Download MANET File

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Mobile and Wireless Computing
MANET
Mobile Ad Hoc Networks: Introduction
1
Mobile and Wireless Computing
Mobile Ad hoc Networks (MANET)
2

This presentation is about ways of information
exchange in a network of mobile and wireless nodes
without any infrastructural support.

Such networks are often called ad hoc networks to
emphasize that they do not depend on infrastructural
support.

The purpose of an ad hoc network is to set up
(possibly) a short-lived network for a collection of
nodes.
Mobile and Wireless Computing
Ad hoc Networks
3

Most network operations involve exchange of
information among the computers participating
in a network.

There are numerous protocols for networks with
infrastructural support , starting from LANs,
Ethernets and global networks like the Internet.

However, most of these protocols do not work
well for ad hoc networks.
Mobile and Wireless Computing
Routing in an Ad hoc Network
4

If all the wireless nodes are within the
transmission range of each other, routing is
easy. Every node can listen to all transmissions.

However, this is not true in most situations, due
to short transmission range. Hence, most ad hoc
neworks are multi-hop.

A message from a source node must go through
intermediate nodes to reach its destination.
Mobile and Wireless Computing
Routing in multi-hop networks
5

All nodes cooperate in delivering messages
across the network.

The nodes must collect local neighbourhood
information in order to make global routing
decisions.

This situation is quite different from wired
networks where the routing decisions are made
based on the infrastructure.
Mobile and Wireless Computing
Bluetooth
6

Mobility becomes much more important when
there is a need to network between several
PANs.

Bluetooth is a short-range radio technology for
wireless connectivity of PDAs and other similar
devices.

If each device is equipped with a Bluetooth
radio, it is possible to connect upto 8 such
devices into a piconet.
Mobile and Wireless Computing
Other types
7

BAN – Body Area Networks
For wearable computers (see Xybernaut)
Not yet implemented

UWB – Ultra Wide Band
Deemed a probable successor of Bluetooth
However, the present commercial
implementations were not successful, and some
UWB chip makers closed down their facilities
(inclusive the leader – Tzero Technologies)
Mobile and Wireless Computing
MANET Routing Protocols
8

We will discuss routing protocols for mobile ad
hoc networks (MANET).

Routing protocols for MANETs can be classified
as either reactive or proactive.

This classification is based on the way a protocol
tries to find a route to a destination.
Mobile and Wireless Computing
Proactive Protocols
9

Proactive protocols are based on periodic
exchange of control messages and maintaining
routing tables.

Each node maintains complete information
about the network topology locally.

This information is collected through proactive
exchange of partial routing tables stored at each
node.
Mobile and Wireless Computing
Proactive Protocols
10

Since each node knows the complete topology,
a node can immediately find the best route to a
destination.

However, a proactive protocol generates large
volume of control messages and this may take
up a large part of the available bandwidth.

The control messages may consume almost the
entire bandwidth with a large number of nodes
and increased mobility.
Mobile and Wireless Computing
Reactive Protocols
11

In a reactive protocol, a route is discovered only
when it is necessary.

In other words, the protocol tries to discover a
route only on-demand, when it is necessary.

These protocols generate much less control
traffic at the cost of latency, i.e., it usually takes
more time to find a route compared to a
proactive protocol.
Mobile and Wireless Computing
Topology based protocols

Some examples of proactive protocols are :
–
–

Some examples of reactive protcols are :
–
–
–

Dynamic Source Routing (DSR)
Ad hoc On-demand Distance Vector (AODV)
Temporally Ordered Routing Algorithm (TORA)
Some examples of hybrid protocols are:
–
–
12
Destination Sequenced Distance Vector (DSDV)
STAR
Cluster
Zone Routing Protocol (ZRP)
Mobile and Wireless Computing
Position based protocols

Protocols based on location services are:
–
–
–
–

Protocols based on forwarding strategy are:
–
–
–
–
13
Distance Routing Algorithm for Mobility (DREAM)
Quorum-based
Geographic Location Services (GLS)
Home zone, etc.
Greedy
Gready Perimeter Stateless Routing (GPSR)
RDF
Hierarchical. etc
Mobile and Wireless Computing
The Dynamic Source Routing Protocol - DSR
An Overview of the DSR Protocol
14
Mobile and Wireless Computing
The DSR Protocol (I)
15

Nodes in the network may move about, join or
leave.

All routing is automatically determined by the
protocol.

The number and sequence of intermediate hops
needed to reach any destination may change
dynamically. Hence the network topology may
be quite complex.
Mobile and Wireless Computing
The DSR Protocol (II)
16

DSR is an on-demand or reactive routing
protocol.

When a source node S wants to send a
message to a destination node D, the process
starts with a route discovery phase.

The message is sent once a route has been
discovered and S knows about the discovered
route.
Mobile and Wireless Computing
The DSR Protocol (IV)
17

Each node maintains a route cache to
remember routes that it has learnt about.

