8. Ad-hoc networks, MANETs PA159: Net-Centric Computing I. Eva Hladká Faculty of Informatics Masaryk University Autumn 2010 Eva Hladká (Fl MU) 8. Ad-hoc networks, MANETs Autumn 2010 1 / 69 Lecture Overview l Wireless Ad-hoc Networks o Motivation o (Mobile) Wireless Ad-hoc Networks o Wireless Sensor Networks o MANETs vs. WSNs o MANETs vs. P2P 2) Medium Access Control in Ad-hoc and Sensor Networks • Protocols' Classification o Contention-based protocols o Improving Energy Efficiency 3) Ad-hoc Routing o Address-based Ad-hoc Routing Protocols Proactive Protocols Reactive Protocols o Specialized Routing Protocols 4) Conclusion & Information Sources 8. Ad-hoc networks, MANETs Autumn 2010 2 / 69 Wireless Ad-hoc Networks Lecture Overview (l) Wireless Ad-hoc Networks o Motivation o (Mobile) Wireless Ad-hoc Networks o Wireless Sensor Networks o MANETs vs. WSNs o MANETs vs. P2P r2| Medium Access Control in Ad-hoc and Sensor Networks • Protocols' Classification • Contention-based protocols • Improving Energy Efficiency [3 Ad-hoc Routing • Address-based Ad-hoc Routing Protocols Proactive Protocols Reactive Protocols • Specialized Routing Protocols Pj) Conclusion & Information Sources Eva Hladká (FIMU) 8. Ad-hoc networks, MANETs Autumn 2010 3 / 69 Wireless Ad-hoc Networks Motivation Wireless Networks I. o A need: how to access computing and communication services on the move? o wireless networks o wireless networks are traditionally based on a cellular infrastructure o a land area that should be covered with a radio service is divided into cells o each cell is covered by a (base) station base stations connected to a wired backbone network the mobile nodes are communicate wirelessly to these stations o traffic between different mobile entities is relayed by base stations and wired backbone mobility is supported by switching from one base station to another o e.g., GSM, UMTS, WLAN, ... Eva Hladka (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 4 / 69 Wireless Ad-hoc Networks Motivation Wireless Networks II. o but what, if: o no infrastructure becomes available? (e.g., disaster areas, emergency operations) □ e.g., hurricane Cathrina (2005) destroyed huge parts of New Orleans including communication networks o it is too expensive to set it up? (e.g., remote/large places, construction areas) there is no time to set it up? (e.g., military operations) o == Wireless Ad-hoc Networks o try to construct a network without infrastructure, using networking abilities of the participants • ad-hoc network = a network constructed on demand "for a special purpose" • the term ad-hoc is Latin meaning "for this purpose" 8. Ad-hoc networks, MANETs Autumn 2010 5 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Wireless Ad-hoc Networks Wireless Ad-hoc Network o a collection of autonomous nodes that communicate with each other by forming a multihop radio network and maintaining connectivity in a decentralized manner o each node functions as both a host and a router o the control of the network is distributed among the nodes o the network topology is (in general) dynamic o the connectivity among the nodes may vary in time due to node departures, new node arrivals, and the nodes' mobility o == a need for efficient routing protocols that allow the nodes to communicate over multihop paths in an efficient way o these networks pose many complex issues == there are many open problems for research □ without a central infrastructure, things become much more difficult 8. Ad-hoc networks, MANETs Autumn 2010 6 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Wireless Ad-hoc Networks Simple example Figure: Simple example: laptops in a conference room - a single-hop ad-hoc network (all the networking nodes are in a direct communication range of each other node). 8. Ad-hoc networks, MANETs Autumn 2010 7 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Wireless Ad-hoc Networks Multihop Network example Figure: Multihop (mobile) ad-hoc network example. 8. Ad-hoc networks, MANETs Autumn 2010 8 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Wireless Ad-hoc Networks Advantages o very fast construction o no need to establish wired connections resilient o no single point of failure, such as a base station o spectrally more efficient than cellular networks o every node can communicate with any other node (sometimes even simultaneously), so nodes can make better use of the channel 8. Ad-hoc networks, MANETs Autumn 2010 9 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Wireless Ad-hoc Networks Problems/Challenges o problems arise due to: o lack of a central entity for network organization □ the participating nodes must organize themselves into a network o self-organization is a must o limited range of wireless communication data have to be delivered over a path involving multiple nodes o == mechanisms for dynamic path identification and management are required o mobility of participants the