Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
An introduction essay on network topologies
Explain network topology essay
Network topologies analyses
Don’t take our word for it - see why 10 million students trust us with their essay needs.
As the Fig 1 showing, the node which generates the packet is the source node. There are many sensor nodes in a 3-D interest area. The packet is delivered among these sensor nodes and finally try to reach one sink node. Sink nodes are deployed on the water surface. In the figure, it is a multiple-sink topology. Multiple sinks equipped both radio-frequency and acoustic modems are fixed on the water surface.The packet is assumed delivered successfully if it reaches any one of the sink nodes because sink nodes use radio-frequency channel to communicate with each other which is several orders of magnitudes faster than acoustic channel.
The routing protocols for wireless sensor networks and underwater wireless sensor networks can be roughly
…show more content…
The location of each node and structure of the network are mostly fixed. There are many routing protocols proposed for land-based networks like Directed Diffusion and TTDD. It requires periodically updates if it is adapted to dynamic topology, which is not energy efficient. For example, GPSR is typical geographic-based routing protocol for land-based sensor networks.
- Routing protocols for high dynamic topology: the topology of the network is highly dynamic underwater because nodes move passively with water currents. These routing protocols are designed for sensor networks with dynamic topology like UWSNs.
The routing protocols for UWSNs can be categorized into two classes according to the preconditions they assume:
- Geographic-based routing protocols: the protocol require the full-dimensional location information as the precondition. There are some popular protocols like Vector-Based Forwarding (VBF)[2] protocol. (section 3)
- Localization-free routing protocols: the protocol does not require the full-dimensional location information, all it need is the depth information of each node. The most popular routing protocol in this class is Depth-Based Routing (DBR) [1] protocol. (section 4)
The routing protocols for UWSNs can be categorized into two classes according to the number of the sinks,which is the destination and the final
Routing scheme means to find a path from once place to another on which packets can travel. In most of the cases, we need multiple routers in order to route the packet to the destination. Routing contains three elements:
The Border Gateway Protocol (BGP) is responsible for communication between different Autonomous Systems (AS). The Internet is comprised of a large number of Autonomous Systems (AS) and exchanging routing information between two or more AS is achieved using BGP. Inter-domain routing in the Internet is carried out majorly by one protocol – Border Gateway Protocol (BGP). BGP is a distance-vector protocol and uses TCP as its underlying mechanism.
Johnson, D., Maltz, D. (1996). Dynamic Source Routing in Ad-hoc Wireless network. Print ISBN: 0 79239697 0
... in Wireless Sensor Networks: Current proposal and Future Development, IEEE Xplore, Hong Kong, Oct- 2007.
Open Shortest Path First (OSPF) is a link-state routing protocol which uses link state routing algorithm for Internet Protocol (IP) networks.Using OSPF, th convergence of a network can be done in very few seconds, loop-free paths can be guaranteed and better load-sharing on external links can be achievd. Every change in the topology of the network is identified within seconds using OSPF and it instantaneously computes the “shortest path tree” for every route using “Dijkstra's algorithm” . For that reason, OSPF requires a router which have a more powerful processor and more memory than any other routing protocols which leads to more elect...
A mesh topology typically refers to a Wide Area Network where there are multiple paths connecting multiple sites. A router is used to search multiple paths and determine the best path for the data. Routes are determined by least cost, time of day and performance. A three or four site mesh network is relatively easy to create, whereas it is impractical to set up a mesh network of 100 sites or nodes. Mesh networks are used in Wide Area Networks (WANs) where reliability is important and the number of sites being connected together is fairly small.
Enhanced Interior Gateway Routing Protocol is modified in such a way that it lessens the router’s workload and the amount of data that is to be transmitted between the routers. Other than i...
The Global Positioning System consists of three sections, 1.satellites which are orbiting the planet, 2.there are numerous control/monitoring centers here on the ground, and 3. gps receivers which are used by their owners. The satellites send down signals from orbit, which are received by GPS receivers on the ground in the air or on the water, the GPS receiver then converts this information into a location longitude, latitude and altitude along with time.
Explain how the two important transport protocols deliver messages on behalf of the application and discuss the differences between them
Dynamic Multipoint Virtual Private Network (DMVPN) is in general combination of GRE tunnels, IP Security Protocol (IPsec), NHRP (Next Hop Resolution Protocol) along with some advance features to help getting more scalable and robust solutions to the current problems. DMVPN can be used when hub and spoke topology needed, for example in the case of main site and branch sites (Spokes) topology. DMVPN reduces configuration required on the hub and also reduces bandwidth utilization to the great amount, as traffic from spokes can directly go to other spokes by forming dynamic spoke to spoke tunnels and does not have to travel every time through the hub.
We consider a wireless sensor network with N = 100 nodes distributed randomly in 100m X 100m field. A gateway node is deployed in the centre of the sensing field. The BS is located far away from the sensing field. Both gateway node and BS are stationary after deployment. We consider packet size of 4000 bits. We compare our protocol with LEACH protocol. To assess performance of our protocol with LEACH, we ignore the effects caused by signal collision and interference in the wireless channel. Table 1 shows the radio parameters used in our
Underwater wireless sensor networks are significantly different from terrestrial sensor networks in which sound is mainly used as the communication medium. This paper reviews the main challenges caused by the underwater environment for the development of efficient under water sensor networking solutions and introduces several novel medium access control (MAC) protocols with power control to increase efficiency and save on energy.
... device that originated a RARP request receives a RARP reply, it copies its IP address into its memory cache, where it will reside for as long as the session lasts. · routers, like every other device on the network, send and receive data on the network, and build ARP tables that map IP addresses to MAC addresses · if the source resides on a network that has a different network number than the desired destination, and if the source does not know the MAC address of the destination, it will have to use the router as a default gateway for its data to reach the destination · routed protocols direct user traffic, whereas routing protocols work between routers to maintain path tables · network discovery for distance-vector routing involves exchange of routing tables The next chapter discusses the functions of the transport layer.
The nodes in Ad hoc network are free to move in random fashion within the network region due to which the network topology changes randomly or dynamically. This random movement of nodes plays an important role on the performance of routing protocols[30,31]. Considering the node mobility feature it is essential to choose a suitable routing protocol based on the network environment. Because the nodes are mobile in nature and are moving randomly anywhere so its an important issue, to get a valid route between a source and destination node of the network[20,21,22].
Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN). Instead LAN, PAN also can be built using either wired or wireless technology. In this assignment, i will focus on Wireless Personal Area Network (WPAN) which is implemented IEEE 802.15 standard based on the smart home environment that would enable an elderly to stay in their home, instead of a health care center so that they can live independently. Therefore, this is the opportunity for us to explore, design and layout network infrastructure by using our background knowledge in data communication and computer networks.