Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.

Slides:



Advertisements
Similar presentations
Data Communications and Networking
Advertisements

COMPUTER NETWORK TOPOLOGIES
Computer Network Topologies
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Routing: Cores, Peers and Algorithms
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Chapter 10: Introduction to Metropolitan Area Networks and Wide Area Networks.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
Mobile Ad hoc Networks COE 549 Routing Protocols I
Network Topologies.
Chapter 13: WAN Technologies and Routing 1. LAN vs. WAN 2. Packet switch 3. Forming a WAN 4. Addressing in WAN 5. Routing in WAN 6. Modeling WAN using.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
NETWORK TOPOLOGIES HNC COMPUTING - Network Concepts 1 Network Concepts Topologies.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Chapter 10: Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach Third.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
 Topology Topology  Different types of topology Different types of topology  bus topologybus topology  ring topologyring topology  star topologystar.
The Destination Sequenced Distance Vector (DSDV) protocol
NETWORKS NEED HISTORY HARDWARE REQD. SOFTWARE REQD. TOPOLOGIES.
Physical Topology Physical layout of the network nodes – Broad description of the network: no detail about device types, connection methods, addressing,...
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
DDR-based Multicast routing Protocol with Dynamic Core (DMPDC) Shiyi WU, Navid Nikaein, Christian BONNET Mobile Communications Department EURECOM Institute,
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
BLACK HOLE ATTACK AND ITS COUNTER MEASURES IN AODV ROUTING PROTOCOL Varsha Patidar, Rakesh Verma Mengfei Peng.
Network Concepts Topologies
1 University of California, Irvine Done By : Ala Khalifeh (Note : Not Presented)
Scalable Routing Protocols for
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 7 Spanning Tree Protocol.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Data Communications and Networks Chapter 1 - Classification of network topologies Data Communications and Network.
Chapter 2 Network topology and Networking devices.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Single Area OSPF Module 2, Review How routing information is maintained Link-state routers apply the Dijkstra shortest path first algorithm against.
Day 13 Intro to MANs and WANs. MANs Cover a larger distance than LANs –Typically multiple buildings, office park Usually in the shape of a ring –Typically.
Network Topology Computer network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
+ Dynamic Routing Protocols 2 nd semester
Computer Network Topologies
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
Network Topologies Charles Warren.
Types of topology. Bus topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly.
Vinay Singh Graduate school of Software Dongseo University
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Mesh Networks A.k.a “ad-hoc”

Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each node is connected directly to each of the others Partial mesh topology- some nodes are connected to all the others, but some of them are only connected to nodes with which they exchange the most data

History Originally sponsored by the Department of Defense for military use Goal was to provide packet-switched network in mobile elements of a battlefield in an infra-structureless environment Used a combination of ALOHA and CSMA and distance vector routing

Full Mesh Topology Every node has a circuit connecting it to every other node in the network Yields greatest redundancy, so if one node fails, network traffic can be redirected to any of the other nodes Usually reserved for backbone networks since it is very expensive

A full mesh topology

Partial Mesh Topology Some nodes are organized in a full mesh scheme but others are only connected to 1 or 2 in the network Common in peripheral networks connected to a full meshed backbone Less expensive to implement Yields less redundancy

A partial mesh topology

Wired mesh It is possible to have a fully wired mesh network, however this is very expensive Advantages Reliable Reliable Offers redundancy Offers redundancyDisadvantages - Expensive- large number of cables and connections required

Wireless Mesh Definition- a wireless co-operative communication infrastructure between multiple individual wireless tranceivers that have Ethernet capabilities Can either be centralized for highly scalable applications, or can be decentralized

Advantages Reliable- each node is connected to several others; when a node fails its neighbors find other routes Reliable- each node is connected to several others; when a node fails its neighbors find other routes Scalable- capacity can be added simply by adding nodes Scalable- capacity can be added simply by adding nodes Nodes act as repeaters to transmit data from nearby nodes to peers too far away to reach- this results in a network that can span large distances over rough terrain Nodes act as repeaters to transmit data from nearby nodes to peers too far away to reach- this results in a network that can span large distances over rough terrain Each node only transmits as far as the next node Each node only transmits as far as the next node

Gizmo truck Gizmo truck

How does it work? Data hops from one device to another until it reaches its destination Each device communicates its routing information to every device it connects with Each device then determines what to do with received data- pass it on or keep it

Types of Protocols Pro-active- distribute routing tables to the network periodically to maintain fresh lists of destinations Disadvantages Wasted bandwidth for transmitting routing tables Wasted bandwidth for transmitting routing tables Maintains routes that will never be used Maintains routes that will never be used Some algorithms never converge in large networks Some algorithms never converge in large networks

Re-active- also known as On-Demand these protocols find routes on demand by flooding the network with Route Request packets Disadvantages Delays in finding routes Delays in finding routes Excessive flooding can lead to network clogging Excessive flooding can lead to network clogging

Example: ADDV ADDV- Ad-hoc On-demand Distance Vector Establishes a route to a destination only on demand Contrast to the most popular pro-active protocols

How does ADDV work? Network is silent until a connection is needed The network node that needs a connection broadcasts a connection request Other nodes forward the message and record the node they heard it from, creating temporary routes back to the needy node

When a node that already has a route to the desired node gets the message it sends a message back through the temporary route to the requesting node The needy node then uses the route with the least hops to connect

Failures When a node fails, a routing error is passed back to the transmitting node and the process repeats Also, note that unused entries in the routing tables are recycled after a time, so unused paths are not kept

Drawbacks More time to establish a connection Initial communication to establish a route is heavy

Hierarchical- network orders itself into a tree or other hierarchy and sends requests through the structure

Example: Order One Network Protocol The network orders itself into a tree Each node periodically sends “hello” to its neighbors Each neighbor tells how many neighbors and connections it has and who its “mother” node is Each node picks the node with the largest access to links to be its “mother” node When two nodes pick each other as “mother” nodes, that is the top of the tree

Routing When a node needs a connection with another node and a route doesn’t exist it sends a request to its “mother” node This node then forwards the message to its “mother” node and so on until the original node is connected at the root to the node it wanted Next the algorithm tries to “cut corners” to optimize the path Each node on the route floods its neighbors with routing requests Each node on the route floods its neighbors with routing requests When a faster route is found, the unused part of the previous route is erased and flooding ceases on that route When a faster route is found, the unused part of the previous route is erased and flooding ceases on that route

Advantages Produces fairly good routes while reducing the number of messages required to keep the network connected Uses only small amounts of memory at each node The network has a reliable way to establish that a node is not in the network

Disadvantages Central “mother” nodes have an extra burden Eventually ceases to be scalable Link propagation time establishes a limit on the speed the network can find its root May use more power and bandwidth than other link-state protocols

Where is it going? What is the future of wireless ad-hoc? Automata