Kenneth Holter. 23rd April 2005

Similar documents
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Abstract. 1 Introduction. Aleksandr Huhtonen Helsinki University of Technology Telecommunication Software and Multimedia Laboratory ahuhtone@cc.hut.

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

A Link-state QoS Routing Protocol for Ad Hoc Networks

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

An Extended AODV Protocol to Support Mobility in Hybrid Networks

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

OLSR Performance Measurement in a Military Mobile Ad-hoc Network

Security in Ad Hoc Network

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Security Threats in Mobile Ad Hoc Networks

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Level 2 Routing: LAN Bridges and Switches

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

PERA: Ad-Hoc Routing Protocol for Mobile Robots

International Journal of Advanced Research in Computer Science and Software Engineering

Dynamic Source Routing in Ad Hoc Wireless Networks

Study of Network Characteristics Incorporating Different Routing Protocols

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS

Mobile Ad-Hoc Networks

Routing Performance in the Presence of Unidirectional Links in Multihop Wireless Networks

EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

An Efficient AODV-Based Algorithm for Small Area MANETS

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks


PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

RARP: Reverse Address Resolution Protocol

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Wireless Mesh Networks under FreeBSD

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

Hierarchical routing in ad hoc mobile networks

Delivering Messages in Disconnected Mobile Ad-Hoc Networks

Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Data Communication and Computer Network

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Wireless LAN Concepts

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Design and Implementation of Ad-hoc Communication and Application on Mobile Phone Terminals

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

How To Write A Transport Layer Protocol For Wireless Networks

Internet Control Message Protocol (ICMP)

Simulation Analysis of Different Routing Protocols Using Directional Antenna in Qualnet 6.1

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

A Review of Secure Ad-hoc Routing

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

CHAPTER 1 INTRODUCTION 1.1 MOBILE AD HOC NETWORK

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Routing in Mobile Ad Hoc Networks

The Monitoring of Ad Hoc Networks Based on Routing

Chapter 4. Distance Vector Routing Protocols

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Performance comparison and analysis of routing strategies in Mobile ad hoc networks

A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network

Introduction to Ad hoc Networks

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

Quality of Service Routing in Mobile Ad Hoc Networks

Security for Ad Hoc Networks. Hang Zhao

A Comprehensive Analysis on Route Discovery and Maintenance Features of DSDV, AODV and IERF Ad-hoc Routing Protocols

Introduction to Ethernet

Lifetime Prediction Routing in Mobile Ad Hoc Networks

Figure 1. The Example of ZigBee AODV Algorithm

Keywords: DSDV and AODV Protocol

Keywords: MAC, QoS, MRP, CEDAR, OLSR

To Study the Various Attacks and Protocols in MANET

Routing with OSPF. Introduction

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet

SURVEY OF OPTIMISTIC POWER AWARE ROUTING PROTOCOLS IN MOBILE DATACENTER NETWORKS

Routing with Load Balancing in Wireless Ad hoc Networks

An Analysis of the Optimum Node Density for Ad hoc Mobile Networks

Location Information Services in Mobile Ad Hoc Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Scalable Routing Protocols for Mobile Ad Hoc Networks

In ad hoc wireless networks, the nodes themselves are responsible for routing and forwarding of packets. OLSR and ODV have different strengths and weaknesses when it comes to node mobility in MNETs. Unlike wired networks, the topology in wireless ad hoc networks may be highly dynamic, causing frequent path breaks to ongoing sessions.