network nodes may be allowed to move in time and space the network quality depends on the speed to adapt to new topologies o == Mobile Ad-hoc Networks (MANETs) o among others, the following issues have to be addressed: o medium access control - no base station can assign transmission resources (it must be decided in a distributed fashion) o routing - finding a route from one participant to another Eva Hladká (FIMU) 8. Ad-hoc networks, MANETs Autumn 2010 10/69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Possible Applications o finding out empty parking lots in a city (without asking a server), avoiding traffic jams/congestions, etc. (= VANETs) search-and-rescue in an avalanche personal area networking (watch, glasses, PDA, medical appliance, . . . ) military networking: tanks, soldiers, . . . collaborative and distributed computing Eva Hladká (Fl MU) 8. Ad-hoc networks, MANETs Autumn 2010 11 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Vehicular Ad-hoc Networks (VANETs) Vehicular Ad-hoc Networks (VANETs) a technology that uses moving cars as nodes/routers to create a mobile network o the cars are allowed to connect to each other (if being in a wireless range) and thus to create a network with a wide range o in comparison with MANETs, where the nodes move in a random way, the cars tend to move in an organized fashion o moreover, the interactions with roadside equipment can be characterized fairly accurately o == more specialized routing protocols may be employed Autumn 2010 12 / 69 Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks (Mobile) Wireless Ad-hoc Networks Comparison with Infrastructure-based networks Prerequisites Node properties Connections Topology Network functions Figure: Comparison between infrastructure-based and infrastructure-less (ad-hoc) networks. Infrastructure-based network Ad hoc network Pre-deployed infrastructure, e.g. routers, switches, base stations, servers None End system only Duality of end system and network functions Wired or wireless Usually wireless Outlined by the pre-deployed infrastructure Self-organized topology maintained by the nodes Provided by the infrastructure Distributed to all participating nodes 8. Ad-hoc networks, MANETs Autumn 2010 13 / 69 Wireless Ad-hoc Networks Wireless Sensor Networks Wireless Sensor Networks o so far, the participants were devices close to a human user (i.e., interacting with humans) alternative concept: o instead of focusing interaction on humans, focus on interacting with an environment o network is embedded in an environment (in a random or regular fashion) o nodes in such a network are equipped with sensing/actuation to measure/influence the environment o the nodes process information and communicate it wirelessly o => Wireless Sensor Networks (WSNs) o or Wireless Sensor & Actuator Networks (WSANs) 8. Ad-hoc networks, MANETs Autumn 2010 14 / 69 Wireless Ad-hoc Networks Wireless Sensor Networks Wireless Sensor Networks Application Examples Emergency operations o e.g., dropping sensor nodes over a wildfire o each node measures temperature • possible to derive a "temperature map" Habitat monitoring o e.g., sensor nodes to observe wildlife o Great Duck Island, ZebraNet, etc. Precise agriculture o bringing out fertilizer/pesticides/irrigation only where needed Intelligent buildings, bridges reducing energy wastage by proper humidity, ventilation, air conditioning needs measurements about room occupancy, temperature, air flow o monitoring mechanical stress after earthquakes Eva Hladká (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 15 / 69 Wireless Ad-hoc Networks Wireless Sensor Networks Wireless Sensor Networks Sensors - HW o sensor HW o processor (and memory) o e.g., Atmel ATmega128 microcontroller, 16 MHz, 128 kByte flash o radio transceiver o e.g., Chipcon CC1000 (315/433/868/915 MHz), CC2400 (2.4 GHz) battery o possibly in combination with energy harvesting sensors light, temperature, motion, . . . 16 / 69 Wireless Ad-hoc Networks Wireless Sensor Networks Wireless Sensor Networks Sensors - SW o sensor software o event-driven operating principle o e.g., TinyOS 8. Ad-hoc networks, MANETs Autumn 2010 17 / 69 Wireless Ad-hoc Networks Wireless Sensor Networks Wireless Sensor Networks Importance of an Energy-efficient Operation o often (but not always), the participants in an ad-hoc network (not only sensor network) draw energy from batteries o it is desirable to sustain a long run time for: o individual nodes/devices o the network as a whole o usually, application demands do not bother with individual nodes, as long as the global application-dependent objective can still be fulfilled employed networking protocols have to take the limited energy into account and behave in an energy-efficient way o e.g., use routes with low energy consumption (energy/bit) o e.g., take available battery capacity of devices into account o How to resolve conflicts between different