Wave Relay: Multi-hop Wireless Ad hoc Network Baruch Awerbuch, David Holmer, Herbert Rubens {baruch dholmer Johns Hopkins University Department.

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

M A Wajid Tanveer Infrastructure M A Wajid Tanveer
BY PAYEL BANDYOPADYAY WHAT AM I GOING TO DEAL ABOUT? WHAT IS AN AD-HOC NETWORK? That doesn't depend on any infrastructure (eg. Access points, routers)
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Self-Organizing Hierarchical Routing for Scalable Ad Hoc Networking David B. Johnson Department of Computer Science Rice University Monarch.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Multicasting in Mobile Ad-Hoc Networks (MANET)
An Analysis of the Optimum Node Density for Ad hoc Mobile Networks Elizabeth M. Royer, P. Michael Melliar-Smith and Louise E. Moser Presented by Aki Happonen.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Mesh Networks A.k.a “ad-hoc”. Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology- each.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Component-Based Routing for Mobile Ad Hoc Networks Chunyue Liu, Tarek Saadawi & Myung Lee CUNY, City College.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
CS335 Networking & Network Administration Tuesday, April 20, 2010.
1 Algorithms for Bandwidth Efficient Multicast Routing in Multi-channel Multi-radio Wireless Mesh Networks Hoang Lan Nguyen and Uyen Trang Nguyen Presenter:
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Dr. Baruch Awerbuch, David Holmer, and Herbert Rubens Johns Hopkins University Department.
Ad Hoc Wireless Routing COS 461: Computer Networks
Switching, routing, and flow control in interconnection networks.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
CECS 474 Computer Network Interoperability WAN Technologies & Routing
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation Baruch Awerbuch, David Holmer, Herbert Rubens {baruch dholmer WONS Jan.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
Samrat Ganguly et al. IEEE JSAC’06 November 2006 Yoonchan Choi Advanced Networking Lab Oct 9,
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Advanced Topics in Wireless Networks Instructor: Dr. Baruch Awerbuch TA: Herbert Rubens CO-TA: David Holmer Class Webpage off of Mon – Wed 10am.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks Baruch Awerbuch, David Holmer, Herbert Rubens Szikszay Fábri Anna, ELTE IK Prog.terv.mat.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Wireless Ad-Hoc Networks
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
High Performance Mobile Ad hoc Networking Herbert RubensBaruch Awerbuch Johns Hopkins University Department of Computer.
Secure Multi-Hop Infrastructure Access presented by Reza Curtmola (joint work with B. Awerbuch, D. Holmer, C. Nita-Rotaru and H. Rubens) – Advanced.
Wireless Mesh Network 指導教授:吳和庭教授、柯開維教授 報告:江昀庭 Source reference: Akyildiz, I.F. and Xudong Wang “A survey on wireless mesh networks” IEEE Communications.
Effects of Multi-Rate in Ad Hoc Wireless Networks
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
CSE 6590 Fall 2009 Routing Metrics for Wireless Mesh Networks 1 12 November, 2015.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
Network and Systems Laboratory nslab.ee.ntu.edu.tw R. Vedantham, S. Kakumanu, S. Lakshmanan and R. Sivakumar Georgia Institute of Technology Appear in.
Wireless Mesh Networks Myungchul Kim
EmberNet – Wireless Networks for Industrial Systems Presented by Ryan Wu April 11, 2003 Some slides and figures courtesy EmberNet, Rob Poor and Cliff Bowman.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
CWSA Workshop SWAN: Survivable Wireless Ad Hoc Networks Cristina Nita-Rotaru Purdue University J oint work with: Baruch Awerbuch, Reza Curtmola, Dave Holmer.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Instructor Materials Chapter 1: LAN Design
Architecture and Algorithms for an IEEE 802
UNIT-V Transport Layer protocols for Ad Hoc Wireless Networks
Sensor Network Routing
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
Routing in Mobile Ad-hoc Networks
Other Routing Protocols
Presentation transcript:

Wave Relay: Multi-hop Wireless Ad hoc Network Baruch Awerbuch, David Holmer, Herbert Rubens {baruch dholmer Johns Hopkins University Department of Computer Science

Goals: Design a system that… Supports a large number of nodes Supports a large number of nodes thousands thousands Moving at high speeds Moving at high speeds greater then 40 mph greater then 40 mph In an urban environment In an urban environment High multi-path, rapidly fluctuating channels High multi-path, rapidly fluctuating channels Running real-time applications Running real-time applications Voice, video, interactive distributed applications Voice, video, interactive distributed applications With or without help from fixed infrastructure With or without help from fixed infrastructure If its available use it to be more efficient If its available use it to be more efficient

