Why Ad-hoc? Ad-hoc Networks. What is Ad-hoc? Why is Ad-hoc so Hard? Wishfull thinking? We want...

Similar documents
Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

A Survey of Mobile Ad Hoc network Routing Protocols*

LIST OF FIGURES. Figure No. Caption Page No.

Enterprise VoIP Services over Mobile Ad-Hoc Technologies

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Classification of Ad Hoc Routing Protocols

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet

A Survey on Reduction in Energy Consumption by Improved AODV on Mobile Ad Hoc Network

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Route Discovery Protocols

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

Security Threats in Mobile Ad Hoc Networks

Security for Ad Hoc Networks. Hang Zhao

Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol

Saleh Ali K.Al-Omari 1, Putra Sumari 2

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks

International Journal of Advanced Research in Computer Science and Software Engineering

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Location-Aided Routing (LAR) in mobile ad hoc networks

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Quality of Service Routing in Mobile Ad Hoc Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Scalable Routing Protocols for Mobile Ad Hoc Networks

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Keywords: DSDV and AODV Protocol

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

Routing with OSPF. Introduction

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Zone Routing Protocol (ZRP)

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Study of Network Characteristics Incorporating Different Routing Protocols

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

PERA: Ad-Hoc Routing Protocol for Mobile Robots

Introduction to LAN/WAN. Network Layer

Introduction to Metropolitan Area Networks and Wide Area Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

ITTC Mobile Wireless Networking The University of Kansas EECS 882 Mobile Ad Hoc Networks Fall 2007

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

A Review of Secure Ad-hoc Routing

MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Congestion control in Mobile Ad-Hoc Networks (MANETs)

10CS64: COMPUTER NETWORKS - II

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

Routing in Mobile Ad Hoc Networks

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Customer Specific Wireless Network Solutions Based on Standard IEEE

A review of routing protocols for mobile ad hoc networks

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

Security in Ad Hoc Network

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

A Performance Comparison of Stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad Hoc Networks

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Issues in Scalable Clustered Network Architecture for Mobile Ad Hoc Networks

other. A B AP wired network

Mobile Ad hoc Networking

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

Dynamic Source Routing in Ad Hoc Wireless Networks

Location-Aided Routing (LAR) in mobile ad hoc networks

Routing in wireless networks

On Vulnerability and Protection of Ad Hoc On-demand Distance Vector Protocol

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Energy Efficiency of Load Balancing in MANET Routing Protocols

VOICE COMMUNICATION OVER MOBILE AD-HOC NETWORKS

PERFORMANCE BASED SECURE OPTIMIZED ROUTING PROTOCOL FOR MOBILE AD-HOC NETWORK

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks

Hierarchical routing in ad hoc mobile networks

Mobile Computing. Logical entities are instances of a running user application or a mobile agent. Mobile agents can migrate any where over internet.

Internet Control Message Protocol (ICMP)

A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network

SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS

Comparison of RIP, EIGRP, OSPF, IGRP Routing Protocols in Wireless Local Area Network (WLAN) By Using OPNET Simulator Tool - A Practical Approach

Routing Protocols Security in Ah Hoc Networks

Transcription:

Ad-hoc Networks Why Ad-hoc? Wishfull thinking? We want... the wireless, self-configuring, self-optimizing data network trillions of nodes, global interconnectivity, quality of service all Internet applications, and voice, and video seamless operations from laptops, mainframes, to headsets... and it shouldn t cost too much. This is the vision. Ad-hoc networking is often justfied by scenarios where you do not want or where you cannot deploy & manage an infrastructure. Spontaneous meetings (at work, airport): exchange files, play games Special circumstances: disaster relief Or simply cabeling costs, management overhead: old building, wearable LAN, wireless headset cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 1 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 3 What is Ad-hoc? Why is Ad-hoc so Hard? From Latin: for this (only) Webster: ad-hoc for the particular end or case at hand without consideration of wider application Ad-hoc committee, ad-hoc report, ad-hoc protest In the case of computer networks: Ad-hoc network = wireless network without infrastructure. Related terms: spontaneous networks the network automatically emerges when nodes gather together. Routing, routing, routing! already hard to solve in fixed networks, now a constantly changing set of nodes Security: new vulnerabilities, nasty neighbors Small devices: running with batteries, little computing power cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 2 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 4

Ad-hoc Network = multi-hop Network Pro-active Routing No default router available Potentially every node becomes a router: must be able to forward traffic on behalf of others Higher fan-out, multiple routes: a wireless network has potentially more route alternatives, how to find out the best path in a communication mesh? Current Internet routing protocols are pro-active. Also called table-driven routing protocols Imagine that each node knows the full topology connectivity matrix! Simplification: each node maintains a vector indexed by potential destination names entry contains forwarding information for this dest. RIP (routing information protocol), distance-vector OSPF (open shortest path first), link-state cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 5 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 7 Pro-active and Re-active Routing Pro-active Ad-hoc Routing Protocols Routing means: making forwarding decisions based on routing state. Routing protocol s role: gather routing state. When should routing state be collected? Pro-active Routing Protocols: learn the network s topology before a forwarding request comes in Among the first proposals for ad-hoc routing, still investigated. DSDV 1994 Destination Sequenced Distance-Vector WRP 1996 Wireless Routing Protocol GSR 1998 Global State Routing Fisheye 1999 Fisheye State Routing Re-active Routing Protcol: be lazy become active only when needed. cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 6 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 8

