Presented by Fei Huang Virginia Tech April 4, 2007.

Slides:



Advertisements
Similar presentations
Low Overhead With Speed Aware Routing (LOWSAR) in VANETs By Kannikar Siriwong Na Ayutaya.
Advertisements

Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advisor : Prof. Yu-Chee Tseng Student : Yi-Chen Lu 12009/06/26.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
EPIDEMIC DENSITY ADAPTIVE DATA DISSEMINATION EXPLOITING OPPOSITE LANE IN VANETS Irem Nizamoglu Computer Science & Engineering.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Topic: Routing and Aggregation An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks (Li,Peng,Chu-
Performance Improvement of TCP in Wireless Cellular Network Based on Acknowledgement Control Osaka University Masahiro Miyoshi, Masashi Sugano, Masayuki.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1/14 Ad Hoc Networking, Eli M. Gafni and Dimitri P. Bertsekas Distributed Algorithm for Generating Loop-free Routes in Networks With Frequently.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Distributed Priority Scheduling and Medium Access in Ad Hoc Networks Vikram Kanodia.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Hidden Terminal based Attack, Diagnosis and Detection Yao Zhao, Leo Zhao, Yan Chen Lab for Internet & Security Tech, Northwestern Univ.
Layered Diffusion based Coverage Control in Wireless Sensor Networks Wang, Bang; Fu, Cheng; Lim, Hock Beng; Local Computer Networks, LCN nd.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Copyright: UC Riverside Alleviating the effects of mobility on TCP Performance Signal Strength based Link Management Fabius Klemm *, Srikanth Krishnamurthy.
Reliable Transport Layers in Wireless Networks Mark Perillo Electrical and Computer Engineering.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
1 A Comparison of Mechanisms for Improving TCP Performance over Wireless Links Course : CS898T Instructor : Dr.Chang - Swapna Sunkara.
A Scalable Approach for Reliable Downstream Data Delivery in Wireless Sensor Networks Seung-Jong Park, Ramanuja Vedantham, Raghupathy Sivakumar and Lan.
Efficient and Reliable Broadcast in ZigBee Networks Purdue University, Mitsubishi Electric Lab. To appear in SECON 2005.
CIS 725 Wireless networks. Low bandwidth High error rates.
Ming-Yu Jiang and Wanjiun Liao,IEEE ICC 2002 Family ACK Tree (FAT): A New Reliable Multicast Protocol for Mobile Ad Hoc Networks. Speaker : Wilson Lai.
RTS/CTS-Induced Congestion in Ad Hoc Wireless LANs Saikat Ray, Jeffrey B. Carruthers, and David Starobinski Department of Electrical and Computer Engineering.
Tree-Based Double-Covered Broadcast for Wireless Ad Hoc Networks Weisheng Si, Roksana Boreli Anirban Mahanti, Albert Zomaya.
Performance Evaluation and Improvement of an Ad Hoc Wireless Network Takayuki Yamamoto Graduate School of Engineering Science, Osaka University, Japan.
SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks Authors: Eric Rozner, Jayesh Seshadri, Yogita Ashok Mehta, Lili Qiu Published:
POSTER TEMPLATE BY: Efficient Counter-Based Flooding for Mobile Ad Hoc Networks S. Al-Humoud, M. Ould Khaoua and L. M. Mackenzie.
A Cooperative Diversity- Based Robust MAC Protocol in wireless Ad Hoc Networks Sangman Moh, Chansu Yu Chosun University, Cleveland State University Korea,
Mobile Routing protocols MANET
Department of Computer Science
TCP PERFORMANCE OVER AD HOC NETWORKS Presented by Vishwanee Raghoonundun Assisted by Maheshwarnath Behary MSc Computer Networks Middlesex University.
Wireless Sensor Networks COE 499 Energy Aware Routing
Tonghong Li, Yuanzhen Li, and Jianxin Liao Department of Computer Science Technical University of Madrid, Spain Beijing University of Posts & Telecommunications.
A Cluster-Based Backbone infrastructure for broadcasting in MANETs Student: Pei-Yue Kuo
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
ODMRP (On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks ) Sung-Ju Lee William Su Mario Gerla Presented By: Meenakshi Bangad.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
FAR: Face-Aware Routing for Mobicast in Large-Scale Sensor Networks QINGFENG HUANG Palo Alto Research Center (PARC) Inc. and SANGEETA BHATTACHARYA, CHENYANG.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
A High-Throughput Path Metric for Multi- Hop Wireless Routing Douglas S. J. De Couto, Daniel Aguayo, John Bicket, Robert Morris MIT Computer Science and.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Chapter 24 Transport Control Protocol (TCP) Layer 4 protocol Responsible for reliable end-to-end transmission Provides illusion of reliable network to.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
BROADCASTING TECHNIQUES IN AD-HOC NETWORKS A survey on Shubham Bhat Surendra Shenoy References: 1.“
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
TCP OVER ADHOC NETWORK. TCP Basics TCP (Transmission Control Protocol) was designed to provide reliable end-to-end delivery of data over unreliable networks.
Self-stabilizing energy-efficient multicast for MANETs.
On Mitigating the Broadcast Storm Problem with Directional Antennas Sheng-Shih Wang July 14, 2003 Chunyu Hu, Yifei Hong, and Jennifer Hou Dept. of Electrical.
RBP: Robust Broadcast Propagation in Wireless Networks Fred Stann, John Heidemann, Rajesh Shroff, Muhammad Zaki Murtaza USC/ISI In SenSys 2006.
Mobility Increases the Connectivity of K-hop Clustered Wireless Networks Qingsi Wang, Xinbing Wang and Xiaojun Lin.
An efficient reliable broadcasting protocol for wireless mobile ad hoc networks Chih-Shun Hsu, Yu-Chee Tseng, Jang-Ping Sheu Ad Hoc Networks 2007, vol.
1 Ad-hoc Transport Layer Protocol (ATCP) EECS 4215.
GeoTORA: A Protocol for Geocasting in Mobile Ad Hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Ad-hoc Transport Layer Protocol (ATCP)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
TCP in Wireless Ad-hoc Networks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Presentation transcript:

