Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.

Slides:



Advertisements
Similar presentations
June 2, Mobile Computing COE 446 Mobile Ad hoc Networks Tarek Sheltami KFUPM CCSE COE
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
1 MANETs and Dynamic Source Routing Protocol Dr. R. B. Patel.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Multicasting in Mobile Ad-Hoc Networks (MANET)
Arsitektur Jaringan Terkini
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
1 Mobile Ad Hoc Networks (MANET). 2 Mobile Ad Hoc Networks  Formed by wireless hosts which may be mobile  Without (necessarily) using a pre-existing.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 10 Introduction to Networks and the Internet.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
1 Wireless and Mobile Networks EECS 489 Computer Networks Z. Morley Mao Monday March 12, 2007 Acknowledgement:
Wireless Mesh Networks
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Material in this slide set are from a tutorial by Prof. Nitin Vaidya 1.
PG 1 Advances in Wireless Networks Case Study: Mesh Networks Max Lakshtanov.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Wireless Ad-Hoc Networks
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Maulana Azad National Institute of Technology Bhopal (MP) AD-HOC NETWORKS Submitted By: Pradeep Ahirwar M Tech (CSE)
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -
PCI 2005 Volos, Greece Nov 2005 Efficient Active Clustering of Mobile Ad-Hoc Networks Damianos Gavalas, Grammati Pantziou, Charalampos Konstantopoulos,
Wireless & Mobile Networking CS 752/852 - Spring 2011 Tamer Nadeem Dept. of Computer Science Ad Hoc Routing Layer - I.
1 “Open” Problems in Mobile Ad Hoc Networking Nitin Vaidya University of Illinois at Urbana-Champaign Keynote talk.
1 Mobile Ad Hoc Networks for CSC 453 Sp 2011 From a tutorial by Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Routing in Mobile Ad Hoc Networks (from Ad Hoc Networking by Charles Perkins) Thanks to Prof. Yu at Cleveland State Univ.
Context-aware Computing (Chapter 4). 2 Context-aware Computing Beyond application-aware adaptation Instead of adapting only to resource levels, adapt.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Ad Hoc Network.
Multicast routing issues in ad hoc networks Katia Obraczka Gene Tsudik.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
1 Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
UNIT-V Ad-hoc Networks
Routing in Mobile Ad Hoc Network (MANET)
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Intro Wireless vs. wire-based communication –Costs –Mobility Wireless multi hop networks Ad Hoc networking Agenda: –Technology background –Applications.
Mobile Ad Hoc Networks Part 1: Overview
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Outline What is Wireless LAN Wireless Transmission Types
Overview of Wireless Networks:
Ad-hoc Networks.
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
Slides courtesy of Nitin Texas A&M
IEEE Terminology - STA (Station)
Ad-hoc On-demand Distance Vector
by Saltanat Mashirova & Afshin Mahini
Mobile ad hoc networking: imperatives and challenges
CSCI {4,6}900: Ubiquitous Computing
Advance Topics in Networking
Routing in Mobile Ad-hoc Networks
Protocols.
Routing protocols in Mobile Ad Hoc Network
A Talk on Mobile Ad hoc Networks (Manets)
Protocols.
Presentation transcript:

Mobile Routing protocols MANET Lecture: 4

DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions and –short transaction. Going through a monolithic document page by page can be considered as a session-oriented transaction. Going to a particular page directly through an index can be considered as a short transaction.

Selection of the transaction mode will depend on the type of device we use. A session may be helpful in case of services offered through computers with large screens and mouse. For devices with limited input/ output like SMS for instance, short transactions may be desired. Let us consider an example of bank balance enquiry over the Internet.

In case of Internet banking through desktop computer, the user has to go through the following minimum dialogues: 1.Enter the URL of the bank site. 2. Enter the account number/password and Login into the application. 3. Select the balance enquiry dialogue and see the balance. 4. Logout from the internet banking.

The dialogue above is an example of session-oriented transaction. Using short transaction, the same objective can be met through one single dialogue.

