Multi-hop Technology: Ad-hoc Networks

Size: px
Start display at page:

Download "Multi-hop Technology: Ad-hoc Networks"

Transcription

1 MNT and VNT routing Multi-hop Technology d-hoc Networks ll hops are wireless ll nodes are mobile Military pplications rmy leet of warships pace pplications group of pathfinders group of satellites ommercial pplications Users with hand-held devices Why d oc Networks? ase of deployment peed of deployment ecreased dependence on infrastructure 2 1

2 The hallenges for Multi-hop Networks hannel ontention reduces channel efficiency ow do you reduce packet-level contention? Route omputation message intensive ow do you design scalable routing protocols? Qo upport applications do not like fluctuations What mechanisms are needed for Qo support on onehop and Qo support on the full multi-hop route? 3 hallenge 1 hannel ontention hannel ontention Reduces efficiency of channel Needs to be alleviated ontention in ingle op Networks Medium ccess (M) protocol ontention in Multi op Networks (proposed extensions of ) Quick xchange ast orward 4 2

3 ontention in ingle-hop Networks mode (istributed oordination unction) M/ RT/T optional P mode (Point oordination unction) Time ccess point polls users to transmit No contention Very few companies market products for P ender RT T T Receiver RT Request to send T lear to send ontention in Multi-hop Networks elf-contention (the main type of contention in multi-hop networks) ontention between packets of same transport connection ntra-stream contention ontention caused by packets of the same stream at different nodes nter-stream contention ontention between T packet stream and packet stream T stream (TP or UP) TP T stream destination source ontention for shared media destination prior M solutions [u et. al., nfocom 03] source stream ontention for shared media prior M solutions (none) elf-contention is best resolved at the M layer because elf-contention arises in the M layer Requires no changes to widely deployed transport protocols is an evolving standard and is amenable to changes 3

4 Routing or packet switched network oal path selection orwards the datagrams (packets) from source to destination destination address in packet determines next hop routes may change during session xample of routing and forwarding routing algorithm local forwarding table header output value link value in arriving packet s header

5 Routing lgorithm classification lobal or decentralized information? lobal all routers have complete topology, link cost info link state algorithms ecentralized router knows physicallyconnected neighbors, link costs to neighbors iterative process of computation, exchange of info with neighbors distance vector algorithms tatic or dynamic? tatic routes change slowly over time ynamic routes change more quickly periodic update in response to link cost changes Routing in Mobile d oc Networks (MNT) ormed by wireless hosts which may be mobile Without (necessarily) using a pre-existing infrastructure Routes between nodes may potentially contain multiple hops May need to traverse multiple links to reach a destination Mobility causes route changes ynamic topologies 5

6 looding for ata elivery broadcasts data packet P to all its neighbors ach node receiving P forwards P to its neighbors P P P P P P equence numbers used to avoid the possibility of forwarding the same packet more than once P P P P P Node does not forward the packet looding for ata elivery dvantages implicity May be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher this scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions Potentially higher reliability of data delivery ecause packets may be delivered to the destination on multiple paths 6

7 looding for ata elivery isadvantages Potentially, very high overhead ata packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery looding uses broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead roadcasting in M is unreliable n our example, nodes and may transmit to node simultaneously, resulting in loss of the packet in this case, destination would not receive the packet at all Why is Routing in MNT different? ost mobility link failure/repair due to mobility may have different characteristics than those due to other causes Rate of link failure/repair may be high when nodes move fast New performance criteria may be used route stability despite mobility energy consumption 7