Presented by Fei Huang Virginia Tech April 4, 2007

Original Paper W. Lou and J. Wu, “Toward broadcast reliability in mobile ad hoc networks with double coverage,” IEEE Transactions on Mobile Computing, Vol. 6, No. 2, Feb. 2007, pp It makes use of broadcast redundancy to improve the delivery ratio in an environment with high transmission error rate.

Outline Background Preliminaries Double-covered Broadcast Algorithm Probability Analysis Performance Conclusions

Background Mobile ad hoc networks (MANETs) enable wireless communications between participating mobile nodes without the assistance of any base station. A B Communications A -> B C D E F G H

Background Mobile ad hoc networks (MANETs) enable wireless communications between participating mobile nodes without the assistance of any base station. A B Characteristics ad hoc C D E F G H

Background Mobile ad hoc networks (MANETs) enable wireless communications between participating mobile nodes without the assistance of any base station. A B Characteristics ad hoc overhearing C D E F G H

Background Exposed Terminal Problem: an outgoing transmission collides with an incoming transmission A B Communications A -> E & E -> F C D E F G H

Background Hidden Terminal Problem: two incoming transmissions collide with each other A B Communications A -> D & F->D C D E F G H

Background Blind Flooding: every node forwards the packet once and only once A B C D E F G H

Background Blind Flooding: every node forwards the packet once and only once A B Cons broadcast storm problem C D E F G H

Background MANETs suffers from a high transmission error rate because of the high transmission contention and congestion in broadcast A B C D E F G H

Background Solution: select a subset of nodes to forward the broadcast message without sacrificing the broadcast performance How? This paper proposed a double-covered broadcast algorithm.

