Distributed Systems 26. Mobile Ad Hoc Mesh Networks

Similar documents
Internet Technology 4/29/2013

WAP/ WML : Wireless Protocol wireless protocol

Mobile Communications. Ad-hoc and Mesh Networks

upnp Device Architecture

Integration of Wireless Sensor Network Services into other Home and Industrial networks

MANET Architecture and address auto-configuration issue

What is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals

Configuring the Service Discovery Gateway

Better Approach To Mobile Adhoc Networking

Summary of Changes between UPnP Device Architecture V1.0 (June 2000) and V1.0.1 (May 2003)

Advanced Network Approaches for Wireless Environment

Ad Hoc Routing Protocols and Issues

Enabling Apple AirPrint with Your Xerox AltaLink Multifunction Printer. White Paper

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Arvind Krishnamurthy Fall 2003

Routing. Info 341 Networking and Distributed Applications. Addresses, fragmentation, reassembly. end-to-end communication UDP, TCP

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

3. Evaluation of Selected Tree and Mesh based Routing Protocols

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

CS 457 Lecture 11 More IP Networking. Fall 2011

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Internet of Things 2018/2019

CS551 Ad-hoc Routing

Overview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.

Enabling Apple AirPrint with Your Xerox ConnectKey Device

15-441: Computer Networking. Wireless Networking

Jini and Universal Plug and Play (UPnP) Notes

Routing protocols in WSN

Chapter 16 Networking

Flexible Dynamic Mesh VPN draft-detienne-dmvpn-00

CSEP 561 Internetworking. David Wetherall

Network Layer (4): ICMP

Chapter 12 Network Protocols

Multicast Communications. Slide Set were original prepared by Dr. Tatsuya Susa

UPnP Device Architecture 1.0

2013, IJARCSSE All Rights Reserved Page 85

Configuring Bidirectional PIM

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Rendezvous: Revolutionary Networking Technology

universaal Architecture and The Resource Discovery

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Printopia Pro Multicast DNS (mdns) Deployment and Troubleshooting Guide

IPv6 and Multicast. Outline. IPv6 Multicast. S Computer Networks - Spring 2005

Figure 1: Ad-Hoc routing protocols.

Networking: Network layer

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Foreword xxiii Preface xxvii IPv6 Rationale and Features

Multicast Protocols and Applications

IPv6 Stack. 6LoWPAN makes this possible. IPv6 over Low-Power wireless Area Networks (IEEE )

Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks

NetWare Link-Services Protocol

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

CS 416: Operating Systems Design April 22, 2015

Configuring IP Multicast Routing

Chapter 5 Advanced Configuration

LECTURE 9. Ad hoc Networks and Routing

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Summary of MAC protocols

Operating Systems. Week 13 Recitation: Exam 3 Preview Review of Exam 3, Spring Paul Krzyzanowski. Rutgers University.

Auto-Networking Technologies for IPv6 Mobile Ad Hoc Networks

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

MLD. MLDv1 (defined in RFC 2710), which is derived from IGMPv2. MLDv2 (defined in RFC 3810), which is derived from IGMPv3.

Performance Evaluation of MANET through NS2 Simulation

Routing Protocols in MANET: Comparative Study

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Ad Hoc Networks: Issues and Routing

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Medium Access Protocols

CMPE 257: Wireless and Mobile Networking

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

CS5984 Mobile Computing

Routing Protocols in MANETs

The network requirements can vary based on the number of simultaneous users the system will need to support. The most basic requirements are:

Configuring IP Multicast Routing

Chapter 09 Network Protocols

A local area network that employs either a full mesh topology or partial mesh topology

Internet Technology 3/2/2016

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

IP Multicast Technology Overview

Interdomain Routing Design for MobilityFirst

Multicast Addresses. IPv4 Multicast Address Blocks. IPv4 Multicast Addresses. Multicast Group. IPv4 Multicast Addresses Class D addresses

Service Discovery Gateway

MBC. Auto. Address. Networks. Mesh. uto- configuration for Wireless. Keecheon Kim. Konkuk University Seoul, Korea

WSN Routing Protocols

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Performance Evaluation of Various Routing Protocols in MANET

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

QoS multi meshed tree routing in tethered MANET

Routing with a distance vector protocol - EIGRP

IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and

mslp - Mesh-enhanced Service Location Protocol Λ

ICS 351: Networking Protocols

Assignment 5. Georgia Koloniari

How did IP Multicast get so complicated?

