Nomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:
|
|
- Roderick O’Brien’
- 5 years ago
- Views:
Transcription
1 Nomadic ommunications Wireless Mesh Networks Renato Lo igno - Tel: 2026 Home Page: opyright Quest operaèprotettadallalicenza: reative ommons ttribuzione-non commerciale-nonopere derivate 2.5 Italia License Per i dettagli, consultare locigno@disi.unitn.it 2 d-hoc and WMN d-hoc network non permanent general purpose or specific (sensors) single or multi-hop, normally mobile may require routing (see OV and OLR) Wireless Mesh Networks (WMN) more structured than d-hoc may be hierarchical semi-permanent, some nodes are fixed requires routing locigno@disi.unitn.it 3
2 WMN: a general view locigno@disi.unitn.it 4 Mesh d-hoc network d-hoc can be meshed non single broadcast channel multi-hop require routing locigno@disi.unitn.it 5 Mesh: asic scenarios () xtended WLN access imple configuration no routing imple 802. handover support ouble radio guarantees good performance ingle radio creates resource conflicts 3 on the same channel suitable for low-cost low-performance locigno@disi.unitn.it 6 2
3 Mesh: asic scenarios (2) W is broadcast (GW) can be a bottleneck xtended WLN access Routing required imple 802. handover support ouble radio guarantees good performance ingle radio creates serious resource conflicts n+ on the same channel locigno@disi.unitn.it 7 Mesh: asic scenarios (3) locigno@disi.unitn.it 8 Mesh: asic scenarios (3) xtended WLN access asic infrastructuring ingle radio operation very difficult Multiple external gateways sophisticated, flow-based routing Non standard handover support flow based routing requires exporting the context address management require coordination W may be multi-hop How many channels? Point-to-point and broadcast channels in W locigno@disi.unitn.it 9 3
4 Mesh: asic scenarios (3) ddress management (HP) is a problem Flow-based routing may be impossible Joining/splitting of partitions is an open issue locigno@disi.unitn.it 0 Moving between belonging to different Mesh/W Mesh d-hoc: OV d-hoc On-demand istance Vector routing rfc356 V (see RIP) protocol for next-hop based routing On-emand: maintains routes only for nodes that are communicating Must build routes when requested Route Request (RRQ) are flooded through the network Nodes set-up reverse path pointers to the source OV assumes symmetric links locigno@disi.unitn.it Mesh d-hoc: OV The intended receiver sends back a Route Reply (RR) RR follow the reverse path set-up by intermediate nodes (unicast) establishing a shortest path route memorized by intermediate nodes Paths expire if not used protocol & transmission overhead guarantee of stability in dynamic, non reliable networks Usual V problems count to infinity, slow convergence,... in a dynamic environment may be too much throughput going to zero locigno@disi.unitn.it 2 4
5 OV Loop Freedom estination sequence numbers to order routing events in time Ordering among <seqno, hop count> tuples at different nodes on a path higher seqno has precedence if same seqno, lower hop count has precedence The final selection will be the shortest path (w.r.t. some metric, not necessarily hop-count) locigno@disi.unitn.it 3 Mesh d-hoc: OV Next-hop based (other proposals are based on source routing) Flat protocol: all nodes are equal an manage only one route per s-d pair can be inefficient in presence of highly variable link quality and persistence Good for sporadic communications ad for high mobility slow convergence difficulty in understanding topology changes. locigno@disi.unitn.it 4 Mesh d-hoc: OMV d-hoc On-demand Multipath istance Vector Routing in d Hoc Networks n extension to OV OMV computes multiple loop-free and link-disjoint paths Using dvertised Hop-count guarantees Loop-freedom variable, which is defined as the maximum hop count for all the paths. node only accepts an alternate path to the destination if it has a lower hop count than the advertised hop count for that destination Link-disjointness of multiple paths is achieved by using a particular property of flooding Performance comparison of OMV with OV shows that OMV improves the end-to-end delay, often more than a factor of two OMV reduces routing overheads by about 20% locigno@disi.unitn.it 5 5
