Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Similar documents
Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Tietokoneverkot T

Routing Protocols in MANETs

Wireless Networking & Mobile Computing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

LECTURE 9. Ad hoc Networks and Routing

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Introduction to Mobile Ad hoc Networks (MANETs)

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

2013, IJARCSSE All Rights Reserved Page 85

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Routing Protocols in Mobile Ad-Hoc Network

ECS-087: Mobile Computing

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Routing protocols in Mobile Ad Hoc Network

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

LOCATION-AIDED ROUTING PROTOCOL IN HYBRID WIRED-WIRELESS NETWORKS. WU MINTAO (B.Eng.(Hons.), NTU)

Mobile Communications. Ad-hoc and Mesh Networks

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

CS5984 Mobile Computing

Performance Evaluation of AODV and DSR routing protocols in MANET

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Location Awareness in Ad Hoc Wireless Mobile Neworks

Routing Protocols in MANET: Comparative Study

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

CMPE 257: Wireless and Mobile Networking

Ad Hoc Networks. Mobile Communication Networks (RCSE) Winter Semester 2012/13. Integrated Communication Systems Group Ilmenau University of Technology

CS551 Ad-hoc Routing

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Performance Analysis of MANET Routing Protocols OLSR and AODV

Mobile Ad-Hoc Networks & Routing Algorithms

Quiz 5 Answers. CS 441 Spring 2017

Figure 1: Ad-Hoc routing protocols.

Routing protocols in WSN

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Performance Evaluation of MANET through NS2 Simulation

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

WSN Routing Protocols

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Ad Hoc Routing Protocols and Issues

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

A Survey on Path Weight Based routing Over Wireless Mesh Networks

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

The General Analysis of Proactive Protocols DSDV, FSR and WRP

IEEE s ESS Mesh Networking

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Chapter-2 Routing Protocols of MANET

CHAPTER 2 LITERATURE REVIEW

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Banwari, Deepanshu Sharma, Deepak Upadhyay

EZR: Enhanced Zone Based Routing In Manet

DYNAMIC VIRTUAL BACKBONE ROUTING PROTOCOL: A HYBRID ROUTING PROTOCOL FOR ADHOC NETWORKS

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Ad Hoc Networks: Introduction

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Performance Evaluation of Various Routing Protocols in MANET

Performance Analysis of Aodv Protocol under Black Hole Attack

ROUTING PROTOCOLS FOR MANETs

Mobile Ad-hoc Networks (MANET)

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Chapter 7 CONCLUSION

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

Ad hoc Network Routing Wireless Systems, a.a 2015/2016

Chapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Part I. Wireless Communication

Keywords: - MANETs, Unicast, Network, Classification, Routing

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol

Computation of Multiple Node Disjoint Paths

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

Ad Hoc Networks: Issues and Routing

A Review on Black Hole Attack in MANET

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Wireless Mesh Networks

Transcription:

Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof. Dr. Dieter Hogrefe Prof. Dr. Xiaoming Fu mk2@cs.uni-goettingen.de Infrastructure-based Infrastructureless 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 2 Characteristics Infrastructure-based Networks Fixed backbone Nodes communicate with access point Suitable for areas where APs are provided Applications of Ad Hoc Networks Vehicular ad hoc networks Wireless sensor networks user groups (conferences, search and rescue, military, ) Infrastructureless Networks Without any backbone and access point Every station is simultaneously router 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 3 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 4

Ad Hoc Networks: Pros and Cons Advantages Connectivity in areas without fixed infrastructure Reduced administrative costs Self-organizing, fast and easy deployed Challenges All network entities may be mobile; very dynamic topology No central entities; operation in completely distributed manner Characteristics of Ad Hoc Networks Nodes limited resources dynamic topology Address assignment Wireless channels relatively high error rate high variability in the quality low bandwidth broadcast nature security aspect 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 5 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 6 Address assignment Since there is no DHCP server in ad hoc networks, there must be a special protocol address distribution and management The protocol must have the following features: Avoidance of address conflicts Addressing only during the stay of the node in the network New nodes should be refused only if all of the addresses are dedicated Possibility of merging networks Considering authorisation Address assignment: e.g. Buddy system (I) At the beginning there is only one node, A, in the network that has the entire pool of IP addresses When an un-configured node, B, wishes to join a network, it requests the nearest configured neighbor node for an IP address Node A assigns an IP address from its pool to the requesting node B, dividing its pool into two parts and gives one half to the requesting node B 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 7 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 8

