CS 268: End-Host Mobility and Ad-Hoc Routing Ion Stoica Feb 11, 2003 (*based on Kevin Lai’s slides)

Slides:



Advertisements
Similar presentations
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Advertisements

Mobility Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Multicasting in Mobile Ad-Hoc Networks (MANET)
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
CS 268: Lecture 5 (Project Suggestions) Ion Stoica February 6, 2002.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Mobility in the Internet Part II CS 444N, Spring 2002 Instructor: Mary Baker Computer Science Department Stanford University.
Wireless Ad Hoc Network Routing Protocols CSE Maya Rodrig.
CS 268: Project Suggestions Ion Stoica February 6, 2003.
Routing Security in Ad Hoc Networks
CS 268: Ad Hoc Routing Kevin Lai Feb 20, Ad Hoc Motivation  Internet goal: decentralized control -someone still has to deploy.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
CS 268: End-Host Mobility and Ad-Hoc Routing Ion Stoica March 13, 2006.
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
COS 461: Computer Networks
Delivery, Forwarding, and Routing
NEtwork MObility By: Kristin Belanger. Contents Introduction Introduction Mobile Devices Mobile Devices Objectives Objectives Security Security Solution.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
CIS 725 Wireless networks. Low bandwidth High error rates.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
Mobile IP Most of the slides borrowed from Prof. Sridhar Iyer
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
1 HAWAII- Handoff-Aware Wireless Access Internet Infrastructure Reporter : Jing-Shiuan Hua Date : 2005/4/26.
1 Route Optimization for Large Scale Network Mobility Assisted by BGP Feriel Mimoune, Farid Nait-Abdesselam, Tarik Taleb and Kazuo Hashimoto GLOBECOM 2007.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
CarNet/Grid: Scalable Ad-Hoc Geographic Routing Robert Morris MIT / LCS
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
CS 268: Project Suggestions Ion Stoica January 26, 2004.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Ασύρματες και Κινητές Επικοινωνίες Ενότητα # 10: Mobile Network Layer: Mobile IP Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Fundamentals of Computer Networks ECE 478/578
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
: MobileIP. : r Goal: Allow machines to roam around and maintain IP connectivity r Problem: IP addresses => location m This is important for efficient.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
A Location-Based Routing Method for Mobile Ad Hoc Networks
Networking Applications
CS 268: Mobility Kevin Lai Feb 13, 2002.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Sensor Network Routing
by Saltanat Mashirova & Afshin Mahini
Network Virtualization
Vinay Singh Graduate school of Software Dongseo University
Other Routing Protocols
Presentation transcript:

CS 268: End-Host Mobility and Ad-Hoc Routing Ion Stoica Feb 11, 2003 (*based on Kevin Lai’s slides)

2 Overview  End-host mobility  Ad-hoc routing

3 Motivation and Problem  Network Layer mobility -Movement = IP address change  Problem: -Location I take my cell phone to London How do people reach me? -Migration I walk between base stations while talking on my cell phone I download or web surf while riding in car or public transit How to maintain flow?

4 Solutions  Mobile IP (v4 and v6)  TCP Migrate  Multicast

5 Mobile IP  Use indirection to deal with location and migration  Point of indirection: Home Agent (HA) -Resides in Mobile Host’s (MH) home network -Uses MH’s home IP address -As MH moves, it sends its current IP address to HA  Correspondent Host (CH) contacts MH through HA  HA tunnels packets to MH using encapsulation  MH sends packets back to CH -Tunnels packets back to HA (bi-directional tunneling) -Sends directly to CH (triangle routing)

6 Mobile IP Properties  Advantages -Preserves location privacy -CH does not have to be modified  Disadvantages -Triangle routing and especially bidirectional tunneling increase latency and consume bandwidth -HA is single point of failure

7 Mobile IP Route Optimization  CH uses HA to contact MH initially  MH sends its location directly back to CH  CH and MH communicate directly  Lose location privacy  CH must be modified

8 TCP Migrate [SB00]  Location: uses dynamic DNS updates -When MH moves to new IP address, it updates its home DNS server with new hostname to IP address mapping  Migration: -When MH moves, it sends update to CH  Advantage -No new infrastructure -Incremental deployable -Efficient routing  Disadvantages -Only works for TCP -Both CH and MH need new TCP implementation -No location privacy

