End-to-end path: route

Size: px
Start display at page:

Download "End-to-end path: route"

Transcription

1 Multi-hop Wireless Netorks CMU CS : Internet-Scale Sensor Sstems Overvie: Large-Scale Wireless Sstems Small-Scale: Ho to build single-hop ireless LAN; ho to make TCP perform ell over it Large-Scale: Ho to build multi-hop ireless sstems (MANs? WANs?); ho to support mobile nodes and users at Internet-scale Brad Karp 18th March, 23 Multi-hop ( ad hoc ) ireless routing: Ho do e find routes hen the topolog is highl dnamic, and hen the netork diameter is great? Multi-hop ireless capacit: Ho much user traffic can e carr on a large-scale, multi-hop ireless netork? Where might multi-hop ireless netorks fit ith IrisNet? CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 1 Multi-Hop Motivation: Rooftop Netorks Metropolitan-area netork comprised of customer-oned and -operated radios: Rooftop Netorks The Routing Problem R Packet-sitched netorks S An alternative architecture to single-hop cellular sstems: Self-organizing, rapidl deploable, potentiall loer cost Great demand alread! Hardare ubiquitous; scalable algorithms for routing sorel needed End-to-end path: route Each router chooses neighbor to hich to forard received packet onard toard destination, Topolog ma be dnamic: routes change CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 2 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 3 Another Motivating Eample Vast ireless netork of mobile temperature sensors, floating on the ocean s surface: Sensor Netorks Motivation (cont d) Enable three ne classes of netorks: Ad-hoc netorks: mobile, infrastructureless, small-scale [Broch et al., 98] CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 4 Sensor netorks: mobile, large-scale Rooftop netorks: fied, large-scale, no common administrative authorit [Shepard, 96] A mi of these characteristics: Mobilit Scale (number of nodes) Lack of static hierarchical structure CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 5

2 Scalabilit Goals for Mobile, Wireless Routing Prior Work Wired, Intra-omain Internet Routing: As number of nodes increases, and mobilit rate increases: Routing protocol message cost: MINIMIZE Application packet deliver success rate: MAXIMIZE Route length: MINIMIZE Per-node state: MINIMIZE Link-State (ijkstra) and istance-vector (Bellman-Ford) routing on flat addresses to find shortest (in hops) paths escribe entire topolog to all routers (LS) or push distances across netork diameter (V), for O(N) state per router Each link change must be communicated to all routers to avoid loops and disconnection [Zaumen, Garcia-Luna Aceves, 91] Ad Hoc Routing: Algorithms target lo-bandidth, high-mobilit netorks Man proposals (SV,, TORA, AOV,, ZRP,... ) iverse approaches: V, source routing, geographic, proactive, on-demand... CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 6 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 7 Ad Hoc Routing: SV estination-sequenced istance-vector Routing: Send increasing sequence number ith route advertisements Greater seqno takes precedence over lesser metric On detecting disconnection to, router advertises route ith infinit metric and incremented seqno increments seqno on hearing advertisement ith infinit metric Use triggered updates to propagate seqno increases rapidl and eliminate potentiall looping routes namic Source Routing: Ad Hoc Routing: On-demand routing: onl generate routing protocol traffic hen forarding requires it Flood queries to learn source routes Cache replies Source routes break more frequentl as mobilit and netork diameter increase; caching steadil less effective Broch et al. evaluation of : 5-node netorks Metrics: routing protocol overhead, path optimalit, packet deliver success rate Eploration of limits of? CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 8 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 9 Prior Work: Scaling ominant factors in scaling of V, LS, algorithms: Rate of change of topolog Geograph Central Idea: Machines can kno their geographic locations. Route using GEOGRAPHY. Number of routers in the routing domain Scaling strategies: Hierarch: at AS boundaries (BGP) or on a finer scale (OSPF) Goal: Reduce number of nodes in a routing domain Assumptions: Level boundaries relativel fied; administrative authorit can choose level boundaries Caching: Store source routes overheard () Goal: Limit propagation of future source route queries Assumption: Source route remains fied hile cached Assumptions invalid for highl mobile or unstructured netorks! CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 1 Established positioning methods: GPS outdoors (single chip, lo-cost) Surveing (stationar routers) Inertial sensors (vehicles) Acoustic and radio range-finding (indoors, [AT&T Cambridge, 1997], [Priantha et al., 2]) Efficient node location lookup/registration sstem [Li et al., 2] All nodes kno on position; packet source marks packet ith destination s location CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 11

