Está en la página 1de 104
OCT-11-2082 11:19 FROM: e Mobile Ad hoc Networking To: 815 642 eE52 Elizabeth M. Belding-Royer University of California, Santa Barbara Sung-Ju Lee Hewlett Packard Laboratories vtSB “tag, Why Go Wireless? » Mobile wireless networks « Enable anywhere/anytime connectivity = Bring computer communications to areas without pre-existing infrastructure = Enable mobility « Enable new applications « Are an exciting new research area P.ea1-aE4 OCT-11-2082 11:19 FROM: “ae Types of Wireless Networks - Infrastructured Networks » Fixed, wired backbone » Mobiles communicate directly with access points » Suitable for locations where access points can be placed Types of Wireless Networks Infrastructureless Networks (Ad hoc networks) = No wired backbone » All nodes are capable of movement « All nodes serve as routers (multi-hop routes) = Reduced administrative cost + Ease of deployment TO: 615 642 eE52 Pieee-an4 OcT-11-2082 11:19 FROM: * hoc Network Applications = Spontaneous networking (conferences, college campuses, businesses, in-field research) » Battlefield = Emergency search-and-rescue » Rooftop networks = Personal area networks * Mobility Characteristics a Nodes » Limited power » Few resources = Dynamic topology » Addressing « Wireless channel = High error rates «= High quality variability » Low bandwidth: = Broadcast nature Security issues Aa TO: 815 642 eE52 Pees-en4 OCT-14-2002 11:19 FROM: TO: 815 642 ea5e P.204-e24 Notes = A lot of recent work in this area = Cannot cover everything in this tutorial = Will study some of the most well-known protocols in detail; will introduce others = Terminologies may be used differently for different protocols (@.g., sequence numbers) wg lutorial Roadmap Medium Access Control (IEEE 802.11) Unicast ‘= Proactive (DSDY) = Reactive (AODV, DSR) = Geographical (LAR) = Clustering/Hierarchical Multicast 1» Tree-based (MAODV) = Mesh-based (ODMRP) 1» Geographical (LEM) ‘Transport Other Issues and Future Directions OCT-11-2082 11:19 FROM: To: 815 642 eE52 P.eas-e24 Further Readings _ = Charles Perkins, Ed., “Ad Hoc Networking,” Addison-Wesley, Dec, 2000, = IETF MANET Working Group, http://www etf-org/html.charters/manet-charter.html Proceedings of the IEEE, vol. 75, no. 1, Jan 1987 Recent ad hoc networks special issues from + TEE JSAC, vol, 17, no. 8, Aug 1989 «= IEEE Personal Communications Magazine, vol. 8, no. 1, Feb 2001. + TEE Communications Magazine, vol 29, no. 6, Jun 2004 © ACM/Kiuwer MONET, vol. 4, no, 3, Oct 1999 + Stil more coming... = Recent proceedings from MobiHoc, MobiCom, Infocom, GlobeCom, ICC, WCNC, ICCCN, etc. Medium Access Control (MAC) " Protocols OCT-11-2082 11:19 FROM: To: 815 642 eE52 : Motivation = Why do we need a different MAC layer for ad hoc networks? + Mobility + Different network characteristics than wired environment + Power management + Bandwidth + Interference = Security = CSMA/CD (Ethernet) doesn’t work with half-duplex radios * Other Problems idden terminal problem » Even if the medium is free near the transmitter, it may not be free near the intended receiver = Exposed terminal problem » Even if the medium is busy near the transmitter, it may be free near the intended receiver P.e26-024 D 2 2ar- eed OCT-14-2002 11:19 FROM: TO: 815 642 ea5e Pear. ~ Hidden Terminal Problem Will collide with ‘wansmission froma A at B Exposed Terminal Problem ‘Cannot send to D due t canter sense OCT-11-2002 11:20 FROM: TO: 815 642 ea5e P.2e6-824 Previous Wireless MAC Schemes a CSMA = Cartier sense before transmitung a MACA = Uses RTS/CTS to acquire the channel before transmitting = FAMA = Similar to MACA but with carrier sense = MACAW = Similar to MACA but with extra control frat ‘acknowledgements, different backoff scheme’ and separation of streams IEEE 802.11 = Physical Layer