Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof....

48
Session: 15 Prof. Sridhar Iyer 15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay

Transcript of Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof....

Page 1: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.1

IT 601: Mobile Computing

Session 15Mobile Adhoc Networks

Prof. Sridhar IyerIIT Bombay

Page 2: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.2

Multi-Hop wireless networks• May need to traverse multiple links to reach destination

• Mobility causes route changes

Page 3: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.3

Mobile Ad Hoc Networks (MANET)• Host movement frequent• Topology change frequent

• No cellular infrastructure. Multi-hop wireless links. • Data must be routed via intermediate nodes.

A B AB

Source: Vaidya

Page 4: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.4

MANETs• Do not need backbone infrastructure support• Are easy to deploy• Useful when infrastructure is absent, destroyed or

impractical• Infrastructure may not be present in a disaster area

or war zone

Page 5: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.5

Applications

• Military environments– soldiers, tanks, planes

• Emergency operations– search-and-rescue– policing and fire fighting

• Civilian environments– taxi cab network– meeting rooms– sports stadiums

Page 6: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.6

MAC in MANET

• IEEE 802.11 DCF is most popular– Easy availability– Uses RTS-CTS to avoid hidden terminal problem– Uses ACK to achieve reliability

• 802.11 was designed for single-hop wireless– Does not do well for multi-hop ad hoc scenarios– Reduced throughput– Exposed terminal problem

Page 7: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.7

Routing in MANET

• Mobile IP needs infrastructure– Home Agent/Foreign Agent in the fixed network– DNS, routing etc. are not designed for mobility

• MANET– no default router available– “every” node also needs to be a router

Page 8: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.8

MANET routing protocols• Reactive protocols

– Determine route if and when needed– Example: DSR (dynamic source routing)

• Proactive protocols– Traditional distributed shortest-path protocols– Example: DSDV (destination sequenced distance vector)

• Hybrid protocols– Adaptive; Combination of proactive and reactive– Example : ZRP (zone routing protocol)

Page 9: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.9

Dynamic Source Routing (DSR)

• Source S initiates a route discovery by flooding Route Request (RREQ)– Each node appends its own identifier when forwarding RREQ

• Destination D on receiving the first RREQ, sends a Route Reply (RREP)– RREP sent on route obtained by reversing the route appended

in RREQ– RREP includes the route from S to D, on which RREQ was

received by D• S routes data using “source route” mechanism

Page 10: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.10

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

Represents a node that has received RREQ for D from S

M

N

L

Source: Vaidya

Page 11: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.11

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

Represents transmission of RREQ

Z

YBroadcast transmission

M

N

L

[S]

[X,Y] Represents list of identifiers appended to RREQ

Page 12: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.12

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

• Node H receives packet RREQ from two neighbors: potential for collision

Z

Y

M

N

L

[S,E]

[S,C]

Page 13: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.13

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

• Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

Z

Y

M

N

L

[S,C,G]

[S,E,F]

Page 14: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.14

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

• Nodes J and K both broadcast RREQ to node D• Since nodes J and K are hidden from each other, their transmissions may collide

N

L

[S,C,G,K]

[S,E,F,J]

Page 15: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.15

Route Discovery in DSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

• Node D does not forward RREQ, because node D is the intended target of the route discovery

M

N

L

[S,E,F,J,M]

Page 16: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.16

Route Reply in DSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

RREP [S,E,F,J,D]

Represents RREP control message

Page 17: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.17

Data Delivery in DSR

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

DATA [S,E,F,J,D]

Packet header size grows with route length

Page 18: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.18

Route Error (RERR)

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

RERR [J-D]

J sends a route error to S along route J-F-E-S when its attempt to forward the data packet S (with route SEFJD) on J-D fails

Page 19: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.19

DSR: Route caching• Each node caches a new route it learns by any

means• When node S finds route [S,E,F,J,D] to node D,

node S also learns route [S,E,F] to node F• When node K receives Route Request [S,C,G]

destined for node, node K learns route [K,G,C,S] to node S

Page 20: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.20

Route caching

• When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D

• When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D

• A node may also overhear Data to learn routes

Page 21: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.21

Use of route caching

B

A

S E

F

H

J

D

C

G

IK

Z

M

N

L

[S,E,F,J,D][E,F,J,D]

[C,S]

[G,C,S]

[F,J,D],[F,E,S]

[J,F,E,S]

RREQ

When Z sends a route request for C, node K sends back a route reply [Z,K,G,C] to Z using a locally cached route

[K,G,C,S]RREP

Source: Vaidya

Page 22: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.22

Route caching

• Uses:– Finding alternate routes in case original route breaks– Route reply from intermediate nodes

• Problems:– Cached routes may become invalid over time and due

to host mobility– Stale caches can adversely affect performance

Page 23: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.23

DSR: Advantages

• Routes maintained only between nodes who need to communicate– reduces overhead of route maintenance

• Route caching can further reduce route discovery overhead– A single route discovery may yield many routes to

the destination, due to intermediate nodes replying from local caches

Page 24: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.24

DSR: Disadvantages

• Packet header size grows with route length due to source routing

• Flood of route requests may potentially reach all nodes in the network

• An intermediate node may send Route Reply using a stale cached route, thus polluting other caches

Page 25: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.25

Ad Hoc On-Demand Distance Vector Routing (AODV)

• DSR includes source routes in packet headers• Resulting large headers can sometimes degrade

performance– particularly when data contents of a packet are small

• AODV attempts to improve on DSR by maintaining routing tables at the nodes, so that data packets do not have to contain routes

