Download Ad-hoc networks

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Distributed operating system wikipedia , lookup

RapidIO wikipedia , lookup

Peering wikipedia , lookup

Wake-on-LAN wikipedia , lookup

CAN bus wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Computer network wikipedia , lookup

Deep packet inspection wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Backpressure routing wikipedia , lookup

IEEE 1355 wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Airborne Networking wikipedia , lookup

Kademlia wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Routing wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
Routing in
Ad Hoc Networks
Audun Søberg Henriksen
Truls Becken
Overview
Short introduction
 Example of a basic routing algorithm
 Routing protocols
 IP configuring
 Security

Short introduction to wireless multihop
networks







Two or more nodes equipped
with wireless communications
and networking capability
Base station is not necessary
A node can communicate directly
with another node that is immediately within radio range
To communicate with nodes outside its own radio range an
intermediate node is used to forward the packet
The network is self-organizing and adaptive
(autonomous distributed control is required)
Nodes are able to detect the presence of other nodes and
join them into the network
The nodes don’t need to be of the same type
(phone, PDA, laptop, sensor, etc.)
Application areas
Tactical military
 Emergencies
 Disaster relief
 Sensor
 Meetings/conferences

Challenges
Dynamic topologies
 Bandwidth-constrained, variable
capacity links
 Energy-constrained
 Limited physical security
 Scalability

Simple routing protocol example
Propagation of routing table
 Routing and transmitting

Routing table

Each terminal has its own routing table
(in proactive routing algorithms)
Destination
terminal
A
B
C
D
…
Next
node
A
A
E
D
…
Position notification packet


Used to make and update the Routing Table
Broadcasted in a limited area
Contents of the packet:
ID of terminal
Timestamp for the ID of hop
Hop
which the created created packet
source terminal count
the packet
Renewal of Position Notification Packet
A 1 B 2
A 1 A 1
A
B
A
t =1
A
t =2
A 1 C 3
D
C
A
B
B
B
A C
C C
t =3
t =4
Routing Table in D
Routing
G
B
E
C
To F
Dest Next
A
B
A
B
C
E
D
E
E
F
I
G
E
H
I
I
I
D
A
I
F
H
Routing Table in I
Routing
G
B
E
C
To F
Dest Next
A
B
D
D
C
C
D
E
D
E
F
H
G
E
H
H
I
-
D
A
I
F
H
Routing Table in H
Routing
G
B
E
C
To F
Dest Next
A
B
I
I
C
C
D
E
I
I
F
F
G
C
H
-
I
I
D
A
I
F
H
Basic transmitting procedure

Request to send (RTS)
 Clear to send (CTS)

Ready to receive (RTR)
Topology problem
Hidden terminal problem
 Exposed terminal problem


Busy tones
Ad Hoc routing protocols

Proactive
– Large overhead

Reactive
– Delay before first packet
– Doesn’t scale

Hybrid scheme
– Clusters
Destination Sequenced Distance
Vector (DSDV)
Periodic routing
 Distance vector

– dest, next hop, distance, seq no

Two ways to update neighbors
– Full dump
– Incremental update
Dynamic Source Routing (DSR)
On demand
 Source routing

– Each packet contains full route

Route discovery
– Flood RREQ packets
– RREP returned when route found

Route maintenance
– RERR when route is broken
Ad-hoc On-demand Distance
Vector (AODV)

From DSR
– Route discovery
– Route maintenance

From DSDV
– Hop-by-hop routing
– Sequence numbers
Zone Routing Protocol (ZRP)

Predefined zones
– Centered around each node
Proactive local routing
 Reactive global routing

IP address assignment
No centralized logic
 Small address room in IPv4
 Network splitting
 Network merging

Two approaches

A leader
– Responsible for all addresses

Buddy system
– Start with one node responsible for all
addresses
– Joining node gets half of the addresses
from an existing node
Routing security vulnerabilities
Open medium
 Dynamic topology
 Distributed cooperation

(absence of central authorities)

Constrained capability
(energy)
Types of attacks
Black hole
 Denial of service
 Routing table overflow
 Impersonation
 Energy consummation