Wave Relay Test-bed Over 50 Wave Relay Routers deployed across JHU Campus Over 50 Wave Relay Routers deployed across JHU Campus Urban City Environment Urban City Environment Internet Access, Ad hoc Access Points, Voice over IP Internet Access, Ad hoc Access Points, Voice over IP Mobility testing from automobiles Mobility testing from automobiles System tested at Holcim Industrial Plant (Chicago, IL) System tested at Holcim Industrial Plant (Chicago, IL) Complex propagation environment Complex propagation environment Massive multi-path Massive multi-path Enabled real-time industrial process control Enabled real-time industrial process control Currently Deployed Custom Applications Currently Deployed Custom Applications Military Distributed Battlefield Mapping Military Distributed Battlefield Mapping GPS based interactive map GPS based interactive map Eventual reliability Eventual reliability Locality Specific Messaging System Locality Specific Messaging System GPS based messaging system GPS based messaging system Messages targeted to any user at a specific location Messages targeted to any user at a specific location

Wave Relay Device Pulse Protocol [Infocom’04, Milcom’04, WONS’05] Pulse Protocol [Infocom’04, Milcom’04, WONS’05] Scalable ad hoc routing protocol Scalable ad hoc routing protocol Active path tracking Active path tracking Based on Tree Routing strategy Based on Tree Routing strategy Medium Time Metric [MONET,WONS’04] Medium Time Metric [MONET,WONS’04] High Throughput Path Selection High Throughput Path Selection Increased Path Elasticity Increased Path Elasticity Efficient Multi-rate Operation Efficient Multi-rate Operation Leader Election Algorithm Leader Election Algorithm Handles merge, partition, failure Handles merge, partition, failure Embedded Linux Distribution Embedded Linux Distribution Less then 8 MB storage requirement Less then 8 MB storage requirement Linux Kernel Module 2.4 and 2.6 compatibility Linux Kernel Module 2.4 and 2.6 compatibility Operates at layer 2 Operates at layer 2 Distributed virtual switch architecture provides seamless bridging Distributed virtual switch architecture provides seamless bridging Embedded Single Board Computer Embedded Single Board Computer NS Geode SC MHz Processor 64 Mb Ram onboard 2 mini-PCI interfaces 1 Compact flash interface Serial port 10/100 Ethernet Hardware Watchdog Power over Ethernet +7V to +18V DC Input Atheros g/b Wireless Card Atheros g/b Wireless Card 400 mW (26 dBm) output power 16 MB Industrial Compact Flash 16 MB Industrial Compact Flash Stores OS & Wave Relay software Garmin GPS 16 receiver Garmin GPS 16 receiver Li-Ion Battery Pack Li-Ion Battery Pack ~20 hours continuous runtime Industrial NEMA 67 Enclosure Industrial NEMA 67 Enclosure 4 N-type antenna mounts 2 Ethernet Ports (6) protection against dust (7) water submersible Software Hardware

Existing Approaches Source Receivers Destination Multi-path fading & shadowing Rapidly changing channel conditions On-demand protocols have no knowledge of channels conditions A RREQ packet provides only a single sample of a complex distribution On-Demand Protocols (AODV, DSR) Channel is continuously changing Continuous flooding from every node in the network Link State Protocols (OLSR, TBRPF) Urban Channel Environment You can not accurately track channel with control packets!

The Pulse Protocol Proactive Component Proactive Component Tracks minimum amount of information to avoid flooding for route establishment and maintenance Tracks minimum amount of information to avoid flooding for route establishment and maintenance Periodic flood operation (similar to Hello Protocol) Periodic flood operation (similar to Hello Protocol) Rebuilds spanning tree Rebuilds spanning tree Estimates neighbors, density, SNR, loss rates, capabilities, number of radios, MTM metric Estimates neighbors, density, SNR, loss rates, capabilities, number of radios, MTM metric On-Demand Component On-Demand Component Route establishment Route establishment Using only UNICASTS! Using only UNICASTS! Gratuitous mechanism Gratuitous mechanism Neighbors promiscuously monitor packets Neighbors promiscuously monitor packets Metric tracked at the speed of data packets NOT control packets! Metric tracked at the speed of data packets NOT control packets! Path switches as metrics change Path switches as metrics change Local changes in connectivity only generate local traffic Local changes in connectivity only generate local traffic Unlike BOTH on-demand and link state protocols Unlike BOTH on-demand and link state protocols

Ad hoc Nodes

Network Connectivity

Pulse Flood

Spanning Tree

Source and Destination Need to Establish a Path

Pulse Response Sent to Root

Destination Paged on Next Pulse

Destination Sends Pulse Response

Initial Path: Tree Shortcut Tree Shortcut Path 3 Hops Shortest Path 2 Hops This is the initially selected path of the Pulse protocol.

