1 802.11a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Unicast Routing Protocols for Ad Hoc Networks Kumar Viswanath CMPE 293.
1 Chapter 04 Routing in Ad Hoc Networks Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Advanced Topics in Next-Generation Wireless Networks
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
CS541 Advanced Networking 1 Dynamic Channel Assignment and Routing in Multi-Radio Wireless Mesh Networks Neil Tang 3/10/2009.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Mobile Ad Hoc Networks (MANET). 2 Mobile Ad Hoc Networks  Formed by wireless hosts which may be mobile  Without (necessarily) using a pre-existing.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Ad Hoc Wireless Routing COS 461: Computer Networks
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
The Zone Routing Protocol (ZRP)
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Material in this slide set are from a tutorial by Prof. Nitin Vaidya 1.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
Switching breaks up large collision domains into smaller ones Collision domain is a network segment with two or more devices sharing the same Introduction.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 Mobile Ad Hoc Networks for CSC 453 Sp 2011 From a tutorial by Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Routing in Mobile Ad Hoc Networks (from Ad Hoc Networking by Charles Perkins) Thanks to Prof. Yu at Cleveland State Univ.
Asstt. Professor Adeel Akram. Infrastructure vs. multi-hop Infrastructure networks: One or several Access-Points (AP) connected to the wired network.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
1 A Practical Routing Protocol for Vehicle-formed Mobile Ad Hoc Networks on the Roads 指導教授:許子衡 教授 報告學生:董藝興 學生 作者: Wang, S.Y.; Lin, C.C.; Hwang, Y.W.; Tao,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Ασύρματα Δίκτυα και Κινητές Επικοινωνίες Ενότητα # 13: Δρομολόγηση σε Κινητά Αδόμητα Δίκτυα (Mobile Ad Hoc Networks) Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Routing in Mobile Ad Hoc Network (MANET)
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Slides courtesy of Nitin Texas A&M
IEEE Terminology - STA (Station)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
CSCI {4,6}900: Ubiquitous Computing
Folien aus: Mobile Ad Hoc Networks: Routing, MAC and Transport Issues
Overview: Chapter 3 Networking sensors
Advance Topics in Networking
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group

2 Overview of Unicast Routing Protocols

3 Flooding for Data Delivery  Sender S broadcasts data packet P to all its neighbors  Each node receiving P forwards P to its neighbors  Sequence numbers used to avoid the possibility of forwarding the same packet more than once  Packet P reaches destination D provided that D is reachable from sender S  Node D does not forward the packet

4 Flooding for Data Delivery B A S E F H J D C G I K Represents that connected nodes are within each other’s transmission range Z Y Represents a node that has received packet P M N L

5 Flooding for Data Delivery B A S E F H J D C G I K Represents transmission of packet P Represents a node that receives packet P for the first time Z Y Broadcast transmission M N L

6 Flooding for Data Delivery B A S E F H J D C G I K Node H receives packet P from two neighbors: potential for collision Z Y M N L

7 Flooding for Data Delivery B A S E F H J D C G I K Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P once Z Y M N L

8 Flooding for Data Delivery B A S E F H J D C G I K Z Y M Nodes J and K both broadcast packet P to node D Since nodes J and K are hidden from each other, their transmissions may collide  Packet P may not be delivered to node D at all, despite the use of flooding N L

9 Flooding for Data Delivery B A S E F H J D C G I K Z Y Node D does not forward packet P, because node D is the intended destination of packet P M N L

10 Flooding for Data Delivery B A S E F H J D C G I K Flooding completed Nodes unreachable from S do not receive packet P (e.g., node Z) Nodes for which all paths from S go through the destination D also do not receive packet P (example: node N) Z Y M N L

11 Flooding for Data Delivery B A S E F H J D C G I K Flooding may deliver packets to too many nodes (in the worst case, all nodes reachable from sender may receive the packet) Z Y M N L

12 Flooding for Data Delivery: Advantages  Simplicity  May be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher  this scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions  Potentially higher reliability of data delivery  Because packets may be delivered to the destination on multiple paths

