Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Survey of Secure Wireless Ad Hoc Routing
1 Routing in Mobile Ad Hoc Networks CS 598HL, 2006.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Revisiting On Demand Routing On Demand Routing schemes are reactive – a route is found when needed. This precludes the periodic exchange of routing tables.
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Aodv. Distance vector routing Belman principle AODV - overview Similar to DSR –On demand –Route request when needed and route reply when a node knows.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
The Zone Routing Protocol (ZRP)
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Ad Hoc Routing: The AODV and DSR Protocols Jonathan Sevy Geometric and Intelligent Computing Lab Drexel University
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
The Ad Hoc On-Demand Distance-Vector Protocol (AODV)
Routing design goals, challenges,
By Ioannis Chatzigiannakis, Elena Kaltsa, Sotiris Nikoletseas
Internet Networking recitation #4
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
by Saltanat Mashirova & Afshin Mahini
Proactive vs. Reactive Routing
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Routing protocols in Mobile Ad Hoc Network
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lecture 4 : Ad Hoc On-Demand Distance-Vector Protocol Lecture 4.1 : The basic ideas behind the AODV protocol. Lecture 4.2 : Detailed explanations for the AODV protocol.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Unicasting  The routing we have discussed so far is mainly point-to-point routing.  A source node wants to send a message to a destination node.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Multicasting  However, in many situations a node wants to send a message to a group of nodes in the network.  This is called multicasting and the group is called a multicast group.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Broadcasting  Broadcasting is a special case of multicasting when all the nodes in the network is in the multicast group.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Multicasting Support  DSDV and DSR mainly support unicast routing.  If multicasting is required, a node must establish unicast routes to each node in the multicast group.  A more efficient approach will maintain multicast routing trees for each multicast group.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Non-uniform Packet Size in DSR  Though DSR is a reactive or on-demand routing protocol, a major problem with DSR is its non- uniform packet size.  When a source node S sends a packet to a destination node D, S should send the entire route to D along with the packet.  This is necessary for the intermediate nodes to forward the packet.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Problem with Non-uniform Packet Size  Usually all media support packets of uniform size. If a packet is large, it has to be split into smaller packets.  This may cause problems in the wireless medium as packets that are split into smaller parts may not arrive in correct order.  Intermediate nodes may not be able to forward packets correctly.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Main Features of the AODV Protocol (I)  The Ad hoc On-Demand Distance Vector protocol is both an on-demand and a table- driven protocol.  The packet size in AODV is uniform unlike DSR. Unlike DSDV, there is no need for system-wide broadcasts due to local changes.  AODV supports multicasting and unicasting within a uniform framework.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Main Features of the AODV Protocol (II)  Each route has a lifetime after which the route expires if it is not used.  A route is maintained only when it is used and hence old and expired routes are never used.  Unlike DSR, AODV maintains only one route between a source-destination pair.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Unicast Route Establishment  Unicast route is a route from a source node to a destination node.  Like DSR, we use two types of messages, route request (RREQ) and route reply (RREP).  Like DSDV, we use sequence numbers to keep track of recent routes. Every time a node sends a new message, it uses a new sequence number which increases monotonically.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Route Request (RREQ) Message  When node S wants to send a message to node D, S searches its route table for a route to D.  If there is no route, S initiates a RREQ message with the following components : – The IP addresses of S and D – The current sequence number of S and the last known sequence number of D – A broadcast ID from S. This broadcast ID is incremented each time S sends a RREQ message.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Processing a RREQ Message (I)  The pair of the source S forms a unique identifier for the RREQ.  Suppose a node P receives the RREQ from S. P first checks whether it has received this RREQ before.  Each node stores the pairs for all the recent RREQs it has received.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Processing a RREQ Message (II)  If P has seen this RREQ from S already, P discards the RREQ. Otherwise, P processes the RREQ :  P sets up a reverse route entry in its route table for the source S.  This entry contains the IP address and current sequence number of S, number of hops to S and the address of the neighbour from whom P got the RREQ. SD P Q

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lifetime of a Route-Table Entry  A lifetime is associated with the entry in the route table.  This is an important feature of AODV. If a route entry is not used within the specified lifetime, it is deleted.  A route is maintained only when it is used. A route that is unused for a long time is assumed to be stale.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Responding to a RREQ  P can respond to the RREQ from S if P has an unexpired entry for D in its route table.  Moreover, the sequence number from D that P has must not be less than the sequence number of D that was in the RREQ from S.  This ensures that there is no loop in the route.  If P satisfies both of these requirements, it unicasts a RREP message back to S. SD P Q

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Responding to a RREQ  If P cannot reply to the RREQ from S,  P increments the hop-count of the RREQ and broadcasts it to its neighbours.  Naturally, the destination node D is always able to send a RREP since it has the highest sequence number.  If the RREQ is lost, the source node S can try the route discovery a fixed number of times. SD P Q

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Expanding Ring Search  For route discovery, a source node broadcasts a RREQ across the network. This may create a lot of messages in a large network.  A source node uses an expanding ring search strategy. With a ring diameter K, a RREQ dies after its hop-count exceeds K.  If a RREQ fails, the source node increases the value of K incrementally.