Dynamic Source Routing (DSR) [Johnson96]

Similar documents
Dynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

AODV Route Requests (RREQ) are forwarded in a manner similar to DSR

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7

Wireless Internet Routing

Unicast Routing in Mobile Ad Hoc Networks

Ad Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols

4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.

The Basics of Wireless Communication Octav Chipara

LECTURE 9. Ad hoc Networks and Routing

Routing In Ad Hoc Networks

CMPE 257: Wireless and Mobile Networking

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Mobile Ad-Hoc Networks & Routing Algorithms

Page 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Page 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols

Wireless Networking & Mobile Computing

Arvind Krishnamurthy Fall 2003

CMPE 257: Wireless and Mobile Networking

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

Dynamic Source Routing in Ad Hoc Wireless Networks

Routing in Ad-hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

CS551 Ad-hoc Routing

ECS-087: Mobile Computing

Nomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:

AODV-PA: AODV with Path Accumulation

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

2013, IJARCSSE All Rights Reserved Page 85

Previous Lecture. Link Layer & Network Layer. Link Layer. This Lecture. Framing. Sending bits. Chapter 7.C and 7.D

Dynamic Source Routing in ad hoc wireless networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Multi-hop Technology: Ad-hoc Networks

Mobile Communications. Ad-hoc and Mesh Networks

10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

DSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016

Wireless Mesh Networks

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

CS5984 Mobile Computing

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

CHAPTER 2 LITERATURE REVIEW

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Computation of Multiple Node Disjoint Paths

On-Demand Multicast Routing in Ad Hoc Networks with Unidirectional Links

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

SUMMARY OF ROUTING PROTOCOL MOBILE AD HOC NETWORKS. YI Jiazi. Polytechnic School of University of Nantes. Feb.

AODV Multipath Extension using Source Route Lists with Optimized Route Establishment

IN a mobile ad hoc network, nodes move arbitrarily.

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Ad Hoc Networks: Issues and Routing

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density

Wireless Sensor Networks

WAN Technology and Routing

Dynamically Adaptive Multipath Routing based on AODV

Bridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges

Setup Ad Hoc Routing Protocol over On-Demand Backup Node

Outline. MAC (Medium Access Control) General MAC Requirements. Typical MAC protocols. Typical MAC protocols

0!1. Overlaying mechanism is called tunneling. Overlay Network Nodes. ATM links can be the physical layer for IP

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

AODV- An Efficient MANET Routing Protocol

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Destination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6

Ad Hoc Routing Protocols and Issues

Routing Protocols in MANETs

What is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Lecture 6: Bridging & Switching. Last time. Today. CSE 123: Computer Networks Chris Kanich. How do multiple hosts share a single channel?

Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras Network

Quiz 5 Answers. CS 441 Spring 2017

Advanced Computer Networks

Performance Evaluation of AODV and DSR routing protocols in MANET

15-441: Computer Networking. Wireless Networking

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

Wireless Mul*hop Ad Hoc Networks

Performance of Route Caching Strategies in Dynamic Source Routing

Geographic Routing in Simulation: GPSR

Routers & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives

3. Evaluation of Selected Tree and Mesh based Routing Protocols

A Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks

Unicast Routing in Mobile Ad-Hoc Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross-Layer Information Awareness

CE693: Adv. Computer Networking

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT

PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS

Mitigating Superfluous Flooding of Control Packets MANET

CSE/EE 461 Distance Vector Routing

Transcription:

ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom emand-based operation Security Sleep period operation Unidirectional link support inks are virtual etwork ayer otation vs. ink ayer Transmissions (1) Transmission range (a) (b) Physical wireless links etwork topology etwork ayer otation vs. ink ayer Transmissions (2) Routing task etwork layer (t) etwork layer S ink layer ink layer (t 1 ) Routing is the act of moving information across an internetwork from a source to a destination. ink layer (t 2 ) Routing involves two basic activities: determining optimal routing paths transporting information groups (typically called s) through an internetwork. 1