Pro-active Routing: e.g., based on Distance Vector Pro-active Routing Example: DSDV (I) Also called Bellman-Ford routing algorithm: periodic exchange of the routing tables. DSDV is based on Distance Vector. How DSDV addresses the problems: Tagging of distance information: the destination issues increasing sequence numbers other nodes can discard old/duplicate updates Changes are not immediately propagated: wait some settling time Incremental updates instead of full table exchange. cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 9 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 11 Problems of Distance Vector (in Ad-hoc) DSDV (II) Topology changes are slowly propagated Count-to-infinity problem (! poisened reverse) Moving nodes create confusion: they carry connectivity data which, at the new place, are wrong!! fatal routing loops Destination D adds a sequence number n assume msg n is delayed over D!G!F!A and n + 1 reaches A via C before msg n A can discard the late message n Table exchange eats bandwidth. cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 10 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 12

Re-active Ad-hoc Routing On-Demand Routing: Discovery Also called on-demand routing protocols. The source has to discover a route to the destination. The source (and intermediate nodes) have to maintain a route as long as it is used. Routes have to be repaired in case of topology changes. Discovery is based on broadcasting route request msgs (flooding) Each node re-broadcasts the route request, and adds its own address to a path history Eventually the destination hears the request: route reply! travels along the revers path history cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 13 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 15 On-Demand Routing On-Demand Routing: AODV Example Also several proposals: DSR Dynamic Source Routing AODV Ad hoc On-demand Distance Vector TORA Temporally Ordered Routing Algorithm ABR Associativity Based Routing cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 14 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 16

On-Demand Routing: Optimization Clustering Example Intermediate nodes remember successful paths they answer on behalf of the destination! Intermediate nodes discover broken links and automatically repair the link (instead of letting the source find out) cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 17 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 19 Scaling Problems Some Names of Clustering Routing Protocols Common assumption of current ad-hoc research: small networks with less than 100 nodes. How to scale this to 1000 and more! nodes? routing hierarchy Create logical cells (partitioning into clusters) use one of AODV, DSDV etc inside a cell designate a cluster-head or gateway Two-level routing: direct routing inside a cluster inter-cluster routing via cluster-heads add more levels if needed ZRP Zone Routing Protocol OLSR Optimized Link State Routing CEDAR Core Extraction Distributed Ad hoc Routing CBRP Cluster Based Routing Protocol cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 18 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 20

Routing Protocol Classification (L.M.Feeney, SICS) Associating IP-Subnet with Ad-hoc Network single channel protocols How to include ad-hoc networks into IP? uniform topology-based proactive GSR reactive non-uniform DSR destination-based proactive DSDV WRP reactive AODV TORA ABR Install a gateway with wireless interface, gateway participates in ad-hoc routing can forward data to the Internet Assign an IP network number to this ad-hoc network. Each ad-hoc node has its IP host number inside this subnet. neighbor selection ZRP OLSR paritioning CEDAR CBRP cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 21 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 23 Naming and Addressing in Ad-hoc Networks IP-Subnet with Ad-hoc Network (contd) IP-Number is a mix of network name and host name: routing is based on network part does not work for ad-hoc networking networks are created/destroyed on-the-fly Network becomes a virtual & transient concept What we do: We fool IP!! routing at level 2.5 A problem is: Two gateways, and two overlapping ad-hoc networks: to which IP-subnet does a node belong? can it switch? how far may an IP-subnet be extended? Ad-hoc nodes have unique identifiers (names) e.g., based on WaveLAN card number cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 22 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 24

More Problem Areas for Ad-hoc Networks Other Routing Ideas II Security: trust your neighbors? how to create secure (overlay) networks? also opportunities: we could hide traffic patterns. Advanced network services: Quality of Service (merging voice and data) Multicasting! Ad-hoc will remain a research area for many years to come. High-density wireless networks and multipath routing Presume many nodes in a metropolitan aera e.g. cellular phones Simulations show: above a critical density, you can satisfy all point-to-point bandwidth requests by multipath-multihop forwarding This can become a telephony network without network operator! Military usage: create communication infrastructure by sprinkling thousands of nodes with planes or balistic guns over enemy area. cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 25 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 27 Other Routing Ideas I Linking Routing with Resource Control Geographic routing: use the destination s location! The mobile destination measures its position (GPS) It informs from time to time a registry A sender does routing towards this location In the supposed vicinity of the destination we use discovery à la reactive ad-hoc routing. Why should a node forward traffic from others? only drains our precious battery limits what we can send Create an incentive to forward packets: collect fees from passing packets use the electronic coins for later purchase of bandwidth Ideally, routing would automatically avoid expensive regions. Denail-of-Service attacks would be very expensive. cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 26 cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 28

Resource Control Another link of a Packet Forwarding Economy to wireless communications: spectrum is like real estate - buy, lease, sell it etc. Several countries have started to auction some frequency ranges. Currently, a frequency range is allocated for (10) years. Move towards real-time allocation: during the day: use spectrum for mobile nodes during the evening: for TV broadcasting during the night: bulk data transfer cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 29 Summary Ad hoc networks: mainly routing, security problems Existing routing algorithms not suited for wireless networks Pro-active vs. re-active routing strategies Examples: DSDV and AODV The future (?): ubiquitious high density wireless networks computational (communicational) economies cfl Christian Tschudin, Dept of Computer Systems, Uppsala University Data Networks II (1999-2000), Ad-hoc Networks, 2000-04-07, page 30