Specifications = DSSS; Direct Sequence Spread Spectrum » FHSS; Frequency Hopping Spread Spectrum « Infrared (IR) pulse position modulation OCT-11-2082 11:28 FROM: To: 815 642 eE52 P.e29-eE4 IEEE 802.11 = MAC Layer » Distributed Coordination Function (DCF) += Allows for ad hoc network communication between cls nodes * (RTS/CTSyDat » Point Coordination Function (PCF) = Implemented on top of DCF, if access points are: CSMA/CA with ACK, virtual carrier sense te/ACK) keene Veco pay “au, CSMA/CA » Carrier sense: When a node wishes to transmit @ packet, it first waits until the channel is idle + Station wishing to broadcast senses the channel + If channel is busy, defer transmission «= If channel is not busy, transmit = Collision avoidance: Once channel becomes idle, the node waits for a randomly chosen duration before attempting to transmit «If medium is busy, run exponential backoff algorithm + If medium is not busy, it must remain free for ‘specified interval before station can transmit OCT-11-2082 11:28 FROM: To: 815 642 eE52 P.e1e-224 <-> E Virtual Carrier Sense = For unicast transmissions only «= Request to Send (RTS) Packet «= Check if OK to send to receiver = Clear to Send (CTS) Packet = Receiver says OK to send = Virtual Carrier Sense Indicator of 3rd party = Network Allocation Vector set when overhearing either RTS or CTS packet, same as physical carrier sense indicates busy * Hidden Terminal Avoidance 10 OCT-11-2082 11:28 FROM: To: 815 642 eE52 P.e11-eE4 B controls medium, transmitting to C. A in range of B only, D in range of C only. a E_ Positive Acknowledgement = The receiving station checks the CRC and sequence number of the arriving packet, and sends an acknowledgement packet it OCT-11-2082 11:28 FROM: To: 815 642 eE52 P.e12-224 + Exponential Backoff Algorithm = Select random number of slot times to defer transmission, keep as a state variable = After channel has been idle for specified interval, decrement variable after each idle slot passes = If carrier Is sensed, freeze variable countdown, wait for channel to become idle again and resume countdown Example | Bi~25 B1=5 ‘ait _ t i wait B2=20 B2=15 B2=10 B1 and B2 are backoff intervals at nodes # and 2 12 OCT-14-2002 11:26 FROM: “he Exponential Backoff Algorithm = No response from RTS or lost ACKs necessitates retransmission «= Contention window is doubled, until reaching CWrax = After successful transmissions » Contention window reset to CWrin a MAC Summary _ = Designing MAC protocols for ad hoc networks is very difficult # Issues to consider: = Hidden/exposed terminal = Collision avoidance «= Congestion control » Fairmess = Reliability = Energy efficiency = IEEE 802.11 DCF (RTS/CTS/DATA/ACK) widely used, but many other protocols are proposed 13 TO: 815 642 ea5e P.e1s-ec4 OCT-11-2082 11:21 FROM: + Further Readings _ # Lots of MAC protocols published in MobiCom, Infocom, GlobeCom, ICC, Mobittoc, WCNC, VTC, ete, = CSMA: L. Kleinrock and F.A. Tobagi, "Packet Switching in Radio Channels: Part I-Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics,” EEE Transactions on Communications, vol. COM-23, no. 12, Dec. 1975, pp. 1400-1416. MACA: P. Karn, "MACA — A New Channel Access Protocol for Packet Radio,” ARRL/CRRL Amateur Radio S* Computer Networking Conference, 1990, pp. 134-140. > Further Readings Il » FAMA: C.L. Fullmer and J.J. Garcla-Luna-Aceves, “Floor Acquisition Multiple Access (FAMA) for Packet-Radio Networks,” Proceedings of ACM SIGCOMM'95, Cambridge, MA, Aug, 1995, pp. 262-273. MACAW: V. Bharghavan, A. Demers, S, Shenker, and L. Zhang, "MACAW: A Media Access Protocol for Wireless LANs," Proceedings of ACM SIGCOMM'94, London, UK, Sep. 1994, pp. 212-225. IEEE Computer Society LAN MAN Standards Committee, “Wireless LAN Medium Access Protocol (MAC) and Physical Layer (PHY) Specification,” IEEE Std 802.11 USM IMAAHELLINLIMELLILLMELANLLAELALAEI 14 To: 815 642 eE52 Pie1aen4 OCT-11-2082 11:21 FROM: To: 815 642 eE52 + Goals Ill = Minimal control overhead = Minimal processing overhead = Multi-hop path routing capability = Dynamic topology maintenance = No loops «= Self-starting P.e15-224 AS. OCT-11-2082 11:21 FROM: To: 815 642 eE52 + 2 Primary Approaches = Proactive + Based on traditional distance-vector and link-state Protocols = Each node maintains route to each other network node » Periodic and/or event triggered routing update exchange + Higher overhead in most scenarios » Longer route convergence time = Examples: DSDV, TBRPF, OLSR 2 Primary Approaches (cont.) = Reactive (on-demand) = Source build routes on-demand by “flooding” » Maintain only active routes = Route discovery cycle = Typically, less control overhead, better scaling Properties = Drawback: route acquisttion latency + Example: AODV, DSR P.a16-224 16 OCT-14-2002 11:21 FROM: To: 815 642 Babe FUT TTL _ Destination-Sequenced * Distance-Vector (DSDV) Routing = Proactive = Each node maintains its own sequence number + Updates at each change in neighborhood information «= Used for loop freedom = Each node maintains routing table with entry for each node in the network DSDV: Routing Updates = Each node periodically transmits updates = Includes its own seq#, route table updates = Nodes also send routing table updates for important link changes (i.e., link breaks) = When two routes to a destination received from two different neighbors = Choose the one with the greatest destination sequence number = If equal, choose the smaller hopcount A P.e17-@24 OCT-11-2082 11:21 FROM: To: 815 642 eEse P.e16-024 DSDV: Full Dump/ Incremental Updates = Full dumps = Cary all routing table information « Transmitted relatively infrequently = Incremental updates = Carry only information changed since last full dump = Fits within one network protocol data unit (NPDU) « When updates can no longer fit in one NPDU, send full dump * L_DSDV: Link Additions oe. B’s Route Table: ase Gier Dime ot E15S.D.2 1. Node A joins network 18 OCT-11-2082 11:21 FROM: To: 815 642 eEs2 | + DSDV: Link Additions 5.8.0 oe 1 B1ss.b.2 1. Node A joins network 2. Node A transmits routing table: + DSDV: Link Additions B’s Route Table: 212.30 e1ec1 (D,202,D.1 E18D,2 A101 dt 1. Node A joins network 2, Node A transmits routing table: 2. Node receives transmission, inserts into route table P.219-224 ae | | OCT-11-2082 11:22 FROM: To: 815 642 eESe + DSDV: Link Additions B’s Route Table: Blind aie cy D2D.1 2155.02 ALA 4 Node 2 propagates new route information to neighbors: > DSDV: Link Additions asi B's Route Table: ; Lc 4,101.4, 1 4. Node & propagates new route information to neighbors: 8. Neighbors update their routing tables with , and continue propagation of information a MRL AML IAEA SALINE LLALL LALLA P.ee6-024 20 OCT-11-2082 11:22 FROM: To: 615 642 eE52 = DSDV: Link Breaks — 4101.4, 1. Link between Band D breaks * L_DSDV: Link Breaks 5 lll, _& See ain G 144.1 @—@ 2d E156, D2 4, 101,4)1 a. Link between Band D breaks 2 Node Bnotices break 1. Updates hopcount for Dand Eto be infinity > Increments seq# for Dand F P.ge1-0E4 21 a 2 P.eee-e24 OCT-11-2002 11:22 FROM: To: 815 642 ea5e vg DSDV: Link Breaks mies e—@ DB, 203, De £156, 0. 