Routing task Routing Protocol ategories S odes that want to route messages must: ind out about the topology of the network Use that topology to do something with the message ontrol Plane ata Plane ontrol Plane Proactive: odes actively maintain and share topology information, regardless whether there is data to be sent enerally timer- or event-based Reactive (On-demand): azy approach: on t do more work then you have to Only discover topology/routes when there is data to send Path discovery in reactive protocols Routing Protocol ategories ata Plane 0 reply(0) 1 reply(0) 2 3 query-reply mechanism query is broadcast reply is unicast ocal next-hop forwarding: Source routing: reply(0) 5 4 Routing Protocol ategories ata Plane ocal next-hop forwarding: onsult forwarding table for a next hop ompletely local decision Routing tables Routing Protocol ategories ata Plane ocal next-hop forwarding: onsult forwarding table for a next hop ompletely local decision Source routing: Source node places complete path in header ntermediate nodes don t have to consult their forwarding tables orwarding table based 2

Source routing explained Reactive Protocols ames are useful hints at understanding the protocol properties: ynamic Source Routing (SR) MT Source Routing d-hoc On-demand istance Vector (OV) ata. eader MT Reactive ext-hop orwarding istance Vector The Routing Problem in Mobile d hoc wirless networks Reactive Routing Protocols ynamic Source Routing (SR) S S The routing problem is to find a route from S to when some or all of the nodes are mobile. SR: Properties ow many desirable properties does SR support? istributed operation oop freedom emand-based operation Security Sleep period operation Unidirectional link support S S S O S S SR: ssumptions ooperative environment inks symmetric / Symmetric both etwork diameter small but larger than 1 odes may work in promiscuous mode (explained in the next slide) 3

on Promiscuous mode Promiscuous mode explained d = my address? To upper layer filtering turned off To upper layer rop irpcap x: US 802.11a/b/g/n dapter has this capability What SR does? SR: Path iscovery Path discovery Route Request (RRQ) Route Reply (RRP) Path maintenance Route rror (RRR) ata delivery Performance tuning When node S wants to send a to node, but does not know a route to, node S initiates a route discovery. Source node S floods the network with route request (RRQ) s (also called query s). ach node appends its own address in the header when forwarding RRQ. 22 Route iscovery in SR (1) Route iscovery in SR (2) Source Source seq# RRQ[] Target RRQ[] Partial route roadcast RRQ[] Represents a node that has received RRQ for from 4

Route iscovery in SR (3) Route iscovery in SR (4) RRQ[, ] RRQ[,, ] RRQ[, ] RRQ[,, ] RRQ[,, ] Route iscovery in SR (5) Route iscovery in SR RRQ[] RRQ[] RRP[,,, ] (a) (b) RRQ[,,, ] Unicast RRP[,,, ] RRQ[,, ] RRP[,,, ] ssumption: inks are symmetric RRQ[,, ] RRQ[,, ] RRQ[,,, ] (c) (d) Route iscovery at source Route iscovery: t an intermediate node needs to send to ccept route request <src,id> in recently seen requests list? yes iscard route request Start Route iscovery Protocol wait Route iscovery finished uffer ontinue normal processing yes Packet in buffer? ookup ache for route to no no done Route found? yes Write route in header Send to next-hop ppend myddr to partial route Store <src,id> in cache for duplicate detection roadcast no no ost s address already in patrial route no mydd =target yes Send route reply done yes iscard route request 5

Route Reply in SR (symmetric case) Route Reply in SR (symmetric case) estination on receiving the first RRQ, sends a Route Reply (RRP) RRP is sent on a route obtained by reversing the route appended to received RRQ RRP includes the route from S to on which RRQ was received by node RRP[,,, ] RRQ[,,, ] Route Reply in SR (asymmetric case) Route Reply in SR (asymmetric case) f unidirectional (asymmetric) links are allowed, then RRP may need a route discovery for S from node Unless node already knows a route to node S f a route discovery is initiated by for a route to S potential cause of deadlock. The Route Reply is piggybacked on the Route Request from. ata elivery in SR Route Maintenance ata RRR RRR --- Packet header size grows with route length ow to send RRR? Symmetric: Reverse the route in the header symmetric: Perform a route discovery 6

