Final Report. Nuno José Pereira Farias Rodrigues. Orientadores: Prof. Manuel Ricardo Pedro Fortuna

Size: px
Start display at page:

Download "Final Report. Nuno José Pereira Farias Rodrigues. Orientadores: Prof. Manuel Ricardo Pedro Fortuna"

Transcription

1 Final Report Nuno José Pereira Farias Rodrigues Orientadores: Prof. Manuel Ricardo Pedro Fortuna Mestrado Integrado em Engenharia Electrotécnica e de Computadores Faculdade de Engenharia da Universidade do Porto 8 de Fevereiro de 2008

2 Index 1. Introduction Ad-Hoc Wireless Mesh Networks IEEE s Introduction Architecture Frame Formats WLAN Mesh Medium Access Control Multichannel Medium Access Control Mesh Deterministic Access Boot Sequence Neighbor Discovery Peer Link Setup Link State Discovery Path Selection Hybrid Wireless Mesh Protocol (HWMP) On-Demand Routing in HWMP Tree based Routing in HWMP Radio-Aware Optimized Link-State Routing Protocol WLAN Mesh Security Conclusion Discrete Events Simulation References...32 Nuno José Rodrigues Page 2

3 1. Introduction This document describes the work in progress for the course. The course objectives are to prepare the MSc dissertation. This includes selecting the dissertation subject, to research the state-of-the-art, and to define a work plan. The goal of this dissertation is to study the IEEE s Mesh Networks [1] in a metropolitan scenario. The main goal is to determine if IEEE s Mesh Networks scale up to a few thousands of nodes. The study will be conducted by means of simulation using the NS-3 [2] for a network size up to 5000 nodes. The scalability will be determined by simulating a metropolitan scenario various times with an increasing number of s enabled nodes, and measuring performance metrics such as the end-to-end delay, packet loss ratio, and overhead due to control plane traffic; and by studying how the value of these parameters change. To help this goal, this document exposes IEEE s and the networks it is based on. This document is organized as follows: Section 2 introduces the principles of Ad-Hoc networking. Next, in Section 3, Wireless Mesh Networks are briefly explained. Next, in Section 4 the s Wireless Mesh Extension is detailed. Finally, Section 5 provides a brief reference to Discrete Event Simulation. Nuno José Rodrigues Page 3

4 2. Ad-Hoc An Ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. Topology may change dynamically due to node mobility. A Mobile Ad-Hoc NETwork (MANET) can be defined as an autonomous collection of mobile nodes which communicate over wireless links. MANETs have a wide range of applications from military to emergency networks. Ad-Hoc networks forward packets at layer 3 using IP Ad-Hoc Routing protocols. Other Ad-Hoc networks characteristics are: automatic network configuration, it can be used in as an intranet or internet network and using routing network techniques as every node forward data. An Ad-Hoc node builds a forwarding table dynamically so it can calculate the path with lower cost between it and other nodes. Ad-Hoc networks have frequent changes in its quality of the connection and its topology might transform frequently. These changes make the nodes consume more energy because they cannot enter in a power saving state as the infrastructureless networks protocol does. To solve these problems, MANETs use 2 types of Ad- Hoc routing protocols: reactive and proactive. Reactive Ad-Hoc routing protocols calculate routes on-demand, by flooding the network with a Route Request (RREQ) packet. This introduces further delay because nodes have to calculate the route before sending packets but nodes only use network resources when it is necessary. The most common used reactive protocol in Ad-Hoc networks is the Ad-Hoc On- Demand Distance Vector (AODV) Routing [8]. Proactive Ad-Hoc routing protocols try to maintain permanent routes by using continuous traffic control to calculate optimal paths. It also detects the connection to node Nuno José Rodrigues Page 4

5 neighbors, using HELLO messages, and floods the network with MultiPoint Relaying which is a sort of optimized flood because it limits the number of nodes which retransmit packets. The most used proactive protocol in Ad-Hoc networks is Optimized Link-State Routing protocol (OLSR). OLSR performs a distributed election of a set of multipoint distribution relays (MPRs) that play the role of designated routers as in Ad-Hoc networks, there is no notion of a link; hence, this approach is needed in order to optimize the flooding process. The election process leads to a set of MPRs that has the property that any node is the neighbor of an MPR, and that any two MPRs are at most separated by a single node (i.e. the 2-neighbour graph of the MPRs is connected). Nuno José Rodrigues Page 5

