Wireless Mul*hop Ad Hoc Networks

Similar documents
UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Wireless Networking & Mobile Computing

CMPE 257: Wireless and Mobile Networking

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Mobile Ad-Hoc Networks & Routing Algorithms

CMPE 257: Wireless and Mobile Networking

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

ECS-087: Mobile Computing

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Wireless Mesh Networks

LECTURE 9. Ad hoc Networks and Routing

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Mobile Ad Hoc Networks

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Politecnico di Milano Advanced Network Technologies Laboratory. ZigBee Revealed

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1

Routing Protocols in MANETs

Part I. Wireless Communication

Performance Evaluation of AODV and DSR routing protocols in MANET

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT

Computation of Multiple Node Disjoint Paths

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

AODV-PA: AODV with Path Accumulation

Wireless and Mobile Networks

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

CS551 Ad-hoc Routing

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Wireless and Mobile Communications

Analysis of Routing Protocols in MANETs

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Wireless and Mobile Communications

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

2013, IJARCSSE All Rights Reserved Page 85

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Arvind Krishnamurthy Fall 2003

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Routing Protocols in Mobile Ad-Hoc Network

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Subject: Adhoc Networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

Chapter-2 Routing Protocols of MANET

Ad Hoc Networks: Issues and Routing

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Wireless Network Security Spring 2015

Energy Efficient Routing Protocols in Mobile Ad hoc Networks

Ad Hoc Networks: Introduction

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Conges'on. Last Week: Discovery and Rou'ng. Today: Conges'on Control. Distributed Resource Sharing. Conges'on Collapse. Conges'on

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

Mobile Communications. Ad-hoc and Mesh Networks

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

15-441: Computer Networking. Wireless Networking

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network

A Review paper on Routing Protocol Comparison

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Figure 1: Ad-Hoc routing protocols.

Routing protocols in Mobile Ad Hoc Network

A Survey - Energy Efficient Routing Protocols in MANET

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

Link Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Power aware Multi-path Routing Protocol for MANETS

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Introduction to Mobile Ad hoc Networks (MANETs)

Link Layer. w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo)

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Transcription:

Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial.

Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP) connected to the wired network Mobile nodes communicate through the AP Ad hoc network: Mobile nodes communicate directly with each other Mul*- hop ad hoc networks: all nodes can also act as routers Hybrid (nodes relay packets from AP): Goal: increase capacity, reduce power consump*on, and guarantee a minimum service

Constraints Limited radio spectrum Broadcast Medium (collisions) Limited power available at the nodes Limited storage memory Connec*on QoS requirements (e.g., delay, packet loss) Unreliable network connec*vity (depends on the channel) Dynamic topology (i.e., mobility of nodes, density) Need to provide a full coverage Need to enforce fairness

Parameters Use of various coding/modula*on schemes Use of packets fragmenta*on Use of various transmission power level Use of smart antennas and MIMO systems Use of mul*ple RF interfaces (mul*ple IF characteris*cs) Clustering and backbone forma*on Planning of the fixed nodes loca*on Packets scheduling schemes Applica*on adap*vity

Theore*cal Results Capacity of a wireless network [Gupta & Kumar 2000] n iden*cal randomly located nodes each capable of transmi]ng W bits can only achieve a throughput per node of n op*mally placed nodes within a 1m 2 disc with an op*mal traffic pa`ern and an op*mal transmission power can only achieve

Adap*vity and Coopera*on Classical networking stacks have only minimum interac*on between adjacent layers Mul*- hop wireless ad hoc networks require more coopera*on between layers because: Channel varia*on and network topology changes affect the applica*on Rou*ng versus single hop communica*on considerably affects the medium access control (MAC) performance Collisions versus channel fading affects both the physical layer and the MAC Ba`ery power has implica*ons on all layers

Adap*ve Coding Example: ½ rate convolu*onal code (K=5) versus uncoded communica*on Channel with two states: E b /N 0 = 6.8 db or 11.3 db (AWGN), L=200 Bytes E b /N 0 BER FER Nb_Transmit Total_Tx_Bytes UC ½ CC UC ½ CC UC ½ CC UC ½ CC 6.8dB 10-3 10-7 0.8 1.6 10-4 5 ~ 1 5*200 2*200 11.3dB 10-7 ~ 0 1.6 10-4 ~ 0 ~ 1 ~ 1 200 2*200 Need to es*mate the channel and adapt to it Differen*ate between conges*ons and a bad channel condi*on Use of Hybrid- ARQ?

