Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Similar documents
MAC in /20/06

Data Communications. Data Link Layer Protocols Wireless LANs

Mobile Communications Chapter 7: Wireless LANs

Computer Communication III

MAC. Fall Data Communications II 1

Wireless Networked Systems

Mobile & Wireless Networking. Lecture 7: Wireless LAN

Advanced Computer Networks WLAN

Optional Point Coordination Function (PCF)

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

Wireless Communication Session 4 Wi-Fi IEEE standard

IEEE P Wireless Local Area Networks

IEEE WLANs (WiFi) Part II/III System Overview and MAC Layer

Unit 7 Media Access Control (MAC)

Wireless Protocols. Training materials for wireless trainers

Wireless Local Area Networks (WLANs) Part I

IEEE Medium Access Control. Medium Access Control

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

Lecture 16: QoS and "

Computer Networks. Wireless LANs

Introduction to IEEE

CSE 461: Wireless Networks

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Data and Computer Communications. Chapter 13 Wireless LANs

Multiple Access Links and Protocols

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Local Area Networks NETW 901

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

Guide to Wireless Communications, Third Edition. Objectives

Wireless# Guide to Wireless Communications. Objectives

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

A Literature survey on Improving AODV protocol through cross layer design in MANET

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Performance anomaly of b

CS5984 Mobile Computing

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

The MAC layer in wireless networks

Internet Protocol Stack

WLAN 1 IEEE Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

Logical Link Control (LLC) Medium Access Control (MAC)

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Lecture (08) Wireless Traffic Flow and AP Discovery

Chapter 7: Wireless LANs

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

IEEE Technical Tutorial. Introduction. IEEE Architecture

WLAN 1 IEEE Basic Connectivity. Manuel Ricardo. Faculdade de Engenharia da Universidade do Porto

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Computer Society

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

CSE 6811 Ashikur Rahman

6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point

Mobile Communications. Ad-hoc and Mesh Networks

Location Awareness in Ad Hoc Wireless Mobile Neworks

Mobile Communications Chapter 7: Wireless LANs

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

ECS-087: Mobile Computing

The MAC layer in wireless networks

ICE 1332/0715 Mobile Computing (Summer, 2008)

Delivering Voice over IEEE WLAN Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Routing Protocols in MANET: Comparative Study

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Chapter 7: Wireless LANs

Efficient Power MAC Protocol in Ad-hoc Network s

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE Wireless LANs Part I: Basics

Embedded Internet and the Internet of Things WS 12/13

Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday

Rahman 1. Application

CLASSIFICATION OF ROUTING Routing. Fig.1 Types of routing

Figure.2. Hidden & Exposed node problem

Wireless and Mobile Networks 7-2

Fairness in the IEEE network. Shun Y. Cheung

Mobile Communications Chapter 7: Wireless LANs

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

2013, IJARCSSE All Rights Reserved Page 85

Energy Management Issue in Ad Hoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Lesson 2-3: The IEEE x MAC Layer

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

Wireless Local Area Networks. Networks: Wireless LANs 1

Energy Management Issue in Ad Hoc Networks

Mohamed Khedr.

Wireless and Mobile Networks

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Wireless Network Security Spring 2014

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

ECE 4450:427/527 - Computer Networks Spring 2017

Intelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang

15-441: Computer Networking. Wireless Networking

LECTURE 9. Ad hoc Networks and Routing

Wireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross

Announcements : Wireless Networks Lecture 11: * Outline. Power Management. Page 1

CMPE 257: Wireless and Mobile Networking

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Transcription:

Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

In this lecture In this lecture we will describe the difference in infrastructure and ad hoc networks and we will introduce ad hoc routing protocols. We will also introduce disconnected ad hoc networks and delay tolerant routing protocols. 2

Infrastucture-based sv Ad-hoc Wireless communication can be organized in two different fashions : This might depend on the application and on the network set up. 3

Infrastructure-based network infrastructure infrastructure mode base sta4on connects mobiles into wired network handoff: mobile changes base sta4on providing connec4on into wired network v v 4

