1 / 44

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. CS 851 Seminar University of Virginia www.cs.virginia.edu/~cs851-2/course.html. B. B. A. A. A. C. B. C. C. A. B. C. D. D. D. D. Why Needs Routing in Mobile Ad Hoc Networks.

nyoko
Download Presentation

Unicast Routing in Mobile Ad Hoc Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Unicast Routing in Mobile Ad Hoc Networks CS 851 Seminar University of Virginia www.cs.virginia.edu/~cs851-2/course.html

  2. B B A A A C B C C A B C D D D D Why Needs Routing in Mobile Ad Hoc Networks • Due to limited transmission range, packets may need to traverse multiple links to reach a destination • Mobility causes route changes • Energy consumption • Route stability despite mobility

  3. Different Enviroment • Symmetric Environment • all nodes have identical capabilities andresponsibilities • Asymmetric Environment • Asymmetric Capabilities • transmission ranges and radios may differ • battery life at different nodes may differ • processing capacity may be different at different nodes • speed of movement • Asymmetric Responsibilities • only some nodes may route packets • some nodes may act as leaders of nearby nodes (e.g., cluster head)

  4. Different Traffic • Traffic characteristics may differ in different ad hoc networks • bit rate • timeliness constraints • reliability requirements • unicast / multicast / geocast • host-based addressing / content-based addressing / capability-based addressing

  5. Different Mobility • Mobility patterns may be different • people sitting at an airport lounge • New York taxi cabs • kids playing • military movements • personal area network • Mobility characteristics • speed • predictability • direction of movement • pattern of movement • uniformity (or lack thereof) of mobility characteristics among different nodes

  6. The Holy Grail • No single protocol works well in all environments • Perhaps using an adaptive/hybrid approach that can adapt to situation at hand • Difficult problem • Many solutions proposed trying to address a sub-space of the problem domain

  7. Unicast Ad-Hoc Routing Protocols Flat Routing Hierarchical Routing Geographic Position Assisted Routing Proactive Reactive ZRP LAR DSR Classification of Unicast Ad-Hoc Routing Protocols

  8. Classification of Unicast Routing Protocols • Proactive protocols • Determine routes independent of traffic pattern • Traditional link-state and distance-vector routing protocols are proactive • Reactive protocols • Maintain routes only if needed • Hybrid protocols

  9. Trade-Off Between Proactive and Reactive • Latency of route discovery • Proactive protocols may have lower latency since routes are maintained at all times • Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y • Overhead of route discovery/maintenance • Reactive protocols may have lower overhead since routes are determined only if needed • Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating • Which approach achieves a better trade-off depends on the traffic and mobility patterns

  10. Dynamic Source Routing in Ad Hoc Wireless NetworksDavid B. Johnson and David A. Maltzpublished in the book “Mobile Computing” 1996

  11. Basic Operations of DSR • To send a packet to other node, the sender constructs a source route and embeds it into the packet’s header EX. [node-1, node-2, ……, node-k] • Each node maintains a route cache in which it caches source routes that it has leaned • Each entry in the route cache is associated with a time stamp, old entry will be deleted • If no route in its route cache to send the packet, the node issues (flooding) route discovery to discover one • The node may buffer the packet or discard the packet when waiting reply for its route discovery • While a node using any source route, it monitors the continued correct operation of that route and maintains the route • When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery • Source node S floods Route Request (RREQ) • Each node appends own identifier when forwarding RREQ

  12. Basic Assumptions • All nodes (hosts) are willing to forward packets for other nodes (hosts) in the network • The diameter of a ad-hoc network will not be too larger • The node’s speed is moderate • All nodes are overhearing (promiscuous)

  13. Route Discovery • A route request packet contains <target ID, Initiator Address, route record, request ID> • Each node maintains a list of the < initiator Address, request ID> • When a node receives a route request packet • Discards the route request packet • if < initiator Address, request ID> is in its list • It is in the route record • Return a route reply packet which contains a route from initiator to itself • If it is the target node • If it has an entry in its route cache for a route to target node • Append itself address to the route record in the route request packet and re-broadcast the request

