Lower Layers PART 3: RPL layer in Contiki with the Z1

Size: px
Start display at page:

Download "Lower Layers PART 3: RPL layer in Contiki with the Z1"

Transcription

1 Slide ower ayers PRT 3: RP layer in ontiki with the Z Kris Steenhaut - Jacques Tiberghien Remark: all numerical data refer to the parameters defined in for 32. Kbytes/s transmission in the 2.4 z frequency band.

2 Slide 2 Routing in Wireless Sensor and ctuator etworks lmost all WSs use multi-hop communication, thus requiring routing of messages through the network. Power grows at least as the square of the distance, but more often as the 4 th power. d P ~ (2d) 2 = 4d 2 d P ~ d 2 + d 2 = 2d 2 2

3 Slide 3 Routing in WSs The nternet ateway (sink node) Sensors Radio links ommunication needs:. ollect : 2P From sensors to gateway To collect field data 2. istribute : P2 From gateway to sensors To download commands, parameters and software. 3. Sensor to Sensor : P2P From one sensor to an other To run distributed data processing algorithms. The collect function is by far the most important, as most of the Wireless Sensor etworks are mainly intended for collecting data from the field. Power economy is often essential for extending lifetime and/or reducing maintenance costs. atency can be an issue when the sensors can generate alarms. n most Wireless Sensor etworks the distribute protocol is only used for (exceptional) maintenance functions. Sensor to sensor communication is gaining importance because, as nodes become more powerful, local data pre-processing and data clustering can reduce the volume of data to send to the gateway. n Wireless Sensor and ctuator networks, the istribute function is used to give commands to local actuators. atency and reliability can be important issues. Some references: Philip evis, ric Brewer, avid uller, avid ay, Sam adden, eil Patel, Joe Polastre, Scott Shenker, Robert Szewczyk, lec Woo: The mergence of a etworking Primitive in Wireless Sensor etworks, ommunications of the, Volume, umber 7, July 2008.

4 Slide 4 ontiki ommunication stacks onceptual view Rime UP6 2P P2P + BRO 2P / P2 P2P Services TP/UP OT P+RP 6OWP 6 bit addresses 64 bit addresses R Physical ayer The et subsystem of ontiki implements the communications facilities. This slide shows the simplified layered structure. Two different communication stacks are available: rime and UP6. The rime stack offers simple, ontiki specific, communication facilities, including single-hop unicast (P2P) or broadcast (BRO) and multi-hop multipoint to point (2P) functionality. The UP6 stack offers, multi-hop multipoint to point (2P), point to multipoint (P2) and point to point (P2P) functionality via the RP routing protocol. By bypassing the transport and network layers, single hop unicast (P2P) and broadcast (BRO) functionality is also available. The, R and physical layers are common to both stacks, but their code contains many if(pv6) and if(!pv6) statements. The RP routing protocol uses additional information about links gathered by the and R layers. The most common example of this is the stimated number of Transmissions needed to cross a specific link which is commonly used as a cost function for links.

5 Slide Pv6 on ow Power and ossy etworks? pplications TP/UP Pv6 &PY pplications The nternet B TP/UP RP 6owPan F J K The ow Power network is just one subnet The sink node plays the role of a router t is attractive to integrate low power and lossy networks in the internet, as it makes their access from anywhere and the development of applications much simpler. s these networks will often have a large number of nodes, only the Pv6 internet protocol has provisions for enough addresses. owever, as low power networks have limitations, such as very limited memory capacity in the nodes, that other parts of the internet don t have, their integration will need a specific architecture and specific protocols. The low power network will be considered as a specific subnet, connected to the internet through its sink node(s), which behave(s) like routers between the subnet and the internet. Reference : Jeongil Ko, ndreas Terzis, Stephen awson-aggerty, avid. uller, Jonathan W. ui and Philip evis: onnecting ow-power and ossy etworks to the nternet, ommunications agazine, pril 20, pp.96-0.