8 hallenge 2 Route omputation ey challenge in Routing in Multi-hop Wireless Networks The destination may be anywhere in the network Routing Layer olutions for ingle-hop wireless networks Macro Mobility Mobile P Micro Mobility ellular P Routing Layer olutions for Multi-hop wireless networks Query the whole network Proactive Routing Reactive Routing ynamic ource Routing (R)/d-hoc On emand istance Vector (OV) end broadcast only in the right direction (coped roadcast) Location ided Routing (LR) xplore only few select paths Zone Routing Protocol (ZRP) xplore only a single path reedy Perimeter tateless Routing (PR) 15 Proactive routing (Tabledriven) Uses periodic route updates to maintain routing tables an either be link state or distance vector Mobility is treated as link change We introduce 1.V (ighly ynamic estination-equenced istance-vector Routing).. Perkins and P. hagwat, ighly dynamic destination sequenced distance-vector routing (V) for mobile computers, in M OMM 94, 1994, pp R (lobal tate Routing) T.-W. hen and M. erla, lobal tate Routing New Routing cheme for d-hoc Wireless Networks, n Proceedings of 98, tlanta,, un. 1998, pp

9 Table-driven, Proactive Link-tate routing table estinatio next n 10 routing table estinatio next n link-state Link-eq istance 8 (,) (,) 10 8 (,) (,) 8 routing table routing table estinatio n next estinatio n next 7 Table-driven, Proactive istance-vector estinatio n estinatio n routing table next next update estinatio n update next estinatio n routing table estinatio n next update next routing table routing table estinatio n next estinatio n 7 update next estinatio n next 9

10 V estination equence istance Vector Routing M 1996, simulated but not implemented Uses modified ellman-ord lgorithm, distance vector based, table driven Route settling time and route may not converge equence number derived from dest. node is used to keep the routing table up-to-date V est next hop seq time routing table est next hop seq time routing table periodically sends its own route information to neighbors until stable 10

11 V est next hop seq time routing table est next hop seq time routing table est next hop seq time routing table ind the path according to the Routing Table (hop by hop) R Link tate lgorithm ach node periodically sends its own route information to neighbors ach node notifies neighbors only when its route information changes neighbors then notify their neighbors if necessary Using the Link tate lgorithm to create the routing table 11

12 R link-state Link-eq istance (,) 10 (,) 8 (,) 6 (,) 10 link-state Link-eq istance (,) 5 (,) 10 (,) 8 link-state Link-eq istance (,) 5 (,) 10 periodically sends its own route information to neighbors until stable R hortest Path Router-Table path order (,), (,), (,), (,),,, (,),, (,) (,) (,),,,,,,, ind the path according to the Routing Table (source to any hosts) 12

13 Proactive routing rawbacks nefficient if there is few demands for routes, and instability if there is high mobility Lots of signaling traffic ll of the routes may never be used Reactive routing (On-demon) New nodes are added when needed No periodic route updates ind route when needed by the source node aching will help to improve the performance We introduce 1.R (ynamic ource Routing ) ONON,.., N MLTZ,.. ynamic source routing in ad hoc wireless networks. n Mobile omputing, T. mielinski and. orth, ds. luwer cademic Publishers, 1996, ch. 5, pp OV (d oc On-emand istance Vector Routing Protocol ) harles. Perkins and lizabeth M. Royer. d hoc On-emand istance Vector Routing, n Proceedings of the 2nd Workshop on Mobile omputing ystems and pplications (WM 99), New Orleans, L, ebruary,1999, pp

14 Reactive routing (On-demon) lood the whole network in search of the destination estination or node knowing route to destination responds Two phases Routing discovery Route Request and Route Reply Routing maintenance R ynamic ource Routing MU 1996, simulated and implemented in 1999 n extension of P, it uses options field in P Two phases routing discovery and routing maintenance aching and other features are used 14

15 R When node wants to send a packet to node, but does not know a route to, node initiates a route discovery ource node floods Route Request (RRQ) ach node appends own identifier when forwarding RRQ Route iscovery in R Y Z M N L Represents a node that has received RRQ for from 15

16 Route iscovery in R roadcast transmission Y [] Z M N L Represents transmission of RRQ [X,Y] Represents list of identifiers appended to RRQ Route iscovery in R Y [,] [,] Z M N L Node receives packet RRQ from two neighbors potential for collision 16

17 Route iscovery in R Y Z [,,] [,,] M N L Node receives RRQ from and, but does not forward it again, because node has already forwarded RRQ once Route iscovery in R Y Z [,,,] M [,,,] N L Nodes and both broadcast RRQ to node ince nodes and are hidden from each other, their transmissions may collide 17

