Dynamic Source Routing in Ad Hoc Wireless Networks

Slides:



Advertisements
Similar presentations
Unicast Routing Protocols for Ad Hoc Networks Kumar Viswanath CMPE 293.
Advertisements

1 Chapter 04 Routing in Ad Hoc Networks Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Advanced Topics in Next-Generation Wireless Networks
Mobile Ad-Hoc Networks (MANET)
1 Routing in Mobile Ad Hoc Networks most slides taken with permission from presentation of Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Prof. Marco Aurélio Spohn
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Winter CMPE 155 Week 9. Winter Project 8 Setting up wireless ad hoc network. Designing/implementing application- level neighbor discovery.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Mobile Ad Hoc Networks (MANET). 2 Mobile Ad Hoc Networks  Formed by wireless hosts which may be mobile  Without (necessarily) using a pre-existing.
Comparison of Routing Metrics for Static Multi-Hop Wireless Networks Richard Draves, Jitendra Padhye and Brian Zill Microsoft Research Presented by Hoang.
8/7/2015 Mobile Ad hoc Networks COE 549 Routing Protocols II Tarek Sheltami KFUPM CCSE COE 1.
Impact of Directional Antennas on Ad Hoc Routing Romit Roy Choudhury Nitin H. Vaidya.
Ad Hoc Wireless Routing COS 461: Computer Networks
The Zone Routing Protocol (ZRP)
Slides from Prof. Sridhar Iyer, IIT Bombay
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Material in this slide set are from a tutorial by Prof. Nitin Vaidya 1.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Chapter: 05-Mobile Computing
Dsr – dynamics source routing. basics Two types of routing –On-demand / reactive Information is only collected when required, I.e., when a packet needs.
Mobile Routing protocols MANET
Mobile Adhoc Network: Routing Protocol:AODV
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
Ad-Hoc Networks. References r Elizabeth Royer and Chai-Keong Toh, " A Review of Current Routing Protocols for Ad Hoc Wireless Mobile Networks, " IEE Personal.
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Ad Hoc Routing: The AODV and DSR Protocols Speaker : Wilson Lai “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, C. Perkins.
1 ECE453 – Introduction to Computer Networks Lecture 13 – Network Layer (V) -
1 Dynamic Source Routing in Ad Hoc Wireless Networks David B. Johnson and David A. Maltz published in the book “Mobile Computing” 1996.
Fault-Tolerant Papers Broadband Network & Mobile Communication Lab Course: Computer Fault-Tolerant Speaker: 邱朝螢 Date: 2004/4/20.
Wireless & Mobile Networking CS 752/852 - Spring 2011 Tamer Nadeem Dept. of Computer Science Ad Hoc Routing Layer - I.
1 Mobile Ad Hoc Networks for CSC 453 Sp 2011 From a tutorial by Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Routing in Mobile Ad Hoc Networks (from Ad Hoc Networking by Charles Perkins) Thanks to Prof. Yu at Cleveland State Univ.
Asstt. Professor Adeel Akram. Infrastructure vs. multi-hop Infrastructure networks: One or several Access-Points (AP) connected to the wired network.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
Traditional Routing A routing protocol sets up a routing table in routers A node makes a local choice depending on global topology.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
1 Wireless Networking Primer (few topics that may help in understanding other lectures) Nitin Vaidya University of Illinois at Urbana-Champaign.
Background of Ad hoc Wireless Networks Student Presentations Wireless Communication Technology and Research Ad hoc Routing and Mobile IP and Mobility Wireless.
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay
Paper Reviews Written reviews for each paper to be discussed in class are due by noon on Fridays of the previous week The soft copy of the reviews should.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Ασύρματα Δίκτυα και Κινητές Επικοινωνίες Ενότητα # 13: Δρομολόγηση σε Κινητά Αδόμητα Δίκτυα (Mobile Ad Hoc Networks) Διδάσκων: Βασίλειος Σύρης Τμήμα: Πληροφορικής.
1 Mobile Ad Hoc Networks (MANET) Introduction and Generalities.
Routing in Mobile Ad Hoc Network (MANET)
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Peter Pham and Sylvie Perreau, IEEE 2002 Mobile and Wireless Communications Network Multi-Path Routing Protocol with Load Balancing Policy in Mobile Ad.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Mobile Computing CSE 40814/60814 Spring 2017.
A comparison of Ad-Hoc Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Mobile Computing CSE 40814/60814 Spring 2018.
Mobile Ad-hoc Networks (MANET)
Folien aus: Mobile Ad Hoc Networks: Routing, MAC and Transport Issues
Overview: Chapter 3 Networking sensors
Routing.
Vinay Singh Graduate school of Software Dongseo University
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Dynamic Source Routing in Ad Hoc Wireless Networks

