David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Ad-hoc Routing Michalis Michaelides Dept. of Electrical and Computer Engineering University of Cyprus ECE 654 – Computer Networks Seminar November 12,
A Survey of Secure Wireless Ad Hoc Routing
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea
NASA Ad Hoc Networking Demonstration Dave Johnson Computer Science Department Rice University 30 September 2003.
Analysis of a SuperSEAD Aaron Staple Mukund Sundararajan.
4/16/2017 A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, Jorjeta Jetcheva.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Design of a Fault-Tolerant Link Establishment Protocol Stephen Horan and Giriprassad Deivasigamani Telemetering Center Klipsch School of Electrical and.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
A Performance Comparison of Multi-hop Wireless Ad Hoc Network Routing Protocols Presented by Angel Pagan Xiang Li Josh Broch, David A. Maltz, David B.
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks Yih-Chun Hu (Carnegie Mellon University) Adrian Perrig (Carnegie Mellon University)
1 A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva.
Yih-Chun Hu Carnegie Mellon University
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Challenge: Securing Routing Protocols Adrian Perrig
1 Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols Yih-Chun Hu, Adrian Perrig, and David B. Johnson Presenter: Sandeep Mapakshi.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch David A. Maltz David B. Johnson Yih-Chun Hu Jorjeta Jetcheva.
Secure Routing in Ad Hoc Wireless Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
CS 268: Ad Hoc Routing Kevin Lai Feb 20, Ad Hoc Motivation  Internet goal: decentralized control -someone still has to deploy.
August 18-19, 2002 UCSC Baskin School of Engineering1 UCSC PERC COMPONENT: Protocols for Wireless Internetworks J.J. Garcia-Luna-Aceves Computer Communication.
Mobile Ad-hoc Networks -- Overview and a case study Yinzhe Yu Oct. 8, 2003.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
Wireless Sensor Networks Security Lindsey McGrath and Christine Weiss.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
C.O.B.R.A. Kyle Morse Matthew Denker Mark Srebro Derrick Chiu.
1 CIS 6930: Mobile Computing Mobile IP Sumi Helal Credit: majority of slides borrowed from one of Dave Johnson’s talks, 3.
Seminar on Internetworking: Routing - from baseline to state-of-the-art Topic proposals Zheng Yan Nokia Research Center
Profiles and Multi-Topology Routing in Highly Heterogeneous Ad Hoc Networks Audun Fosselie Hansen Tarik Cicic Paal Engelstad Audun Fosselie Hansen – Poster,
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
All Rights Reserved, Copyright, 2002, Hitachi Europe SAS Ad Hoc Networks: Applications and Merits Dr. Stéphane Amarger Masato Hayashi Hitachi Europe Sophia-Antipolis.
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Using Directional Antennas to Prevent Wormhole Attacks Lingxuan HuDavid Evans Department of Computer Science University of Virginia.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Jason Ernst, University of Guelph 1.  Introduction ◦ Background Information ◦ Motivation for Research / Current Problems  Proposed Solution ◦ Algorithm.
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols MOBICOM 1998 Dallas, Texas Josh Broch, David Maltz, David Johnson, Yih-Chun.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Designing a Large Metropolitan Area Ad Hoc Network Dave Johnson Rice University Departments of CS and ECE
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
David B. Johnson Rice University Department of Computer Science DSR Draft Status Monarch Project 57th IETF.
Jim Parker CMSC691t Spring 2000 “Ad-hoc On-Demand Distance Vector Routing” A dynamic routing algorithm for mobile ad-hoc networks.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Ad Hoc Wireless Routing Different from routing in the “wired” world Desirable properties of a wireless routing protocol –Distributed operation –Loop freedom.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 1 – April 5, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 2 – April 12, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 3 – April 23, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Survey of Ad Hoc Network Routing Protocols Team Adhocracy Presentation 4 – May 10, 2007 Jason Winnebeck Benjamin Willis Travis Thomas.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Ad Hoc Wireless Routing
Packet Leashes: Defense Against Wormhole Attacks
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Ad Hoc Networks - Performance
Ad Hoc Wireless Routing
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
Vinay Singh Graduate school of Software Dongseo University
Presentation transcript:

David B. Johnson Rice University Department of Computer Science DSR Status Update Monarch Project 55th IETF

DSR: Dynamic Source Routing Protocol Divides routing problem into two parts: Route Discovery: only try to find a route to some destination when you don’t have one and need one Route Maintenance: only while you’re actually using a route, try to keep it working or fix it in spite of changes Important properties of DSR: All aspects of protocol operation are entirely on-demand Nodes ignore all topology changes not affecting them Overhead scales automatically as movement increases Zero overhead when stationary and found routes already Also can support unidirectional links and asymmetric routes Extensive implementation and demonstration with real workloads

New DSR Implementation Work Implementation under Windows jointly with Microsoft Research: Implemented at the link layer Uses the same primitives as DSR: –Route Discovery –Route Maintenance (explicit, due to NDIS limitations) –Source routing Packet formats based on those in the DSR Internet-Draft Not fully optimized (salvaging, expanding ring) We plan (and expect) to be able to release the code

Recent Papers (Security) Yih-Chun Hu, David B. Johnson, and Adrian Perrig. SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. WMCSA 2002, June Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. MobiCom 2002, September Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Efficient Security Mechanisms for Routing Protocols. NDSS 2003, February 2003, to appear. Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. INFOCOM 2003, April 2003, to appear.

Recent Papers (Other) Yih-Chun Hu and David B. Johnson. Design and Demonstration of Live Audio and Video over Multihop Wireless Ad Hoc Networks. MILCOM 2002, October Yih-Chun Hu and David B. Johnson. Ensuring Cache Freshness in On-Demand Ad Hoc Network Routing Protocols. POMC 2002, October Santashil PalChaudhuri and David B. Johnson, Power Mode Scheduling for Ad Hoc Networks (Extended Abstract), ICNP 2002, November 2002.

Internet-Draft Status Adding some things (back) to the draft: Have been in previous drafts: draft-ietf-manet-dsr-03.txt, Oct 1999: And of course, lots of proofreading of the draft Expect to complete final version of draft by end of December – Use of multiple network interfaces – Implicit source routing

Use of Multiple Network Interfaces Allows routing between different types of networks Example: some nodes have both short-range and long-range radios, but most have only short-range Also allows integration with Internet and Mobile IP Implemented and demonstrated in DSR testbed, Pittsburgh, December 1998 through March 1999 Documented in: –Josh Broch, David A. Maltz, and David B. Johnson. Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks. In Proceedings of the Workshop on Mobile Computing, ISPAN’99, June 1999 –David A. Maltz, Josh Broch, and David B. Johnson. Lessons From a Full-Scale Multi-Hop Wireless Ad Hoc Network Testbed. IEEE Personal Communications, February 2001

Implicit Source Routing Establishes hop-by-hop state based on source route from sender Avoids carrying source route in most packets All state is soft state – no correctness problems if it is lost Implemented and demonstrated in DSR QoS demo, DARPA GloMo PI meeting, Eatontown, NJ, July 2000 Documented in: –Yih-Chun Hu and David B. Johnson. Implicit Source Routes for On-Demand Ad Hoc Network Routing. In Proceedings MobiHoc 2001, October, –Yih-Chun Hu and David B. Johnson. Design and Demonstration of Live Audio and Video over Multihop Wireless Ad Hoc Networks. In Proceedings of MILCOM 2002, October 2002.