6 asic OV Route iscovery RRQ (broadcast) When a route is needed, source floods a route request for the destination. locigno@disi.unitn.it 6 asic OV Route iscovery RRQ (broadcast) Reverse Path Reverse path is formed when a node hears a non-duplicate route request. ach node forwards the request at most once (pure flooding). locigno@disi.unitn.it 7 asic OV Route iscovery RRQ (broadcast) Reverse Path Reverse path is formed when a node hears a non-duplicate route request. ach node forwards the request at most once (pure flooding). locigno@disi.unitn.it 8 6
7 asic OV Route iscovery Reverse Path Observation: uplicate RRQ copies completely ignored. Therefore, potentially useful alternate reverse path info lost. 9 Use of duplicate RRQ: the wrong way Reverse Path Form reverse paths using all duplicate RRQ copies causes routing loops alternate loop-free reverse paths are build in OMV using some selected duplicate RRQ copies? 20 Loop Freedom Impose ordering among nodes in every path. Notion of upstream/downstream nodes Never form a route at a downstream node via an upstream node Prune portions of paths that are longer urviving s-d path will be disjoint and loop-free i j d locigno@disi.unitn.it 2 7
8 OMV Loop Freedom equence number rule: Keep only routes for the highest dest seqno (like in OV). For the same dest seqno, Route advertisement rule: Keep multiple routes but always advertise only one of them to others. Hop count of that path is the advertised hop count Which one? Longest path at the time of first advertisement Why? Maximize chances of forming more paths Route acceptance rule: ccept a route from a neighbor only if it has a smaller or equal advertised hop count. reak ties using node ids. No need for coordination with upstream nodes locigno@disi.unitn.it 22 OMV Routing Table ntry est eqno dvertised hop count Hop count Next hop Hop count 2 Next hop 2 locigno@disi.unitn.it 23 Multiple Loop-free Reverse Paths RRQ (broadcast) 0 uppose RRQ from includes highest seqno for itself. locigno@disi.unitn.it 24 8
9 Multiple Loop-free Reverse Paths RRQ (broadcast) Reverse Path 0 locigno@disi.unitn.it 25 Multiple Loop-free Reverse Paths 2 RRQ (broadcast) Reverse Path 0 2 locigno@disi.unitn.it 26 Multiple Loop-free Reverse Paths 2 Reverse Path 0 2 locigno@disi.unitn.it 27 9
10 Multiple Loop-free Forward Paths 2 Forward Path 0 2 nother modification to basic OV route discovery: multiple replies from destination. locigno@disi.unitn.it 28 How Many Paths? Too many paths are not useful Overhead proportional to # paths. iminishing utility with larger # paths. nalytical study in olution: isjoint paths utomatically fewer paths Paths fail independently, more robust Node or link disjoint? Too few node disjoint paths in dense networks using flooding link disjoint locigno@disi.unitn.it 29 Finding Link-disjoint Paths How? xamples Maintain last hop info in routing table nsure that next hops and last hops before destination are unique dest seq. next last hop no hop hop count N L N2 L2 This requires route request and replies to carry first hop info locigno@disi.unitn.it 30 0
11 Mesh d-hoc: OLR Optimized Link-tate Routing Protocol (rfc3626) Proactive, link-state routing protocol ased on the notion of MultiPoint Relay (MPR) Three main components: Neighbor ensing mechanism MPR Flooding mechanism topology iscovery (diffusion) mechanism. uxilary features of OLR: network association - connecting OLR to other networks locigno@disi.unitn.it 3 Mesh d-hoc: OLR asic neighbor sensing: periodic exchange of HLLO messages; HLLO messages list neighbors + "neighbor quality HR - link may be asymmetric YM - link is confirmed to be symmetric MPR - link is confirmed to be symmetric N neighbor selected as MPR Providing: topology information up to two hops MPR selector information notification locigno@disi.unitn.it 32 Mesh d-hoc: OLR ach node selects from among its neighbors an MPR set such that an emitted flooding message, relayed by the MPR nodes, can be received by all nodes in the 2-hop neighborhood Goals: reduce flooding overhead (select minimal sets) provide optimal flooding distances locigno@disi.unitn.it 33