Ad-hoc Networks 'In Latin, ad hoc literally means 'for this purpose only'. An ad-hoc (or spontaneous) network is a small area network, especially one with wireless or temporary plug-in connections. In these networks some of the devices are part of the network only for the duration of a communication session.

An ad-hoc network is also formed when mobile, or portable devices, operate in close proximity of each other or with the rest of the network. When we beam a business card from our PDA (Personal Digital Assistant) to another, or use an IrDA (Infrared Data Association) port to print document from our laptop, we have formed an ad hoc network.

The term 'ad hoc' has been applied to networks in which new devices can be quickly added using, for example, Bluetooth or wireless LAN ( x). In these networks devices communicate with the computer and other devices using wireless transmission. Typically based on short-range wireless technology, these networks don't require subscription services or carrier networks.

May need to traverse multiple links to reach a destination

Mobile Ad Hoc Networks Mobility causes route changes

Mobile Ad Hoc Networks Formed by wireless hosts which may be mobile Don’t need a pre-existing infrastructure –ie, don’t need a backbone network, routers, etc. Routes between nodes potentially contain multiple hops

Mobile Ad Hoc Networks Why MANET? –Ease, speed of deployment –Decreased dependence on infrastructure –Can use in many scenarios where deployment of a wired network is impractical or impossible –Lots of military applications, but there are others…

MANET: Many Applications Personal area networking –cell phone, laptop, ear phone, wrist watch Civilian environments –meeting rooms –sports stadiums –groups of boats, small aircraft (wired REALLY impractical!!) Emergency operations –search-and-rescue –policing and fire fighting Sensor networks –Groups of sensors embedded in the environment or scattered over a target area

Many Variations Fully Symmetric Environment –all nodes have identical capabilities and responsibilities Asymmetric Capabilities –transmission ranges and radios may differ –battery life at different nodes may differ –processing capacity may be different at different nodes –speed of movement different Asymmetric Responsibilities –only some nodes may route packets –some nodes may act as leaders of nearby nodes (e.g., “cluster head”)

Many Variations Traffic characteristics may differ –bandwidth –timeliness constraints –reliability requirements –unicast / broadcast / multicast / geocast May co-exist (and co-operate) with an infrastructure- based network

Many Variations Mobility patterns may be different –people sitting at an airport lounge (little mobility) –taxi cabs (highly mobile) –military movements (mostly clustered?) –personal area network (again, mostly clustered?) Mobility characteristics –speed –predictability direction of movement pattern of movement –uniformity (or lack thereof) of mobility characteristics among different nodes

Challenges Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Environmental issues (“chop that tree!!”) Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard) Sensor networks: very resource-constrained!

Hidden Terminal Problem Nodes A and C cannot hear each other Transmissions by nodes A and C can collide at node B On collision, both transmissions are lost Nodes A and C are hidden from each other

First Issue: Routing Why is Ad hoc Routing Different? Host mobility –link failure/repair due to mobility may have different characteristics than those due to other causes –traditional routing algorithms assume relatively stable network topology, few router failures Rate of link failure/repair may be high when nodes move fast New performance criteria may be used –route stability despite mobility –energy consumption

Routing Protocols Proactive protocols –Determine routes independent of traffic pattern –Traditional routing protocols for wired networks are proactive Proactive Approach (Table Driven): –In this approach route calculation is a consistent process. –Routing tables are maintained at every node. –Every node exchange routing information timely with its neighbors. –This approach uses large bandwidth to maintain unused route.

Reactive protocols –Discover/maintain routes only if needed Reactive Approach (On Demand): –The reactive protocols in contrast create routes, when it requires. –Reactive protocols do not send periodic updates. –Each node send control message to discover a route between source and destination, only when it is required. –In this process route discovery takes a long time.

Trade-Off: Proactive vs. Reactive Latency of route discovery –Proactive protocols may have lower latency since routes are maintained at all times –Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y Overhead of route discovery/maintenance –Reactive protocols may have lower overhead since routes are determined only if needed –Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach achieves a better tradeoff depends on the traffic and mobility patterns