Slides Ad Hoc Cordeiro
Slides Ad Hoc Cordeiro
Slides Ad Hoc Cordeiro
http://www.ececs.uc.edu/~cordeicm
cordeicm@ececs.uc.edu
Acknowledgments
1
Course Outline
g Introduction
g Unicast routing
g Multicast routing
g Medium Access Control
g Sensor Networks
g Standards activities
g Open problems
Notes
2
Mobile Ad Hoc Networks (MANET)
MH
BS
Cell
MSC VLR
HLR 6
3
Mobile Ad hoc NETworks (MANET)
4
Mobile Ad hoc NETworks (MANET)
g Ad hoc networks:
iDo not need backbone infrastructure support
iAre easy to deploy
iUseful when infrastructure is absent, destroyed or
impractical
10
5
Many Applications
11
6
Effect of Mobility on the Protocol Stack
g Application
inew applications and adaptations
g Transport
icongestion and flow control
g Network
iaddressing and routing
g Link
imedia access and handoff
g Physical
itransmission errors and interference
13
Assumption
MH3
MH2
Symmetric link
Asymmetric link
MH1
14
7
Routing in MANET
15
Routing Protocols
g Proactive (Table-driven) protocols
iTraditional distributed shortest-path protocols
iMaintain routes between every host pair at all times
iBased on periodic updates; High routing overhead
iExample: DSDV (destination sequenced distance vector)
g Hybrid protocols
iAdaptive; Combination of proactive and reactive
iExample : ZRP (zone routing protocol)
16
8
Protocol Trade-offs
g Proactive protocols
iAlways maintain routes
iLittle or no delay for route determination
iConsume bandwidth to keep routes up-to-date
iMaintain routes which may never be used
g Reactive protocols
iLower overhead since routes are determined on demand
iSignificant delay in route determination
iEmploy flooding (global search)
iControl traffic may be bursty
Hop-by-Hop Routing
Dest. Next Hop #Hops Dest. Next Hop #Hops Dest. Next Hop #Hops
D A 3 D B 2 D D 1
Routing tables
S A B D on each node
Data D
18
9
Source Routing
S A B D
Data S-A-B-D
19
Unicast Routing
in
Mobile Ad Hoc Networks
20
10
Reactive (On-Demand) Routing Protocols
21
22
11
Route Discovery in DSR
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
12
Route Discovery in DSR
Y
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
13
Route Discovery in DSR
Y
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
14
Route Discovery in DSR
29
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
15
Dynamic Source Routing (DSR)
31
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
16
DSR Optimization: Route Caching
34
17
Dynamic Source Routing: Disadvantages
g Packet header size grows with route length due to
source routing
18
AODV
Z
S E
F
B
C M L
J
A G
H D
K
I N
19
Route Requests in AODV
Y
Broadcast transmission
Z
S E
F
B
C M L
J
A G
H D
K
I N
39
Z
S E
F
B
C M L
J
A G
H D
K
I N
20
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
42
21
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
22
Forward Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
23
Timeouts
47
24
Summary: AODV
49
50
25
Location-Aided Routing (LAR) [Ko98Mobicom]
Request Zone
g Define a Request Zone
g LAR is same as flooding, except that only nodes in
request zone forward route request
g Smallest rectangle including S and expected zone for
D
Request Zone
D
Expected Zone
x
Y
S
52
26
Location Aided Routing (LAR)
g Advantages
ireduces the scope of route request flood
ireduces overhead of route discovery
g Disadvantages
iNodes need to know their physical locations
iDoes not take into account possible existence of
obstructions for radio transmissions
53
So far ...
54
27
Link Reversal Algorithm [Gafni81]
A B F
C E G
55
A B F
Links are bi-directional
28
Link Reversal Algorithm
A B F
C E G
Any node, other than the destination, that has no outgoing links
reverses all its incoming links.
