Example of TORA operations A B C D E Y X From last time, this was the DAG that was built. A was the source and X was the destination. Link 1 Link 4 Link.

Slides:



Advertisements
Similar presentations
The Wireless Routing Protocol (WRP) Invented by J.J.Garcia Luna Aceves and S. Murthy Belongs to a general class of algorithms called Path Finding Algorithms.
Advertisements

指導教授:許子衡 教授 報告學生:馬敏修 2010/8/ Introduction 2. Geocast Routing Protocols  2.1 GAMER Overview 3. GAMER Details  3.1 Building the Mesh  3.2 Adaptation.
Overview of Ad Hoc Routing Protocols. Overview 1.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
“Location-Aided Routing (LAR) in Mobile Ad Hoc Network” by Young-bae ko Nitin H. Validya presented by Mark Miyashita.
TORA! TORA! TORA! By Jansen Cohoon. Developing TORA TORA was funded by the Army Research Laboratory. TORA is presently being transitioned into the commercial.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Mobile Ad-hoc Networks (manets)
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Routing 9th Week Christian.
TCP over ad hoc networks Ad Hoc Networks will have to be interfaced with the Internet. As such backward compatibility is a big issue. One might expect.
Routing in Mobile Ad Hoc Networks Marc Heissenbüttel University of Berne Bern,
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
TORA : Temporally Ordered Routing Algorithm Invented by Vincent Park and M.Scott Corson from University of Maryland. TORA is an on-demand routing protocol.
Aodv. Distance vector routing Belman principle AODV - overview Similar to DSR –On demand –Route request when needed and route reply when a node knows.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Ad Hoc Wireless Routing COS 461: Computer Networks
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
The Zone Routing Protocol (ZRP)
Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Recipient of the MOBICOM'98 Best Student Paper Award.
Mobile Ad-hoc Pastry (MADPastry) Niloy Ganguly. Problem of normal DHT in MANET No co-relation between overlay logical hop and physical hop – Low bandwidth,
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Mobile Routing protocols MANET
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc Networks.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Copyright: S.Krishnamurthy,UCR Power Aware Routing in Ad Hoc Networks.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Dynamic Routing in Mobile Ad Hoc Network 報告者:呂佐鴻 指導教授:李鴻璋.
On-Demand Routing Protocols Routes are established “on demand” as requested by the source Only the active routes are maintained by each node Channel/Memory.
1 Computer Communication & Networks Lecture 21 Network Layer: Delivery, Forwarding, Routing Waleed.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Reactive Routing Protocols for Ad hoc Mobile Wireless Networks
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
6LoWPAN Ad Hoc On-Demand Distance Vector Routing Introduction Speaker: Wang Song-Ferng Advisor: Dr. Ho-Ting Wu Date: 2014/03/31.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Fundamentals of Computer Networks ECE 478/578
HoWL: An Efficient Route Discovery Scheme Using Routing History in Mobile Ad Hoc Networks Faculty of Environmental Information Mika Minematsu
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
Overview of Unicast Routing Protocols for Multihop Wireless Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Routing.
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
Presentation transcript:

Example of TORA operations A B C D E Y X From last time, this was the DAG that was built. A was the source and X was the destination. Link 1 Link 4 Link 3 Link 2 Link 5 Link 6 Link 7 Link 8

Reacting to failures: Route Maintenance Let Link 4 fail. At this time notice that other than the destination all nodes still have an outbound link. Thus, none of the nodes generate an UPD message. The DAG is still OK ! This is especially attractive when the network is dense – most nodes have many outbound links. A B C D E Y X Link 1 Link 4 Link 3 Link 2 Link 5 Link 6 Link 7 Link 8

Let Link 7 fail. Now, Node E does not have any outbound links ! Thus, we resort to full link reversal at E. E generates a new reference level which is 1, sets the oid to E and transmits an UPD message. It also reverses the direction of all its inbound links. A B C D E Y X Link 1 Link 3 Link 2 Link 5 Link 6 Link 7 Link 8 (1,E,0,0,E)

At this, Node C no longer has outbound links. It resorts to partial link reversal – reverses the direction of its links to A and B and transmits an UPD. It also sets its own offset to –1 to ensure that it is at a lower level compared to E. A B C D E Y X Link 3 Link 2 Link 5 Link 6 Link 8 (1,E,0,-1,C) Link 1

Now the situation repeats at B. After B reverses its links and transmits an UPDATE. A B C D E Y X Link 3 Link 2 Link 5 Link 6 Link 8 (1,E,0,-2,B) Link 1