6 Slide 6 TP/UP RP 6owPan owPan Why? Pv6 address : T res S 64 T Frame length : Pv6: <= 280 bytes; : <= 8 bytes. Frame fragmentation & defragmentation eader length : Pv6 header >= 40 bytes; TP header = 20 bytes, o version field, no flow label, One subnet : 64 instead 28 bit addresses, eader compression onnectivity inside the subnet : Single broadcast domain vs. multi-hop connectivity Route-over architecture (see next slide) 6 s specific protocols for low power and lossy networks using Pv6, there is first an adaptation layer between the network and the layer. This layer is needed for several reasons: - first there is the length of the frames: max 280 bytes according to Pv6, while in some configurations, frames can be as short as 8 bytes. 6owPan has to provide facilities to fragment and rebuild frames. - Second, there is the size of the Pv6 headers. n Pv6 header, without extensions requires 40 bytes. f one adds a TP header (20 bytes) to that, there are, in the shortest frames just 2 bytes left for data. Fortunately, in the context of low power and lossy networks, lots of redundant or useless information can be removed from the headers. The version field is not needed as 6owPan uses, by definition, v6. The flow label is also useless as no connection oriented, high-throughput data flows will be established in a low power and lossy network. s the entire low power network is considered as a single Pv6 subnet, the 64 most significant bits of the Pv6 addresses, which identify the subnet, are not needed for addressing inside the subnet. - Third, an Pv6 subnet generally constitutes a single broadcast domain, while a low power and lossy network offers, most often, multi-hop connectivity, with the need for routing frames through the subnet. The RP routing protocol has been proposed for this purpose and modified versions of the Pv6 eighbor iscovery and configuration protocols can be used with RP to integrate a low power and lossy network in an Pv6 internet.

7 Slide 7 Routing Protocol for ow Power and ossy etworks RP origin: The nternet of things. TF working group for Pv6 routing. one of the existing protocols is adequate! ew design combining interesting ideas of all. RP Basic echanisms Routing based upon one or more estination Oriented irected cyclic raphs (Os) Optimal routes between sink and all other nodes for both the collect and distribute data traffics. Redundant equivalent routes are kept for reliability in case of link or node failure. ultiple Os if different optimisation criteria. 7 Some references: nternet ngineering Task Force (TF), Request for omments: 60 - RP: Pv6 Routing Protocol for ow-power and ossy etworks, SS: , arch 202. nternet ngineering Task Force (TF), Request for omments: 6 - Routing etrics Used for Path alculation in ow-power and ossy etworks, SS: , arch 202. nternet ngineering Task Force (TF), Request for omments: 62 - Objective Function Zero for the Routing Protocol for ow-power and ossy etworks (RP), , arch 202.

8 Floating Slide 8 RP: the O floating has no connection with the sink..g : failure of link -B B rounded O O = estination Oriented, irected, cyclic raph.. J F K grounded O contains the sink node and offers routes from all its nodes to that sink node. 8 Routing in the RP protocol is based upon the O concept. t is a distributed data structure build-up and maintained during the WS usage. t is a kind of distributed routing table, build by the RP algorithm and used for routing frames through the network. O = estination Oriented irected cyclic raph estination Oriented = ll routes end in a Root irected: one way edges cyclic: no loops odes and links map into to those of the physical network Root = ode with no outgoing links Roots interconnect the low power and lossy network with external networks such as the nternet. O roots correspond to the sink nodes traditionally used in the WS literature.

9 Slide 9 O: neighbors and parents The neighbors of a node are all the nodes that can be reached via a singlehop radio link. The neighbors of are,, and rounded O The parents of a node are all the neighbors that are on a possible route from the node to the sink. Parents of are, and. The preferred parent of a node is the neighbor that is on the best route from the node to the sink. The preferred parent of is (will be explained in a later slide). 9 To understand the building of a O the concepts of neighbor, parent and preferred parent need to be introduced: - n a WS nodes communicate by radio. The neighbors of a node are all the nodes that can communicate via single-hop radio links with that node. (To simplify this introduction, all radio links are supposed symmetric). - O defines routes from all nodes to the root. The parents of a node are the neighbors of that node that belong to such a route. When a node has to send a message to the route, it suffices that it sends it to one of its parents. - The quality of a route can be defined according to criteria dependent on the application ( Routing etric ). node should select among its parents the one that ensures the best route to the root, according to the selected criterion. This parent is the preferred parent. - node will always use its preferred parent to send messages to the route, unless the preferred parent is unavailable. n this case the node can use its other parents as backup.

10 Slide 0 O: the Routing etric ach link and each node has an associated cost, defined in terms of the specific Routing etric. n this example nodes have no cost. Of course, no loops can be allowed in the routing scheme. The situation shown here could occur if suddenly the cost of the link increases ach node computes the cost of the best route to the root by adding to the cost of the preferred parent the cost to reach that preferred parent > For selecting the best route to the sink a Routing etric is defined. This metric is similar to the distance parameters used in algorithms like istance Vector. t gives the cost for reaching the sink from a specific node. The routing metric normally takes into account, depending on the application, not only the cost of traveling along a link, but also some node specific dynamic parameters such as the state of the battery. When a node has to select between several parents its preferred parent, that selection should minimize the routing metric. Of course, no loops may exist in the routes towards the root, because they would make the root unreachable from certain nodes.