Buddy system (II) A node can leave the network either gracefully or abruptly When node A leaves a network gracefully, it gives its address pool to any node nearby (e.g. to the buddy node which owns the other half) when a node leaves the network abruptly it results in an IP address hole; because there is some IP addresses which are neither assigned to any node nor available for assignment to an un-configured node Buddy system (III) Nodes synchronize from time to time to keep track of the IP addresses assigned and detect any holes in the available pool of IP addresses. Every node keeps a record of all the IP address blocks in the network by maintaining a table similar to this: Literatures: http://www.utdallas.edu/~mmohsin/publications/ipassignment.pdf http://www.acticom.de/fileadmin/data/publications/wwrf6_white.pdf 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 9 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 10 Routing Protocols A routing protocol is needed to discover routes from sender to receiver The routing protocol should have this characteristics: Autonomous self-starting operation Minimal overhead of control functions Routing functionality over multiple hops Managing the dynamic topology Preventing loops in discovered routes Two existing routing methods (I) Proactive routing protocols Each node maintains routes to every other node Periodically and/or event-based exchange of routing information Examples: DSDV: Destination Secuenced Distance Vector routing TBRPF: Topology Broadcast based on Reverse Path Forwarding OLSR: Optimized Link State Routing 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 11 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 12

Two existing routing methods (II) Reactive (on-demand) routing protocols: Sources initiate route discovery on-demand Only active routes are managed Usually less control overhead, and better scalability than proactive routings Disadvantage: latency due to route calculation before communication Examples: AODV: Ad hoc On-demand Distance Vector routing DSR: Dynamic Source Routing DSDV: Destination Secuenced Distance Vector routing Proactive Each node maintains a route for every node in the network in its routing table <dest-addr, dest-seq#, next-hop, hop-count, install-time> Each node manages the sequence numbers for its own routes Update with every new information of network changes Guarantee loop free routes 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 13 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 14 DSDV: Routing Updates Each node sends a periodic update to its neighbors The update contains its own dest-seq# and other routing information for the destination < dest-addr, dest-seq#, hop-count > Also each node sends routing table updates caused by important changes in the network (e.g. link failure) When a node receives two routes to the same destination from two neighbors it would: Choose the route with the largest sequence number If the same: Choose the smalest hop-count DSDV: Full/Incremental Updates Full updates Contain all the routing information Relatively are rare Incremental updates Contain only the information which have been changed scince the last full update Usually sent in a NPDU (Network Protocol Data Unit) If the updates do not fit a NPDU, a full update would be sent 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 15 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 16

DSDV: Adding a link DSDV: Adding a link 1. An ad hoc network 2. Node A is added to the network 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 17 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 18 DSDV: Adding a link DSDV: Adding a link 3. Node A sends its routing table to its neighbors <A, 101, 0> 4. Node B receives the information and adds <A, 101, 1> to its own routing table 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 19 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 20

DSDV: Adding a link DSDV: Adding a link 5. Node B propagates the new routing information to its neighbors <A, 101, 1> 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 21 5. Node B propagates the new routing information to its neighbors <A, 101, 1> 6. The neighbors complement their routing tables <A, 101, B, 2> and propagate their information to their neighbors 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 22 DSDV: Failure of a link DSDV: Failure of a link 1. A link between B and D fails 2. Node B notices the failure: - Sets hop-counts for D and E on - increment seq# for D and E 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 23 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 24

DSDV: Failure of a link DSDV: Summary Proactive Routes are managed through periodic and event-based routing table exchanges Proactive protocols work best in networks with low or moderate mobility and a few nodes 2. Node B notices the failure: - Sets hop-counts for D and E on - increment seq# for D and E 3. Node B sends new routing information to its neighbors 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 25 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 26 AODV: Ad Hoc On Demand Distance Vector Routing Reactive Managing only active routes Sequence numbers serve as unique IDs and are used to prevent loops in the discovered routes, as a route refreshment criteria AODV is a descendant of DSDV Support unicast and multicast communication Nodes keep track of their neighbors by listening for HELLO messages that each node broadcasts at set intervals AODV: Route Discovery 1. Node S needs to find a route to D 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 27 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 28