Node G has no outgoing links 57
A B F
C E G Represents a
link that was
reversed recently
29
Link Reversal Algorithm
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G Represents a
link that was
reversed recently
30
Link Reversal Algorithm
A B F
C E G Represents a
link that was
reversed recently
A B F
C E G
31
Link Reversal Algorithm
63
64
32
Link Reversal Methods
g Advantages
iLink reversal methods attempt to limit updates to routing
tables at nodes in the vicinity of a broken link
•Partial reversal method tends to be better than full
reversal method
iEach node may potentially have multiple routes to a
destination (multipath)
g Disadvantages
iNeed a mechanism to detect link failure
• hello messages may be used
iIf network is partitioned, link reversals continue indefinitely
65
66
33
Other Protocols
g Many variations of using control packet flooding for route discovery
68
34
Broad Classification of Proactive Protocols
g Distance-Vector based
iDSDV (Destination-Sequenced Distance-Vector)
g Link-State based
iTBRPF (Topology Broadcast with Reverse Path Forwarding)
iOLSR (Optimized Link-State Routing)
69
Destination-Sequenced Distance-Vector
(DSDV) [Perkins94Sigcomm]
g Each node maintains a routing table which stores
inext hop towards each destination
ia cost metric for the path to each destination
ia destination sequence number that is created by the
destination itself
iSequence numbers used to avoid formation of loops
(indicate freshness of routes)
35
Destination-Sequenced Distance-Vector
(DSDV)
g Assume that node X receives routing information
from Y about a route to node Z
X Y Z
71
Destination-Sequenced Distance-Vector
(DSDV)
g Node X takes the following steps:
X Y Z
iIf S(X) < S(Y), then X sets Y as the next hop to Z, and S(X)
is updated to equal S(Y)
72
36
TBRPF (Topology Broadcast with Reverse Path
Forwarding) [Bellur99Infocom]
g Send link-state updates only via the minimum-hop
spanning tree rooted at the source of the update
g Little cost in maintaining the spanning tree
iThe network connectivity information is available
D D
2 transmissions
instead of 4
X Y Z X Y Z
S S
73
74
37
Hybrid Routing Protocols
75
38
Zone Routing Protocol (ZRP)
Routing Summary
g Protocols
iTypically divided into proactive, reactive and hybrid
iGeographic forwarding (does not really perform routing)
g Performance Studies
iTypically studied by simulations using NS, discrete event simulator
iNodes (10-200) remains stationary for pause time seconds (0-
900s) and then move to a random destination (1500m X 300m
space) at a uniform speed (0-20m/s). CBR traffic sources (4-30
packets/sec, 64-1024 bytes/packet)
iAttempt to estimate latency of route discovery, routing overhead …
39
Other Routing Protocols
79
Multicast Routing
in
Mobile Ad Hoc Networks
80
40
Multicasting
81
Multicasting in MANET
82
41
AODV Multicasting [Royer00Mobicom]
84
42
AODV Multicast Tree
E Group leader
L
C
J
G
H D
K
A
B
N
Group and multicast tree member
E Group leader
L
C
J
G
H D
K
A
B N wishes to
N join the group:
it floods RREQ
Route Request (RREQ)
86
43
Joining the Multicast Tree: AODV
E Group leader
L
C
J
G
H D
K
A
B
N N wishes to
join the group
E Group leader
L
C
J
G
H D
K
A
B
N N wishes to
join the group
44
Joining the Multicast Tree: AODV
E Group leader
L
C
J
G
H D
K
A
B
N N has joined
Group member the group
90
45
Leaving a Multicast Tree: AODV
91
92
46
Leaving a Multicast Tree: AODV
E Group leader
L
C
J
G
H D
K
A
MACT (prune)
B
N
N wishes to leave
the multicast group 93
E Group leader
L
C
J
G
H MACT
D
(prune)
K
A
B
N
Node N has removed itself from the multicast group.
47
Leaving a Multicast Tree: AODV
E Group leader
L
C
J
G
H D
K
A
B
N
96
48
On-Demand Multicast Routing Protocol
(ODMRP)
97
98
49
Other Multicasting Protocols
99
100
50
Motivation
g Example CSMA/CD
iCarrier Sense Multiple Access with Collision Detection
isend as soon as the medium is free, listen into the medium if a
collision occurs (original method in IEEE 802.3)
101
102
51
Hidden Terminal Problem
g Hidden terminals
iA sends to B, C cannot detect A’s transmission
iC wants to send to B, C senses a “free” medium (CS fails)
icollision at B, A cannot detect the collision (CD fails)
iA is “hidden” for C
A B C
103
g Exposed terminals
iB sends to A, C wants to send to D
iC senses carrier, finds medium in use and has to wait
iA is outside the radio range of C, therefore waiting is not
necessary
iC is “exposed” to B
A B C D
104
52
Multiple Access with Collision Avoidance
(MACA) [Karn90]
g MACA uses signaling packets for collision avoidance
iRTS (request to send)
• sender request the right to send from a receiver with a short
RTS packet before it sends a data packet
iCTS (clear to send)
• receiver grants the right to send as soon as it is ready to
receive
105
106
53
MAC: Reliability
54
MAC: Collision Avoidance
DCF Example
B1 = 25 B1 = 5
wait data
data wait
B2 = 20 B2 = 15 B2 = 10
55
MAC Protocols: Issues
111
112
56
MAC: Energy Conservation
114
57
Other MAC Protocols
115
116
58
Applications
117
Applications
Scientific: eco-physiology, Infrastructure: contaminant
biocomplexity mapping flow monitoring
www.jamesreserve.edu
Engineering: monitoring
structures
118
59
Wireless Sensor Networks
iData-Aggregation
i“Data-Centric” Property
iLocation Awareness
120
60
A Sensor Node
121
Communication Architecture
122
61
Routing in Sensor Networks
123
g Proactive Networks
iThe nodes in the network periodically switch on their
sensors and transmitters, sense the environment and
transmit the data of interest.
