Carlos Rodrigo Aponte OLSRv2 High Level Overview.

Slides:



Advertisements
Similar presentations
Courtesy: Nick McKeown, Stanford
Advertisements

Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Securing OLSR Using Node Locations Daniele Raffo Cédric Adjih Thomas Clausen Paul Mühlethaler 11 th European Wireless Conference 2005 (EW 2005) April
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Optimized Link State Protocol Version 2 Assaf Israel, Eli Nazarov, Asi Bross Version 2 Assaf Israel, Eli Nazarov, Asi Bross.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Routing 9th Week Christian.
UM-OLSR OLSR routing protocol in NS2
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
Interference-Aware QoS OLSR for Mobile Ad-hoc Network Routing SAWN 2005, May 24 P. Minet & D-Q. Nguyen.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
1 Internet Networking Spring 2006 Tutorial 3 Ad-hoc networks TBRPF (based on IETF tutorials on TBRPF)
Routing Protocol Pertemuan 21 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
Aodv. Distance vector routing Belman principle AODV - overview Similar to DSR –On demand –Route request when needed and route reply when a node knows.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Routing Two papers: Location-Aided Routing (LAR) in mobile ad hoc networks (2000) Ad-hoc On-Demand Distance Vector Routing (1999)
The Zone Routing Protocol (ZRP)
Routing and Routing Protocols Dynamic Routing Overview.
Routing in mobile ad-hoc networks (MANETs). 1. WHAT IS A MANET ? A MANET can be defined as a system of autonomous mobile nodes A MANET can be defined.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
Distance Vector Routing Protocols W.lilakiatsakun.
Dynamic Routing Protocols  Function(s) of Dynamic Routing Protocols: – Dynamically share information between routers (Discover remote networks). – Automatically.
Dsr – dynamics source routing. basics Two types of routing –On-demand / reactive Information is only collected when required, I.e., when a packet needs.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
MANETs & Routing.
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Outline Wireless introduction Wireless cellular (GSM, CDMA, UMTS) Wireless LANs, MAC layer Wireless Ad hoc networks – routing: proactive routing, on-demand.
Qamar A TararOLSR Protocol1 Optimized Link State Routing Protocol for Ad Hoc Networks Qamar Abbas Tarar “Mobile ad-hoc networks based on wireless LAN”
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
The Destination Sequenced Distance Vector (DSDV) protocol
Simulation of the OLSRv2 Protocol First Report Presentation.
H AZY S IGHTED L INK S TATE R OUTING P ROTOCOL Eleonora Borgia Pervasive Computing & Networking Lab. PerLab IIT – CNR MobileMAN.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Spring 2006CS 3321 Intradomain Routing Outline Algorithms Scalability.
Routing and Routing Protocols
Link State Routing David Holmer Generic Link State Routing  Each node monitors neighbors/local links and advertises them to the network.
SRI International 1 Topology Dissemination Based on Reverse-Path Forwarding (TBRPF) Richard Ogier September 21, 2002.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Dynamic Routing Protocols II OSPF
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Using Ant Agents to Combine Reactive and Proactive strategies for Routing in Mobile Ad Hoc Networks Fredrick Ducatelle, Gianni di caro, and Luca Maria.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Spring Routing: Part I Section 4.2 Outline Algorithms Scalability.
CS 6401 Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm.
1 Optimized Link State Routing Protocol for Ad Hoc Networks Jacquet, p IEEE INMIC Dec park gi won
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Chapter 7 Packet-Switching Networks Shortest Path Routing.
1 Relates to Lab 4. This module covers link state routing and the Open Shortest Path First (OSPF) routing protocol. Dynamic Routing Protocols II OSPF.
+ Dynamic Routing Protocols 2 nd semester
Dynamic Routing Protocols II OSPF
Routing Protocols and Concepts
CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks
Intra-Domain Routing Jacob Strauss September 14, 2006.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Intradomain Routing Outline Introduction to Routing
Viet Nguyen Jianqing Liu Yaqin Tang
Advanced Computer Networks
Routing.
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Presentation transcript:

Carlos Rodrigo Aponte OLSRv2 High Level Overview

Overview of OLSR OLSR is a link-state proactive routing protocol with four basic parts: Neighbor Discovery A node estimates its local topology. By local topology, we mean 1- and 2-hop topology Selector of Topology Information to Disseminate Not all links are needed to form shortest paths Advertising a subset of all links reduces total overhead Topology Dissemination Once the link information to be advertised is determined, it must be disseminated over the network Route Calculation Once the link advertisements are received, paths can be computed.