12 Mesh d-hoc: OLR xchanges topology information with other nodes of the network regularly MPRs announce their status periodically in control messages In route calculation, the MPRs are used to form the route from a given node to any destination in the network Uses MPRs to facilitate efficient flooding of control messages The presence of a 2-tiear topology (MPRs are sort of supernodes) makes it complex and prone to failures locigno@disi.unitn.it 34 MPR selection algorithm ach point u has to select its set of MPR. Goal : select in the -neighborhood of u N(u) a set of nodes as small as possible which covers the whole 2-neighborhood of u N2(u) one in two steps: tep : elect nodes of N(u) which cover stub nodes of N2(u) stub nodes are those that are connected to one N(u) node only tep 2: elect among the nodes of N(u) not selected at the first step, the node which covers the highest number of nodes in N2(u) not yet connected locigno@disi.unitn.it 35 Repeat tep 2 until all N2(u) is reached MPR selection step stub node u elect nodes (light blue) in N(u) which cover stub nodes of N2(u) locigno@disi.unitn.it 36 2
13 MPR selection step 2 u elect the node in N(u) which cover the largest number of non-stub nodes in N2(u) locigno@disi.unitn.it 37 TMN etter pproach To Mesh d-hoc Networking V protocol using Link Qualities ased on periodic roadcast of Originator Messages OGM Link Quality metric is the number of received OGMs Path Metric is the product of link metric roadcast is always at minimum PHY rate... difficult to distinguish high speed paths OGM have TTL fields to avoid too long paths TTL must be tailored to the MH dimension locigno@disi.unitn.it 38 TMN TMN is a level 2.5 routing solution Uses M addresses to identify stations, avoiding the problem of changing IP addresses to deliver frames Not pure layer 2 since it runs in the kernel and is not integrated in NI cards or drivers Relies on Layer 2 info, like link quality end UP packets and not Layer 2 frames for routing purposes TMN does not have handover enhancement support low convergence makes connection fail We are proposing one (already in the distribution) with a colleague of yours from last year locigno@disi.unitn.it 39 3
14 TMN F G X wants to reach X locigno@disi.unitn.it 40 TMN :0 F :9 G X Nodes broadcast originator messages (OGM's) every second OGM's are rebroadcast Other nodes measure how many OGM's are received in a fixed time window locigno@disi.unitn.it 4 TMN F :8 :7 G X :7 TMN routing table Final routing table TO VI Q TO VI 8 7 locigno@disi.unitn.it 42 4
15 TMN :0 F :4 :6 :7 G X G TMN routing table G Final routing table TO VI Q TO VI 6 7 locigno@disi.unitn.it 43 TMN F X TMN routing table G :5 X :6 X Final routing table TO VI Q TO VI G 5 6 locigno@disi.unitn.it 44 TMN F X TMN routing table TMN routing table TO VI Q 9 G TMN routing table TO VI Q 7 4 TO VI Q G 5 6 X locigno@disi.unitn.it 45 5
16 urrent GW selection techniques GW2 Minimum hop count to gateways F G X Used by routing protocols like OV reates single over congested gateways GW locigno@disi.unitn.it 46 urrent GW selection techniques GW2 est link quality to GW F G 2 X Used by source routing protocols like MIT rcr Link state protocols like OLR Prevents congested links to GW Not global optimum of GW W usage GW locigno@disi.unitn.it 47 urrent GW selection techniques 3 Mbps GW F 4 G kbps GW 7 TMN has advanced a little further GW can advertise downlink speed User can choose GW selection based on GW with best W table GW (need history) X GW W x LQ an't trust advertised GW W oesn't achieve fairness locigno@disi.unitn.it 48 6
17 L xperimental RF 626 Found in many Linux releases V based on IP addresses problems with handovers and mobility Loop free, based on ideas similar to TMN, OV, V (estination equenced istance Vector) estination equenced locigno@disi.unitn.it 49 V Protocol Keep the simplicity of istance Vector Guarantee Loop Freeness New Table ntry for estination equence Number llow fast reaction to topology changes Make immediate route advertisement on significant changes in routing table but wait with advertising of unstable routes (damping fluctuations) locigno@disi.unitn.it 50 V (Table ntries) estination Next Metric eq. Nr Install Time table ata Ptr_ Ptr_ Ptr_ Ptr_ equence number originated from destination. nsures loop freeness. Install Time when entry was made (used to delete stale entries from table) table ata Pointer to a table holding information on how stable a route is. Used to damp fluctuations in network. locigno@disi.unitn.it 5 7