Comparing ODV and OLSR Kenneth Holter 23rd pril 2005 1

Contents 1 Introduction 4 2 Wireless networks 5 2.1 The OSI reference model...................... 6 2.2 Radio technology.......................... 6 2.3 Issues in wireless networks..................... 7 2.3.1 Hidden terminals...................... 7 2.3.2 Exposed terminals..................... 7 2.3.3 Neighbor discovery..................... 8 3 Mobile d Hoc Wireless Networks 8 4 Routing in ad hoc wireless networks 10 4.1 Proactive protocols......................... 10 4.2 Reactive protocols.......................... 11 4.3 Hybrid protocols.......................... 11 5 d hoc On-demand Distance Vector (ODV) 11 5.1 Introduction to ODV....................... 11 5.2 Control Messages.......................... 12 5.3 Sequence numbers......................... 12 5.3.1 Counting to infinity..................... 12 5.4 Route discovery........................... 12 5.4.1 Example of a Route Discovery............... 13 5.4.2 The Expanding Ring search................ 13 5.5 Link Breakage............................ 14 6 Optimized Link State Routing (OLSR) 14 6.1 Introduction to OLSR........................ 14 6.2 Control messages.......................... 14 6.3 Multipoint Relays.......................... 15 6.4 Selection of Multipoint Relay Nodes................ 15 6.5 Neighbor discovery......................... 16 6.6 Topology Information........................ 16 6.7 Route Calculation.......................... 16 7 Comparing the protocols 16 7.1 Overview.............................. 17 7.2 Resource usage........................... 17 7.3 Mobility............................... 17 7.4 Route discovery delay........................ 18 2

8 Conclusion 18 8.1 The protocols............................ 18 8.2 Future work............................. 18 3

Backbone Enemy Figure 1: Wireless ad hoc network scenario. The soldiers (circles) maintains an mobile ad hoc wireless network while moving towards the enemy. bstract Routing in ad hoc networks is somewhat more complex than routing in regular wired networks. Unreliable links and (possibly) rapid changes in topology calls for customized routing protocols. This essay aims to discuss two such protocols, namely ODV and OLSR. 1 Introduction s wireless communication technology is increasing, people are expecting to be able to use their network terminals anywhere and anytime. Examples of such terminals are PDs and laptops. Users wish to move about while maintaining connectivity to the network (i.e., Internet), and wireless networks provide them with this opportunity. Wireless connectivity to the network gives users the freedom of movement they desire. Most wireless networks today requires an underlying architecture of fixed-position routers, and are therefore dependent on existing infrastructure. Typically, the mobile nodes in such networks communicate directly with so-called access points (Ps), which in turn routes the traffic to the corresponding nodes. Today, another type of wireless networks is emerging, namely ad hoc wireless networks. These networks consist of mobile nodes and networks which themselves creates the underlaying architecture for communication. Because of this, no pre-existing routers are needed. Figure 1 depicts a typical situation in which an ad hoc wireless network can be applied. In this battlefield scenario, the soldiers move toward the enemy while maintaining network connectivity. The network itself is in this scenario mobile, thus forming a mobile ad hoc network (MNET) [3]. Soldier is within range of the backbone, and can therefore act as a gateway between the two networks. 4

pplication Presentation Session Transport TCP/UDP Network IP/routing Data Link Logical Link Control (LLC) Medium ccess Layer (MC) MC drivers Physical Physical Layer (PHY) Radio interface ISO OSI 802.11 standards Linux router Figure 2: IEEE 802.11 standards mapped to the OSI reference model and a standard linux router implementation. 2 Wireless networks Numerous different wireless networks exist, varying in the way the nodes interconnect. One can roughly classify them in two types: Infrastructure dependent d hoc wireless networks Current cellular networks are classified as the infrastructure dependent networks. What is typical for these networks is their use of access points, or base stations. In addition to acting as a router within the network, an access point can also act like a bridge connecting, for example, the wireless network and a wired network. GSM, and its 3G counterpart UMTS, are examples of well know cellular networks. In ad hoc wireless networks, on the other hand, the nodes themselves are responsible for routing and forwarding of packets. Hence, the nodes need to be more intelligent so that they can function as routers as well as regular hosts. Centralized routing and resource management by an P implies less complicity than the distributed counterpart. n P, as opposed to individual nodes, usually has more information about the network, and are therefore able to make intelligent decisions when it comes to routing. 5