Overview of OLSR OLSR is a link-state proactive routing protocol with four basic parts: Neighbor Discovery A node estimates its local topology. By local topology, we mean 1- and 2-hop topology Selector of Topology Information to Disseminate Not all links are needed to form shortest paths Advertising a subset of all links reduces total overhead Topology Dissemination Once the link information to be advertised is determined, it must be disseminated over the network Route Calculation Once the link advertisements are received, paths can be computed.

Neighborhood Discovery In OLSR, Hello messages are used to estimate the local topology Two tasks Estimation the one-hop neighbors One-hop neighbors are those with bidirectional links Local dissemination of the one-hop topology to estimate the two-hop topology

Task 1: Estimating one-hop neighbors S From the point of view of nodes S and 1 Initially, neither of the nodes know about the topology

S Node S broadcasts a HELLO message. Task 1: Estimating one-hop neighbors (cont)

S Node 1 receives the HELLO message and learns: It can hear S Thus a unidirectional link is discovered by 1 Task 1: Estimating one-hop neighbors (cont)

S Node 8 broadcasts a HELLO message. Task 1: Estimating one-hop neighbors (cont) Source: 8 Dest: Broadcast Info: 8 has heard S

S Node S receives the HELLO message, and learns: It was heard by 8 It can hear 8 Thus node S discovers a bidirectional link to 8 Node 1 receives the HELLO message and learns: It can hear 8 Thus a unidirectional link is discovered by 1 Task 1: Estimating one-hop neighbors (cont) Source: 8 Dest: Broadcast Info: 8 has heard S

S Node 1 broadcasts a HELLO message. Task 1: Estimating one-hop neighbors (cont) Source: 1 Dest: Broadcast Info: 1 has heard S and 8

S Node S receives the HELLO message, and learns: It was heard by 1 It can hear 1 Thus node S discovers a bidirectional link to 1 Node 8 receives the HELLO message and learns: It was heard by 1 It can hear 1 Thus node 8 discovers a bidirectional link to 1 Task 1: Estimating one-hop neighbors (cont) Source: 1 Dest: Broadcast Info: 1 has heard S and 8

S Node 18 broadcasts a HELLO message. Task 1: Estimating one-hop neighbors (cont) Source: 18 Dest: Broadcast Info: 18 has heard 1 and 8

S Node 1 receives the HELLO message, and learns: It was heard by 18 It can hear 18 Thus node 1 discovers a bidirectional link to 18 Node 8 receives the HELLO message and learns: It was heard by 18 It can hear 18 Thus node 8 discovers a bidirectional link to 18 Task 1: Estimating one-hop neighbors (cont) Source: 18 Dest: Broadcast Info: 18 has heard 1 and 8

S After a while, nodes 1 and S discover their entire 1-hop topology Task 1: Estimating one-hop neighbors (cont)

S Node 1 broadcasts a HELLO message, including information about its neighbors. Task 2: Estimating 2-hop Topology Source: 1 Dest: Broadcast Info: Neighbors: S,8,18,19

S Node S receives the HELLO message, and learns: All 1-hop neighbors of node 1 Part of its 2-hop topology Task 2: Estimating 2-hop Topology (cont) Source: 1 Dest: Broadcast Info: Neighbors: S,8,18,19

S Node S broadcasts a HELLO message, including information about its neighbors. Task 2: Estimating 2-hop Topology (cont) Source: S Dest: Broadcast Info: Neighbors: 1,2,3,4,5,6,7,8

