Example of TORA operations. From last time, this was the DAG that was built. A was the source and X was the destination.

Similar documents
Arvind Krishnamurthy Fall 2003

A Survey of Routing Protocols for Ad Hoc Wireless Home Networks

EZR: Enhanced Zone Based Routing In Manet

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Routing Protocols in Mobile Ad-Hoc Network

Chapter 4 Routing in Mobile Ad Hoc Networks

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

LECTURE 9. Ad hoc Networks and Routing

AODV-PA: AODV with Path Accumulation

ECS-087: Mobile Computing

Unicast Routing in Mobile Ad-Hoc Networks

Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks Dr. Kamaljit I. Lakhtaria

A Survey of Routing Protocols for Ad Hoc Networks Based on Update Mechanism

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Chapter 16. Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols. Wireless Network Models. Illustration of an ad hoc network

Wireless LAN, Mobile Ad Hoc Networks, and MANET Routing Protocols

Survey on Location Based Routing Protocols in MANET

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Location Awareness in Ad Hoc Wireless Mobile Neworks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

ROUTING PROTOCOLS FOR MANET WITHIN MULTICHANNEL

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

CMPE 257: Wireless and Mobile Networking

Performance Evaluation of Routing Protocols for MAC Layer Models

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Scalability Performance of AODV, TORA and OLSR with Reference to Variable Network Size

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

CS5984 Mobile Computing

An Improved Model for the Dynamic Routing. Effect Algorithm for Mobility Protocol. Karthik Ramakrishnan. A thesis

Performance Evaluation of AODV and DSR routing protocols in MANET

Wireless Networking & Mobile Computing

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Routing Protocols in MANETs

Keywords: AODV, MANET, WRP

PRO-ACTIVE ROUTE MAINTENANCE IN DSR. Liang Qin. Master of Science

A Study on Routing Protocols for Mobile Adhoc Networks

Routing Protocols in MANET: Comparative Study

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Location Prediction Based Routing Protocol for Mobile Ad hoc Networks

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

CS551 Ad-hoc Routing

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Dynamic Route Switching Protocol in Mobile Ad Hoc Networks

A Proposed Routing Protocol for MANET

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Lecture 16: Wireless Networks

Comparative Analysis of Throughput and Dropped rate for Location-Aided Routing Protocol

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Routing protocols in WSN

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Dynamic Source Routing in ad hoc wireless networks

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Optimized Location Aided Routing Protocol using Greedy Forwarding Approach in MANET

UNICAST ROUTING TECHNIQUES FOR MOBILE AD-HOC NETWORKS

Design and Implementation of Fisheye Routing Protocol for Mobile Ad Hoc Networks

Survey of Routing Protocols for Mobile Ad-hoc Network

Signal Stability based Adaptive Routing (SSA) for. Ad-Hoc Mobile Networks. Rohit Dube Cynthia D. Rais Kuang-Yeh Wang Satish K.

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

A Review of On-Demand Routing Protocols for Mobile Ad-Hoc Networks

Computation of Multiple Node Disjoint Paths

Mobile Ad Hoc Networks

References. Forwarding. Introduction...

Chapter 11 Chapter 6

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Survey of Stability Based Routing Protocols in Mobile Ad-hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Performance Evaluation of Various Routing Protocols in MANET

Mr. Pradip A. Chougule 1, Mr. Rajesh A. Sanadi 2, Mr. U. H.Kamble 3

Energy and Power Aware Stable Routing Strategy for Ad hoc Wireless Networks based on DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Mobile Ad-Hoc Networks & Routing Algorithms

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

Analytical Performance Comparison of Different Routing Protocols in Mobile Ad hoc Wireless Networks

Performance Analysis and Enhancement of Routing Protocol in Manet

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

PERFORMANCE EVALUATION OF TCP OVER ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

Keywords: - MANETs, Unicast, Network, Classification, Routing

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Transcription:

Example of TORA operations A Link 2 D Link 6 Y Link 1 Link 3 C Link 4 Link 8 B Link 5 E Link 7 X From last time, this was the DAG that was built. A was the source and X was the destination.

Link 1 A B Link 3 Reacting to failures: Route Maintenance Link 2 C Link 4 Link 5 D E Link 6 Link 7 Y Link 8 X Let Link 4 fail. At this time notice that other than the destination all nodes still have an outbound link. Thus, none of the nodes generate an UPD message. The DAG is still OK! This is especially attractive when the network is dense most nodes have many outbound links.

Let Link 7 fail. Link 1 A B Link 3 Link 2 C Link 5 D E Link 6 Y Link 8 Link 7 (1,E,0,0,E) X Now, Node E does not have any outbound links! Thus, we resort to full link reversal at E. E generates a new reference level which is 1, sets the oid to E and transmits an UPD message. It also reverses the direction of all its inbound links.

Link 1 A B Link 3 Link 2 (1,E,0,-1,C) C Link 5 D E Link 6 Y Link 8 X At this, Node C no longer has outbound links. It resorts to partial link reversal reverses the direction of its links to A and B and transmits an UPD. It also sets its own offset to 1 to ensure that it is at a lower level compared to E.