Path Optimization: Gratuitous Reply Optimized Path 2 Hops Shortest Path 2 Hops Node sends gratuitous reply

Proactive Route Maintenance

Pulse Protocol Concepts Aggregation – for scalability Aggregation – for scalability Spanning tree represents a compressed view of the network topology Spanning tree represents a compressed view of the network topology Pro-active component maintains the minimum amount of information to allow efficient route establishment Pro-active component maintains the minimum amount of information to allow efficient route establishment De-Aggregation – for efficiency De-Aggregation – for efficiency The routing metric is tracked at the speed of the data flow The routing metric is tracked at the speed of the data flow Changes to the metric are only reported locally Changes to the metric are only reported locally Routes are continuously adjusted as the metrics change Routes are continuously adjusted as the metrics change High speed accurate route tracking is essentially an on-demand decompression of the topology High speed accurate route tracking is essentially an on-demand decompression of the topology However, it occurs ONLY in areas of the network with active data flows However, it occurs ONLY in areas of the network with active data flows Result: a scalable routing structure which tracks paths at the speed of the data flow Result: a scalable routing structure which tracks paths at the speed of the data flow

Future Work Security (NDSS 2005) Security (NDSS 2005) Wormholes, black-holes, flood rush, replay Wormholes, black-holes, flood rush, replay Provide Provide Node authentication Node authentication End-to-end encryption End-to-end encryption Broadcast/Routing Encryption Broadcast/Routing Encryption Efficient node addition/removal Efficient node addition/removal Distributed commit (CNDS-02) Distributed commit (CNDS-02) Consistent, persistent, group communication Consistent, persistent, group communication e.g. coordinated battlefield view and control e.g. coordinated battlefield view and control Opportunistic Gradient Forwarding Opportunistic Gradient Forwarding

Thank You! Questions?? Wave Relay Ad hoc Networking Test-bed Secure Ad hoc Networking for Industrial Process Control Baruch Awerbuch, David Holmer, Herbert Rubens

Minimum Hop Metric (Traditional Technique) Not designed for multi-rate networks Not designed for multi-rate networks A small number of long slow hops provide the minimum hop path A small number of long slow hops provide the minimum hop path These slow transmissions occupy the medium for long times, blocking adjacent senders These slow transmissions occupy the medium for long times, blocking adjacent senders Selecting nodes on the fringe of the communication range results in reduced reliability Selecting nodes on the fringe of the communication range results in reduced reliability

New Approach: Medium Time Metric (MTM) Assigns a weight to each link proportional to the amount of medium time consumed by transmitting a packet on the link Assigns a weight to each link proportional to the amount of medium time consumed by transmitting a packet on the link Enables the Pulse protocol to discover the path that minimizes total transmission time Enables the Pulse protocol to discover the path that minimizes total transmission time

MTM Example Source Destination 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps Mbps 2.5ms 3.7ms 7.6ms 13.9ms 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps 13.9ms Medium Time Usage 4.55 Mbps 3.17 Mbps 1.54 Mbps 0.85 Mbps Path Throughput Path Medium Time Metric (MTM) = 13.9 ms Link Throughput

MTM Example Source Destination 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps Mbps 0.85 Mbps 2.5ms 3.7ms 7.6ms 13.9ms 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps 7.6ms3.7ms 13.9ms = 11.3 ms Medium Time Usage 4.55 Mbps 3.17 Mbps 1.54 Mbps 0.85 Mbps Path Throughput Path Medium Time Metric (MTM) = 13.9 ms Link Throughput

MTM Example Source Destination 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps Mbps 1.04 Mbps 0.85 Mbps 2.5ms 3.7ms 7.6ms 13.9ms 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps 2.5ms7.6ms 3.7ms 13.9ms = 10.1 ms = 11.3 ms Medium Time Usage 4.55 Mbps 3.17 Mbps 1.54 Mbps 0.85 Mbps Path Throughput Path Medium Time Metric (MTM) = 13.9 ms Link Throughput

MTM Example Source Destination 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps Mbps 1.15 Mbps 1.04 Mbps 0.85 Mbps 2.5ms 3.7ms 7.6ms 13.9ms 11 Mbps 5.5 Mbps 2 Mbps 1 Mbps 2.5ms 7.6ms 3.7ms 13.9ms = 5.0 ms = 10.1 ms = 11.3 ms Medium Time Usage 4.55 Mbps 3.17 Mbps 1.54 Mbps 0.85 Mbps Path Throughput Path Medium Time Metric (MTM) = 13.9 ms Link Throughput

MTM Advantages Paths which minimize network utilization, maximize network capacity Paths which minimize network utilization, maximize network capacity Global optimum under complete interference Global optimum under complete interference Excellent heuristic in even larger networks Excellent heuristic in even larger networks Avoiding low speed links inherently provides increased route stability Avoiding low speed links inherently provides increased route stability High speed links operate with greater margin and are more elastic under changes High speed links operate with greater margin and are more elastic under changes