2.1 The OSI reference model The open systems interconnection (OSI) reference model was developed by the International Organization for Standardization (ISO) in order to standardize the protocols used in various network layers. IEEE 802.11[2] is a family of specifications for wireless local area networks (WLNs). Like all IEEE 802.11 standards, the 802.11 works on the two lower levels of the OSI model. lthough wireless networks are not restricted to any special hardware, nodes in such networks are likely to operate according to the IEEE 802.11. Figure 2 shows the IEEE 802.11 standards mapped to the OSI reference model. lso, the figure shows how the implementation of a typical linux router corresponds to these models. In wireless networks, nodes typically use radio frequency channels as their physical medium. This corresponds to the lowest layer in the OSI model. Since the nodes need not be physically connected, the network offers data connectivity along with user mobility. The IEEE 802.11 MC layer corresponds to the data link layer in the OSI model. The main objective of the OSI data link layer is to provide error-free transmission of data across a physical link. IEEE 802.11 protocols version of this scheme consists of two sublayers: Logical Link Control (LLC) and Medium ccess Control (MC). The (possibly) most important services that the LLC offers is error- and flow control. The MC directly interfaces with the physical layer, and provides services such as addressing, framing, and medium access control. 2.2 Radio technology s mentioned above, nodes in wireless networks typically utilizes radio transmission. Infrared (IR) and Microwave (MW) are two other transmission technologies, of which IEEE 802.11 supports the former one in addition to radio. Wireless LNs use electromagnetic airwaves (radio or infrared) to communicate. The airwaves propagate through space (even in a vacuum). Different frequencies have different qualities: The higher the electromagnetic frequency, the more information can be transmitted per second. However, lower frequencies are easy to generate, can travel long distances, and can penetrate buildings easily. Radio waves operate on lower frequencies than infrared waves, making it more suitable for most wireless networks. Frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS) are the two radio transmission schemes supported in IEEE 802.11. The idea behind FHSS is that the transmitter hops from frequency to frequency hundreds of times per second. The hop pattern is known to both the sender and receiver, and to other receivers not aware of the pattern, the transmission is hard to detect. DSSS, on the other hand, does not hop from one frequency to another, but distributes the signal over the entire frequency band at once. 6

B C Figure 3: The hidden terminal problem. Node and C try and communicate with B simultaneously, but cannot detect the interference. 2.3 Issues in wireless networks There are a number of issues to consider when designing operations of wireless networks. The next subsections describe a selected few of them. 2.3.1 Hidden terminals s illustrated in Figure 3, node and node C are in range for communicating with node B, but not with each other. Both may try to communicate with node B simultaneously, and might not detect any interference on the wireless medium. Thus, the signals collide at node B, which will not be able to receive the transmissions from either node. [5] The typical solution for this so called Hidden terminal problem is that the nodes coordinate transmissions themselves by asking and granting permission to send and receive packets. This scheme is often called RTS/CTS (Request To Send/Clear To Send). The basic idea is to capture the channel by notifying other nodes about an upcoming transmission. This is done by stimulating the receiving node to outputting a short frame so that nearby nodes can detect that a transmission is going to take place. The nearby nodes are then expected to avoid transmitting for the duration of the upcoming (large) data frame. The scheme is illustrated in Figure 4 on the following page. 2.3.2 Exposed terminals Consider a topology similar to that of Figure 3, but added a node D only reachable from node C. Furthermore, suppose node B communicates with node, and node C wants to transmit a packet to node D. During the transmission between node B and node, node C senses the channel as busy. Node C falsely conclude that it may not send to node D, even though both the transmissions 7