S Node 1 receives the HELLO message, and learns: All 1-hop neighbors of node S Part of its 2-hop topology 11 Task 2: Estimating 2-hop Topology (cont) Source: S Dest: Broadcast Info: Neighbors: 1,2,3,4,5,6,7,8

S Eventually, nodes 1 and S will discover their entire 2-hop neighborhood Task 2: Estimating 2-hop Topology (cont)

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Node 1 received HELLO message from S #RCVD_HELLO=1 #RCVD_HELLO<U =>unheardNode Source: S Dest: Broadcast Info: Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Source: 1 Dest: Broadcast Info: Node S received HELLO message from 1 #RCVD_HELLO=1 #RCVD_HELLO<U =>unheardNode Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Source: S Dest: Broadcast Info: Node 1 received HELLO message from S #RCVD_HELLO=2 #RCVD_HELLO<U =>unheardNode Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Source: 1 Dest: Broadcast Info: Node S received HELLO message from 1 #RCVD_HELLO=2 #RCVD_HELLO<U =>unheardNode Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Node 1 received HELLO message from S #RCVD_HELLO= #RCVD_HELLO<U =>unheardNode 3 3 Node S received HELLO message from 1 #RCVD_HELLO= #RCVD_HELLO<U =>unheardNode 3 3 Source: S Dest: Broadcast Info: 4 4 Source: 1 Dest: Broadcast Info: U-1 Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Source: S Dest: Broadcast Info: Node 1 received HELLO message from S #RCVD_HELLO= #RCVD_HELLO=U =>AsymmetricLink U U Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Source: 1 Dest: Broadcast Info: AsymmetricLink with S Node S received HELLO message from 1 #RCVD_HELLO= #RCVD_HELLO=U =>SymmetricLink U U Detecting bidirectional links

S In order to consider a link “symmetric”, a node has to receive U HELLOs from the neighbor. In OLSR, U=1. Source: S Dest: Broadcast Info: SymmetricLink with 1 Node 1 received HELLO message from S #RCVD_HELLO= #RCVD_HELLO>U =>SymmetricLink U+1 Detecting bidirectional links

S In order to consider a link “lost”, a node has to lose D HELLOs from the neighbor. In OLSR, D=3. 1 Node 1 received HELLO message from S #RCVD_HELLO= #RCVD_HELLO=U =>SymmetricLink U U Detecting bidirectional links

S In order to consider a link “lost”, a node has to lose D HELLOs from the neighbor. In OLSR, D=3. Node 1 detected lost HELLO messages from S #LOST_HELLO= #LOST_HELLO<D =>SymmetricLink Source: S Dest: Broadcast Info: SymmetricLink with … … D-1 D D Node 1 detected lost HELLO messages from S #LOST_HELLO= #LOST_HELLO=D =>LostLink Detecting bidirectional links

Event Counting (Generalization of RFC) When link is down Parameters: U, D When link is up U D Hello arrival CkCk Hellos Transmission Probability Hellos Number of Sequential Success/Failures OLSR v1: U=1 D=3. Generalized by UMD

Exponential Moving Average w/ Hysteresis (RFC) When link is down Q k+1 =  Q k + (1-  ) 1 {Received Hello k} Q k >T Up  link is up When link is up Q k+1 =  Q k + (1-  ) 1 {Received Hello k} Q k >T Down  link is down Parameters: , T up, T down

Cumulative Sum (CumSum) Link Detection Perr Up Perr Down T Hello received When link is down S k+1 = max(0, S k - 1 {Missed Hello} + P Up ) S k >T  link is up When link is up S k+1 = max(0, S k +1 {Missed Hello} - P Down ) S k > T  link is down Parameters: P up, P down, T

Overview of OLSR OLSR is a link-state proactive routing protocol with four basic parts: Neighbor Discovery A node estimates its local topology. By local topology, we mean 1- and 2-hop topology Selector of Topology Information to Disseminate Not all links are needed to form shortest paths Advertising a subset of all links reduces total overhead Topology Dissemination Once the link information to be advertised is determined, it must be disseminated over the network Route Calculation Once the link advertisements are received, paths can be computed. OLSR merges selector of Topology Information to Disseminate with Topology Dissemination. But in CBR, these are two different components