Adap*ve Fragmenta*on Example: To transmit a frame of length 200 Bytes, we can fragment into 4 frames of length 50 Bytes (+ 10 Bytes overhead) BER FER Nb_Transmit Total_Tx_Bytes (incl. overhead) L=60B L=200B L=60B L=200B L=60B L=200B 10-3 0.38 0.8 1.6 5 384 1000 10-7 ~ 0 ~ 0 ~ 1 ~ 1 240 200 Need to es*mate the channel and adapt to it

Mul*ple Power Levels Using mul*- hop transmission (h hops) and reducing the transmission power accordingly Increases capacity (factor of h) Reduces overall power consump*on (by a factor of h) In asymmetric environments Low power node can encode data and transmit it at low power Powerful nodes can decode use higher transmission power

Parameters of IEEE802.11 IEEE802.11 has three mechanisms that can be used to improve performance under dynamic channels: Fragmenta*on (also used to avoid collision) Mul*ple coding/modula*on schemes Mul*ple power levels

Problems of Mul*- Hop Rou*ng Rou*ng: How to maintain up- to- date informa*on on the network topology? Rou*ng messages overhead How to determine number of hops How to es*mate buffers size Higher delay Risk of conges*on on nodes

Prac*cal Approaches Solving sub- problems independently Improving TCP to be wireless aware Rou*ng in mul*- hop wireless ad hoc networks: DSDV, DSR, AODV, TORA, FSR Not power or resource aware. Single hop whenever possible (no interac*on with the MAC of higher layers) Fragmen*ng packets according to the channel performance Adap*ng coding/modula*on scheme to the channel Adap*ng transmission power to des*na*on There is a need for a global approach: 1. Combine: transmission power, coding, and fragmenta*on 2. Add rou*ng 3. Add medium access control Engineering perspec*ve: what minimal subset of func*onali*es do we need to implement to achieve near op*mal performance? What minimal set of coding/modula*on schemes? What power levels do we need?

Exis*ng Unicast Rou*ng Protocols Types: Proac*ve protocols Determine routes independent of traffic pa`ern Tradi*onal link- state and distance- vector rou*ng protocols are proac*ve Reac*ve protocols Maintain routes only if needed Hybrid protocols Some exis*ng protocols Dynamic Source Rou*ng (DSR) Loca*on Aware Rou*ng (LAR) Adhoc On- demand Distance Vector (AODV) Temporally Ordered Reversal Algorithm

Trade- Off Between Proac*ve and Reac*ve Latency of route discovery Proac*ve protocols may have lower latency since routes are maintained at all *mes Reac*ve protocols may have higher latency because a route from X to Y will be found only when X a`empts to send to Y Overhead of route discovery/maintenance Reac*ve protocols may have lower overhead since routes are determined only if needed Proac*ve protocols can (but not necessarily) result in higher overhead due to con*nuous route upda*ng Which approach achieves a be`er trade- off depends on the traffic and mobility pa`erns

Flooding for Data Delivery Sender S broadcasts data packet P to all its neighbors Each node receiving P forwards P to its neighbors Sequence numbers used to avoid the possibility of forwarding the same packet more than once Packet P reaches des*na*on D provided that D is reachable from sender S Node D does not forward the packet

Flooding for Data Delivery Y S E Z A B H C I G F K J M D N L Represents a node that has received packet P Represents that connected nodes are within each other s transmission range

