Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Similar documents
Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Unicast Routing in Mobile Ad Hoc Networks

Dynamic Source Routing (DSR) [Johnson96]

Wireless Internet Routing

Wireless Networking & Mobile Computing

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Part I. Wireless Communication

Mobile Ad-Hoc Networks & Routing Algorithms

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

Routing In Ad Hoc Networks

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

LECTURE 9. Ad hoc Networks and Routing

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

Wireless Mul*hop Ad Hoc Networks

ECS-087: Mobile Computing

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

CMPE 257: Wireless and Mobile Networking

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Ad Hoc Networks: Introduction

CMPE 257: Wireless and Mobile Networking

Subject: Adhoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad-hoc Networks

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

The Basics of Wireless Communication Octav Chipara

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Multi-hop Technology: Ad-hoc Networks

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Setup Ad Hoc Routing Protocol over On-Demand Backup Node

(Wireless) Internet Routing. Review of Wireless Networking (with Routing in Mind)

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

AODV-PA: AODV with Path Accumulation

CS551 Ad-hoc Routing

Dynamic Source Routing in Ad Hoc Wireless Networks

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Routing Protocols in MANETs

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Mobile Ad Hoc Networks

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Ad Hoc Networks: Issues and Routing

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C

Performance Evaluation of AODV and DSR routing protocols in MANET

Overview (Advantages and Routing Protocols) of MANET

Secure Routing and Transmission Protocols for Ad Hoc Networks

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Arvind Krishnamurthy Fall 2003

Wireless Mesh Networks

Chapter 7 CONCLUSION

15-441: Computer Networking. Wireless Networking

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

CS5984 Mobile Computing

Performance of Route Caching Strategies in Dynamic Source Routing

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Survey - Energy Efficient Routing Protocols in MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Routing protocols in WSN

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

Routing Protocols in MANET: Comparative Study

Computation of Multiple Node Disjoint Paths

Adaptive routing for mobile ad hoc networks

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

2013, IJARCSSE All Rights Reserved Page 85

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

MAC LAYER. Murat Demirbas SUNY Buffalo

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Dynamic Source Routing in ad hoc wireless networks

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Performance Evaluation of MANET through NS2 Simulation

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Introduction to Mobile Ad hoc Networks (MANETs)

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

CHAPTER 2 LITERATURE REVIEW

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction

Location Awareness in Ad Hoc Wireless Mobile Neworks

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Caching Strategies in MANET Routing Protocols

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

A Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

SENSOR-MAC CASE STUDY

IN a mobile ad hoc network, nodes move arbitrarily.

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

ADB: An Efficient Multihop Broadcast Protocol Based on Asynchronous Duty-Cycling in Wireless Sensor Networks

Transcription:

173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure Routes between nodes may potentially contain multiple hops cknowledgment: elected slides from Prof. itin Vaidya Why? ase of deployment peed of deployment ecreased dependence on infrastructure 2 obile d oc etworks obile d oc etworks (T) ay need to traverse multiple links to reach a destination obility causes route changes 3 4 Page 1

any pplications any Variations (1) Personal area networking ell phone, laptop, ear phone, wrist watch ilitary environments oldiers, tanks, planes ivilian environments Taxi cab network eeting rooms ports stadiums oats, small aircraft mergency operations earch and rescue Policing and fire fighting ully ymmetric nvironment ll nodes have identical capabilities and responsibilities symmetric apabilities Transmission ranges and radios may differ attery life at different nodes may differ Processing capacity may be different at different nodes peed of movement symmetric Responsibilities Only some nodes may route packets ome nodes may act as leaders of nearby nodes (e.g., cluster head) 5 6 any Variations (2) Traffic characteristics may differ in different ad hoc networks it rate Timeliness constraints Reliability requirements Unicast / multicast / geocast ost based addressing / content based addressing / capability based addressing ay co exist (and co operate) with an infrastructure based network any Variations (3) obility patterns may be different People sitting at an airport lounge ew ork taxi cabs ids playing ilitary movements Personal area network obility characteristics peed Predictability irection of movement Pattern of movement Uniformity (or lack thereof) of mobility characteristics among different nodes 7 8 Page 2