11 Slide O: the RK of nodes ll nodes have a rank, which is some measure of the distance between node and root. n this example it is simply the hop-count. To prevent the creation of routing loops, all parents of a node must have a rank lower than the rank of that node. When a node joins the O, its rank is computed from the data provided in the O message. owever a node is authorized to increase its rank to expand the set of its parents. n this example has increased its rank from 2 to 3 in order to add to its parents. / 4/4 2 / 3 0/0 2/2 /2 2/3 To avoid creation of loops in the O, the notion of rank has been introduced. n a O, all nodes have a rank. This rank expresses in some way the distance from the node to the sink. This distance could be a simple hop-count or it could be a much more complex function, such as the average number of times a message needs to be retransmitted by radio to reach the root. The rank of a node is computed by an Objective Function (OF, not defined in the standard, because it should be specific for the application), that takes into account the properties of the nodes and the links along the route between the node and the root. The rank of a node should always be higher than the rank of its parents (this prevents the creation of loops) n older versions of the proposal nodes with the same rank were called siblings. node can voluntarily increase its rank in order to increase the set of its parents. n these introductory slides, rank is considered equal to the hop count to the root.

12 Slide 2 RP : Building the O () The root initiates the building of a new O by sending O messages to all its neighbors. odes, and join the O. and set their rank =. / 0/0 2 / / 4/4 3 2/2 2/3 2 Building a new O is initiated by the root node of that O. t assigns a unique O identity to the new O and sends O nformation Object (O) messages to all its neighbors. ach O messages carries the identity of the new O, the rank of its sender (0 by definition for the root), the cost to reach the root from its sender (0 by definition for the root itself) as well as data about the link between its sender and its destination. The nodes receiving these O messages join the new O. Their rank is, with the simple hop-count Objective Function used for this example, as they are at one hop from the root.

13 Slide 3 RP : Building the O (2) odes, and have only one parent,. t is automatically their preferred parent. odes, and set their cost function / 0/0 2 / /2 3 3 The neighbors of the root have each one parent, the root, and their cost to the root is determined by the cost of the link from the root. Obviously the root is also their preferred parent.

14 Slide 4 RP : Building the O (3) ode ignores the O messages because they come from neighbors with a higher rank. odes, and start sending O messages to their neighbors odes, and join the O. and set their rank. / 2/ 2 3 0/0 / 2/ /2 2/ 4 fter receiving O messages from the root and updating their state, nodes, and send O messages to their neighbors: sends a message to and to, to, and while sends one to and. ignores all messages it receives because they come from nodes with a rank higher than the rank of their destination. fter receiving O messages nodes, and join the new O and set their rank value to 2.

15 Slide RP : Building the O (4) odes, and set up their list of parents and select a preferred parent odes, and update their cost figures / 2/4 3 0/0 2 / 2/2 /2 2/3 t this point the parents of are and, with as preferred parent. and each have only one parent, respectively and, wich become automatically preferred parents., and can now update their cost figures by adding to the cost of their preferred parent the cost of the link towards that preferred parent.

16 Slide 6 RP : Building the O () odes, and ignore the O messages from, and, because they come from nodes with a higher rank odes, and send O messages to all their neighbors odes, and join the O and set their rank / 2/4 3/ 3 0/0 2 / 2/2 3/ /2 2/3 3/ 6 odes, and now start sending O messages to their neighbors. sends one to,, and. sends one to,, and. just sends one to and., and ignore the O messages they receive because the come from a node with a higher rank., and join the O and set their rank to 3.

17 Slide 7 RP : Building the O (6) odes discovers that using neighbor as a preferred parent would result in a better cost figure, but has the same rank as and therefore can not be a parent of. ode decides to increment its rank to be allowed to adopt as a parent. now has to send O messages to its neighbors, to inform them of the change in rank. / 4/ 3 0/0 2 / 2/2 3/ /2 2/3 3/ 7 can not become a parent of, nor a parent of because and have the same rank but discovers that the cost via (3) is lower than the cost via its preferred parent (4). Therefor increments its rank by one unit. ow can become a parent of and it even beciomes its preferred parent. This change in its rank obliges to send again O messages to its neighbors,, and., and ignore these messages because they come from a node with a higher rank. will increment its own rank to 4.

18 Slide 8 RP : Building the O (7) ow nodes, and can select their parents and their preferred parent. / 4/4 3 0/0 2 / 2/2 /2 2/3 8 t this stage nodes, and can set up their parents list and select their preferred parents. This completes the building of the O as now all nodes are included.

