Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Overview of Ad Hoc Routing Protocols. Overview 1.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TORA! TORA! TORA! By Jansen Cohoon. Developing TORA TORA was funded by the Army Research Laboratory. TORA is presently being transitioned into the commercial.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Novel Cluster-based Routing Protocol with Extending Lifetime for Wireless Sensor Networks Slides by Alex Papadimitriou.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Internet Networking Spring 2002
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
EE689 Lecture 12 Review of last lecture Multicast basics.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Multicast Routing Protocols NETE0514 Presented by Dr.Apichan Kanjanavapastit.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Distance-vector Multicast Routing Protocol (DVMRP)
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Routing Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific Institute of Information.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
MZR: A Multicast Protocol based on Zone Routing
(How the routers’ tables are filled in)
Internet Networking recitation #4
Sensor Network Routing
THE NETWORK LAYER.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
Temporally-Ordered Routing Algorithm (TORA)
Subject Name: Computer Networks - II Subject Code: 10CS64
Kuliah 5 ROUTING.
On Demand Multicast Routing Protocol (ODMRP )
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lecture 6 : The Lightweight Mobile Routing Algorithm Lecture 6.1 : Basic ideas behind the LMR algorithm and initialization of a network Lecture 6.2 : Route maintenance and detailed description

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) The Domain of the LMR Algorithm  The lightweight mobile routing (LMR) algorithm was developed for routing in highly dynamic mobile networks.  If the mobility is extremely high, the only possible routing strategy is flooding the network with a message and hoping that the message will eventually reach the destination.  All mobile routing protocols degenerate into flooding in extremely mobile environments.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) The Domain of the LMR Algorithm  On the other hand, if mobility is low, shortest path based algorithms are more appropriate as shortest path computations converge before the nodes move.  The LMR algorithm is suitable in an intermediate domain when mobility is not so low that shortest path algorithms can converge, and mobility is not so high that flooding is the only possibility.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Properties of the LMR Algorithm  The LMR algorithm is loosely based on the link- reversal strategy of the Gafni-Bertsekas algorithm.  However, there are significant differences between the two algorithms. The most important difference is that the LMR algorithm works even when the network is partitioned.  Also, the LMR algorithm finds routes on-demand instead of maintaining paths to a destination from all other nodes.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Properties of the LMR Algorithm  For a given destination D, instead of maintaining routes from all source nodes to D, the algorithm guarantees route maintenance only for those sources that actually need the routes.  This property ensures that the control overhead of the algorithm is quite low.  The objective of the LMR protocol is not to find a shortest path between a source-destination pair, rather to find any path.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Network Model  The neighbours of a node are denoted by  For each neighbour, there exists a link between nodes and  This link may be directed or undirected.  An underlying link level protocol provides the following services : – Each node is aware of all its neighbours – A packet transmitted by a node is received correctly by all its neighbours regardless of the status of the link.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Control Packets  The LMR protocol uses three types of control packets : – QRY (Query) : consists of a source node ID, a destination node ID, a sequence counter and a transmitting node ID – RPY (Reply) – FQ (Failure query)

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) QRY  The sequence counter in a QRY produces increasing sequence number.  The source node ID is the ID of the node which is sending the QRY.  The transmitting node ID is the ID of the node which is forwarding the QRY.  Both RPYs and FQs consist only of a destination node ID and a transmitting node ID.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Link Status Table  A node maintains a link status table entry LS(j) for each neighbour j. The status of an active link is one of the following :  Unassigned (UN), upstream (UP), downstream (DN), downstream-blocked (DN-B), unassigned- waiting (UN-W), and awaiting-broadcast (A-BR).  Links marked UN, UN-W and A-BR are undirected.  Remember that this is the link status table only with respect to one destination.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) The General Case  We will discuss the protocol in terms of a single destination D and a link status table at each node for D.  Also, we will talk about a single DAG rooted at D. However, in general there are many destinations and one DAG for each destination.  Each node keeps track of each of its neighbour´s link status for each of the destinations.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Initialization Phase  In the beginning, the network is unassigned.  Only the neighbours of the destination D have routes to D. All other nodes do not have any route to D. The links for all these nodes are unassigned or undirected.  A node is said to have a route if it has at least one downstream link, though it may not have a complete route to D.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Initializing the Network  Eventually a node i which is not a neighbour of D will require a root to D and send a QRY.  This QRY starts the initialization phase and floods the network in the following sense.  Each node that receives the QRY broadcasts it to all of its neighbours only once. QRYs travel over unassigned links.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) RPY  A node with a route to the destination D initiates a RPY message.  If a node receives a RPY over an unassigned link, it marks the link to the neighbour (from whom the RPY came) as downstream.  If there is no RPY for a certain period of time, the initiator of the QRY may start another QRY.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization S QRY Nodes that have received QRY Nodes that have paths to D D

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization S QRY Nodes that have received QRY Nodes that have paths to D D

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization S QRY Nodes that have received QRY Nodes that have paths to D D

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization Nodes that have received QRY S QRY Nodes that have paths to D D RPY

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization S Nodes that have received QRY Nodes that have paths to D D RPY

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization S Nodes that have received QRY Nodes that have paths to D D RPY

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Initialization S Nodes that have received QRY Nodes that have paths to D D RPY

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Initialization Completed  If the initiator of the QRY i.e., node S is in the partition of the network that contains D, eventually some neighbouring node of D will receive the QRY.  The resulting RPY messages initializes the network into a DAG rooted at D. S obtains one or more loop-free routes to D.  Even other nodes receive routes to D as a result of the initialization.