Flooding for Data Delivery Broadcast transmission Y S E Z A B H C I G F K J D M N L Represents a node that receives packet P for the first time Represents transmission of packet P

Flooding for Data Delivery Y S E Z A B H C I G F K J D M N L Node H receives packet P from two neighbors: potential for collision

Flooding for Data Delivery Y S E Z A B H C I G F K J D M N L Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P once

Flooding for Data Delivery Y S E Z A B H C I G F K J D M N L Nodes J and K both broadcast packet P to node D Since nodes J and K are hidden from each other, their transmissions may collide => Packet P may not be delivered to node D at all

Flooding for Data Delivery Y S E Z A B H C I G F K J D M N L Node D does not forward packet P, because node D is the intended destination of packet P

Flooding for Data Delivery Y S E F B C M L J A G H D K I N Flooding completed Nodes unreachable from S do not receive packet P (e.g., node Z) Nodes for which all paths from S go through the destination D also do not receive packet P (example: node N) Z

Flooding for Data Delivery Y S E Z A B H C I G F K J D M N L Flooding may deliver packets to too many nodes (in the worst case, all nodes reachable from sender may receive the packet)

Flooding for Data Delivery: Advantages Simplicity May be more efficient than other protocols when rate of informa*on transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is rela*vely higher this scenario may occur, for instance, when nodes transmit small data packets rela*vely infrequently, and many topology changes occur between consecu*ve packet transmissions Poten*ally higher reliability of data delivery Because packets may be delivered to the des*na*on on mul*ple paths

Flooding for Data Delivery: Disadvantages Poten*ally, very high overhead Data packets may be delivered to too many nodes who do not need to receive them Poten*ally lower reliability of data delivery Flooding uses broadcas*ng - - hard to implement reliable broadcast delivery without significantly increasing overhead Broadcas*ng in IEEE 802.11 MAC is unreliable In our example, nodes J and K may transmit to node D simultaneously, resul*ng in loss of the packet in this case, des*na*on would not receive the packet at all

Flooding of Control Packets Many protocols perform (poten*ally limited) flooding of control packets, instead of data packets The control packets are used to discover routes Discovered routes are subsequently used to send data packet(s) Overhead of control packet flooding is amor*zed over data packets transmi`ed between consecu*ve control packet floods

Dynamic Source Rou*ng (DSR) [Johnson96] When node S wants to send a packet to node D, but does not know a route to D, node S ini*ates a route discovery Source node S floods Route Request (RREQ) Each node appends own iden*fier when forwarding RREQ

Route Discovery in DSR Y S E Z A B H C I G F K J D M N L Represents a node that has received RREQ for D from S

Route Discovery in DSR Broadcast transmission [S] Y S E Z A B H C I G F K J M D N L Represents transmission of RREQ [X,Y] Represents list of identifiers appended to RREQ

Route Discovery in DSR Y S E [S,E] Z A B H C [S,C] I G F K J M D N L Node H receives packet RREQ from two neighbors: potential for collision

Route Discovery in DSR Y S E Z A B H C I G F [S,C,G] [S,E,F] K J D M N L Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

Route Discovery in DSR Y A B H S C I E G F K [S,E,F,J] M J D [S,C,G,K] Z N L Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide

Route Discovery in DSR Y A B H S C I E G F K J Z [S,E,F,J,M] M L D N Node D does not forward RREQ, because node D is the intended target of the route discovery

Route Discovery in DSR Des*na*on D on receiving the first RREQ, sends a Route Reply (RREP) RREP is sent on a route obtained by reversing the route appended to received RREQ RREP includes the route from S to D on which RREQ was received by node D

Route Reply in DSR Y S E RREP [S,E,F,J,D] Z A B H C I G F K J M D N L Represents RREP control message

