MeshNetworks

上传人:xx****x 文档编号:242869756 上传时间:2024-09-10 格式:PPT 页数:26 大小:303.50KB
返回 下载 相关 举报
MeshNetworks_第1页
第1页 / 共26页
MeshNetworks_第2页
第2页 / 共26页
MeshNetworks_第3页
第3页 / 共26页
点击查看更多>>
资源描述
,*,Click to edit Master text styles,Second level,Third level,Fourth level,Fifth level,Click to edit Master title style,Mesh Networks,A.k.a “ad-hoc”,1,Definition,A local area network that employs either a full mesh topology or partial mesh topology,Full mesh topology- each node is connected directly to each of the others,Partial mesh topology- some nodes are connected to all the others, but some of them are only connected to nodes with which they exchange the most data,2,History,Originally sponsored by the Department of Defense for military use,Goal was to provide packet-switched network in mobile elements of a battlefield in an infra-structureless environment,Used a combination of ALOHA and CSMA and distance vector routing,3,4,Full Mesh Topology,Every node has a circuit connecting it to every other node in the network,Yields greatest redundancy, so if one node fails, network traffic can be redirected to any of the other nodes,Usually reserved for backbone networks since it is very expensive,5,A full mesh topology,6,Partial Mesh Topology,Some nodes are organized in a full mesh scheme but others are only connected to 1 or 2 in the network,Common in peripheral networks connected to a full meshed backbone,Less expensive to implement,Yields less redundancy,7,A partial mesh topology,8,Wired mesh,It is possible to have a fully wired mesh network, however this is very expensive,Advantages,Reliable,Offers redundancy,Disadvantages,- Expensive- large number of cables and connections required,9,Wireless Mesh,Definition- a wireless co-operative communication infrastructure between multiple individual wireless tranceivers that have Ethernet capabilities,Can either be centralized for highly scalable applications, or can be decentralized,10,Advantages,Reliable- each node is connected to several others; when a node fails its neighbors find other routes,Scalable- capacity can be added simply by adding nodes,Nodes act as repeaters to transmit data from nearby nodes to peers too far away to reach- this results in a network that can span large distances over rough terrain,Each node only transmits as far as the next node,11,Gizmo truck,12,How does it work?,Data hops from one device to another until it reaches its destination,Each device communicates its routing information to every device it connects with,Each device then determines what to do with received data- pass it on or keep it,13,Types of Protocols,Pro-active- distribute routing tables to the network periodically to maintain fresh lists of destinations,Disadvantages,Wasted bandwidth for transmitting routing tables,Maintains routes that will never be used,Some algorithms never converge in large networks,14,Re-active- also known as On-Demand these protocols find routes on demand by flooding the network with Route Request packets,Disadvantages,Delays in finding routes,Excessive flooding can lead to network clogging,15,Example: ADDV,ADDV- Ad-hoc On-demand Distance Vector,Establishes a route to a destination only on demand,Contrast to the most popular pro-active protocols,16,How does ADDV work?,Network is silent until a connection is needed,The network node that needs a connection broadcasts a connection request,Other nodes forward the message and record the node they heard it from, creating temporary routes back to the needy node,17,When a node that already has a route to the desired node gets the message it sends a message back through the temporary route to the requesting node,The needy node then uses the route with the least hops to connect,18,Failures,When a node fails, a routing error is passed back to the transmitting node and the process repeats,Also, note that unused entries in the routing tables are recycled after a time, so unused paths are not kept,19,Drawbacks,More time to establish a connection,Initial communication to establish a route is heavy,20,Hierarchical- network orders itself into a tree or other hierarchy and sends requests through the structure,21,Example: Order One Network Protocol,The network orders itself into a tree,Each node periodically sends “hello” to its neighbors,Each neighbor tells how many neighbors and connections it has and who its “mother” node is,Each node picks the node with the largest access to links to be its “mother” node,When two nodes pick each other as “mother” nodes, that is the top of the tree,22,Routing,When a node needs a connection with another node and a route doesnt exist it sends a request to its “mother” node,This node then forwards the message to its “mother” node and so on until the original node is connected at the root to the node it wanted,Next the algorithm tries to “cut corners” to optimize the path,Each node on the route floods its neighbors with routing requests,When a faster route is found, the unused part of the previous route is erased and flooding ceases on that route,23,Advantages,Produces fairly good routes while reducing the number of messages required to keep the network connected,Uses only small amounts of memory at each node,The network has a reliable way to establish that a node is not in the network,24,Disadvantages,Central “mother” nodes have an extra burden,Eventually ceases to be scalable,Link propagation time establishes a limit on the speed the network can find its root,May use more power and bandwidth than other link-state protocols,25,Where is it going?,What is the future of wireless ad-hoc?,Automata,26,
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 图纸专区 > 大学资料


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!