3 Assumptions Bi-directional radio links (e.g., IEEE ith link-level acknoledgements) Netork nodes placed roughl in a plane Radio propagation in free space; distance from transmitter determines signal strength at receiver (to-ra ground reflection model) Greed Forarding Nodes learn immediate neighbors positions through beacons/piggbacking on data packets Locall optimal, greed forarding choice at a node: Forard to the neighbor geographicall closest to the destination Fied, uniform radio transmitter poer CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 12 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 13 In Praise of Geograph Greed Forarding Failure Self-describing Greed forarding not alas possible! Consider: As node densit increases, shortest paths through ireless netorks correspond increasingl to Euclidean straight line beteen source and destination v z Each node s state concerns onl immediate neighbors: Tin per-node state Routing protocol pushes state onl one hop tin routing protocol overhead Local forarding decisions robust to topolog changes Compare ith lookup in O(N) table under V, LS CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 14 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 15 Voids Node ensit and Voids When the intersection of a node s circular radio range and the circle about the destination on hich the node sits is empt of nodes, greed forarding is impossible Such a region is a void: v z void CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks Number of nodes Fraction of paths Eisting and Found Paths, 134 m 134 m Region Fraction eisting paths Fraction paths found b greed The probabilit that a void region is empt of nodes increases as nodes become more sparse CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 17

4 Void Traversal: The Right-Hand Rule Well-knon graph traversal: right-hand rule: When arriving at from, move to the net verte counterclockise about from 2. z Planar vs. Non-Planar Graphs The right-hand rule ma not tour enclosed faces on graphs ith edges that cross (non-planar graphs) u z v 4. Traverses interior faces in clockise edge order; eterior faces in counterclockise edge order Seek a distributed algorithm that removes crossing edges ithout partitioning the netork, using onl neighbors positions as input CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 18 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 19 Planarized Graphs Relative Neighborhood Graph (RNG) [Toussaint, 8] and Gabriel Graph (GG) [Gabriel, 69] are long-knon planar graphs Planarized Graphs: Eample 2 nodes, placed uniforml at random on a 2-b-2-meter region; radio range 25 meters Assume an edge eists beteen an pair of nodes separated b less than a threshold distance (i.e., the nominal radio range) RNG and GG can be constructed using onl neighbors positions, and can be shon not to partition the netork! u v u v Full Netork GG Subset RNG Subset RNG GG CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 2 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 21 Full Greed Perimeter Stateless Routing All packets begin in greed mode Upon greed failure, node marks its current location in packet, and marks packet in perimeter mode Perimeter Mode Forarding Eample Perimeter mode packets follo simple planar graph traversal: Forard along successivel closer faces b right-hand rule, until reaching destination, or node closer to it than perimeter mode entr point Return packets to greed mode hen the reach a node closer than their perimeter mode entr point CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 22 Traverse face closer to along b right-hand rule, until reaching the edge that crosses Repeat ith the net closer face along, &c. Record first edge on face to detect disconnection CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 23

5 Pause Time : Protocol Techniques for namic Netorks Use of MAC-laer failure feedback: As in [Broch, Johnson, 98], interpret retransmit failure reports from the MAC as indication a neighbor has gone out-of-range Interface queue traversal and packet purging: Upon MAC retransmit failure for a neighbor, alk the interface queue and remove packets to that neighbor to avoid head-of-line blocking of transmitter during retries on those packets Promiscuous netork interface: Reduce beacon load and keep positions stored in neighbor tables current b tagging all packets ith the forarding node s position Planarization triggers: Re-planarize upon acquisition of a ne neighbor and ever loss of a former neighbor, to keep planarization up-to-date as topolog changes Simulation Environment ns-2 ith ireless etensions [Broch et al., 1998]: full MAC, phsical propagation; allos comparison of results Topologies and Workloads: Nodes Region ensit CBR Flos 5 15 m 3 m 1 node / 9 m m 6 m 1 node / 9 m m 134 m 1 node / m 2 3 Simulation Parameters: Pause Time:, 3, 6, 12 s Motion Rate: [1, 2] m/s Beacon Interval: 1.5 s ata Packet Size: 64 btes CBR Flo Rate: 2 Kbps Simulation Length: 9 s CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 24 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 25 Packet eliver Success Rate (5, 2; ense) (2 nodes) (2 nodes), B = 1.5 (5 nodes) (5 nodes), B = CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 26 Fraction data pkts delivered Routing Protocol Overhead (5, 2; ense) 1e+7 1e (2 nodes) (2 nodes), B = 1.5 (5 nodes) -Broch (5 nodes) (5 nodes), B = CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 27 Path Length (2; ense) Fraction of delivered pkts >= 5 Hops Longer than Optimal Routing Algorithm State Size (2; ense) Routing algorithm Routing algorithm requires state proportional to node densit; stores state at each router proportional to the sums of the lengths of source routes CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 28 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 29 Per-node state (nodes) Per-node state (btes) Routing protocol overhead (pkts)

