The Wireless Routing Protocol (WRP) Invented by J.J.Garcia Luna Aceves and S. Murthy Belongs to a general class of algorithms called Path Finding Algorithms.

Slides:



Advertisements
Similar presentations
4/12/2015© 2009 Raymond P. Jefferis IIILect Internet Protocol - Continued.
Advertisements

Multicasting in Mobile Ad Hoc Networks Ravindra Vaishampayan Department of Computer Science University of California Santa Cruz, CA 95064, U.S.A. Advisor:
Routing Protocols Lecture # 6 Obaid Khan.
Routing Protocol.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
CSE331: Introduction to Networks and Security Lecture 9 Fall 2002.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 22 Introduction to Computer Networks.
Chapter 4 Distance Vector Problems, and Link-State Routing Professor Rick Han University of Colorado at Boulder
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Link State Routing Essentially involves disseminating information with regards to each and every link to each and every node in the network. Dijkstra’s.
Routing.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
1 Computer Networks Routing Algorithms. 2 IP Packet Delivery Two Processes are required to accomplish IP packet delivery: –Routing discovering and selecting.
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
The Zone Routing Protocol (ZRP)
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Review: routing algorithms. –Choose the appropriate paths. –Routing algorithms Flooding Shortest path routing (example). –Dijkstra algorithm. –Bellman-Ford.
M.Menelaou CCNA2 ROUTING. M.Menelaou ROUTING Routing is the process that a router uses to forward packets toward the destination network. A router makes.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Routing Table  The seven fields Mask: for finding (sub)network address of the destination l Host-specific routing: (/32) l Default routing:
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
ICS 156: Networking Lab Magda El Zarki Professor, ICS UC, Irvine.
Routing protocols. Static Routing Routes to destinations are set up manually Route may be up or down but static routes will remain in the routing tables.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Computer Networks22-1 Network Layer Delivery, Forwarding, and Routing.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
CS440 Computer Networks 1 Link State Routing and OSPF Neil Tang 10/31/2008.
Lecture 7. Building Forwarding Tables There are several methods Static Method Dynamic Methods Centralized Distributed Distance Vector Link State.
Distance Vector Routing
CSE 421 Computer Networks. Network Layer 4-2 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside.
Chapter 7 Packet-Switching Networks Shortest Path Routing.
Routing Metrics for Wireless Mesh Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Instructor Materials Chapter 5: Dynamic Routing
Routing Metrics for Wireless Mesh Networks
Internet Networking recitation #4
Sensor Network Routing
THE NETWORK LAYER.
CS 457 – Lecture 12 Routing Spring 2012.
Intra-Domain Routing Jacob Strauss September 14, 2006.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing.
Chapter 5: Dynamic Routing
Mobile and Wireless Networking
Routing in Packet Networks Shortest Path Routing
Routing Metrics for Wireless Mesh Networks
Communication Networks
Advanced Computer Networks
Routing.
Communication Networks
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing.
Routing protocols in Mobile Ad Hoc Network
OSPF Protocol.
Presentation transcript:

The Wireless Routing Protocol (WRP) Invented by J.J.Garcia Luna Aceves and S. Murthy Belongs to a general class of algorithms called Path Finding Algorithms (PFA). Use information with respect to the length of and the second-to-last-hop on the shortest path.

Path Finding Algorithm Each node maintains the shortest path spanning tree maintained by each of its neighbors. Using this, it creates its own shortest path spanning tree. Note: Shortest path Shortest Weighted Path Periodically, each node broadcasts an update (could be null: why?) that reports updates to its spanning tree. Each update contains : The destination address Distance to that destination An identifier of the node that is at the second-to-last-hop on the shortest path to that destination.

WRP : Nitty Gritty Details Uses the generic ideas in PFA Reduces the number of temporary routing loops. Let us call second-to-last-hop node as the predecessor node. When a node receives an update from a neighbor it checks the consistency of the predecessor information reported by all its neighbors. The spanning tree also gives info with regards to the next hop neighbor towards that destination. We call this next hop neighbor the successor node.

