End-to-end path: route
|
|
- Leon Wright
- 6 years ago
- Views:
Transcription
1 Multi-hop Wireless Netorks CMU CS : Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale: Ho to build multi-hop ireless sstems (MANs? WANs?); ho to support mobile nodes and users at Internet-scale Brad Karp 18th March, 23 Multi-hop ( ad hoc ) ireless routing: Ho do e find routes hen the topolog is highl dnamic, and hen the netork diameter is great? Multi-hop ireless capacit: Ho much user traffic can e carr on a large-scale, multi-hop ireless netork? Where might multi-hop ireless netorks fit ith IrisNet? CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 1 Multi-Hop Motivation: Rooftop Netorks Metropolitan-area netork comprised of customer-oned and -operated radios: Rooftop Netorks The Routing Problem R Packet-sitched netorks S An alternative architecture to single-hop cellular sstems: Self-organizing, rapidl deploable, potentiall loer cost Great demand alread! Hardare ubiquitous; scalable algorithms for routing sorel needed End-to-end path: route Each router chooses neighbor to hich to forard received packet onard toard destination, Topolog ma be dnamic: routes change CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 2 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 3 Another Motivating Eample Vast ireless netork of mobile temperature sensors, floating on the ocean s surface: Sensor Netorks Motivation (cont d) Enable three ne classes of netorks: Ad-hoc netorks: mobile, infrastructureless, small-scale [Broch et al., 98] CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 4 Sensor netorks: mobile, large-scale Rooftop netorks: fied, large-scale, no common administrative authorit [Shepard, 96] A mi of these characteristics: Mobilit Scale (number of nodes) Lack of static hierarchical structure CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 5
2 Scalabilit Goals for Mobile, Wireless Routing Prior Work Wired, Intra-omain Internet Routing: As number of nodes increases, and mobilit rate increases: Routing protocol message cost: MINIMIZE Application packet deliver success rate: MAXIMIZE Route length: MINIMIZE Per-node state: MINIMIZE Link-State (ijkstra) and istance-vector (Bellman-Ford) routing on flat addresses to find shortest (in hops) paths escribe entire topolog to all routers (LS) or push distances across netork diameter (V), for O(N) state per router Each link change must be communicated to all routers to avoid loops and disconnection [Zaumen, Garcia-Luna Aceves, 91] Ad Hoc Routing: Algorithms target lo-bandidth, high-mobilit netorks Man proposals (SV,, TORA, AOV,, ZRP,... ) iverse approaches: V, source routing, geographic, proactive, on-demand... CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 6 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 7 Ad Hoc Routing: SV estination-sequenced istance-vector Routing: Send increasing sequence number ith route advertisements Greater seqno takes precedence over lesser metric On detecting disconnection to, router advertises route ith infinit metric and incremented seqno increments seqno on hearing advertisement ith infinit metric Use triggered updates to propagate seqno increases rapidl and eliminate potentiall looping routes namic Source Routing: Ad Hoc Routing: On-demand routing: onl generate routing protocol traffic hen forarding requires it Flood queries to learn source routes Cache replies Source routes break more frequentl as mobilit and netork diameter increase; caching steadil less effective Broch et al. evaluation of : 5-node netorks Metrics: routing protocol overhead, path optimalit, packet deliver success rate Eploration of limits of? CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 8 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 9 Prior Work: Scaling ominant factors in scaling of V, LS, algorithms: Rate of change of topolog Geograph Central Idea: Machines can kno their geographic locations. Route using GEOGRAPHY. Number of routers in the routing domain Scaling strategies: Hierarch: at AS boundaries (BGP) or on a finer scale (OSPF) Goal: Reduce number of nodes in a routing domain Assumptions: Level boundaries relativel fied; administrative authorit can choose level boundaries Caching: Store source routes overheard () Goal: Limit propagation of future source route queries Assumption: Source route remains fied hile cached Assumptions invalid for highl mobile or unstructured netorks! CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 1 Established positioning methods: GPS outdoors (single chip, lo-cost) Surveing (stationar routers) Inertial sensors (vehicles) Acoustic and radio range-finding (indoors, [AT&T Cambridge, 1997], [Priantha et al., 2]) Efficient node location lookup/registration sstem [Li et al., 2] All nodes kno on position; packet source marks packet ith destination s location CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 11