Transcription:

Distributed Systems 26. Mobile Ad Hoc Mesh Networks Paul Krzyzanowski pxk@cs.rutgers.edu 12/16/2011 1

Mesh Networks Mobile Ad-hoc networks, sensor networks, Decentralized networking No need for routers or access points Each node participates in routing 12/16/2011 2

Mesh Networks Topology of the network has to be discovered Nodes come and go or move around Topology may change frequently on-demand routing New nodes announce themselves Other nodes listen for announcements Often low-range, battery-powered devices Multiple hops are common 12/16/2011 3

Mesh Networking Hop node-to-node until the destination is reached Nodes can act as repeaters to nearby peers Robust connectivity: find alternate routes Dynamic routing Table-based: maintain fresh lists of destinations/routes Dynamic: find route on demand Hierarchical Geographical Power-aware Multicast See http://en.wikipedia.org/wiki/ad_hoc_routing_protocol_list 12/16/2011 4

Dynamic Source Routing (DSR) On-demand routing Source routing: sender learns the complete set of hops needed to reach the destination Every packet carries the path of hops in its header Intermediate nodes do not need to store routing information to route packets 12/16/2011 5

Route discovery via flooding Broadcast Route Request message for some destination node, D, to all connected (reachable) nodes Receiving node: If it saw a packet with this ID, ignore request If node node D: send back a Route Reply message to the path in the header Else: add node ID to the path and forward Route Request to connected nodes Note: Path is maintained throughout the Route Request Loops are prevented (don t route to a node in the path) 12/16/2011 6

Route discovery via flooding (S,D) a e D f S c (S,D) b d 12/16/2011 7

Route discovery via flooding a D S (S, a, D) c e f b d b will drop the request to route S to D if it saw the same Route Request ID 12/16/2011 8

Route discovery via flooding a D S (S, b, D) c e f b (S, b, D) d 12/16/2011 9

Route discovery via flooding a (S, b, c, D) e D f S c b (S, b, c, D) d d will drop the request to route S to D since it saw the same Route Request ID from b earlier 12/16/2011 10

Route discovery via flooding a D e f S c b (S, b, d, D) d (S, b, d, D) At around the same time, c will drop the request to route S to D since it saw the same Route Request ID from b earlier 12/16/2011 11

Route discovery via flooding a (S, b, c, e, D) e D f S c b d e routes to d. D is the destination! 12/16/2011 12

Route discovery via flooding Request: (S, b, c, e, D) Reply: (D, e, c, b, S) a e D f S c b d D sends a Route Reply back to S via the path. 12/16/2011 13

Source Routing Once a route is known Path is specified with the packet header If delivery fails, path will need to be rediscovered Optimizations Every node that sees packets or Route Reply messages learns how to reach all the nodes listed in the route. Nodes can maintain tables to minimize learning routes More-frequently used routes may be considered to be more accurate Maintain and optimize for Distance Vector Distance Vector = number of hops Replace known routes with new routes with smaller distance vector Or test new routes with a potentially smaller distance vector 12/16/2011 14

Table Driven Routing When a node learns of a newly accessible node, it adds it to its routing table Propagates updated routing table to other nodes (those nodes forward it, etc.) Everyone s routing table is kept updated No need to perform dynamic routing No need to send source route in each packet Downside: extra network traffic for table propagation May be worthwhile if the environment is not dynamic 12/16/2011 15

Example: ZigBee ZigBee (IEEE 802.15.4) 192 kbps 100-1000 ft. range ZenSys Z-Wave Screw-in lamp module $38 Dimmer switch $38 Outdoor plug module $40 12/16/2011 16

ZigBee Wireless star or mesh network Star: single coordinator; no routing Self-configuring Redundant paths Self-healing 12/16/2011 17

ZigBee device types Coordinator Starts & controls network Stores info about the network Repository for security keys Router Extends network coverage, provides backup routes Connects to coordinator, other routers, & end devices End devices Transmit or receive a message Does not perform routing must connect to a coordinator or router Roles may be combined: Light socket: router or coordinator & end device Battery-powered light switch: end device (mostly off) 12/16/2011 18