In WRP, each node maintains four tables: Distance Table Routing Table Link-Cost Table Message Retransmission List (MRL)

Distance Table Let us consider a particular node A. In this table, for each destination K, node A maintains the distance to K via each of its neighbors (say B) D A KB, and the predecessor node P A KB, along that path. This table is used in the construction of the minimum spanning tree.

Routing Table Aided by the spanning tree formed: thanks to the distance table. For each destination Node K, it contains + The address of Node K. + The distance to Node K. + The successor on the shortest path to Node K. + The predecessor on this path to Node K. May also contain a flag to indicate whether the path is correct, or erroneous (no path to destination).

Link-Cost Table Tabulates the cost of transmitting through each neighbor. Note : Cost depends on link characteristics – need not be hop count. Also contains for each neighbor B, the time that has elapsed since last receiving an error free message from B.

Message Re-transmission List Contains info with regards to each transmitted update by the node (say node A). Each update message has a seq. no. that is tabulated in this table. Also contains a retransmission counter and ACK required flag vector. The flag vector indicates the neighbors that responded to the update. Help eliminate redundant update transmissions.

WRP: An Example Let cost of Link 2 be 10. DestCostPredSucc A0AA B1AB C2BB D3CB E3CB X2BB ROUTING TABLE AT A

Now Let Link 1 fail. Node A will notice this failure. Let us consider a single destination – say Node X. Node A will set the distance to X to infinity and its predecessor and successor values to null. This is broadcast to Node C. Node C computes the alternate route to A which is by means of Link 2. This info is then transmitted to A. A then realizes (by means of Cs new spanning tree) that it can reach other nodes via C.

Node As new routing table would now look like: DestCostPredSucc A0AA B11CC C10AC D11CC E CC X12BC

Advantages/ Limitations Advantages: No Loops Lower number of updates upon link failure – reports sent only to neighbors. Overhead grows as O(n) – n is the number of nodes. Disadvantages Messages may be large. Maintenance of four tables. Hello packets required – cannot go into sleep mode – overhead. Scalability still an issue !

Why all this ? Wireless is tough !!!

Reference E.M. Royer and C-K.Toh, A Review of Current Routing Protocols for Ad Hoc Wireless Networks, IEEE Personal Communications Magazine, pp 46-55, April S.Murthy and J.J.Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and Applications Journal, pp , October

Link State Routing Distance Vector Routing Protocols are attractive because of their simplicity. Another class of protocols that are proactive (exchange control messages to form and maintain routing tables even before they are required) are link state routing protocols. Popular Link State Routing Protocol -- OSPF Require each and every node in the network to have a knowledge of the complete topology of the network. A local computation of the best path to each destination is made.

A E B C D Link 1 Link 6 Link 2 Link 4 Link 3 Link 5 FrmToLinkCost AB11 AC21 BA11 BC31 CA21 CB31 CD41 CE51 DC41 DE61 EC51 ED61 The Network is now depicted by the Map shown as

A particular node is responsible for each entry of this table. It has to update this periodically. Update is to be relayed to all nodes in the network. The entry termed as cost is also often referred to as state. Once each node has the entire topology map, it tries to compute the shortest path to each destination. Can you think of one popular algorithm that is used for achieving this ?

YES! It is the Dijkstras Algorithm. Each node computes shortest weighted path tree using this topology information; it places itself at the root of this tree. Reference : Introduction to Algorithms by Cormen, Leiserson and Rivest.

ADVANTAGES: Each node can do a local loop free computation. Can reflect appropriate metrics to reflect the state of a link. DISADVANTAGES Not scalable Each link state update has to be flood to every node in the network – flooding is expensive – especially in an ad hoc network where link-state changes are frequent. Note: Sequence numbers are required to ensure that flooding does not continue for ever !