18 V (Route election) Update information is compared to own routing table. elect route with higher destination sequence number (This ensure to use always newest information from destination) 2. elect the route with better metric when sequence numbers are equal 52 V (Respond to Topology hanges) Immediate advertisements Information on new Routes, broken Links, metric change is immediately propagated to neighbors. Full/Incremental Update: Full Update: end all routing information from own table. Incremental Update: end only entries that has changed. (Make it fit into one single packet) locigno@disi.unitn.it 53 Fluctuations P Hops Q 0 Hops What are Fluctuations ntry for in : [, Q, 4, -00] makes roadcast with eq. Nr. -02 receives Update from P (, 5, -02) -> ntry for in : [, P, 5, -02] must propagate this route immediately. receives Update from Q (, 4, -02) -> ntry for in : [, Q, 4, -02] must propagate this route immediately. (,0,-02) This can happen every time or any other node does its broadcast and lead to unnecessary route advertisements in the network, so called fluctuations locigno@disi.unitn.it 54 8
19 amping Fluctuations P Hops Q 0 Hops How to damp fluctuations Record last and avg. ettling Time of every Route in a separate table. (table ata) eleting Time = Time between arrival of first route and the best route with a given seq. nr. still must update his routing table on the first arrival of a route with a newer seq. nr., but he can wait to advertising it. Time to wait is proposed to be 2*(avg. ettling Time). locigno@disi.unitn.it 55 Mesh Networks: 802.s Working group to deliver a standard for 802. (& around) base Mesh Networks There are drafts and early releases, but not yet a definitely released standard (as of 200) Tries to define a framework to support a Mesh network as a standard extended WLN with routing that goes beyond the standard minimum spanning tree of 802. interconnection locigno@disi.unitn.it 56 evice lasses in 802.s Mesh Point (MP) a point able to relay messages Mesh P (MP) a MP able to provide services to Ts Mesh Portal (MPP) a MP connected to a wired LN normally called a gateway and assumed to access the internet locigno@disi.unitn.it 57 9
20 Routing in 802.s Hybrid Wireless Mesh Protocol (HWMP) - Mandatory OV derived link-state protocol ased on trees for proaction and efficiency dd on-demand features (like OV) Radio ware OLR (R-OLR) Optional Radio aware metrics added to MPRs in OLR optional fish-eye routing capabilities association and discovery protocols for topology discovery and buildup locigno@disi.unitn.it 58 Routing in 802.s TMN probably supported Features for multi-gateway management upport for Vehicular networks, where some specialized features are needed Use only M addresses for routing Run directly in the diverse/ni cards Integration with the other 802. protocols... which is the real strength! locigno@disi.unitn.it 59 20
Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7
d hoc On-demand istance Vector Routing (OV) [Perkins99] 6811 : Lecture 7 d Hoc On-emand istance Vector Routing (OV) R includes source routes in packet headers G ata. Header Large headers can sometimes
More informationThe Basics of Wireless Communication Octav Chipara
The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2
More informationMobile Communications. Ad-hoc and Mesh Networks
Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between
More informationDynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5
ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationDSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016
estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra
More informationAd Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols
d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationRouting In Ad Hoc Networks
Routing n d oc Networks ontents 1. ntroduction to ad-hoc networks 2. Proactive routing protocols OLR 3. Reactive routing protocols R, OV 4. Non-uniform routing protocols ZRP, R 5. Other approaches eographical
More informationDynamic Source Routing (DSR) [Johnson96]
ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom
More information4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.