6 3. Wireless Mesh Networks Wireless mesh network (WMN) is a communications network made up of radio nodes in which there are at least two pathways of communication to each node. The coverage area of the radio nodes working as a single network becomes a mesh cloud. Access to this mesh cloud is dependent on the radio nodes working in harmony with each other to create a radio network. A mesh network is reliable and offers redundancy. The main characteristic of wireless mesh networking is the communication between nodes over multiple wireless hops on a meshed network graph similar to an Ad-Hoc wireless network. Efficient routing protocols provide paths through the wireless mesh and react to dynamic changes in the topology, so that mesh nodes can communicate with each other even if they are not in direct wireless range. Intermediate nodes on the path will forward the packets to the destination. Unlike cellular networks where the failure of a single base station (BS) may lead to the unavailability of communication services over a certain geographical area, WMNs provide fault tolerance even when a number of nodes fail. Although Ad-Hoc wireless networks are similar to WMNs, the protocols and architectures designed for the Ad-Hoc wireless networks perform poorly when applied in the WMNs. In addition, factors such as the inefficiency of protocols, interference from external sources sharing the spectrum, and the scarcity of electromagnetic spectrum further reduce the capacity of a single-radio WMN. In order to improve the capacity of WMNs and for supporting the traffic demands raised by emerging applications for WMNs, multi-radio WMNs (MR-WMNs) are under intense research. Therefore, recent advances in Nuno José Rodrigues Page 6

7 WMNs are mainly based on a multi-radio approach. While MR-WMNs promise higher capacity compared with single-radio WMNs, they also face several challenges. Nuno José Rodrigues Page 7

8 4. IEEE s 4.1. Introduction In 2003, interests in the Institute of Electronics and Electrical Engineering (IEEE) Working Group (WG) led to the formation of Task Group (TG) S. IEEE s is being developed to improve WMNs. This group is actively working to provide wireless mesh networking extensions to their standards. The goal of the s Working Group is to amend the IEEE MAC protocol to enable both broadcast/multicast and unicast frame delivery services at the MAC layer using radio-aware metrics Architecture A WLAN mesh network is a fully IEEE based wireless network that employs multihop communications to forward traffic to and from wired Internet entry points, between nodes and between different mesh networks. A WLAN mesh network uses based physical layer device and medium access (MAC) for providing the functionality of an Extended Service Set (ESS) mesh network. The Access Point (AP), known as mesh point (MP) when used in WLAN mesh, establishes wireless links among each other to enable automatic topology learning and dynamic path configuration. The MP-to-MP links form a wireless backbone as mesh backhaul, which provides users with low-cost, high bandwidth and seamless multi-hop interconnection services with a limited number of Internet entry points and with other users Nuno José Rodrigues Page 8

9 within the network. Each MP may optionally provide services to support communication with legacy mobile stations (STAs). These devices are called mesh access points (MAPs). As shown below, the IEEE basic service set (BSS) consists in one stationary Access Point (AP) and in the mobile stations (STAs). To cover a large area, an Extended Service Set (ESS) Figure 1 - IEEE s Architectural Model is required. An ESS is formed by several APs interconnected by the Distribution Service (DS), usually a wired network. The IEEE s introduces new elements to the ESS: Mesh Point (MP), Mesh Access Point (MAP), and Mesh Portal (MPP). MP establishes links with other MP neighbors, full participant in WLAN Mesh services. Otherwise, MAP has the same functionality of a MP and it provides BSS services to support communication with STAs. MPP is a point at which MAC Service Data Units (MSDUs) exit and enter a WLAN Mesh. There is an extra device, Nuno José Rodrigues Page 9

10 called Light Weight MP (LWMP) that participates in subset of the WLAN Mesh services primarily for neighbor-link communication. Figure 2 illustrates the relation between the different mesh nodes types. Figure 2 - Relation between different IEEE mesh nodes MPs to communicate with Access Points or wired internet points are through MAP. MAPs have a fundamental role in IEEE s because they make this protocol backwards compatible. MAPs can also connect MPs from a different mesh. MPP is also very important because in it relies (on higher layer) bridging between the mesh network and the wired network. Nuno José Rodrigues Page 10

11 4.3. Frame Formats WLAN mesh frame formats reuse IEEE MAC frame formats defined [3] and extend them appropriately for supporting ESS mesh services. Unlike WMNs based on Ad-Hoc [4, 6], s transparently supports any higher layer protocols. As exposed below data frames transmitted from one MP to another use the four address format as a basis, as this is a multi-hop protocol. Octets: Frame Duration Address 1 Address 2 Address 3 Sequence QoS Mesh Forwarding Address 4 Body FCS Control ID Control Control Control MAC Header Figure 3 Mesh MAC frame format The four address fields contain 48-bit long MAC addresses. Address 1 is the receiver address which defines the mesh point that is going to receive the wireless transmission. Consequently, address 2 is the transmitter address which identifies the mesh point that sent this data frame. Address 3 is the destination address which identifies the final of the data frame. Finally, address 4 is the source address which identifies the source of the data frame. The MAC frame header is appended with a mesh forwarding control field, a 24-bit field that includes a time to live (TTL) field, and a mesh end-to-end sequence number. The TTL is used as mechanism to avoid loops in the mesh network, and the sequence number is used mainly to control broadcast flooding. The mesh forwarding field is present in all frames of type extended with subtype mesh data. There are two new control frames proposed by the IEEE Nuno José Rodrigues Page 11

