Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)

Slides:



Advertisements
Similar presentations
1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Overview of Ad Hoc Routing Protocols. Overview 1.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advanced Topics in Next-Generation Wireless Networks
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
The Zone Routing Protocol (ZRP)
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Institut für Betriebssysteme und Rechnerverbund Technische Universität Braunschweig Multi hop Connectivity in Mobile Ad hoc Networks (MANETs) Habib-ur.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
The Destination Sequenced Distance Vector (DSDV) protocol
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Computer Networks Dr. Jorge A. Cobb The Performance of Query Control Schemes for the Zone Routing Protocol.
The Performance of Query Control Schemes for the Zone Routing Protocol Zygmunt J. Haas Marc R. Pearlman.
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
2003/04/24AARON LEE 1 An Efficient K-hop Clustering Routing Scheme for Ad-Hoc Wireless Networks S. F. Hwang, C. R. Dow Journal of the Internet Technology,
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Mobile Ad Hoc Networks: Introduction
The Ad Hoc On-Demand Distance-Vector Protocol (AODV)
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Sensor Network Routing
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Ad hoc Routing Protocols
Proactive vs. Reactive Routing
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Lecture 7 : The Zone Routing Protocol Lecture 7.1 : The idea of a mixed reactive / proactive routing protocol Lecture 7.2 : The details of the Zone Routing Protocol.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Brief Review of Reactive and Proactive protocols  A reactive routing protocol tries to find a route from S to D only on-demand i.e., when the route is required, for example, DSR and AODV are such protocols.  The main advantage of a reactive protocol is the low overhead of control messages.  However, reactive protocols have higher latency in discovering routes.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Proactive Protocols  A proactive protocol maintains extensive routing tables for the entire network. As a result, a route is found as soon as it is requested.  The main advantage of a proactive protocol is its low latency in discovering new routes.  However, proactive protocols generate a high volume of control messages required for updating local routing tables.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Combined Protocol  It is possible to exploit the good features of both reactive and proactive protcols and the Zone routing protocol does that.  The proactive part of the protocol is restricted to a small neighbourhood of a node and the reactive part is used for routing across the network.  This reduces latency in route discovery and reduces the number of control messages as well.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Routing Zones  Each node S in the network has a routing zone. This is the proactive zone for S as S collects information about its routing zone in the manner of the DSDV protocol.  If the radius of the routing zone is k, each node in the zone can be reached within k hops from S.  The minimum distance of a peripheral node from S is k (the radius).

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) A Routing Zone S LK G H I J A B C D E  All nodes except L are in the routing zone of S with radius 2.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Nodes in a Routing Zone  The coverage of a node´s trasmitter is the set of nodes in direct communication with the node. These are also called neighbours.  In other words, the neighbours of a node are the nodes which are one hop away.  For S, if the radius of the routing zone is k, the zone includes all the nodes which are k-hops away.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Neighbour Discovery Protocol  Like other ad hoc routing protocols, each node executing ZRP needs to know its current neighbours.  Each node transmits a hello message at regular intervals to all nodes within its transmission range.  If a node P does not receive a hello message from a previously known neighbour Q, P removes Q from its list of neighbours.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Basic Strategy in ZRP  The routing in ZRP is divided into two parts – Intrazone routing : First, the packet is sent within the routing zone of the source node to reach the peripheral nodes. – Interzone routing : Then the packet is sent from the peripheral nodes towards the destination node. S D

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Intrazone Routing  Each node collects information about all the nodes in its routing zone proactively. This strategy is similar to a proactive protocol like DSDV.  Each node maintains a route table for its routing zone, so that it can find a route to any node in the routing zone from this table.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Intrazone Routing  In the original ZRP proposal, intrazone routing is done by maintaining a link state table at each node.  Each node periodically broadcasts a message similar to a hello message. We call this message as a zone notification message.  Suppose the zone radius is k for k>1

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Zone Notification Message  A hello message dies after one hop, i.e., after reaching a node´s neighbours.  A zone notification mesage dies after k hops, i.e., after reaching the node´s neighbours at a distance of k hops.  Each node receiving this message decreases the hop count of the message by 1 and forwards the message to its neighbours.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Keeping Track of Nodes in a Routing Zone  The message is not forwarded any more when the hop count is 0.  Each node P keeps track of its neighbour Q from whom it received the message through an entry in its link state table.  P can keep track of all the nodes in its routing zone through its link state table.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Interzone Routing  The interzone routing discovers routes to the destination reactively.  Consider a source (S) and a destination (D). If D is within the routing zone of S, the routing is completed in the intrazone routing phase.  Otherwise, S sends the packet to the peripheral nodes of its zone through bordercasting.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Bordercasting  The bordercasting to peripheral nodes can be done mainly in two ways : – By maintaining a multicast tree for the peripheral nodes. S is the root of this tree. – Otherwise, S maintains complete routing table for its zone and routes the packet to the peripheral nodes by consulting this routing table.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Interzone Route Discovery  S sends a route request (RREQ) message to the peripheral nodes of its zone through bordercasting.  Each peripheral node P executes the same algorithm. – First, P checks whether the destination D is within its routing zone and if so, sends the packet to D. – Otherwise, P sends the packet to the peripheral nodes of its routing zone through bordercasting.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) An Example of Interzone Routing S D B H A C

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Route Reply in Interzone Routing  If a node P finds that the destination D is within its routing zone, P can initiate a route reply.  Each node appends its address to the RREQ message during the route request phase. This is similar to route request phase in DSR.  This accumulated address can be used to send the route reply (RREP) back to the source node S.

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC) Route Reply in Interzone Routing  An alternative strategy is to keep forward and backward links at every node´s route table similar to the AODV protocol. This helps in keeping the packet size constant.  A RREQ usually results in more than one RREP and ZRP keeps track of more than one path between S and D. An alternative path is chosen in case one path is broken.