1 A Practical Routing Protocol for Vehicle-formed Mobile Ad Hoc Networks on the Roads 指導教授:許子衡 教授 報告學生:董藝興 學生 作者: Wang, S.Y.; Lin, C.C.; Hwang, Y.W.; Tao,

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Weight based Multicast Routing Protocol for Ad hoc Wireless Networks 學生:陳信皇 教授:陳仁暉.
指導教授:許子衡 教授 報告學生:馬敏修 2010/8/ Introduction 2. Geocast Routing Protocols  2.1 GAMER Overview 3. GAMER Details  3.1 Building the Mesh  3.2 Adaptation.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs Rolando Menchaca-Mendez J.J. Garcia-Luna-Aceves 280N Seminar: 4/28/2008.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Fastest-Vehicle Multi-hop Routing in Vehicular Ad hoc Networks 指導教授:許子衡 教授 報告學生:董藝興 學生 作者: Bilal, M. ; Chan, P.M.L. ; Pillai, P. ; 出處: Computer and Information.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Multicast routing.
Qian Zhang Department of Computer Science HKUST Advanced Topics in Next- Generation Wireless Networks Transport Protocols in Ad hoc Networks.
A Novel Approach to WLAN Mesh Interworking with Multiple Mesh Portals 指導教授:許子衡 教授 學生:王志嘉.
AD HOC WIRELESS MUTICAST ROUTING. Multicasting in wired networks In wired networks changes in network topology is rare In wired networks changes in network.
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
指導教授:許子衡 教授 報告學生:馬敏修 2010/5/ Introduction 2.Multi-Channel MAC Protocol 3.CMMP(Clustering-Based Multi-Channel MAC Protocol ) 4.Evaluation and Analysis.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
A Survey of Geocast Routing Protocols 指導教授:許子衡 教授 報告學生:馬敏修 指導教授:許子衡 教授 報告學生:馬敏修.
Hop State Prediction Method using Distance Differential of RSSI on VANET 指導教授:許子衡 教授 學 生:董藝興 學生 1.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
ECE 695 Sp 2006 Jim Catt TCP Functions TCP is a connection oriented protocol Primary functions  TCP sets up and maintains end-to-end connection between.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Cisco Network Devices Chapter 6 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Identify and explain various Cisco.
Medium Access Control protocols for ad hoc wireless networks: A survey 指導教授 : 許子衡 報告者 : 黃群凱.
Unit III Bandwidth Utilization: Multiplexing and Spectrum Spreading In practical life the bandwidth available of links is limited. The proper utilization.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Architecture and algorithms for an IEEE based multi-channel wireless mesh network 指導教授:許子衡 老師 學生:王志嘉.
Adaptive Routing Protocol for VANETs in City Environments using Real-Time Traffic Information 指導教授:許子衡 教授 報告學生:董藝興 學生 作者: Arzil, S.A. ; Aghdam,.H. ; Jamali,
A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing Networks Xiao-Hui Lin, Yu-Kwong Kwok, and Vincent K. N.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp , 作者: Yoh Shiraishi, Ryo Miki 指導教授:許子衡 教授.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
指導教授:許子衡 教授 學 生:黃群凱 2016/2/251 Proceedings of the 2008 IEEE International Conference on Vehicular Electronics and Safety Columbus, OH, USA. September 22-24,
1 Switching and Forwarding Sections Connecting More Than Two Hosts Multi-access link: Ethernet, wireless –Single physical link, shared by multiple.
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Time-stable geocast for ad hoc networks and its application with virtual warning signs Volume 27, Issue 11, 1 July 2004, Pages Applications and.
A New Recovery Method for Greedy Routing Protocols in High Mobile Vehicular Communications 指導教授:許子衡 教授 學 生:董藝興.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
A Location-Based Routing Method for Mobile Ad Hoc Networks
Link Layer 5.1 Introduction and services
MZR: A Multicast Protocol based on Zone Routing
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Presentation transcript:

1 A Practical Routing Protocol for Vehicle-formed Mobile Ad Hoc Networks on the Roads 指導教授:許子衡 教授 報告學生:董藝興 學生 作者: Wang, S.Y.; Lin, C.C.; Hwang, Y.W.; Tao, K.C.; Chou, C.L.; 出處: Intelligent Transportation Systems, Proceedings IEEE

2 INTRODUCTION A traditional routing protocol such as AODV works by periodically issuing control packets to detect and maintain neighboring nodes, find and set up routing path, and repair broken paths, etc.

3 INTRODUCTION In an IVC network, however, the topology changes very frequently due to the high moving speeds of vehicles. As such, a unicast routing path set up between a pair of vehicles breaks frequently.