12 802.11s [1]: request to switch (RTX) frame and the clear to switch (CTX) frame. These frames are used to perform backhaul channel change operations. The exchange of IEEE management frames shall be supported between neighboring MPs. Octets: Frame Duration Sequence Frame DA SA BSSID FCS control ID Conrol Body MAC Header Figure 4 Mesh management frame format As these frames are to exchange between MPs, they only have two address fields (one-hop transmission): DA (Destination Address) and SA (Source Address). SA field is the receiving MP MAC address and SA field is the transmitting MP MAC address. BSSID field is not used between Mesh Points (should be all 0 s to backward compatibility). All management frames are extended to include mesh-specific information elements (IEs). A non exhaustive list of these IEs consists of: Mesh ID, WLAN Mesh Capability, Neighbor List, MPP Reachability, Peer Request, Peer Response and Active Profile Announcement among others. Neighbor discovery, congestion control, HWMP routing, beaconing and synchronization, and mesh deterministic access (MDA) use IEEE management action frames and encode IEs defined by each mechanism. For example, mesh routing-specific route request (RREQ), route response (RREP), route acknowledgment (RREP- ACK), route error (RERR) IEs are defined each and encoded into a specific action frame to be used for mesh routing and forwarding [1]. Nuno José Rodrigues Page 12

13 4.4. WLAN Mesh Medium Access Control MAC of the IEEE is contention based, using distributed coordination function (DCF) mechanisms, or contention-free, using point coordination function (PCF) mechanisms. Contention-based MAC protocols are robust against environmental interference and noise, making them suitable for use in WLAN mesh networks. Two optional mechanisms for more suitably adapting MAC services in a WLAN mesh network [1] are Multichannel MAC and MDA Multichannel Medium Access Control MAC has been based on a single channel, i.e., all the devices on the network share the same channel. Using a multichannel MAC, where transmissions can take place simultaneously on orthogonal channels, the aggregate throughput can be increased considerably. Multichannel MAC protocols are traditionally developed for multi-radio devices. However, the common channel framework (CCF) described in [1] enables the operation of a single-radio device in a multichannel environment. Known methods for channel access, e.g., DCF or enhanced distributed coordination function (EDCF), can be used within this framework. MPs can utilize the common channel to select an available channel as shown in Figure 5. This, in essence, is a dynamic channel allocation scheme. The destination channel information (channel a) is exchanged using the RTX and CTX frames followed by data frame transmission on the destination channel a. While the data frame transmission is ongoing on channel a, another Nuno José Rodrigues Page 13

14 transmission can be initiated on another destination channel b. A single-radio MP on the SIFS DIFS SIFS Switching delay DIFS SIFS Common channel Data RTX CTX RTX CTX SIFS RTX CTX Channel a Data DATA ACK Channel b Data Switching delay DIFS DATA ACK Switching delay DIFS SIFS Figure 5 - Common channel framework common channel cannot communicate with MPs on other channels. At the same time, singleradio MPs on other channels cannot know the network status on the common channel and vice versa. A multichannel MAC protocol designed for single radio should therefore: Facilitate connectivity among arbitrary MPs that may be on different channels and facilitate protection of the ongoing transactions in order to address the foregoing issues the concept of a channel coordination window (CCW) is available in CCF. At the start of CCW, CCF-enabled MPs tune to the common channel. This enables arbitrary MPs to establish communication with each other. Secondly, at the start of CCW, the channel occupancy status is reset and MPs can renegotiate channels. CCW is repeated with a period T, and the duration of CCW is usually a fraction of T. A channel coordination mechanism is used with the help of a common control channel (CCC). Nuno José Rodrigues Page 14

15 Mesh Deterministic Access MDA is an optional access method that allows supporting MPs to access the channel with lower contention than otherwise in selected times. The method sets up time periods in mesh neighborhoods when a number of MDA supporting MPs that may potentially interfere with each others transmissions or receptions are set to not initiate any transmission sequences. For each such time period, supporting MPs that set up the state for the use of these time periods are allowed to access the channel using MDA access parameters (CW Min, CW Max, and AIFSN). In order to use the MDA method for access, an MP must be a synchronized MP. The MDA method is described in detail in [1]. Nuno José Rodrigues Page 15

16 4.5. Boot Sequence When powering up, MPs must perform a sequence of operations before starting to exchange information. An ingenious way of understanding IEEE s mechanism is to observe that booting sequence: Neighbor Discovery: 1. Passive or Active scanning to discover others MP(s); 2. Channel selection; 3. Mesh beaconing; Peer Link Setup: 4. Neighbor MP link establishment (for each neighbor); Link State Discovery: 5. Local link state measurement; Path Selection: Figure 6 Boot Sequence 6. Path selection initialization; Access Point Initialization: 7. Optionally AP initialization if it is a MAP. Nuno José Rodrigues Page 16

