Sensor Network Routing Romit Roy Choudhury and Pradeep Kyasanur (Some slides are based on Dr. Nitin Vaidya’s tutorial)

Slides:



Advertisements
Similar presentations
Routing protocols in Mobile Ad Hoc Network
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Overview of Ad Hoc Routing Protocols. Overview 1.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Advanced Topics in Next-Generation Wireless Networks
Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Mobile Ad-hoc Networks (manets)
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Routing 9th Week Christian.
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile Ad hoc Networks COE 549 Routing Protocols I
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
The Destination Sequenced Distance Vector (DSDV) protocol
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
Ch 4. Routing in WMNs Myungchul Kim
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Reactive Routing Protocols for Ad hoc Mobile Wireless Networks
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
Ad Hoc Wireless Routing Different from routing in the “wired” world Desirable properties of a wireless routing protocol –Distributed operation –Loop freedom.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
DSDV Highly Dynamic Destination-Sequenced Distance-Vector Routing
Kyle Fitzpatrick Konstantin Zak
Routing design goals, challenges,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
ROUTING IN MOBILE AD-HOC NETWORKS
Mobile and Wireless Networking
Ad hoc Routing Protocols
Mobile Computing CSE 40814/60814 Spring 2018.
Subject Name: Computer Networks - II Subject Code: 10CS64
Proactive vs. Reactive Routing
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Sensor Network Routing Romit Roy Choudhury and Pradeep Kyasanur (Some slides are based on Dr. Nitin Vaidya’s tutorial)

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elizabeth M Royer, Chai-Keong Toh

Mobile Ad Hoc Wireless Networks Unreliable wireless medium Mobile nodes No central authority Traffic patterns application specific Energy constraints More information in MANET Charter

Example Ad Hoc Network B A E F H C G I D Nodes have unique identifiers Routing problem – find path between S and D S

Classification of routing protocols Table-driven (proactive) –Up-to-date routing information maintained –Routing overhead independent of route usage Source-initiated (demand-driven / reactive) –Routes maintained only for routes in use –Explicit route discovery mechanism Hybrid Protocols –Combination of proactive and reactive

Classification (cont.) Ad Hoc Routing Protocols Table driven Source-initiated on-demand DSDV WRP AODV DSR TORAABR SSR Reactive Proactive Hybrid ZRP Hybrid OLSR CGSR

Table-driven Routing Protocols Each node maintains a routing table –Contains routes to all nodes in the network Changes to network topology is immediately propagated Protocols differ in mechanisms used to propagate topology information

Destination Sequenced Distance Vector (DSDV) Based on Bellman-Ford algorithm Enhanced with sequence number to avoid loops –Fresher routes have higher sequence numbers Optimizations added to reduce routing overheads – incremental data exchange, delayed exchange of updates

DSDV Example DestinationNextMetricSeq. Nr AA0A-550 BB1B-102 CB2C-588 DB3D-312 A B C D Routing Table of Node A Route information is exchanged periodically

Clusterhead Gateway Switch Routing (CGSR) Nodes organized into hierarchy of clusters. Each node has a clusterhead, selected using an election. Nodes send packet through clusterheads. Clusterheads communicate amongst themselves using DSDV. –Two clusters are connected through a gateway node

Wireless Routing Protocol (WRP) Maintains multiple tables –Distance, routing, link-cost, etc. Link change messages exchanged only between neighbors Loop freedom using novel algorithm –Uses predecessor hop information

Other Table-Driven Protocols Optimized Link State Routing Protocol (OLSR) – RFC 3626 –Optimization of link-state routing to wireless Topology Dissemination Based on Reverse Path Forwarding (TBRPF) - RFC 3684 –Also based on link-state routing

Source-Initiated On-Demand Routing Create routes only when needed Routes found using a “route discovery” process Route maintenance procedure used to repair routes

Ad Hoc On-Demand Distance Vector Routing (AODV) Now RFC 3561, based on DSDV Destination sequence numbers provide loop freedom Source sends Route Request Packet (RREQ) when a route has to be found Route Reply Packet (RREP) is sent back by destination Route Error messages update routes

Route Requests in AODV B A S E F H C G I Represents a node that has received RREQ for D from S D