6 Packet eliver Success Rate (5; Sparse) (5 nodes) (5 nodes), B = 1.5 (5 nodes), B = 1.5, Greed Onl CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 3 Fraction data pkts delivered Routing Protocol Overhead (5; Sparse) Routing protocol overhead (pkts) (5 nodes) (5 nodes), B = 1.5 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 31 Path Length (5 nodes, Sparse) Fraction of delivered pkts >= 5 Hops Longer than Optimal CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 32 Pause Time Routing Algorithm Capacit of Ad Hoc Wireless Netorks Contet: Mobicom 21, on the heels of ears of ad hoc routing research, nearl eclusivel in simulation One commercial real sstem: Metricom (R.I.P., 2) Goals: Eplain details of MAC hen used for forarding, as regards netork capacit Provide simple model for capacit of ad hoc netorks, as related to traffic matri Fundamental phenomenon: nodes use their on one-hop transmission capacit not onl for data the originate, but also for data the forard CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 33 Some depressing intuition: Ad Hoc Capacit: Intuition Spatial reuse lets distant radios transmit simultaneousl, as the don t interfere Forarding and The energ required to garble another s transmission is far less than that required to be received properl Interfering range is 55 m, hile transmission range is 25 m For constant node densit, one-hop capacit, sum of all single-hop transfer rates possible in the netork, gros as O(n) As netork diameter gros, for random source/destination pairs, average path length gros as O( n) Total end-to-end capacit: O(n/ n), and so per-node capacit is O(1/ n). Throughput per node approaches zero as number of nodes increases! CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 34 What s the best throughput e can epect in a chain A B C, if ranges ere equal? A and B can t transmit simultaneousl; nor can B and C; nor can A and C Best throughput: 1/3 link rate With 55 m interference range, best throughput drops to 1/4; no interferes ith A s transmissions to B In simulations of greed senders arranged in a chain, throughput is closer to 1/7 than 1/4; boundar effect CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 35

7 Forarding and Backoff Traffic Matri and Multi-Hop Wireless Capacit A B C E F Capacit available to each node inversel related to epected flo phsical path length Traffic matri tpicall studied in ad hoc routing: uniforml randoml selected flo endpoints Epected path length for a uniform random traffic pattern on a netork of area A: 2 A/3 For n nodes and fied node densit, A n E ill clobber A B Yet A doesn t kno of s transmission Result: repeated eponential backoff b A So the capacit available to each node is O(1/ n) Perhaps this is h published ad hoc routing studies use ca. 6 Kbps total application traffic orkloads! CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 36 CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 37 Poer-La Traffic Patterns and Capacit Poer-la traffic patterns, here probabilit of communication ith node distance aa is given b α, offer constant per-node capacit For α = 2, epected communication distance scales as O(log2 A) A useful design rule for sstems for multi-hop ireless netorks, e.g., GLS location database [Li et al., ] Poer-la construct makes analsis tractable; meaning is intuitivel useful Evidence of poer-la communication patterns in the ild? CMU CS : Internet-Scale Sensor Sstems Brad Karp Lecture 18 Multi-hop Wireless Netorks 38

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski

Internet Technology. 08. Routing. Paul Krzyzanowski. Rutgers University. Spring CS Paul Krzyzanowski Internet Technolog 08. Routing Paul Kranoski Rutgers Universit Spring 06 March, 06 CS 0-06 Paul Kranoski Routing algorithm goal st hop router = source router last hop router = destination router router

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Geographic and Diversity Routing in Mesh Networks