hallenges idden Terminal Problem imited wireless transmission range roadcast nature of the wireless medium idden terminal problem (see next slide) Packet losses due to transmission errors obility induced route changes obility induced packet losses attery constraints Potentially frequent network partitions ase of snooping on wireless transmissions (security hazard) odes and cannot hear each other Transmissions by nodes and can collide at node odes and are hidden from each other 9 10 Research on T The oly rail Variations in capabilities & responsibilities X Variations in traffic characteristics, mobility models, etc. X Performance criteria (e.g., optimize throughput, reduce energy consumption) + ncreased research funding = ignificant research activity one size fits all solution Perhaps using an adaptive/hybrid approach that can adapt to situation at hand ifficult problem any solutions proposed trying to address a sub space of the problem domain ssumptions Unless stated otherwise, fully symmetric environment is assumed implicitly all nodes have identical capabilities and responsibilities 11 12 Page 3

Why is Routing in T different? Unicast Routing Protocols ost mobility link failure/repair due to mobility may have different characteristics than those due to other causes Rate of link failure/repair may be high when nodes move fast ew performance criteria may be used route stability despite mobility energy consumption any protocols have been proposed ome have been invented specifically for T Others are adapted from previously proposed protocols for wired networks o single protocol works well in all environments ome attempts made to develop adaptive protocols 13 14 lassification of Routing Protocols Trade Off Proactive protocols etermine routes independent of traffic pattern Traditional link state and distance vector routing protocols are proactive Reactive protocols aintain routes only if needed ybrid protocols Topology based vs. Position based (geographical) Traditional link state and distance vector are topologybased => learn about adjacencies with neighboring nodes Position based use geographical location (e.g., nodes with P receiver) to make routing decision, e.g., forward to nodes that are closer to destination atency of route discovery Proactive protocols may have lower latency since routes are maintained at all times Reactive protocols may have higher latency because a route from X to will be found only when X attempts to send to Overhead of route discovery/maintenance Reactive protocols may have lower overhead since routes are determined only if needed Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach achieves a better trade off depends on the traffic and mobility patterns (and hence, topology) 15 16 Page 4

Overview of Unicast Routing Protocols looding for ata elivery Reactive Protocols looding R R OV ost well-known T routing protocols ender broadcasts data packet P to all its neighbors ach node receiving P forwards P to its neighbors equence numbers used to avoid the possibility of forwarding the same packet more than once Packet P reaches destination provided that is reachable from sender ode does not forward the packet 18 looding for ata elivery looding for ata elivery roadcast transmission Represents a node that has received packet P Represents a node that receives packet P for the first time Represents that connected nodes are within each other s transmission range 19 Represents transmission of packet P 20 Page 5

looding for ata elivery looding for ata elivery ode receives packet P from two neighbors: potential for collision ode receives packet P from and, but does not forward it again, because node has already forwarded packet P once 21 22 looding for ata elivery looding for ata elivery odes and both broadcast packet P to node ince nodes and are hidden from each other, their transmissions may collide => Packet P may not be delivered to node at all, despite the use of flooding 23 ode does not forward packet P, because node is the intended destination of packet P 24 Page 6

looding for ata elivery looding for ata elivery looding completed odes unreachable from do not receive packet P (e.g., node ) odes for which all paths from go through the destination also do not receive packet P (example: node ) looding may deliver packets to too many nodes (in the worst case, all nodes reachable from sender may receive the packet) 25 26 looding: dvantages looding: isadvantages implicity ay be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher This scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions Potentially higher reliability of data delivery ecause packets may be delivered to the destination on multiple paths Potentially, very high overhead ata packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery looding uses broadcasting hard to implement reliable broadcast delivery without significantly increasing overhead roadcasting in 802.11 is unreliable n our example, nodes and may transmit to node simultaneously, resulting in loss of the packet n this case, destination would not receive the packet at all 27 28 Page 7

looding of ontrol Packets ynamic ource Routing (R) any protocols perform (potentially limited) flooding of control packets, instead of data packets The control packets are used to discover routes iscovered routes are subsequently used to send data packet(s) Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods [ohnson96] avid. ohnson and avid. altz. ynamic ource Routing in d oc Wireless etworks. n obile omputing, edited by Tomasz mielinski and ank orth, hapter 5, pages 153 181, luwer cademic Publishers, 1996. When node wants to send a packet to node, but does not know a route to, node initiates a route discovery ource node floods Route Request (RRQ) ach node appends own identifier when forwarding RRQ 29 30 Route iscovery in R Route iscovery in R roadcast transmission [] Represents a node that has received RRQ for from Represents transmission of RRQ 31 [X,] Represents list of identifiers appended to RRQ 32 Page 8