AODV: Route Discovery AODV: Route Discovery 2. S initiates a Route Request (RREQ) message <D s-ip-addr., D s-seq#, S s-ip-addr., S s-seq#, hopcount(=0)> 2. S initiates a Route Request (RREQ) message <D s-ip-addr., D s-seq#, S s-ip-addr., S s-seq#, hopcount(=0)> 3. S sends the RREQ message to its neighbors 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 29 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 30 AODV: Route Discovery AODV: Route Discovery 4. Node A receives RREQ - makes route reverse entry for S Des=S, nexthop=s, hopcount=1 - A has no direct route to D, So sends RREQ to its neighbors 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 31 5. Node C receives the RREQ - makes route reverse entry for S Des=S, nexthop=a, hopcount=2 - C has a direct route to D, and the seq# for route to D is S s seq# in RREQ 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 32

AODV: Route Discovery AODV: Route Discovery 6. Node C receives RREQ - C initiates a route reply (RREP) RREP=<D s_ip_addr, D s-seq#, S s_ip_addr, hopcount_to_d(=1)> - C sends the RREP to A 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 33 7. Node A receives RREP - A makes a route forward entry for D Dest=D, nexthop=c, hopcount=2 - A sends RREP to S 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 34 AODV: Route Discovery AODV: Route Discovery 8. Node S receives RREP - S makes a route forward entry for D Dest=D, nexthop=a, hopcount=3 9. Node S receives RREP - S makes a forward entry route for D Dest=D, nexthop=a, hopcount=3 - S sends the data packets on the new route to D 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 35 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 36

AODV: Route Management AODV: Route Management 1. The route between C and D fails 2. Node C invalidates the route to D in its routing table 3. Node C generates Route Error message (RERR) - Lists all of the destinations which are not accessible now - Sends RERR to the upstream neighbor 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 37 4. Node A receives RERR message - Checks whether C is the next hop on the route to D - Deletes the route to D - RERR broadcast continues to S 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 38 AODV: Route Management DSR: Route Discovery 5. Node S receives RERR message - Examines if A is the next hop on the route to D - Deletes the route to D - Finds a new route to D if necessary Node S needs a route to D 1. S sends RREQ message 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 39 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 40

DSR: Route Discovery DSR: Route Discovery 2. Node A receives the message, but it has no route to D - A adds its own address and sends the message to its neighbors 3. Node C receives RREQ message, but has no route to D - adds its own address and sends the packet to its neighbors 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 41 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 42 DSR: Route Discovery DSR: Route Discovery 4. Node C receives RREQ message, but has no route to D - adds its own address and sends the packet to its neighbors 5. Node D receives RREQ and sends a RREP back to C - The RREP contains the route from S to D 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 43 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 44

DSR: Route Discovery DSR: Route Discovery 6. Node C receives RREP - RREP is broadcasted continuesly to A 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 45 7. Node A receives the RREP message - sends RREP to S 8. Node S receives the RREP message - S will use the discovered route to forward data DSR nodes may learn more than one route during route discovery 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 46 AODV and DSR differences DSR uses sourse routing AODV uses next hop record DSR route uses cashe AODV uses routing table DSR route cash entries have no lifetimes AODV routing table entries have lifetimes DSR has alternate route available when one breaks AODV nodes do not alternate route when one breaks LAR: Location Aided Routing Using location information for routing Location information is used (e.g. Obtained from GPS) All nodes should know their current location Expected Zone: The area that probably contains the desired destination EZ is estimated based on any previous location information and the destination s velocity D= last known location of node D at time t0 D = location of node D at present time t1 D is unknown to the sender r=(t1- t0)*vd Vd= estimated speed of D 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 47 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 48

