1 MANETs and Dynamic Source Routing Protocol Dr. R. B. Patel.

Slides:



Advertisements
Similar presentations
June 2, Mobile Computing COE 446 Mobile Ad hoc Networks Tarek Sheltami KFUPM CCSE COE
Advertisements

Unicast Routing Protocols for Ad Hoc Networks Kumar Viswanath CMPE 293.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
Prepared by: Suman Chakraborty CSE, 4 th year Roll Sensor Networks(CS-704D)
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Advanced Topics in Next-Generation Wireless Networks
Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
Winter CMPE 155 Week 9. Winter Project 8 Setting up wireless ad hoc network. Designing/implementing application- level neighbor discovery.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Mobile Ad Hoc Networks (MANET). 2 Mobile Ad Hoc Networks  Formed by wireless hosts which may be mobile  Without (necessarily) using a pre-existing.
Comparison of Routing Metrics for Static Multi-Hop Wireless Networks Richard Draves, Jitendra Padhye and Brian Zill Microsoft Research Presented by Hoang.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Material in this slide set are from a tutorial by Prof. Nitin Vaidya 1.
CIS 725 Wireless networks. Low bandwidth High error rates.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
Chapter: 05-Mobile Computing
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -
1 Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson and David A. Maltz published in the book “Mobile Computing” 1996.
1 Mobile Ad Hoc Networks for CSC 453 Sp 2011 From a tutorial by Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Routing in Mobile Ad Hoc Networks (from Ad Hoc Networking by Charles Perkins) Thanks to Prof. Yu at Cleveland State Univ.
Asstt. Professor Adeel Akram. Infrastructure vs. multi-hop Infrastructure networks: One or several Access-Points (AP) connected to the wired network.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
Ad Hoc Network.
Scalable Routing Protocols for
1 Wireless Networking Primer (few topics that may help in understanding other lectures) Nitin Vaidya University of Illinois at Urbana-Champaign.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay
Paper Reviews Written reviews for each paper to be discussed in class are due by noon on Fridays of the previous week The soft copy of the reviews should.
Dynamic Source Routing in Ad Hoc Wireless Networks
1 Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
UNIT-V Ad-hoc Networks
Routing in Mobile Ad Hoc Network (MANET)
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Mobile Computing CSE 40814/60814 Spring 2017.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
Internet-of-Things (IoT)
Mobile and Wireless Networking
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
Mobile Ad-hoc Networks (MANET)
Overview: Chapter 3 Networking sensors
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

1 MANETs and Dynamic Source Routing Protocol Dr. R. B. Patel

2 Mobile Ad Hoc Networks (MANET)  Characteristics –Energy constrained nodes –Bandwidth constrained –Variable capacity wireless links –Dynamic topology Information exchange in a network of mobile and wireless nodes without any infrastructural support. Such networks are often called ad hoc networks to emphasize that they do not depend on infrastructural support. A mobile ad-hoc network is a mobile, multi-hop wireless network which is capable of autonomous operation. The purpose of an ad hoc network is to set up (possibly) a short-lived network for a collection of nodes.

3 Mobile Ad Hoc Networks (MANET)  Host movement frequent  Topology change frequent  No cellular infrastructure. Multi-hop wireless links.  Data must be routed via intermediate nodes. A B A B

4 Why Ad Hoc Networks ?  Setting up of fixed access points and backbone infrastructure is not always viable –Infrastructure may not be present in a disaster area or war zone –Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m)  Ad hoc networks: –Do not need backbone infrastructure support –Are easy to deploy –Useful when infrastructure is absent, destroyed or impractical

5 Wireless Networks  Need: Access computing and communication services, on the move  Infrastructure-based Networks –traditional cellular systems (base station infrastructure)  Wireless LANs – Infrared (IrDA) or radio links (Wavelan) –very flexible within the reception area; ad-hoc networks possible –low bandwidth compared to wired networks ( Mbit/s)  Ad hoc Networks –useful when infrastructure not available, impractical, or expensive –military applications, rescue, home networking

6 Cellular Wireless  Single hop wireless connectivity to the wired world –Space divided into cells –A base station is responsible to communicate with hosts in its cell –Mobile hosts can change cells while communicating –Hand-off occurs when a mobile host starts communicating via a new base station

7 Multi-Hop Wireless  May need to traverse multiple links to reach destination  Mobility causes route changes

8 Routing in MANET  No base station. No fixed infrastructure.  Traditional fixed networks routing schemes are not effective. –E.g. Link state and distance vector routing algorithms  MANET nodes cooperate to provide routing service. –A node communicates directly with nodes in wireless range. –For all other destinations, a dynamically determined multi-hop route through other nodes. –Rely on each other to forward packets to their destination.