Ad-hoc ad hoc mode v no base sta4ons v nodes can only transmit to other nodes within link coverage v nodes organize themselves into a network: route among themselves 5

802.11 - MAC layer (recap) Priorities defined through different inter frame spaces no guaranteed, hard priorities SIFS (Short Inter Frame Spacing) highest priority, for ACK, CTS, polling response PIFS (PCF IFS) medium priority, for time-bounded service using PCF DIFS (DCF, Distributed Coordination Function IFS) lowest priority, for asynchronous data service DIFS DIFS medium busy PIFS SIFS contention next frame t direct access if medium is free DIFS

802.11 competing stations DIFS DIFS bo e bo r DIFS bo e bo r DIFS bo e busy station 1 bo e busy station 2 station 3 busy bo e busy bo e bo r station 4 bo e bo r bo e busy bo e bo r station 5 t busy medium not idle (frame, ack etc.) bo e elapsed backoff time packet arrival at MAC bo r residual backoff time

Synchronization using a Beacon (infrastructure) beacon interval (20ms 1s) access point medium B busy value of the timestamp B B B busy busy busy B beacon frame Nodes need to keep a tight synchronized clock with the access point: this is useful for power management and coordination of frequency hopping or contention slots. Beacons are sent semi-periodically [ei when the medium is not busy] t

Synchronization using a Beacon (ad-hoc) beacon interval station 1 B 1 B 1 station 2 B 2 B 2 medium busy value of the timestamp busy busy busy B beacon frame random delay In ad hoc mode each station transmits a beacon after the beacon interval [semi periodic again] Random backoffs are applied to beacons too: all station adjust clock to beacons received and suppress their beacon for the beacon interval t

Power saving with wake-up patterns (infrastructure) TIM interval DTIM interval access point medium D B busy T T d D busy busy busy B station T TIM D DTIM p awake d t B broadcast/multicast p PS poll TIM: list of stations for which there will be data in the slot DTIM Interval indicates the delivery traffic indication map: for broadcast and multicast frames. It s a multiple of TIM d data transmission to/from the station

Power saving with wake-up patterns (ad-hoc) ATIM window beacon interval station 1 B 1 A D B 1 station 2 B 2 B 2 a d B beacon frame random delay A transmit ATIM t D transmit data awake a acknowledge ATIM d acknowledge data ATIM is the transmission map for ad hoc traffic: all stations stay awake for this slot

Examples of Multi-hop Ad hoc Networks

A schematic of an ad hoc network C D E B H A F G Note that this is a static snapshot: the network will be reconfiguring when nodes move. 13

Examples of Ad-hoc Networking Destination Sequenced Distance Vector (DSDV) Routing. Proactive: routes are maintained also when not needed. Each node maintains a table with a route to every node. Each entry of the table has a sequence number assigned by the destination. Dest. Next Hop, Hops Required, Dest. Seq. number. 14

DSDV: Routing Table for Node D Dest Nexthop Hops SequenceN A B 2 406 B B 1 128 C B 2 564 D D 0 710 E F 2 392 F F 1 076 G F 2 128 H F 3 050 C D E B H A F G 15

DSDV Routing Updates Each node periodically transmits updates. Includes its own sequences number, routing table updates. Nodes also send routing table updates for some incremental link changes. When two routes to a destination received from two different neighbors, choose the one with greatest destination sequence number. If equal (when would they be equal?), choose the smaller metric (hop count). 16

DSDV: When a new link appears (ie a node moved closer) When K joins it Transmits routing table <K,K,0,101> Node A receives it and inserts in routing table: <K,K,1,101> Node A propagates the new route to neighbours. Neighbours of A update table with <K,A,2,101> and continue propagation. C D E K B H A F G 17

DSDV: When a link breaks (ie a node moves away) The link between D and F breaks (the two nodes move apart or the wireless link has no connection for other reasons). Node D notices the break (eg lack of table update from F): Updates hop count to F to infinity. Increments the sequence number for F,E,G,H Then: C D E A B X F G H 18