The situation repeats at A. This is now a full reversal. A got updates from B and C. Thus, A stays at the same level as C, but indicates the full reversal by flipping r i. This causes a partial reversal at B. A B C D E Y X Link 3 Link 2 Link 5 Link 6 Link 8 (1,E,1,-2,A) A B C D E Y X Link 3 Link 2 Link 5 Link 6 Link 8 (1,E,1,-3,B) Link 1

Finally an update is generated at C. DAG is restored ! A B C D E Y X Link 3 Link 2 Link 5 Link 6 Link 8 (1,E,1,-4,C) Link 1

Now let Link 5 fail. This causes a network partition. E,D,Y and X are ok. C has no outbound links. It creates a new reference level which is 2, and sets the oid to C and sends a UPD. This causes B to have no outbound links. A B C D E Y X Link 3 Link 2 Link 5 Link 6 Link 8 (2,C,0,0,C) A B C D E Y X Link 3 Link 2 Link 6 Link 8 Link 1

B resorts to partial reversal. It reverses its link to A and broadcasts an update. Now A does not have outbound links. It resorts to a full reversal. At full reversal r i is flipped. This causes a partial reversal at B. (2,C,0,-1,B) A B C Link 3 Link 2 Link 1 (2,C,1,-1,A) A B C Link 3 Link 2 Link 1

B’s UPD message after the partial reversal creates the same situation at C. This would cause C to realize that there is no path to X. It sets its height to NULL and sends an UPD to A and B. Now the nodes realize that there is no path to X. (2,C,1,-2,B) A B C Link 3 Link 2 Link 1 Important Point : Height is reduced with respect to node that created the reference level.

Advantages: That of an on-demand routing protocol – create a DAG only when necessary. Multiple paths created. Good in dense networks. Disadvantages Same as on-demand routing protocols. Not much used since DSR and AODV outperform TORA. Not scalable by any means.

References Chapter 8 of book. V.D.Park and Scott.M.Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks”, Proceedings of INFOCOM 1997.

Associativity Based Routing (ABR) Proposed by C-K.Toh currently at Georgia Tech. Introduces a new metric for routing which is called “Degree of Association Stability”. ABR is free from loops. What is association stability ?  How stable are nodes with respect to each other ?  Based on an estimate of this, a route is selected.

Each node would periodically generate and transmit a beacon to signify its existence. Neighboring nodes receive this beacon. They, maintain what is known as an associativity table. For each beacon received, the associativity of the receiving node with respect to the beaconing node is incremented. Thus, to reiterate  there is an indication of how stable nodes are with respect to each other. Association Stability is defined by the connection stability in “time” and “space” of one node with respect to another.

Associativity entries (or ticks as they are called) are reset when the neighbors of a node, or the node itself moves out of proximity. Goal :? Longevity – longer lived routes for stability. Lower Overhead (?) Three phases of ABR: Route Discovery Route Re-construction Route Deletion NOW HERE IS A NEW CONCEPT !!!!!!

Each node broadcasts a query message (BQ message just to sound different ! ) in order to find a destination. In addition to the address, the associativity ticks with respect to their neighbors is appended. The receiving node, chooses the best one, i.e., retains only the entry corresponding to itself and its upstream node. Thus, at the destination, multiple routes are available. It chooses the one that is best in terms of associativity ticks. If there is a tie, choose shortest path. ROUTE DISCOVERY

Destination generates a REPLY message towards the source. Intermediate nodes that forward this message mark the corresponding routes as valid. Thus, only one route at a given time.

Partial route recovery is allowed. Intermediate nodes will try and rediscover route from point of failure. When routes are no longer valid, they would be erased. This is similar to DSR – except for associativity. In addition partial route discovery. ROUTE MAINTENANCE

Advantages: Tries to find stable routes – lower overhead in some scenarios. Partial recovery may be faster in some cases. Disadvantages Unclear if the overhead incurred in maintaining stability info. is higher than the actual gains. Depends on scenario. Partial recovery may lead to longer and less stable routes.

References Chapter 9 on book. Read about effects of beaconing on battery life. C-K. Toh, “A Novel Distributed Routing Protocol to support Ad Hoc Mobile Computing”, Proceedings of IEEE 15 th Annual International Phoenix Conference on Computers and Communication”, March E.Royer and C-K.Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Networks”, IEEE Personal Comm. Mag. April 1999.

Signal Stability based Adaptive Routing (SSA) Prof. Tripathi’s work. Reference: R.Dube, C.D.Rais, K.Y.Wang and S.K.Tripathi, “Signal Stability based Adaptive Routing for Ad Hoc Mobile Networks”, IEEE Personal Communications Magazine, February 1997.

Principle of SSA Select routes based on the signal strength between nodes and on a node’s location stability. Choose routes that have stronger connectivity. SSA has two component co-operative protocols: The Dynamic Routing Protocol The Static Routing Protocol.