18 Route iscovery in R Y Z [,,,,M] M L N Node does not forward RRQ, because node is the intended target of the route discovery Route iscovery in R estination on receiving the first RRQ, sends a Route Reply (RRP) RRP is sent on a route obtained by reversing the route appended to received RRQ RRP includes the route from to on which RRQ was received by node 18

19 Route Reply in R Route Reply can be sent by reversing the route in Route Request (RRQ) only if links are guaranteed to be bidirectional To ensure this, RRQ should be forwarded only if it received on a link that is known to be bi-directional f unidirectional (asymmetric) links are allowed, then RRP may need a route discovery for from node Unless node already knows a route to node f a route discovery is initiated by for a route to, then the Route Reply is piggybacked on the Route Request from. f M is used to send data, then links have to be bi-directional (since ck is used) Route Reply in R Y RRP [,,,,] Z M N L Represents RRP control message 19

20 ynamic ource Routing (R) Node on receiving RRP, caches the route included in the RRP When node sends a data packet to, the entire route is included in the packet header hence the name source routing ntermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded ata elivery in R Y T [,,,,] Z M N L Packet header size grows with route length 20

21 R Optimization Route aching ach node caches a new route it learns by any means When node finds route [,,,,] to node, node also learns route [,,] to node When node receives Route Request [,,] destined for node, node learns route [,,,] to node When node forwards Route Reply RRP [,,,,], node learns route [,,] to node When node forwards ata [,,,,] it learns route [,,,] to node node may also learn a route when it overhears ata packets Use of Route aching When node learns that a route to node is broken, it uses another route from its local cache, if such a route to exists in its cache. Otherwise, node initiates route discovery by sending a route request Node X on receiving a Route Request for some node can send a Route Reply if node X knows a route to node Use of route cache can speed up route discovery can reduce propagation of route requests 21

22 Use of Route aching [,,,,] [,,,] [,,],[,,] [,,,] M [,] [,,] N L Z [P,Q,R] Represents cached route at a node (R maintains the cached routes in a tree format) Use of Route aching an peed up Route iscovery [,,,,] [,] [,,,] [,,] [,,,] When node Z sends a route request for node, node sends back a route reply [Z,,,] to node Z using a locally cached route [,,],[,,] RRQ [,,,] RRP Z M N L 22

23 Use of Route aching an Reduce Propagation of Route Requests [,,,,] [,] [,,,] [,,] [,,,] [,,],[,,] RRQ [,,,] ssume that there is no link between and Z. Route Reply (RRP) from node limits flooding of RRQ. n general, the reduction may be less dramatic. Z RRP M Y N L Route rror (RRR) Y RRR [-] Z M N L sends a route error to along route --- when its attempt to forward the data packet (with route ) on - fails Nodes hearing RRR update their route cache to remove link - 23

24 ynamic ource Routing dvantages Routes maintained only between nodes who need to communicate reduces overhead of route maintenance Route caching can further reduce route discovery overhead single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches ynamic ource Routing isadvantages Packet header size grows with route length due to source routing lood of route requests may potentially reach all nodes in the network are must be taken to avoid collisions between route requests propagated by neighboring nodes insertion of random delays before forwarding RRQ ncreased contention if too many route replies come back due to nodes replying using their local cache Route Reply torm problem Reply storm may be eased by preventing a node from sending RRP if it hears another RRP with a shorter route 24

25 d oc On-emand istance Vector Routing (OV) [Perkins99Wmcsa] R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts to improve on R by maintaining routing tables at the nodes, so that data packets do not have to contain routes OV retains the desirable feature of R that routes are maintained only between nodes which need to communicate OV Route Requests (RRQ) are forwarded in a manner similar to R When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source OV assumes symmetric (bi-directional) links When the intended destination receives a Route Request, it replies by sending a Route Reply Route Reply travels along the reverse path setup when Route Request is forwarded 25