Joining & Routing Joining Device sends a request to [re] join a network to the coordinator or router In the simplest case, it has the network key Routing Based on Distance Vector routing Distance Vector = number of hops to the destination Each router maintains a routing table with entries for each destination Routing table entry stores a distance vector & next router Learning routes Originating device broadcasts a route request Destination device sends a a route reply Intermediate nodes build up routing tables 12/16/2011 19

ZigBee Security Encryption All network traffic is encrypted with 128-bit AES Trust Center Maintains network key; periodically sends key updates (new key encrypted with old key) Runs on a designated trusted device Decides whether to allow new devices onto its network Keys Master keys: initial shared secret between two devices. Used to generate Link Keys Network keys: all devices on a network share the same key Link keys: optional for application-level encryption between two devices 12/16/2011 20

ZigBee setup Out-of-the-box device can join any network Installer: Uses dedicated device with ZigBee coordinator Device joins a commissioning network Installer commissions device to identify correct network & security settings Master key & Trust Center address configured If master key is not configured May sent on an insecure channel during configuration Some implementations (Certicom s) support public-key based key exchange using ECC (Elliptic Curve Cryptography) Less compute (power) overhead than RSA or Diffie-Hellman 12/16/2011 21

Network-Based Plug & Play 12/16/2011 22

Ad-hoc networking and auto-discovery Device/service discovery and control Microsoft, Intel: UPnP Apple: Bonjour Universal Plug and Play architecture http://www.upnp.org Networked devices Unreliable: nodes added/removed unpredictably Programs need to talk to programs (services) 12/16/2011 23

Bonjour Apple (primarily) Goal: advertise & discover services on a LAN allocate addresses without a DHCP server Use 169.254/16 zeroconf range translate between names and IP addresses without a DNS server Multicast DNS: Use IP multicast for DNS queries (mdnsresponder) locate or advertise services without using a directory server Use DNS services (DNS or multicast DNS) Structured Instance Names SRV record: <Instance>.<Service>.<Domain> gives target IP, port TXT record with same name: extra info as key/value pairs PTR record: service type to see all instances of the service 12/16/2011 24

SRV example Example DNS SRV record TTL port host myprinter._printer._tcp.local. 120 IN SRV 0 0 5432 myserver.local. DNS TXT record May contain additional information. Example: Different print queues for printer services on the same IP address Information is application-specific PTR record _printer._tcp.local. 28800 PTR myprinter._printer._tcp.local. Allows one to query DNS for all services of type _printer. 12/16/2011 25

Bonjour steps New device Is there a DHCP server? If yes, get IP address and routing info If no, pick an address in the link-local (zeroconf) range: 169.254.0.0 Test the address and claim it if nobody responds Start up Multicast DNS responder Requests a chosen hostname Multicasts query to see if it s taken Claims it if not taken Start up service (get port) Publish service (friendly name, service name, address, port) Create SRV record friendly_name.service_name._tcp.local that points to the hostname and port for the service Create PTR record service_name._tcp.local 12/16/2011 26

UPnP strategy Send data only over network No executables Use standard protocols Leverage standards HTTP, XML Basic IP network connectivity 12/16/2011 27

Communication Between Control points Controller usually client Device controlled Usually server Device may take on both functions Control Point Device 12/16/2011 28

Step 0 Control point and device get addresses DHCP Or AutoIP IETF draft: automatically choose IP address in ad-hoc IPv4 network Pick address in 169.256/16 range see if it s used Control point Device DHCP server address DHCP request address DHCP request 12/16/2011 29

Step 1 Control point finds device Devices advertise (broadcast) when added Periodic refresh Control points search as needed Devices respond Search for types of service Guarantee minimal capabilities Control point Device Detect device advertise 12/16/2011 30

Step 2 Control point learns about device capabilities SSDP: Simple Service Discovery Protocol IETF draft Administratively scoped multicast Unicast responses Get URL for description Actions, state variables expressed in XML Control point Device Discover Protocol Response 12/16/2011 31

Step 3 Control point invokes actions on device Send request, get result SOAP messages Control point Device Invoke action Get command 12/16/2011 32

Step 4 Control point listens to state changes of device Push model GENA: General Event Notification Architecture Control point Device Detect event Event 12/16/2011 33

Step 5 Control point controls device and/or views device status with HTML Control point Device http://192.168.1.12/status Get request 12/16/2011 34

The End 12/16/2011 35