ow to etect roken ink? (1) With the help of M layer: - ata- handshake supported by 802.11 - bsence of retransmit - fter few retries if number exceeds U limit ink broken - nform upper layer (cross layer interaction) - etwork layer (where SR is implemented) will send RRR (2) f different M layers other than 802.11 is used: - Promiscuous mode - Passive cknowledgement (3) f Promiscuous mode not supported: - xplicit can be incorporated in the etwork layer - think about traceroute (4) Transport layer can be used for crude indication of working routes SR Optimization (Performance improvement) Route discovery + Route Reply + Route rror = Routing Overhead. ompetes with ata transmission ow to cut down routing Overhead? o cut down possible at Route Reply (RRP) o cut down possible in Route rror (RRR) Only possibility: cut down Route iscovery (RRQ) chievable through caching SR Optimization (aching) SR Optimization (aching) ach node caches a new route it learns by any means aching overheard routing information n presence of uni-directional link n presence of bi-directional link ach node caches a new route it learns by any means aching overheard routing information n presence of uni-directional link n presence of bi-directional link enefit of route caching: (intermediate nodes reply) Replying to Route Request using cached routes can speed up route discovery can reduce propagation of route requests The intermediate node must verify that the resulting route being returned contains no duplicate nodes listed in the route record enefit of route caching: (intermediate nodes reply) Replying to Route Request using cached routes can speed up route discovery can reduce propagation of route requests The intermediate node must verify that the resulting route being returned contains no duplicate nodes listed in the route record 7

ata structure for Route aching ata structure for Route aching ache at : ache at : --- --- -- -- - - --- --- ata structure for Route aching Tree is the best data structure ache at (before movement): --- -- - ache at (after movement): -- - - Truncate at each entry!! ache at (before): ache at (after): --- -- Problem 1: Use of ache Possibility of simultaneous route reply: Some issues and solutions [,,,] [,,] Where is? Solution: (1) elay before reply * (h-1+r) (2) Overhear while waiting (3) ancel reply if hop length is larger than any of the overheard reply s hop length 8

Problem 2: Route rror (RRR) invalidate cache: Problem with asymmetric links (Route rror (RRR) invalidate cache): S RRR [-] sends a route error to S along route ---S when its attempt to forward the data S (with route S) on - fails odes hearing RRR update their route cache to remove link - M S RRR [-] sends RRR through another path odes on original path can not invalidate their cache. Solution: S propagates RRR through original path up to. M Problem 3: Shortest path may not be discovered RRQ propagates through -- - and --? Which one reaches quicker? epends on load, congestion etc ode mobility may change path length Previous path --- ew shorter path -- overhears and ultimately discovers. Sends a unsolicited route reply Problem 4: Piggybacking data on route discovery not possible because of caching Short s can be piggybacked in RRQ for performance improvement (TP S s are most suitable) aching creates a problem!! [,,,] ata [,,] Where is? Problem 5: etwork Partition Problem 5: etwork Partition S M S M Source S - estination ata rates 50 pkt/seconds t least 50 RRQ broadcasts per second!! Solution: xponential backoff to limit the rate The interval between each successive new route discovery for the same host is exponentially deferred 9

Problem 6: aching results many route reply from intermediate nodes Problem 6: aching results many route reply from intermediate nodes S M S M Suppose S sends to through the route S S,,,, has the routing info to (from RRP),,,,, M also has the routing info to (from overhearing) 11 nodes know about!! Only 5 nodes left!! Suppose node floods a RRQ asking for how many reply he gets? Solution: xpanding Ring: sends RRQ with TT 1 if RRP received done otherwise send RRQ with TT 2... radually increase up to a max ynamic Source Routing: dvantages Reactive: Routes maintained only between nodes who need to communicate reduces overhead of route maintenance aching: Route caching can further reduce route discovery overhead Multipath: single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches ynamic Source Routing: isadvantages on-scalable: Packet header size grows with route length due to source routing are must be taken to avoid collisions between route requests propagated by neighboring nodes insertion of random delays before forwarding RRQ ynamic Source Routing: isadvantages Too much caching: ncreases contention if too many route replies come back due to nodes replying using their local cache Route Reply Storm problem ynamic Source Routing: isadvantages n intermediate node may send Route Reply using a stale cached route, thus polluting other caches This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. or some proposals for cache invalidation, see [u00mobicom] Static timeouts daptive timeouts based on link stability 59 60 10

11