18759 Wireless Networks (2012-pring) urvey Routing Protocols for d Hoc Networks Jiun-RenLin and Yi-hun hou lectrical and omputer ngineering arnegie Mellon University Outline d-hoc networks Unicast d-hoc
More informationIP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing
IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet
More informationAODV Route Requests (RREQ) are forwarded in a manner similar to DSR
d oc On-emand istance Vector (OV) R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts
More informationIEEE s ESS Mesh Networking
IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationDestination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6
estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the
More information2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept
//8 Outline - omputer Networking Lecture Routing Link tate OP Peter teenkiste epartments of omputer cience and Electrical and omputer Engineering IP Multicast ervice asics - Networking, pring 8 http://www.cs.cmu.edu/~dga/-/8
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationCS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector
More informationIP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing
IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure
More informationComparison of proposed path selection protocols for IEEE s WLAN mesh networks
Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationAODV Multipath Extension using Source Route Lists with Optimized Route Establishment
INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,
More informationRouting, Routing Algorithms & Protocols
Routing, Routing Algorithms & Protocols Computer Networks Lecture 6 http://goo.gl/pze5o8 Circuit-Switched and Packet-Switched WANs 2 Circuit-Switched Networks Older (evolved from telephone networks), a
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationAODV- An Efficient MANET Routing Protocol
International Journal of urrent Engineering and Technology E-IN 2277 4106, P-IN 2347-5161 2014 INPREO, ll Rights Reserved vailable at http://inpressco.com/category/ijcet Research rticle OV- n Efficient
More informationAdvanced Computer Networks
istance Vector dvanced omputer Networks Internal routing - distance vector protocols Prof. ndrzej uda duda@imag.fr ontents Principles of internal routing istance vector (ellman-ford) principles case of
More informationThird Generation Routers
IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry
More informationOutline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand
More informationThe Problem: Finding Paths Spring 2011 Lecture #19. Forwarding. Shortest Path Routing
The Problem: Finding Paths 1 6.02 Spring 20 Lecture # addressing, forwarding, routing liveness, advertisements, integration distance-vector routing routing loops, counting to infinity 6.02 Spring 20 Lecture,
More informationUnicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks
Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on
More informationWireless Mesh Networks
Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More information4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing
//1 The Problem: istributed Methods for Finding Paths in Networks L 1.0 Spring 01 Lecture #0 addressing, forwarding, routing liveness, advertisements, integration distance-vector routing link-state routing
More informationCourse Routing Classification Properties Routing Protocols 1/39
Course 8 3. Routing Classification Properties Routing Protocols 1/39 Routing Algorithms Types Static versus dynamic Single-path versus multipath Flat versus hierarchical Host-intelligent versus router-intelligent
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationOctober Copyright (C) The Internet Society (2003). All Rights Reserved.
Network Working Group Request for Comments: 3626 Category: Experimental T. Clausen, Ed. P. Jacquet, Ed. Project Hipercom, INRIA October 2003 Status of this Memo Optimized Link State Routing Protocol (OLSR)
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationRouting in Ad-hoc Networks
0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in
More informationUnicast Routing in Mobile Ad Hoc Networks
Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain
More informationA primer on modern LANs
Advanced Networks http://disi.unitn.it/locigno/index.php/teaching-duties/ A primer on modern LANs Renato Lo Cigno Copyright Quest opera è prote1a dalla licenza: Crea&ve Commons A-ribuzione- Non commerciale-
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationThe Spanning Tree Protocol
The Spanning Tree Protocol Guangyu Dong, Jorg Liebeherr, MNG Group Wednesday, March 30, 2005 This is a draft and not a final version. 2005-8. All rights reserved. All material is copyrighted by the authors.