19 Floating O O Slide 9 RP: essages for routing rounded O B S F J K 9 O (estination nformation Object) Transmitted downward by root and nodes in the O for discovery, construction and maintenance. O (estination dvertisement Object) Propagates upwards destination information along the O to populate the routing tables of ancestor nodes in support of the distribute traffic. S (O nformation Solicitation) iscovers Os in the neighborhood for grounding a floating O. S message is answered by a O

20 Slide 20 RP: ollect, istribute and P2P routing ollect (2P) istribute (P2) P2P 20 The collect protocol is used to collect data from all the nodes and to send it to the sink node (). The routing simply consist in following the O. The distribute protocol is just the opposite: data from the sink is sent to specific nodes. When connected to the O, each node has sent to the sink a O message containing the name of its starting point. This message is augmented in each traversed node with the information necessary to retrace the itinerary in the opposite direction. These messages are kept in the sink and are used to establish the route of messages to be distributed. n the Peer to Peer mode, a message is first sent to the sink, and from there to its destination. f the nodes have enough memory to keep locally the information contained in the O messages, there is no need to go by the sink if the collect and distribute itineraries have common links.

21 Slide 2 RP : aintaining the O Basic mechanism: ach node sends O messages to its neighbors When they receive O messages from their parents When their local trickle timer expires These O messages inform children bout nodes leaving the O (rank = ) bout rank and/or cost changes These O messages can cause O repairs The trickle timer is a timer with variable period. Whenever a change occurs the period decreases f no changes the period increases 2 Os are maintained by means of O messages. These messages, issued by the root or by any node inform the children of each node of any changes that have occurred between that node and the root. This can be simple variations in the value of the cost function, it can be more important changes that cause a node to change its rank, possibly forcing other nodes to also change their rank (children need to have a rank higher than their parents). When a node wants to leave a O (for instance when its battery gets low), it broadcasts an infinite rank, forcing all children to choose other parents. The trickle timers ensure that the O structure is periodically checked by means of O messages. f links and nodes are stable the period of the trickle timers increases progressively up to a maximum value. When changes occur, that period returns to its minimum value, to ensure fast adaptations of the O to new conditions.

22 Slide 22 The TX cost function TX = stimated number of transmissions from x to y. = umber of times a frame needs to be transmitted over a link before being acknowledged. = (d xy x d yx ) - d xy = success rate from x to y. ach node broadcasts precisely once per second a short message, each receiver counts during 0 seconds the number of broadcasts it receives from each neighbor. d xy = (number of frames received from x by y) / 0 n the ontikimac R protocol, the number of times a frame is retransmitted is counted and averaged. This is used as TX. 22 The TX cost function has been introduced in 2003 and is considered a good cost function for multi-hop radio networks. t can easily be measured during network operation, it gives a realistic estimation of the amount of energy used for transmission. Reference: ouglas S. J. e outo, aniel guayo, John Bicket and Robert orris: igh- Throughput Path etric for ulti-op Wireless Routing, in the proceedings of obiom 03, September 4 9, 2003, San iego, alifornia, US.

23 Slide 23 ac ayer optimization for RP Synchronize receiver wake-ups to minimize latency along specific routes. Wake-up = t0 - δt Wake-up = t0-3δt Wake-up = t0 4δt / 4/4 3 0/0 2 / 2/2 /2 2/3 Wake-up = t0-2δt Wake-up = t0-3δt 23 f mostly collect or distribute traffic exists, most messages follow a predictable path determined by a O. This could be used to minimize message latency in a network using Radio uty ycling to optimize power usage. The protocol proposes to schedule the wake up periods of receivers along the paths taken by messages, so that on a multi-hop route, waiting times for receiver wake-ups should be minimized. The ontikimac protocol could be modified to schedule receiver wake-ups along O routes to minimize wake up waiting. For collect traffic, the wake-up times should follow the ranks of the nodes. Reference: ang u, Bhaskar Krishnamachari, auligi S. Raghavendra: n daptive nergy-fficient andow-atency for ata athering in Wireless Sensor etworks, Proceedings of the 8th nternational Parallel and istributed Processing Symposium (PPS 04), 2004.