9 Taxonomy - MANET routing  Communication model –What is the wireless communication model?  Structure –Are all nodes treated uniformly? –How are distinguished nodes selected?  State information –Is network scale topology information obtained at each node?  Scheduling –Is the route information always maintained at each destination?

10 Taxonomy – Communication model  Multi-channel communication –Combine channel assignment and routing functionality –Generally used in TDMA or CSMA based networks –E.g. Clusterhead Gateway Switched Routing  Single channel communication –Generally CSMA/CA oriented protocols –Vary in the extent to which they rely on specific link-layer behaviors like failure detection, traffic information etc. –E.g. Dynamic Source Routing, Global State Routing

11 Taxonomy - Structure  Uniform protocols –No hierarchical structure. –Send and respond to routing control messages the same way. –Save resource cost in maintaining high-level structure –Scalability may become an issue  Non-Uniform protocols –Reduces no. of nodes participating in a route computation. –Improve scalability –Reduce communication overhead. –Support use of greater computational complexity.

12 Taxonomy – Structure (contd.)  Further categories of non-uniform protocols –Neighbor selection protocol Some nodes take on distinguished role. No negotiation process. No consensus with neighbors. Not affected by non-local topological changes. –Partitioning protocol Nodes negotiate a topological partitioning into clusters. Distributed operation. No central topology manager. Roles could be “cluster-head” or “gateway” between two clusters.

13 Taxonomy – State Information  Topology based Protocols –Exchange large scale (complete) topology information –Variants of link-state protocols Less frequent data exchange Apply expensive computation to a few nodes.  Destination based Protocols –Exchange local topology information (e.g. 1 or 2-hop ) –Most are variants of distance-vector protocols. –Others avoid exchange of distance information. Maintain information only for “active” destination.

14 Taxonomy – Scheduling  Proactive protocols –Traditional distributed shortest-path protocols –Maintain routes between every host pair at all times –Exchange route information Periodically In response to topology change –Minimizes delay in obtaining a route –Consumes significant network resources due to periodic updates, i.e., High routing overhead –Example: DSDV (destination sequenced distance vector)  Reactive protocols –Determine route if and when needed –Source initiates route discovery –2 step process Route Discovery Route Maintenance –Route discovery is expensive  Hybrid protocols –Adaptive; Combination of proactive and reactive –Example: DSR (dynamic source routing) –Example : ZRP (zone routing protocol)

15 Many Applications  Personal area networking –cell phone, laptop, ear phone, wrist watch  Military environments –soldiers, tanks, planes  Civilian environments –taxi cab network –meeting rooms –sports stadiums –boats, small aircraft  Emergency operations –search-and-rescue –policing and fire fighting

16 Challenges in Mobile Environments  Limitations of the Wireless Network  packet loss due to transmission errors  variable capacity links  frequent disconnections/partitions  limited communication bandwidth  Broadcast nature of the communications  Limitations Imposed by Mobility  dynamically changing topologies/routes  lack of mobility awareness by system/applications  Limitations of the Mobile Computer  short battery lifetime  limited capacities

17 Effect of mobility on the protocol stack  Application –new applications and adaptations  Transport –congestion and flow control  Network –addressing and routing  Link –media access and handoff  Physical –transmission errors and interference

18 Medium Access Control in MANET  Can we apply media access methods from fixed networks?  Example CSMA/CD –Carrier Sense Multiple Access with Collision Detection –send as soon as the medium is free, listen into the medium if a collision occurs (original method in IEEE 802.3)  Medium access problems in wireless networks –signal strength decreases proportional to the square of the distance –sender would apply Carrier Sense (CS) and Collision Detection (CD), but the collisions happen at the receiver –sender may not “hear” the collision, i.e., CD does not work –CS might not work, e.g. if a terminal is “hidden”

19  Hidden terminals –A sends to B, C cannot receive A –C wants to send to B, C senses a “free” medium (CS fails) –collision at B, A cannot receive the collision (CD fails) –A is “hidden” for C  Exposed terminals –B sends to A, C wants to send to another terminal (not A or B) –C senses carrier, finds medium in use and has to wait –A is outside the radio range of C, therefore waiting is not necessary –C is “exposed” to B Hidden and Exposed Terminals BAC

20 Routing  A router receives a packet from a network and passes it to another network.  At the Router a Routing Table is maintained which may be Static or Dynamic.  A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: which of the available pathways is the optimum pathway?  Routing is the act of moving information across an internetwork from a source to a destination.  Along the way, at least one intermediate node typically is encountered.  Routing involves two basic activities: determining optimal routing paths and transporting information groups (typically called packets) through an internetwork.