4,102,4,] 1, Link between Band D breaks 2 Node Bnotices break 2 Updates hopcount for Dand Fo be infinity 2 Increments seq# for Dand E 2. Node &sends update with new route information DSDV: Damping Route Fluctuations = Settling time: time to get all the updated advertisements for a route = Walt settling time before advertising new routes with higher metric to prevent frequent route update ‘transmissions » Maintain table with weighted average settling time and last settling time for neighbors and destinations To: 815 642 ex52 OCT-11-2082 11:22 FROM: > DSDV: Summary = Proactive = Routes maintained through periodic and event triggered routing table exchanges = Incremental dumps and settling time used to reduce control overhead Proactive protocols tend to perform best in networks with low to moderate mobility, few nodes, and many data sessions aT TTC ELLEN ULLT Ad hoc On-Demand Distance * s Vector (AODV) Routing = Reactive = Route discovery cycle used for route finding «= Maintenance of active routes «= Sequence numbers used for loop prevention and as route freshness criteria = Descendant of DSDV = Provides unicast and multicast communication | 623-024 ea 41-2002 11:22 FROM: To: 815 642 eEs2 P.ee4-eR4 ocT-44- : i LEO + » AODV: Route Discovery 1. Node Sneeds a route to D TUTTLE cs * AODV: Route Discovery ~@-—@ 1. Node Sneeds a route to D 2 Creates a Route Request (RREQ) Enters D's IP addr, seq#, S's IP addr, seq# hopcount (=0) 24 528-180" > AODV: Route Discovery 1 Node Sneeds a route to D 2 Creates a Route Request (RREQ) Enters D's IP addr, seqi#, ‘S's IP addr, seq# hopcount (=0) 3. Node Sbroadcasts RREQ to neighbors ~~ __ AODV: Route Discovery S RREQS ac — 4. Node A receives RREQ = Makes reverse route entry for $ dest=, nexthop=5, hopent=1 = Ithas no route to D, so it rebroadcasts RREQ 2500 BPO Ste :OL 25 HOM $2TT 2002-11-10 4 AODV: Route Discovery ai. 4. Node A receives RREQ = Makes reverse route entry for $ dest=5, nexthop= 5, hopent=1 = Tt has no route to 0, so it rebroadcasts RREQ * AODV: Route Discovery os, s. Node Creceives RREQ + Makes reverse route entry for 5 dest=5, nexthop=A, hopent=2 = Ithasa route to 2, and the seq# for route to D is >= Ds seq# in RREQ 26 528-200'd 2500 3b9 ste :OL HOM $2TT 2002-11-10 ev: Route Discovery a s. Node Creceives RREQ (cont.) = Ccreates a Route Reply (RREP) Enters Os IP addr, seqi# $6 IP addr, hopcount to D(= 1) = “Unicasts RREP to A * AODV: Route Discovery s. Node Creceives RREQ (cont.) = Ccreates a Route Reply (RREP) Enters Ds IP addr, seq# Ss IP addr, hopcount to D(= 1) = Unicasts RREP to 4 27 S2B-£00"d 2500 3b9 ste :OL HOM $2TT 2002-11-10 gy ADV: Route Discovery «6 Node A receives RREP «Makes forward route entry to D dest = D, nexthop = G hopcount = 2 = Unicasts RREP to S CUNT INTMINIMI IMMA EMI tO IKE MIKI * AODV: Route Discovery 7 Node Sreceives RREP » Makes forward route entry to D dest = D, nexthop = 4, hopcount = 3 28 S2B-b20"d 2500 3b9 ste :OL HOM $2TT 2002-11-10 * AODV: Route Discovery 7. Node Sreceives RREP = Makes forward route entry to D dest = 2, nexthop = A, hopcount = 3 + Sends data packets on route to D oi A0DV Route Maintenance RERR 1 Link between Cand D breaks 2 Node Cinvalidates route to Din route table 3 Node Ccreates Route Error (RERR) message ‘= Usts all destinations which are now unreachable = Sends to upstream neighbors 29 528-500" 2500 Sho Ste OL HOM $2TT 2002-11-10 528-500" hv: Route Maintenance RERR wenn @ 4. Node A receives RERR = Checks whether Cis its next hop on route to D = Deletes route to D Forwards RERR to $ Av: Route Maintenance i @ s. Node Sreceives RERR = Checks whether is its next hop on route to D = Deletes route to D Rediscovers route if still needed 2500 3b9 ste :OL 30 HOM $2TT 2002-11-10 foo Optimizations » Expanding Ring Search «= Prevents flooding of network during route discovery = Control Time To Live (TTL) of RREQ to search incrementally larger areas of network «= Advantage: Less overhead when successful » Disadvantage: Longer delay if route not found immediately ma AODv: Optimizations (cont.) = Local Repair = Repair breaks in active routes locally instead of notifying source + Use small TTL because destination probably hasn't moved far «= If first repair attempt is unsuccessful, send RERR to source = Advantage: repair