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain

More information

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services

Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services Routing in the Internet of Things (IoT) Rolland Vida Convergent Networks and Services Spring 05. IoT challenges IoT nodes are heterogeneous Some have important resources Smart phones, cars, coke machines

More information

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR d oc On-emand istance Vector (OV) R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts

More information

Mobile Communications

Mobile Communications Mobile Communications Wireless Personal Area Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 IEEE Standards 2 IEEE 802.15.4 Wireless PAN (Sensor Networks) 3 Information Current

More information

Dynamic Source Routing (DSR) [Johnson96]

Dynamic Source Routing (DSR) [Johnson96] ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom

More information

RPL: Routing for IoT. Bardh Prenkaj Dept. of Computer Science. Internet of Things A.A

RPL: Routing for IoT. Bardh Prenkaj Dept. of Computer Science. Internet of Things A.A RPL: Routing for IoT Bardh Prenkaj Dept. of Computer Science Internet of Things A.A. 17-18 1 Overview Protocol scenario description Design principles of the protocol Fundamental terminology to understand

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks https://www.kth.se/social/course/el2745/ Lecture 6 Routing Carlo Fischione Associate Professor of Sensor Networks e-mail:carlofi@kth.se http://www.ee.kth.se/ carlofi/

More information

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C obile ad hoc networks Standard obile needs an infrastructure ome gent/oreign gent in the fixed network S, routing, etc., are not designed for mobility Sometimes there is no infrastructure! remote areas,

More information

Study of RPL DODAG Version Attacks

Study of RPL DODAG Version Attacks Study of RPL DODAG Version Attacks Anthéa Mayzaud anthea.mayzaud@inria.fr Rémi Badonnel Isabelle Chrisment Anuj Sehgal s.anuj@jacobs-university.de Jürgen Schönwälder IFIP AIMS 2014 Brno, Czech Republik

More information

Routing over Low Power and Lossy Networks

Routing over Low Power and Lossy Networks outing over Low Power and Lossy Networks Analysis and possible enhancements of the IETF PL routing protocol Enzo Mingozzi Associate Professor @ University of Pisa e.mingozzi@iet.unipi.it outing over LLNs

More information

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET) 173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure

More information

Wireless Internet Routing

Wireless Internet Routing Wireless nternet Routing Wireless Routing in the eginning 1 Wireless nternet Routing This course: routing in T/ad hoc networks and mesh networks o nternet? = ateway(s) wireless/wired 2 1 Outline Review

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016 estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra

More information

Wireless Sensor Networks Module 2: Routing

Wireless Sensor Networks Module 2: Routing Wireless Sensor Networks Module 2: Routing Dr.-Ing. Koojana Kuladinithi, TZI, University of Bremen koo@comnets.uni-bremen.de Contents Module 2: Routing in WSNs Introduction L2 Forwarding (Mesh-Under) vs

More information

The Basics of Wireless Communication Octav Chipara

The Basics of Wireless Communication Octav Chipara The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2

More information

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET) 173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)

More information

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP epartment of lectrical ngineering and omputer Sciences University of alifornia erkeley '!$$( network defined over another set of networks The overlay addresses its own nodes Links on one layer are network

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols 173/S152, Winter 2006 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV Hybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and

More information

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding Now rriving at Layer Packet orwarding although layer switches and layer routers are similar in many ways and TM/Virtual are used at layer these days 9/7/6 S/ 48 - UIU, all 6 9/7/6 S/ 48 - UIU, all 6 Layers

More information

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6 estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5 ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom

More information

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e

More information

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols 173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state

More information

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni 3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides

More information

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

More information

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols

Top-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features

More information

Principles of Wireless Sensor Networks

Principles of Wireless Sensor Networks Principles of Wireless Sensor Networks www.kth.se/student/program-kurser/kurshemsidor/kurshemsidor/control/el2745 Lecture 6 Stockholm, February 6, 2012 Carlo Fischione Royal Institute of Technology - KTH

More information

UNIT 6. Routing and Routing Protocols

UNIT 6. Routing and Routing Protocols 6 Routing and Routing Protocols 2005-200 P ransmission ontrol Protocol is a connection oriented layer 4 networking protocol an handle multiple sessions and applications based on the port number ses flow

More information

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190

OSPF Protocol Overview on page 187. OSPF Standards on page 188. OSPF Area Terminology on page 188. OSPF Routing Algorithm on page 190 Chapter 17 OSPF Protocol Overview The Open Shortest Path First (OSPF) protocol is an interior gateway protocol (IGP) that routes packets within a single autonomous system (AS). OSPF uses link-state information

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Link Estimation and Tree Routing

Link Estimation and Tree Routing Network Embedded Systems Sensor Networks Link Estimation and Tree Routing 1 Marcus Chang, mchang@cs.jhu.edu Slides: Andreas Terzis Outline Link quality estimation Examples of link metrics Four-Bit Wireless

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Setup Ad Hoc Routing Protocol over On-Demand Backup Node