Background Difficult problem Wireless communication Dynamic topology Frequent link broken and network partition No single protocol works well in all cases Many proposed protocols only address a sub-space of the problem domain DSR only works for mobile ad hoc networks with middle or small size and nodes’ speed is moderate and every node has enough energy

Classification of Unicast Ad-Hoc Routing Protocols Flat Routing Hierarchical Routing Geographic Routing Proactive Reactive Hybrid Flat Routing Every node plays an equal role and takes the same responsibility Hierarchical Routing Nodes are grouped, some nodes are selected as group leaders Leaders take more responsibilities than others Geographic Routing Use geographic location information to make routing and forwarding decisions DSR Proactive protocols Maintain routes independent of traffic pattern Traditional link-state and distance-vector routing protocols are proactive Reactive protocols Determine routes only if needed

Trade-Off Between Proactive and Reactive Latency of route discovery Proactive protocols have lower latency since routes are maintained all times Reactive protocols have higher latency because a node needs to find a route when it has data to send Overhead of route maintenance Reactive protocols have lower overhead since routes are maintained ed only if they are needed Proactive protocols have higher overhead due to continuous route updating Which approach achieves a better trade-off depends on the traffic and mobility patterns If most nodes always have data to send and nodes’ mobility is high, proactive protocols may produce higher routing efficiency If only a few nodes have data to send and nodes’ mobility is low, reactive protocols may produce higher routing efficiency

Basic Assumptions in DSR All nodes are willing to forward packets for other nodes in the network The diameter of an ad-hoc network will not be too larger Packet header will be bigger than payload if route is very longer The node’s speed is moderate Local route cache will become stale soon if node’s speed is high All nodes are overhearing (promiscuous) No energy saving

Dynamic Source Routing Z Y B A S E F H J D C G I K M N L DATA[S,E,F,J,D] When S sends a data packet to D, the entire route is included in the packet header Intermediate nodes use the source route embedded in the packet’s header to determine to whom the packet should be forwarded Different packets may have different routes, even they have the same source and destination Hence called as dynamic source routing

Basic For DSR Two basic mechanisms Key optimization Route Discovery Route Request (RREQ) Route Reply (RREP) Route Maintenance Route Error (RERR) Key optimization Each node maintains a route cache Overhears data, RREQ, RREP, and RERR packets Passively collects new routes as many as possible Reduces the cost of Route Discovery and Route Maintenance

Route Discovery When to perform a Route Discovery ? Every route request packet (RREQ) contains <target address, initiator address, route record, request ID> Each node maintains a list of the < initiator address, request ID> When a node Y receives a RREQ Discards the route request packet if < initiator address, request ID> is in its list Return a route reply packet which contains a route from initiator to target If Y is target If Y has an entry in its route cache for a route to target Append itself address to the route record in RREQ and re-broadcast RREQ

Route Discovery in DSR Y Z S E F B C M L J A G H D K I N Represents a node that has received RREQ for D from S

Route Discovery in DSR Y Broadcast Z [S] S E F B C M L J A G H D K I N Represents transmission of RREQ [X,Y] Represents route record stored in RREQ

Route Discovery in DSR Y Z S [S,E] E F [S,B] B C M L J A G [S,C] H D K Node H receives packet RREQ from two neighbors: potential for collision

Route Discovery in DSR Y Z S E F B [S,E,F] C M L [S,B,A] J A G [S,B,H] K [S,C,G] I N C receives RREQ from G and H, but does not forward it again, because C has already forwarded RREQ once

Route Discovery in DSR Y Z S E F [S,E,F,J] B C M L J A G H [S,B,H,I] D K I N [S,C,G,K] J and K both broadcast RREQ to D Their transmissions may collide at D

Route Discovery in DSR Y Z S E [S,E,F,J,M] F B C M L J A G H D K I N D does not forward RREQ, because D is the intended target

Route Reply in DSR Y Z S RREP [S,E,F,J,D] E F B C M L J A G H D K I N Represents RREP control message

More Details For Route Reply in DSR Destination D on receiving the first RREQ, sends a Route Reply (RREP) RREP includes the route from S to D How Route Reply packet is sent to S? Route Reply can be sent by reversing the route in Route Request (RREQ) If links are bi-directional If unidirectional (asymmetric) links are allowed, then a route to S is needed Local route cache has a route to S Piggybacking Route Reply in Route Request packet for S NOTE: If IEEE 802.11 MAC is used, then links have to be bi-directional

An Example of Route Maintenance B A S E F H J D C G I K Z Y M N L RERR [J-D] Route Error Packet : RERR J sends a route error to S along route J-F-E-S when it finds link [J-D] broken Nodes hearing RERR update their route cache to remove all invalid routes related with link J-D