Page 26: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.26

AODV

• Route Requests (RREQ) are forwarded in a manner similar to DSR

• When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source

• Route Reply (RREP) travels along the reverse path set-up when Route Request is forwarded

Page 27: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.27

Route Requests in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

Represents a node that has received RREQ for D from S

M

N

L

Source: Vaidya

Page 28: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.28

Reverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

Represents links on Reverse Path

Z

Y

M

N

L

Page 29: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.29

Reverse Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

• Node D does not forward RREQ, because node D is the intended target of the RREQ

M

N

L

Page 30: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.30

Forward Path Setup in AODV

B

A

S E

F

H

J

D

C

G

IK

Z

Y

M

N

L

Forward links are setup when RREP travels along the reverse path

Represents a link on the forward path

Page 31: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.31

Route Request and Route Reply

• Route Request (RREQ) includes the last known sequence number for the destination

• An intermediate node may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender

• Intermediate nodes that forward the RREP, also record the next hop to destination

Page 32: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.32

AODV: Timeouts

• Neighboring nodes periodically exchange hello message

• A routing table entry maintaining a reverse path is purged after a timeout interval

• A routing table entry maintaining a forward path is purged if not used for a active_route_timeout interval

Page 33: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.33

AODV: Link failure

• Absence of hello message is used as an indication of link failure

• When the next hop link in a routing table entry breaks, all active neighbors are informed

• Link failures are propagated by means of Route Error (RERR) messages, which also update destination sequence numbers

Page 34: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.34

AODV: Sequence numbers

• To avoid using old/broken routes– To determine which route is newer

• To prevent formation of loops

A B C D

E

Source: Vaidya

Page 35: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.35

AODV: Sequence numbers

• Assume that A does not know about failure of link C-D because RERR sent by C is lost

• Now C performs a route discovery for D• Node A receives the RREQ (say, via path C-E-A)• Node A will reply since A knows a route to D via

node B• Results in a loop (for instance, C-E-A-B-C )

Page 36: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.36

AODV: Expanding ring search

• Route Requests are initially sent with small Time-to-Live (TTL) field, to limit their propagation– DSR also includes a similar optimization

• If no Route Reply is received, then larger TTL tried

Page 37: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.37

AODV: Summary

• Routes need not be included in packet headers• Nodes maintain routing tables containing entries only

for routes that are in active use• At most one next-hop per destination maintained at

each node• Sequence numbers are used to avoid old/broken

routes and prevent routing loops

Page 38: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.38

Protocol Trade-offs

• Reactive protocols– Lower overhead since routes are determined on

demand– Significant delay in route determination– Employ flooding (global search)– Control traffic may be bursty

Page 39: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.39

Protocol Trade-offs

• Proactive protocols– Based on traditional wired routing protocols– Always maintain routes– Little or no delay for route determination– Consume bandwidth to keep routes up-to-date– Maintain routes which may never be used

Page 40: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.40

Link State Routing

• Each node periodically floods status of its links• Each node re-broadcasts link state information

received from its neighbor• Each node keeps track of link state information

received from other nodes

• Each node uses above information to determine next hop to each destination

Page 41: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.41

Optimized Link State Routing (OLSR)

• The overhead of flooding link state information is reduced by requiring fewer nodes to forward the information

• A broadcast from node X is only forwarded by its multipoint relays

• Multipoint relays of node X are its neighbors such that each two-hop neighbor of X is a one-hop neighbor of at least one multipoint relay of X– Each node transmits its neighbor list in periodic beacons, so

that all nodes can know their 2-hop neighbors, in order to choose the multipoint relays

Page 42: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.42

Optimized Link State Routing (OLSR)

• Nodes C and E are multipoint relays of node A• Nodes C and E forward information received from A

A

B F

C

D

E H

GK

J

Node that has broadcast state information from A

Page 43: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.43

Zone Routing Protocol (ZRP)

• Intra-zone routing: Pro-actively maintain state information for links within a short distance from any given node– Routes to nodes within short distance are thus maintained

proactively (using, say, link state or distance vector protocol)

• Inter-zone routing: Use a route discovery protocol for determining routes to far away nodes. Route discovery is similar to DSR with the exception that route requests are propagated via peripheral nodes.

Page 44: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.44

ZRP

• All nodes within hop distance at most d from a node X are said to be in the routing zone of node X

• All nodes at hop distance exactly d are said to be peripheral nodes of node X’s routing zone

Page 45: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.45

ZRP example: Zone Radius = d = 2

SCA

EF

B

D

S performs routediscovery for D

Denotes route request

E knows route from E to D, so route request need not beforwarded to D from E

Page 46: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.46

MANET variations

• Fully symmetric environment– all nodes have identical capabilities and responsibilities

• Asymmetric Capabilities– transmission ranges, battery life, processing capacity

may differ at different nodes

• Asymmetric Responsibilities– only some nodes may route packets

Page 47: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.47

MANET variations• Mobility patterns may differ from one scenario to

another

• Mobility characteristics (speed, predictability) may be different for different applications

• Traffic characteristics may differ – timeliness constraints– reliability requirements

Page 48: Session: 15Prof. Sridhar Iyer15.1 IT 601: Mobile Computing Session 15 Mobile Adhoc Networks Prof. Sridhar Iyer IIT Bombay.

Session: 15 Prof. Sridhar Iyer 15.48

MANET summary

• Routing is the most studied problem• Interplay of layers is being researched

• Large number of simulation based expts• Small number of field trials• Very few reported deployments

• Fertile area for imaginative applications