17 Neighbor Discovery The main reason of this procedure is to discover neighbor MP devices and their properties. For that purpose, MPs may use passive or active scanning, using modified beacon or probe messages, respectively, to discover a mesh network. To do that, MPs exchange beacons or probe messages, MPs may use one or more channels for communication. The specific channel selection scheme used in a WLAN mesh network may vary with different topology and application requirements. A group of MP radio interfaces that are connected to each other by a common channel are referred to as a unified channel graph (UCG). The same device may belong to different UCGs. An MP logical radio interface that is in simple unification mode selects a channel in a controlled way such that it enables the formation of a UCG that becomes merged and hence fully connected. The MP logical radio interface thus establishes links with neighbors that match the mesh ID and mesh profile and selects its channel based on the highest channel precedence value. To identify the mesh network, is used the mesh ID which is attached in the beacon or probe response frames as a new IE for passive and active scanning, respectively. The function of the mesh ID is similar to SSID (Service Set Identifier), but SSID cannot be used for identifying a mesh network. One of the reasons is that mesh ID can prevent legacy STAs from being associated with MPs without AP functionality. For the same reason, a non-ap MP beacon should not include a valid SSID but use a wildcard value for the SSID IE. Nuno José Rodrigues Page 17

18 When MP devices are discovered, the path selection protocol and metric should be checked for a match with the profile. If there is no match, the newly discovered device should be ignored. If an MP is unable to detect any neighbor MPs, it adopts a mesh ID from one of its profiles, and proceeds to the active state, which, in the case of an MAP is the AP initialization state. This will occur when the MP is the first device to power on (or multiple MPs power on simultaneously). Any peer MP links will be established later as part of the continuous mesh formation procedures Peer Link Setup An MP must be able to establish at least one mesh link with a peer MP, and may be able to establish many such links simultaneously. It is possible that there are more candidate peer MPs than the device is capable of being associated with simultaneously. In this case, MP must select MPs to establish peer links based on some measure of signal quality, such as gathered during the discovery phase, or other statistics received from candidate neighbor MPs. An MP will continue to look for received beacons on any of the UCGs it is operating on. On receipt of a beacon from an unknown neighboring MP, but containing a matching mesh ID, an MP will attempt to create a peer link to the new neighbor. Once a mesh node has joined a mesh network, it needs to establish peer links with its neighbors before it can start to send packets. The mesh node that has recently joined the mesh network sends an Association Request frame which has 4 fields: Mesh ID, WLAN Mesh Nuno José Rodrigues Page 18

19 Capability, Active Profile Announcement and MP Peer Request. The other MPs should reply with an Association Response Frame which has the same field except the last one that is MP Peer Response. Note that all active MPs shall include a WLAN Mesh Capability element in all transmitted beacon and probe response frame. This element indicates active MP status, Active Protocol ID, Active Metric ID, peer capacity field (indicates the number of additional peer associations that can be supported). Note that the MP should be able to establish many links simultaneously. Before accepting the association request, a MP shall check the state of the requesting MP in its own neighbor table. If the state is set to association pending, it shall compare the directionality value contained in the MP peer associate request element with that contained in its own table entry. If the received value is less than or equal to the transmitted value stored in the table, the MP shall reject the association request by transmitting an association response containing an MP peer response element with status set to deny. Otherwise, it may accept or reject the association request at its option Link State Discovery The purpose of the local link state discovery procedure is to populate the r (current bit rate in user, that is, the modulation mode) and e pt (packet error rate at the current bit rate for a data frame with a 1000 byte payload) fields for each peer MP in the neighbor table. There values are used by the route establishment algorithm to determine the most efficient available routes. One of the two MP is responsible for determining the link quality (calculating the previous two parameters). Nuno José Rodrigues Page 19

20 To announce those values, is used a Local Link state announcement which has 6 octets 4 of them to r and e pt attached to a mesh management frame Path Selection Mesh path selection describes a single-hop or multi-hop path between mesh points at the link layer using management frames. Simple client STA nodes associate with one of the Mesh AP devices as normal. Mesh path selection services consist of baseline management messages for neighbor discovery, local link state measurement and maintenance, and identification of an active path selection protocol. Each WLAN Mesh uses a single method to determine paths through the Mesh, although a single device may be capable of supporting several. MPs use the WLAN Mesh Capability Information Element to discover which protocol and metric an established WLAN Mesh is using, allowing the MP to identify if and how it should participate in the mesh. The default protocol to path selection is Hybrid Wireless Mesh Protocol (HWMP) which is going to be described in the next section. Simplifying HWMP protocol, path selection procedure, is taken care when a S MP wants to find the route to a destination MP D, is broadcast a RREQ with the destination node D specified in the destination list and the metric field initialized to 0. When a node receives a RREQ it creates a route to S or updates its current route if the RREQ is fresh enough and is traversed through a route that offered a better metric than the current one. If a route is created or modified the RREQ is also forwarded (rebroadcast) updating the metric field. After creating or updating a route to S, the destination Nuno José Rodrigues Page 20

21 node D sends a unicast RREP back to S. Connectivity information is provided and maintained by periodically broadcasting routing protocol messages. If a node has not sent a broadcast message, a RREQ message, within the last hello interval, the node may broadcast a hello message. Nuno José Rodrigues Page 21