Setup Ad Hoc Routing Protocol over On-Demand Backup Node etup d oc Routing Protocol over On-emand ackup ode Ying-ong Wang, hi ing hung, hih-hieh huang epartment of omputer cience and nformation ngineering, Tamang University 151 Ying-chuan Road, Tamsui 25137,

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast benefits and applications 4 Multicast models

More information

Routing for IoT and Sensor Systems

Routing for IoT and Sensor Systems Facoltà di Ingegneria dell Informazione, Informatica e Statistica Internet of Things A.Y. 2017/18 Routing for IoT and Sensor Systems Federico Ceccarelli PhD Student 1 The Collection Tree Protocol (CTP)

More information

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast

Multicast overview. Introduction to multicast. Information transmission techniques. Unicast Contents Multicast overview 1 Introduction to multicast 1 Information transmission techniques 1 Multicast features 3 Common notations in multicast 4 Multicast advantages and applications 4 Multicast models

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice

Hierarchical Routing. Our routing study thus far - idealization all routers identical network flat not true in practice Hierarchical Routing Our routing study thus far - idealization all routers identical network flat not true in practice scale: with 200 million destinations: can t store all destinations in routing tables!

More information

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis

Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Multi Hop Send Protocol Tool for TinyNodes Semesterthesis Author: Supervisor: Tutor: Remo Niedermann Prof. Dr. Roger Wattenhofer Roland Flury Zurich, February 19, 2009 Acknowledgment At first I want to

More information

RPL- Routing over Low Power and Lossy Networks

RPL- Routing over Low Power and Lossy Networks RPL- Routing over Low Power and Lossy Networks Michael Richardson Ines Robles IETF 94 Questions to answers today 1. What is a low power/lossy network? How does that relate to IoT? 2. What is RPL and how

More information

The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments

The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments The P2P-RPL Routing Protocol for IPv6 Sensor Networks: Testbed Experiments Emmanuel Baccelli, Matthias Philipp INRIA Saclay, France E-mail: name.lastname@inria.fr Mukul Goyal UWM, USA E-mail: mukul@uwm.edu

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting

More information

The Internet vs. Sensor Nets

The Internet vs. Sensor Nets The Internet vs. Sensor Nets, Philip Levis 5/5/04 0 The Internet vs. Sensor Nets What they ve learned, Philip Levis 5/5/04 1 The Internet vs. Sensor Nets What they ve learned, and we ve forgotten. Philip

More information

Wireless Sensor Networks, energy efficiency and path recovery

Wireless Sensor Networks, energy efficiency and path recovery Wireless Sensor Networks, energy efficiency and path recovery PhD dissertation Anne-Lena Kampen Trondheim 18 th of May 2017 Outline Introduction to Wireless Sensor Networks WSN Challenges investigated

More information

INTERNATIONAL JOURNAL OF COMMUNICATIONS Volume 12, Performance comparative analysis of LOADing-CTP and RPL routing protocols for LLNs

INTERNATIONAL JOURNAL OF COMMUNICATIONS Volume 12, Performance comparative analysis of LOADing-CTP and RPL routing protocols for LLNs Performance comparative analysis of LOADing-CTP and routing protocols for LLNs Belghachi Mohammed, Feham Mohamed Abstract Low Power and Lossy Networks (LLNs) represent one of the interesting research areas

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN

Politecnico di Milano Advanced Network Technologies Laboratory. 6LowPAN Politecnico di Milano Advanced Network Technologies Laboratory 6LowPAN ACKs o Slide/Figures Sources n IPSO Alliance Webinar 6LowPAN for IP Smart Objects n 6LoWPAN: The Wireless Embedded Internet, Shelby

More information

Configuring Virtual Private LAN Services

Configuring Virtual Private LAN Services Virtual Private LAN Services (VPLS) enables enterprises to link together their Ethernet-based LANs from multiple sites via the infrastructure provided by their service provider. This module explains VPLS

More information

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols Outline Medium ccess ontrol With oordinated daptive Sleeping for Wireless Sensor Networks Presented by: rik rooks Introduction to M S-M Overview S-M Evaluation ritique omparison to MW Washington University

More information

Routing In Ad Hoc Networks

Routing In Ad Hoc Networks Routing n d oc Networks ontents 1. ntroduction to ad-hoc networks 2. Proactive routing protocols OLR 3. Reactive routing protocols R, OV 4. Non-uniform routing protocols ZRP, R 5. Other approaches eographical

More information

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 SIM Distributed Systems Chapter 4 - Communication CSCI319 Chapter 4 Page: 1 Communication Lecture notes based on the textbook by Tannenbaum Study objectives:

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) Today s Lecture ICMP (Internet Control Message Protocol) Internet Protocols CSC / C 573 I. ICMP Overview II. ICMP rror Reporting III. ICMP Query / Response Messages IV. ICMP Message Processing Fall, 2005

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden

Towards a Sensor Network Architecture: Issues and Challenges. Muneeb Ali LUMS, Pakistan SICS, Sweden Towards a Sensor Network Architecture: Issues and Challenges Muneeb Ali LUMS, Pakistan SICS, Sweden Talk at Knuth SICS, Sweden, November 2005 Outline Introduction Internet vs Sensor Networks Towards a

More information

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL

Principles of Wireless Sensor Networks. Routing, Zigbee, and RPL http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 8 Stockholm, November 11, 2011 Routing, Zigbee, and RPL Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se

More information

Previous Lecture. Link Layer & Network Layer. Link Layer. This Lecture. Framing. Sending bits. Chapter 7.C and 7.D

Previous Lecture. Link Layer & Network Layer. Link Layer. This Lecture. Framing. Sending bits. Chapter 7.C and 7.D hapter 7. and 7. Previous Lecture Layer & Network Layer The network is organized into layers Prof. ina Katabi Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari alakrishnan,

More information

IPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6

IPv6 PIM-DM configuration example 36 IPv6 PIM-SM non-scoped zone configuration example 39 IPv6 PIM-SM admin-scoped zone configuration example 42 IPv6 Contents Configuring IPv6 PIM 1 Overview 1 IPv6 PIM-DM overview 1 IPv6 PIM-SM overview 3 IPv6 BIDIR-PIM overview 8 IPv6 administrative scoping overview 11 IPv6 PIM-SSM overview 13 Relationship among IPv6

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers

RIP Configuration. RIP Overview. Operation of RIP. Introduction. RIP routing table. RIP timers Table of Contents RIP Configuration 1 RIP Overview 1 Operation of RIP 1 Operation of RIP 2 RIP Version 2 RIP Message Format 3 Protocols and Standards 4 Configuring RIP Basic Functions 5 Configuration Prerequisites

More information

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE ) Reference: 6LoWPAN: The Wireless Embedded Internet, Shelby & Bormann What is 6LoWPAN? 6LoWPAN makes this possible - Low-power RF + IPv6 = The Wireless Embedded Internet IPv6 over Low-Power wireless Area

More information

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov kurssit/elt-53306/

WPAN/WBANs: ZigBee. Dmitri A. Moltchanov    kurssit/elt-53306/ WPAN/WBANs: ZigBee Dmitri A. Moltchanov E-mail: dmitri.moltchanov@tut.fi http://www.cs.tut.fi/ kurssit/elt-53306/ IEEE 802.15 WG breakdown; ZigBee Comparison with other technologies; PHY and MAC; Network

More information

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or

4.2 Multicast IP supports multicast to support one-to-many (radio, news, IP multicast was originally a many-to-many (any source MC or CS475 Networks Lecture 14 Chapter 4 Advanced Internetworking Assignments Reading for Lecture 15: Sections 5.1-5.2 Homework 5, Wireshark Project 3 posted, due next Thursday; Programming Project 3 posted,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

IP Multicast Technology Overview

IP Multicast Technology Overview IP multicast is a bandwidth-conserving technology that reduces traffic by delivering a single stream of information simultaneously to potentially thousands of businesses and homes. Applications that take

More information

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich iscussion 8: Link State Routing S : omputer Networks Marti Motoyama & hris Kanich Schedule Project Questions: mail hris, post to moodle, or attend his OH Homework Questions? Link State iscussion S iscussion

More information

Routing Overview for Firepower Threat Defense

Routing Overview for Firepower Threat Defense Path Determination This chapter describes underlying concepts of how routing behaves within the Cisco Firepower Threat Defense, and the routing protocols that are supported. Routing is the act of moving

More information

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 4 RPL and 6LoWPAN Protocols. Chapter-4 L04: Internet of Things , Raj Kamal, Publs.: McGraw-Hill Education Lesson 4 RPL and 6LoWPAN Protocols 1 RPL [Ipv6 Routing Protocol For Low Power Lossy Networks (LLNs)] 2 LLN A constrained nodes network Low data transfer rate Low packet delivery rate in comparison to IP

More information

Computer Networks. Routing Algorithms

Computer Networks. Routing Algorithms Computer Networks Routing Algorithms Topics Routing Algorithms Shortest Path (Dijkstra Algorithm) Distance Vector Routing Count to infinity problem Solutions for count to infinity problem Link State Routing

More information

MAC Protocol for Reducing Control Packet Overhead in Underwater Acoustic Networks

