TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.

Slides:



Advertisements
Similar presentations
The Wireless Routing Protocol (WRP) Invented by J.J.Garcia Luna Aceves and S. Murthy Belongs to a general class of algorithms called Path Finding Algorithms.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Overview of Ad Hoc Routing Protocols. Overview 1.
1 Routing Techniques in Wireless Sensor networks: A Survey.
CSE 581 Internet Technology Ad-hoc Routing Schemes Presented by Jason Liu.
TORA! TORA! TORA! By Jansen Cohoon. Developing TORA TORA was funded by the Army Research Laboratory. TORA is presently being transitioned into the commercial.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Temporally-Ordered Routing Algorithm (TORA) IEEE INFOCOM 112/4/20031Authors.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Routing 9th Week Christian.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
1 Ad Hoc Networks Routing (1/2) Instructor: Carlos Pomalaza-Ráez Fall 2003 University of Oulu, Finland.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
1 Analysis of Link Reversal Routing Algorithms Srikanta Tirthapura (Iowa State University) and Costas Busch (Renssaeler Polytechnic Institute)
Aodv. Distance vector routing Belman principle AODV - overview Similar to DSR –On demand –Route request when needed and route reply when a node knows.
Temporally-Ordered Routing Algorithm (TORA). Route Creation QRY packet: contains the destination-ID (did) for which the algorithm is running. UPD packet:
Example of TORA operations A B C D E Y X From last time, this was the DAG that was built. A was the source and X was the destination. Link 1 Link 4 Link.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
Ad Hoc Wireless Routing COS 461: Computer Networks
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Message-Optimal Connected Dominating Sets in Mobile Ad Hoc Networks Paper By: Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder Presenter: Ke Gao Instructor:
Leader Election Algorithms for Mobile Ad Hoc Networks Presented by: Joseph Gunawan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
ROUTING ALGORITHMS IN AD HOC NETWORKS
The Destination Sequenced Distance Vector (DSDV) protocol
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
A Receiver-Initiated Approach for Channel-Adaptive On-Demand Routing in Ad Hoc Mobile Computing Networks Xiao-Hui Lin, Yu-Kwong Kwok, and Vincent K. N.
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Asstt. Professor Adeel Akram. Other Novel Routing Approaches Link reversal Aimed for highly dynamic networks Goal: to identify some path, as opposed.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Internet Networking recitation #4
Sensor Network Routing
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Routing: Distance Vector Algorithm
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Analysis of Link Reversal Routing Algorithms
Temporally-Ordered Routing Algorithm (TORA)
Mobile and Wireless Networking
Effective Replica Allocation
Proactive vs. Reactive Routing
Communication Networks
Communication Networks
A Routing Protocol for WLAN Mesh
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol. The main objective of TORA is to limit control message propagation in the highly dynamic mobile computing environment. Each node has to explicitly initiate a query when it needs to send data to a particular destination.

TORA belongs to a class of algorithms called the link reversal algorithms. (We will defer a discussion of what this means to later). TORA essentially performs three tasks:  Creation of a route from a source to a destination.  Maintenance of the route.  Erasure of the route when the route is no longer valid. TORA attempts to build what is known as a directed acyclic graph (DAG) which is rooted at the destination.

Directed Acyclic Graph (DAG) A graph G(V,E) is a directed graph with V nodes and E edges if every edge in the graph has an associated direction. Now, if a path in a directed graph forms a cycle if it originates and terminates at the same node and has at least one link in it. In other words, a path from v 0 to v k in the graph forms a cycle if v 0 = v k and the path has at least one edge. A directed graph with no cycles is a DAG. A DAG is rooted at the destination if the destination is the only node with no downstream nodes, i.e., no links lead out of the destination. Such a DAG is often called a destination oriented DAG. Creation of such a DAG from a source to a destination would contain multiple routes to the destination.

The idea is to first build a DAG from the source to the destination. Then as links fail, it might be necessary to re- compute a DAG in order to find a route. Link Reversal algorithms are used for this. If network gets partitioned, erasures of routes is required. TORA uses three kinds of messages: $ The QRY message for creating a route. $ The UPD message for both creating and maintaining routes. $ The CLR message for erasing a route.

Destination Disoriented DAG Topology of the Mobile Ad Hoc Network changes in time. Thus, it is possible that one of the nodes may have all inbound links (since for example, the only outbound link failed). This is not ok since only the destination should have this property. Such a graph is called “destination disoriented”. At this point TORA resorts to link reversals.