21 Continue

22 Routing Example A ToCostNext A0- B5- C2- D3- E6C A’s Table D ToCostNext A3- B8A C5A D0- E9A D’s Table C ToCostNext A2- B4- C0- D5A E4- C’s Table E ToCostNext A6C B3- C4- D9C E0- E’s Table B ToCostNext A5- B0- C4- D8A E3- B’s Table AB D C E

23 Continue  Routing is often contrasted with bridging, which might seem to accomplish precisely the same thing to the casual observer.  The primary difference between the two is that bridging occurs at Layer 2 (the data link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer).  This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways.

24 Continue  The International Organization for Standardization (ISO) has developed a hierarchical terminology that is useful in describing routing.  Using this terminology, network devices without the capability to forward packets between subnetworks are called end systems (ESs), whereas network devices with these capabilities are called intermediate systems (ISs).  ISs are further divided into those that can communicate within routing domains (intradomain ISs) and those that communicate both within and between routing domains (interdomain ISs).

25 Continue  A routing domain generally is considered a portion of an internetwork under common administrative authority that is regulated by a particular set of administrative guidelines.  An autonomous system (AS) is a group of networks and routers under the authority of a single administration.  Routing inside an autonomous system is referred to as intradomain routing.  Routing between autonomous systems is referred to as interdomain routing. Each autonomous system can choose one or more intradomain routing protocols to handle routing inside the autonomous systems.

26 Autonomous Systems R1

27 Routing and Mobility  Finding a path from a source to a destination  Issues –Frequent route changes amount of data transferred between route changes may be much smaller than traditional networks –Route changes may be related to host movement –Low bandwidth links  Goal of routing protocols –decrease routing-related overhead –find short routes –find “stable” routes (despite mobility)

28 Protocol Trade-offs  Reactive protocols –Lower overhead since routes are determined on demand –Significant delay in route determination –Employ flooding (global search) –Control traffic may be bursty  Which approach achieves a better trade-off depends on the traffic and mobility patterns

29 Reactive Routing Protocols Dynamic Source Routing (DSR)

30 The Routing Problem S D D´S´  The routing problem is to find a route from S to D when some or all of the nodes are mobile.

31 Dynamic Source Routing (DSR)  When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery  Source node S floods Route Request (RREQ)  Each node appends own identifier when forwarding RREQ

32 Route Discovery in DSR B A E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L S

33 Route Discovery in DSR B A E F H J C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ S D

34 Route Discovery in DSR B A E F H J C G I K Node H receives packet RREQ from two neighbors: potential for collision Z Y M N L [S,E] [S,C] S D

35 Route Discovery in DSR B A E F H J C G I K Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once Z Y M N L [S,C,G] [S,E,F] S D

36 Route Discovery in DSR B A E F H J C G I K Z Y M Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide N L [S,C,G,K] [S,E,F,J] S D

37 Route Discovery in DSR B A E F H J C G I K Z Y Node D does not forward RREQ, because node D is the intended target of the route discovery M N L [S,E,F,J,M] S D

38 Route Discovery in DSR  Destination D on receiving the first RREQ, sends a Route Reply (RREP)  RREP is sent on a route obtained by reversing the route appended to received RREQ  RREP includes the route from S to D on which RREQ was received by node D

39 Route Reply in DSR B A E F H J C G I K Z Y M N L RREP [S,E,F,J,D] Represents RREP control message S D

40 Dynamic Source Routing (DSR)  Node S on receiving RREP, caches the route included in the RREP  When node S sends a data packet to D, the entire route is included in the packet header –hence the name source routing  Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded

41 Data Delivery in DSR B A E F H J C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length S D

42 DSR Optimization: Route Caching  Each node caches a new route it learns by any means  When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F  When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S  When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D  When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D  A node may also learn a route when it overhears Data  Problem: Stale caches may increase overheads

43 Dynamic Source Routing: Advantages  Routes maintained only between nodes who need to communicate –reduces overhead of route maintenance  Route caching can further reduce route discovery overhead  A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches

44 Dynamic Source Routing: Disadvantages  Packet header size grows with route length due to source routing  Flood of route requests may potentially reach all nodes in the network  Potential collisions between route requests propagated by neighboring nodes –insertion of random delays before forwarding RREQ  Increased contention if too many route replies come back due to nodes replying using their local cache –Route Reply Storm problem  Stale caches will lead to increased overhead