B C RTS RTS Collision RTS CTS CTS DT time CK Successful transmission Figure 4: request to send (RTS) and clear to send (CTS) scheme. First, and C transmits a packet simultaneously, causing a packet collision at B. Then retransmits the packet before C does, thus capturing the channel. (i.e., between node B and node, and between node C and node D) would succeed. Bad reception would only occur in the zone between node B and node C, where neither of the receivers are located. This problem is often referred to as the exposed terminal problem. Both the hidden and the exposed terminal problem cause significant reduce of network throughput when the traffic load is high. 2.3.3 Neighbor discovery Discovering neighbors is a central link layer operation in wireless networks. In some cases the node might be interested in just one particular kind of neighbor, or all neighbors. In either case, the node needs to discover its neighbors and determine their types. Since the topology of the network typically is very dynamic, the neighborhood information should be updated periodically. If the topology undergoes too rapid changes in connectivity for the nodes to exchange topological information, flooding is the only way to get data to a particular destination. [4] 3 Mobile d Hoc Wireless Networks In ad hoc networks, as mentioned above, the nodes themselves are responsible for routing and forwarding of packets. If the wireless nodes are within range of each other, no routing is necessary. But, on the other hand, if the nodes have moved out of range from each other, and therefore are not able to communicate directly, intermediate nodes are needed to make up the network in which the packets are to be transmitted. Figure 5 gives an illustration of a multihop (ad hoc) network. There are a number of situations in which ad hoc networks are suited. Examples include emergency operations where there exist no fixed 8

B C E Figure 5: d hoc network. The nodes makes up the network themselves. C and E cannot reach directly, so B routes and forward the traffic. infrastructure, and military operations where the existing infrastructure might not be trusted. s for cellular networks, nodes in an ad hoc network are responsible for dynamically discover which other nodes they can directly communicate with. There are quite a few issues that need to be considered when it comes to ad hoc networking. brief overview of some of these follows: Medium access scheme The medium access protocol (MC) needs to be designed to allow for certain characteristics of wireless networks. Typical for wireless networks the nodes moves about, and this leads to hidden terminal problem as previously described. lso, fair access to the medium, and minimize collisions, must be taken into account. The MC protocol should also be able to adjust the power used for transmissions, because, for an example, reducing transmission power at a node cause a decrease in interference at neighboring nodes, and increase frequency reuse. [4] Routing Traditional routing protocols are not designed for rapid changing environments such as ad hoc networks. Therefore, customized routing protocols are needed. Examples of such protocols are ODV[6] and OLSR[1]. Routing is further discussed below. Security Due to the fact that the nodes in a wireless ad hoc network communicate on a shared medium, security becomes an important issue. This, in combination with the lack of any central coordination, makes the network more vulnerable to attack than wired networks. There are different ways of compromising wireless networks, including: Denial of service. n attacker makes services unavailable to others by keeping the service provider busy. Resource consumption. Battery power of critical nodes is depleted because of unnecessary processing caused by an attacker, or the attacker causes buffer overflow which may lead to important data packets being dropped. Host impersonation. s the name suggests, a compromised node may impersonate a host, and thereby cause wrong route entries in routing tables elsewhere in the network. Quality of service Providing quality of service (QoS) in a wireless ad hoc network is a difficult task to overcome. Nodes in such a 9

network usually act both as clients and service providers, making, contrary to most networks, the boundary between network and host less clear. Hence, to achieve QoS, a better coordination between the nodes is required. Furthermore, wireless communication usually implies limited resources, and this, in addition to the lack of central coordination, exacerbate the problem. Parameters. Different applications have different QoS parameter requirements. Whereas multimedia applications require high bandwidth and low delay, availability is the primary requirement for search-and-rescue operation applications. Routing. To make sure that applications are provided with the services they request, QoS parameters should be considered for route decisions. Throughput, packet loss rate, and reliability are examples of such parameters. 4 Routing in ad hoc wireless networks s the nodes in a wireless ad hoc network can be connected in a dynamic and arbitrary manner, the nodes themselves must behave as routers and take part in discovery and maintenance of routes to other nodes in the network. The goal of a routing algorithm is to devise a scheme for transferring a packet from one node to another. One challenge is to define/choose which criteria to base the routing decisions on. Examples of such criteria include hop length, latency, bandwidth and transmission power. [4] lists some challenges in designing a routing protocol for ad hoc wireless networks, and a brief overview of these is given below. Mobility The network need to adopt to rapid changes in the topology due to the movement of the nodes, or the network as a whole. Resource constraints Nodes in a wireless network typically have limited battery and processing power, and these resources must be managed optimally by the routing protocol. Error-prone channel state The characteristics of the links in a wireless network typically varies, and this calls for an interaction between the routing protocol and the MC protocol to, if necessary, find alternate routes. Hidden and exposed terminal problem This is described in 2.3.1 and 2.3.2. MNET routing protocols are typically subdivided into two main categories: proactive routing protocols and reactive on-demand routing protocols. 4.1 Proactive protocols In networks utilizing a proactive routing protocol, every node maintains one or more tables representing the entire topology of the network. These tables 10