22 4.6. Hybrid Wireless Mesh Protocol (HWMP) The Hybrid Wireless Mesh Protocol (HWMP) is the default routing protocol for IEEE s. As a hybrid routing protocol, HWMP contains both reactive and proactive routing components. HWMP is an adaptation of the reactive routing AODV [4, 6] called Radio-Metric AODV (RM-AODV) and spanning tree based routing protocol. While AODV works on layer 3 with IP address and uses the hop count as routing metric, RM-AODV works on layer 2 with MAC address and uses a radio-aware routing metric for the path selection. HWMP allows MPs to perform the discovery and maintenance of optimal routes themselves or to rely on the formation of a tree structure based on a root node (logically placed in an MPP). If a mesh network has no root node configured (for example an Ad-Hoc network), on-demand rote discovery is used for all routing in the mesh network. A tree structured network is enabled by configuring an MP (typically a MPP) as a root node. In that case, other MPs proactively maintain routes to the root node and a proactive distance vector routing tree is created and maintained. On-demand routing and tree based routing run simultaneously. The main benefits of the HWMP are the flexibility to adapt to the requirements of a wide range of scenarios, ranging from fixed to mobile mesh networks and MPs discover and user the best metric path to any destination in the mesh with low complexity. In addition, when a root node is configured in the mesh, flooding of route discovery packets in the mesh is reduced if the destination is outside the mesh, the need to buffer messages at the source while on-demand route discovery is in progress is reduced, non-discovery broadcast and multicast traffic can be Nuno José Rodrigues Page 22

23 delivered along the tree topology and on-demand routes have the topology tree to choose if an on-demand route become unavailable or during route discovery. HWMP has a single hybrid routing feature. If a proactive tree exists, it may be used by default while on-demand route discovery is in progress for intra-mesh destinations. An MP may choose to rely exclusively on the routing tree for all intra-mesh as well as gateway traffic routing On-Demand Routing in HWMP The main characteristic of the reactive routing path is computed only if one is necessary for sending data between two mesh points. HWMP has 4 information elements: root announcement (RANN), path request (PREQ), path reply (PREP), and path error (PERR). Except for PERR, all other information elements of HWMP contain 3 important fields: destination sequence number (DSN), time-to-live (TTL), and metric. DSN and TTL can prevent the counting to infinity problem, and the metric field helps to find a better routing path than just using hop count. On-demand routing in HWMP uses a route request (RREQ) and route reply (RREP) mechanisms to establish routes between two MPs. A source mesh point that needs a path to a destination mesh point broadcasts a route request message requesting a route to the destination. The route request message is processed and forwarded by all mesh points and sets up reverse paths to the originator of the route discovery. The destination mesh point or Nuno José Rodrigues Page 23

24 intermediate mesh points with a path to the destination will answer with a unicast route reply message. This sets up the forward path to the destination. HWMP adapts original AODV to work at layer 2 and changes all IP and IP addressing references to MAC and MAC addresses. Apart from this adaptation, it still uses some original mechanisms of the original AODV, such as: route discovery, destination only and reply and forwarding, route maintenance, best candidate route caching, sequencing, route acknowledgment and route errors. In order to be compatible with legacy STA devices, MAPs create and administer messages on behalf of the legacy STAs that are associated with them. The functionality is similar to the situation when an MAP has multiple addresses. The associated STA addresses may be thought of as alias address for the MAP. However, STA handoffs due to roaming may cause a route to become stale. RERR mechanism needs to be modified in order to make sure that backhaul routing continues to function when there are many legacy STAs in a network and/or there are frequent and rapid STA handoffs Tree based Routing in HWMP In the proactive tree-bases routing mode, there are two mechanisms: one is based on proactive PREQ and the other is based on proactive RANN. In the proactive PREQ mechanism, if a MP (typically a MPP) in a WLAN mesh is optionally configured as a root node, other MPs proactively maintain routes to the root node using topology discovery primitives. HWMP topology formation begins when the root portal Nuno José Rodrigues Page 24

25 announces itself with the root announcement message, which contains the distance metric and a sequence number. The value of the metric is zero. Any MP hearing the announcement directly updates its route table as directly connected child of the root and the metric associated with the link. It then rebroadcasts the root announcement with an updated distance vector metric. Thus, the topology builds away from the root as each MP updates the distance vector to root and re-advertises to its neighbors the cumulative cost to the root portal. When a node wants to send a frame to another node, and if it has no route to that node (mapping its address to a given MP) it may send the frame to the root. The root looks up the routing and bridging tables to see if the packet is intended for a node within the mesh or outside. It forwards the message appropriately back to the mesh or its uplink. If it finds the entry inside the mesh, it sends the frame to the destination parent MP using an additional tunnel encapsulation. When the packet reaches the destination parent MP and checks the tunnel encapsulation, it knows that the address is within the mesh and may initiate an RREQ back to the source. This hybrid routing mechanism allows the initial frame to be forwarded on the tree topology path followed by establishing an optimal, on-demand route between the source destination pair for all subsequent frames among them. Any frame sent from the root follows the optimal path to any other MP in the network by the spanning tree properties. When there are multiple portals in a mesh network, a single portal takes the root role either by provisioning or by a dynamic procedure. All other portals assume non-root roles. In presence of multiple portals, the root forwards all frames with unknown addresses outside the mesh to its own uplink as well as other portals for forwarding on their uplinks. All non-root portals forward frames from outside the mesh to the root portal for further forwarding within the mesh network. Nuno José Rodrigues Page 25