Route Requests in AODV B A S E F H C G I Represents transmission of RREQ Broadcast transmission D

Route Requests in AODV B A S E F H C G I Represents links on Reverse Path D

Reverse Path Setup in AODV B A S E F H D C G I Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

Route Reply in AODV B A S E F H D C G I Represents links on path taken by RREP

Dynamic Source Routing (DSR) Similar to AODV in route discovery Full source-route is aggregated in RREQ, and sent back in RREP Each data packet has full source route Route table overhead only at source node However, overhead with each data packet

Route Requests in DSR B A S E F H C G I Represents a node that has received RREQ for D from S D

Route Requests in DSR B A S E F H C G I Represents transmission of RREQ Broadcast transmission D

Route Requests in DSR B A S E F H C G I RREQ keeps a list of nodes on the path from the source D

Route Reply in DSR S E F D Represents links on path taken by RREP B A H C G I

Associativity-Based Routing Defines metric “Degree of Association Stability” –This metric used instead of shortest hop Nodes with less mobility/better links have higher stability value DSR-like protocol is used for routing

Signal Stability Routing Signal strength of links is used as metric DSR-like routing is used RREQ is forwarded only if packet is received over a link with good signal strength

Other metrics Expected Transmission Time (ETT) metric –Easier to compute, and more useful than signal strength Weighted Cumulative Expected Transmission Time –Better for multi-radio, and asymmetric rate links

Temporally Ordered Routing Algorithm Directed Acyclic Graph (DAG) rooted at destination is used to route packets Link Reversal algorithm used to update DAG (along with notion of “height”) Algorithm is distributed and loop-free Recent result - Link reversal takes O(n 2 ) time and message complexity to stabilize

TORA Example AFB CE D DAG maintained to destination D G

TORA Example Link (G,D) broke AFB CEG D Node G has no outgoing links

TORA Example AFB CE G D Now nodes E and F have no outgoing links Represents a link that was reversed recently

TORA Example A F B C EG D Nodes E and F do not reverse links from node G Now node B has no outgoing links Represents a link that was reversed recently

TORA Example A FB C EG D Now node A has no outgoing links Represents a link that was reversed recently

TORA Example AFB C EG D Now all nodes (except destination D) have outgoing links Represents a link that was reversed recently

TORA Example AFB C EG D DAG has been restored with only the destination as a sink

Other routing protocols Geographic Routing Protocols –Location Aided Routing (LAR) –Distance Routing Effect Algorithm for Mobility (DREAM) –Greedy Perimeter Stateless Routing (GPSR) Hybrid Routing Protocols –Zone Routing Protocol (ZRP)

Discussion Proactive routing protocols suitable for high traffic load, low mobility On-demand routing protocols suitable for low traffic load and/or moderate mobility With high mobility, flooding of data packets may be the only option

Locating and Bypassing Routing Holes in Sensor Networks Qing Fang, Jie Gao and Leonidas J. Guibas

GPSR Location of the destination node is assumed to be known Each node knows location of its neighbors Each node forwards a packet to its neighbor closest to the destination If routing holes are found, uses perimeter routing (right-hand rule)

Routing Holes G D C F B S A E J H HOLE I

Problem with GPSR Approach Maintaining perimeter graph expensive, especially in sensor networks Identifying holes (and boundary around holes) useful for routing around them –Also useful for path migration, information storage Node where packets get stuck (due to a hole) define the boundary around holes

Definitions Weak stuck node P – P is the closest node to node Q (among P’s neighbors), and Q is out of range of P –Q is called black node P J H Q

Definitions Strong stuck node P – P is closest node to point Q, and Q is out of range of P –Collection of Qs is called black region P J H Black Region Q

Proposed Algorithms TENT rule – enables detection of strongly stuck nodes P J H O

Proposed Algorithms BOUNDHOLE- identifies the boundary of a hole Start with a stuck node, and sweep counter-clockwise Move from stuck node to stuck node till the originating node is reached, completing loop

Discussion Identifying “holes” useful for many applications Hole identification assumes “circular” radio transmission pattern –Can a similar algorithm be designed using connectivity properties alone?