optimizations? some form of recharging or energy scavenging from the environment is often used in order to increase the available energy 8. Ad-hoc networks, MANETs Autumn 2010 18 / 69 Wireless Ad-hoc Networks Wireless Sensor Networks Wireless Sensor Networks Required functionality and constraints o Available energy sensor nodes are operated by batteries that provide limited energy for the node o Processing power employed micro controllers usually provide very limited processing performance (due to size and energy restrictions) Q Memory and storage the characteristics of the available memory usually correlate with the size of the micro controller o Bandwidth and throughput • wireless radio transceivers are optimized for low-energy operation == they provide a relatively small bandwidth to the application Reliability depending on the application scenario, the demands for the reliability (both communication reliability and error-proneness of the hardware) can strongly differ Addressing • typically, off-the-shelf sensor nodes do not have a globally unique address pre-programmed = networking mechanisms must either dynamically allocate unique addresses or even abandon address-based techniques Scalability o a primary constraint — the scalability of employed methods and algorithms Eva Hladka (FIMU) 8. Ad-hoc networks, MANETs Autumn 2010 19/69 Wireless Ad-hoc Networks MANETs vs. WSNs MANETs (VANETs) vs. WSNs Many similarities: o both networks strongly rely on self-organization mechanisms (neighborship relations and network topology maintenance) o both networks have to cope with limited energy in the devices o the energy efficiency of employed algorithms and methods is of the highest importance both networks often use wireless multi-hop communications Many differences: Resources and properties MANET WSN Available energy High Low Processing power High Low Memory and storage High Low Density and scale Low High Mobility High Limited* Heterogeneity Medium* Low* Varying user demands High Low * Depending on the application scenario Autumn 2010 20 / 69 Wireless Ad-hoc Networks MANETs vs. P2P MANETs vs. P2P Systems I. Wireless ad-hoc networks have also many similarities with P2P systems: o same paradigm o self-organizing network o dynamic topology responsible for routing queries in a distributed environment lack managing and centralizing units However, there are also great differences — 8. Ad-hoc networks, MANETs Autumn 2010 21 / 69 Wireless Ad-hoc Networks MANETs vs. P2P MANETs vs. P2P Systems II. Difference P2P Network MANET Motivation for creating the network Logical infra structure to provide a service A physical infra-structure to provide connectivity Connection Between two nodes Fixed medium and direct Wireless and indirect Connection confidence High (physical connections) Low (wireless connections) Peer location Any Internet point Restricted area Structure Physical apart from logical structure Physical structure corresponds to logical structure Routing reactive Proactive, reactive Peer behavior Fixed Mobile Broadcast Virtual, multiple unicasts Physical, to all nodes in transmission range area Eva Hladká (Fl MU) 8. Ad-hoc networks, MANETs Autumn 2010 22 / 69 Wireless Ad-hoc Networks MANETs vs. P2P MANETs vs. P2P Systems III. o == MANET rather is a platform for P2P applications o however, existing solutions for wireline Internet cannot be applied directly on MANET for P2P communication, mainly because: o neighbors at the application layer (P2P view) may not necessarily be neighbors at the network layer (MANET view) = in order to deploy P2P applications efficiently in MANETs, existing P2P solutions must be subjected to considerable modifications to take many MANET's specifics into account 8. Ad-hoc networks, MANETs Autumn 2010 23 / 69 Medium Access Control in Ad-hoc and Sensor Networks Lecture Overview Wireless Ad-hoc Networks • Motivation • (Mobile) Wireless Ad-hoc Networks • Wireless Sensor Networks » MANETs vs. WSNs • MANETs vs. P2P 2) Medium Access Control in Ad-hoc and Sensor Networks • Protocols' Classification o Contention-based protocols o Improving Energy Efficiency 3) Ad-hoc Routing • Address-based Ad-hoc Routing Protocols Proactive Protocols Reactive Protocols • Specialized Routing Protocols 4l Conclusion & Information Sources 8. Ad-hoc networks, MANETs Autumn 2010 24 / 69 Medium Access Control in Ad-hoc and Sensor Networks Medium Access Control in Ad-hoc and Sensor Networks I. o Medium Access Control (MAC) • responsible for coordination of nodes' access to a shared transmission media o the goal is to minimize collisions o i.e., simultaneous transmissions, which lead to signal corruptions o medium access in (infrastructure, ad-hoc) wireless networks is difficult mainly because of: o it is impossible (or very difficult) to send and to receive at the same time • from the sender's point of view, it is hard to estimate the interference situation at the receiver's side o