26 In the proactive RANN mechanism, the root node periodically floods an RANN element into the network. When a MP receives the RANN and also needs to create/refresh a route to the root, it sends a unicast PREQ to the root. When the root receives this unicast PREQ, it replies with PREP to the MP. Thus, the unicast PREQ forms the reverse route from the root to the originating MP, while the unicast PREP creates the forward route from the originating MP to the root Radio-Aware Optimized Link-State Routing Protocol This is an optional protocol in IEEE s. Radio-aware optimized link-state routing (RA-OLSR) is a unified and extensible proactive, link-state routing framework for WMNs based on the original OLSR protocol with extensions from fisheye state routing (FSR). RA-OLSR enables the discovery and maintenance of optimal routes based on a predefined metric, given that each MP has a mechanism to determine the metric cost of a link to each of its neighbors. In order to propagate the metric information between MPs, a metric field is used in RA-OLSR control messages. In disseminating topology information over the network, RA-OLSR adopts the following approaches in order to reduce the related control overhead: It uses only a subset of MPs in the network, called multipoint relays (MPRs), in flooding process and it can control (and thereby reduce) the message exchange frequencies based on the fisheye scopes. The current RA-OLSR protocol specifications also include association discovery protocol to support legacy stations. The MAPs select paths among MAPs and MPs by running RA- OLSR protocol and complement routing information among MAPs and MPs with the Nuno José Rodrigues Page 26

27 information of legacy stations associated with them. OLSR is an optimization over the classical link-state routing protocol, tailored for MANETs. It inherits the stability of a link-state routing protocol and has the advantage of having routes immediately available when needed due to its proactive nature. Nuno José Rodrigues Page 27

28 4.7. WLAN Mesh Security The link access protocol is based on i [9] Robust Security Network Association (RSNA) security and supports both centralized and distributed IEEE 802.1x-based authentication and key management. In a WLAN mesh, an MP performs the roles of both the supplicant and the authenticator, and may optionally perform the roles of an authentication server (AS). The AS may be collocated with an MP or be located in a remote entity with which the MP has a secure connection (this is assumed and specified by the s proposal). A node establishes RSNA in one of the three ways: 1. Centralized 802.1x authentication model 2. Distributed 802.1x authentication model 3. Pre-shared key authentication model The first two use 802.1x EAP-based authentication followed by i 4-way handshake. An authenticator is used in the first model, whereas MP MP perform mutual authentication in the second model. The pre-shared model does not quite scale to meshes where multi-hop routing is required. In particular, it is infeasible to secure routing functionality when a pre-shared key is used in a mesh with more than two nodes, because it is no longer possible to reliably determine the source of any message. IEEE s Task Group is discussing more robust security for WLAN mesh and is expected to make some substantial changes to the draft security specification. Nuno José Rodrigues Page 28

29 4.8. Conclusion The s [1] enables basic mesh services in a WLAN network by implementing the amendments to IEEE protocol and processing rules without changing the PHY layer. Most of these amendments are simple extensions of existing MAC such as power saving and beaconing. Routing, forwarding, interworking, security, and QoS are the five areas where the draft standard introduces changes to the standard. Routing and forwarding changes enable multi-hop forwarding in the mesh network s specifies a protocol based on earlier MANET work i standard is [9] a single-hop security solution, and if a network only deploys i, traffic will be encrypted between STA and MAP, but not between MPs. Some of the known limitations of s are: 1. Mesh routing is layer-2 based, which may not scale well. 2. Hybrid mesh routing has not been studied yet. 3. Mesh forwarding does not have multicast optimizations. 4. Mesh networks may not work efficiently when multiple portals are connected to a larger 802 LAN. 5. Mesh interworking with other 802 technologies is not supported. 6. Mesh security mechanisms not support fast roaming, handoffs, or route convergence as the backhaul links change frequently and/or rapidly. This section presented an overview of the standard, including basic WLAN mesh networking architecture, and routing mechanisms. Nuno José Rodrigues Page 29

