Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

Slides:



Advertisements
Similar presentations
1 Routing Protocols I. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
The Destination Sequenced Distance Vector (DSDV) protocol
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
NCKU CSIE CIAL1 Principles and Protocols for Power Control in Wireless Ad Hoc Networks Authors: Vikas Kawadia and P. R. Kumar Publisher: IEEE JOURNAL ON.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Wireless Ad Hoc Network Routing Protocols CSE Maya Rodrig.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Delivery, Forwarding and
The Zone Routing Protocol (ZRP)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Adhoc Network: Routing Protocol:AODV
ROUTING ALGORITHMS IN AD HOC NETWORKS
Network and Communications Ju Wang Chapter 5 Routing Algorithm Adopted from Choi’s notes Virginia Commonwealth University.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Week 5 Lecture 2 IP Layer. 2 Network layer functions transport packet from sending to receiving hosts transport packet from sending to receiving hosts.
CSCI 465 D ata Communications and Networks Lecture 15 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
OSI Model. Switches point to point bridges two types store & forward = entire frame received the decision made, and can handle frames with errors cut-through.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Ad Hoc Wireless Routing Different from routing in the “wired” world Desirable properties of a wireless routing protocol –Distributed operation –Loop freedom.
Spatial Aware Geographic Forwarding for Mobile Ad Hoc Networks Jing Tian, Illya Stepanov, Kurt Rothermel {tian, stepanov,
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobile Ad Hoc Networks: Introduction
AODV-OLSR Scalable Ad hoc Routing
DSDV Highly Dynamic Destination-Sequenced Distance-Vector Routing
Sensor Network Routing
Intra-Domain Routing Jacob Strauss September 14, 2006.
Routing: Distance Vector Algorithm
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Packet Networks Shortest Path Routing
by Saltanat Mashirova & Afshin Mahini
Subject Name: Computer Networks - II Subject Code: 10CS64
Proactive vs. Reactive Routing
Routing.
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
EE 122: Intra-domain routing: Link State
Presentation transcript:

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lecture 2 : The DSDV Protocol  Lecture 2.1 : The Distributed Bellman-Ford Algorithm  Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) The Routing Problem S D D´S´  The routing problem is to find a route from S to D when some or all of the nodes are mobile.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Basic Assumptions We will assume that each node is capable of running fairly complicated algorithms locally. Each node has the necessary networks layers implemented. In particular, the MAC layer has all the facilities for implementing our protocols. Our protocols can be implemented using any underlying medium access scheme like TDMA or CSMA.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Nature of Protocols  We will discuss routing protocols for mobile ad hoc networks (MANET).  Routing protocols for MANETs can be classified as either reactive or proactive.  This classification is based on the way a protocol tries to find a route to a destination.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Proactive Protocols  Proactive protocols are based on periodic exchange of control messages and maintaining routing tables.  Each node maintains complete information about the network topology locally.  This information is collected through proactive exchange of partial routing tables stored at each node.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Proactive Protocols  Since each node knows the complete topology, a node can immediately find the best route to a destination.  However, a proactive protocol generates large volume of control messages and this may take up a large part of the available bandwidth.  The control messages may consume almost the entire bandwidth with a large number of nodes and increased mobility.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Reactive Protocols  In a reactive protocol, a route is discovered only when it is necessary.  In other words, the protocol tries to discover a route only on-demand, when it is necessary.  These protocols generate much less control traffic at the cost of latency, i.e., it usually takes more time to find a route compared to a proactive protocol.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Some example protocols  Some examples of proactive protocols are : – Destination Sequenced Distance Vector (DSDV) – STAR  Some examples of reactive protcols are : – Dynamic Source Routing (DSR) – Ad hoc On-demand Distance Vector (AODV) – Temporally Ordered Routing Algorithm (TORA)

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Destination Sequenced Distance Vector Protocol  DSDV is a proactive protocol. Each node maintains its own routing table for the entire network.  Consider a node S. Suppose, S needs to send a message to node D.  S can look up the best route to D from its routing table and forward the message to the neighbour along the best route.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) DSDV Protocol  The neighbour in turn checks the best route from its own table and forwards the message to its appropriate neighbour. The routing progresses this way.  There are two issues in this protocol : – How to maintain the local routing tables – How to collect enough information for maintaining the local routing tables

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Maintaining Local Routing Table  We will first assume that each node has all the necessary information for maintaining its own routing table.  This means that each node knows the complete network as a graph. The information needed is the list of nodes, the edges between the nodes and the cost of each edge.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Maintaining Local Routing Table  Edge costs may involve : distance (number of hops), data rate, price, congestion or delay.  We will assume that the edge cost is 1 if two nodes are within the transmission range of each other.  The DSDV protocol can be modified for other edge costs.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)  Each node maintains its local routing table by running the distributed Bellman-Ford algorithm.  Each node maintains, for each destination, a set of distances for each neighbour  Node treats neighbour as the next hop for a packet destined for if equals minimum of all How the Local Routing Table is Used

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) How the local Routing Table is Used i x k l m The message will be sent from i to l as the cost of the path to x is minimum through l

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Distributed Bellman-Ford Algorithm  Suppose node 1 wants to send a message to node 4.  Since the shortest path between 1 and 4 passes through 2, 1 will send the message to  We consider only the number of hops as the cost for sending a message from a source to a destination.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Problems with Distributed Bellman-Ford Algorithm  All routing decisions are taken in a completely distributed fashion. Each node uses its local information for routing messages.  However, the local information may be old and invalid. Local information may not be updated promptly.  This gives rise to loops. A message may loop around a cycle for a long time.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Formation of Loops  Suppose n5 is the destination of a message from n1.  The links between n1,n5 and n3,n5 have failed.  A loop (n1,n4,n3,n2,n1) forms.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Counting to Infinity (i) n1 n2n  The preferred neighbour for n2 is n3 and preferred neighbour for n3 is n2.  Suppose the link n1-n3 fails.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Counting to Infinity (ii) n1 n2n  Suppose n2 wants to send a message to n1. The only way to do this is to use link n2-n1.  However, n2 chooses n3 as its preferred neighbour.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Counting to Infinity (iii) n1 n2n  Also, n2 knows (from old routing table) that its distance to n1 is 2.  This information is received by n3 and n3 updates its distance to n1 as 3, i.e, 2+1.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Counting to Infinity (iv) n1 n2n  Next, n2 updates its distance to n1 as 3+1=4 and so on.  This process continues until the cost of the link n2-n1 is less than the cost of n2-n3.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) New Versus Old Information  The formation of loops and the problem of counting to infinity are due to the use of old information about the network.  Another problem is the use of indirect information.  If node i is trying to send a message to node x,it is better to consider the view of node x.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) How to Use New Information (i) n1 n2n  Suppose each node broadcasts its routing table stamped with an increasing sequence number.  Initially, n2 will receive updates from n1 and knows that the distance of n1 is 2.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) How to Use New Information (ii) n1 n2n  However, when the link n1-n3 is broken, this will be noted by n1 in its routing table.  In future, n2 will receive broadcasts from n1 with this information and avoid the path through n3.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Time Stamps  Each time a node like n1 broadcasts its routing table, it adds an increasing sequence number (time stamp) to the broadcast.  Any node receiving the broadcast rejects old routing information and takes the new information for updating its routing table.  This avoids looping and counting to infinity.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) How to maintain routing tables?  Routing tables are maintained by periodically broadcasting the tables stored in each node.  We will assume that each node executes an algorithm like Dijkstra’s shortest path algorithm to update its table.  The broadcasts are done through a flooding scheme.