3 Assumptions Bi-directional radio links (e.g., IEEE ith link-level acknoledgements) Netork nodes placed roughl in a plane Radio propagation in free space; distance from transmitter determines signal strength at receiver (to-ra ground reflection model) Greed Forarding Nodes learn immediate neighbors positions through beacons/piggbacking on data packets Locall optimal, greed forarding choice at a node: Forard to the neighbor geographicall closest to the destination Fied, uniform radio transmitter poer CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 12 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 13 In Praise of Geograph Greed Forarding Failure Self-describing Greed forarding not alas possible! Consider: As node densit increases, shortest paths through ireless netorks correspond increasingl to Euclidean straight line beteen source and destination v z Each node s state concerns onl immediate neighbors: Tin per-node state Routing protocol pushes state onl one hop tin routing protocol overhead Local forarding decisions robust to topolog changes Compare ith lookup in O(N) table under V, LS CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 14 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 15 Voids Node ensit and Voids When the intersection of a node s circular radio range and the circle about the destination on hich the node sits is empt of nodes, greed forarding is impossible Such a region is a void: v z void CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks Number of nodes Fraction of paths Eisting and Found Paths, 134 m 134 m Region Fraction eisting paths Fraction paths found b greed The probabilit that a void region is empt of nodes increases as nodes become more sparse CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 17
4 Void Traversal: The Right-Hand Rule Well-knon graph traversal: right-hand rule: When arriving at from, move to the net verte counterclockise about from 2. z Planar vs. Non-Planar Graphs The right-hand rule ma not tour enclosed faces on graphs ith edges that cross (non-planar graphs) u z v 4. Traverses interior faces in clockise edge order; eterior faces in counterclockise edge order Seek a distributed algorithm that removes crossing edges ithout partitioning the netork, using onl neighbors positions as input CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 18 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 19 Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 8] and Gabriel Graph (GG) [Gabriel, 69] are long-knon planar graphs Planarized Graphs: Eample 2 nodes, placed uniforml at random on a 2-b-2-meter region; radio range 25 meters Assume an edge eists beteen an pair of nodes separated b less than a threshold distance (i.e., the nominal radio range) RNG and GG can be constructed using onl neighbors positions, and can be shon not to partition the netork! u v u v Full Netork GG Subset RNG Subset RNG GG CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 2 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 21 Full Greed Perimeter Stateless Routing All packets begin in greed mode Upon greed failure, node marks its current location in packet, and marks packet in perimeter mode Perimeter Mode Forarding Eample Perimeter mode packets follo simple planar graph traversal: Forard along successivel closer faces b right-hand rule, until reaching destination, or node closer to it than perimeter mode entr point Return packets to greed mode hen the reach a node closer than their perimeter mode entr point CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 22 Traverse face closer to along b right-hand rule, until reaching the edge that crosses Repeat ith the net closer face along, &c. Record first edge on face to detect disconnection CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 23
5 Pause Time : Protocol Techniques for namic Netorks Use of MAC-laer failure feedback: As in [Broch, Johnson, 98], interpret retransmit failure reports from the MAC as indication a neighbor has gone out-of-range Interface queue traversal and packet purging: Upon MAC retransmit failure for a neighbor, alk the interface queue and remove packets to that neighbor to avoid head-of-line blocking of transmitter during retries on those packets Promiscuous netork interface: Reduce beacon load and keep positions stored in neighbor tables current b tagging all packets ith the forarding node s position Planarization triggers: Re-planarize upon acquisition of a ne neighbor and ever loss of a former neighbor, to keep planarization up-to-date as topolog changes Simulation Environment ns-2 ith ireless etensions [Broch et al., 1998]: full MAC, phsical propagation; allos comparison of results Topologies and Workloads: Nodes Region ensit CBR Flos 5 15 m 3 m 1 node / 9 m m 6 m 1 node / 9 m m 134 m 1 node / m 2 3 Simulation Parameters: Pause Time:, 3, 6, 12 s Motion Rate: [1, 2] m/s Beacon Interval: 1.5 s ata Packet Size: 64 btes CBR Flo Rate: 2 Kbps Simulation Length: 9 s CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 24 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 25 Packet eliver Success Rate (5, 2; ense) (2 nodes) (2 nodes), B = 1.5 (5 nodes) (5 nodes), B = CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 26 Fraction data pkts delivered Routing Protocol Overhead (5, 2; ense) 1e+7 1e (2 nodes) (2 nodes), B = 1.5 (5 nodes) -Broch (5 nodes) (5 nodes), B = CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 27 Path Length (2; ense) Fraction of delivered pkts >= 5 Hops Longer than Optimal Routing Algorithm State Size (2; ense) Routing algorithm Routing algorithm requires state proportional to node densit; stores state at each router proportional to the sums of the lengths of source routes CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 28 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 29 Per-node state (nodes) Per-node state (btes) Routing protocol overhead (pkts)