  14. Route Maintenance Route [S,node-1,node-2,……,node-k,D] • Hop-by-hop acknowledgement ( MAC or network layer) • When node-i find link [node-i,node(i+1)] down, it sends a route error packet which contains [node-i,node(i+1)] to S. All nodes overhear the route error packet update their route cache • How to find link [node-i,node(i+1)] is down ? • Utilize MAC level acknowledgement • Passive acknowledge (overhearing node(i+1) transmission) • Insert a bit in packet header to ask an explicit acknowledgement from node(i+1) • How to sends route error packet to S? • Use the reverse route [node-i,node(i-1), ……,node-1, S] • Use node-i route cache to get a route to S • Use piggybacking in route discovery packet • End-to-end acknowledgement (transport or application layer) • D sends ACK to S to indicate the route status • But S does not which hop is broken

  15. Optimizations • Full use of route cache • Avoid the collision due to multiple replies • Pick a random number • D=H*(h-1+r) H=a time unite; h=the length of the route, r =a random number in [0,1] • Delay transmitting the route reply for a period of d • During this period, cancel the route reply if overhearing a packet targeted at D and with short path than h • Avoid loop by discarding route request [B,C,D] + [B,A] = [B,A,B,C,D] • Expanding ring to reduce route request overhead • First limit route request TTL = 1 • If no route reply is received after some time period, set TTL = maximum • Piggybacking on Route Discoveries • Piggybacking data in route discovery packet • Reflecting shorter routers • D may infer that route may be shortened by excluding the intermediate hop C, D then sends an unsolicited route reply packet to A to inform the shorter route • Improved handling of errors due to network partitions • Limit the rate of route discovery packet transmission • Exponential backoff • Overhearing route error packet • Original sender (S) retransmits route error packet along the original route if unidirectional links are existred • Cache negative information to avoid stale route reply

  16. Route Discovery in DSR Y Z S E F B C M L J A G H D K I N Represents a node that has received RREQ for D from S

  17. Route Discovery in DSR Y Broadcast transmission Z [S] S E F B C M L J A G H D K I N Represents transmission of RREQ [X,Y] Represents list of identifiers appended to RREQ

  18. Route Discovery in DSR Y Z S [S,E] E F B C M L J A G [S,C] H D K I N • Node H receives packet RREQ from two neighbors: • potential for collision

  19. Route Discovery in DSR Y Z S E F [S,E,F] B C M L J A G H D K [S,C,G] I N • Node C receives RREQ from G and H, but does not forward • it again, because node C has already forwarded RREQ once

  20. Route Discovery in DSR Y Z S E F [S,E,F,J] B C M L J A G H D K I N [S,C,G,K] • Nodes J and K both broadcast RREQ to node D • Since nodes J and K are hidden from each other, their • transmissions may collide

  21. Route Discovery in DSR Y Z S E [S,E,F,J,M] F B C M L J A G H D K I N • Node D does not forward RREQ, because node D • is the intended target of the route discovery

  22. Route Discovery in DSR • Destination D on receiving the first RREQ, sends a Route Reply (RREP) • RREP is sent on a route obtained by reversing the route appended to received RREQ • RREP includes the route from S to D on which RREQ was received by node D

  23. Route Reply in DSR Y Z S RREP [S,E,F,J,D] E F B C M L J A G H D K I N Represents RREP control message

  24. Route Reply in DSR • Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are guaranteed to be bi-directional • To ensure this, RREQ should be forwarded only if it received on a link that is known to be bi-directional • If unidirectional (asymmetric) links are allowed, then RREP may need a route discovery for S from node D • Unless node D already knows a route to node S • If a route discovery is initiated by D for a route to S, then the Route Reply is piggybacked on the Route Request from D. • If IEEE 802.11 MAC is used to send data, then links have to be bi-directional (since Ack is used)