g Reactive Networks
iIn this scheme the nodes react immediately to sudden and
drastic changes in the value of sensed attribute.
g Hybrid Networks
124
62
Routing in Sensor Networks
Directed Diffusion [Intanagonwiwat 2000]
g The query is flooded throughout the network (Flat).
126
63
LEACH (Low-Energy Adaptive Clustering
Hierarchy) [Heinzelman 2000b]
127
3.1 3.2
Base Station
3
3.3
2
2.3
1.0.1
1
1.0.2 2.1
1.2.5 1.2.4
2.2
1.0.3
1.2
64
Reactive Network Protocol:TEEN
TEEN
g Advantages
iSuited for time critical sensing applications.
iMessage transmission consumes more energy than data
sensing. So the energy consumption in this scheme is less
than the proactive networks.
iThe soft threshold can be varied.
iAt every cluster change time, the parameters are broadcast
afresh and so, the user can change them as required.
g Disadvantage
iIf the thresholds are not reached, the nodes will never
communicate.
130
65
Hybrid Networks
131
132
66
APTEEN
133
APTEEN
g Advantages
iIt combines both proactive and reactive policies.
iIt offers a lot of flexibility by allowing the user to set the time
interval (CT) and the threshold values for the attributes.
iEnergy consumption can be controlled by changing the count
time as well as the threshold values.
g Disadvantages
iThe main drawback of the scheme is the additional
complexity required to implement the threshold functions and
the count time.
iRate of energy consumption is increased
134
67
Wireless Sensor Networks
Hierarchical X Flat
Hierarchical Flat
Reservation-based scheduling Contention-based scheduling
Collisions avoided Collision overhead present
Reduced duty cycle due to periodic sleeping Variable duty cycle by controlling sleep time of
nodes
Data aggregation by cluster head Node on multi-hop path aggregates incoming
data from neighbors
Simple but non-optimal routing Routing is complex but optimal
Requires global and local synchronization Links formed in the fly, without synchronization
Overhead of cluster formation throughout the Routes formed only in regions that have data for
network transmission
Lower latency as multi-hop network formed by Latency in waking up intermediate nodes and
cluster-heads is always available setting up the multi-hop path
Energy dissipation is uniform Energy dissipation depends on traffic patterns
Energy dissipation cannot be controlled Energy dissipation adapts to traffic pattern
Fair channel allocation Fairness not guaranteed
135
136
68
Related Standards Activities
137
138
69
Related Standards Activities
g BlueTooth
ihttp://www.bluetooth.com
g IEEE 802.15
ihttp://grouper.ieee.org/groups/802/15/
g HomeRF [Lansford00ieee]
ihttp://www.homerf.org
g IEEE 802.11
ihttp://grouper.ieee.org/groups/802/11/
g HiperLan/2
ihttp://www.etsi.org/technicalactiv/hiperlan2.htm 139
Bluetooth
[Haartsen98]
g 3000+ adopters
140
70
Bluetooth: Link Types
Bluetooth: Piconet
142
71
Bluetooth: Scatternet
143
C P
o o
m w
p e
l r 802.11a
e HiperLAN
x C
i o 802.11g*
t n 802.11b
y s
u 802.11
m WLAN
p
t 802.15.1
i Bluetooth
o
n
802.15.4* WPAN
144
72
Open Issues
in
Mobile Ad Hoc Networking
145
Open Problems
146
73
Thank you !!!
147
74