The Dynamic Routing Protocol (DRP) The DRP is responsible for maintaining what is called the Signal Stability Table and also the Routing Table. SST – record of signal strengths of neighboring nodes which is obtained by means of periodic beaconing. Quantized levels possible  weak channel vs. strong channel. When a packet is received, DRP processes the packet, updates the tables and passes the received packet to the SRP.

The Static Routing Protocol (DRP) Forwards the packet up to the transport layer if it is the receiver. If not, it looks up the routing table and forwards the packet to the appropriate next-hop. If no entry is found, it initiates a route search.

The Route Search Route requests are propagated throughout the network – however... Forwarded onto the next hop, only if they are received over “strong” channels” and have not yet been previously processed. /* Notice that the second condition prevents looping */. The destination chooses the first arriving query message because it is most probable that the packet arrived on the “strongest”, shortest and/or least congested path. DRP reverses the route and sends a route-reply back to the sender.

The PREF field Notice so far that a route-search packet is forwarded only if it arrived on a strong link. However, it is possible that no route is found with strong links all the way. At this time, the source initiates another route- search and uses what is called the “PREF” field to indicate that weak links are acceptable.

Route Maintenance Use a route error message to the source to indicate which channel has failed. Source then initiates a new route-search to find a new path to the destination.

Advantages: More stable routes since signal strength indicates stability. No overhead incurred in dissemination of tables. Disadvantages Of on-demand routing protocols. The time over which the signal strength is averaged out might be an issue.

Location Aided Routing (LAR) By Nitin Vaidya and Young-bae Ko. Reference: “Location Aided Routing (LAR) in Mobile Ad Hoc Networks”, Y.Ko and N.Vaidya, Proceedings of Mobicom Idea: Use Location Information for doing Routing – does the name give a hint or what ? The location info is obtained using GPS (Global Positioning System). Forward the packet towards the destination instead of forwarding it indiscreetly.

Global Positioning System (GPS) It is a system that allows a mobile user to know its physical location. There is however some error in the estimated position. Different systems have different errors – few meters to about 100 meters.

The notion of expected zone If a source (S) knows that a destination (D) was at position L at time t 0, it has some notion of where the destination might be at a later time t 1. If the average speed of D is v, then S might expect that D is within a circular radius of v (t 1 -t 0 ) which is centered at L. However, note that this is only an estimate. If the actual speed was higher, the node might be outside this circle. This circular region is called the “expected zone”.

Why is the expected zone important ? If we have an on-demand routing protocol, now we can disseminate a query within the expected zone ! Note that if there is no information whatsoever with respect to the destination, query search would degenerate to pure flooding. On the other hand, if we further knew that D was moving north, then the expected zone may be further refined.

The Request Zone Source node defines what is known as a request zone. A node would forward the request only if it belongs to the request zone. Typically, the request zone would include the expected zone. Additionally nodes in other regions around the expected zone are to be included in the request zone. Why ?

The Request Zone (Continued) Source node might not belong to the expected zone. Thus, other nodes which are not in the expected zone would need to forward request towards the expected zone. If with an initial request zone, the destination is not found (because no route exists entirely within the request zone), an expanded request zone may be defined. In an extreme case, the expanded request zone might be just doing flooding. There is a tradeoff between latency and message overhead.

Defining the Request Zone S D v(t 1 -t 0 ) Entire Network Expected Zone Request Zone In the first scheme, the suggestion is that the request zone be the rectangle that includes the source and the expected zone of the destination. Source determines the co-ordinates of the rectangle and includes in query. A node upon receiving this, will forward the query only if it is within the rectangle.

The destination node, Node D would respond with its current location, and current time in its reply message. It could also include its current speed, or average speed over a recent time interval. S D v(t 1 -t 0 ) Entire Network Expected Zone Request Zone

Initially destination’s location, D is unknown. The size of the request zone depends upon the average speed of movement of the destination “v”, and the time elapsed since the last known location of D was recorded. If v is large, larger expected zone,  larger request zone. If communication with D is infrequent, it may result in a larger request zone. It may be possible to piggyback location info. on packets other than the query. Size of the request zone

A Second Possible Scheme for determining the Request Zone. Source node knows location (X,Y) of dest at some time t0. It calculates its distance from (X,Y) = D s. It includes both, (X,Y) and D s in the query message. A node I, forwards it if for some parameter d, if its own distance from the destination D I <= Ds + d. If this message is further received by node J, node J would forward it only if its distance from the destination D J <= D I + d. Obviously the idea is that you try and get closer and closer to the destination. More details in the paper.

Finally, remember we said GPS could have some error. Thus, some leeway has to be provided to take this error into account while determining the expected zone and the request zone. That is my brief intro to ABR, SSA and LAR.