DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

Similar documents
Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6

Distance-Vector Routing: Distributed B-F (cont.)

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

TCP/IP Networking. Part 3: Forwarding and Routing

The Problem: Finding Paths Spring 2011 Lecture #19. Forwarding. Shortest Path Routing

COMP 631: NETWORKED & DISTRIBUTED SYSTEMS 9/6/16 COMP 631: NETWORKED & DISTRIBUTED SYSTEMS. Internet Routing. Jasleen Kaur.

4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing

ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)

Routing in Ad-hoc Networks

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

CSE/EE 461 Distance Vector Routing

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives

IP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Network service model. Network service model. Network Layer (part 1) Virtual circuits. By the end of this lecture, you should be able to.

Discussion 8: Link State Routing. CSE 123: Computer Networks Marti Motoyama & Chris Kanich

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

Third Generation Routers

EE 122: Intra-domain routing

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

IP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing

Nomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Let s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now.

Unicast Routing in Mobile Ad Hoc Networks

COMP 3331/9331: Computer Networks and Applications

CS 43: Computer Networks. 23: Routing Algorithms November 14, 2018

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

More on Network Routing and Internet Protocol

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

LECTURE 9. Ad hoc Networks and Routing

CS5984 Mobile Computing

EE122 MIDTERM EXAM: Scott Shenker, Ion Stoica

Routing In Ad Hoc Networks

Routing Protocols in MANETs

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Intra-domain Routing

Distance vector and RIP

Routing. 9: Intro to Routing Algorithms. Routing. Roadmap. Routing Algorithm classification: Static or Dynamic?

Review: Routing in Packet Networks Shortest Path Algorithms: Dijkstra s & Bellman-Ford. Routing: Issues

WAN Technology and Routing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

CS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016

The Basics of Wireless Communication Octav Chipara

Network Layer: Routing

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Routing in a network

Wireless Mesh Networks

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

TCOM 501: Networking Theory & Fundamentals. Lecture 11 April 16, 2003 Prof. Yannis A. Korilis

CSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Address Translation. Map IP addresses into physical addresses destination host next hop router

Dynamic Source Routing (DSR) [Johnson96]

2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept

Computer Networking. Intra-Domain Routing. RIP (Routing Information Protocol) & OSPF (Open Shortest Path First)

Distance Vector Routing

Lecture 4. The Network Layer (cont d)

Distance Vector Routing Protocols

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Routing, Routing Algorithms & Protocols

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

C13b: Routing Problem and Algorithms

Unit 2. Signaling and Single Area OSPF

Computation of Multiple Node Disjoint Paths

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Mobile and Ubiquitous Computing Routing Protocols. Niki Trigoni

Overview. Problem: Find lowest cost path between two nodes Factors static: topology dynamic: load

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Vehicle Networks. Networking Layer: Routing. Univ.-Prof. Dr. Thomas Strang, Dipl.-Inform. Matthias Röckl

3. Evaluation of Selected Tree and Mesh based Routing Protocols

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

Basic Idea. Routing. Example. Routing by the Network

ECS-087: Mobile Computing

Routing by the Network

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Now Arriving at Layer 3. Packet Forwarding. Router Design. Network Layers and Routers. Switching and Forwarding. Forwarding

Performance Analysis of Aodv Protocol under Black Hole Attack

Tietokoneverkot T

ECE 158A: Lecture 5. Fall 2015

06/02/ Local & Metropolitan Area Networks. Overview. Routing algorithm ACOE322. Lecture 6 Routing

CEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni

Why dynamic route? (1)

Power aware Multi-path Routing Protocol for MANETS

Initialization: Loop until all nodes in N

Lecture 12: Link-state Routing. Lecture 12 Overview. Router Tasks. CSE 123: Computer Networks Chris Kanich. Routing overview

Introduction to Intra-Domain Routing

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

CS 457 Networking and the Internet. What is Routing. Forwarding versus Routing 9/27/16. Fall 2016 Indrajit Ray. A famous quotation from RFC 791

Distributed Algorithms in Networks EECS 122: Lecture 17

COMP/ELEC 429/556 Introduction to Computer Networks

Routing Outline. EECS 122, Lecture 15

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

Computer Networks. Routing Algorithms

ICS 351: Today's plan. netmask exercises network and subnetwork design dynamic routing RIP distance-vector routing