high error rates make it rather hard to establish a well coordinated communication link among nodes over the wireless medium • requirements for ad-hoc/sensor networks' MAC protocols: o as usually: high throughput, low overhead, low error rates, . .. o additionally: energy-efficiency 8. Ad-hoc networks, MANETs Autumn 2010 25 / 69 Medium Access Control in Ad-hoc and Sensor Networks Medium Access Control in Ad-hoc and Sensor Networks II. o effects, that contribute to energy wastage: q collisions o wasted effort when two packets (transmissions) collide — the detection of and reaction to collisions, and data retransmissions require additional energy o overhearing o if a node is receiving a packet that is destined for another receiver in the same wireless transmission range, the required energy for receiving the packet (or at least parts of it) and the detection that it is destined to another node are waste efforts o idle listening o since the receiving node has no knowledge when a sender may begin a transmission, it must be idle, waiting for a possible packet reception (energy is wasted for doing nothing) o protocol overhead o another issue is a mobility of the nodes: o it can essentially affect the performance (throughput) of the protocol o e.g., bandwidth reservations or exchanged control information may become useless if nodes are moving quickly o == protocol design must take this mobility factor into consideration Eva Hladká (Fl MU) 8. Ad-hoc networks, MANETs Autumn 2010 26 / 69 Medium Access Control in Ad-hoc and Sensor Networks Protocols' Classification Classification of MAC Protocols for Wireless Radio Nets MAC protocols for wireless radio networks can be distinguished into the following classes: o Contention-based protocols - description follows o Contention-based protocols with reservation mechanisms o support for real-time traffic using QoS guarantees o use mechanisms for reserving bandwidth a priori q synchronous (require time synchronization among all nodes in the network) and asynchronous (usually rely on relative time information) e.g., MACA/PR (MACA with Piggy-Backed Reservation) Contention-based protocols with scheduling mechanisms focus on packet scheduling at nodes and also scheduling nodes for access to the channel o used to enforce priorities among flows (i.e., QoS support is available) o sometimes battery characteristics (e.g., remaining battery power) are considered while scheduling nodes for access to the channel o e.g., LEACH (Low-Energy Adaptive Clustering Hierarchy), SMACS, TRAMA 8. Ad-hoc networks, MANETs Autumn 2010 27 / 69 Medium Access Control in Ad-hoc and Sensor Networks Contention-based protocols Contention-based protocols o no a priori resource reservation o whenever a packet should be transmitted, the node contends with its neighbors for access to the shared channel if multiple nodes want to access the channel at the very same time, collisions cannot be avoided o == contention resolution has to be provided by the protocols o cannot provide QoS guarantees o two approaches: o sender-initiated protocols -the packet transmissions are initiated by the sender node receiver-initiated protocols - the receiver node initiates the contention-resolution protocol have to cope with two fundamental problems: o hidden and exposed terminals 8. Ad-hoc networks, MANETs Autumn 2010 28 / 69 Medium Access Control in Ad-hoc and Sensor Networks Contention-based protocols Contention-based protocols Hidden and Exposed Terminals Problems o Hidden terminal problem - collision of packets due to simultaneous transmission of those nodes that are not within the direct transmission range of the sender but are within the transmission range of the receiver o Exposed terminal problem - inability of a node, which is blocked due to transmission by a nearby transmitting node, to transmit to another node 29 / 69 Medium Access Control in Ad-hoc and Sensor Networks Contention-based protocols Contention-based protocols Main Options to Shut Up Senders To reserve a channel during/for a transmission, two basic options are possible: o receiver informs potential interferers while a reception is on-going o by sending out a signal indicating just that o problem: cannot use the same channel on which actual reception takes place o == necessary to use a separate channel for signaling o e.g., Busy tone protocol o receiver informs potential interferers before a reception is on-going o can use same channel receiver itself needs to be informed, by sender, about impending transmission o potential interferers need to be aware of such information o e.g., MACA protocol 8. Ad-hoc networks, MANETs Autumn 2010 30 / 69 Medium Access Control in Ad-hoc and Sensor Networks Contention-based protocols BTMA - Busy Tone Multiple Access the transmission channel is split into data and control channel general behavior: when a node wants to transmit a packet, it senses the channel to check whether the busy