26 26 Route Requests in OV Z Y Represents a node that has received RRQ for from M N L Route Requests in OV Represents transmission of RRQ Z Y roadcast transmission M N L

27 27 Route Requests in OV Represents links on Reverse Path Z Y M N L Reverse Path etup in OV Node receives RRQ from and, but does not forward it again, because node has already forwarded RRQ once Z Y M N L

28 28 Reverse Path etup in OV Z Y M N L Reverse Path etup in OV Z Y Node does not forward RRQ, because node is the intended target of the RRQ M N L

29 Route Reply in OV Y Z M N L Represents links on path taken by RRP Route Reply in OV n intermediate node (not the destination) may also send a Route Reply (RRP) provided that it knows a more recent path than the one previously known to sender To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used The likelihood that an intermediate node will send a Route Reply when using OV not as high as R new Route Request by node for a destination is assigned a higher destination sequence number. n intermediate node which knows a route, but with a smaller sequence number, cannot send Route Reply 29

30 orward Path etup in OV Y Z M N L orward links are setup when RRP travels along the reverse path Represents a link on the forward path ata elivery in OV Y T Z M N L Routing table entries used to forward data packet. Route is not included in packet header. 30

31 Timeouts routing table entry maintaining a reverse path is purged after a timeout interval timeout should be long enough to allow RRP to come back routing table entry maintaining a forward path is purged if not used for a active_route_timeout interval if no data is being sent using a particular routing table entry, that entry will be deleted from the routing table (even if the route may actually still be valid) Link ailure Reporting neighbor of node X is considered active for a routing table entry if the neighbor sent a packet within active_route_timeout interval which was forwarded using that entry When the next hop link in a routing table entry breaks, all active neighbors are informed Link failures are propagated by means of Route rror messages, which also update destination sequence numbers 31

32 Route rror When node X is unable to forward packet P (from node to node ) on link (X,Y), it generates a RRR message Node X increments the destination sequence number for cached at node X The incremented sequence number N is included in the RRR When node receives the RRR, it initiates a new route discovery for using destination sequence number at least as large as N estination equence Number ontinuing from the previous slide When node receives the route request with destination sequence number N, node will set its sequence number to N, unless it is already larger than N 32

33 Link ailure etection ello messages Neighboring nodes periodically exchange hello message bsence of hello message is used as an indication of link failure lternatively, failure to receive several M-level acknowledgement may be used as an indication of link failure Why equence Numbers in OV To avoid using old/broken routes To determine which route is newer To prevent formation of loops ssume that does not know about failure of link - because RRR sent by is lost Now performs a route discovery for. Node receives the RRQ (say, via path --) Node will reply since knows a route to via node Results in a loop (for instance, ---- ) 33

34 ummary OV Routes need not be included in packet headers Nodes maintain routing tables containing entries only for routes that are in active use t most one next-hop per destination maintained at each node Multi-path extensions can be designed R may maintain several routes for a single destination Unused routes expire even if topology does not change lustering / ierarchical void drastic network-wide changes mall clusters converge fast May use hybrid design ompromised Method Reduce disadvantages and promote advantages On theory better but MO it s a bit too complicated and smart, the rule of the real world is The simpler the better. We introduce 1. ZRP (Zone Routing Protocol), Z., N PRLMN, M. The performance of query control schemes for the zone routing protocol. n Proceedings of the OMM 98 onference on ommunications rchitectures, Protocols and pplications (ept. 1998). 34

35 ZRP Zone Routing Protocol ornell 1998, simulated only Zone based and hybrid of proactive and reactive Proactive intra-zone and reactive inter-zone ach node has complete topology up to k hops or destination outside k hops, query forwarded to the boundary nodes Problem ow to decide the appropriate radius of the zone ZRP roup ach node has complete topology up to k hops, and become a group order Node The edge node in a group iscovery Process 1. When node wants to send data to node, f is in the group, send it lse, send Route Request to order Node 2. When receives a Route Request f is in the group, send Route Reply to source node lse, send Route Request to order Node 35

