Unit 5 Notes
Unit 5 Notes
Ad Hoc networks, localization, MAC issues, Routing protocols, global state routing (GSR), Destination
sequenced distance vector routing (DSDV), Dynamic source routing (DSR), Ad Hoc on demand distance
vector routing (AODV), Temporary ordered routing algorithm (TORA), QoS in Ad Hoc Networks, application.
NETWORK PROTOCOLS
INTRODUCTION
Since the ad hoc wireless network consists of a set of mobile nodes (hosts) that are connected by wireless
links, the network topology in such a network may keep changing randomly. Hence a variety of routing
protocols for ad hoc wireless networks has been proposed.
Mobility
low as possible.
congestion.
Hidden and exposed terminal problems
simultaneous transmission of those nodes that are not within the direct transmission range of the
receiver, but are within the transmission range of the receiver.
they are not within the direct transmission range of each other and hence do not know about the
presence of each other.
Figure: 3.2 Hidden Terminal problem with RTS-CTS Figure: 3.3 Exposed
Terminal Problem
the figure 3.3. Here, if a transmission from node B to another node A is already in progress,
node C cannot transmit to node D, as it concludes that its neighbor node B, is in transmitting mode and
hence should not interfere with the on-going transmission. Thus, reusability of the radio spectrum is
affected.
Resource Constraints
A routing protocol for ad hoc wireless networks should have the following characteristics:
scalable.
es.
network must have quick access to routes, that is, minimum connection setup time is desired.
state propagation control overhead.
-free and free from state routes.
by each node. The transmissions should be reliable to reduce message loss and to prevent the
occurrence of state routes.
be quick.
power.
Changes in remote parts of the network must not cause updates in the topology information maintained
by the node.
ertain level of quality of service (QoS) as demanded by the applications,
and should also offer support for time-sensitive traffic.
are updated frequently in order to maintain consistent and accurate network state information
TCS802 MOBILE COMPUTING
source-tree adaptive routing protocol (STAR) and cluster-head gateway switch routing protocol (CGSR).
Incremental updates: Takes a single network data packet unit (NDPU). These are used when
a node does not observe significant changes in the local topology.
Full dumps: Takes multiple NDPUs. It is done either when the local topology changes
significantly or when an incremental update requires more than a single NDPU.
Advantages
✓ Less delay involved in the route setup process.
✓ Mechanism of incremental update with sequence number tags makes the existing wired network
protocols adaptable to ad hoc wireless networks.
✓ The updates are propagated throughout the network in order to maintain an up-to-date view of
the network topology at all nodes.
Disadvantages
➢ The updates due to broken links lead to a heavy control overhead during high mobility.
➢ Even a small network with high mobility or a large network with low mobility can completely
choke the available bandwidth.
➢ It suffers from excessive control overhead.
➢ In order to obtain information about a particular destination node, a node has to wait for a table
update message initiated by the same destination node.
➢ This delay could result in state routing information at nodes.
TCS802 MOBILE COMPUTING
bellman-ford algorithm.
-to-infinity problem and to enable faster convergence, it employs a unique method
of maintaining information regarding the shortest distance to every destination node in the network and
penultimate hop node on the path to every destination node.
-to-date view of the network, every node has a readily available route to every
destination node in the network.
ns only one topology table, WRP uses a set of tables to maintain more accurate
information.
➢ Distance table (DT): contains the network view of the neighbors of a node. It contains a matrix
where each element contains the distance and the penultimate node reported by the neighbor for
a particular destination.
➢ Routing table (RT): contains the up-to-date view of the network for all known destinations. It keeps
the shortest distance, the predecessor/penultimate node, the successor node, and a flag indicating
the status of the path. The path status may be a simplest (correct) path or a loop (error), or
destination node not marked (null).
➢ Link cost table (LCT): contains the cost of relaying messages through each link. The cost of broken
link is ∞.it also contains the number of update periods passed since the last successful update was
received from that link.
➢ Message retransmission list (MRL): contains an entry for every update message that is to be
retransmitted and maintains a counter for each entry.
also checks the other neighbors’ distance, hence convergence is much faster than DSDV.
in figure below, where the source of the route is node 1 and destination is
node 15. As WRP proactively maintains the route to all destinations, the route to any destination node is
readily available at the source node.
oute from node 1 to node 15 has the next node as node 2. The
predecessor node of 15 corresponding to this route is route 12. The predecessor information helps WRP
to converge quickly during link breaks.
message to its neighbors with the link cost of the
broken link set to ∞. After receiving the update message; all affected nodes update their minimum
distances to the corresponding nodes. The node that initiated the update message then finds an alternative
route, if available from its DT. Figure 3.6 shows route maintenance in WRP.
Advantages
✓ WRP has the same advantages as that of DSDV.
✓ It has faster convergence and involves fewer table updates.
Disadvantages
➢ The complexity of maintenance of multiple tables demands a larger memory and greater
processing power from nodes in the adhoc wireless network.
➢ It is not suitable for highly dynamic and also for very large ad hoc wireless networks.