Geographic and Diversity Routing in Mesh Networks Geographic and Diversity Routing in Mesh Networks COS 463: Wireless Networks Lecture 7 Kyle Jamieson [Parts adapted from B. Karp, S. Biswas, S. Katti] Course Contents 1. Wireless From the Transport Layer

More information

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics Learning Switches. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics Learning Sitches based on Chapter 4 of CompTIA Netork+ Eam Guide, 4 th ed., Mike Meers Sitch Forarding A sitch forards frames based on destination MAC address Ho does the sitch kno hich

More information

GPSR: Greedy Perimeter Stateless Routing for Wireless Networks

GPSR: Greedy Perimeter Stateless Routing for Wireless Networks GPSR: Greedy Perimeter Stateless Routing for Wireless Networks Brad Karp Harvard University / ACIRI karp@eecs.harvard.edu H. T. Kung Harvard University htk@eecs.harvard.edu ABSTRACT We present Greedy Perimeter

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to. Netork Layer (part ) y the end of this lecture, you should be able to. xplain the operation of distance vector routing algorithm xplain shortest path routing algorithm escribe the major points of RIP and

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Introdction (forarding and roting) Reie of qeeing theor Roting algorithms Link state, Distance Vector Roter design and operation IP: Internet Protocol IP4 (datagram format, addressing, ICMP,

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

(General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks

(General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks ijesm www.ijesm.com International Journal of Engineering, Science and Metallurgy (General article) Position Based Routing Technique: Greedy Perimeter Stateless Routing for Wireless Networks Niyati Bansal

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 14 1 Two notes on routing algorithm Do not believe ou can understand an routing protocol, e.g.,

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

4.5 Routing Algorithms

4.5 Routing Algorithms 4.5 ROUTING ALGORITHMS 363 to hosts enjo the securit services provided b IPsec. On the sending side, the transport laer passes a segment to IPsec. IPsec then encrpts the segment, appends additional securit

More information

Chapter 4: Network Layer

Chapter 4: Network Layer Chapter 4: Network Laer 4. Introduction 4. Virtual circuit and datagram networks 4. What s inside a router 4.4 IP: Internet Protocol Datagram format IPv4 addressing ICMP IPv6 4. Routing algorithms Link

More information

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes.

Announcements. CS 5565 Network Architecture and Protocols. Count-To-Infinity. Poisoned Reverse. Distance Vector: Link Cost Changes. Announcements CS 6 Network Architecture and Protocols Lecture 20 Project 2B Part/ due Wed Apr 27 :9pm Part/2 due Wed Ma :9pm Current reading assignment: Chapter.6.7, Chapter Final Ma 0, 3:2pm, MCB 26 Godmar

More information

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic? Routing 9: Intro to Routing lgorithms Last Modified: // :: PM : Netork Layer a- IP Routing each router is supposed to send each IP datagram one step closer to its Ho do they do that? Static Routing Hierarchical

More information

Interplay between routing, forwarding

Interplay between routing, forwarding Chapter 4: outline 4. introduction 4. virtual circuit and datagram networks 4. what s inside a router 4.4 IP: Internet Protocol datagram format IPv4 addressing ICMP IPv6 4.5 routing algorithms link state

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Network Layer: Routing

Network Layer: Routing Network Laer: Routing Instructor: Anirban Mahanti Office: ICT 74 Email: mahanti@cpsc.ucalgar.ca Class Location: ICT Lectures: MWF :00 :0 hours Notes derived Computer Networking: A Top Down Approach Featuring

More information

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions:

11/13/2017 Network Layer (SSL) Network-layer functions. Recall the two network-layer functions: Chapter 5: outline 5. introduction 5.2 routing protocols link state distance vector 5.3 intra-as routing in the Internet 5.4 inter-as routing: BGP 5.5 The SDN control 5.6 ICMP: The Internet Control Message

More information

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5

Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Wireless and Mobile Networks Reading: Sections 2.8 and 4.2.5 Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer Rexford at Princeton University. When slides are obtained

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

An Energy Efficient Location Service for Mobile Ad Hoc etworks

An Energy Efficient Location Service for Mobile Ad Hoc etworks An Energ Efficient Location Service for Mobile Ad Hoc etworks Zijian Wang, Euphan Bulut and Boleslaw K. Szmanski, Department of Computer Science, Rensselaer Poltechnic Institute, Tro, NY 280 USA {wangz,

