.6.2 Achieving coverage......Page 204
6.7 Bibliographic comments......Page 208
6.8 Exercises......Page 209
7 Ad Hoc Network Security......Page 214
7.1.1 Signatures, authentication and hashing......Page 215
7.1.2 Signatures in networking......Page 219
7.1.3 Distribution of keys......Page 224
7.3.1 WiFi/802.11 confidentiality......Page 225
7.3.2 ZigBee security......Page 228
7.4 Biometrics-based key establishment......Page 230
7.5.1 Routing attacks......Page 234
7.5.2 Preventing malicious packet dropping......Page 236
7.5.3 Secure ad hoc distance vector routing protocol......Page 238
7.6 Broadcast security......Page 240
7.6.2 BiBa broadcast authentication......Page 241
7.7 Secure location verification......Page 243
7.7.1 Simple echo protocol......Page 244
7.7.2 Echo protocol......Page 245
7.8 Security in directional antenna systems......Page 246
7.8.1 Wormhole attacks and their impact on routing protocols......Page 247
7.8.2 Zoning with directional sensors......Page 248
7.8.3 Protocols for securing neighbor discovery......Page 249
7.9 Bibliographic comments......Page 253
7.10 Exercises......Page 255
Bibliography......Page 262
Index......Page 272