1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

Unicast Routing Protocols for Ad Hoc Networks Kumar Viswanath CMPE 293.
1 Chapter 04 Routing in Ad Hoc Networks Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
1 MANETs and Dynamic Source Routing Protocol Dr. R. B. Patel.
Mobile Routing protocols MANET Lecture: 4. DIALOGUE CONTROL In any communication there are two types of user dialogues. –long session-oriented transactions.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Multicasting in Mobile Ad-Hoc Networks (MANET)
Advanced Topics in Next-Generation Wireless Networks
Mobile Ad-Hoc Networks (MANET)
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Winter CMPE 155 Week 9. Winter Project 8 Setting up wireless ad hoc network. Designing/implementing application- level neighbor discovery.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Mobile Ad Hoc Networks (MANET). 2 Mobile Ad Hoc Networks  Formed by wireless hosts which may be mobile  Without (necessarily) using a pre-existing.
Comparison of Routing Metrics for Static Multi-Hop Wireless Networks Richard Draves, Jitendra Padhye and Brian Zill Microsoft Research Presented by Hoang.
Computer Networks: Wireless Networks Ivan Marsic Rutgers University Chapter 6 – Wireless Networks.
Ad Hoc Wireless Routing COS 461: Computer Networks
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
BLACK HOLE IN MANET SUBMITTED TO:--SUBMITTED BY:-- Dr. SAPNA GAMBHIRINDRAJEET KUMAR CSE DEPTT.MNW/887/2K11.
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Material in this slide set are from a tutorial by Prof. Nitin Vaidya 1.
CIS 725 Wireless networks. Low bandwidth High error rates.
Chapter: 05-Mobile Computing
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
1 Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson and David A. Maltz published in the book “Mobile Computing” 1996.
Wireless & Mobile Networking CS 752/852 - Spring 2011 Tamer Nadeem Dept. of Computer Science Ad Hoc Routing Layer - I.
1 Mobile Ad Hoc Networks for CSC 453 Sp 2011 From a tutorial by Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Routing in Mobile Ad Hoc Networks (from Ad Hoc Networking by Charles Perkins) Thanks to Prof. Yu at Cleveland State Univ.
Asstt. Professor Adeel Akram. Infrastructure vs. multi-hop Infrastructure networks: One or several Access-Points (AP) connected to the wired network.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
1 Wireless Networking Primer (few topics that may help in understanding other lectures) Nitin Vaidya University of Illinois at Urbana-Champaign.
Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay
Paper Reviews Written reviews for each paper to be discussed in class are due by noon on Fridays of the previous week The soft copy of the reviews should.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Ασύρματα Δίκτυα και Κινητές Επικοινωνίες Ενότητα # 13: Δρομολόγηση σε Κινητά Αδόμητα Δίκτυα (Mobile Ad Hoc Networks) Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
Dynamic Source Routing in Ad Hoc Wireless Networks
1 Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
Routing in Mobile Ad Hoc Network (MANET)
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Mobile Computing CSE 40814/60814 Spring 2017.
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Sensor Network Routing
CHARACTERISTICS.
Wireless and Mobile Ad Hoc Networks
Slides courtesy of Nitin Texas A&M
IEEE Terminology - STA (Station)
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Internet-of-Things (IoT)
Nitin Vaidya University of Illinois at Urbana-Champaign
Mobile and Wireless Networking
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
CSCI {4,6}900: Ubiquitous Computing
Mobile Ad-hoc Networks (MANET)
Folien aus: Mobile Ad Hoc Networks: Routing, MAC and Transport Issues
Overview: Chapter 3 Networking sensors
Advance Topics in Networking
Vinay Singh Graduate school of Software Dongseo University
Computer Networks: Wireless Networks
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -

2 Mobile IP

3 Stationary vs. Mobile Current Internet protocol suite assumes end-systems are stationary In end-to-end connection, if one end moves, the network session breaks, so does all the networking services layered on top of IP Solution? Option 1: completely redesign each layer of the protocol suite Option 2: provide additional services at the network layer in a backward compatible manner – mobile internetworking

4 “ Mobility is essentially an address translation problem and is best resolved at the network layer”

5 Internet Naming and Addressing Hierarchical addressing, can only be used within a domain of its definition. Therefore, the Internet address is location-dependent. Host names are location-independent, used as a way for applications to make reference to network entities DNS (a directory lookup operation) Optimized for access operation (recursive query, caching, etc.), not for update operation

6 Fundamental Problem The IP address serves dual purposes For the transport and application layer, it serves as end-point identifier For the network layer, it is used as a routing directive Data TCP DataTCPIP Hostname, port no. DNS IP Address

7 Two Tier Addressing Associate two internet addresses with each mobile host, decouple the dual role of an internet address The first address component serves as a routing directive (dynamic) The second component serves as an end- point identifier (remains static)

