Unit 5 - Nra
Unit 5 - Nra
Ad hoc networks
OUTLINE:
• Introduction
• Classification
2
1. Introduction
W h a t we have in ad hoc environment:
• dynamically changing topology;
• absence of fixed infrastructure and centralized administration;
• bandwidth constrained wireless links;
• energy-constrained nodes.
3
1. Challenges of routing protocols in ad hoc networks
T h e following are the main challenges:
• Movement of nodes:
– Path breaks;
– Partitioning of a network;
– Inability to use protocols developed for fixed network.
4
2. Design goals
Goals that must be met:
• must be scalable;
• must be loop-free;
• must optimally use the scare resources: bandwidth, battery power, memory, computing;
5
2. Classification of routing protocols
Ro u ti n g protocols for ad-hoc wireless networks can be classifi ed based on:
• routing information update mechanism;
6
Based on routi ng informati on update mechanism
• Proactive (table-driven) routing protocols;
• Reactive (on-demand) routing protocols;
• Hybrid protocols.
7
Routing protocols for ad-hoc networks
8
Destination-Sequenced Distance-Vector Routing(DSDV)
Structured Transparent Accessible Reproducible(STAR)
cluster-head gateway switch routing(CGSR)
Optimized Link State Routing Protocol(OLSR)
Fisheye State Routing (FSR)
hierarchical routing protocol(HSR)
Global state routing(GSR)
Global state routing(GSR)
Ad-hoc On-demand Distance Vector(AODV)
Associativity-based routing (ABR)Signal Stability based Adaptive(SSA)
Flow-Oriented Routing Protocol
Preferred Link-based Routing(PLBR)
Core Extraction Distributed Ad Hoc Routing Protocol
Zone Routing Protocol
Zone-based Hierarchical Link State routing
Flow oriented routing protocol
Route-lifetime assessment based routing
Load balancing routing
Location-aided routing
Routing protocols for ad-hoc networks
1
0
Ad hoc networks D.Moltchanov, T U T, 2009
• + : low delay of route setup process: all routes are immediately available;
• − : high bandwidth requirements: updates due to link loss leads to high control overhead;
• R Ts are also exchanged when significant changes in local topology are observed by a node.
• full dumps:
– take place when significant changes of local topology are observed;
3 Dest Next Dist
1
6 3 2
6
5 3 2
4 4 2 2
2 5
T h e reconfi gurati on of path (used for ongoing data transfer) is done as follows:
• the end node of the broken link sends a table update message with:
– broken link’s weight assigned to infinity;
– sequence number greater than the stored sequence number for that destination.
• each node re-sends this message to its neighbors to propagate the broken link to the
network;
• even sequence number is generated by end node, odd – by all other nodes.
Note: single link break leads to the propagation of R T updates through the whole network!
3 3 Dest Next Dist
1 1
6 3 3
6
5 3 2
4 4 4 2 2
2 5 2 5 6
• node 5 receives update message, it informs neighbors about the shortest distance to node 6;
• this information is propagated through the network and all node updates their RTs;
Routi ng table in W R P.
Route maintenance in W R P.
Ad hoc networks D.Moltchanov, T U T, 2009
• Routi ng table containing the next-hop node for every destination cluster.
• if this node has a packet to transmit, it determines the destination cluster head and next-hop;
Cluster head
2
11
1
Source and destination
Destination
6
Source
5 9 12
14
7
15
8
Route path in C G S R .
4. Source-tree adaptive routing protocol ( S TA R )
T h e re are two protocols with diff erent aims:
• Least overhead routing approach ( LO R A ) :
– minimize control overhead irrespective of optimality;
• Optimum routing approach ( O R A ) :
– provide optimal routes irrespective of the control overhead;
8 3 8 3
5 5
1 4 1 4
2 2
8
R
12
7
9
10
13 6
4
5
2
14
S 16
Route establishment in D S R .
2. Ad hoc on-demand distance vector routing protocol
T h e major differences between A O D V and D S R are as follows:
• in D S R a data packet carries the complete path to be traversed;
• in AODV nodes store the next hop information (hop-by-hop routing) for
each data flow.
T h e RouteRequest packet in A O D V carries the following
informati on:
• the source identifier (SrcID): this identifies the source;
• the destination identifier (DestID): this identifies the destination to which
the route is required;
• the source sequence number (SrcSeqNum);
• the destination sequence number (DestSeqNum): indicates the freshness
of the route.
• the broadcast identifier (BcastID): is used to discard multiple copies of the
same RouteRequest.
• the time to live ( T T L ) : this is used to not allow loops.