  25. Dynamic Source Routing (DSR) • Node S on receiving RREP, caches the route included in the RREP • When node S sends a data packet to D, the entire route is included in the packet header • hence the name source routing • Intermediate nodes use the source route embedded in the packet’s header to determine to whom the packet should be forwarded

  26. Y Z DATA [S,E,F,J,D] S E F B C M L J A G H D K I N Data Delivery in DSR Packet header size grows with route length

  27. When to Perform a Route Discovery • When node S wants to send data to node D, but does not know a valid route node D

  28. DSR Optimization: Route Caching • Each node caches a new route it learns by any means • When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F • When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S • When node F forwards Route Reply RREP[S,E,F,J,D], node F learns route [F,J,D] to node D • When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D • A node may also learn a route when it overhears Data packets

  29. Use of Route Caching • When node S learns that a route to node D is broken, it uses another route from its local cache, if such a route to D exists in its cache. Otherwise, node S initiates route discovery by sending a route request • Node X on receiving a Route Request for some node D can send a Route Reply if node X knows a route to node D • Use of route cache • can speed up route discovery • can reduce propagation of route requests

  30. Use of Route Caching [S,E,F,J,D] [E,F,J,D] S E [F,J,D],[F,E,S] F B [J,F,E,S] C M L J A G [C,S] H D K [G,C,S] I N Z [P,Q,R] Represents cached route at a node (DSR maintains the cached routes in a tree format)

  31. Use of Route Caching:Can Speed up Route Discovery [S,E,F,J,D] [E,F,J,D] S E [F,J,D],[F,E,S] F B [J,F,E,S] C M L [G,C,S] J A G [C,S] H D K [K,G,C,S] I N RREP RREQ Z When node Z sends a route request for node C, node K sends back a route reply [Z,K,G,C] to node Z using a locally cached route

  32. Use of Route Caching:Can Reduce Propagation of Route Requests Y [S,E,F,J,D] [E,F,J,D] S E [F,J,D],[F,E,S] F B [J,F,E,S] C M L [G,C,S] J A G [C,S] H D K [K,G,C,S] I N RREP RREQ Z Assume that there is no link between D and Z. Route Reply (RREP) from node K limits flooding of RREQ. In general, the reduction may be less dramatic.

  33. Route Error (RERR) Y Z RERR [J-D] S E F B C M L J A G H D K I N J sends a route error to S along route J-F-E-S when its attempt to forward the data packet S (with route SEFJD) on J-D fails Nodes hearing RERR update their route cache to remove link J-D

  34. Route Caching: Beware! • Stale caches can adversely affect performance • With passage of time and host mobility, cached routes may become invalid • A sender host may try several stale routes (obtained from local cache, or replied from cache by other nodes), before finding a good route • An illustration of the adverse impact on TCP will be discussed later in the tutorial [Holland99]

  35. Dynamic Source Routing: Advantages • Routes maintained only between nodes who need to communicate • reduces overhead of route maintenance • Route caching can further reduce route discovery overhead • A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches

  36. Dynamic Source Routing: Disadvantages • Packet header size grows with route length due to source routing • Flood of route requests may potentially reach all nodes in the network • Care must be taken to avoid collisions between route requests propagated by neighboring nodes • insertion of random delays before forwarding RREQ • Increased contention if too many route replies come back due to nodes replying using their local cache • Route Reply Storm problem • Reply storm may be eased by preventing a node from sending RREP if it hears another RREP with a shorter route

  37. Dynamic Source Routing: Disadvantages • An intermediate node may send Route Reply using a stale cached route, thus polluting other caches • This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. • For some proposals for cache invalidation, see [Hu00Mobicom] • Static timeouts • Adaptive timeouts based on link stability

More Related