8 Mobile IP - Triangle routing From [3] Home address Care-of-address

9 Routing in Mobile Ad Hoc Networks (MANET) Modified from Nitin H. Vaidya’s tutorial at MobiCom a/

10 Mobile Ad Hoc Networking - MANET A mobile, ad hoc network is an autonomous system of mobile hosts connected by wireless links. There is no static infrastructure such as base stations. No centralized administration Infrastructureless networking Each node is both an end-host and a router

11 Why Ad Hoc Networks ? Ease of deployment Speed of deployment Decreased dependence on infrastructure Many applications Personal area networking (cell phone, laptop, ear phone, wrist watch) Military environments (soldiers, tanks, planes) Civilian environments (taxi cab network, meeting rooms, sports stadiums, boats, small aircraft) Emergency operations (search-and-rescue, policing and fire fighting)

12 MANET Characteristics Dynamic topologies Bandwidth-constrained congestion is typically the norm rather than the exception Energy-constrained operation rely on batteries or other exhaustible means for their energy Limited physical security increased possibility of eavesdropping, spoofing, and denial-of-service attacks Some envisioned networks (e.g. mobile military networks or highway networks) may be relatively large e.g. tens or hundreds of nodes per routing area scalability

13 Routing Protocols Proactive protocols Determine routes independent of traffic pattern Traditional link-state and distance-vector routing protocols are proactive Reactive protocols Maintain routes only if needed Hybrid protocols

14 Trade-Off Latency of route discovery Proactive protocols may have lower latency since routes are maintained at all times Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y Overhead of route discovery/maintenance Reactive protocols may have lower overhead since routes are determined only if needed Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach achieves a better trade-off depends on the traffic and mobility patterns

15 Flooding for Data Delivery Sender S broadcasts data packet P to all its neighbors Each node receiving P forwards P to its neighbors Sequence numbers used to avoid the possibility of forwarding the same packet more than once Packet P reaches destination D provided that D is reachable from sender S Node D does not forward the packet

16 Flooding for Data Delivery B A S E F H J D C G I K Represents that connected nodes are within each other’s transmission range Z Y Represents a node that has received packet P M N L

17 Flooding for Data Delivery B A S E F H J D C G I K Represents transmission of packet P Represents a node that receives packet P for the first time Z Y Broadcast transmission M N L

18 Flooding for Data Delivery B A S E F H J D C G I K Node H receives packet P from two neighbors: potential for collision Z Y M N L

19 Flooding for Data Delivery B A S E F H J D C G I K Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P once Z Y M N L

20 Flooding for Data Delivery B A S E F H J D C G I K Z Y M Nodes J and K both broadcast packet P to node D Since nodes J and K are hidden from each other, their transmissions may collide  Packet P may not be delivered to node D at all, despite the use of flooding N L

21 Flooding for Data Delivery B A S E F H J D C G I K Z Y Node D does not forward packet P, because node D is the intended destination of packet P M N L

22 Flooding for Data Delivery: Advantages Simplicity May be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher this scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions Potentially higher reliability of data delivery Because packets may be delivered to the destination on multiple paths

23 Flooding for Data Delivery: Disadvantages Potentially, very high overhead Data packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery Flooding uses broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead Broadcasting in IEEE MAC is unreliable In our example, nodes J and K may transmit to node D simultaneously, resulting in loss of the packet in this case, destination would not receive the packet at all

24 Flooding of Control Packets Many protocols perform (potentially limited) flooding of control packets, instead of data packets The control packets are used to discover routes Discovered routes are subsequently used to send data packet(s) Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods

25 Dynamic Source Routing (DSR) [Johnson96] When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery Source node S floods Route Request (RREQ) Each node appends own identifier when forwarding RREQ

26 Route Discovery in DSR B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L

27 Route Discovery in DSR B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ

28 Route Discovery in DSR B A S E F H J D C G I K Node H receives packet RREQ from two neighbors: potential for collision Z Y M N L [S,E] [S,C]

29 Route Discovery in DSR B A S E F H J D C G I K Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once Z Y M N L [S,C,G] [S,E,F]

30 Route Discovery in DSR B A S E F H J D C G I K Z Y M Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide N L [S,C,G,K] [S,E,F,J]

31 Route Discovery in DSR Destination D on receiving the first RREQ, sends a Route Reply (RREP) RREP is sent on a route obtained by reversing the route appended to received RREQ RREP includes the route from S to D on which RREQ was received by node D

32 Route Reply in DSR B A S E F H J D C G I K Z Y M N L RREP [S,E,F,J,D] Represents RREP control message

33 Route Reply in DSR Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are guaranteed to be bi-directional To ensure this, RREQ should be forwarded only if it received on a link that is known to be bi-directional If unidirectional (asymmetric) links are allowed, then RREP may need a route discovery for D from node S Unless node D already knows a route to node S If a route discovery is initiated by D for a route to S, then the Route Reply is piggybacked on the Route Request from D. If IEEE MAC is used to send data, then links have to be bi-directional (since Ack is used)

34 Dynamic Source Routing (DSR) Node S on receiving RREP, caches the route included in the RREP When node S sends a data packet to D, the entire route is included in the packet header hence the name source routing Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded

35 Data Delivery in DSR B A S E F H J D C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length