9 Other solutions  Multicast -Mobile host uses multicast address as its home address -Requires inter-domain multicast  Network specific mobility schemes -Cellular phones, b -Cannot handle mobility across networks (e.g. move laptop from cell phone to b) or between same network type in different domains (e.g. laptop from Soda Hall b to campus b)  Other mobility models -Terminal/personal mobility: e.g.accessing through IMAP from different computers -Session mobility: e.g. talking on cell phone, transfer call in progress to office phone

10 Summary  Not that important today -Few portable, wireless IP telephony devices -Cell phones have their own network-specific mobility schemes -IP-based wireless networks are not ubiquitous enough to be seamless -PDA (e.g. palm pilot) are too weak to do handle long- lived flows  Future -Cellular networks will become IP-based, need IP mobility scheme -PDA are becoming more powerful

11 Overview  End-host mobility  Ad-hoc routing

12 Motivation  Internet goal: decentralized control -Someone still has to deploy routers and set routes  Ad Hoc routing -Every node is a router -Better wireless coverage -Better fault tolerance (e.g. node bombed, stepped on, exhausted power) -No configuration (e.g. temporary association) -Dedicated router costs money

13 Routing  DSDV: hop-by-hop distance vector  TORA: Temporally-Ordered Routing Algorithm  DSR: Dynamic Source Routing  AODV: Ad hoc On-demand Distance Vector  TORA, DSR, and AODV are all on-demand routing protocols

14 DSDV  Hop-by-hop distance vector  Routing table contains entries for every other reachable node  Nodes pass their routing tables to neighbors periodically  Routing tables are updates using standard distance vector algorithm  Old routes are ignored using sequence numbers  O(n) routing state / node, O(n*k) communication size / node / period -k = average node degree

15 TORA  Temporally-Ordered Routing Algorithm  Interested in finding multiple routes from S  D  Find routes on demand  Flood query to find destination  Flood query response to form multiple routes  O(m) routing state / node, O(n*k) communication / node / route update -m = nodes communicated with, worst case O(n)

16 DSR  Dynamic Source Routing  Packet headers contain entire route  Flood query to find destination  Intermediate nodes don’t have to maintain routing state -Nodes listen for and cache queries, responses as optimization -Nodes gratuitously sends response packets to shorten paths when they hear packets with sub-optimal routes  Some kind of retransmission?  O(m) routing state / nodes, O(n*k) communication / node / route update -much smaller constant than other protocols  O(n 1/k ) space required in header

17 AODV  Ad Hoc On-Demand Distance Vector  Flood query to find destination  Reply is sent back to source along the reverse path  Intermediate nodes listen for reply to set up routing state  State is refreshed periodically  O(m) routing state / node, O(n*k) communication / node / route update

18 Results  Avoid synchronization in timers  TORA does not scale to 50 nodes at all -Suffers control traffic congestion collapse  DSDV fails to deliver packets when movement is frequent -Only maintains one route/destination  AODV has high routing overhead when movement is frequent -Combination of DSDV maintenance of state + flooding of DSR  DSR does well compared to others -Designed by authors  not surprising! -[LJC+00] shows congestion collapse beyond 300 nodes

19 Related Work  Greedy Perimeter Stateless Routing (GPSR) [Karp and Kung, Mobicom 2000] -Separate addressing from naming -Assume everyone has GPS -Do Cartesian routing -Separate scalable, efficient, fault tolerant service to map from names to addresses  How to deal with selfish users? [MGL+00] -listen to neighbors to make sure they are forwarding -convey black list information back to source -route around selfish nodes

20 Conclusions  Proliferation of wireless network interfaces provide ready market  Ad hoc provides less configuration, more fault tolerance, better coverage, lower cost  Many interesting and unsolved problems

21 One Page Project Summary – due Feb 13  The problem you are solving  Motivation and challenges – why is the problem important/difficult?  Your proposed solution and approach – what it is new?  Your plan of attack with milestones and dates  Any resources you might need to complete the project