13 Flooding for Data Delivery: Disadvantages  Potentially, very high overhead  Data packets may be delivered to too many nodes who do not need to receive them  Potentially lower reliability of data delivery  Flooding uses broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead –Broadcasting in IEEE MAC is unreliable  In our example, nodes J and K may transmit to node D simultaneously, resulting in loss of the packet –in this case, destination would not receive the packet at all

14 Flooding of Control Packets  Many protocols perform (potentially limited) flooding of control packets, instead of data packets  The control packets are used to discover routes  Discovered routes are subsequently used to send data packet(s)  Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods

15 Differences (Data Delivery vs. Route Acquisition)  When delivering data, all that’s required is getting the packet to the destination.  When discovering a route, you are trying to minimize some metric.  If the RREQ packet arrives on a ‘bad’ path, then your route that you will use will be bad.  Consider the example of multi-rate networks.  Slow links have longer range. You’ll generally always hear the packet across a slow path before hearing on a fast path.  This is fine for data delivery, since broadcast packets are sent at the lowest speed anyway.  But for routing, this can cause you to select a slow path over a long path and use it until it breaks.

16 B D C A Broadcast Storm Problem [Ni99Mobicom]  When node A broadcasts a route query, nodes B and C both receive it  B and C both forward to their neighbors  B and C transmit at about the same time since they are reacting to receipt of the same message from A  This results in a high probability of collisions

17 Broadcast Storm Problem  Redundancy: A given node may receive the same route request from too many nodes, when one copy would have sufficed  Node D may receive from nodes B and C both B D C A

18 Solutions for Broadcast Storm  Probabilistic scheme: On receiving a route request for the first time, a node will re-broadcast (forward) the request with probability p  Also, re-broadcasts by different nodes should be staggered by using a collision avoidance technique (wait a random delay when channel is idle)  this would reduce the probability that nodes B and C would forward a packet simultaneously in the previous example

19 B D C A F E Solutions for Broadcast Storms  Counter-Based Scheme: If node E hears more than k neighbors broadcasting a given route request, before it can itself forward it, then node E will not forward the request  Intuition: k neighbors together have probably already forwarded the request to all of E’s neighbors

20 E Z <d<d Solutions for Broadcast Storms  Distance-Based Scheme: If node E hears RREQ broadcasted by some node Z within physical distance d, then E will not re-broadcast the request  Intuition: Z and E are too close, so transmission areas covered by Z and E are not very different  if E re-broadcasts the request, not many nodes who have not already heard the request from Z will hear the request

21 Summary: Broadcast Storm Problem  Flooding is used in many protocols, such as Dynamic Source Routing (DSR)  Problems associated with flooding  collisions  redundancy  Collisions may be reduced by “jittering” (waiting for a random interval before propagating the flood)  Redundancy may be reduced by selectively re- broadcasting packets from only a subset of the nodes

22 Generic On-demand Routing Protocol  Routes are maintained only between nodes which need to communicate  Route Requests (RREQ) are flooded through the network  When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source  When the intended destination receives a Route Request, it replies by sending a Route Reply  Route Reply travels along the reverse path set-up when Route Request is forwarded

23 Route Requests Phase B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L

24 Route Requests Phase B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L

25 Route Requests Phase B A S E F H J D C G I K Represents links on Reverse Path Z Y M N L

26 Route Requests Phase B A S E F H J D C G I K Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once Z Y M N L

27 Route Requests Phase B A S E F H J D C G I K Z Y M N L

28 Route Requests Phase B A S E F H J D C G I K Z Y Node D does not forward RREQ, because node D is the intended target of the RREQ M N L

29 Route Reply Phase B A S E F H J D C G I K Z Y Represents links on path taken by RREP M N L

30 Data Delivery B A S E F H J D C G I K Z Y M N L Routing table entries used to forward data packet. DATA

31 Summary: Generic On-demand Routing Protocols  Nodes maintain routing tables containing entries only for routes that are in active use  Next-hop per destination maintained at each node  Unused routes expire even if topology does not change