links with less overhead, delay and packet loss = Disadvantage: longer delay and greater packet loss when unsuccessful 31 520-200'd 2500 3b9 ste :OL HOM $2TT 2002-11-10 we AOD: Summary _ = Reactive/on-demand » Sequence numbers used for route freshness and loop prevention = Route discovery cycle = Maintain only active routes = Optimizations can be used to reduce overhead and increase scalability he Dynamic Source Routing (DSR) = Reactive = Route discovery cycle used for route finding = Maintenance of active routes « Utilizes source routing 32 528-600'd 2500 3b9 ste :OL HOM $2TT 2002-11-10 -" - DSR: Route Discovery 1 Node Sneeds a route to D 2 Broadcasts RREQ packet * DSR: Route Discovery 1. Node Sneeds a route to 0 2. Broadcasts RREQ packet 3. Node A receives packet, has no route to D Rebroadeasts packet after adding its address to source route 33 ea-coa'd 2500 3b9 ste :OL HOM $2TT 2002-11-10 4 DSR: Route Discovery 1 Node Sneeds a route to D 2. Broadcasts RREQ packet 3. Node A receives packet, has no route to D = Rebroadcasts packet after adding its address to source route * DSR: Route Discovery 4. Node Creceives RREQ, has no route to D + Rebroadcasts packet after adding its address to source route 34 S28-010"d 2500 3b9 ste :OL HOM $2TT 2002-11-10 = DSR: Route Discovery 4, Node Creceives RREQ, has no route to D + Rebroadcasts packet after adding its address to ‘source route - DSR: Route Discovery 4. Node Creceives RREQ, has no route to D = Rebroadcasts packet after adding its address to source route s. Node Dreceives RREQ, unicasts RREP to C 7 a source route accumulated in RREQ into 35 S2B-T18"d 2500 3b9 ste :OL HOM $2TT 2002-11-10 S2B-210"d eee: Route Discovery em 4. Node Creceives RREQ, has no route to D = Rebroadcasts packet after adding its address to source route s. Node Dreceives RREQ, unicasts RREP to C = Puts source route accumulated in RREQ into RREP , DSR: Route Discovery s. Node Creceives RREP = Unicasts to A 2500 3b9 ste :OL :HOMd SBT 2002-11-10 36 > DSR: Route Discovery s. Node A receives RREP = Unicasts to $ ae, DSR: Route Discovery CHS «. Node Sreceives RREP = Uses route for data packet transmissions 2500 3b9 ste :OL 37 :HOMd SBT 2002-11-10 AODV and DSR Differences = DSR uses source rol 7 AODV uses next hop entry «= DSR uses route cache; AODV uses route table » DSR route cache entries do not have lifetimes; AODV route table entries do have lifetimes » DSR nodes respond to each RREQ duplicate; AODV nodes only respond to first RREQ, unless one arrives along a better path a Location-Aided Routing (LAR) = Exploits location information to limit scope of RREQ flood = Location information obtained using GPS = All nodes must maintain their current location » Expected Zone: region that is expected to hold the current location of the destination + Expected region determined based on potentially old Saad information, and knowledge of the destination’s = RREQs limited to a Request Zone that contains the Expected Zone and location of the sender node 38 S2B-bT0"d 2500 3b9 ste :OL :HOMd SBT 2002-11-10 S28-S18"d ie LAR: Expected Zone D = last known location of node D, at time 10 D’= location of node D at current time tt, unknown to node $ = (tt -t0)* estimate of D's speed ab LAR = The request zone is the smallest rectangle that includes the current location of the source and the expected zone = Only nodes within the request zone forward route requests » Node A does not forward RREQ, but node B does = Request zone explicitly specified in the RREQ = Each node must know its physical location to determine whether it is within the request zone 39 2500 3b9 ste :OL :HOMd SBT 2002-11-10 LAR: Request Zone Network Space Xe Ys) ‘Xp Yd) LAR = If route discovery using the smaller request zone fails to find a route, the sender initiates another