Usman Rafique NAME : USMAN RAFIQUE SUPERVISOR: Prof Rikku Jänttii.

Slides:



Advertisements
Similar presentations
Analysis of NAT-Based Internet Connectivity for Multi-Homed On-Demand Ad Hoc Networks Engelstad, P.E. and Egeland, G. University of Oslo (UniK) / Telenor.
Advertisements

6LoWPAN Ad Hoc On-Demand Distance Vector Routing (LOAD) Ki-Hyung Kim, S. Daniel Park, G. Montenegro, S. Yoo, and N. Kushalnagar IETF 6LoWPAN WG 66th, Montreal,
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
A Flow-Based Network Monitoring Framework for Wireless Mesh Networks Authors Feiyi Huang, Yang Yang, University College London Liwen He, British Telecom.
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Impact of Radio Irregularity on Wireless Sensor Networks
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Adaptive backup routing for ad-hoc networks Adviser: Ho-Ting Wu Speaker: Zen-De Liu Date:05/14/2007.
Low Delay Marking for TCP in Wireless Ad Hoc Networks Choong-Soo Lee, Mingzhe Li Emmanuel Agu, Mark Claypool, Robert Kinicki Worcester Polytechnic Institute.
Issues in ad-hoc networks Miguel Sanchez Nov-2000.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
TiZo-MAC The TIME-ZONE PROTOCOL for mobile wireless sensor networks by Antonio G. Ruzzelli Supervisor : Paul Havinga This work is performed as part of.
Seminar On “Mesh Networking” Presented By: Vipin Mewar (05IT6017) M.Tech.(IT) School of Information Technology I I T Kharagpur.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
MobiQuitous 2004Kimaya Sanzgiri Leveraging Mobility to Improve Quality of Service in Mobile Networks Kimaya Sanzgiri and Elizabeth Belding-Royer Department.
Performance Analysis of AODV and SAODV Routing Protocols in Ad-Hoc Mesh Networks- A Simulation Study Sangeeta Ghangam Division of Computing Studies, Arizona.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Securing AODV Routing Protocol in Mobile Ad-hoc Networks Phung Huu Phu, Myeongjae Yi, and Myung-Kyun Kim Network-based Automation Research Center and School.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Reducing Traffic Congestion in ZigBee Networks: Experimental Results th International Wireless Communications and Mobile Computing Conference (IWCMC)
SECURITY-AWARE AD-HOC ROUTING FOR WIRELESS NETWORKS Seung Yi, Prasad Naldurg, Robin Kravets Department of Computer Science University of Illinois at Urbana-Champaign.
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Security in Mobile Ad Hoc Networks (MANETs) Group : ►NS. Farid Zafar Sheikh ►NS. Muhammad Zulkifl Khalid ►NS. Muhammad Ali Akbar ►NS. Wasif Mehmood Awan.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
An End-to-end Approach to Increase TCP Throughput Over Ad-hoc Networks Sarah Sharafkandi and Naceur Malouch.
An Energy-Efficient Flooding Algorithm in ad hoc Network (EFA) Concrete Mathematic Final presentation of term project Professor: Kwangjo KimKwangjo Kim.
RFC 3561 AODV Routing Protocol Mobile Ad Hoc Networking Working Group Charles E. Perkins INTERNET DRAFT Nokia Research Center 19 June 2002 Elizabeth M.
Dilshad Haleem CST593 summer 2007 Routing In Wireless Mesh Networks CST593 Final Project by Dilshad Haleem Division of Computing Studies, ASU Polytechnic.
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
AODV: Introduction Reference: C. E. Perkins, E. M. Royer, and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” Internet Draft, draft-ietf-manet-aodv-08.txt,
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
DRP: An Efficient Directional Routing Protocol for Mobile Ad Hoc Networks Hrishikesh Gossain Mesh Networks Product Group, Motorola Tarun Joshi, Dharma.
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
Ad-hoc On Demand Distance Vector Protocol Hassan Gobjuka.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
CSR: Cooperative Source Routing Using Virtual MISO in Wireless Ad hoc Networks IEEE WCNC 2011 Yang Guan, Yao Xiao, Chien-Chung Shen and Leonard Cimini.
PERFORMANCE EVALUATION OF COMMON POWER ROUTING FOR AD-HOC NETWORK Zhan Liang Supervisor: Prof. Sven-Gustav Häggman Instructor: Researcher Boris Makarevitch.
EE 6951 term project Columbia University The Fu Foundation School of Engineering and Applied Science 2002 Spring.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
IEEE ICACT( Advanced Communication Technology ) 2014 conference Zhimu Huang, Ryo Yamamoto, Yoshiaki Tanaka 1.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
DETECTION AND IGNORING BLACK HOLE ATTACK IN VANET NETWORKS BASED LATENCY TIME CH. BENSAID S.BOUKLI HACENE M.K.FAROUAN 1.
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
By Jannatul Ferdousi M.TECH(MCNT) Roll no GNIT With guidance of Mr.Dipankar.
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
An Energy-Efficient Flooding Algorithm in ad hoc network(APE) Concrete Mathematic mid-term presentation of term project Professor: Kwangjo KimKwangjo Kim.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobicom ‘99 Per Johansson, Tony Larsson, Nicklas Hedman
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Routing In Wireless Mesh Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Ad hoc Routing Protocols
Distributed Routing Protocol in Wireless Network Simulation
Routing Metrics for Wireless Mesh Networks
ITIS 6010/8010 Wireless Network Security
TBR Centralized Routing Extension
A Routing Protocol for WLAN Mesh
Routing protocols in Mobile Ad Hoc Network
Presentation transcript:

Usman Rafique NAME : USMAN RAFIQUE SUPERVISOR: Prof Rikku Jänttii

Usman Rafique Mesh Networks Routing Protocols in Mesh / ADHOC networks Limitations of Mesh Networks Proposed modification Implementation Aspects Simulation Aspects Conclusion Future Directions Contents

Usman Rafique Mesh Networks Future Wireless Network Architecture Hot Research Area DIGITAL CLOUDDIGITAL CLOUD

Usman Rafique Routing In Mesh Networks Pro active Protocols Reactive Protocols AODV protocol Nodes are Routers

Usman Rafique Mesh Networks Limitations Energy supply Security Service discovery Congestion and quality of service Current research focusing on these limitations Focus of this thesis is intelligent routing attacking battery life saving

Usman Rafique Proposed modification Restrict to Layer 3 Cross layer solution is optimal Routing protocol modifications Send traffic to robust routes Sense network energy at traffic source

Usman Rafique Implementation Aspects Test bed comprised of Laptops and PDAs Open Source Linux reference solutions Lifetime estimation from instantanous bettery and traffic predictoins Network energy sensing: Incorporated in route establishment procedure Nodes tell their life in signaling phase

Usman Rafique E Total Ф Tx P Tx + Ф Tx P Rx + P CPU Life time = Where ФTx= Transmitted traffic PTx= Transmitter power ФRx= Received traffic PRx= Received Power PCPU= CPU power consumption E_Total= Total Energy Of battery left Implementation Packets format changes | Type |J|R|G| Reserved | Hop Count | | Flooding ID | | Destination IP Address | | Destination Sequence Number | | Source IP Address | | Source Sequence Number | |Type | Length | Node Lifetime| RREQ packet Type = RREQ_EXT if (fwd_rt->flags & RT_INV_SEQNO || rrep_seqno > fwd_rt->dest_seqno || (rrep_seqno == fwd_rt->dest_seqno && (fwd_rt->state == INVALID || fwd_rt->flags & RT_UNIDIR || rrep_new_hcnt hcnt || route_life > fwd_rt->life_um Routing Table Updation Changes Node Life Calculation Model

Usman Rafique Implementation/Testing Traffic source directs traffic to most robust route possible at route establishment stage Device recalcutaes its energy status in 2 sec intervals Protocol validated and tested on Laptops and PDAs test bed On table routes formation method was developed using iptables and netfilters in linux Multihop topologies were tested RREQ RREQ Life = 45 RREQ Life = 35 RREQ Life = 35 RREQ Life = 45 RREQ Life = 25 RREP RREP Life = 35 RREP Life = 35 RREP Life = 35 RREP Life = 25 RREP Life = 25

Usman Rafique Simulation Aspects NS-2 simulator is used Ns2: Easy network creation using TCL ecrpting front end Open source impolementation with animation and tracing for analysis features C++ is used in back end for performance gain Our motivation: Testing protocol is scaled networks

Usman Rafique Conclusions and Future Directions Benefits Long lasting routes Hidden congestion control Long operation of nodes

Usman Rafique Conclusions and Future Directions Drawbacks Longer routes can be formed Aggragate power cosumtion (Total network power per route) may be increased Packet delay increases Future Porting the protocol on embedded devices Do simulations in ns-2 with taking mobility into account

Usman Rafique Thank You Questions are Welcome