Link 1 A B Link 3 Link 2 C Link 5 D E Link 6 Y Link 8 X Now the situation repeats at B. After B reverses its links and transmits an UPDATE. (1,E,0,-2,B)

Link 1 (1,E,1,-2,A) A Link 2 Link 3 C D Link 6 Y Link 8 The situation repeats at A. This is now a full reversal. A got updates from B and C. Link 1 B A Link 2 C Link 5 D E Link 6 Y Link 8 X Thus, A stays at the same level as C, but indicates the full reversal by flipping r i. This causes a partial reversal at B. Link 3 B (1,E,1,-3,B) Link 5 E X

A Link 2 (1,E,1,-4,C) D Link 6 Y Link 1 C Link 8 Link 3 B Link 5 E X Finally an update is generated at C. DAG is restored!

Link 1 A B Link 3 Link 2 C Link 5 D E Link 6 Y Link 8 X Now let Link 5 fail. This causes a network partition. E,D,Y and X are ok. C has no outbound links. Link 1 A B Link 3 Link 2 (2,C,0,0,C) C D E Link 6 Y Link 8 X It creates a new reference level which is 2, and sets the oid to C and sends a UPD. This causes B to have no outbound links.

Link 1 A Link 3 Link 2 C (2,C,1,-1,A) Link 1 A Link 2 Link 3 C B resorts to partial reversal. It reverses its link to A and broadcasts an update. B B Now A does not have outbound links. (2,C,0,-1,B) It resorts to a full reversal. At full reversal r i is flipped. This causes a partial reversal at B.

Link 1 A B Link 3 Link 2 (2,C,1,-2,B) C Important Point : Height is reduced with respect to node that created the reference level. B s UPD message after the partial reversal creates the same situation at C. This would cause C to realize that there is no path to X. It sets its height to NULL and sends an UPD to A and B. Now the nodes realize that there is no path to X.

Advantages: That of an on-demand routing protocol create a DAG only when necessary. Multiple paths created. Good in dense networks. Disadvantages Same as on-demand routing protocols. Not much used since DSR and AODV outperform TORA. Not scalable by any means.

References Chapter 8 of book. V.D.Park and Scott.M.Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, Proceedings of INFOCOM 1997.

Associativity Based Routing (ABR) Proposed by C-K.Toh currently at Georgia Tech. Introduces a new metric for routing which is called Degree of Association Stability. ABR is free from loops. What is association stability? How stable are nodes with respect to each other? Based on an estimate of this, a route is selected.

Each node would periodically generate and transmit a beacon to signify its existence. Neighboring nodes receive this beacon. They, maintain what is known as an associativity table. For each beacon received, the associativity of the receiving node with respect to the beaconing node is incremented. Thus, to reiterate there is an indication of how stable nodes are with respect to each other. Association Stability is defined by the connection stability in time and space of one node with respect to another.

Associativity entries (or ticks as they are called) are reset when the neighbors of a node, or the node itself moves out of proximity. Goal :? Longevity longer lived routes for stability. Lower Overhead (?) Three phases of ABR: Route Discovery Route Re-construction Route Deletion NOW HERE IS A NEW CONCEPT!!!!!!

ROUTE DISCOVERY Each node broadcasts a query message (BQ message just to sound different! ) in order to find a destination. In addition to the address, the associativity ticks with respect to their neighbors is appended. The receiving node, chooses the best one, i.e., retains only the entry corresponding to itself and its upstream node. Thus, at the destination, multiple routes are available. It chooses the one that is best in terms of associativity ticks. If there is a tie, choose shortest path.

Destination generates a REPLY message towards the source. Intermediate nodes that forward this message mark the corresponding routes as valid. Thus, only one route at a given time.

ROUTE MAINTENANCE Partial route recovery is allowed. Intermediate nodes will try and rediscover route from point of failure. When routes are no longer valid, they would be erased. This is similar to DSR except for associativity. In addition partial route discovery.

Advantages: Tries to find stable routes lower overhead in some scenarios. Partial recovery may be faster in some cases. Disadvantages Unclear if the overhead incurred in maintaining stability info. is higher than the actual gains. Depends on scenario. Partial recovery may lead to longer and less stable routes.

Chapter 9 on book. References Read about effects of beaconing on battery life. C-K. Toh, A Novel Distributed Routing Protocol to support Ad Hoc Mobile Computing, Proceedings of IEEE 15 th Annual International Phoenix Conference on Computers and Communication, March 1996. E.Royer and C-K.Toh, A Review of Current Routing Protocols for Ad-Hoc Mobile Networks, IEEE Personal Comm. Mag. April 1999.

Signal Stability based Adaptive Routing (SSA) Prof. Tripathi s work. Reference: R.Dube, C.D.Rais, K.Y.Wang and S.K.Tripathi, Signal Stability based Adaptive Routing for Ad Hoc Mobile Networks, IEEE Personal Communications Magazine, February 1997.