One of the main advantages of DSR as opposed
to a table driven protocol like DSDV is that the
number of control messages is much smaller.

Hence DSR is more energy-efficient and does
not congest the network with too many control
messages.
Mobile and Wireless Computing
An Example when a Route is Discovered Completely
AB
A
B
A
A is
18
ABCD
C
ABC
trying to find a route to E
Each
E
D
intermediate node appends its ID at the end.
knows the reverse route and sends a route reply.
E
Mobile and Wireless Computing
An Example when a Route is Discovered Partially
D
A
AB
B
A
A is
19
C
trying to find a route to E
C
already has a route to E in its route cache.
C
sends back the complete route to A.
E
Mobile and Wireless Computing
Assumptions
20

All nodes wishing to communicate with other
nodes in the ad hoc network participate fully in
running the DSR protocol.

The diameter of the network is more than 1, but
usually a small number.

In other words, a message usually goes through
only a small number of hops.
Mobile and Wireless Computing
Assumptions
21

The nodes may move at any time without notice
and may even move continuously.

However, we assume that the speed with which
the nodes move is moderate with respect to the
packet transmission latency or wireless
transmission range of the network.

If the nodes move extremely fast, the only
possible protocol is flooding.
Mobile and Wireless Computing
Assumptions
22

Each node selects a single IP address by which
it is known in the network.

This is necessary for assigning a unique ID for
each node.

Each node may or may not work in the
promiscuous mode. However, most wireless
interface cards support this.
Mobile and Wireless Computing
Overview of the DSR Protocol



23
Route discovery and route maintenance operate
entirely on-demand.
There is no need to broadcast periodically to
update routing information in individual nodes.
DSDV requires such periodic broadcasts.
The number of overhead packets is much
smaller in DSR. The number of overhead
packets drop to zero when the nodes are static
and all routes have been discovered.
Mobile and Wireless Computing
Overview of the DSR Protocol



24
When nodes are mobile and/or communication
pattern changes, the number of overhead
packets increase proportionately.
It is necessary to discover new routes in these
situations and hence the new route discovery
packets are the overhead packets.
Note that, a node may receive multiple routes to
a destination in response to a route discovery
request.
Mobile and Wireless Computing
Overview of the DSR Protocol



25
A node may store multiple routes to a
destination in its route cache.
A node can react to changes in network topology
much more rapidly by taking advantage of
cached routes.
For example, if one route to a destination is
broken, the source node can choose another
route to the destination from its route cache.
Mobile and Wireless Computing
DSR Route Discovery
26

Consider the case when a source node S wants
to send a packet to a destination node D.

In a ‘good situation’, S already knows a route to
D from its route cache.

In this case, S will add the sequence of hops to
D in the header of the packet. Then S will send
the packet to the first node in this sequence.
Mobile and Wireless Computing
DSR Route Discovery
27

In the ‘bad case’ S will not find any route to D in
its route cache.

S will initiate the route discovery protocol. In this
case, we call S the initiator and D the target of
this protocol.
Mobile and Wireless Computing
DSR Route Discovery




28
Node S is trying to discover a route to node D.
S broadcasts a route request message to its
neighbours. This message is received by all
nodes within the transmission range of S.
Each route request message contains the
initiator and target of the route discovery.
Also, each route request is stamped with a
unique ID assigned by the initiator.
Mobile and Wireless Computing
An Example Route Discovery
Example:
D
A
AB
ABCD
B
A
29
C
ABC
E
Mobile and Wireless Computing
How a Node Deals with a Route Request Message
B
D
S
If
B has a route to D in its route cache, B sends back
that route to S.
B
D
S
If
B does not have a route to D, B broadcasts the route
request message.
30
Mobile and Wireless Computing
DSR Route Request



31
When a Route Request message reaches a
node, the accumulated route indicates the nodes
through which it has passed.
This accumulated route is used by a node to
send a Route Reply message back to the
initiator.
The Route Reply message can be sent either by
the destination node or by an intermediate node
that finds a route to the destination in its route
cache.
Mobile and Wireless Computing
How Often Should a Node Initiate a Route Discovery?
32

Suppose S is the initiator of a route discovery
message to a node D.

If S does not receive a route reply message, S
would like to initiate another route request
message.

However, S should not send route request
messages frequently, because D may be
unreachable at the moment.
Mobile and Wireless Computing
How Often Should a Node Initiate a Route Discovery?
D
S
P
P
S
may have a better chance of finding a route to D later.
S should not flood the network with route requests.
33
Mobile and Wireless Computing
How Fast Should a Node Send a Route Reply?
34

A node can send a route reply if it finds a route
to the target in its route cache.

However, if many nodes try to send route reply
for the same destination, it may result in a route
reply storm.