TCS802 MOBILE COMPUTING
They execute the path-finding process and exchange routing information only when a path is
required by a node to communicate with a destination
traversed
before forwarding it
transmissions
t packet during the route construction
phase
In figure 3.8, source node 1 initiates a RouteRequest packet to obtain a path for destination node 15
In fig 3.9, if the intermediate node 10 has a route to the destination via node 14, it also sends the
RouteReply to the source node
test and best route and uses that for sending data packets
Advantages
✓ Uses a reactive approach which eliminates the need to periodically flood the network with table
update messages
✓ Route is established only when required
✓ Reduce control overhead
Disadvantages
➢ Route maintenance mechanism does not locally repair a broken link
➢ Stale route cache information could result in inconsistencies during route construction phase
➢ Connection set up delay is higher
➢ Performance degrades rapidly with increasing mobility
➢ Routing overhead is more & directly proportional to path length
TCS802 MOBILE COMPUTING
th
packet transmission
-to-date path to the destination
identifier, the source sequence number, the
destination sequence number, the broadcast identifier and the time to live field
discarded
it’s BcastID
ed
-establishes the route to the destination if required
Figure: 3.10 Route establishment in AODV Figure: 3.11 Route maintenance in AODV
TCS802 MOBILE COMPUTING
Advantage
✓ Routes are established on demand and DestSeqNum are used to find latest route to the
destination
✓ Connection setup delay is less
Disadvantages
➢ Intermediate nodes can lead to inconsistent routes if the source sequence number is very old
➢ Multiple RouteReply packets to single RouteRequest packet can lead to heavy control overhead
➢ Periodic beaconing leads to unnecessary bandwidth consumption
Advantages
✓ Incur less control overhead
✓ Concurrent detection of partitions
✓ Subsequent deletion of routes
Disadvantages
➢ Temporary oscillations and transient loops
➢ Local reconfiguration of paths result in non-optimal routes
An internet is a combination of networks connected by routers. When a datagram goes from a source to
a destination, it will probably pass through many routers until it reaches the router attached to the
destination network.
Two-Node Instability
• Defining Infinity
– Most implementations define 16 as infinity
• Split Horizon
– Instead of flooding the table through each interface, each node sends only part of its
table through each interface
– E.g. node B thinks that the optimum routes to reach X is via A, it does not need to
advertise this piece of information to A
• Normally, the DV protocol uses a timer and if there is no news about a route, the node deletes
the route from its table
• In the previous e.g., node A cannot guess that this is due to split horizon or because B has not
received any news about X recently
– Poison Reverse
• Node B can still advertise the value for X, but is the source of information is A, it can replace
the distance with infinity as a warning
RIP
The Routing Information Protocol (RIP) is an intra-domain (interior) routing protocol used inside
anautonomous system. It is a very simple protocol based on distance vector routing. RIP implements
distance vector routing directly with some considerations.
RIP messages
• Request
– A request message is sent by a router that has just come up or by a router that has
sometime-out entries
– A request can ask about specific entries or all entries
• Response
– A response can be either solicited or unsolicited (30s or when there is a change in the
routing table)
TCS802 MOBILE COMPUTING
RIP Timers
• Periodic timer
– It controls the advertising of regular update message (25 ~ 30 sec)
• Expiration timer
– It governs the validity of a route (180 sec)
– The route is considered expired and the hop count of the route is set to 16
• Garbage collection timer
–A invalid route is not purged from the routing table until this timer expires (120 sec)
RIPv2 vs. RIPv1
• Classless Addressing
• Authentication
• Multicasting
– RIPv1 uses broadcasting to send RIP messages to every neighbors. Routers as well as
hosts receive the packets
– RIPv2 uses the all-router multicast address to send the RIP messages only to RIP
routers in the network
TCS802 MOBILE COMPUTING
Multicasting
• In multicast routing, the router may forward the received packet through several of its interfaces.
• Broadcasting is a special case of multicasting
TCS802 MOBILE COMPUTING
Multicasting Applications
• Access to distributed databases
• Information dissemination
• Dissemination of news
• Teleconferencing
• Distance learning
Multicast tree
• Objectives of multicasting:
• Every member of the group should receive one, and only one, copy of the multicast packet.
Nonmember must not receive a copy
• There must be no loops in routing
• The path traveled from source to each destination must be optimal
• In a source-based tree approach, the combination of source and group determines the tree
(DVMRP, MOSPF, PIM-DM)
• In the group-shared tree approach, the group determines the tree (CBT, PIM-SM)
Multicast Routing
• Optimal routing: Shortest path trees
• Unicast Routing
– Each router in the domain has a table that defines a shortest path tree to possible
destinations
TCS802 MOBILE COMPUTING
• In the group-shared tree approach, only the core router, which has a shortest path tree for
each group, is involved in multicasting
TCS802 MOBILE COMPUTING
MULTICASTING PROTOCOLS:
DVMRP: Strategies
• Flooding broadcasts packets, but creates loops in the systems
• Reverse path forwarding: RPF eliminates the loop in the flooding process
• Reverse path broadcasting: RPB creates a shortest path broadcast tree from the source to each
destination. It guarantees that each destination receives one and only one copy of the packet
• Problem with RPF
Part A Questions
Part B Questions