route discovery (after a timeout) using a larger request zone » The larger request zone may be the entire network = Rest of route discovery protocol similar to DSR. 40 S2B-910"d 2500 3b9 ste :OL :HOMd SBT 2002-11-10 LAR: Adaptive Request Zone « Each node may modify the request zone included in the forwarded request = Modified request zone may be determined using more recent/accurate information, and may be smaller than the original request zone Request zone adapted by B juest zone defined by sender S * LAR: Implicit Request Zone 1 Source implicity defines a request zone as the clstance from the current location of the forwarding node to the previous location of the intended destination; incudes this distance In route request 1 For example, on receiving a request from node S, node Y forwards the request since its distance to Dis shorter than the distance from S to D, ‘whereas node X discards it ‘= The motivation is to attempt to bring the route request physically closer to the destination node after each forwarding —p *, Mai ee Rey, 4 SPB-L18'd 2500 3b9 ste :OL :HOMd SBT 2002-11-10 Location-Aided Routing = The basic proposal assumes that, ‘tially, location. information for node X becomes knawn to Y only during a route discovery = This location information is used for a future route discovery 1» Each route discovery yields more updated information which Is used for the next discovery Variations = Location information can also be piggybacked on any message from Y to X = Y may also proactively distribute its location information + Location-Aided Routing (LAR) » Advantages » Reduces the scope of RREQ flood » Reduces overhead of route discovery » Disadvantages = Nodes need to know their physical locations = Does not take into account possible existence of obstructions for radio transmissions 42 S2B-810'd 2500 3b9 ste :OL MOMs SBT 2002-11-10 Hybrid: Zone Routing Protocol (ZRP) = Proactive + reactive = Each node maintains a zone (e.g., 2 hops) » Intra-zone routing: proactive routing protocol for nodes within the zone » Inter-zone routing: reactive routing protocol for nodes outside the zone » Bordercasting: Peripheral nodes (nade that are in the border of the zone) perform on-demand flooding . Clustering/Hierarchical Routing = Impose hierarchical topology on netwoi + Cluster leaders may serve as cluster representatives + Control may be distributed = Many clustering options » Overlapping clusters/disjoint clusters + One-level hierarchy/multi-level hierarchy 43 S2B-610"d 2500 3b9 ste :OL MOMs SBT 2002-11-10 528-020'd +> Example Cluster Topology = Each node communicates with its cluster leader = Gateways interconnect clusters » Joint/distributed gateways connect non-overlapping clusters Cluster Formation « Clusters may be formed by = Geographical location « Functional relationships » Cluster leaders may be elected by « Highest ID algorithms = First come, first cluster leader 2500 3b9 ste :OL MOMs SBT 2002-11-10 Cluster Leader Maintenance » Clustering protocols typically have cluster leader selection and revocation schemes Selection - nodes may become cluster leaders if they wander out of the transmission range of all other cluster leaders = Revocation ~ to prevent a continual growth in the number of cluster leaders, there must be a mechanism for cluster leaders to become non- leaders Revocation Algorithms = When two cluster leaders come into contact, one must give up its leadership status » ID-based algorithms » Weight-based algorithms = Cluster member-based algorithms » Subset-based algorithms 45 S28-T20"d 2500 3b9 ste :OL MOMs SBT 2002-11-10 Tee GF eof = Physical sUbnet: disjoint thistefe based on physical locality = Virtual subnet: routing backbone connecting nodes within multiple physical subnets = Node addresses are “

También podría gustarte