6 Packet eliver Success Rate (5; Sparse) (5 nodes) (5 nodes), B = 1.5 (5 nodes), B = 1.5, Greed Onl CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 3 Fraction data pkts delivered Routing Protocol Overhead (5; Sparse) Routing protocol overhead (pkts) (5 nodes) (5 nodes), B = 1.5 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 31 Path Length (5 nodes, Sparse) Fraction of delivered pkts >= 5 Hops Longer than Optimal CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 32 Pause Time Routing Algorithm Capacit of Ad Hoc Wireless Netorks Contet: Mobicom 21, on the heels of ears of ad hoc routing research, nearl eclusivel in simulation One commercial real sstem: Metricom (R.I.P., 2) Goals: Eplain details of MAC hen used for forarding, as regards netork capacit Provide simple model for capacit of ad hoc netorks, as related to traffic matri Fundamental phenomenon: nodes use their on one-hop transmission capacit not onl for data the originate, but also for data the forard CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 33 Some depressing intuition: Ad Hoc Capacit: Intuition Spatial reuse lets distant radios transmit simultaneousl, as the don t interfere Forarding and The energ required to garble another s transmission is far less than that required to be received properl Interfering range is 55 m, hile transmission range is 25 m For constant node densit, one-hop capacit, sum of all single-hop transfer rates possible in the netork, gros as O(n) As netork diameter gros, for random source/destination pairs, average path length gros as O( n) Total end-to-end capacit: O(n/ n), and so per-node capacit is O(1/ n). Throughput per node approaches zero as number of nodes increases! CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 34 What s the best throughput e can epect in a chain A B C, if ranges ere equal? A and B can t transmit simultaneousl; nor can B and C; nor can A and C Best throughput: 1/3 link rate With 55 m interference range, best throughput drops to 1/4; no interferes ith A s transmissions to B In simulations of greed senders arranged in a chain, throughput is closer to 1/7 than 1/4; boundar effect CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 35
7 Forarding and Backoff Traffic Matri and Multi-Hop Wireless Capacit A B C E F Capacit available to each node inversel related to epected flo phsical path length Traffic matri tpicall studied in ad hoc routing: uniforml randoml selected flo endpoints Epected path length for a uniform random traffic pattern on a netork of area A: 2 A/3 For n nodes and fied node densit, A n E ill clobber A B Yet A doesn t kno of s transmission Result: repeated eponential backoff b A So the capacit available to each node is O(1/ n) Perhaps this is h published ad hoc routing studies use ca. 6 Kbps total application traffic orkloads! CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 36 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 37 Poer-La Traffic Patterns and Capacit Poer-la traffic patterns, here probabilit of communication ith node distance aa is given b α, offer constant per-node capacit For α = 2, epected communication distance scales as O(log2 A) A useful design rule for sstems for multi-hop ireless netorks, e.g., GLS location database [Li et al., ] Poer-la construct makes analsis tractable; meaning is intuitivel useful Evidence of poer-la communication patterns in the ild? CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 38
Geographic Routing in Simulation: GPSR
Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops
More informationChallenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning
Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast
More informationInternet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski
Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router
More informationRouting in Sensor Networks
Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing
More informationGeographic and Diversity Routing in Mesh Networks
Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer
More informationEthernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers
Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich
More informationGPSR: Greedy Perimeter Stateless Routing for Wireless Networks
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks Brad Karp Harvard University / ACIRI karp@eecs.harvard.edu H. T. Kung Harvard University htk@eecs.harvard.edu ABSTRACT We present Greedy Perimeter
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationNetwork service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.
