Routing in Variable Topology Networks

Similar documents
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Reactive Routing Overhead in Networks with Unreliable Nodes

LECTURE 9. Ad hoc Networks and Routing

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Computation of Multiple Node Disjoint Paths

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Wireless Networking & Mobile Computing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

AODV-PA: AODV with Path Accumulation

Quiz 5 Answers. CS 441 Spring 2017

CS551 Ad-hoc Routing

CMPE 257: Wireless and Mobile Networking

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Mitigating Superfluous Flooding of Control Packets MANET

Routing Protocols in MANETs

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Mobile Ad-Hoc Networks & Routing Algorithms

Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Mobile Ad-hoc Networks (MANET)

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

3. Evaluation of Selected Tree and Mesh based Routing Protocols

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

ECS-087: Mobile Computing

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Evaluation of MANET through NS2 Simulation

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Analysis of Routing Protocols in MANETs

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

Keywords: AODV, MANET, WRP

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

Scalability of Routing Methods in Ad Hoc Networks

Ad Hoc Routing Protocols and Issues

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

CMPE 257: Wireless and Mobile Networking

Performance Analysis of Three Routing Protocols for Varying MANET Size

Figure 1: Ad-Hoc routing protocols.

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Power aware Multi-path Routing Protocol for MANETS

Secure routing in ad hoc and sensor networks

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Routing protocols in Mobile Ad Hoc Network

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Recent Researches in Communications, Information Science and Education

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Performance Evaluation of AODV and DSR routing protocols in MANET

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Arvind Krishnamurthy Fall 2003

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

An Efficient Probability Based Broadcast Scheme for AODV Mobile ad-hoc Network Protocol

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU)

PERFORMANCE COMPARISON OF AODV/DSR ON-DEMAND ROUTING PROTOCOLS FOR AD HOC NETWORKS Bhavesh Kataria 1, Jethva Harikrishna 2

Analysis of TCP and UDP Traffic in MANETs. Thomas D. Dyer Rajendra V. Boppana CS Department UT San Antonio

Overhead Reduction and Performance Enhancement of AODV and DSR Routing Protocols

Evaluation of Power Aware Routing Protocols Mohammad Mahmud. Wireless Networks Professor: Dr. Lijun Qian

A Simulation study : Performance comparison of AODV and DSR

The Performance of MANET Routing Protocols for Scalable Video Communication

A Survey - Energy Efficient Routing Protocols in MANET

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Performance Evaluation and Comparison of AODV and AOMDV

Aanchal Walia #1, Pushparaj Pal *2

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

IMPLEMENTATION OF DYMO ROUTING PROTOCOL

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

Performance Evaluation of Dynamic Source Routing Protocol (DSR) on WSN

2013, IJARCSSE All Rights Reserved Page 85

Transcription:

Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute

Variable Topology Networks P2P networks for distributed resource sharing: File sharing: Gnutella, Freenet,..etc. or CPU sharing: Globus, BlueGrid. Topology changes: resources (e.g. peers, files, etc.) appear/ disappear. Find (discover) where the resource is. Allocate jobs to resources so as to maximize/minimize some performance measure. Sensor/actuation networks Topology changes: unreliable nodes (turn ON/OFF randomly) and random dynamic environment (e.g. winds). Need to disseminate information to/from the sensors/sinks. Mobile ad-hoc networks Topology changes: continuous node movement Need to discover a peer/destination. 2

Single-Path Routing in Ad-hoc Networks Assumptions Stationary but unreliable nodes representing an unreliable sensor network, nodes turn ON/OFF randomly an unreliable computing grid, random service interruptions A state-full reactive routing protocol is used Fundamental Question: What is the interplay between application-level traffic requirements, network topology (e.g. node density and size) and routing overhead? Can a state-full routing protocol be infinitely scalable? We will consider Regular or Random Node placement Flat Routing 3

Traffic and Routing Scalability Argument: If all nodes communicate with all other nodes with equal probability, routing overhead grows without bound as N grows. If nodes tend to communicate with nearby nodes, will the routing overhead be bounded (i.e. O(1)) as Nà? But we still want to keep the model that any node can communicate with any other node. 4

Network Model A Manhattan grid (degree 4 graph). Nodes turn ON/OFF randomly. Network is always connected. Communication probability as a function of the distance between nodes Two nodes i and j at a distance ri, j hops have an active path (i.e. I = 1) with probability PI [ = 1] = Pr ( ij, ) = c rk c is a scaling contant ij, k is a design-controlled constant What is the minimum k to guarantee scalable operation? 5

Summary of Results For a given node, compute E[S i ] := average number of sessions initiated by the node E[S t ] := average number of sessions destined to the node E[S r ] := average number of sessions passing through the node T(a) := Min Time To Live T such that the probability of not finding the destination node is less than a small value a E[N find ]:= average number of RREQ packets E[N off ] := average number of RERR packets 6