tone is active if not, it turns on the busy tone signal and starts transmission problem: very poor bandwidth utilization 8. Ad-hoc networks, MANETs Autumn 2010 31 / 69 Medium Access Control in Ad-hoc and Sensor Networks Contention-based protocols MACA — Multiple Access Collision Avoidance o well-established MAC protocols in the ad-hoc domain o use of additional signaling packets: o sender asks receiver whether it is able to receive a transmission - Request to Send (RTS) o if receiver agrees, it sends out a Clear to Send (CTS) sender sends, receiver acks o potential interferers overhear RTS/CTS o RTS/CTS packets carry the expected duration of the data transmission o store this information in a Network Allocation Vector (NAV) Node 1 NAV r Sender / RTS DATA \ Receiver \ / / / ACK Node 4 V NAV -^ time Eva Hladka (FIMU) 8. Ad-hoc networks, MANETs Autumn 2010 32 / 69 Medium Access Control in Ad-hoc and Sensor Networks Improving Energy Efficiency Power-Control MAC (PCM) protocol I. o PCM provides a MAC layer solution for power control by varying the transmission power to reduce the overall energy consumption o the idea: RTS/CTS handshake messages should be transmitted with the maximum available power pmax q the handshake is used to determine the required transmission power pdesired that is used for the subsequent DATA/ACK transfer o the calculation of pdesired is performed from the signal level of the received RTS in combination with some well known minimum threshold for the received signal strength Rxthresh that is necessary for correctly decoding the messages o the calculation: ° Pdesired = ^ Rxthresh X C o where pr denotes the received power level and a constant parameter c is used to increase pdesired according to environmental conditions can be combined with any RTS/CTS based MAC protocol (i.e., including MACA) 8. Ad-hoc networks, MANETs Autumn 2010 33 / 69 Medium Access Control in Ad-hoc and Sensor Networks Improving Energy Efficiency MACA — Energy Consumption Reduce II. Power-Control MAC (PCM) protocol II. Figure: Transmission ranges used by PCM for RTS/CTS and DATA/ACK, respectively. 8. Ad-hoc networks, MANETs Autumn 2010 34 / 69 Medium Access Control in Ad-hoc and Sensor Networks Improving Energy Efficiency Sensor-MAC (S-MAC) I. o new protocol improving the energy efficiency in multi-hop radio networks o primary goal: to retain flexibility of contention-based protocols while improving energy efficiency in multi-hop networks • MACA's idle listening is particularly unsuitable if average data rate is low (most of the time, nothing happens) o the idea: switch nodes off and ensure that neighboring nodes turn on simultaneously to allow packet exchange ("rendez-vous") o only in these active periods packet exchanges can happen o requires to exchange a wakeup schedule between neighbors o when awake, essentially perform RTS/CTS o it introduces coarse-grained listen/sleep cycle with a duty-cycle D = y o duty-cycle = a measure for the energy efficiency of a node Eva Hladká (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 35 / 69 Medium Access Control in Ad-hoc and Sensor Networks Improving Energy Efficiency Sensor-MAC (S-MAC) II. o in fact, the listen period is divided to support synchronization between neighboring nodes as well as the contention for the wireless channel using the RTS/CTS handshake mechanism o the explicit (time) synchronization was introduced to support low duty-cycle operations of 1 - 10 % all nodes choose their own listen/sleep schedules these schedules are shared with their neighbors to make communication between all neighboring nodes possible o each node periodically broadcasts its schedule in a SYNC packet, which provides simple time synchronization o to reduce overhead, S-MAC encourages neighboring nodes to adopt identical schedules • many other variants exist: T-MAC, B-MAC, P-MAC, Z-MAC, etc. Eva Hladká (FI MU) 8. Ad-hoc networks, MANETs Autumn 20l0 36 / 69 Ad-hoc Routing Lecture Overview Wireless Ad-hoc Networks • Motivation • (Mobile) Wireless Ad-hoc Networks • Wireless Sensor Networks » MANETs vs. WSNs • MANETs vs. P2P 2f Medium Access Control in Ad-hoc and Sensor Networks • Protocols' Classification • Contention-based protocols • Improving Energy Efficiency 3) Ad-hoc Routing o Address-based Ad-hoc Routing Protocols Proactive Protocols Reactive Protocols o Specialized Routing Protocols 4l Conclusion & Information Sources 8. Ad-hoc networks, MANETs Autumn 2010 37 / 69 Ad-hoc Routing Ad-hoc Routing o typically, nodes are not within the direct communication range of all other nodes o nodes need to discover routes (consisting of intermediate nodes) through which they can deliver their packets to their distant destinations o = a task of a routing protocol complicated by the presence of node mobility, and the lack of centralized control the routing protocol must be coupled with a medium access control (MAC) protocol o the routing protocol