Too many replies for the same route request
may flood the network.
Mobile and Wireless Computing
Route Reply Storm
B
D
C
A
E
Each
35
G
F
of the nodes B, C, D, E and F knows a route to G.
Mobile and Wireless Computing
Waiting Before Replying
36

Simultaneous replies from all these nodes will
result in network congestion and packet
collisions.

Each node should wait for a random amount of
time and listen to the traffic.

If there is a better (shorter) route reply, or the
initiator (node A in this example) starts using
another route, there is no need to reply.
Mobile and Wireless Computing
Caching Overheard Routing Information
37

An important aspect of DSR is to maintain an
up-to-date route cache.

A good and current route cache helps a node to
find (i) routes for itself faster, and (ii) reply fast to
route request messages.

If the nodes overhear other messages, they
should analyse these messages and update
their own route cache if necessary.
Mobile and Wireless Computing
Caching Overheard Routing Information
C
A
E
B
D
P
P
overhears the route A-B-C-D-E when B is sending a
packet to C. This packet was originally sent by A.
P
stores this route in its route cache for future use. If P
receives a route request for any of the destinations C,D or
E, P can use this information.
38
Mobile and Wireless Computing
Route Request Hop Limit
39

Sometime it is not good to propagate a route
request message throughout the network.

Suppose S is the source of a route request
message for a destination D.

In case D is in the neighbourhood of S, the route
request message from S should not propagate
too far away.
Mobile and Wireless Computing
Route Request Hop Limit

If D is near S, propagating the route request
message too far will result in too many
unnecessary route reply messages in future.
S
D
40
Mobile and Wireless Computing
Restricted Propagation of Route Request
41

A better strategy is to propagate route request
messages with increasing hop count.

Initially, send the route request to a distance of 2
hops. If no route reply is received after
sometime, send the route request to a distance
of 4 hops and so on.

This reduces network congestion by reducing
the number of route reply messages.
Mobile and Wireless Computing
DSR Route Maintenance
42

Route maintenance is important for correct
delivery of messages.

When forwarding a packet, each node should
ensure that the packet reaches the next hop.

A packet reaches its correct destination if each
node ensures this correct delivery along the
path.
Mobile and Wireless Computing
Ensuring Correct Delivery
D
B
A
C
Node
E
A is sending a packet to E, using the route A-B-C-
D-E.
A is
B
responsible for the correct delivery of the packet to B
is responsible for the correct delivery of the packet to C
and so on.
43
Mobile and Wireless Computing
Active or Passive Acknowledgment
44

The correct delivery can be ensured through an
active acknowledgment.

An active acknowledgment may be part of the
MAC protocol in use. IEEE 802.11 standards
provide such link level active acknowledgment.

In a passive acknowledgment, node A may
overhear the forwarding of the packet by node B
and knows that the packet has been received by
B.
Mobile and Wireless Computing
Route Error Message
D
B
A
C
E
When A initiates
a message to E, there are two parts in
the message. The route from A to E and the actual
message.
Each
intermediate node tries to forward the mesage by
looking up the next hop from the route.
45
Mobile and Wireless Computing
When a message cannot be forwarded
D
B
A
C
A node
E
like C tries to forward the message and waits for
acknowledgment. C will retransmit the message a fixed
number of times if no acknowledgment arrives.
After
46
that, C will initiate a route error message.
Mobile and Wireless Computing
Route Error back to the Initiator
D
B
A
C
In
E
this example, C will initiate a route error message back
to A indicating that the link to D is currently broken.
A will
remove this route from its route cache and try
another route to E, if it has one. Or, A may start a new
route discovery.
47
Mobile and Wireless Computing
Packet Salvaging
48

After sending a route error message, a node may try to
send the packet that caused the route error.

In the previous example, C may try to find a route to E
from its own route cache.

If C can find a route to E, it will replace the previous
route by the new route and send the packet to E.

C should also indicate that this packet has been
salvaged, so that other nodes do not try to salvage it.
Mobile and Wireless Computing
Automatic Route Shortening

Some routes may become unnecessarily long
when nodes move around.
C
A
B
F
G
E
C
overhears the transmission when A sends the packet to
B. Recall that A sends the complete route to B.
C
49
informs A that B,F,G can be removed from the route.
Mobile and Wireless Computing
Spreading of Route Error Message
D
B
A
C
E
When A receives
a route error message from C, A knows
that the link C-D is broken.
 A removes
this route from its route cache. In future, A
may try a new route or try to discover a new route.
A piggybacks
the route error message so that other
nodes know that the link C-D is broken.
50
Mobile and Wireless Computing
Advantages and Disadvantages
51

DSR is a simple and efficient routing protocol
with low overhead of control messages.

However, DSR has relatively high latency in
finding routes.

DSR is not very scalable since packet size
increases with increasing hop numbers in a
route.