H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN.

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Design and Implementation of the OLSR Protocol in an Ad Hoc Framework Juan Gutiérrez Plaza Supervisor: Raimo Kantola Instructor: José Costa Requena Networking.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Page 1 of Fisheye State Routing (FSR) G. Pei, M. Gerla, Tsu-Wei Chen, "Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks,"
Progress Report Wireless Routing By Edward Mulimba.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Ad Hoc Networks Routing
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Interference-Aware QoS OLSR for Mobile Ad-hoc Network Routing SAWN 2005, May 24 P. Minet & D-Q. Nguyen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Mobile Ad hoc Networks COE 549 Routing Protocols I
Ad Hoc Wireless Routing COS 461: Computer Networks
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
CROSS-ROAD: CROSS-layer Ring Overlay for AD Hoc Networks Franca Delmastro IIT-CNR Pisa Cambridge, March 23 rd 2004.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
Carlos Rodrigo Aponte OLSRv2 High Level Overview.
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
The Destination Sequenced Distance Vector (DSDV) protocol
Simulation of the OLSRv2 Protocol First Report Presentation.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Hop State Prediction Method using Distance Differential of RSSI on VANET 指導教授:許子衡 教授 學 生:董藝興 學生 1.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Ch 4. Routing in WMNs Myungchul Kim
Routing & Middleware: Experiments Eleonora Borgia, Franca Delmastro, and Luciana Pelusi Pervasive Computing & Networking Lab. (PerLab) IIT-CNR Pisa.
Link State Routing David Holmer Generic Link State Routing  Each node monitors neighbors/local links and advertises them to the network.
H AZY S IGHTED L INK S TATE Eleonora Borgia IIT – CNR Pisa - Dicember 4th, 2003.
HSLS R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN Project - Helsinki.
Middleware issues: From P2P systems to Ad Hoc Networks
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Optimized Link State Routing Protocol for Ad Hoc Networks Jacquet, p IEEE INMIC Dec park gi won
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
An Efficient Routing Protocol for Green Communications in Vehicular Ad-hoc Networks Jamal Toutouh, Enritue Alba GECCO’ 11, July Presented by 劉美妙.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Routing Metrics for Wireless Mesh Networks
A Brief Talk on Mesh Routing
Routing Metrics for Wireless Mesh Networks
AODV-OLSR Scalable Ad hoc Routing
DSDV Highly Dynamic Destination-Sequenced Distance-Vector Routing
Sensor Network Routing
Fisheye Routing protocol
Ad hoc Routing Protocols
by Saltanat Mashirova & Afshin Mahini
Routing Metrics for Wireless Mesh Networks
OLSR + FSR for Scalability in Mesh Networks
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN Project - Helsinki – June 7/8, 2004

Main Target Identify a routing protocol suitable for a cross-layer architecture: in term of scalability, performance and efficiency; providing more advantages to the other protocols.  MANET standpoint:  OUR standpoint: The protocol overhead cannot be computed in isolation; New cross-layer metrics must be applied to compute it; It’s useful having a knowledge (at least partial) of the network topology, also to provide it to other protocol layers. reactive protocols are more efficient than proactive ones for the introduced overhead proactive protocols are more suitable

Overview of Link State Routing In literature there are different approaches aimed to reduce the overhead introduced by protocols based on LS: Efficient Dissemination : updates sent throughout the network more efficiently (e.g. OLSR, TBRF, STAR) Limited Dissemination : restriction of the scope of routing updates in space and time (e.g. hierarchically LS, FSR, GSR, HSLS)

TRADITIONALLY: OVERHEAD  CONTROL OVERHEAD Amount of bandwidth require to construct and maintain routes PROACTIVE OVERHEAD: number of packets exchanged between nodes in order to maintain node’s routing table REACTIVE OVERHEAD : consumed bandwidth for Request/Reply messages Total overhead (1) The impact of SUB-OPTIMAL routes and its overhead must be taken into account. As N increases, keeping route optimality is much expensive particularly in LS; SUB-OPTIMAL paths may be used.

Ex: A = 3 hops B = k hops SUB-OPT ov = (k-3)*Packet_length Total overhead (2) NEW DEFINITION * : TOTAL OVERHEAD of protocol X is the sum of: 1.PROACTIVE OVERHEAD; 2.REACTIVE OVERHEAD; 3.SUB-OPTIMAL OVERHEAD : Difference between the bandwidth consumed using the sub-optimal paths and that eventually consumed if the data had followed the shortest available path(s). SD A B (*) C. Santivanez, I. Stavrakakis et al, “On the scalability of Ad Hoc Routing Protocols”, INFOCOM 2002

Proactive protocol with Limited Dissemination ; Scope’s restriction: LSU packets are broadcasted periodically over the network with frequencies f i that decreases with the distance from the node itself; Each node has a partial knowledge of the network (i.e. not real-time uploaded): detailed view of 1-hop neighborhood; “hazy” knowledge of distant nodes. HSLS is based on the observation that nodes that are far away not need to have a complete topological information in order to make a good next hop decision Hazy Sighted Link State (HSLS) (1)

Hazy Sighted Link State (HSLS) (2) 1.A node wakes up every t e sec and sends a LSU with TTL=2 if there has been a link status change in the last t e sec; 2.Every 2 i-1 * t e sec (with i=1,2,3..) a node wakes up and sends a LSU with TTL= 2 i if there has been a link status change in the last 2 i-1 * t e sec; 3.Every t b sec (t b >t e ) a global LSU (TTL=  ) is sent in the entire network to give a complete overview of the network topology, even if there’s no link changes. t e: : period with which a LSU is sent through the network TTL = 2 i High mobility scenario:

Originator ID TTL Neighbor ID 1 Neighbor ID 2 LSU packet Broadcast transmission HSLS Example R A D C E S P Q N F M L J O H G K T U V X Z W B N F M L J O H G K A B D C E Originator ID TTL = 2 Neighbor ID 1 Neighbor ID 2 LSU packet T = te : R A D C E B P Q N F M L J O H G K T U V X Originator ID TTL = 4 Neighbor ID 1 Neighbor ID 2 LSU packet T = 2 te : R A D C E B P Q N F M L J O H G K T U V X Z W Originator ID TTL =  Neighbor ID 1 Neighbor ID 2 LSU packet T = 4 te : Network size: 5 hops

Comparative study * Routing ProtocolTotal_overhead SLS (proactive) (N2)(N2) DSR (reactive)  ( N 2 +N 2 *log 2 N ) ZRP (hybrid) (N2)(N2) HSLS  ( N 1.5 ) (*) C. Santivanez, I. Stavrakakis et al, “On the scalability of Ad Hoc Routing Protocols”, INFOCOM 2002

Interface with the cross-layer architecture and cooperation with other protocol layers MobileMAN project Possible integration with HUT Ad Hoc framework Proactive Subsystem Common Modules Reactive Subsystem Hybrid Subsystem Ad Hoc Framework (HUT) Test and Performance evaluation HSLS Subsystem  HSLS software architecture design

Software Architecture HSLS Initialization Garbage Collector N E S T Communication Packet Mangement Socket Management Processing LSU Hello