Netork Layer (part ) y the end of this lecture, you should be able to. xplain the operation of distance vector routing algorithm xplain shortest path routing algorithm escribe the major points of RIP and
More informationChapter 4: Network Layer
Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More informationSimulations of the quadrilateral-based localization
Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution
More information(General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks
ijesm www.ijesm.com International Journal of Engineering, Science and Metallurgy (General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks Niyati Bansal
More informationCMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14
CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationGeographical routing 1
Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes
More information4.5 Routing Algorithms
4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit
More informationChapter 4: Network Layer
Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link
More informationAnnouncements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.
Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar
More informationRouting. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?
Routing 9: Intro to Routing lgorithms Last Modified: // :: PM : Netork Layer a- IP Routing each router is supposed to send each IP datagram one step closer to its Ho do they do that? Static Routing Hierarchical
More informationInterplay between routing, forwarding
Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state
More informationLecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT
Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationNetwork Layer: Routing
Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring
More information11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:
Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message
More informationWireless and Mobile Networks Reading: Sections 2.8 and 4.2.5
Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationCS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationAn Energy Efficient Location Service for Mobile Ad Hoc etworks
An Energ Efficient Location Service for Mobile Ad Hoc etworks Zijian Wang, Euphan Bulut and Boleslaw K. Szmanski, Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 280 USA {wangz,
More informationPerformance Comparison of Scalable Location Services for Geographic Ad Hoc Routing
Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West
More informationNetwork Layer: Control Plane 5-2
Network Laer: Control Plane EECS34 8-03-05 4- Chapter 5: network laer control plane chapter goals: understand principles behind network control plane traditional routing algorithms SDN controlllers Internet
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationIntroduction to Fieldbus and DeviceNetworks
Fieldbus and Device Netorks This tutorial on Fieldbus and Device Netorks is broken don into the folloing sections: Introduction to Fieldbus and DeviceNetorks A brief overvie of Profibus Introduction to
More informationR2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2
R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 1 Nokia Research Center, Palo Alto 2 Computer and Information Science and Engineering Department, University of Florida, Gainesville
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationProbabilistic Geographic Routing Protocol for Ad Hoc and Sensor Networks
Geographic Routing Protocol for Ad Hoc and Sensor Networks Tana Roosta Department of EECS UC Berkele roosta@eecs.berkele.edu Mike Menzo Department of EECS UC Berkele mpm@eecs.berkele.edu Professor Shankar
More informationInternet Indirection Infrastructure
Ke Observation Internet Indirection Infrastructure Virtuall all previous proposals use indirection, e.g., Phsical indirection point mobile IP Logical indirection point IP multicast Ion Stoica UC Berkele
More informationModule 8. Routing. Version 2 ECE, IIT Kharagpur
Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationThe CMU Monarch Project s Wireless and Mobility Extensions to ns
The CMU Monarch Project s Wireless and Mobility Extensions to ns David B. Johnson Josh Broch Yih-Chun Hu Jorjeta Jetcheva David A. Maltz The Monarch Project Carnegie Mellon University http://www.monarch.cs.cmu.edu/
More informationData Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti
Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences
More informationInitialization: Loop until all nodes in N
Routing Routing lgorithm classification Routing protocol Goal: determine good path (sequence of routers) thru netork from source to dest. Graph abstraction for routing s: graph nodes are routers graph
More informationAn efficient implementation of the greedy forwarding strategy
An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at
More informationChapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions
Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models
More informationICS 351: Today's plan. OSPF BGP Routing in general
ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an
More informationAn Analysis of Interference as a Source for Diffraction
J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction
More informationNetwork layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction
Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines
More informationDynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5
ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom
More informationECE 158A: Lecture 5. Fall 2015
8: Lecture Fall 0 Routing ()! Location-ased ddressing Recall from Lecture that routers maintain routing tables to forward packets based on their IP addresses To allow scalability, IP addresses are assigned
More informationCHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS
89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and
More informationIntra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.
Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved
More informationAnalysis of GPS and Zone Based Vehicular Routing on Urban City Roads
Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationRouting. Advanced Computer Networks: Routing 1
Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s
More informationNetwork Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture
Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction
More informationICS 351: Today's plan. distance-vector routing game link-state routing OSPF
ICS 351: Today's plan distance-vector routing game link-state routing OSPF distance-vector routing game 1. prepare a list of all neighbors and the links to them, and the metric for each link 2. create
More informationCSc 450/550 Computer Networks Internet Routing
CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms
More informationRouters & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives
Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain
More informationGeographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos
Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic
More informationBasic Idea. Routing. Example. Routing by the Network
Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationComputer Networks. Instructor: Niklas Carlsson
Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and
More informationCS118 Discussion Week 7. Taqi
CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to
More informationRouting by the Network
Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:
More informationCS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy
CS555, Spring 2005 April 12, 2005 No classes attend Senior Design Projects conference Network Layer 4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What
More informationVehicle Networks. Networking Layer: Routing. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl
Vehicle Networks Networking Layer: Routing Univ.-Prof. r. Thomas Strang, ipl.-inform. Matthias Röckl Outline Introduction Lecture Vehicle Networks, Thomas Strang and Matthias Röckl, WS 008/009 Classical
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationCS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning
CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive
More informationIP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing
IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet
More informationCS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791
CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there
More informationLocalized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks
1 Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Netorks Yu Wang Xiang-Yang Li Department of Computer Science, University of North Carolina at Charlotte, 9201 University
More informationLecture 4. The Network Layer (cont d)
Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols
More informationMotivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control
Topology Control Andreas Wolf (0325330) 17.01.2007 1 Motivation and Basics 2 Flat networks 3 Hierarchy by dominating sets 4 Hierarchy by clustering 5 Adaptive node activity Options for topology control
More informationMobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV
Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationIndustrial Data Communications - Fundamentals
Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationSimulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:
Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationChapter 5: Network Layer Control Plane. understand principles behind network control plane : traditional routing algorithms
Introduction to Computer Networking Gu Leduc Chapter 5 Network Laer: The Control Plane Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesle, April 06. From Computer
More informationWireless Internet Routing. Learning from Deployments Link Metrics
Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data
More informationLecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011
Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table
More informationBGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables
More informationPerformance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols
Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.
More informationEfficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks
Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56
More informationBGR: Blind Geographic Routing for Sensor Networks
BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract
More informationImportant Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)
Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be
More informationAd hoc and Sensor Networks Topology control
Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling
More informationWhat is an Ad Hoc Network?
Introduction Part 1 CS-6777 Mobile Ad Hoc Networking Memorial University of Newfoundland What is an Ad Hoc Network?! A mobile ad hoc network (MANET) is Communication network Wireless signaling Multi-hop
More informationChapter 4: Network Layer: Part II
4: Network Laer Chapter 4: Network Laer: Part II (last revision 9/04/05. v3) 4. Introduction 4. Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format
More informationMobile Ad-hoc Networks
Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples
More informationLocalization and dynamic link detection for geographic routing in non-line-of-sight (NLOS) environments
RESEARCH Open Access Localization and dynamic link detection for geographic routing in non-line-of-sight (NLOS) environments Youngbae Kong 1, Younggoo Kon 1*, Jongho Shin 1 and Gitae Park 2 Abstract IEEE
More informationCS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella
CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding
More informationRouting, Routers, Switching Fabrics
Routing, Routers, Switching Fabrics Outline Link state routing Link weights Router Design / Switching Fabrics CS 640 1 Link State Routing Summary One of the oldest algorithm for routing Finds SP by developing
More informationROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS
ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile
More information