Topology Dissemination In order to limit control traffic, only a subset of nodes (Multi-Point Relays: MPRs) forwards control packets Two tasks Determine the set of MPRs MPR Selection Objective: determine a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message Flood TC messages over the reduced graph

Topology Dissemination In order to limit control traffic, only a subset of nodes (Multi-Point Relays: MPRs) forwards control packets Two tasks Determine the set of MPRs MPR Selection Objective: determine a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message Flood TC messages over the reduced graph

Why use MPRs? In traditional flooding, each node relays the messages. This approach typically results in each node receiving the message many times (i.e, it wastes bandwidth/ creates excess overhead) Retransmission node

Why use MPRs? By carefully selecting which nodes forward messages, the overhead can be reduced. This is the objective of MPR-based flooding (note there are many other ways to accomplish this goal ) In traditional flooding, each node relays the messages. This approach typically results in each node receiving the message many times (i.e, it wastes bandwidth/ creates excess overhead) Retransmission node

Topology Dissemination In order to limit control traffic, only a subset of nodes (Multi-Point Relays: MPRs) forwards control packets Two tasks Determine the set of MPRs MPR Selection Objective: determine a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message Flood TC messages over the reduced graph

Topology Dissemination In order to limit control traffic, only a subset of nodes (Multi-Point Relays: MPRs) forwards control packets Two tasks Determine the set of MPRs MPR Selection Objective: determine a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message Flood TC messages over the reduced graph

Task 1:MPR selection algorithm : example S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message 1. Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

S Determine all 2-hop neighbors which are only reachable through just one 1-hop neighbor 2. Select those 1-hop neighbors as MPRs 3. Determine C = reachable 2- hop nodes through the current set of MPRs. 4. Let U = 2-hop neighbors which are not reachable through the MPRs. 5. If U= , then done Else Add the 1-hop node that has the highest number of neighbors in U to the set of MPRs Go to step 3 From the perspective of node S Task 1:MPR selection algorithm: example (cont) MPR Selection Objective: each nodes determines a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message

Local Topology Information is Required to Make Routes MPRs advertise links to MPR selectors is a MPR for 0 Legend: 01 Original Graph If only MPR  MPR Selectors are used, then 7 could not reach 16 in one hop.

Overview of OLSR OLSR is a link-state proactive routing protocol with four basic parts: Neighbor Discovery A node estimates its local topology. By local topology, we mean 1- and 2-hop topology Selector of Topology Information to Disseminate Not all links are needed to form shortest paths Advertising a subset of all links reduces total overhead Topology Dissemination Once the link information to be advertised is determined, it must be disseminated over the network Route Calculation Once the link advertisements are received, paths can be computed. OLSR merges selector of Topology Information to Disseminate with Topology Dissemination. But in CBR, these are two different components

Selection of Topology Information to Disseminate SD C A H F E G B Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D AS,HB,C,DSS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G HELLO MessageTC Message

Are Paths Composed of Advertised Links the Shortest Paths? Yes, they are. Suppose that D is N hops from S But, S is not aware of a N-hop path to D. However, S is aware of N-1-hops paths to some of D’s neighbors, C 1, C 2, … This means that there are neighbors of C’s, denoted by B1, B2, … that are N-2 hops from the C1, C2, … Since S can’t reach D in N hops, but can reach C 1, C 2, … in N-1 hops, the links from C 1, C 2, … to D are not advertised Thus, C 1, C 2, … are not MPRs of D This is cannot happen, one of the C i must be a MPR for D. Otherwise, how will the two-hop neighbors (B 1, B 2, … ) be covered? Therefore, if there are shortest paths to all nodes N-2 and N-1 hops away, then there are shortest paths to nodes N hops away. Clearly, there are shortest paths to nodes 1 hop away and to nodes 2 hops away (the set of MPRs guarantee this). So there are shortest paths to nodes 3 hops away, and therefore, there are shortest paths to node 4 hops away, …. D C1 S B1 C2 B2 N-2 N-1 Length >N