T h e A O D V protocol performs as follows:
• when a node does not have a valid route to destination a RouteRequest is
forwarded;
• when intermediate node receives a RouteRequest packet two cases are
possible:
– if it does not have a valid route to destination, the node forwards it;
– if it has a valid route, the node prepares a RouteReply message:
• if the RouteRequest is received multiple times, the duplicate copies are
discarded:
– are determined comparing BcastID-SrcID pairs.
• when RouteRequest is forwarded, the address of previous node and its
BcastID are stored;
– are needed to forward packets to the source.
• if RouteReply is not received before a time expires, this entry is deleted;
• either destination node or intermediate node responses with valid route;
• when RouteRequest is forwarded back, the address of previous node and
its BcastID are stored;
R RouteRequest:
17 - DestSeqNum:5,
14 - SrcSeqNum: 2
13 Node 8:
11 - DestSeqNum 3;
12
Node 9:
16 - DestSeqNum 7;
8
6
9 7
10 1
2
5
S 4
11 12
16
8
6
9 7
10 1
2
5
S 4
8 Dest.
3 10
9
6
3 Source 7
4
• L A R type 2.
L A R type 1 algorithm works as follows:
• the sender explicitly specifies the RequestZone in the RouteRequest packet;
• the RequestZone is the smallest rectangle that includes the source and the
ExpectedZone;
• when the node is in ExpectedZone, the RequestZone is reduced to the
ExpectedZone;
• if the ReouteRequest packet is received by the node within RequestZone, it
forwards it.
1
L A R type 2 algorithm operates as follows:
• the sender includes the distance to the source in the RouteRequest packet;
• intermediate nodes compute the distance to the destination:
– if this distance is less than the distance between source and destination
packet is forwarded;
– otherwise the packet is discarded.
• distance in the packet is updated at every node with lower distance to
destination.
1 14
2 5 16
12
8 Dest. 17
3 10 13
9
6
18
11 Source 7 15
4
11 4 7 15
Source
4 - 7 - 10 - 5 - 14;
4 - 7 - 6 - 12 - 14;
4 - 9 - 8 - 1 - 5 - 14...
Routi ng in A B R .
If the link break occurs:
• the node closer to the source initiates a local link repair as follows:
– broadcasts locally route repair packet (local query ( LQ ) ) with limited T T L (e.g., 3);
• if this node fails to repair, then the next node closer to destination initiates a route repair;
• if nodes constituting a half of pass of the route fail to repair, the source is informed.
1 14
Dest.
2 5 16
12
8
3 10 13
9
6
11 4 7 15
Source
• to determine temporal stability, each node measures the signal strength of beacons.
11 4 7 15
Source
4 - 7 - 10 - 5 - 14;
4 - 7 - 10 - 5 - 12 - 14.
Routi ng in SSA.
I n case of the link break:
• end-nodes are informed and they try to establish new stable route;
• of no stable routes are available, the restriction of stable links is removed.
1 14
Dest.
2 5 16
12
8
3 10 13
9
6
11 4 7 15
Source
4 - 7 - 10 - 5 - 14;
4 - 7 - 10 - 5 - 12 - 14.
N e w shortcomings:
• − : devises are expensive;
• when the source receives Flow-SETUP packet, it begins the transmission of packets.
1 Dest. 14
2 14 9 5 16
12
8 8 5
3 10 13
9
10 6
7
11 17 7 15
4
Source
4 - 7 - 10 - 5: RET: 8
4 - 9 - 8 - 1 - 5: RET: 5
Route establishment in F O R P.
T h e L E T of the link is esti mated as follows:
−(pq + rs) + (p 2 + r 2 )T X2 − (ps − qr)2
LETA B = ,
p2 + q2
p = VA cos T A − VB cos T B , q = XA − XB
r = VA sin T A − VB sin T B , s = YA − YB , (1)
• A and B are nodes with transmission range T X ;
• V A and V B are velocities of nodes;
• T A and T B are angles as shown below:
TA TB
A: (XA,YA) B: (XB,YB)
Motion angles in FO R M .
F O R P uses proacti ve route maintenance using available R E T :
• when the destination determines that the break is about to occur it sends Flow-HANDOFF;
• Fl ow-HAN DO FF propagates in the network similarly to Flow-REQ ;
• when many Fl ow-HAN DO FF are received at the source new path with highest R E T is chosen.