Flooding of Control Packets Many protocols perform (potentially limited) flooding of control packets (instead of data packets) to discover routes (paths) Discovered routes are subsequently used to send data Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods E.g. DSR and AODV 7

Dynamic Source Routing (DSR) [Johnson96] Initiated when node S wants to send data to node D, but does not know a valid route node D, node S initiates a route discovery by flooding the network with a Route Request (RREQ) packet Each node appends own identifier when forwarding RREQ Destination D on receiving the first RREQ, sends a Route Reply (RREP) RREP is sent on a route obtained by reversing the route appended to received RREQ RREP includes the route from S to D on which RREQ was received by node D 8

Ad Hoc On-Demand Distance Vector Routing (AODV) [Perkins99Wmcsa] DSR includes source routes in packet headers Resulting large headers can sometimes degrade performance, particularly when packet payload is small AODV attempts to improve on DSR by maintaining routing tables at the nodes, so that data packets do not have to contain routes RREQ/RREP packets are forwarded similar to DSR 9

Route Caching Each node caches a new route it learns by any means* Node X on receiving a Route Request for some node D can send a Route Reply if node X knows a route to node D Use of route cache can speed up route discovery can reduce propagation of route requests 10

Note on Route Error Notification Two paths as shown, and node B fails. Two modes: Source-route error notification (e.g. DSR): node D receives two RERR packets from C, one for each route Distance-vector error notification (e.g. AODV): node D receives only one RERR from C. 11

TTL Optimizations: Expanding Ring Search TTL field is initialized to some value which is the maximum number of hops that the packet should travel Every intermediate node decrements this field by one. If the value of the field is zero, the packet is dropped. Route Requests are initially sent with small Time-to-Live (TTL) field, to limit their propagation DSR also includes a similar optimization If no Route Reply is received, then larger TTL tried 12

Summary of Results For a given node, compute E[S i ] := average number of sessions initiated by the node E[S t ] := average number of sessions destined to the node E[S r ] := average number of sessions passing through the node T(a) := Min Time To Live T such that the probability of not finding the destination node is less than a small value a E[N find ]:= average number of RREQ packets E[N off ] := average number of RERR packets 13

1 d T i k 1 k 1 d = 1 d k 1 d=+ i 1 ( α) = min α ; > 2 ES [ ] = 4 c* f( k 1); k> 2 t ES [ ] = 4 c*( f( k 2) f( k 1)); k> 3 r ES [ ] = 4 c*( f( k 2) + f( k 1)); k> 3 Summary of Results For an (infinite network) Nà : N find EN [ ] = 4 c*( f( k 2) f( k 1)); k> 3 off = 1+ 2 T( T 1) (local repair with src route notif.) EN [ ] = 4 c*( f( k 3) f( k 2)); k> 4 off (src route notif.) p r = 1 2 f( k 1) f( k 2) + f( k 1) where 1 f( k) @ k d d = 1 Main Result: k>4 necessary for bounded overhead. 14

Validations Through Simulations We use ns-2 simulator with CMU s ad-hoc networks extensions (MAC 802.11, Omni antenna, etc.) Purpose: Validate the dependencies (trends) rather than absolute values Difficulty: Cannot simulate too large neworks Networks of size N=49, 121, 225, 361 and 529 Use CBR N Each point represents average of 5 runs with same topology but different random traffic seed Sum from 1 till the network diameter 15

E[S t ] k>2 16

E[S] k>3 17

p r 18

E[N off ] Average notification packets per node failure k>4 20 18 16 14 12 10 8 6 4 2 DSR k=3 DSR k=4 Theory k=3 Theory k=4 0 0 100 200 300 400 500 600 Number of nodes 19

T( ) k>2 k=2 20

T( ) 1 Successful percentage of finding paths 0.95 0.9 0.85 0.8 0.75 0.7 0.65 N=49 N=225 N=529 Theory 0.6 0 2 4 6 8 10 12 TTL (hop) k=3 k=3 21

T( ) k>2 k=4 22

where More Realistic Network Model n ( λa) λa PN ( n) = e n! c 0 i j r < r k r1 Pr ( i, j) = c r k i, j r1 ri, j h i, j 0 r β r i, j 0 c r k 1, 1 Y (m) 900 800 700 600 500 400 300 200 100 Random graph topology example, N=49, degree=10 0 0 200 400 600 800 1000 X (m) Random distribution (Poisson Field) with average degree 10 (above conectivity threshold) 23

Validations Through Simulations We use ns-2 simulator with CMU s ad-hoc networks extensions (MAC 802.11, Omni antenna, etc.) Purpose: Validate the dependencies (trends) Difficulty: Cannot simulate too large neworks Networks of size N=49, 121, 225, 361 and 529 For random topologies, choose area A, average degree g g : Θ(log N) A = 2 π rn 0 g r 0 = 250m. 24

E[S t ] k>2 25

E[N off ] k>3 26

E[N off ] k>4 27