a) Propagation of RREQ b) Propagation of RREP to the source Figure 6: ODV route discovery. are updated regularly in order to maintain a up-to-date routing information from each node to every other node. To maintain the up-to-date routing information, topology information needs to be exchanged between the nodes on a regular basis, leading to relatively high overhead on the network. One the other hand, routes will always be available on request. Many proactive protocols stem from conventional link state routing, including the Optimized Link State Routing protocol (OLSR) which is discussed in section 6 on page 14. 4.2 Reactive protocols Unlike proactive routing protocols, reactive routing protocols does not make the nodes initiate a route discovery process until a route to a destination is required. This leads to higher latency than with proactive protocols, but lower overhead. d Hoc On-Demand Distance-Vector routing protocol (ODV) is further discussed in section 5. 4.3 Hybrid protocols These types of protocols combine proactive and reactive protocols to try and exploit their strengths. One approach is to divide the network into zones, and use one protocol within the zone, and another between them. 5 d hoc On-demand Distance Vector (ODV) This section describes the ODV routing protocol. Some details on the route request mechanism and link sensing are provided, along with an example. 5.1 Introduction to ODV ODV is an on-demand routing algorithm in that it determines a route to a destination only when a node wants to send a packet to that destination. It is a relative of the Bellman-Ford distant vector algorithm, but is adapted to work 11

in a mobile environment. Routes are maintained as long as they are needed by the source. ODV is capable of both unicast and multicast routing. In ODV, every node maintains a table, containing information about which neighbor to send the packets to in order to reach the destination. Sequence numbers, which is one of the key features of ODV, ensures the freshness of routes. 5.2 Control Messages Three message types are defined by ODV: RREQ When a route is not available for the desired destination, a route request packet is flooded throughout the network. Figure 7 on the following page shows the format of such a packet. RREP It a node either is, or has a valid route to, the destination, it unicasts a route reply message back to the source. RERR When a path breaks, the nodes on both sides of the links issues a route error to inform their end nodes of the link break. 5.3 Sequence numbers ODV differs from other on-demand routing protocols in that is uses sequence numbers to determine an up-to-date path to a destination. Every entry in the routing table is associated with a sequence number. The sequence number act as a route timestamp, ensuring freshness of the route. Upon receiving a RREQ packet, an intermediate node compares its sequence number with the sequence number in the RREQ packet. If the sequence number already registered is greater than that in the packet, the existing route is more up-to-date. 5.3.1 Counting to infinity The use of sequence numbers for every route also helps ODV avoid the count to infinity problem. This problem arises in situations where nodes update each other in a loop. The core of the problem, as Tanenbaum [7] put it, is that when X tells Y that it has a path somewhere, Y has no way of knowing whether it itself is on the path. So if Y detects that the link to, say, Z is down, but X says it have a valid path, Y assumes X in fact does have a path, thus registering X as the next neighbor toward Z. Then, if the path X assumed valid is through Y, X and Y will start updating each other in a loop. 5.4 Route discovery Route discovery is initiated by issuing a RREQ message. The route is established when a RREP message is received. However, multiple RREP messages may be received, each suggesting different routes to the destination. The source only updates its path information if the RREP holds information about a more up-to-date route than already registered. Thus, every incoming RREP packet is examined to determine the freshness of the route suggested. 12

