Presentation is loading. Please wait.

Presentation is loading. Please wait.

Comparison between DSR and AODV DSR Overview AODV Overview Similarity Difference Consequence.

Similar presentations

Presentation on theme: "Comparison between DSR and AODV DSR Overview AODV Overview Similarity Difference Consequence."— Presentation transcript:

1 Comparison between DSR and AODV DSR Overview AODV Overview Similarity Difference Consequence

2 DSR Overview Source routing: routes are stored in a route cache, data packets carry the source route in the packet header Route discovery o Condition: a node sends data to a destination for which it does not know the route o Actions: source floods the network with RREQ. Each node receiving RREQ rebroadcasts it unless it is destination or it has the route to the destination in its cache. Route reply o A destination node or a node knowing the route to the destination in its cache replies with RREP. RREQ and RREP are also source routed. o Route carried back by RREP is cached at the source

3 DSR Overview (II) Error handling: o If any link on a source route is broken, the source is notified by a RERR packet o Source removes any route using this link from its cache o A new Route Discovery process must be initiated by the source, if the route is needed. Optimizations: o Salvaging: an intermediate node uses an alternative route from its cache, when a data packet meets a failed link on its source route o Gratuitous route repair: A source node receiving RERR piggybacks the RERR in the following RREQ, to clean the caches of other nodes that may use the failed link o Promiscuous listening: when a node overhears a packet not addressed to itself, it checks whether the packet could be routed via itself to gain a shorter route. If so, sends a gratuitous RREP to the source with the new better route.

4 AODV Overview Discovers routes on an on-demand basis via a similar route discovery process, but uses a different mechanism to maintain routing info. AODV uses routing table, one entry per destination. It relies on routing table entries to propagate a RREP back to the source, and route data packets to the destination. AODV uses sequence # maintained at each destination to determine freshness of routing info. And to prevent routing loops. These sequence # are carried by all routing packets.

5 AODV Overview (II) Maintain timer-based states in each node. A routing table entry is expired if not used recently. A set of predecessor nodes is maintained for each routing table entry, indicating neighbors that use the entry to route packets. These nodes are notified with RERR when the next-hop link breaks. Each predecessor node forwards RERR to its predecessors, erasing all routes using the broken link. Optimization: o Expanding ring search: control the RREQ flood in the route discovery process. The search is controlled by the TTL field, increasingly larger neighborhoods are searched to find the destination.

6 Common features of DSR and AODV Both discover routes only in the presence of data packets in the need for a route to the destination Route discovery is based on query and rely cycles and route information is stored in all intermediate nodes on the route o Route table entires (AODV), route caches (DSR)

7 High level difference DSR uses source routing, but AODV uses a table-driven routing framework and destination sequence # to prevent loops and determine route freshness. DSR does not rely on any timer-based activities, but AODV does. DSR uses routing cache aggressively, and maintains multiple routes per dest. AODV uses one route per destination.

8 Differences between DSR and AODV (I) DSR has access to greater amount of routing information than AODV by the virtual of SR. AODV can gather limited information. o DSR: in a single query-reply cycle, source learns route to each intermediate node in the route in addition to the dest. Each intermediate node also learns route to other nodes on the route. Promiscuous listening also helps to learn the route to every node on the route o AODV: no source routing or promiscuous listening. It causes AODV to rely on a route discovery flood more often, generating more network overhead

9 Difference (II) DSR uses route caching aggressively and replies to all requests reaching a destination from a single request cycle. Source learns many alternative routes to the destination, useful when the primary route fails. This saves overhead due to discovery flood. AODV maintains at most one entry per dest. In the routing table. The destination replies only once to the request arriving first and ignores the rest.

10 Difference III DSR does not have explicit mechanism to expire stale routes in the cache (except that some are deleted by RERR) or prefer fresher routes. RERR backtracks the data packet that meets a failed link. Nodes not on the upstream route of this data packet but using the failed link are not notified promptly. AODV is more conservative, the fresher route is always chosen. The route deletion using RERR is also conservative. Using the predecessor list, RERR packets reach all nodes using a failed link on its route to any destination.

11 Consequence For application-oriented metris --- delay and throughput, DSR outperforms AODV in less stressful situations (smaller # of nodes and lower load and/or mobility). AODV outperforms DSR in more stress situations (more load, higher mobility) o DSR: Aggressive use of caching, lack of mechanism to expire stale cache DSR consistently generates less routing load than AODV.

12 Wireless TCP Why we study this work o issues for TCP over wireless o a sample of proposed solutions o comparisons and comments

13 Issues for Wireless TCP Different packet loss behavior violates the assumption of TCP that all packet losses are due to congestion control: o congestion-induced loss: new flow joins, etc. o channel-error-induced loss: bursty or random channel error o handoff-induced packet loss: happens during handoff transition o routing-induced packet loss: stale routing tables (in a dynamic ad hoc network) Uniform reaction to different losses in TCP: o in TCP, reduce congestion window by half upon packet loss o does one-fit-all work in the wireless scenario ?

