Routing in Mobile Wireless Networks Neil Tang 11/14/2008

Slides:



Advertisements
Similar presentations
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Advertisements

MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Revisiting On Demand Routing On Demand Routing schemes are reactive – a route is found when needed. This precludes the periodic exchange of routing tables.
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
CS541 Advanced Networking 1 Basics of Wireless Networking Neil Tang 1/21/2009.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
CIS 725 Wireless networks. Low bandwidth High error rates.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Dsr – dynamics source routing. basics Two types of routing –On-demand / reactive Information is only collected when required, I.e., when a packet needs.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
1 Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson and David A. Maltz published in the book “Mobile Computing” 1996.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Routing in Mobile Ad Hoc Networks (from Ad Hoc Networking by Charles Perkins) Thanks to Prof. Yu at Cleveland State Univ.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Ad-hoc Networks.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobile Computing CSE 40814/60814 Spring 2017.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Routing design goals, challenges,
Ad-hoc Network Routing
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Routing Protocols in MANETs
Sensor Network Routing
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
Proactive vs. Reactive Routing
Mobile Ad-hoc Networks (MANET)
Overview: Chapter 3 Networking sensors
Routing.
Routing in Mobile Ad-hoc Networks
Wireless Mesh Networks
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Routing protocols in Mobile Ad Hoc Network
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Routing in Mobile Wireless Networks Neil Tang 11/14/2008 CS440 Computer Networks

Outline Wireless Communications and Networks MANET DSR CS440 Computer Networks

Wireless Communications There is no physical link in wireless networks. Signals are transmitted on a certain frequency, propagate in the space and are captured by the intended receiver tuned to the same frequency. Wireless communication is normally broadcast communication, i.e., all nodes within the transmission range of a particular node can receive the transmitted packets. Transmissions in a common neighborhood will interfere with each other. If the Signal-to-Interference-Noise-Ratio (SINR) in the receiver is large enough, a packet can be correctly decoded. CS440 Computer Networks

Wireless Networks Single-hop wireless networks. Emerging multihop wireless networks: mobile ad hoc network, wireless mesh network, wireless sensor network. CS440 Computer Networks

Mobile Ad Hoc Network (MANET) Nodes may join and leave the network at any time. Each node is mobile and its movement is entirely unrestricted. Each node may forward packets for other nodes in the network. A B C D E B C E A D CS440 Computer Networks

Routing in MANETs On-demand (reactive) routing: Upon arrival of a connection request, the source node floods route discovery messages and find a route. For example, AODV and DSR. Proactive routing: Nodes flood updates throughout the network whenever the network topology changes and the routes are pre-computed. For example, OLSR. Hybrid routing: Route discovery is basically conducted reactively but link state update is conducted proactively within a certain range, e.g., 2-hop neighborhood of a node. For example, ZRP CS440 Computer Networks

On-Demand VS. Proactive On-demand (reactive) routing: Low routing overhead but long route discovery latency. Proactive routing: High routing overhead especially in the case of high mobility but short route discovery latency. CS440 Computer Networks

Dynamic Source Routing (DSR) DSR is an on-demand routing protocol for MANET. The whole source-to-destination route is included in every data packet and no routing table is needed for packet forwarding in each node. Loop freedom is guaranteed. Large overhead in the packets. CS440 Computer Networks

Route Discovery The source node broadcasts a RREQ (request) message to request a path to the destination. A tuple (SrcID, RequestID) is used to uniquely identify a route request. A node v receiving the RREQ will, - discard the packet if it is an old or duplicate one - discard the packet if v is already in the route list - send a RREP (reply) packet back to the source through the reverse route if v is the destination. - otherwise, append itself in the route list and re-broadcast the packet. Both RREQ and RREP will be sent out only once in each node. If a node has a record in its cache showing how to reach the destination, it can reply a RREP to the source immediately. CS440 Computer Networks

Route Discovery Route request for A->G Red – RREQ, Green - RREP B A-B-D-G G A-B A A-B-D D A-C-E A H E A-C C F CS440 Computer Networks

Route Maintenance A link-layer hop-by-hop ACK is usually used for reliable transmissions. For example, 802.11 DCF supports the link-layer ACK. A RERR will be sent by the end node to the source node if it detects a link breakage. Nodes along the path will then update their caches accordingly and the source node will initiates a new route discovery. CS440 Computer Networks

Route Maintenance B RERR G D G A H E C F CS440 Computer Networks Route Cache (A) G: A, B, D, G F: C, E, F H E C F CS440 Computer Networks

Route Optimization Route Caching: Each node caches a new route it learns by any means. For example, when A finds route [A,B,D,E,F] to F, A also learns route [A,B,D,E] to E; D forwards data [A,B,D,E,F], D learns route [D,E,F] to F; When G receives RREQ [A,B,D,E] destined for some node F, G learns route [G,E,D,B,A] to A. So A node usually organize its cache in the format of a shortest path tree with itself as the root. Avoid RREP Storm Problem: An intermediate node will delay transmitting the route reply for a random period of d. During this period, cancel the route reply if overhearing any packet containing a route better than its solution. Limit the Propagation of RREQ Packets: First, set TTL = 1 for first route request packet. If no route reply is received after some time period, set TTL = maximum for next RREQ. . CS440 Computer Networks

Route Optimization Reflect Shorter Route: A node may find that route may be shortened by excluding some intermediate node(s), it will then sends an unsolicited RREP to the source to inform the shorter route. Improve Error Handling: exponential backoff is used to limit the rate at which new route discoveries are initiated from any host for the same destination. Piggyback Data on RREQs CS440 Computer Networks