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationPage 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols
173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state
More informationPage 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols
173/S152, Winter 2006 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV Hybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationITEC310 Computer Networks II
ITEC310 Computer Networks II Chapter 22 Network Layer:, and Routing Department of Information Technology Eastern Mediterranean University Objectives 2/131 After completing this chapter you should be able
More informationKapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types
Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationRouters & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives
Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain
More information15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks
15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable
More informationCLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing
Volume 5, Issue 5, MAY 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Survey on Unicast
More informationAd Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Mobile Communication Networks (RCSE) Winter Semester 2012/13 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) Routing
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN
International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationICMP, ARP, RARP, IGMP
Internet Layer Lehrstuhl für Informatik 4 Raw division into three tasks: Data transfer over a global network Route decision at the sub-nodes Control of the network or transmission status Routing Protocols
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationChapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu
Chapter 7 Routing Protocols for Ad Hoc Wireless Networks Jang-Ping Sheu Introduction Routing protocols used in wired networks cannot be directly applied to ad hoc wireless networks Highly dynamic topology
More information5.2 Routing Algorithms
CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5. Routing Algorithms Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud
More informationA Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms
A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationAd Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology
Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario
More informationRouting Basics. What is Routing? Routing Components. Path Determination CHAPTER
CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role
More informationSimulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:
Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationDistance vector and RIP
DD2490 p4 2008 Distance vector and RIP Olof Hagsand KTHNOC/NADA Literature RIP lab RFC 245: RIPv2. Sections 1 2 contains some introduction that can be useful to understand the context in which RIP is specified..1.4
More informationPage 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)
173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationUnit 3: Dynamic Routing
Unit 3: Dynamic Routing Basic Routing The term routing refers to taking a packet from one device and sending it through the network to another device on a different network. Routers don t really care about
More informationÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)
ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor
More informationChapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1
Chapter 22 Network Layer: Delivery, Forwarding, and Routing 22.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 22-3 UNICAST ROUTING PROTOCOLS 22.2 A routing
More informationTop-Down Network Design
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic
More informationNotes on implementing a IEEE s Mesh Point
Fourth EuroFGI Workshop on Wireless and Mobility Notes on implementing a IEEE 802.11s Mesh Point R. G. Garroppo, S. Giordano, D. Iacono, L. Tavanti Telecommunication Networks Research Group Dip. Ingegneria
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationCS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016
9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationWhat is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats
What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern
More informationStudy and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs
Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate
More informationRouting on the Internet. Routing on the Internet. Hierarchical Routing. Computer Networks. Lecture 17: Inter-domain Routing and BGP
Routing on the Internet Computer Networks Lecture 17: Inter-domain Routing and BGP In the beginning there was the ARPANET: route using GGP (Gateway-to-Gateway Protocol), a distance vector routing protocol
More informationDynamic Routing. Lecturer: Carlos Rey-Moreno Networking Course Honors on Computer Science University of the Western Cape
Dynamic Routing Lecturer: Carlos Rey-Moreno carlos.reymoreno@gmail.com Networking Course Honors on Computer Science University of the Western Cape 18 Feb - 2013 Static vs Dynamic Routing Static Routing
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationBridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges
ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number
More informationImproving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness Xin Yu Department of Computer Science Courant Institute of Mathematical Sciences New York University,
More informationCS551 Ad-hoc Routing
CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor
More informationTable of Contents 1 PIM Configuration 1-1
Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM
More informationLecture (08, 09) Routing in Switched Networks
Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.
More informationPerformance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS
Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS Sowjanya Kumari Nalam¹, P.V.Venkateswara Rao ²,SrinadhSagiraju³ ¹M.Tech Student, CSE Department, Raghu Engineering
More informationConfiguring a Rendezvous Point
Version History Version Number Date Notes 1 03/15/2002 This document was created. The purpose of this document is to outline four recommended methods for configuring a rendezvous point (RP) in a Protocol
More informationICS 351: Today's plan. distance-vector routing game link-state routing OSPF
ICS 351: Today's plan distance-vector routing game link-state routing OSPF distance-vector routing game 1. prepare a list of all neighbors and the links to them, and the metric for each link 2. create
More information