Transcription:

estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra time for route acquisitionwhenever a route to a new destination is required, it already exists at the source. S 6811 : Lecture 6 istance Vector (asic idea) istance Vector i k j 13 8 x ach node maintains two tables: istance Table: ost to each node via each outgoing link Routing Table: Minimum cost to each node and next hop node m 23 The message will be sent from i to j as the cost of the path to x is minimum through j istance Vector lgorithm: Tables istance Vector lgorithm: Tables xample l (v,w) d (v,w) d (v) l(v,w) v w d via to d w n istance Table n d (v,w) d (v,n) to via (next hop) cost of link (w,v) cost from v to d via w minimum cost from v to d d RoutingTable n cost d (v) Note: In the figure, d (v,w)< d (v,n) and, therefore, d (v) = d (v,n) Via 0 1 3 1 3 1 1 2 2 2 istance table Routing table Via 0 1 3 1 3 1 2 2 1 2 Via 1 3 3 1 2 2 Via 1 3 3 1 2 2 0 1 1 2 Nxt ost 0 1 1 2 1

Messages Nodes exchange messages that contain information on the cost of a route Reception of messages triggers recalculation of routing table If node v sends a messages to node x of the form, [m, m (v)], this means I can go to node m with minimum cost m (v) New link with cost l(m,v) comes up m via to l(m,v) istance Table p l(v,w) v w d m n to RoutingTable via (next hop) cost v [m, m (v)] x m m (v,p) l(m,v) m n m (v) New row This message is only of interest to neighbors of v New column xample 1 xample 1 Via 1 0 (, 0) 0 Via 1 0 1 (, 0) 0 (, 0) 0 0 0 0 9 10 xample 1 xample 1 Via 1 1 0 1 (, 0) 0 Via 1 1 0 1 1 (, 0) 0 (, 0) (, 0) 0 0 0 0 11 12 2

xample 1 xample 1 Via 1 1 0 1 1 (, 0) (, 1) (, 1) Via 1 1 0 1 1 Via 1 1 2 0 1 1 2 (, 0) (, 1) (, 1) Via 1 1 0 1 1 (, 0) (, 1) (, 1) Via 1 1 0 1 1 Via 1 1 0 1 1 Via 1 1 0 1 1 Via 1 1 0 1 1 13 14 xample 1 xample 1 (, 0) Via 1 1 2 2 0 1 1 2 (, 1) (, 1) Via 1 1 0 1 1 Via 1 3 3 1 2 2 0 1 1 2 Via 1 3 3 1 2 2 0 1 1 2 (, 0) (, 1) (, 1) Via 1 1 0 1 1 Via 1 1 0 1 1 Via 1 3 3 1 2 2 0 1 1 2 Via 1 3 3 1 2 2 0 1 1 2 15 16 xample 1 Failure (count to infinity) xample 1 - Failure 0 1 1 2 timeout 0 1 - - timeout 1 1 0 2 1 0 2 1-1 0 2 1 0 2 1 17 18 3

xample 1 - Failure xample 1 - Failure 0 1 - - 0 1 - - - 1 0 2 From : 1 2 0 1 1 0 2 1 3 1 0 2 From : 1 2 0 1 1 0 2 1 19 20 xample 1 - Failure 0 1 - - xample 1 - Failure 0 1 3 2 From : 1 2 1 0 From : 1 2 1 0 3 1 0 2 1 0 2 1 3 1 0 2 1 0 2 1 21 22 xample 1 - Failure 0 1 3 2 xample 1 - Failure 0 1 3 2 From : 0 3 2 From : 0 3 2 3 1 0 2 1 0 2 1 3 1 0 2 1 0 4 1 23 24 4

oes it exactly fit in Mobile Wireless d hoc networks? No..because Mobility is not considered Slow convergence to path break ost metrics number of hops Routing table at MH4 before MH1 moves estination-sequenced istance- Vector (SV) ach node maintains a routing table which stores next hop towards each destination a cost metric for the path to each destination a destination sequence number that is created by the destination itself, i.e.: see the following Time info. missing 25 26 Rule of SV explained Rule of SV explained (ont ) ssume that node X receives routing information from Y about a route to node Z Node X takes the following steps: X Y Z X Y Z Let S(X) and S(Y) denote the destination sequence number for node Z as stored at node X, and as sent by node Y with its routing table to node X, respectively If S(X) > S(Y), then X ignores the routing information received from Y If S(X) = S(Y), and cost of going through Y is smaller than the route known to X, then X sets Y as the next hop to Z If S(X) < S(Y), then X sets Y as the next hop to Z, and S(X) is updated to equal S(Y) 27 28 fter move: routing table at MH 4 xample (SV): Node joins s routing table est Next ost Seq 1 102 1 204 2 314 Suppose node joins 0 54 30 5