36 ZRP Neighbor Table of node border x x x o o o 將 RRQ 送往自己管理的 order 群組的領導 表示藍色節點所管轄的中間節點 表示藍色節點所管轄的邊界節點 表示藍色節點管轄之外的其他節點 ZRP Neighbor Table of node border O x X O X Routing Table of Path order (,),, 將 RRP 由原路徑送回 群組的領導 表示藍色節點所管轄的中間節點 表示藍色節點所管轄的邊界節點 表示藍色節點管轄之外的其他節點 36

37 37 ZRP Path order (,),, Routing Table of 群組的領導群組的領導群組的領導群組的領導 表示藍色節點所管轄表示藍色節點所管轄表示藍色節點所管轄表示藍色節點所管轄的中間節點的中間節點的中間節點的中間節點 表示藍色節點所管表示藍色節點所管表示藍色節點所管表示藍色節點所管轄的邊界節點轄的邊界節點轄的邊界節點轄的邊界節點 表示藍色節點管轄表示藍色節點管轄表示藍色節點管轄表示藍色節點管轄之外的其他節點之外的其他節點之外的其他節點之外的其他節點 ZRP node border O x X O X Neighbor Table of 群組的領導群組的領導群組的領導群組的領導 表示藍色節點所管轄表示藍色節點所管轄表示藍色節點所管轄表示藍色節點所管轄的中間節點的中間節點的中間節點的中間節點 表示藍色節點所管表示藍色節點所管表示藍色節點所管表示藍色節點所管轄的邊界節點轄的邊界節點轄的邊界節點轄的邊界節點 表示藍色節點管轄表示藍色節點管轄表示藍色節點管轄表示藍色節點管轄之外的其他節點之外的其他節點之外的其他節點之外的其他節點 f not the estination

38 VNTs vs. MNTs VNT consists of vehicles to form a network which is similar to a Mobile d oc Network (MNT). owever, there are following differences between these two networks. Vehicles mobility Vehicles move at high speed but mobility is regular and predictable Network topology igh speed movement makes network topology dynamic No significant power constraint Recharging batteries from vehicle Localization Vehicles position estimate accurately through P systems or on-board sensors 75 eatures of VNTs The characteristics of VNTs can be summarized after comparing with the MNTs. ynamic topology Nomadic nodes with very high speed movement cause frequent topology variation Mobility models Vehicles move along original trajectories completely different from typical MNT scenarios nfinite energy supply Power constraint can be neglected thanks to always recharging batteries Localization functionality Vehicle can be equipped with accurate positioning systems (P and LLO) integrated by electronic maps 76 38

39 Preliminaries in Routing Protocols (1/2) n VNTs, the following characteristics affect the design of the routing protocols. igh-speed node movement requent topology change hort connection lifetime especially with multihop paths Traditional topological routing protocols for ad hoc networks are not suitable. 77 Preliminaries in Routing Protocols (2/2) n the following, the routing protocols in the recent years that address the characteristics of VNTs are presented with three basic categories Position-based Routing eocasting Routing roadcast Routing MNT Table-driven, Proactive On-demon, Reactive lustering / ierarchical 78 39

40 coped roadcast (Location ided Routing) Obtain the location and speed and direction of motion of the destination using P ased on the time elapsed since last update, restrict the direction of route query flood ssues Requires P support source Request Zone etermined by source dest 1000x1000 region Number of nodes 15, 30, 50 Various tx range 200, 300, 400 and 500 Routing packets/data packet looding LR Number of nodes 79 Position-based Routing The routing decision at each node is based on the destination s position contained in the packet and the position of the forwarding node s neighbors. ssumption Position-based routing does not keep global network information but requires information on physical locations of nodes. very vehicle has an on board P (or some other type of positioning service) for routing. 40