Topology Dissemination In order to limit control traffic, only a subset of nodes (Multi-Point Relays: MPRs) forwards control packets Two tasks Determine the set of MPRs MPR Selection Objective: determine a minimal set of neighbors such that if each neighbor relays the message then each node in the two-hop neighborhood receives the message Flood TC messages over the reduced graph

Task 2: Topology Dissemination SD C A H F E G B Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information RFC and INRIAs approach

Task 2: Topology Dissemination Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information RFC and INRIAs approach SD C A H F E G B Node S Broadcasts a TC Message

Task 2: Topology Dissemination Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information RFC and INRIAs approach SD C A H F E G B Only nodes that have not previously received the message will update the Information Base

Task 2: Topology Dissemination Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information RFC and INRIAs approach Only nodes that have not previously received the message and that have the transmitter as an MPR Selector, will forward the message Nodes that have S as an MPR Selector SD C A H F E G B

Task 2: Topology Dissemination Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information OLSR-D and Qualnets approach SD C A H F E G B Node S Broadcasts a TC Message

Task 2: Topology Dissemination Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information OLSR-D and Qualnets approach SD C A H F E G B Only nodes that have not previously processed the message will update the information base

Task 2: Topology Dissemination Originator Node 1-hop Neighbors 2-hop Neighbors MPRs MPR Selectors Links Advertised by TC Message SA,B,C,DE,F,G,HA,CA,B,C,D ACS,G,ESS,H BS,GA,C,DS  No TC message generated CS,E,F,GA,B,DSS,E,F,G Topology dissemination = deciding which nodes relay the topology information OLSR-D and Qualnets approach Only nodes that have not already forwarded the message and that have the transmitter as an MPR Selector, will forward the message SD C A H F E G B Nodes that have S as an MPR Selector

Comparison of Flooding Techniques Sample Topology

Comparison of Flooding Techniques MPRs 4 is the only MPR for 0 (0 had degree 5, but only one MPR!) 6 and 9 are MPRs for 4 1 is the MPR for 3 (2 is an MPR for 5)

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 have received the TC message

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 have received the TC message 4 is a MPR for 0

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 have received the TC message 4 is a MPR for 0 6, 7, 8, and 9 have received the TC message

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 have received the TC message 4 is a MPR for 0 6, 7, 8, and 9 have received the TC message 6 and 9 are MPRs for 4

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 have received the TC message 4 is a MPR for 0 6, 7, 8, and 9 have received the TC message 6 and 9 are MPRs for 4 All nodes have received the TC message

RFC/INRIA Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 have received the TC message 4 is a MPR for 0 6, 7, 8, and 9 have received the TC message 6 and 9 are MPRs for 4 All nodes have received the TC message Note, while 3 is a MPR for 6, it has already received the TC message, and does not forward it

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0 4 is the MPR or 0

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0 4 is the MPR or 0 6, 7, 8, and 9 received the TC message from 6

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0 4 is the MPR or 0 6, 7, 8, and 9 received the TC message from 6 6 and 9 are MPRs of 4

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0 4 is the MPR or 0 6, 7, 8, and 9 received the TC message from 6 6 and 9 are MPRs of 4 All nodes have received the TC message

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0 4 is the MPR or 0 6, 7, 8, and 9 received the TC message from 6 6 and 9 are MPRs of 4 All nodes have received the TC message 3 is a MPR for 6 (5 is a MPR for 9)

OLSRd/Qualnet Method Originator of TC message Received TC message Relayed TC message 0 is the originator 1, 2, 3, 4, and 5 received TC message from 0 4 is the MPR or 0 6, 7, 8, and 9 received the TC message from 6 6 and 9 are MPRs of 4 All nodes have received the TC message 3 is a MPR for 6 (5 is a MPR for 9) 1 is a MPR for 3 (2 is a MPR for 5) What is the difference between MPR- based flooding and full flooding?!