4 INTRODUCTION Flooding provides the best reliability because it can use any path to reach the destination vehicle as long as one exists. Currently, our protocol is designed for IVC networks formed by a few vehicles moving on the same lane.

5 RELATED WORK Most routing protocols for MANET are single-path based protocols, which can be further classified into two groups: “table- driven” and “on-demand. protocols under high mobility, they still need to spend much time and control packet bandwidth overhead on updating the routing information in an IVC network.

6 RELATED WORK Although this type of routing protocols can cope with high mobility problems, it has some disadvantages. First, each mobile node needs to know its location at any time.

7 RELATED WORK Second, a separate location directory service is required for a mobile node to know the location of a remote destination node. Moreover, greedy routing may lead packets to “dead branches” in the network, where there are no routes to their destination nodes at all.

8 PROTOCOL ARCHITECTURE

9

10 PROTOCOL DESIGN Although flooding provides high reliability and eliminates the need to keep routing entries in an IVC network, there are still two shortcomings. First, in the design of IEEE (a/b/g) MAC protocols a broadcast frame is not protected by ACK frames.

11 PROTOCOL DESIGN Second, a large number of redundant packet transmissions may result due to flooding. And these redundant packets will waste network bandwidth.

12 PROTOCOL DESIGN Error Handling : Lacking an ACK protection mechanism at the MAC layer for broadcast frames can result in a poor performance at a higher layer.

13 PROTOCOL DESIGN Therefore, ACK and retransmission mechanisms are required for broadcast frames in our protocol. To save the number of ACK packets, our protocol doesn’t require a forwarding node to explicitly send back an ACK packet to the previous node that broadcasts the packet.

14 PROTOCOL DESIGN To let FloodRD know whether a received packet is broadcasted by an upstream node or by a downstream forwarding node, a sequence number is used and carried in the FloodRD- specific header of the packet.

15 PROTOCOL DESIGN Redundant Transmission Avoidance : FloodRD adopts two schemes to minimize redundant transmissions. The first scheme makes a forwarding FloodRD rebroadcast the same packet not more than once.

16 In an IVC network, a packet may be cloned and each of these copies takes a different path to reach a forwarding FloodRD. With the second scheme, a forwarding FloodRD will not rebroadcast a packet once it hears that some FloodRD has rebroadcasted the packet.

17 PROTOCOL DESIGN In our protocol, FloodRD delays the transmission (i.e., forwarding) of a packet by a random delay time and if a FloodRD hears that another FloodRD has forwarded the packet within the delay time, it cancels its own packet transmission.

18 PROTOCOL DESIGN Sliding Window-Based Forwarding : To boost performance, FloodRD adopts a sliding window-based ACK mechanism, which allows multiple packets to be transmitted successively before the ACK packet for the first DATA packet has arrived.

19 PROTOCOL DESIGN Fast Retransmission : By inspecting the sequence numbers carried in incoming ACK packets (either explicit or implicit ACKs), FloodRD views that a packet has been lost if its ACK packet has not come back but more than N ACK packets for its following packets have come back, where N is a system parameter.

20 PROTOCOL DESIGN In-Order Forwarding and Delivery : Our protocol needs to handle this problem because (1) packets generated by the same application may reach a forwarding FloodRD out-of-order due to traversing on different paths in the network, and (2) FloodRD artificially gives a different random delay time to each forwarded packet to cancel redundant transmissions.

21 PROTOCOL DESIGN If a newly-arriving packet (say, packet A) has a smaller sequence number than that of a packet already in the transmission queue (say, packet B) but packet A is given a larger random delay time than that given to packet B, FloodRD will exchange their random delay times to make sure that packet A is transmitted before packet B.

22 IMPLEMENTATION Packet Filtering : The wireless NIC of each node is configured with two IP addresses using the “IP aliasing” utility. The subnet is used for normal applications to exchange their data.

23 IMPLEMENTATION The subnet, on the other hand, is used by FloodRDs to flood packets generated by applications.

24 IMPLEMENTATION Broadcasting Packets at A High Rate : Some IEEE (a/b/g/) network interface cards (NIC) purposely slow down the transmission rate for broadcast packets to only 2 Mbps. To overcome this problem, we changed the configuration of the driver for these NICs and allowed them to broadcast packets at the 11 Mbps high transmission rate.

25 IMPLEMENTATION Parameter Settings :

26 PERFORMANCE EVALUATION To evaluate the performances of our scheme, we conducted a series of field trials. Six sedan vehicles were used in experiments.

27 PERFORMANCE EVALUATION

28 PERFORMANCE EVALUATION

29 PERFORMANCE EVALUATION