1 Computer Systems Engineering Centre University of South Australia An Abstract Model of Routing in Mobile Ad Hoc Networks Cong Yuan, Jonathan Billington,

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
Effects of Applying Mobility Localization on Source Routing Algorithms for Mobile Ad Hoc Network Hridesh Rajan presented by Metin Tekkalmaz.
Re-routing Instability in IEEE Multi-hop Ad-hoc Networks Ping Chung Ng and Soung Chang Liew The 4th IEEE International Workshop on Wireless Local.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Challenges of Routing in Ad-hoc Networks Chandra D Yarlagadda.
TAODV: A Trust Model Based Routing Protocol for Secure Ad Hoc Networks Xiaoqi Li, Michael R. Lyu, and Jiangchuan Liu IEEE Aerospace Conference March 2004.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Ad Hoc Networks Routing
Routing Security in Ad Hoc Networks
Security & Efficiency in Ad- Hoc Routing Protocol with emphasis on Distance Vector and Link State. Ayo Fakolujo Wichita State University.
Secure Routing in Ad Hoc Wireless Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers C. E. Perkins & P. Bhagwat Presented by Paul Ampadu.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Highly Dynamic Destination- Sequenced Distance-Vector Routing Protocol (DSDV) for Mobile Computers Charles E. Perkins Pravin Bhagwat Mobile Computing,
Ad Hoc Wireless Routing COS 461: Computer Networks
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
ROUTING ALGORITHMS IN AD HOC NETWORKS
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Distance-Vector maintain distance and next hop information Also known as Distributed Bellman- Ford(DBF) algorithm used in RIP Cause Loop and Count to infinity.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
S E A D Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks Yih-Chun Hu,David B.Johnson, Adrian Perrig.
Formal verification of distance vector routing protocols.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Dynamic Routing Protocols part2
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
DSDV Highly Dynamic Destination-Sequenced Distance-Vector Routing
Routing Information Protocol (RIP)
Routing design goals, challenges,
By Ioannis Chatzigiannakis, Elena Kaltsa, Sotiris Nikoletseas
Sensor Network Routing
Networks and Communication Systems Department
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Dynamic Routing Protocols part2
Mobile and Wireless Networking
UNICAST ROUTING PROTOCOLS
Routing.
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

1 Computer Systems Engineering Centre University of South Australia An Abstract Model of Routing in Mobile Ad Hoc Networks Cong Yuan, Jonathan Billington, Joern Freiheit

2 Mobile Ad-hoc Networks (MANETs) Autonomous and infrastructure-less Multi-hop routing Dynamically changing network topologies Variation in link and node capabilities Energy constrained operation I am leavin g I am almost out of power, I will sleep I am coming CPN’05

3 Problem statement and Motivation Routing: Discovery of routes from source to destination. Routing protocols used in traditional wired networks cannot be directly applied to MANETs. Most current routing protocols designed for MANETs have mainly been evaluated by simulation and live testing. Formal verification firstly requires the creation of a formal model of the system. The main purpose of our work is to provide the first CPN model of the basic functions of the Destination- Sequenced Distance-Vector (DSDV) routing protocol, which is the first step towards formal specification and verification of routing protocols in MANETs. CPN’05

4 DSDV routing protocol 1. Routing table structure: 2. Route advertisements: –Periodic: Full Dump –Event-triggered: Incremental Update 3. Updating the routing table: –The route entry with the higher sequence number is chosen; –If the sequence numbers of two route entries are the same, the one with the smaller metric is chosen. DestinationNexthopMetricSeq. Nr CPN’05

5 DSDV (Update Tables) Dest.NextMetricSeq BB0B-0 Dest.NextMetricSeq AA0A-0 Dest.NextMetricSeq. CC0C-0 (B, 0, B-0) Dest.NextMetricSeq BB0B-0 Dest.NextMetricSeq. BB1B-0 CC0C-2 Dest.NextMetricSeq AA0A-2 BB1B-0 ABC B C A ABC (B, 1, B-0) (C, 0, C-2) (B, 1, B-0) (C, 0, C-2) (A, 0, A-2) (B, 1, B-0) (A, 0, A-2) (B, 1, B-0) Dest.NextMetricSeq BB0B-2 CC1C-2 Dest.NextMetricSeq AA0A-2 BB1B-0 Dest.NextMetricSeq. BB1B-0 CC0C-2 CPN’05 Initial state: B broadcasts a full dump, A receives and updates its routing table based on this information, so does C; A broadcasts a incremental update, no nodes receive; C broadcasts a incremental update, B receive it:

6 DSDV (Broken Links) A B Dest.NextMetricSeq AA0A-4 BB ∞ B-1 A Dest.NextMetricSeq AA0A-2 BB1B-0 (A, 0, A-4) (B, ∞, B-1) (A, 0, A-4) (B, ∞, B-1) A assigns the metric of this link to ∞ and increases the sequence number of this link by 1; Then it increases its own sequence number by 2 and immediately broadcasts an incremental update CPN’05

7 CPN model of a MANET  The intent of our CPN model is to show that CPN can be used for the modelling of routing protocols in a MANET environment where arbitrary changes of network topology are possible. We start by modelling the basic operation of the routing protocol: Nodes discover other nodes by receiving broadcast messages and update their routing tables accordingly; Nodes discover that previously established links are no longer valid, and mark them as broken in their routing tables. CPN’05

8 CPN model of a MANET  We do not model the routing messages explicitly. We just consider events where the information from the message is received and processed. We assume that this cannot occur simultaneously in different nodes, instead these events are interleaved in the different nodes. Because of arbitrary movements of the nodes, there is no synchronisation between nodes for a broadcast. Thus updating of a routing table is considered as an arbitrary event. Because a functional model abstracts from time, we consider that a broken link can be interleaved with any other event and thus modelled by an arbitrary event. This could correspond to the node leaving the MANET and other nodes becoming dispersed so that they are all out of range. We believe this captures the asymmetry between nodes and their arbitrary movement realistically at a high-level of abstraction. Because the functional model abstracts from the probabilities, it includes many situations that would be considered rare events. CPN’05

9 CPN model of a MANET Update Table Broken Links Nodes 1`snode++1`rnode 1`UpdateNode(rnode, snode) ++1`snode 1`node 1`BrokenLink(node,i) [neighbour(node,i)] 1`(1,[(1,1,hops 0,(1,0))]) ++ 1`(2,[(2,2,hops 0,(2,0))])++ 1`(3,[(3,3,hops 0,(3,0))]) MNode CPN’05 if Update Table occurs, rnode must have been within the transmission range of snode. If it does not occur, then either the update are not sent by snode or when snode broadcasts the update rnode was out of its transmission range. After it occurs, an incremental update is broadcast, which may or may not be received by the nodes in MANET. If no node receives, modelled by Update Table not occur with snode bound to node. If a node receives, modelled by Update Table occurring with the node binding to rnode, node bound to snode.

10 Discussion : Errors Although the model looks simple, it not only allows for arbitrary changes in topology but also relaxes the assumption that nodes have the same transmission ranges. This allow us to model MANETs in which the nodes are heterogeneous. Our simulation results show that the CPN model captures the highly dynamic topology of such a network. Further, although the model is abstract, it has sufficient detail for us to find errors in DSDV procedures using simulation. A node wrongly updates its own route entry, replacing its metric of zero with infinity and directing packets destined for itself to another node. A node with a broken link entry for another node does not re- establish the link with that node, even though it has received a broadcast from that node. CPN’05

11 Simulation experiment - errors Dest.NextMetricSeq 220(2,4) 33 ∞ (3,1) Dest.NextMetricSeq 110(1,0) Dest.NextMetricSeq. 11 ∞ (1,1) 330(3,4) Dest.NextMetricSeq 220(2,4) 33 ∞ (3,1) Dest.NextMetricSeq. 11 ∞ (1,1) 330(3,4) Dest.NextMetricSeq 13 ∞ (1,3) 331(3,4) Transition UpdateTable occurs, node1 receives the information sent by node 3: Dest.NextMetricSeq 220(2,4) 33 ∞ (3,1) Dest.NextMetricSeq 110(1,0) Dest.NextMetricSeq. 11 ∞ (1,1) 330(3,4) Transition UpdateTable occurs, node 3 receives the information sent by node 1: CPN’05 123

12 Discussion: Modification To avoid the first kind of error: –a node keeps the route entry to itself unchanged when updating its routing table. To avoid the second kind of error: –Assume a node receives routing information from another node. –If it already has a route entry to this sender, it will update this route entry regardless of the value of the sequence number, because the route information it just received is more recent. CPN’05

13 Conclusions We provide the first CPN model of the DSDV routing procedures and discover two errors in these procedures. This provide the first analysis of the key component of DSDV, the use of sequence numbers to discard old information. We suggest modifications to the DSDV procedures for updating routing table. These modification are implemented in a revised CPN model and our simulations have shown that they have been effective in eliminating these errors in the scenarios run so far. CPN’05

14 Future work To analyse the model using state spaces. To enhance the model in two ways by including:  the install time parameter;  nodes powering down and rejoining the MANET. CPN’05

15 Thank you & Questions?