Source address Request ID Destination address Source sequence # Destiantion sequence # Hop count Figure 7: The format of a ROUTE REQUEST packet. When a intermediate node receives either a RREQ or a RREP packet, information about the previous node from which the packet was received is stored. This way, next time a packet following that route is received, the node knows which node is the next hop toward the source or destination, depending on which end node originated the packet. The next subsection illustrates route discovery by providing an example. 5.4.1 Example of a Route Discovery Consider the ad hoc network of Figure 6 on page 11. In this example, node wants to send a packet to node F. Suppose has no table entry for F. Then needs to discover a route to F. In our example, we assume that neither of the nodes knows where F is. The discovery algorithm works like this: Node broadcasts a special ROUTE REQUEST packet on the network. The format of the ROUTE REQUEST (RREQ) packet is shown in figure 7. Upon receiving the RREQ packet, B, C and E checks to see if this RREQ packet is a duplicate, and discards it if it is. If not, they proceed to checks their tables for a valid route to F. If a valid route is found, a ROUTE REPLY (RREP) packet is sent back to the source. In case of the destination sequence number in the table being less than the destination sequence number in the RREQ, the route is not considered up-to-date, and thus no RREP packet is sent. Since they don t know where F is, they increment the RREQ packet s hop count, and rebroadcasts it. In order to construct a route back to the source in case of a reply, they also make an entry in their reverse route tables containing s address. Now, D and G receives the RREQ. These goes through the same process as B, C and E. Finally, the RREQ reaches F, which builds a RREP packet and unicasts it back to. 5.4.2 The Expanding Ring search Since RREQ packets are flooded throughout the network, this algorithm does not scale well to large networks. If the destination node is located relatively near the source, issuing a RREQ packet that potentially pass through every node in the network is wasteful. The optimization ODV uses is the expanding ring search algorithm, which works as follows. The source node searches successively larger areas until the destination node is found. This is done by, for every RREQ retransmission until a route is found, incrementing the time to live (TTL) value carried in every RREQ packet, thus expanding the search ring in which the source is centered. 13

5.5 Link Breakage When a link breaks, a RERR message is propagated to both the end nodes. This implies that ODV does not repair broken links locally, but rather makes the end nodes discover alternate routes to the source. Moreover, link breakage caused by the movement of end nodes also results in initialization of a route discovery process. When a RERR packet is received by intermediate nodes, their cached route entries are removed. 6 Optimized Link State Routing (OLSR) In this section the proactive routing protocol OLSR is described, with emphasis on the multipoint relay mechanism. 6.1 Introduction to OLSR The Optimized Link State Routing (OLSR) is a table-driven, proactive routing protocol developed for MNETs. It is an optimization of pure link state protocols in that it reduces the size of control packet as well as the number of control packets transmission required. OLSR reduces the control traffic overhead by using Multipoint Relays (MPR), which is the key idea behind OLSR. MPR is a node s one-hop neighbor which has been chosen to forward packets. Instead of pure flooding of the network, packets are just forwarded by a node s MPRs. This delimits the network overhead, thus being more efficient than pure link state routing protocols. OLSR is well suited to large and dense mobile networks. Because of the use of MPRs, the larger and more dense a network, the more optimized link state routing is achieved. MPRs helps providing the shortest path to a destination. The only requirement is that all MPRs declare the link information for their MPR selectors (i.e., the nodes who has chosen them as MPRs). The network topology information is maintained by periodically exchange link state information. If more reactivity to topological changes is required, the time interval for exchanging of link state information can be reduced. 6.2 Control messages OLSR uses three kinds of control messages: HELLO, Topology Information (TC), and Multiple Interface Declaration (MID). Hello message is sent periodically to all of a node s neighbors. Hello messages contain information about a node s neighbors, the nodes it has chosen as MPRs (i.e., the MPRSelector set), and a list of list of neighbors whom bidirectional links have not yet been confirmed. Figure 8 on the next page shows the format of the Hello message. 14