Preliminaries MANET can be described by graph G=(V,E) V : nodes A B C D E F G

Preliminaries MANET can be described by graph G=(V,E) V : nodes, E: bidirectional links between nodes. A B C D E F G

Preliminaries Two nodes are neighbors only when their distance is less than transmission range. A C

Preliminaries N k (v): the k-hop neighbor set of node v which includes all nodes within k hops from v (and also includes v itself). H k (v): the k-hop node set of v which includes all nodes that are exactly k hops away from v.

Double-covered Broadcast (DCB) Algorithm Basic Idea: When a sender broadcasts a packet, it selects a subset of 1-hop neighbors as its forwarding nodes to forward the packet based on a greedy approach. Such selected neighbors should satisfy two requirements: 1) they cover all the sender’s 2-hop neighbors 2) the sender’s 1-hop neighbors are either forwarding nodes or non-forwarding nodes covered by at least two forwarding nodes

Double-covered Broadcast (DCB) Algorithm A B C D E F G 1 –hop neighbors 2 –hop neighbors Forwarding nodes C, D, EF, GC,E H

Double-covered Broadcast (DCB) Algorithm A B C D E F G 1 –hop neighbors 2 –hop neighbors Forwarding nodes C, D, EF, GC,E H 1) C, E cover F,G

Double-covered Broadcast (DCB) Algorithm A B C D E F G 1 –hop neighbors 2 –hop neighbors Forwarding nodes C, D, EF, GC,E H 1)C, E covers F,G 2)D is covered twice by A and E.

Double-covered Broadcast (DCB) Algorithm After receiving a new broadcast packet, each forwarding node records the packet, computes its forwarding nodes, and rebroadcasts the packet as a new sender. A B C D E F H

Double-covered Broadcast (DCB) Algorithm The retransmissions of the forwarding nodes are overheard by the sender as the acknowledgement of the reception of the packet. The nonforwarding 1-hop neighbors of the sender do not acknowledge the receipt of the broadcast. A B C D E F H

Double-covered Broadcast (DCB) Algorithm If the sender fails to detect all its forwarding nodes retransmitting during a predetermined time, it assumes that a transmission failure has occurred for this broadcast. The sender then resends the packet until all the forwarding nodes’ retransmissions are detected or the maximum number of retries is reached. When the forwarding node receives a duplicated broadcast packet, it sends an ACK to acknowledge the sender. A B C D E F H A’s Timer 3

Double-covered Broadcast (DCB) Algorithm If the sender fails to detect all its forwarding nodes retransmitting during a predetermined time, it assumes that a transmission failure has occurred for this broadcast. The sender then resends the packet until all the forwarding nodes’ retransmissions are detected or the maximum number of retries is reached. When the forwarding node receives a duplicated broadcast packet, it sends an ACK to acknowledge the sender. A B C D E F H A’s Timer 2

Double-covered Broadcast (DCB) Algorithm If the sender fails to detect all its forwarding nodes retransmitting during a predetermined time, it assumes that a transmission failure has occurred for this broadcast. The sender then resends the packet until all the forwarding nodes’ retransmissions are detected or the maximum number of retries is reached. When the forwarding node receives a duplicated broadcast packet, it sends an ACK to acknowledge the sender. A B C D E F H A’s Timer 1

Double-covered Broadcast (DCB) Algorithm If the sender fails to detect all its forwarding nodes retransmitting during a predetermined time, it assumes that a transmission failure has occurred for this broadcast. The sender then resends the packet until all the forwarding nodes’ retransmissions are detected or the maximum number of retries is reached. When the forwarding node receives a duplicated broadcast packet, it sends an ACK to acknowledge the sender. A B C D E F H A’s Timer 0

Double-covered Broadcast (DCB) Algorithm If the sender fails to detect all its forwarding nodes retransmitting during a predetermined time, it assumes that a transmission failure has occurred for this broadcast. The sender then resends the packet until all the forwarding nodes’ retransmissions are detected or the maximum number of retries is reached. When the forwarding node receives a duplicated broadcast packet, it sends an ACK to acknowledge the sender. A B C D E F H A’s Timer 0 ACK