Route Reply in DSR Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are guaranteed to be bi- direc*onal To ensure this, RREQ should be forwarded only if it received on a link that is known to be bi- direc*onal If unidirec*onal (asymmetric) links are allowed, then RREP may need a route discovery for S from node D Unless node D already knows a route to node S If a route discovery is ini*ated by D for a route to S, then the Route Reply is piggybacked on the Route Request from D. If IEEE 802.11 MAC is used to send data, then links have to be bi- direc*onal (since Ack is used)

Dynamic Source Rou*ng (DSR) Node S on receiving RREP, caches the route included in the RREP When node S sends a data packet to D, the en*re route is included in the packet header hence the name source rou*ng Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded

Data Delivery in DSR Y DATA [S,E,F,J,D] S E Z A B H C I G F K J D M N L Packet header size grows with route length

When to Perform a Route Discovery When node S wants to send data to node D, but does not know a valid route node D

DSR Op*miza*on: Route Caching Each node caches a new route it learns by any means When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F When node K receives Route Request [S,C,G] des*ned for node, node K learns route [K,G,C,S] to node S When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D A node may also learn a route when it overhears Data packets

Use of Route Caching When node S learns that a route to node D is broken, it uses another route from its local cache, if such a route to D exists in its cache. Otherwise, node S ini*ates route discovery by sending a route request Node X on receiving a Route Request for some node D can send a Route Reply if node X knows a route to node D Use of route cache can speed up route discovery can reduce propaga*on of route requests

Use of Route Caching [S,E,F,J,D] [E,F,J,D] S E [F,J,D],[F,E,S] A B H C [C,S] I G [G,C,S] F K [J,F,E,S] J D M N L Z [P,Q,R] Represents cached route at a node (DSR maintains the cached routes in a tree format)

Use of Route Caching: Can Speed up Route Discovery [S,E,F,J,D] [E,F,J,D] S E [F,J,D],[F,E,S] A B H C [C,S] I [G,C,S] G F [K,G,C,S] When node Z sends a route request for node C, node K sends back a route reply [Z,K,G,C] to node Z using a locally cached route K RREQ [J,F,E,S] J RREP Z D M N L

Use of Route Caching: Can Reduce Propaga*on of Route Requests [S,E,F,J,D] S [E,F,J,D] F B [J,F,E,S] C [G,C,S] M J A [C,S] G H D [K,G,C,S] K I RREP RREQ Assume that there is no link between D and Z. Z Route Reply (RREP) from node K limits flooding of RREQ. In general, the reduction may be less dramatic. E [F,J,D],[F,E,S] Y N L

Route Error (RERR) RERR [J-D] Y S E Z A B H C I G F K J D M N L J sends a route error to S along route J-F-E-S when its attempt to forward the data packet S (with route SEFJD) on J-D fails Nodes hearing RERR update their route cache to remove link J-D

Route Caching: Beware! Stale caches can adversely affect performance With passage of *me and host mobility, cached routes may become invalid A sender host may try several stale routes (obtained from local cache, or replied from cache by other nodes), before finding a good route

Dynamic Source Rou*ng: Advantages Routes maintained only between nodes who need to communicate reduces overhead of route maintenance Route caching can further reduce route discovery overhead A single route discovery may yield many routes to the des*na*on, due to intermediate nodes replying from local caches

Dynamic Source Rou*ng: Disadvantages Packet header size grows with route length due to source rou*ng Flood of route requests may poten*ally reach all nodes in the network Care must be taken to avoid collisions between route requests propagated by neighboring nodes inser*on of random delays before forwarding RREQ Increased conten*on if too many route replies come back due to nodes replying using their local cache Route Reply Storm problem Reply storm may be eased by preven*ng a node from sending RREP if it hears another RREP with a shorter route

Dynamic Source Rou*ng: Disadvantages An intermediate node may send Route Reply using a stale cached route, thus pollu*ng other caches This problem can be eased if some mechanism to purge (poten*ally) invalid cached routes is incorporated. For some proposals for cache invalida*on, see [Hu00Mobicom] Sta*c *meouts Adap*ve *meouts based on link stability