More information

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West

More information

Network Layer: Control Plane 5-2

Network Layer: Control Plane 5-2 Network Laer: Control Plane EECS34 8-03-05 4- Chapter 5: network laer control plane chapter goals: understand principles behind network control plane traditional routing algorithms SDN controlllers Internet

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Introduction to Fieldbus and DeviceNetworks

Introduction to Fieldbus and DeviceNetworks Fieldbus and Device Netorks This tutorial on Fieldbus and Device Netorks is broken don into the folloing sections: Introduction to Fieldbus and DeviceNetorks A brief overvie of Profibus Introduction to

More information

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 1 Nokia Research Center, Palo Alto 2 Computer and Information Science and Engineering Department, University of Florida, Gainesville

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...

More information

Probabilistic Geographic Routing Protocol for Ad Hoc and Sensor Networks

Probabilistic Geographic Routing Protocol for Ad Hoc and Sensor Networks Geographic Routing Protocol for Ad Hoc and Sensor Networks Tana Roosta Department of EECS UC Berkele roosta@eecs.berkele.edu Mike Menzo Department of EECS UC Berkele mpm@eecs.berkele.edu Professor Shankar

More information

Internet Indirection Infrastructure

Internet Indirection Infrastructure Ke Observation Internet Indirection Infrastructure Virtuall all previous proposals use indirection, e.g., Phsical indirection point mobile IP Logical indirection point IP multicast Ion Stoica UC Berkele

More information

Module 8. Routing. Version 2 ECE, IIT Kharagpur

Module 8. Routing. Version 2 ECE, IIT Kharagpur Module 8 Routing Lesson 27 Routing II Objective To explain the concept of same popular routing protocols. 8.2.1 Routing Information Protocol (RIP) This protocol is used inside our autonomous system and

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

The CMU Monarch Project s Wireless and Mobility Extensions to ns

The CMU Monarch Project s Wireless and Mobility Extensions to ns The CMU Monarch Project s Wireless and Mobility Extensions to ns David B. Johnson Josh Broch Yih-Chun Hu Jorjeta Jetcheva David A. Maltz The Monarch Project Carnegie Mellon University http://www.monarch.cs.cmu.edu/

More information

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti

Data Communication & Networks G Session 5 - Main Theme Wireless Networks. Dr. Jean-Claude Franchitti Data Communication & Networks G22.2262-001 Session 5 - Main Theme Wireless Networks Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences

More information

Initialization: Loop until all nodes in N

Initialization: Loop until all nodes in N Routing Routing lgorithm classification Routing protocol Goal: determine good path (sequence of routers) thru netork from source to dest. Graph abstraction for routing s: graph nodes are routers graph

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions

Chapter 4: Network Layer. TDTS06 Computer networks. Chapter 4: Network Layer. Network layer. Two Key Network-Layer Functions Chapter : Netork Laer TDTS06 Compter s Lectre : Netork laer II Roting algorithms Jose M. Peña, jospe@ida.li.se ID/DIT, LiU 009-09- Chapter goals: nderstand principles behind laer serices: laer serice models

More information

ICS 351: Today's plan. OSPF BGP Routing in general

ICS 351: Today's plan. OSPF BGP Routing in general ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an

More information

An Analysis of Interference as a Source for Diffraction

An Analysis of Interference as a Source for Diffraction J. Electromagnetic Analysis & Applications, 00,, 60-606 doi:0.436/jemaa.00.0079 Published Online October 00 (http://.scirp.org/journal/jemaa) 60 An Analysis of Interference as a Source for Diffraction

More information

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction

Network layer. Two Key Network-Layer Functions. Datagram Forwarding table. IP datagram format. IP Addressing: introduction Netork laer transport segment sending to receiing host on sending side encapslates segments into grams on rcing side, deliers segments to transport laer laer protocols in eer host, roter roter eamines

More information

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5 ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom

More information

ECE 158A: Lecture 5. Fall 2015

ECE 158A: Lecture 5. Fall 2015 8: Lecture Fall 0 Routing ()! Location-ased ddressing Recall from Lecture that routers maintain routing tables to forward packets based on their IP addresses To allow scalability, IP addresses are assigned

More information

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and

More information

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley.