Double-covered Broadcast (DCB) Algorithm If the sender fails to detect all its forwarding nodes retransmitting during a predetermined time, it assumes that a transmission failure has occurred for this broadcast. The sender then resends the packet until all the forwarding nodes’ retransmissions are detected or the maximum number of retries is reached. When the forwarding node receives a duplicated broadcast packet, it sends an ACK to acknowledge the sender. A B C D E F H A’s Timer 0 New forwarding nodes C, D

Double-covered Broadcast (DCB) Algorithm Pros: 1) The scheme avoids the broadcast storm problem 2) The scheme avoids the ACK implosion problem

Basic Algorithm Forwarding Node Set Selection Process (FNSSP) where X is all the candidate neighbors, U represents the uncovered 2-hop neighbors, and F is the set of forwarding nodes.

DCB Forwarding Node Selection Forwarding Node Set Selection Process – Double Coverage (FNSSP-DC): 1. Each node v computes X=H(v) and U=N2(v)-{v}. 2. Node v uses the FNSSP to find F(v) in X to cover U.

DCB Forwarding Node Selection Forwarding Node Set Selection Process – Enhanced Double Coverage (FNSSP-EDC): 1. Each node v computes X=H(v)-N(u) and U=N2(v)-N(u)-N(F(u)-{v}). 2. Node v uses the FNSSP to find F(v) in X to cover U.

DCB Both FNSSP-DC and FNSSP-EDC algorithms provide a set of forwarding nodes that cover all the nodes within a 2-hop neighbor set and doubly cover the nonforwarding nodes within a 1-hop neighbor set.

FNSSP-EDC N(2)={1,2,3,5,6} and N2(2)={1,2,3,4,5,6,7} (a) node 2 selects forwarding nodes {1,3,5} (b) node 5 selects forwarding nodes {2,4,6}. So node 2’s uncovered 2-hop neighbor set is N2(2)-N(5)-N({4,6})={3}. Node 2 then selects {3}.

DCB Reliability Issues 1) Nonforwarding nodes: two chances to hear the message 2) Forwarding nodes: transmission error may propagate Two Reasons for Packet Loss 1) High transmission error 2) Out-of-range movement

DCB Network with Asymmetric Links v will send ACK to u via w. C D A

Probability Analysis The probability P f (R) of a successful reception for a 1- hop forwarding node f can be carried out by where Q is the probability of a failed transmission, R is the number of retransmission attempts. f u

Probability Analysis The probability P v (R=1) of a successful reception for 1- hop nonforwarding node with a set of forwarding nodes {f1,f2,..f K -1} can be carried out by where P=1-Q is the probability of a successful transmission, K is the number of forwarding nodes. v u f1 f2 f K -1 :

Probability Analysis Generally, the probability P v (R) of a successful reception for 1-hop nonforwarding node with a set of forwarding nodes {f1,f2,..f K -1} can be carried out by where X represents the number of retransmissions for u to successfully deliver a packet and Y=1 when v receives the packet; otherwise Y=0. v u f1 f2 f K -1 :

Probability Analysis v u f1 f2 f K -1 :

Probability Analysis v u f1 f2 f K -1 : From the above, we can derive that

Probability Analysis v u f1 f2 f K -1 : Also, we can have

Probability Analysis v u f1 f2 f K -1 : Combing the above, we have

Performance Analysis Performance is simulated in ns-2. Metrics: 1)Broadcast delivery ratio. 2)Broadcast forwarding ratio. 3)Broadcast overhead. 4)Broadcast end-to-end delay.

Broadcast delivery ratio

Broadcast forwarding ratio

Broadcast overhead

Broadcast end-to-end delay

Conclusions This is a simple broadcast algorithm with satisfactory result. It is reported that the DCB is sensitive to node’s mobility. The performances is good and have a high delivery ratio. KEY: (1)Only a subset of nodes are selected as forwarding nodes. (2) Double coverage of forwarding selection process increases the reliability. DCB mainly increases the reliability of forwarding nodes but not for nonforwarding nodes.