LAR: Request Zone Request Zone contains the expected zone and the location of the sender and the RREQ is limited in that Only nodes within the request zone forward the RREQ Request zone explicitly is specified in RREQ Each node must know its location to determine whether it is within the request zone or not LAR: Request Zone If route discovery with the smallest request zone fails, the sender would try to discover the route with a larger request zone (after a time out) The larger zone can cover the entire network The rest of the route discovery is similar to DSR 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 49 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 50 LAR Variation I: Adaptive Request Zone Each node can modify the request zone in the RREQ The modification is based on newer and usually more accurate information and could be smaller than the original zone LAR Variation II: Implicit Request Zone In the previous scheme the request zone was explicitly specified in RREQ The alternative approach is: node X forwards a route request received from Y if X is seemed to be closer to D compared to Y The motivation is to bring the route request closer to the destination node after each forwarding 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 51 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 52

LAR Variation III: Implicit Request Zone The assumption is that, initially, location information for node Y becomes known to X only during a route discovery This location information is used for a future route discovery Each route discovery yields more updated information which is used for the next discovery Variations Location information can also be piggybacked on any message from Y to X Y may also proactively distribute its location information in the network LAR: Advantages and Disadvantages Advantages reduced RREQ flood (only in the request zone) reduced route discovery overhead Disadvantages Nodes need to know their locations The possible existence of obstructions for radio transmissions is not taken into account 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 53 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 54 Hybrid: Zone Routing Protocol (ZRP) Proactive + Reactive Each node manages a zone (e.g. two hops) Intra-zone routing: proactive routing protocol within a zone (e.g. DSDV) Inter-zone routing: reactive routing protocol for nodes outside the zone Boarder casting: the nodes at the edge of the zone lead the floods Cluster building/ Hierarchial routing The network is hierarchically structured - Cluster Leader (CL) represents the cluster; or - The control is distributed Cluster Options: - overlapping clusters / overlap free cluster - one-level hierarchy / multi-level hierarchy 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 55 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 56

Cluster building/ Hierarchial routing Each node communicates with its cluster leader Gateways connect the overlapping cluster Joint distributed gateways connect the non-overlapping clusters Cluster building Clusters can be shaped considering - Current positions - Functional requirements Cluster leaders can be elected by - Highest ID algorithm - First Come, First Cluster 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 57 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 58 Cluster Leader Administration Clustering protocols have cluster leader election and revocation functions Selection: A node can be a cluster leader if it is out of the reach of any other cluster leader Revocation: To prevent growth in the number of cluster leaders some mechanisms should be provided, such as cluster leader can not be aleader again Revocation Algorithms If two cluster leader are in contact with each other, one of them should leave leadership ID based algorithms Weighted algorithms Cluster members based algorithms Subset based algorithms 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 59 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 60

Hierarchial Addressing Hierarchical Routes Addresses can be assigned based on their cluster membership If a node ID is z and he is a member of cluster y, then its address could be yz If the node is generally a member of hierarchical clusters, then its address could be x... yz It could also have multiple addresses, if the clusters are overlapped 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 61 Routes are defined Hierarchically hierarchical routing increases the robustness of routes In this example CL1 can use any gateway to reach CL2 physicale Route: S CL 1 G 2 CL 2 D logical Route: S CL 1 CL 2 D Nodes exchange information by Hello messages Hello from non-leader nodes includes a list of its cluster leaders address (cluster leader list) 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 62 Multi-level Hierarchical Routes Scalability of hierarchical routing is limited Multi-level hierarchical routing scaled for larger networks Cluster building / Hierarchical routing Advantages Increase the robustness of routes in delivery of data packets Hierarchical address architecture Reduction in routing control messages Disadvantages Require periodic messages to maintain the cluster Centralization of possible routes through Cluster Leader 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 63 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 64

Multipath Routing Establishment of multiple paths for each Couple (source, destination) If the primary route fails, alternative routes will be used Balancing the load by splitting traffic on several routes Energy Efficient Routing Several schemes are proposed recently Using energy routing metrics (e.g. energy consumption per packet transmission, network connection duration, etc.) Topology control: cessation of transmission of energy for each node Off nodes are eliminated Using directional antennas 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 65 14.11.2008 Mobilkommunikation 2, Prof. Dr. Dieter Hogrefe, Prof. Dr. Xiaoming Fu 66