MAC Protocol for Reducing Control Packet Overhead in Underwater Acoustic Networks International Journal of pplied ngineering esearch I 0973-4562 Volume 12, umber 15 (2017) pp. 4886-4892 esearch India Publications. http://www.ripublication.com MC Protocol for educing Control Packet Overhead

More information

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra) ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor

More information

UNIT 2 ROUTING ALGORITHMS

UNIT 2 ROUTING ALGORITHMS UNIT ROUTING ALGORITHMS Routing Algorithms Structure Page Nos..0 Introduction 3. Objectives 3. Flooding 3.3 Shortest Path Routing Algorithm 5.4 Distance Vector Routing 6.4. Comparison.4. The Count-to-Infinity

More information

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER

GRE and DM VPNs. Understanding the GRE Modes Page CHAPTER CHAPTER 23 You can configure Generic Routing Encapsulation (GRE) and Dynamic Multipoint (DM) VPNs that include GRE mode configurations. You can configure IPsec GRE VPNs for hub-and-spoke, point-to-point,

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

Edge Control Transport for LRP

Edge Control Transport for LRP Edge Control Transport for LRP September 2017 Paul Bottorff, Network System Architect, Aruba CTO s Office Paul.Bottorff@hpe.com Link-local Registration Protocol Choices Draft 1.0 is based on an IS-IS-like

More information

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP).

Auxiliary protocols. tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Auxiliary protocols IP is helped by a number of protocols that perform specific tasks that IP does not handle: Routing table management (RIP, OSPF, etc.). Congestion and error reporting (ICMP). Multicasting

More information

Table of Contents 1 PIM Configuration 1-1

Table of Contents 1 PIM Configuration 1-1 Table of Contents 1 PIM Configuration 1-1 PIM Overview 1-1 Introduction to PIM-DM 1-2 How PIM-DM Works 1-2 Introduction to PIM-SM 1-4 How PIM-SM Works 1-5 Introduction to Administrative Scoping in PIM-SM

More information

ICMP (Internet Control Message Protocol)

ICMP (Internet Control Message Protocol) ABSTRACT : ICMP stands for internet control message protocol it is a vital protocol of network layer among the seven layers of OSI(open system interconnection). Here we deal with the several situations

More information

Advanced Networking: Routing & Switching 2 Chapter 7

Advanced Networking: Routing & Switching 2 Chapter 7 EIGRP Advanced Networking: Routing & Switching 2 Chapter 7 Copyleft 2014 Hacklab Cosenza (http://hlcs.it) Released under Creative Commons License 3.0 By-Sa Cisco name, logo and materials are Copyright

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Original slides by Cisco Press & Priscilla Oppenheimer Selection Criteria for Switching and Routing Protocols Network traffic

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions

GIAN Course on Distributed Network Algorithms. Spanning Tree Constructions GIAN Course on Distributed Network Algorithms Spanning Tree Constructions Stefan Schmid @ T-Labs, 2011 Spanning Trees Attactive infrastructure : sparse subgraph ( loop-free backbone ) connecting all nodes.

More information

Outline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate.

Outline. Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler. Motivation. Applications. Mate. Outline Mate: A Tiny Virtual Machine for Sensor Networks Philip Levis and David Culler Presented by Mark Tamola CSE 521 Fall 2004 Motivation Mate Code Propagation Conclusions & Critiques 1 2 Motivation

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging) S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS FALL FINAL January 5, minutes. Name: Student No: TOT S 421: OMPUTR NTWORKS ALL 2006 INAL January 5, 2007 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between

More information

An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility

An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility sensors Article An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility Jihong Park 1, Ki-Hyung Kim 2 and Kangseok Kim 2, * 1 Department of Computer Engineering,

More information

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018 S 3: omputer Networks 3: Routing lgorithms November, 08 Last class NT: Network ddress Translators: NT is mostly bad, but in some cases, it s a necessary evil. IPv6: Simpler, faster, better Tunneling: IPv6

More information

Outdoor Wi Fi Mesh Routing Protocol. Akshata Danivasa Alphonse Hansel Anthony Mani Pandian Vikas Iyer Vinesh Pallen

Outdoor Wi Fi Mesh Routing Protocol. Akshata Danivasa Alphonse Hansel Anthony Mani Pandian Vikas Iyer Vinesh Pallen OutdoorWi FiMeshRoutingProtocol AkshataDanivasa AlphonseHanselAnthony ManiPandian VikasIyer VineshPallen 1 Contents 1. Abstract 3 2. Introduction. 4 3. Related Work 5 4. Problem Formulation 6 5. MODEL

More information