30 5. Discrete Events Simulation Discrete-event simulation is a computing technique for studying the behavior of eventdriven systems. A system is a collection of entities (e.g., people and machines) that interact over time. These entities and the interactions between them must be modeled. In discrete-event simulation, a set of system states is specified for the system, and the evolution of the system is viewed as a sequence of the form: < s 0, (e 0, t 0 ), s 1, (e 1, t 1 ), s 2,... > where the s i s are system states, the e i s are system events, and the t i s are non-negative numbers representing event occurrence times. The above sequence means that the system started at time 0 in state s 0 ; then event e 0 occurred at time t 0 taking the system to state s 1 ; then event e 1 occurred at time t 1 taking the system to state s 2 ; and so on. Something can be modeled with two events: one at the beginning and another at the end leading to the existence of more than one state. Each event occurrence is assumed to take zero time. The t i s are required to be non-decreasing, i.e., t i t i+1 for every i. Actually t i < t i+1 does not occur every time because it is the case in discrete-event models that two unrelated events can occur at the same time. Given the evolution of a system, it is possible to determine its properties and evaluate appropriate performance measures. In general, there is a set of system parameters, referred to as input parameters, that determines the evolution of the system, and hence the properties and performance measures. For example, the input parameters to the queuing system are the customer service requirements and arrival times. Typically, the input parameters of a system should be defined stochastically (or probabilistically), instead of deterministically. That is, random variables are chosen, taking values from some domain with some probability Nuno José Rodrigues Page 30

31 distribution. Each set of input parameter values originate a unique evolution. The objective is to obtain performance measures averaged over all such evolutions. There are two reasons for introducing random variables. First, for most real-life system, there aren t characterizations of the input parameters. Hence, using probabilistic inputs, the real-life system is approximated. Secondly, even if there has an exact characterization of the input parameters, it is often computationally too expensively or analytically intractable to take them into account. Discrete Events Simulation will be used to simulate WMN using NS-3 [2] environment. NS-3 is a discrete event network simulator for Internet systems written in C++. It is used to protocol design, large scale systems studies and prototyping. NS is a research community resource and over 50% of AMC and IEEE network simulation papers from cite the use of ns-2. This tool already includes some of the simulation models needed to develop the simulation study proposed by this dissertation. Nuno José Rodrigues Page 31

32 6. References 1. IEEE P /0328r0, Joint SEE-Mesh/Wi-Mesh Proposal to TGs, IEEE, Draft Standard, February 2006, Work in Progress. 2. NS-3. ns-3 project. [Online] Available: 3. ANSI/IEEE Std , 1999 Edition (R2003), : Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE, LAN/MAN Standard, Mobile Ad-hoc Networks (MANET) Working Group. The Internet Engineering Task Force (IETF). [Online] Available: 5. IEEE s ESS Mesh Networking. Ko, Prof. Young-Bae, Redes Ad-Hoc. Ricardo, Prof. Manuel Alberto Pereira. Porto : s.n., Wireless mesh networks: a survey. Ian F. Akyildiz, Xudong Wang, Weilin Wang. 2005, ScienceDirect. 8. IETF RFC 3561, Ad hoc On-Demand Distance Vector (AODV) Routing. Perkins, C.; Belding- Royer, E.; DAS, S., IEEE i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE Standards ( ). Nuno José Rodrigues Page 32

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks*

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks* Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks* Deepesh Man Shrestha Graduate School of Information and Communication Ajou University, Suwon, Republic of Korea deepesh@ajou.ac.kr

More information

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme

Mesh Network. Kiran Mathews Seminar: Verteilte und vernetzte Systeme Mesh Network Kiran Mathews (kmathews@rhrk.uni-kl.de) Seminar: Verteilte und vernetzte Systeme February 8, 2016 Outline 1 Why Mesh Networks? Existing System imesh 2 Architectural Overview Frame Structure

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

IEEE s Multihop MAC. Mateusz Wielgosz

IEEE s Multihop MAC. Mateusz Wielgosz IEEE 802.11s Multihop MAC Mateusz Wielgosz Outline Introduction MANET and challenges Routing and metrics 802.11s group Network architecture Mesh Creation Internetworking Path Selection Frames Conclusions

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Notes on implementing a IEEE s Mesh Point

Notes on implementing a IEEE s Mesh Point Fourth EuroFGI Workshop on Wireless and Mobility Notes on implementing a IEEE 802.11s Mesh Point R. G. Garroppo, S. Giordano, D. Iacono, L. Tavanti Telecommunication Networks Research Group Dip. Ingegneria

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

IEEE s Wireless Mesh Networks: Challenges and Perspectives

IEEE s Wireless Mesh Networks: Challenges and Perspectives IEEE 802.11s Wireless Mesh Networks: Challenges and Perspectives Aggeliki Sgora 1, Dimitris D. Vergados 1,2, and Periklis Chatzimisios 3 1 University of the Aegean Department of Information and Communication

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Wireless Protocols. Training materials for wireless trainers

Wireless Protocols. Training materials for wireless trainers Wireless Protocols Training materials for wireless trainers Goals The goal of this lecture is to introduce: IEEE wireless protocols coverage 802.11 radio protocols terminology WiFi modes of operation details

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1 CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Fall 2018 CMSC417 Set 1 1 The Medium Access Control Sublayer November 18 Nov 6, 2018 2 Wireless Networking Technologies November 18

More information

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology CSC344 Wireless and Mobile Computing Department of Computer Science COMSATS Institute of Information Technology Wireless Local Area Networks (WLANs) Part II WiFi vs 802.11 IEEE 802.11 Features Hidden Node