0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 Reserved Htime Willingness Link Code Reserved Neighbor Interface ddress Neighbor Interface ddress Link Message Size Link Code Reserved Link Message Size Neighbor Interface ddress Neighbor Interface ddress Figure 8: The format of a OLSR HELLO packet. Every node periodically floods, using the multipoint relying mechanism, the network with a TC message. This message contains the node s MPRSelector set. MID message is used for announcing that a node is running OLSR on more than one interface. The MID message is flooded throughout the network by the MPRs. 6.3 Multipoint Relays node N selects an arbitrary subset of its 1-hop symmetric neighbors to forward data traffic. This subset, referred to as MPRset, covers all the nodes that are two hops away. The MPRset is calculated from information about the node s symmetric one hop and two hop neighbors. This information is extracted from HELLO messages. Similar to the MPRset, a MPRSelectors set is maintained at each node. MPRSelector set is the set of neighbors that have chosen the node as a MPR. Upon receiving a packet, a node checks it s MPRSelector set to see if the sender has chosen the node as a MPR. If so, the packet is forwarded, else the packet is processed and discarded. 6.4 Selection of Multipoint Relay Nodes The MPRset is chosen so that a minimum of one-hop symmetric neighbors are able to reach all the symmetric two-hop neighbors. In order to calculate the MPRset, the node must have link state information about all onehop and two-hop neighbors. This information is, as already mentioned, gathered from HELLO messages. Only nodes with willingness different than WILL_NEVER may be considered as MPR. 15

6.5 Neighbor discovery s links in a ad hoc network can be either unidirectional or bidirectional, a protocol for determining the link status is needed. In OLSR, HELLO messages serve, among others, this purpose. HELLO messages are broadcasted periodically for neighbor sensing. When a node receives a HELLO message in which it s address is found, it registers the link to the source node as symmetric. s an example of how this protocol works, consider two nodes and B which not yet have established links with each other. First, broadcasts an empty HELLO message. When B receives this message and does not find its own address in it, it registers in the routing table that the link to is asymmetric. Then B broadcasts a HELLO message declaring as an asymmetric neighbor. Upon receiving this message and finding its own address in it, registers the link to B as symmetric. then broadcasts a HELLO message declaring B as a symmetric neighbor, and B registers as a symmetric neighbor upon reception of this message. Upon receiving a HELLO message in which the node s address is not contained, the node registers in the routing table that the link to the source node is asymmetric. The node then sends a HELLO message containing the source node s address, and when the source node receives this message and find its own address in it, it registers 6.6 Topology Information Information about the network topology is extracted from topology control (TC) packets. These packets contain the MPRSelector set of a node, and are broadcasted by every node in the network, both periodically and when changes in the MPRSelector set is detected. The packets are flooded in the network using the multipoint relaying mechanism. Every node in the network receives such TC packets, from which they extract information to build a topology table. 6.7 Route Calculation The shortest path algorithm is used for route calculations, which is initiated when a change is detected in either of the following: the link set, the neighbor set, the two-hop neighbor set, the topology set, or the Multiple Interface ssociation Information Base. To calculate the routing table, information is taken from the neighbor set and the topology set. The calculation is an iterative process, in which route entries are added starting from one-hop neighbors, increasing the hop count each time through. more detailed outline is found in [1]. 7 Comparing the protocols In this section the two protocols described are compared. In section 7.1 a comparison overview is provided, and in sections 7.2 through 7.4 the 16