Intra-AS Routing. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley. Intra-AS Routing Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesle http://xkcd.com/85/ Some materials copright 1996-2012 J.F Kurose and K.W. Ross, All Rights Reserved

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Routing. Advanced Computer Networks: Routing 1

Routing. Advanced Computer Networks: Routing 1 Routing Advanced Computer Networks: Routing 1 Gateway To internet or wide area network Metropolitan Area Network (MAN) s s Organization Servers Backbone R S R R Departmental Server s R S R s S R s s s

More information

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture

Network Routing. Packet Routing, Routing Algorithms, Routers, Router Architecture Network Routing Packet Routing, Routing Algorithms, Routers, Router Architecture Routing Routing protocol Goal: determine good path (sequence of routers) thru network from source to dest. Graph abstraction

More information

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF

ICS 351: Today's plan. distance-vector routing game link-state routing OSPF ICS 351: Today's plan distance-vector routing game link-state routing OSPF distance-vector routing game 1. prepare a list of all neighbors and the links to them, and the metric for each link 2. create

More information

CSc 450/550 Computer Networks Internet Routing

CSc 450/550 Computer Networks Internet Routing CSc 450/550 Computer Networks Internet Routing Jianping Pan Summer 2007 7/12/07 CSc 450/550 1 Review Internet Protocol (IP) IP header addressing class-based, classless, hierarchical, NAT routing algorithms

More information

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain

More information

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos Geographic Routing Without Location Information AP, Sylvia, Ion, Scott and Christos Routing in Wireless Networks Distance vector DSDV On-demand DSR, TORA, AODV Discovers and caches routes on demand Geographic

More information

Basic Idea. Routing. Example. Routing by the Network

Basic Idea. Routing. Example. Routing by the Network Basic Idea Routing Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Computer Networks. Instructor: Niklas Carlsson

Computer Networks. Instructor: Niklas Carlsson Computer Networks Instructor: Niklas Carlsson Email: niklas.carlsson@liu.se Notes derived Computer Networking: A Top Down Approach, b Jim Kurose and Keith Ross, Addison-Wesle. The slides are adapted and

More information

CS118 Discussion Week 7. Taqi

CS118 Discussion Week 7. Taqi CS118 Discussion Week 7 Taqi Outline Hints for project 2 Lecture review: routing About Course Project 2 Please implement byte-stream reliable data transfer Cwnd is in unit of bytes, not packets How to

More information

Routing by the Network

Routing by the Network Routing Basic Idea Routing table at each router/gateway When IP packet comes, destination address checked with routing table to find next hop address Questions: Route by host or by network? Routing table:

More information

CS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy

CS555, Spring /5/2005. April 12, 2005 No classes attend Senior Design Projects conference. Chapter 4 roadmap. Internet AS Hierarchy CS555, Spring 2005 April 12, 2005 No classes attend Senior Design Projects conference Network Layer 4-1 Chapter 4 roadmap 4.1 Introduction and Network Service Models 4.2 VC and Datagram Networks 4.3 What

More information

Vehicle Networks. Networking Layer: Routing. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

Vehicle Networks. Networking Layer: Routing. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl Vehicle Networks Networking Layer: Routing Univ.-Prof. r. Thomas Strang, ipl.-inform. Matthias Röckl Outline Introduction Lecture Vehicle Networks, Thomas Strang and Matthias Röckl, WS 008/009 Classical

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning By: Eunjoon Cho and Kevin Wong Abstract In this paper we present an algorithm for a location based adaptive

More information

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet

More information

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791 CS 457 Networking and the Internet Fall 2016 Indrajit Ray What is Routing A famous quotation from RFC 791 A name indicates what we seek An address indicates where it is A route indicates how we get there

More information

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks

Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Networks 1 Localized Construction of Bounded Degree and Planar Spanner for Wireless Ad Hoc Netorks Yu Wang Xiang-Yang Li Department of Computer Science, University of North Carolina at Charlotte, 9201 University

More information

Lecture 4. The Network Layer (cont d)

Lecture 4. The Network Layer (cont d) Lecture 4 The Network Layer (cont d) Agenda Routing Tables Unicast and Multicast Routing Protocols Routing Algorithms Link State and Distance Vector Routing Information and Open Shortest Path First Protocols