Route iscovery in R Route iscovery in R [,] [,] [,,] [,,] ode receives packet RRQ from two neighbors: potential for collision ode receives RRQ from and, but does not forward it again, because node has already forwarded RRQ once 33 34 Route iscovery in R Route iscovery in R [,,,] [,,,] [,,,,] odes and both broadcast RRQ to node ince nodes and are hidden from each other, their transmissions may collide 35 ode does not forward RRQ, because node is the intended target of the route discovery 36 Page 9

Route iscovery in R Route Reply in R estination on receiving the first RRQ, sends a Route Reply (RRP) RRP is sent on a route obtained by reversing the route appended to received RRQ RRP includes the route from to on which RRQ was received by node RRP [,,,,] Represents RRP control message 37 38 Route Reply in R Route Reply can be sent by reversing the route in Route Request (RRQ) only if links are guaranteed to be bi directional To ensure this, RRQ should be forwarded only if it received on a link that is known to be bi directional f unidirectional (asymmetric) links are allowed, then RRP may need a route discovery for from node Unless node already knows a route to node f a route discovery is initiated by for a route to, then the Route Reply is piggybacked on the Route Request from. f 802.11 is used to send data, then links have to be bi directional (since ck is used) ynamic ource Routing (R) ode on receiving RRP, caches the route included in the RRP When node sends a data packet to, the entire route is included in the packet header ence the name source routing ntermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded When to Perform a Route iscovery? When node wants to send data to node, but does not know a valid route node 39 40 Page 10

ata elivery in R R Optimization: Route aching T [,,,,] Packet header size grows with route length ach node caches a new route it learns by any means When node finds route [,,,,] to node, node also learns route [,,] to node When node receives Route Request [,,] destined for node, node learns route [,,,] to node When node forwards Route Reply RRP [,,,,], node learns route [,,] to node When node forwards ata [,,,,] it learns route [,,,] to node node may also learn a route when it overhears ata packets 41 42 Use of Route aching Use of Route aching When node learns that a route to node is broken, it uses another route from its local cache, if such a route to exists in its cache. Otherwise, node initiates route discovery by sending a route request ode X on receiving a Route Request for some node can send a Route Reply if node X knows a route to node [,,,,] [,] [,,,] [,,] [,,],[,,] [,,,] Use of route cache an speed up route discovery an reduce propagation of route requests [X,X,X] Represents cached route at a node (R maintains the cached routes in a tree format) 43 44 Page 11

Use of Route aching: an peed up Route iscovery Use of Route aching: an Reduce Propagation of Route Requests [,,,,] [,,,] [,,,] [,,] [,] [,,,] RRP RRQ When node sends a route request for node, node sends back a route reply [,,,] to node using a locally cached route [,,],[,,] 45 [,,,,] [,,,] [,,,] [,,] [,] [,,,] RRP RRQ ssume that there is no link between and. Route Reply (RRP) from node limits flooding of RRQ. n general, the reduction may be less dramatic. [,,],[,,] 46 Route rror (RRR) Route aching: eware! RRR [-] tale caches can adversely affect performance With passage of time and host mobility, cached routes may become invalid sender host may try several stale routes (obtained from local cache, or replied from cache by other nodes), before finding a good route sends a route error to along route --- when its attempt to forward the data packet (with route ) on - fails odes hearing RRR update their route cache to remove link - 47 48 Page 12

R: dvantages Routes maintained only between nodes who need to communicate reduces overhead of route maintenance Route caching can further reduce route discovery overhead single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches R: isadvantages Packet header size grows with route length due to source routing lood of route requests may potentially reach all nodes in the network are must be taken to avoid collisions between route requests propagated by neighboring nodes insertion of random delays before forwarding RRQ ncreased contention if too many route replies come back due to nodes replying using their local cache Route Reply torm problem Reply storm may be eased by preventing a node from sending RRP if it hears another RRP with a shorter route 49 50 R: isadvantages n intermediate node may send Route Reply using a stale cached route, thus polluting other caches This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. or some proposals for cache invalidation, see [u00obicom] tatic timeouts daptive timeouts based on link stability 51 Page 13