41 xploring a single path (reedy Perimeter tateless Routing) ach node learns the location of all its neighbors reedy mode forwarding (default) pick the neighbor closest to the destination Perimeter mode forwarding f a node itself is closest to the destination, it then tries to forward the packet around the void ssues Requires P support void x Node x s void with respect to destination 81 Motivation ource routing vs. routing table op-by-hop routing table small number of entries ource routing high bit overhead lobal protocol annot scale nd-to-end route maintenance looding Overhead proportional to network size & mobility 41

42 PR nswer is location! Local state neighbor table ll need to know is all my neighbors locations #tate proportional to density instead of #destinations Local protocol Route discovered and fixed locally Overhead independent from network size & mobility 10/8/ ensor Networks 83 ssumptions ll wireless routers know their own positions ources can determine the locations of destinations local directory service onus location-based communication make directory service unnecessary To handle void Perfect radio model identical, circular radio range. nodes are roughly in a plane. 10/8/ ensor Networks 84 42

43 Location-based ommunication -based rom to What is the reading of sensor ? Rely on unreliable individual sensors Location-based rom location to location What is the virus density in south terminal of airport? ndividual sensors NOT important Local coordination ensors in interested area aggregate data ensor-base comm. end aggregated result to base station 10/8/ ensor Networks 85 xchange Location Proactive, periodic beaconing Waste bandwidth in static network Piggyback location in data packet On-demand beaconing efore send, request for all neighbor locations if not known More efficient in static sensor networks 10/8/ ensor Networks 86 43

44 reedy orwarding Optimal path fficient O(1) on sorted neighbor table The denser a network, the more likely to work losest to 10/8/ ensor Networks 87 ut We till Need to olve Void specially in network that is deployed in a ad hoc fashion 10/8/ ensor Networks 88 44

45 Right-and Rule o around the perimeter of a void! 10/8/ ensor Networks 89 ssembling PR Together Maintenance ll nodes maintain a single-hop neighbor table hop links to construct planar graph t source mode = greedy ntermediate node greedy fails reedy orwarding Perimeter orwarding greedy works have left local maxima greedy fails 10/8/ ensor Networks 90 45

46 xample d e z a c f x b 10/8/ ensor Networks 91 Location-ased Multicast (LM) (3/4) cheme 1 ox orwarding Zone When a node receives a eocast packet, it will forward the packet to its neighbors if it is within a forwarding zone; otherwise, it will discard the packet. ource/ink eocast Region orwarding Zone 92 46

47 Location-ased Multicast (LM) (4/4) cheme 2 ON orwarding Zone Unlike scheme 1, cheme 2 does not have a forwarding zone explicitly. oecast packet that should be forwarded is based on the position of the sender node and receiver node. (X,Y ) (X,Y ) ource/ink (X,Y ) (X,Y ) Multicast Region (X,Y ) Y X Z (X,Y ) 93 roadcast Routing n nter-vehicle ommunication ystems (V),broadcasting is an efficient method to spread messages. The reasons of occurring broadcast storm n a broadcasting network, the situations of contentions and collisions often take place if an efficient broadcasting scheme is not used. The result incurred by broadcasting is called broadcast storm. 47

48 roadcast torm n VNTs, broadcast is used for disseminating the traffic information etour route ccident alert onstruction warning etc ome messages will be periodically broadcasted by roadside unit (RU) for several hours or even some days. The problem of broadcast storm in VNT is more serious than that in MNT roadcast Routing Message issemination deal solution Minimum onnected ominating et, which minimizes packet rtx and preserves network connectivity. Realistic solutions trade-off between robustness and redundancy. The important concern in designing a broadcast scheme in VNT. ow to design broadcast algorithm to efficiently transmit messages to the target nodes. To design a broadcast algorithm to make the desired vehicles to receive the message as soon as possible. 48

49 our roadcasting trategies ifferent broadcasting strategies to select the forwarding nodes Probability-based Location-based Neighbor-based luster-based roadcast Routing 1. Probability-based given P determines the decision, for example depending on the number of copies a node has received. The strategy is often dynamic. P = probability distribution function 49

50 roadcast Routing Probability-based a r P = 0.8 a r P = 0.5 o rw a rd in g N o d e c h o o se roadcast Routing Location-based The selection criterion is the amount of additional area that would be covered by enabling a node to forward. ome proposal also computes position prediction as useful input information. 50