protocols are compared with respect to resource usage, mobility, and route discovery delay, respectively. 7.1 Overview Being a proactive protocol, OLSR imposes large control traffic overhead on the network. Maintaining an up-to-date routing table for the entire network calls for excessive communication between the nodes, as periodic and triggered updates are flooded throughout the network. The use of MPR s decrease this control traffic overhead, but for small networks the gain is minimal. The traffic overhead also consumes bandwidth. The reactiveness of ODV is more sensitive to resource usage. s control traffic is almost only emitted during route discovery, most of the resource and bandwidth consumption is related to actual data traffic. 7.2 Resource usage Because information about the entire network need to be maintained at all times, OLSR require relatively much storage complexity and usage. Hence, there is a greater demand for storage capacity of nodes in such networks. lso, the control overhead adds to the necessary processing in each node, hence increasing the battery depletion time. nother downside to OLSR is that it must maintain information about routes that may never be used, hence wasting possibly scarce resources. ODV, on the other hand, only information about active routes are stored at a node, which greatly simplifies the storage complexity and reduces energy consumption. The processing overhead is also less than with OLSR, as little or no useless routing information is maintained. 7.3 Mobility OLSR and ODV have different strengths and weaknesses when it comes to node mobility in MNETs. Unlike wired networks, the topology in wireless ad hoc networks may be highly dynamic, causing frequent path breaks to ongoing sessions. When a path break occurs, new routes need to be found. s OLSR always have up-to-date topology information at hand, new routes can be calculated immediately when a path break is reported. Because ODV is a reactive protocol, this immediate new route calculation is not possible, so a route discovery must be initiated. In situations where the network traffic is sporadic, OLSR offers less routing overhead due to having found the routes proactively. ODV, on the other hand, will have to first discover a route before the actual information can be transmitted. This calls for extensive control overhead per packet. In cases where the network traffic is more or less static (i.e., the traffic has a long duration), however, ODV may perform better, as the amount of control overhead per packet decreases. 17

7.4 Route discovery delay When a node in a network running the OLSR protocol wished to find the route to a host, all it has to do is do a routing table lookup, whereas in a ODV network, a route discovery process need to be initialized unless no valid route is cached. It goes without saying that a simple table-lookup takes less time than flooding the network, making the OLSR protocol performance best in delay-sensitive networks. 8 Conclusion In this paper the two MNET routing protocols, OLSR and ODV, were compared. Furthermore, an overview of wireless networks were given, along with a general introduction to MNETs and related routing protocol classifications. 8.1 The protocols ODV and OLSR both have distinctive characteristics which makes the one better suited than the other one, depending on the setting. s OLSR must maintain an up-to-date routing table at all times, a decrease in network performance is expected as more network overhead is needed. Most control overhead in ODV is related to route discovery, which is initiated when a path break occurs. In networks with low mobility, path breaks occurs less frequently, making ODV perform well. OLSR will perform best when the traffic is sporadic, that is, when the traffic can benefit from having found a route proactively. This follows from that the single packet transmission delay is relatively small compared to running a route request protocol, as is done in ODV. For long duration traffic, however, ODV might perform better. In networks with more or less static connectivity (i.e., little mobility), ODV performs best. The control overhead is kept at a minimum, so both bandwidth and energy consumption by control overhead is greatly reduced. These points make ODV more suited to resource and bandwidth critical situation. 8.2 Future work s both ODV and OLSR are relatively mature MNET routing protocols, it would be interesting to see how well selected features can be utilized in other routing protocols. The author will, in his master thesis, study the well known OSPF routing protocol extended with selected OLSR mechanisms. References [1] T. Clausen and P. Jacquet. "Optimized Link State Routing (OLSR) Protocol ". RFC 3626, October 2003. Experimental. 18

[2] IEEE Computer Society LN MN Standards Committee. IEEE 802.11: Wireless LN Medium ccess Control and Physical Layer Specifications, ugust 1999. [3] S. Corson and J. Macker. "Mobile d Hoc Networking (MNET)". RFC 2501, January 1999. Informational edition. [4] C. Siva Ram Murthy and B. S. Manoj. d Hoc Wireless Networks, rchitectures and Protocols. Prentice Hall, 2004. [5] Charles E. Perkins. Mobile networking in the internet. Mob. Netw. ppl., 3(4):319 334, 1999. [6] Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir R. Das. "d hoc On-Demand Distance Vector (ODV) Routing Protocol". RFC 3561, July 2003. Experimental. [7] ndrew Tanenbaum. Computer Networks. Prentice Hall Professional Technical Reference, 2002. 19