Download 投影片 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Network tap wikipedia , lookup

Backpressure routing wikipedia , lookup

Distributed firewall wikipedia , lookup

CAN bus wikipedia , lookup

Airborne Networking wikipedia , lookup

Zero-configuration networking wikipedia , lookup

TCP congestion control wikipedia , lookup

Computer network wikipedia , lookup

Point-to-Point Protocol over Ethernet wikipedia , lookup

AppleTalk wikipedia , lookup

Asynchronous Transfer Mode wikipedia , lookup

Net bias wikipedia , lookup

Serial digital interface wikipedia , lookup

IEEE 802.1aq wikipedia , lookup

Internet protocol suite wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Multiprotocol Label Switching wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

RapidIO wikipedia , lookup

Real-Time Messaging Protocol wikipedia , lookup

IEEE 1355 wikipedia , lookup

Packet switching wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Deep packet inspection wikipedia , lookup

Routing in delay-tolerant networking wikipedia , lookup

Transcript
A Practical Routing Protocol for
Vehicle-formed Mobile Ad Hoc
Networks on the Roads
指導教授:許子衡 教授
報告學生:董藝興 學生
作者:Wang, S.Y.; Lin, C.C.; Hwang, Y.W.; Tao, K.C.; Chou, C.L.;
出處: Intelligent Transportation Systems, 2005. Proceedings. 2005 IEEE
1
INTRODUCTION
• A traditional routing protocol such as
AODV works by periodically issuing
control packets to detect and maintain
neighboring nodes, find and set up routing
path, and repair broken paths, etc.
2
INTRODUCTION
• In an IVC network, however, the topology
changes very frequently due to the high
moving speeds of vehicles.
• As such, a unicast routing path set up
between a pair of vehicles breaks
frequently.
3
INTRODUCTION
• Flooding provides the best reliability
because it can use any path to reach the
destination vehicle as long as one exists.
• Currently, our protocol is designed for IVC
networks formed by a few vehicles moving
on the same lane.
4
RELATED WORK
• Most routing protocols for MANET are
single-path based protocols, which can be
further classified into two groups: “tabledriven” and “on-demand.
• protocols under high mobility,
need to spend much time and
packet bandwidth overhead on
routing information in an IVC
they still
control
updating the
network.
5
RELATED WORK
•
Although this type of routing protocols
can cope with high mobility problems, it
has some disadvantages.
•
First, each mobile node needs to know
its location at any time.
6
RELATED WORK
• Second, a separate location directory
service is required for a mobile node to
know the location of a remote destination
node.
• Moreover, greedy routing may lead packets
to “dead branches” in the network, where
there are no routes to their destination
nodes at all.
7
PROTOCOL ARCHITECTURE
8
PROTOCOL ARCHITECTURE
9
PROTOCOL DESIGN
• Although flooding provides high reliability
and eliminates the need to keep routing
entries in an IVC network, there are still
two shortcomings.
• First, in the design of IEEE 802.11 (a/b/g)
MAC protocols a broadcast frame is not
protected by ACK frames.
10
PROTOCOL DESIGN
• Second, a large number of redundant
packet transmissions may result due to
flooding.
• And these redundant packets will waste
network bandwidth.
11
PROTOCOL DESIGN
• Error Handling :
• Lacking an ACK protection mechanism
at the MAC layer for broadcast frames
can result in a poor performance at a
higher layer.
12
PROTOCOL DESIGN
• Therefore, ACK and retransmission
mechanisms are required for broadcast
frames in our protocol.
• To save the number of ACK packets,
our protocol doesn’t require a
forwarding node to explicitly send back
an ACK packet to the previous node
that broadcasts the packet.
13
PROTOCOL DESIGN
• To let FloodRD know whether a
received packet is broadcasted by an
upstream node or by a downstream
forwarding node, a sequence number is
used and carried in the FloodRDspecific header of the packet.
14
PROTOCOL DESIGN
• Redundant Transmission Avoidance :
• FloodRD adopts two schemes to
minimize redundant transmissions.
• The first scheme makes a forwarding
FloodRD rebroadcast the same packet
not more than once.
15
• In an IVC network, a packet may be
cloned and each of these copies takes
a different path to reach a forwarding
FloodRD.
• With the second scheme, a forwarding
FloodRD will not rebroadcast a packet
once it hears that some FloodRD has
rebroadcasted the packet.
16
PROTOCOL DESIGN
• In our protocol, FloodRD delays the
transmission (i.e., forwarding) of a
packet by a random delay time and if
a FloodRD hears that another FloodRD
has forwarded the packet within the
delay time, it cancels its own packet
transmission.
17
PROTOCOL DESIGN
• Sliding Window-Based Forwarding :
• To boost performance, FloodRD adopts
a sliding window-based ACK
mechanism, which allows multiple
packets to be transmitted successively
before the ACK packet for the first
DATA packet has arrived.
18
PROTOCOL DESIGN
• Fast Retransmission :
• By inspecting the sequence numbers
carried in incoming ACK packets (either
explicit or implicit ACKs), FloodRD
views that a packet has been lost if
its ACK packet has not come back but
more than N ACK packets for its
following packets have come back,
where N is a system parameter.
19
PROTOCOL DESIGN
• In-Order Forwarding and Delivery :
• Our protocol needs to handle this problem
because (1) packets generated by the same
application may reach a forwarding FloodRD
out-of-order due to traversing on different
paths in the network, and (2) FloodRD
artificially gives a different random delay time
to each forwarded packet to cancel
redundant transmissions.
20
PROTOCOL DESIGN
• If a newly-arriving packet (say, packet
A) has a smaller sequence number
than that of a packet already in the
transmission queue (say, packet B) but
packet A is given a larger random
delay time than that given to packet B,
FloodRD will exchange their random
delay times to make sure that packet
A is transmitted before packet B.
21
IMPLEMENTATION
• Packet Filtering :
• The wireless NIC of each node is
configured with two IP addresses using
the “IP aliasing” utility.
• The 1.0.1 subnet is used for normal
applications to exchange their data.
22
IMPLEMENTATION
• The 1.0.2 subnet, on the other hand,
is used by FloodRDs to flood packets
generated by applications.
23
IMPLEMENTATION
• Broadcasting Packets at A High Rate :
• Some IEEE 802.11 (a/b/g/) network interface
cards (NIC) purposely slow down the
transmission rate for broadcast packets to
only 2 Mbps.
• To overcome this problem, we changed the
configuration of the driver for these NICs
and allowed them to broadcast packets at
the 11 Mbps high transmission rate.
24
IMPLEMENTATION
• Parameter Settings :
25
PERFORMANCE EVALUATION
• To evaluate the performances of our
scheme, we conducted a series of field
trials.
• Six sedan vehicles were used in
experiments.
26
PERFORMANCE EVALUATION
27
PERFORMANCE EVALUATION
28
PERFORMANCE EVALUATION
29