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello PART 8 IEEE 802.11 Extensions QoS Support 802.11 MAC evolution (802.11e, finalized in dicember 2005) Multiple Queues CW min, CW max, AIFS, TXOP MAC 1 MAC 2 MAC 3 MAC 4 MAC Entity AC Virtual Collision Handler

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Wireless LANs. ITS 413 Internet Technologies and Applications

Wireless LANs. ITS 413 Internet Technologies and Applications Wireless LANs ITS 413 Internet Technologies and Applications Aim: Aim and Contents Understand how IEEE 802.11 wireless LANs work Understand what influences the performance of wireless LANs Contents: IEEE

More information

INESC Porto, Faculdade de Engenharia, Universidade do Porto, Rua Dr. Roberto Frias, 378, Porto, Portugal UNCORRECTED PROOFS

INESC Porto, Faculdade de Engenharia, Universidade do Porto, Rua Dr. Roberto Frias, 378, Porto, Portugal UNCORRECTED PROOFS WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2009; 9:1 23 Published online XX Month Year in Wiley InterScience (www.interscience.wiley.com). RESEARCH ARTICLE Network infrastructure

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Status of P Sub-Specification

Status of P Sub-Specification Status of P1451.5 802.11 Sub-Specification June 7, 2004 Ryon Coleman Senior Systems Engineer 802.11 Subgroup rcoleman@3eti.com Agenda 1. IEEE 802.11 Architecture 2. Scope within the 1451 Reference Model

More information

Data Communications. Data Link Layer Protocols Wireless LANs

Data Communications. Data Link Layer Protocols Wireless LANs Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Internetwork Expert s CCNP Bootcamp Wireless LANs http:// WLANs Overview WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless Upper layer protocols like IP/TCP/UDP/etc. are

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Ad-hoc and Infrastructured Networks Interconnection

Ad-hoc and Infrastructured Networks Interconnection tel. 22 209 4000 fax 22 209 4050 e-mail www@inescporto.pt internet Ad-hoc and Infrastructured Networks Interconnection Tânia Pinto Calçada and Manuel Ricardo RTCM Aveiro 18th February 2005 INESC Porto

More information

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview Wireless LANs CSE 3213 Fall 2011 4 November 2011 Overview 2 1 Infrastructure Wireless LAN 3 Applications of Wireless LANs Key application areas: LAN extension cross-building interconnect nomadic access

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

Table of Contents 1 WLAN Service Configuration 1-1

Table of Contents 1 WLAN Service Configuration 1-1 Table of Contents 1 WLAN Service Configuration 1-1 WLAN Service Overview 1-1 Terminology 1-1 Wireless Client Access 1-2 802.11 Overview 1-4 WLAN Topologies 1-5 Single BSS 1-5 Multi-ESS 1-5 Single ESS Multiple

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar / International Journal of Engineering Research and Applications (IJERA) ISSN: Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size Lovekesh Kumar* *(Department

More information

Basic processes in IEEE networks

Basic processes in IEEE networks Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters IEEE 802.11 Terminology Station (STA) Architecture: Device that contains IEEE

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Wi-Fi Mesh Networking: IEEE s

Wi-Fi Mesh Networking: IEEE s Wi-Fi Mesh Networking: IEEE 802.11s Piotr Mitoraj mitoraj@cs.tut.fi Tampere University of Technology Department of Communications Engineering November 3, 2009 Piotr Mitoraj / MUW2NET / TUT TLT-2756: Mesh

More information

QoS multi meshed tree routing in tethered MANET

QoS multi meshed tree routing in tethered MANET Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 2005 QoS multi meshed tree routing in tethered MANET Vishal Gogula Follow this and additional works at: http://scholarworks.rit.edu/theses

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

STUDY OF QoS ISSUES FOR ROUTING PROTOCOLS in IEEE s

STUDY OF QoS ISSUES FOR ROUTING PROTOCOLS in IEEE s STUDY OF QoS ISSUES FOR ROUTING PROTOCOLS in IEEE 802.11s Nikumani Choudhury Department of IT, Gauhati University Guwahati, Assam-781014, India nikumani2010@rediff.com Azhar Hussain Mozumder Department

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

Introduction to IEEE

Introduction to IEEE Introduction to IEEE 802.11 Characteristics of wireless LANs Advantages very flexible within the reception area Ad hoc networks without previous planning possible (almost) no wiring difficulties more robust

More information

Chapter-2 Routing Protocols of MANET

Chapter-2 Routing Protocols of MANET Chapter-2 Routing Protocols of MANET Chapter 2 Routing Protocols of MANET Routing is an important function for any network, whether it is for wired or wireless. The protocols designed for routing in these

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across

More information

Mobile Ad-hoc Networks

Mobile Ad-hoc Networks Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples

More information

Mohamed Khedr.

Mohamed Khedr. Mohamed Khedr http://webmail.aast.edu/~khedr Tentatively Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week 7 Week 8 Week 9 Week 10 Week 11 Week 12 Week 13 Week 14 Week 15 Overview Packet Switching IP addressing

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.  Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : PW0-205 Title : Certified wireless analusis professional(cwap) Vendors : CWNP Version : DEMO Get Latest

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information