Dest. 14 5 - 10 - 7 - 4: RET: 5
1
5 - 1 - 8 - 9 - 4: RET: 8
2 5 16 5 - 1 - 3 - 4: RET: 3
6 14 9
12 5 - 6 - 7 - 4: RET: 7
8 8 5
5 7
3 3 10 13
9
10 6
7 9
11 17 7 15
4
Source
Route repair in F O R P.
5. Hybrid routing protocols
These protocols maintain topology information up to m hops in tables.
We consider:
• Zone routing protocol ( Z R P ) ;
14 r=2
1 Dest.
r=1
2 5 16
12
8
3 10 13
9
6
11 4 7 15
Source
2 5 16
12
8
Source
3 10 13
9
6
11 4 7 15
Dest.
Routi ng in Z R P with r = 1.
2. Zone-based hierarchial link state routing protocol
Z H L S is characterized by the following:
• use of geographical location of nodes to determine the non-overlapping zones;
• hierarchial addressing with zone ID and node ID is used;
• each node requires the location information based on which its zone is obtained;
• topology information is maintained in every node inside this zone;
• for regions outside the zone, zone connectivity information is maintained;
T h e Z H L S uses:
• proacti ve routi ng is used inside zone;
• reacti ve routi ng is used outside zone;
Note: Z H L S requires GP S or similar service to identify itself with a certain sone.
Zones: coverage of the single node, application scenario, mobility of nodes, network
size.
T h e protocol operates as follows:
• each node builds a one-hop node-level topology;
• this one-hop topology is propagated to other nodes in its zone using packet
containing:
– IDs of all zones in the zone, node ID, and zone IDs of all other nodes.
• nodes that receive responses from nodes belonging to other zones are gateway
nodes;
• all traffic between zones is transmitted via gateway nodes;
• once node-level topology is built, nodes obtain zone-level topology sending
packets via gates;
• if the destination is in the zone, packets are forwarded directly;
• if no, the source sends location request packet to every zone via gateways;
• every gateway node checks for destination in its routing table and replies with
ReouteReply.
1 14
D C 2 B A 16
5 12
8
3 10 13
9
6
11 H G 7 F E
4 15
Z H L S zones.
• better scalability.
Level 1
Level 0 16
5 12
2
20 8
18
3 10 13
9
6
17
11 7
4 15 19
Topology example in H S R .
A t the physical layer nodes are classifi ed into:
• cluster heads; belong to a single cluster and elected as a cluster head;
W h y is it needed:
• complexity proactive routing: size of the network, mobility of node;
W h a t is the basis:
• a node exchanges the routing information only with neighbors at periodic intervals:
– trade-off between link-state (topology exchanges) and distance vector (link-level info).
• Conceptual Requirement
• VoIP Adapter Functionality
• Addressing and Routing
• Service Observations
• Traffic Engineering
PSTN and the Internet
Introduction of VoIP requires hybrid integration of the PSTN and the Internet.
There are three key environments that we will discuss in detail in this chapter.
They are broadly referred to as VoIP environments and can be briefly stated as
follows:
• A call originating and terminating in PSTN that can use IP networks and
protocols
• A call originating in a telephone network terminating in the Internet, and vice
versa
• Call handling/routing work in an all-IP environment .
PSTN Call Routing Using the Internet
Conceptual Requirement
VoIP Adapter Functionality
If there is a loss of electricity at the home where the VoIP adapter is located, then the subscriber cannot avail
itself of the phone service; this is not to be confused with purposefully turning off the VoIP power much like
turning off a mobile phone. That is, always-available service is not completely possible unlike a plain
telephone connected to the central office switch where the electricity for the phone is directly supplied by the
central office.
• Subscriber A’s VoIP adapter is not tied to the IP address 44.44.34.12. The subscriber may
decide to take the VoIP adapter and connect to the Internet from anywhere in the world.
What gateway 2.98.179.1 really needs to be able to identify is that the VoIP adapter is authorized and that it
has an assigned E.164 number. This is possible since this information
is payload in a Q.931 message, which is then carried in an IP packet.
• The ability to take the VoIP adapter and connect to the Internet from anywhere is of great
interest to the subscriber. This way any local call to which the telephone number was
assigned is still a local call. In essence, this functionality provides location portability.
• The location portability, however, creates a problem in certain situations. For example,
Subscriber A who has the number +1-816-339-1706 takes the VoIP adapter anywhere and
connects to the Internet, and then dials for 911 emergency service. The 911 operator will
understand it as coming from the physical postal address on record. Recently, there have
been new discussions on how to to handle such issues; refer to [523] for recent developments.
Traffic Engineering
ADDITIONAL FACTORS/OVERHEAD
CALL-CARRYING CAPACITY