More information

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control

Motivation and Basics Flat networks Hierarchy by dominating sets Hierarchy by clustering Adaptive node activity. Topology Control Topology Control Andreas Wolf (0325330) 17.01.2007 1 Motivation and Basics 2 Flat networks 3 Hierarchy by dominating sets 4 Hierarchy by clustering 5 Adaptive node activity Options for topology control

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Industrial Data Communications - Fundamentals

Industrial Data Communications - Fundamentals Industrial Data Communications - Fundamentals Tutorial 1 This tutorial on the fundamentals of communications is broken don into the folloing sections: Communication Modes Synchronous versus Asynchronous

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords: Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Chapter 5: Network Layer Control Plane. understand principles behind network control plane : traditional routing algorithms

Chapter 5: Network Layer Control Plane. understand principles behind network control plane : traditional routing algorithms Introduction to Computer Networking Gu Leduc Chapter 5 Network Laer: The Control Plane Computer Networking: A Top Down Approach, 7 th edition. Jim Kurose, Keith Ross Addison-Wesle, April 06. From Computer

More information

Wireless Internet Routing. Learning from Deployments Link Metrics

Wireless Internet Routing. Learning from Deployments Link Metrics Wireless Internet Routing Learning from Deployments Link Metrics 1 Learning From Deployments Early worked focused traditional routing issues o Control plane: topology management, neighbor discovery o Data

More information

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011

Lecture 4: Intradomain Routing. CS 598: Advanced Internetworking Matthew Caesar February 1, 2011 Lecture 4: Intradomain Routing CS 598: Advanced Internetworking Matthew Caesar February 1, 011 1 Robert. How can routers find paths? Robert s local DNS server 10.1.8.7 A 10.1.0.0/16 10.1.0.1 Routing Table

More information

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University

BGP. Daniel Zappala. CS 460 Computer Networking Brigham Young University Daniel Zappala CS 460 Computer Networking Brigham Young University 2/20 Scaling Routing for the Internet scale 200 million destinations - can t store all destinations or all prefixes in routing tables

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

BGR: Blind Geographic Routing for Sensor Networks

BGR: Blind Geographic Routing for Sensor Networks BGR: Blind Geographic Routing for Sensor Networks Matthias Witt 1 and Volker Turau 1 1 Department of Telematics, Hamburg University of Technology, Hamburg, Germany {matthias.witt,turau}@tuhh.de Abstract

More information

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP)

Important Lessons From Last Lecture Computer Networking. Outline. Routing Review. Routing hierarchy. Internet structure. External BGP (E-BGP) Important Lessons From Last Lecture 15-441 Computer Networking Inter-Domain outing BGP (Border Gateway Protocol) Every router needs to be able to forward towards any destination Forwarding table must be

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

What is an Ad Hoc Network?

What is an Ad Hoc Network? Introduction Part 1 CS-6777 Mobile Ad Hoc Networking Memorial University of Newfoundland What is an Ad Hoc Network?! A mobile ad hoc network (MANET) is Communication network Wireless signaling Multi-hop

More information

Chapter 4: Network Layer: Part II

Chapter 4: Network Layer: Part II 4: Network Laer Chapter 4: Network Laer: Part II (last revision 9/04/05. v3) 4. Introduction 4. Virtual circuit and datagram networks 4.3 What s inside a router 4.4 IP: Internet Protocol Datagram format

More information

Mobile Ad-hoc Networks

Mobile Ad-hoc Networks Mobile Ad-hoc Networks Fred Baker 1 The manet problem Mobile Random and perhaps constantly changing Ad-hoc Not engineered Networks Elastic data applications which use networks to communicate 2 Examples

More information

Localization and dynamic link detection for geographic routing in non-line-of-sight (NLOS) environments

Localization and dynamic link detection for geographic routing in non-line-of-sight (NLOS) environments RESEARCH Open Access Localization and dynamic link detection for geographic routing in non-line-of-sight (NLOS) environments Youngbae Kong 1, Younggoo Kon 1*, Jongho Shin 1 and Gitae Park 2 Abstract IEEE

More information

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding

More information

Routing, Routers, Switching Fabrics

Routing, Routers, Switching Fabrics Routing, Routers, Switching Fabrics Outline Link state routing Link weights Router Design / Switching Fabrics CS 640 1 Link State Routing Summary One of the oldest algorithm for routing Finds SP by developing

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information