Principle of SSA Select routes based on the signal strength between nodes and on a node s location stability. Choose routes that have stronger connectivity. SSA has two component co-operative protocols: The Dynamic Routing Protocol The Static Routing Protocol.

The Dynamic Routing Protocol (DRP) The DRP is responsible for maintaining what is called the Signal Stability Table and also the Routing Table. SST record of signal strengths of neighboring nodes which is obtained by means of periodic beaconing. Quantized levels possible weak channel vs. strong channel. When a packet is received, DRP processes the packet, updates the tables and passes the received packet to the SRP.

The Static Routing Protocol (DRP) Forwards the packet up to the transport layer if it is the receiver. If not, it looks up the routing table and forwards the packet to the appropriate next-hop. If no entry is found, it initiates a route search.

The Route Search Route requests are propagated throughout the network however... Forwarded onto the next hop, only if they are received over strong channels and have not yet been previously processed. /* Notice that the second condition prevents looping */. The destination chooses the first arriving query message because it is most probable that the packet arrived on the strongest, shortest and/or least congested path. DRP reverses the route and sends a route-reply back to the sender.

The PREF field Notice so far that a route-search packet is forwarded only if it arrived on a strong link. However, it is possible that no route is found with strong links all the way. At this time, the source initiates another routesearch and uses what is called the PREF field to indicate that weak links are acceptable.

Route Maintenance Use a route error message to the source to indicate which channel has failed. Source then initiates a new route-search to find a new path to the destination.

Advantages: More stable routes since signal strength indicates stability. No overhead incurred in dissemination of tables. Disadvantages Of on-demand routing protocols. The time over which the signal strength is averaged out might be an issue.

Location Aided Routing (LAR) By Nitin Vaidya and Young-bae Ko. Reference: Location Aided Routing (LAR) in Mobile Ad Hoc Networks, Y.Ko and N.Vaidya, Proceedings of Mobicom 1998. Idea: Use Location Information for doing Routing does the name give a hint or what? The location info is obtained using GPS (Global Positioning System). Forward the packet towards the destination instead of forwarding it indiscreetly.

Global Positioning System (GPS) It is a system that allows a mobile user to know its physical location. There is however some error in the estimated position. Different systems have different errors few meters to about 100 meters.

The notion of expected zone If a source (S) knows that a destination (D) was at position L at time t 0, it has some notion of where the destination might be at a later time t 1. If the average speed of D is v, then S might expect that D is within a circular radius of v (t 1 -t 0 ) which is centered at L. However, note that this is only an estimate. If the actual speed was higher, the node might be outside this circle. This circular region is called the expected zone.

Why is the expected zone important? If we have an on-demand routing protocol, now we can disseminate a query within the expected zone! Note that if there is no information whatsoever with respect to the destination, query search would degenerate to pure flooding. On the other hand, if we further knew that D was moving north, then the expected zone may be further refined.

The Request Zone Source node defines what is known as a request zone. A node would forward the request only if it belongs to the request zone. Typically, the request zone would include the expected zone. Additionally nodes in other regions around the expected zone are to be included in the request zone. Why?

The Request Zone (Continued) Source node might not belong to the expected zone. Thus, other nodes which are not in the expected zone would need to forward request towards the expected zone. If with an initial request zone, the destination is not found (because no route exists entirely within the request zone), an expanded request zone may be defined. In an extreme case, the expanded request zone might be just doing flooding. There is a tradeoff between latency and message overhead.

Defining the Request Zone In the first scheme, the suggestion is that the request zone be the rectangle that includes the source and the expected zone of the destination. Expected Zone D v(t 1 -t 0 ) Source determines the co-ordinates of the rectangle and includes in query. A node upon receiving this, will forward the query only if it is within the rectangle. S Request Zone Entire Network

Expected Zone S D v(t 1 -t 0 ) Request Zone Entire Network The destination node, Node D would respond with its current location, and current time in its reply message. It could also include its current speed, or average speed over a recent time interval.

Size of the request zone Initially destination s location, D is unknown. The size of the request zone depends upon the average speed of movement of the destination v, and the time elapsed since the last known location of D was recorded. If v is large, larger expected zone, larger request zone. If communication with D is infrequent, it may result in a larger request zone. It may be possible to piggyback location info. on packets other than the query.

A Second Possible Scheme for determining the Request Zone. Source node knows location (X,Y) of dest at some time t0. It calculates its distance from (X,Y) = D s. It includes both, (X,Y) and D s in the query message. A node I, forwards it if for some parameter d, if its own distance from the destination D I <= Ds + d. If this message is further received by node J, node J would forward it only if its distance from the destination D J <= D I + d. Obviously the idea is that you try and get closer and closer to the destination. More details in the paper.

Finally, remember we said GPS could have some error. Thus, some leeway has to be provided to take this error into account while determining the expected zone and the request zone. That is my brief intro to ABR, SSA and LAR.