Hazy-Sighted Topology Dissemination Note: hazy sighted dissemination does not work. But the idea is as follows Idea: Topology information from far away links is not important for making local forwarding decisions When forwarding a packet, one only needs to move the packet in the right direction. This does not require detailed topology information Idea (which turns out to be incorrect) potential next-hop The potential next hop is a next hop for any destination in this region pkt This node does not need to travel very far in order to exit the “next-hop region” This node must travel further in order to exit the “next-hop region” More up-to-date information is required to reach destinations that are close than to reach destinations that are far. Conclusion, topology information should not be flooded over the entire region. This seems like such a good idea that many military systems are using this approach

Hazy-Sighted Topology Dissemination Set TTL for the number of hops that a topology control (TC) message will travel. Adjust the TTL for each TC message so that the TTL  2 k every 2 k periods TTL  1 every period TTL  2 every 2 periods (i.e., periods 2, 4, 6, …) TTL  4 every 4 periods (i.e., period 4, 8, 12, 16, …) TTL  8 every 8 periods (i.e., period 8, 16, 24, 32, …) TTL  16 every 16 periods (i.e., period 16, 32, …) The time between TC messages from a distance k is 2 ceil(log2(k)) Topology information 7 hops away will be received every 2 ceil(log2(7)) = 2 ceil(2.8) = 2 3 = 8 periods This approach could potentially reduce the overhead, especially for large topologies Note that each TC message is forwarded by most nodes. For large networks, topology dissemination can consume much of the available bandwidth periodTTL

Problems with Hazy-Sighted The basic idea has the critical flaw in that the path to a destination does not only depend on the location of the destination, but also depends on the other nodes in the network. Thus, a path can be impacted not only by the destination moving, but by nodes between the source and destination moving I guess this is obvious A correct model considers all links potential next-hop pkt This node does not need to travel very far in order to exit the “next-hop region” This node must travel further in order to exit the “next-hop region”

Change in topology that causes neighbor to stop being a next-hop Duration that the originator is unaware of the topology change and forwards the pkt to a node that is no longer a suitable next hop. T(k L ) = average duration The fraction of the number line covered by the PS region is approximately the rate of topology changes  the average duration, T (another approximation is exp(-rate*T) ) Performance of Hazy-Sighted Dissemination

Let be the rate that a link breaks (or form). Let NL(k L,k D ) be the number of links k L away given the destination is k D hops away Why does the number of links k L away depend on k D ? Suppose that a destination is very far away, like 100 hops. Then, NL(90,100)>1 (otherwise, the dest can’t be 100 hops away). So, given a destination is k D hops away, the rate that any link breaks k L hops away is NL(k L, k D ). Here we assume that is independent of k L and k D Let F(k L,k D ) be the probility of PS when the break is at k L and the destinations is k D hops away NL(k L,k D )F(k L,k D ) is the rate of PS events from links k L away, given that the destination is k D away Summing over all values of k L Expected value over all distances to destinations

Path Stretch Calculation In the hazy-sighted case, T(k L ) = T hs  2 ceil(log2(kL)) In regular case, T(k L ) = T o By adjusting T HS and T o we can make the path stretch the same for both cases so

Overhead

Overhead Ratio Conclusion: In order to keep path stretch the same as with regular flooding, hazy- sighted results in higher overhead. One must focus on the intermediate nodes, not just the destination.

Overview of OLSR OLSR is a link-state proactive routing protocol with four basic parts: Neighbor Discovery A node estimates its local topology. By local topology, we mean 1- and 2-hop topology Selector of Topology Information to Disseminate Not all links are needed to form shortest paths Advertising a subset of all links reduces total overhead Topology Dissemination Once the link information to be advertised is determined, it must be disseminated over the network Route Calculation Once the link advertisements are received, paths can be computed.

Update Topology Set Check all “advertised addresses” that came in the message. These addresses are from the nodes that selected the “originator node” as an MPR.

Update Topology Set (cont) Check all Topology Tuples in the Information Bases and verify if it exists an entry with the information just received.

Update Topology Set (cont) If no information is stored in the Data Bases, create a new tuple. Existing or new tuple has to update its sequence number and holding time.

Removing Topology Tuples To remove a Topology Tuple on of two things must occur: The timer (tuple holding time) has to expire. A TC message has to explicitly remove a tuple. (i.e. notify that a link is broken)