Professional Documents
Culture Documents
skrishnam@iitm.ac.in, krishna.sivalingam@gmail.com
http://www.cse.iitm.ac.in/~skrishnam
Tutorial Outline
Introduction
Unicast routing
Implementation Results
Standards activities
1
Introduction
2
Multi-hop transmission
May need to traverse multiple links to reach a
destination
B B
A
A
C
C
D
D
Mobility
Mobility causes route changes
A B
A
B
C
C
D
D
3
Advantages of Ad Hoc Networks
Ease of deployment
Speed of deployment
Many Applications
Military environments
soldiers, tanks, planes
Emergency operations
Disaster recovery
Search-and-rescue
Policing and fire fighting
Civilian environments
Taxi cab network
Conference venues
Meeting rooms
Sports stadiums
Boats, small aircraft
4
MANET Variations
Fully Symmetric Environment
all nodes have identical capabilities and responsibilities
Asymmetric Capabilities
transmission ranges and radios may differ
battery life at different nodes may differ
processing capacity may be different at different nodes
speed of movement
Asymmetric Responsibilities
only some nodes may route packets
some nodes may act as leaders of nearby nodes (e.g.,
cluster head)
Variations, contd.
Traffic characteristics may differ in different ad hoc
networks
bit rate
timeliness constraints
reliability requirements
unicast / multicast / geocast
host-based addressing / content-based addressing /
capability-based addressing
10
5
Variations, contd.
Mobility characteristics
speed
predictability
• direction of movement
• pattern of movement
uniformity (or lack thereof) of mobility characteristics among
different nodes
11
Challenges
6
The Holy Grail
A one-size-fits-all solution
Perhaps using an adaptive/hybrid approach that can adapt
to situation at hand
Difficult problem
13
14
7
Unicast Routing
in
Mobile Ad Hoc Networks
15
16
8
Unicast Routing Protocols
17
9
Ideal Routing algorithm
Fully Distributed; Minimal Global State Maintenance
Minimal Routing Protocol Control Overhead
Fast Adaptation to Frequent Topology Changes
Converge to Optimal Routers Faster
Route Computation and Maintenance at a node must
depend upon a small number of nodes
Loop-Free Routes; and Freedom from Stale Routes
No. of Packet Collisions minimized by limiting the
number of broadcasts made by each node
Optimally use scarce resources (power, memory,
bandwidth)
Support QoS and Real-time traffic needs
19
Routing Protocols
Proactive protocols
Determine routes independent of traffic pattern
Traditional link-state and distance-vector routing protocols
are proactive
Reactive protocols
Determine and maintain routes only when needed
Hybrid protocols
20
10
Trade-Off
Latency of route discovery
Proactive protocols may have lower latency since routes are
maintained at all times
Reactive protocols may have higher latency because a route from
X to Y will be found only when X attempts to send to Y
21
Flat vs Hierarchical
Flat (Single Tier)
All nodes belong to one tier
Two-Tier Hierarchy
Nodes in Tier 1 send traffic to a designated node
• This can be single or multi-hop path
Designated nodes form Tier 2
• Packet is routed via Tier 2 nodes to Tier 2 node serving
destination node
Tier 2 can use different technology from Tier 1
• Longer-range, higher-BW links
• WiFi + WiFi (long-range0
WiFi+WiMAX
22
11
Overview of Unicast Routing Protocols
23
24
12
Flooding for Data Delivery
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
13
Flooding for Data Delivery
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
14
Flooding for Data Delivery
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
15
Flooding for Data Delivery
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
• Flooding completed
Z
S E
F
B
C M L
J
A G
H D
K
I N
16
Flooding for Data Delivery: Advantages
Simplicity
33
34
17
Flooding of Control Packets
Many protocols perform (potentially limited) flooding
of control packets, instead of data packets
35
36
18
Route Discovery in DSR
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
[S] Z
S E
F
B
C M L
J
A G
H D
K
I N
19
Route Discovery in DSR
Y
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
20
Route Discovery in DSR
Y
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
21
Route Discovery in DSR
43
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
22
Route Reply in DSR
45
46
23
Data Delivery in DSR
Y
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
48
24
DSR Optimization: Route Caching
Each node caches a new route it learns by any means
When node S finds route [S,E,F,J,D] to node D, node S also
learns route [S,E,F] to node F
When node K receives Route Request [S,C,G] destined for
node, node K learns route [K,G,C,S] to node S
When node F forwards Route Reply RREP [S,E,F,J,D], node F
learns route [F,J,D] to node D
When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D]
to node D
A node may also learn a route when it overhears Data packets
49
50
25
Use of Route Caching
[S,E,F,J,D]
[E,F,J,D]
S E [F,J,D],[F,E,S]
F [J,F,E,S]
B
C M L
J
A [C,S] G
H [G,C,S] D
K
I N
[S,E,F,J,D]
[E,F,J,D]
S E [F,J,D],[F,E,S]
F [J,F,E,S]
B
C [G,C,S] M L
J
A [C,S] G
H D
[K,G,C,S] K
I RREP N
RREQ
Z
When node Z sends a route request
for node C, node K sends back a route
reply [Z,K,G,C] to node Z using a locally
cached route 52
26
Use of Route Caching:
Can Reduce Propagation of Route Requests
[S,E,F,J,D] Y
[E,F,J,D]
S E [F,J,D],[F,E,S]
F [J,F,E,S]
B
C [G,C,S] M L
J
A [C,S] G
H D
[K,G,C,S] K
I RREP N
RREQ
Z
Assume that there is no link between D and Z.