DSDV: When a link breaks (ie a node moves away) Then Node D sends updates with new route information: <F, -,, 077> <E, -,, 393> <G,-,, 129> <H,-,, 051> C D E A B X F G H 19

DSDV: Limitations Circulating and maintaining table updates is expensive for the network. Especially if this is battery powered. If the network changes a lot then these updates might be worthwhile but only if all nodes need to communicate to all others Why would a node need to keep updates of routes to nodes it does not need to communicate with? 20

Another Ad-hoc routing example Dynamic Source Routing (DSR) DSR is a reactive protocol: routes are searched only when communication with a node is needed. When a node needs to communicate it sends a route request packet. Nodes receive it and add themselves to the path and propagate the request to their neighbours. Eventually the destination node is found and the path is sent back to the source (how?). 21

DSR example Node A needs to communicate with F. Sends request <A,F, [-],101>. Node B receives the request and forwards: <A,F,[B],101>. Node D receives it and forwards: <A,F,[B,D],101>. Node F receives it and? (continued). C B D E H A F G 22

DSR example (continued) Node F receives it and: If links are symmetric sends the path back following the indicated inverse route. Or, if it has cached a path to A uses it. Otherwise it sends a route request for A. C D E B H A F G 23

DSR Comments Sequence numbers are used to avoid routing loops. Routes are cached for some time to avoid frequent route requests by intermediate nodes. Low mobility and low traffic are the best scenarios for this protocol. 24

Hybrid Solutions Zone Routing Protocol (ZRP) Zone routing is a hybrid protocol which combines proactive with reactive approaches. A zone around node N is maintained where routes are collected proactively. Beyond the zone an inter zone protocol is responsible to determine the routes in a reactive way. 25

Disconnected Ad-hoc Networks The protocols we have seen until now only work when there is a connected path among the communicating nodes I.e. no storage on intermediate nodes is allowed. The protocols do not work when this is not the case. 26

Connected vs Disconnected Connected: there is a connected path among each couple Ad-hoc Networks Disconnected: not all links are present at the same time t1 t1 t3 t10 t7

Delay Tolerant Networks and Protocols These protocols do not assume a temporally connected path among the nodes. Nodes can accept a packet and deliver it later, after some time storing it. 28

Example: Epidemic Routing A flooding protocol which allows nodes to store packets before forwarding. A node accepts a packet, moves while carrying the packet and then forwards at a different time to a different neighbourhood. Flooding is always expensive (many transmissions, large buffers needed) 29

Example 30

Example continued 31

Can we do better? Exploit the knowledge on the mobility of the nodes Is the mobility deterministic (ie. Always on the same path at same times like busses)? Maybe we can even control the mobility of some of the nodes! If not fixed, is it at least predictable? If not predictable, random 32

When mobility is predictable Prediction of mobility techniques need to be applied unless you want to use epidemic. Instead of blindly forwarding packets to all or some neighbors, intermediate nodes estimate the chance, for each outgoing link, of eventually reaching the destination. Based on this estimation, the intermediate nodes decide whether to store the packet and wait for a better chance, or decide to which nodes (and the time) to forward. 33

Context Aware Routing (CAR) A node chooses the best carrier to reach a specific node. How is the best carrier neighbour chosen? Host mobility, host colocation with destination node, battery. A utility function which weights these aspects Kalman Filter is used to predict future host colocation with destination based on previous history. The approach is based on local knowledge only.

Reference Agrawal, D. & Zheng, Q. (2006). Introduction to wireless and mobile systems. Thomson. A. Vahdat and D. Becker, Epidemic routing for partially-connected ad hoc networks, 2000. M. Musolesi and C. Mascolo. CAR: Contextaware Adaptive Routing for Delay Tolerant Mobile Networks. In IEEE Transactions on Mobile Computing. Vol. 8(2). pp. 246-260. February 2009. 35