xample (SV): Node joins xample (SV): Node joins s routing table est Next ost Seq 1 102 s routing table est Next ost Seq 1 102 Suppose node joins Node transmits routing <, 154, 0 > to node 1 204 2 314 0 54 1 204 2 314 0 54 Suppose node joins 1 154 Node transmits routing <, 154, 0 > to node Node inserts <,, 1, 154> in the routing table 31 32 xample (SV): Node joins xample (SV): Node joins s routing table est Next ost Seq 1 102 s routing table est Next ost Seq 1 102 1 204 2 314 1 204 2 314 0 54 Suppose node joins 1 154 Node transmits routing <, 154, 0 > to node Node inserts <,, 1, 154> entry in the routing table Node propagates <, 1, 154> routing update to its neighbors and 0 54 Suppose node joins 1 154 Node transmits routing <, 154, 0 > to node Node inserts <,, 1, 154> entry in the routing table Node propagates <, 1, 154> routing update to its neighbors and Node and inserts <,, 2, 154> entry in their routing tables 33 34 xample (SV): Node joins xample (SV): Node joins s routing table est Next ost Seq 1 102 s routing table est Next ost Seq 2 102 1 204 2 314 2 204 3 314 0 54 also sends the following updates to 1 154 <,1,102>, <,1,204> <,2,314>, <,0,56>, <,1,154> 1 56 also sends the following updates to 0 154 <,1,102>, <,1,204> <,2,314>, <,0,56>, <,1,154> determines its own routing table 35 36 6

xample (SV): Link breaks xample (SV): Link breaks s routing table est Next ost Seq 1 102 s routing table est Next ost Seq 1 102 Suppose node moves out of range of does not receive periodic update from Node changes entries involving as next hop and puts 1 204 2 314 0 54 1 154 Suppose node moves out of range of do not receive periodic update from Node changes entries involving as next hop and puts 204 314 0 54 1 154 37 38 xample (SV): Link breaks xample (SV): Link breaks Suppose node moves out of range of do not receive periodic update from Node changes entries involving as next hop and puts Node increments sequence number for and s routing table est Next ost Seq 1 102 204 314 0 54 1 154 Suppose node moves out of range of do not receive periodic update from Node changes entries involving as next hop and puts Node increments sequence number for and est Next ost Seq 1 102 s routing table 205 315 0 54 1 154 39 40 xample (SV): Link breaks xample (SV): Link breaks s routing table est Next ost Seq 1 102 s routing table est Next ost Seq 1 102 Suppose node moves out of range of do not receive periodic update from Node changes entries involving as next hop and puts Node increments sequence number for and Node propagates <,, 205> and <,, 315> to and 205 315 0 54 1 154 Suppose node moves out of range of do not receive periodic update from Node changes entries involving as next hop and puts Node increments sequence number for and Node propagates <,, 205> and <,, 315> to and 205 315 0 54 1 154 41 42 7

xample (SV): Link breaks xample (SV): Link breaks Node propagates <,, 205> and <,, 315> to and s previous routing table est Next ost Seq 2 102 2 204 3 314 1 56 0 154 Node propagates <,, 205> and <,, 315> to and s updated routing table est Next ost Seq 2 102 205 315 1 56 0 154 43 44 SV example (MH1 moves) efore move: routing table at MH 4 45 46 Next routing dvertisement by MH 4 SV example (MH1 moves) When MH 1 moves, MH 2 advertises infinite cost metric to MH 1 with sequence number 407 47 48 8

SV example (Routing table at MH4 updated) Next dvertisement by MH4 49 50 ut down overhead Reducing advertisement size Reducing number of advertisements Reducing advertisement size: Full ump and Incremental ump full dump carries complete routing tables. node broadcasts a full dump infrequently. n incremental dump carries minor changes in the routing table. This information contains changes since the last full dump. When the size of an incremental dump becomes too large, a full dump is preferred. 51 52 Reducing the number of updates node i may receive the same update message from another node j through several different paths. Suppose, one of the updates has a lowest distance to j It is better to avoid broadcasting every new update and instead broadcast only the lower metric updates. n xample 10 hops n1 5 hops n8 n9 10 sec 20 sec n2 Node n2 should wait longer to get an update from n9 53 54 9

amping fluctuations How Good is SV? hanges are not immediately advertised. ach node should maintain some statistics about the average settling time of a message from another node. In the previous example, n2 receives couple of messages from n1 with the same sequence number. SV is an efficient protocol for route discovery. Whenever a route to a new destination is required, it already exists at the source. Hence, latency for route discovery is very low. SV also guarantees loop-free paths. 55 56 isadvantages nd However, SV needs to send a lot of control messages. These messages are important for maintaining the network topology at each node. Read up to section 4 This may generate high volume of traffic for high-density and highly mobile networks. Special care should be taken to reduce the number of control messages. 57 58 SV Guarantees Loop-Free Paths (Intuitive Proof) For an n-node ad hoc network, SV maintains n rooted trees, one for each destination. SV Guarantees Loop-Free Paths (Intuitive Proof) onsider the tree rooted at n1. Suppose n3 wants to change its link. n1 n2 n4 n3 n5 We have shown two such trees here. message from n5 reaches n3 59 60 10

SV Guarantees Loop-Free Paths (Intuitive Proof) However, n3 removes the old link to n4 before connecting the new link to n5 n1 n2 n4 n3 n5 61 11