Route Reply (RREP) from node K limits flooding of RREQ.
In general, the reduction may be less dramatic. 53
RERR [J-D] Z
S E
F
B
C M L
J
A G
H D
K
I N
Nodes hearing RERR update their route cache to remove link J-D 54
27
Route Caching: Beware!
Stale caches can adversely affect performance
55
56
28
Dynamic Source Routing: Disadvantages
Packet header size grows with route length due to source
routing
57
58
29
Flooding of Control Packets
59
60
30
AODV
Route Requests (RREQ) are forwarded in a manner
similar to DSR
61
Z
S E
F
B
C M L
J
A G
H D
K
I N
31
Route Requests in AODV
Y
Broadcast transmission
Z
S E
F
B
C M L
J
A G
H D
K
I N
63
Z
S E
F
B
C M L
J
A G
H D
K
I N
32
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
66
33
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
Z
S E
F
B
C M L
J
A G
H D
K
I N
34
Route Reply in AODV
An intermediate node (not the destination) may also send a
Route Reply (RREP) provided that it knows a more recent path
than the one previously known to sender S
69
Z
S E
F
B
C M L
J
A G
H D
K
I N
35
Data Delivery in AODV
Y
DATA
Z
S E
F
B
C M L
J
A G
H D
K
I N
Summary: AODV
72
36
Proactive Protocols
73
74
37
Optimized Link State Routing (OLSR)
[Jacquet00ietf,Jacquet99Inria]
The overhead of flooding link state information is
reduced by requiring fewer nodes to forward the
information
75
B F J
A E H
C K
G
D
38
Optimized Link State Routing (OLSR)
B F J
A E H
C K
G
D
B F J
A E H
C K
G
D
39
OLSR
79
Destination-Sequenced Distance-Vector
(DSDV) [Perkins94Sigcomm]
Each node maintains a routing table which stores
next hop towards each destination
a cost metric for the path to each destination
a destination sequence number that is created by the
destination itself
Sequence numbers used to avoid formation of loops
80
40
Destination-Sequenced Distance-Vector
(DSDV)
Assume that node X receives routing information
from Y about a route to node Z
X Y Z
81
Destination-Sequenced Distance-Vector
(DSDV)
Node X takes the following steps:
X Y Z
If S(X) < S(Y), then X sets Y as the next hop to Z, and S(X)
is updated to equal S(Y)
82
41
Unicast Routing: Summary
Several protocols and numerous variations have
been proposed and analyzed
Each protocol will be suitable for a particular
combination of network topology, mobility patterns
and traffic patterns/requirements
84
42
MANET Capacity
Consider a single channel shared by n nodes
Throughput per node: 1/n, on average
Consider a IEEE 802.11a/g channel at 54 Mbps
With single user: around 25-30 Mbps due to MAC overhead
Piyush Gupta and P.R.Kumar, 2000
Unit disk with n nodes; no mobility
Throughput per node: O(1/sqrt(n))
Li et.al., 2001
For a chain (linear) of ad hoc nodes, ideal capacity: 1/4 of channel;
simulation yields capacity of 1/7 of channel
Grossglauser and Tse, 2002:
Distribute packets to many intermediate nodes that relay packet to
destination when destination comes nearby
Throughput per node: O(1)
Piyush Gupta and P.R.Kumar, 2005
With multi-user coding, Throughput per node: O(1)
85
86
43
Capacity of Fixed Ad Hoc Networks
[Gupta00it]
87
44
Continues from last slide …
89
Confirms intuition
90
45
Measured Scaling Law [Gupta01]
91
Capacity
Open problem
92
46
Implementation Issues
93
Existing Implementations
94
47
DARPA TTNT Program Demo
DARPA’s Tactical Target Networking Technology (TTNT)
Program Demo in 2005
Fifteen terminals connecting multiple aircraft with a static ground
center and three mobile ground nodes
http://www.darpa.mil/ipto/Programs/ttnt/docs/TTNT_Demo.pdf
Demo highlights
Transmit data at 2 Mbps over 100 n. miles
Network capacity of 10 Mbps
Transmit data in less than 2ms
Multi-hop routing from aircraft to ground nodes
Data traffic: VoIP, Still Images, Streaming video, Internet access, Chat,
Email
95
96
48
ORBIT Testbed
Wireless Network Emulator (indoor) consisting of 400 802.11
a/b/g radios, from Rutgers Univ., USA
Network topology dynamically reconfigured via web interface
Available to both US and outside-US educational institutions
Virtual Mobility of nodes supports Brownian motion or random
waypoint model
97
Courtesy: http://www.orbit-lab.org/attachment/wiki/WikiStart/orbit-overview.jpg
98
49
Related Standards Activities
99
100
50
IETF MANET WG Group: Status
101
BlueTooth
HomeRF
Hiperlan/2
102
51
Future of MANET
Military, Disaster Recovery Applications
103
Thank you !!
52