Link Reversals Let us call a process that is invoked in response to a topology change an “iteration”. Full Reversals If this is invoked a node that is not the destination, upon finding that it has only inbound links will reverse the direction on all its links. Partial reversal During each iteration every node (say a node Node i) keeps a list of all its neighbors j such that during the iteration, a link from node i to node j was in fact reversed to now show node j  node i. It then reverses directions of links to only those nodes that do not belong to the list.

Idea is similar to that of a fluid flow scheme. All the fluid is to flow from the source to the destination. The source is at the highest level, the destination is at the lowest level and the fluid flows from the highest level to the lowest level. Thus, if an intermediate node has all inbound links, it is a local minimum and it is possible that all the the fluid flows to this node rather than the destination. Now, the node has to increase its level !

TORA details and examples Each node has an associated height. This height is represented as a quintuple h i = (  i, oid i, r i,  i, i). This quintuple represents the height in terms of two parameters. The first is called the reference level and is indicated by the first three elements. The second is the offset from the reference level and is represented by the last two elements. When a node loses its last downstream neighbor it creates a new “reference level”.

For this reference level,  i is the time at which the failure occurred. oid i is the ID of the originating node. r i indicates one of two unique sub-levels in the reference level – why ? what ? Later ! The second part refers to an offset where:  i refers to an integer which is used to order nodes with respect to the reference level. i is the ID of the node itself. Why do I think an example is necessary now  ? But a few more things....

Initially height of each node is NULL and is represented by (-,-,-,-, i). The height of the destination is set to zero, i.e., h dest = (0,0,0,0,dest). Each node reports its height to its neighbors. If no info about a neighbor set its height to NULL. If neighbor is destination, set its height to zero. Each node also maintains the state of the links incident on it. If its height is greater than its neighbor j, the link to j is marked downstream (DOWN). Else it is marked upstream (UP).

Example of TORA operations The destination is X. A needs to find a route to X. A sends a QRY packet to C. C and B broadcast this message. E knows that X is one hop away. D broadcasts QRY message (contains height which is currently NULL). What does E do ?

E creates a reference level (0,0,0) and indicates that it has an offset height  E = 1 from the reference level. It then generates an UPD message. It also sets a direction for its link to X i.e., from E to X. Why ?

C and D receive this message from E, and generate an update. They also set E to be a downstream node. Future broadcasts of the UPD message results in the generation of the DAG. Note in the final part of the figure, all links are directed and the destination, viz. X does not have any downstream nodes.

Reacting to failures: Route Maintenance Let Link 4 fail. At this time notice that other than the destination all nodes still have an outbound link. Thus, none of the nodes generate an UPD message. The DAG is still OK ! This is especially attractive when the network is dense – most nodes have many outbound links.

Let Link 7 fail. Now, Node E does not have any outbound links ! Thus, we resort to full link reversal at E. E generates a new reference level which is 1, sets the oid to E and transmits an UPD message. It also reverses the direction of all its inbound links.

At this, Node C no longer has outbound links. It resorts to partial link reversal – reverses the direction of its links to A and B and transmits an UPD. It also sets its own offset to –1 to ensure that it is at a lower level compared to E.

Now the situation repeats at B. After B reverses its links and transmits an UPDATE. This is now a full reversal. Thus, it stays at the same level as C, but indicates the full reversal by flipping r i. This causes a partial reversal at A. (Not shown) Finally an update is generated at C. DAG is restored !

Now let Link 5 fail. This causes a network partition. E,D,Y and X are ok. C has no outbound links. It creates a new reference level which is 2, and sets the oid to C and sends a UPD. This causes A to have no outbound links.

A resorts to partial reversal. It sets its height to –1, reverses its link to B and broadcasts an update. Now B does not have outbound links. It resorts to a full reversal. At full reversal r i is flipped. This causes a partial reversal at A.

A’s UPD message after the partial reversal creates the same situation at C. This would cause C to realize that there is no path to X. It sets its height to NULL and sends an UPD to A and B. Now the nodes realize that there is no path to X.

Advantages: That of an on-demand routing protocol – create a DAG only when necessary. Multiple paths created. Good in dense networks. Disadvantages Same as on-demand routing protocols. Not much used since DSR and AODV outperform TORA. Not scalable by any means.

References Chapter 8 of book. V.D.Park and Scott.M.Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks”, Proceedings of INFOCOM 1997.