14 Solution Space Where you are allowed to modify/add the design, what is the information you can get o Scenario 1: no change at any intermediate node (e.g. base station), change is only allowed at both the sender & receiver sides; however, wireless link may provide information regarding whether it is wireless-related loss or not o Scenario 2: no change at any intermediate node, no change at the receiver side, only sender side is allowed to be modified; no addition information feedback other than loss

15 Solution Space (contd) Scenario 3: Intermediate node is allowed to change, TCP sender & receiver sides should be kept intact as much as possible Scenario 4: you can change anywhere, TCP senders & receivers, as well as intermediate nodes

16 Solutions End-to-end protocols o Category 1: the network or receiver provides additional feedback information on the loss behavior enhance TCP to handle bursty loss using SACK o Category 2: at the sender side, develop mechanisms differentiating packet loss behaviors, modify TCP congestion control to react accordingly Split-connection approach o split into two connections: one for wireline part, the other for wireless part o since the wireless connection is only one hop, much easier to handle (link layer solution is possible)

17 Solutions (contd) Link-layer solution o provide higher layer a logical lossless link, by using link layer techniques for loss recovery: retransmissions, FEC o shield TCP from wireless loss as much as possible

18 End to end schemes: Category 1 Use explicit loss notification or ECN to differentiate loss behaviors o upon ELN, retransmit lost packet, do not invoke congestion control algorithm o an alternative scheme: invoke congestion control only upon ECN o comments: what about severe wireless loss (indeed the effective channel capacity decreases at the moment), treat it as congestion or non-congestion ? Use TCP SACK to handle multiple back-to-back loss

19 Split-Connection Schemes Split a single end-to-end TCP connection at an intermediate node (typically a base station), maintain two separate TCP connections for wireline links and for wireless links Comments: o duplicate data copying across layers (there are optimization techniques for sure) o even if wireless TCP is a single hop, it is still TCP, you still need to modify it to perform properly over the wireless link o what do you gain anyway ?

20 Link-Layer Solutions Play with different link-layer recovery schemes by recovering loss locally: o ARQ, FEC, channel-swapping, hybrid suppress DUP_ACKs from TCP to some degree how much you can shield from the standard TCP ?

21 TCP Snoop for cellular networks Cache packets at the base station and perform local retransmissions across the wireless link Snoop data packets: o A new packet in the normal TCP sequence: add to the snoop cache, forward to MH o Out-of-sequence packet that cached earlier (compare its seq # with latest ACK#): sender timeouts or fast retransmit o Out-of-sequence packet that NOT cached: congestion or out-of-order delivery, forwarded to MH and marked as rexmitted by sender Snoop ACK: o A new ACK: flush the cached acked data packets, update RTT estimate, propagate ACK to sender o A spurious ACK (seq #< last ACK): discarded o DUP ack: (a) if not 1 st DUP ack (later dup acks for lost packets), discard; (b) 1 st DUP ack, retransmit lost packet with priority.

22 End-to-end Schemes: Category 2 Goals: o maintain TCP like congestion control mechanism, in particular AIMD principle o basic design relies on packet loss indication only o able to better adapt if network can provide additional information feedback o differentiating different packet loss behaviors: congestion induced loss, channel error induced loss, (capacity) probe loss, etc. o tailor rate adaptation to different loss behaviors

23 Illustration on the expected behavior

24 End-to-end Schemes: Category 2 Key ideas: o use history of packet loss and congestion profile to distinguish congestion-induced loss from non- congestion-induced loss maintain moving average & deviation for effective transmission rate check whether the current is within the deviation o reacts gently to non-congestion-induced loss and reacts aggressively to congestion-induced loss, thereby achieving high efficiency, as well as quick response to the onset of congestion gentle loss: small decrease factor heavy loss: exponential growth for decrease factor

25 WTCP End-to-end design Congestion control o Rate-based design o Inter-packet delay as the main mechanism for transmission control o Distinguish the cause of packet loss and adjust the transmission rate accordingly o transmission rate computation at the receiver

26 Further Comments We only talk about reliable data delivery here, what about streamed media transport over wireless ? What about multi-hop mobile ad hoc scenarios ?

27 TCP over Ad-Hoc Mobile Networks Issues o Mobility induced Disconnection and reconnection: exponential retransmissions may kill TCP easily Reroute-induced out-of-order delivery: triggers fast retransmit/fast recovery Stale route route: packet loss o Multihop wireless Hidden terminal: optimal window size Contention induced loss typically happens before congestion loss

28 Some proposals Mobility o Explicit link failure notification o Freeze window size during disconnection Multihop wireless o Do not use packet loss as the indication o Probing the available bandwidth o MAC layer mechanisms o TCP tricks

Download ppt "Comparison between DSR and AODV DSR Overview AODV Overview Similarity Difference Consequence."

Similar presentations

Ads by Google