Ad-Hoc Wireless Networks: Architectures and Protocols Ch. 8.6: Tree-Based Multicast Routing Protocols

Similar documents
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

Location Information Services in Mobile Ad Hoc Networks

Tomás P. de Miguel DIT-UPM. dit UPM

Architectural Framework for Large- Scale Multicast in Mobile Ad Hoc Networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Location-Aided Routing (LAR) in mobile ad hoc networks

Simulation of Internet Connectivity for Mobile Ad Hoc Networks in Network Simulator-2

Wireless Mesh Networks under FreeBSD

Study And Comparison Of Mobile Ad-Hoc Networks Using Ant Colony Optimization

Ad hoc quality of service multicast routing *

Study of Network Characteristics Incorporating Different Routing Protocols

IP Multicasting. Applications with multiple receivers

A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network

Adapting Distributed Hash Tables for Mobile Ad Hoc Networks

Understanding and Exploiting the Tradeoffs between Broadcasting and Multicasting in Mobile Ad Hoc Networks*

MPLS Part II - Recovery

Performance of VoIP strategies for hybrid Mobile Ad Hoc Networks

Security in Ad Hoc Network

DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks

Definition. A Historical Example

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 10 LAN REDUNDANCY. Scaling Networks

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

A Routing Method for Top-k Query Processing in Mobile Ad Hoc Networks

Dynamic Source Routing in Ad Hoc Wireless Networks

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

LIST OF FIGURES. Figure No. Caption Page No.

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

Tema 5.- Seguridad. Problemas Soluciones

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

OSPF Routing Protocol

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

TRILL for Data Center Networks

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Computer Networks. Main Functions

Introduction to IP Multicast Routing

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

- Multicast - Types of packets

An efficient and flexible MPLS signaling framework for mobile networks

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

ACHILLES CERTIFICATION. SIS Module SLS 1508

Distance Vector Routing Protocols. Routing Protocols and Concepts Ola Lundh

6LoWPAN Technical Overview

How To Write A Transport Layer Protocol For Wireless Networks

Layer 3 Routing User s Manual

Cross Layer TCP Congestion Control Load Balancing Technique in MANET

Issues in Scalable Clustered Network Architecture for Mobile Ad Hoc Networks

A Study of Dynamic Addressing Techniques in Mobile Ad hoc Networks

RESOURCE DISCOVERY IN AD HOC NETWORKS

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Link-State Routing Protocols

An Extended AODV Protocol to Support Mobility in Hybrid Networks

A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications

Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Introduction to IP v6

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Zone Routing Protocol (ZRP)

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

OSPF Version 2 (RFC 2328) Describes Autonomous Systems (AS) topology. Propagated by flooding: Link State Advertisements (LSAs).

An Overview of ZigBee Networks

Chapter 10 Link-State Routing Protocols

Denial of Service in Sensor Networks

A Survey of Mobile Ad Hoc network Routing Protocols*

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

VXLAN: Scaling Data Center Capacity. White Paper

Multihoming and Multi-path Routing. CS 7260 Nick Feamster January

Scalable Routing Protocols for Mobile Ad Hoc Networks

Security Threats in Mobile Ad Hoc Networks

MPLS Basics. For details about MPLS architecture, refer to RFC 3031 Multiprotocol Label Switching Architecture.

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

Congestion Controlled Adaptive Lightweight Multicast in Wireless Mobile Ad Hoc Networks

Hybrid Overlay Multicast Framework draft-irtf-sam-hybrid-overlay-framework-01.txt. John Buford, Avaya Labs Research

A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Survey on Load balancing protocols in MANET S (mobile ad-hoc networks)

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Congestion control in Mobile Ad-Hoc Networks (MANETs)

L + : Scalable Landmark Routing and Address Lookup for Multi-hop Wireless Networks

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin,

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Customer Specific Wireless Network Solutions Based on Standard IEEE

Internet Connectivity for Ad hoc Mobile Networks

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

International Journal of Advanced Research in Computer Science and Software Engineering

Transcription:

Ad-Hoc Wireless Networks: Architectures and Protocols Ch. 8.6: Tree-Based Multicast Routing Protocols C. Siva Ram Murthy, B. S. Manoj Antti Hyvärinen April 4., 2007 AHWNAP Ch. 8.6 p. 1/21

Practical Significance Multicast trees in ad-hoc networks emerge naturally from domains where Group of collaborators move in a new environment Collaboration is directed by one or more coordinators Such environments include Search and rescue missions Military campaigns Law enforcement Classrooms Conferences Requirements vary, for example QoS Military Multimedia AHWNAP Ch. 8.6 p. 2/21

Outline Cover the main types of multicast trees source-tree-based shared-tree-based Cover the main design criteria Optimize for memory Optimize for bandwidth Optimize for robustness Describe representative examples of tree-based multicast protocols AHWNAP Ch. 8.6 p. 3/21

Source-tree-based and shared-tree-based Source-tree-based: tree rooted at the source Performs well at heavy loads, due to efficient traffic distribution shared-tree-based: tree rooted at a rendez-vous point Scales well for multiple sources Tree links get overloaded with traffic Heavy dependence on the shared tree nodes I 2 D 2 I 2 D 2 S 1 I 1 D 3 S 1 I 1 D 3 S2 D 1 S2 D 1 AHWNAP Ch. 8.6 p. 4/21

Memory, Bandwidth, Energy and Robustness Memory: each node having routing information infeasible in large networks Bandwidth: certain protocols overload some network connections causing slowdown Energy: certain use excessive amounts of intermediate nodes causing unreliable multi-hop links and battery usage Added robustness: (e.g. link count) usually increases administrative overhead I 2 D 2 I 2 D 2 S 1 I 1 D 3 S 1 I 1 D 3 S2 D 1 S2 D 1 AHWNAP Ch. 8.6 p. 5/21

General: Building the multicast tree Tree construction performed by source or destination A new destination might be able to join after tree creation Route discovery by Flooding the full network or Sending to neighbors only Use caution to avoid loops Using possibly some existing infrastructure AHWNAP Ch. 8.6 p. 6/21

General: Recovering from link failure Link failure identified by Periodic querying by beacons (proactive) Timeouts (reactive) RTS/CTS information (hw-assisted) Link recovery initiated by The destination The upstream node AHWNAP Ch. 8.6 p. 7/21

Tree-based Routing Protocols: Examples Multicast Zone Routing Protocol Multicast Core-Extraction Distributed Ad-Hoc Routing Differential Destination Multicast Routing Protocol Weight-Based Multicast Protocol Preferred Link-Based Multicast Protocol Ad-Hoc Multicast Routing Protocol Not covered in this presentation are Bandwidth-Efficient Multicast Routing Protocol, Associativity-Based Ad-Hoc Multicast Routing, Multicast Ad Hoc On-Demand Distance Vector Routing, Ad-Hoc Multicast Routing Using Increased ID-Numbers and Adaptive Shared-Tree Multicast Routing AHWNAP Ch. 8.6 p. 8/21

Multicast Zone Routing Protocol Shared-tree source-initiated Each node is associated with a zone Inside the zone, node knows the topology Outside the zone, let border nodes do routing Source constructs a tree in two phases A 1 Send TREE-CREATE to all nodes in the zone A 2 Willing nodes reply with TREE-CREATE-ACK B 1 Send TREE-PROPAGATE to all nodes B 2 Border nodes send TREE-CREATE to respective zones AHWNAP Ch. 8.6 p. 9/21

MZRP (cont d) Source maintains tree by periodic TREE-REFRESH. If a node in the tree does not receive TREE-REFRESH, it removes the stale multicast Receiver R disconnected because of failing intermediate node I R sends TREE-JOIN to the zone and connects R sends JOIN-PROPAGATE to border nodes AHWNAP Ch. 8.6 p. 10/21

Multicast Core-Extraction Distributed Ad-Hoc Routing Assume there is an underlying mesh of core nodes which form a minimum dominating set for all nodes. The mesh, called mgraph, is used as a robust infrastructure for forwarding data Resulting multicast tree is a source-tree Core nodes are selected by election approximating the NP-complete problem have complete knowledge on dominated neighbors know the nearest core nodes in three-hop radius Multicast is based on reliable unicast AHWNAP Ch. 8.6 p. 11/21