51 roadcast Routing Location-based ar Target ar wants to turn right orwarding Node choose roadcast Routing Neighbor-based node is selected depending on its neighbors status (for instance, the status concerns how a neighbor is connected to the network). 51

52 roadcast Routing Neighbor-based Target ar ollect the information of neighbors ar orwarding Node choose roadcast Routing luster-based Nodes are grouped in clusters represented by an elected cluster-head. Only cluster-heads forward packets. Nodes in the same cluster share some features (e.g., relative speed in VNTs). Reclustering on-demand or periodically. 52

53 roadcast Routing luster-based luster-eader ateway-node luster-eader orwarding Node choose V Vehicle-ssisted ata elivery in Vehicular d oc Networks ing Zhao uohong ao epartment of omputer cience & ngineering The Pennsylvania tate University n Proceedings of nnual oint onference of the omputer and ommunications ocieties (NOOM), pp.1-12,

54 V 107 V 1. Transmit through wireless channels as much as possible. 2. f the packet has to be carried through certain roads, the road with higher speed should be chosen. 3. ynamic path selection should continuously be executed throughout the packet forwarding process

55 V

Wireless Internet Routing

Wireless Internet Routing Wireless nternet Routing Wireless Routing in the eginning 1 Wireless nternet Routing This course: routing in T/ad hoc networks and mesh networks o nternet? = ateway(s) wireless/wired 2 1 Outline Review

More information

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET) 173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure

More information

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET) 173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)

More information

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR d oc On-emand istance Vector (OV) R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts

More information

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks. 18759 Wireless Networks (2012-pring) urvey Routing Protocols for d Hoc Networks Jiun-RenLin and Yi-hun hou lectrical and omputer ngineering arnegie Mellon University Outline d-hoc networks Unicast d-hoc

More information

Routing In Ad Hoc Networks

Routing In Ad Hoc Networks Routing n d oc Networks ontents 1. ntroduction to ad-hoc networks 2. Proactive routing protocols OLR 3. Reactive routing protocols R, OV 4. Non-uniform routing protocols ZRP, R 5. Other approaches eographical

More information

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain

More information

Dynamic Source Routing (DSR) [Johnson96]

Dynamic Source Routing (DSR) [Johnson96] ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom

More information

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7 d hoc On-demand istance Vector Routing (OV) [Perkins99] 6811 : Lecture 7 d Hoc On-emand istance Vector Routing (OV) R includes source routes in packet headers G ata. Header Large headers can sometimes

More information

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5 ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols 173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Setup Ad Hoc Routing Protocol over On-Demand Backup Node

Setup Ad Hoc Routing Protocol over On-Demand Backup Node etup d oc Routing Protocol over On-emand ackup ode Ying-ong Wang, hi ing hung, hih-hieh huang epartment of omputer cience and nformation ngineering, Tamang University 151 Ying-chuan Road, Tamsui 25137,

More information

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone Politecnico di Milano Facoltà di Ingegneria dell Informazione WI-7 Ad hoc networks Wireless Internet Prof. Antonio Capone Acknowlegments o This class notes are mostly based on the teaching material of:

More information

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols 173/S152, Winter 2006 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV Hybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept //8 Outline - omputer Networking Lecture Routing Link tate OP Peter teenkiste epartments of omputer cience and Electrical and omputer Engineering IP Multicast ervice asics - Networking, pring 8 http://www.cs.cmu.edu/~dga/-/8

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016 estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP epartment of lectrical ngineering and omputer Sciences University of alifornia erkeley '!$$( network defined over another set of networks The overlay addresses its own nodes Links on one layer are network

More information

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc.edu http://www.crhc.uiuc.edu/~nhv 2004 Nitin Vaidya 1 Notes Names in brackets,

More information

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni 3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure

More information

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding Now rriving at Layer Packet orwarding although layer switches and layer routers are similar in many ways and TM/Virtual are used at layer these days 9/7/6 S/ 48 - UIU, all 6 9/7/6 S/ 48 - UIU, all 6 Layers

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging) S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018 S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

AODV- An Efficient MANET Routing Protocol

AODV- An Efficient MANET Routing Protocol International Journal of urrent Engineering and Technology E-IN 2277 4106, P-IN 2347-5161 2014 INPREO, ll Rights Reserved vailable at http://inpressco.com/category/ijcet Research rticle OV- n Efficient

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA. TCP over noisy links. Link layer challenges. Wireless deployments

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA. TCP over noisy links. Link layer challenges. Wireless deployments Overview 15-441: omputer Networking Lecture 25: Wireless Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 Internet t mobility TP over noisy links Link layer challenges Wireless deployments 2 IEEE

More information

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks A. Specific properties B. Flooding as a basic mechanism C. Basic routing protocols DSR AODV y DYMO OLSR y OLSRv2 D. Advanced protocols and techniques Acknowledgments

More information

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6 estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Routing in Ad-hoc Networks

Routing in Ad-hoc Networks 0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in

More information

Third Generation Routers

Third Generation Routers IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Unit 2. Signaling and Single Area OSPF

Unit 2. Signaling and Single Area OSPF nit ignaling and ingle rea PF elecommunications ignaling ignaling g sed to provide all of the set up, tare down and call processing information such as: ff hook notification alling party number alled party

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Distance-Vector Routing: Distributed B-F (cont.)

Distance-Vector Routing: Distributed B-F (cont.) istance-vector Routing: istributed - (cont.) xample [ istributed ellman-ord lgorithm ] ssume each node i maintains an entry (R(i,x), L(i,x)), where R(i,x) is the next node along the current shortest path

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario

More information

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Courtesy of G.G. Richard III for providing some of the slides Mobile Ad Hoc Networks May need to traverse

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Information Brokerage

Information Brokerage Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C obile ad hoc networks Standard obile needs an infrastructure ome gent/oreign gent in the fixed network S, routing, etc., are not designed for mobility Sometimes there is no infrastructure! remote areas,

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs

Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Vorlesung Kommunikationsnetze Research Topics: QoS in VANETs Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Nomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:

Nomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza: Nomadic ommunications Wireless Mesh Networks Renato Lo igno Loigno@disi.unitn.it - Tel: 2026 Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications opyright Quest operaèprotettadallalicenza:

More information

Example of TORA operations. From last time, this was the DAG that was built. A was the source and X was the destination.

Example of TORA operations. From last time, this was the DAG that was built. A was the source and X was the destination. Example of TORA operations A Link 2 D Link 6 Y Link 1 Link 3 C Link 4 Link 8 B Link 5 E Link 7 X From last time, this was the DAG that was built. A was the source and X was the destination. Link 1 A B

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis TOM 50: Networking Theory & undamentals Lecture pril 6, 2003 Prof. Yannis. Korilis 2 Topics Routing in ata Network Graph Representation of a Network Undirected Graphs Spanning Trees and Minimum Weight

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

A Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks

A Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks A ybrid Qo Routing trategy for uburban Ad-oc etworks Muhammad Mahmudul Islam, Ronald Pose, arlo Kopp chool of omputer cience and oftware ngineering, Monash University, Australia {sislam,rdp,carlo}@csse.monash.edu.au

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Routing protocols in Mobile Ad Hoc Network

Routing protocols in Mobile Ad Hoc Network Routing protocols in Mobile Ad Hoc Network Presented By :- Nitesh Jain Date:-26/10/2005 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR KHARAGPUR Types of Wireless Networks Infrastructure

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing Local & Metropolitan rea Networks OE3 Lecture 6 Routing r. L. hristofi Overview The main function of the network layer is routing packets from the source to the destination machine. The only exception

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 39 CHAPTER 2 LITERATURE REVIEW This chapter gives a brief summary of the MANET routing protocol types and their details. 2.1 ROUTING IN AD-HOC NETWORKS Routing is the act of moving information from source

More information