More Details about Route Maintenance Route [S, node-1,node-2,……,node-k, D] Hop-by-hop maintenance ( MAC or network layer) How to find link [node-i,node(i+1)] is down ? Utilize MAC level acknowledgement Passive acknowledge (overhearing node(i+1) re-transmission) Insert a bit in packet header to ask an explicit acknowledgement from node(i+1) How to send route error packet to S? Use the reverse route [node-i,node(i-1), ……,node-1, S] Use node-i route cache to get a route to S Piggybacking route error packet in route discovery packet S End-to-end maintenance (transport or application layer) D sends ACK to S to indicate the route status But S does not know which link is broken

DSR Optimization: Route Caching Each node caches a new route it learns by any means When S finds route [S,E,F,J,D] to D, S also learns route [S,E,F] to F S E F B C M L J A G H D K I N

DSR Optimization: Route Caching Each node caches a new route it learns by any means When K receives Route Request [S,C,G] destined for some node D, K learns route [K,G,C,S] to S if links are bi-directional S E F B C M L J A G H D K I N

DSR Optimization: Route Caching Each node caches a new route it learns by any means F forwards Route Reply RREP [S,E,F,J,D], F learns route [F,J,D] to D S E F B C M L J A G H D K I N

DSR Optimization: Route Caching Each node caches a new route it learns by any means When E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to D S E F B C M L J A G H D K I N

Use of Route Caching Can Speed up Route Discovery B A S E F H J D C G I K Z M N L [S,E,F,J,D] [E,F,J,D] [C,S] [G,C,S] [F,J,D],[F,E,S] [J,F,E,S] RREQ [K,G,C,S] RREP When node Z sends a route request for node C, node K sends back a route reply [Z,K,G,C] to node Z using a locally cached route

Use of Route Caching Can Reduce Propagation of Route Requests B A S E F H J D C G I K Z M N L [S,E,F,J,D] [E,F,J,D] [C,S] [G,C,S] [F,J,D],[F,E,S] [J,F,E,S] RREQ [K,G,C,S] RREP [D,K,G,,C] Route Replies (RREP) from node K and D limit flooding of RREQ.

Route Caching: Beware! With time passing and node moving, cached routes may become invalid Stale caches can adversely affect on network performance Stale or invalid information may be propagated to whole network

Simulation Parameters C= 100 kbps Medium size room: 9 by 9 meters Velocity: 0.3~0.7meter/second Transceiver range 3 meters Error Rate = 5% Packet sizes: 1000 Bytes (75%) or 32 Bytes (25%) Packet inter arrival time in a conversation : exponential distribution with mean 2~5 packets/second Conversation life time: exponential distribution with mean 15 second Total packets of a conversation : geometric distribution with mean 1000 packets

Low Overhead Mobility pattern: Each node pauses at its current position for a period (pause time) and then randomly choose a new location to move to. This behavior is repeated by every node Num transmits: sum of (packet)*(route length) Optimal num transmits: sum of (data packet)* (optimal route length) second

Suboptimal Route Average route length: DSR routes Optimal route length : ideal routes No more than 10% longer

Dynamic Source Routing: Advantages Routes are discovered only they are needed Reduces overhead of route maintenance Route caching reduce the cost of route discovery A single route discovery may yield many routes to the destination, due to intermediate nodes may reply route request from local caches Does not require symmetric links

Dynamic Source Routing: Disadvantages Packet header size grows with route length due to source routing Inefficiency Route request packet may potentially reach all nodes in the network RREQ flooding Route requests may collide at the targeted node Pay so much but get nothing Every node needs to turn on its receiver all the time No energy saving Increased contention if too many route replies come back Route Reply Storm An intermediate node may send Route Reply using a stale cached route, thus polluting other nodes’ caches Mess up routing and forwarding

MSR - Multipath Source Routing Direct Descendant of DSR On-demand + Source Routing + Multipath Probing-based adaptive load balancing among multiple paths Motivation of MSR Efficiently using the network resource Alleviate the oscillation in adaptive single path routing Fast re-routing Reducing computing & storage requirement Exploiting computing power of host instead of link capacity

Simulation Results – CBR Packet delivery ratio

Backup Source Routing (BSR) Establish and maintain backup routes that can be utilized after the primary path breaks Define a new routing metric - backup route reliability E [T,’] (analysis) T,’ -- the lifetime of backup route (, ') the basis for the backup path selection The lifetime for each link L in the network can be represented by an independent and identical (iid) exponential random variable XL Backup Route (1, 2), 1 = (s, b, c, e, g, i, j, t) and 2=(s, a, b, c, d, f, h, i, k, t)