MCEDAR (cont d) A new node C sends JoinReq to its dominator Loops are prevented by a decreasing identity in JoinReq A tree-node replies with JoinAck containing tree-node s identity The new node C accepts multiple JoinAck s depending on the robustness factor Node C might have downstream core nodes, for which communication is forwarded Link quality is measured and bad quality is propagated faster than good quality The protocol uses redundant links, combining the strengths of tree-based and mesh-based protocols AHWNAP Ch. 8.6 p. 12/21

Differential Destination Multicast Routing Protocol Source nodes manage the multicast group membership Destinations join the source by unicast Source piggy-backs queries periodically to refresh list of destinations Each node independently decides to operate in Stateless mode or Soft-state mode explained in the following slide AHWNAP Ch. 8.6 p. 13/21

DDM states (cont d) Stateless mode The route of the packet is coded in the data No need for complicated routing In large networks, overhead is high Soft-state mode Every node may cache the routing information The protocol needs not to list all destinations in every data packet When routes change, upstream node sends a difference to the destinations Significantly reduces the overhead AHWNAP Ch. 8.6 p. 14/21

Weight-Based Multicast Joining node R minimizes the cost to source by considering Number of required intermediate nodes Distance of R from source The joining is done by flooding a JoinReq with a TTL Tree nodes reply with a distance from source Distance is increased by each hop to the joining node Collect several of alternate routes The objective is to minimize function Q = (1 joinweight) (n h 1) + joinweight (n h + n s ) n h is the hop distance from joining node to tree node n s is the hop distance from tree node to source 0 joinweight 1 AHWNAP Ch. 8.6 p. 15/21

WBM (cont d) To maintain the tree with high packet delivery capability, link failures are predicted in the following way Neighbor nodes listen to communication in promiscuous mode When receiving a packet piggy-backed with TriggerHandoff, and node has information on the multicast tree, and Distance from the tree is less than the node s requesting handoff, the node sends HandoffConf to requesting node Requesting node selects the node nearest to the tree. If the handoff fails, rejoin. AHWNAP Ch. 8.6 p. 16/21

Preferred Link-Based Multicast A receiver-initiated protocol with local and tree-level topology, limiting forwarding nodes to preferred ones Neighbor-Neighbor Table (NNT) A list of neighbors of the node in two steps Used for quick repair of broken links Connect Table (CT) Tree information AHWNAP Ch. 8.6 p. 17/21

PLBM (cont d) No flooding of network required if NNT contains tree node Each node periodically sends a beacon with TTL Nearby nodes will know of a tree node by the beacon Otherwise, use algorithm to determine candidates for connection List potential nodes in the flood-packet Only listed nodes will respond to flooding (by forwarding or replying) Hopefully several good candidates, which receiver can choose from AHWNAP Ch. 8.6 p. 18/21

Ad-Hoc Multicast Routing A robust algorithm for high-mobility environment using underlying mesh Based on underlying IP network using IP unicast Builds a higher-level IP network tunnelled over the lower level IP Network is divided to groups having At least one logical core Selected by an election in case of multiple cores Can thus change dynamically zero or more normal nodes Network is periodically flooded by CREATE-TREE messages from cores AHWNAP Ch. 8.6 p. 19/21

AMRoute (cont d) Removing multiple cores Different segments may be joined by new nodes Two-core segment can be noticed by multiple tree creation messages In this case, a distributed core election algorithm is run by all nodes Adding a new core A disappeared core because of movement In a no-core segment, one of the nodes will announce itself as a core after a random period AHWNAP Ch. 8.6 p. 20/21

Summary Several different approaches exits for tree-based Ad-Hoc routing protocols Mesh-assisted Source-initiated Destination-initiated Stateless Semi-stateless And others Most reports on the use seem to be simulated The applicability of the methods are not known on practical domains, such as rescue missions, military campaigns and other domains AHWNAP Ch. 8.6 p. 21/21