specifies to whom a node should transmit the packet o the MAC protocol specifies when it should transmit the packet 38 / 69 Ad-hoc Routing Ad-hoc Routing Address-based routing vs. data-centric forwarding I. Address-based routing o the first routing approaches for ad-hoc and sensor networks o messages are directed towards a well-specified particular destination (sink) o == these routing protocols require each node to have a network-wide unique address or identifier provide support for unicast, multicast, and broadcast messages o obvious advantage: the possibility of identifying specific (unique) nodes and sending messages to them Figure: Principles of address-based routing: a data packet carrying the destination address "TO:2" is forwarded along an established path towards its final destination: node 2. Eva Hladká (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 39 / 69 Ad-hoc Routing Ad-hoc Routing Address-based routing vs. Data-centric forwarding II. Data-centric forwarding o sometimes (especially in WSNs), the unique addresses are not demanded by the application requirements but only by the employed routing protocols o == the addressing scheme can be removed and replaced with the specific semantics of the transmitted messages o node addresses are replaced by a kind of interest of particular nodes o payload information (data) is used to forward messages towards an appropriate destination Figure: Principles of data-centric forwarding: messages are forwarded according to their internal meaning - messages of type "B" are transmitted to two sinks, which requested exactly messages of type "B". Eva Hladka (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 40 / 69 Ad-hoc Routing Ad-hoc Routing Address-based routing vs. Data-centric forwarding III. Address-based routing Data-centric forwarding Routing approach Identification of a path according to the destination address of the data message Determination of the destination of a data message according to the content of the packet Prerequisites Network-wide unique addresses Pre-defined message types and semantics Routing techniques Proactive routing (continuous state maintenance) or reactive routing (on-demand path finding) (probabilistic) flooding schemes or interest-based reverse routing Advantages Usually low delays in connection setup and data dissemination No address information required and simplified self-management and redundancy Disadvantages Network-wide unique address identifiers required Increased overhead for single transmissions 8. Ad-hoc networks, MANETs Autumn 2010 41 / 69 Ad-hoc Routing Address-based Ad-hoc Routing Protocols Address-based Ad-hoc Routing Classification of Routing Protocols I. Many different classifications of routing protocols exist: o proactive vs. reactive protocols: o Proactive protocols o discover routes before they are needed o provide small latency, but large routing overheads Reactive protocols discover routes only when they are needed provide small routing overhead, but higher latency o table-driven vs. source-routing protocols: o Table-driven protocols each node only knows the next hop to a destination the routing overhead is small, but routing loops may be formed Source-routing protocols □ nodes know the complete route to a destination routing loops are easy to avoid, but the routing overhead is larger 8. Ad-hoc networks, MANETs Autumn 2010 42 / 69 Ad-hoc Routing Address-based Ad-hoc Routing Protocols Address-based Ad-hoc Routing Classification of Routing Protocols II. o flat vs. hierarchical protocols: o Flat protocols o all nodes run identical algorithms (= the protocols are relatively simple) □ the routing overhead may increase very fast as the number of nodes increases o Hierarchical protocols o some nodes have added responsibilities (= the algorithms are more complicated) o the performance scales better with network size o location-based vs. non-location-based protocols: o Location-based protocols • make use of the nodes' physical location (= reduce routing overhead) o nodes need to be equipped with GPS or something equivalent Non-location-based protocols oblivious to the physical location of nodes (= simpler) routing overhead is typically greater o and many other classifications also exist Eva Hladka (FIMU) 8. Ad-hoc networks, MANETs Autumn 2010 43 / 69 Ad-hoc Routing Address-based Ad-hoc Routing Protocols Address-based Ad-hoc Routing Classification of Routing Protocols II. Eva Hladká (FI MU) B. Ad-hoc networks, MANETs Autumn 2010 44 / 69 Ad-hoc Routing Proactive Protocols Proactive Ad-hoc Routing Proactive ad-hoc routing protocols: o rely on a periodic collection and exchange of topology information o either table-driven (distance-vector) or link-state mechanisms for topology maintenance o table-driven (distance-vector) protocols periodically exchange routing tables between neighboring nodes o link-state distribute topology information (updates) so that each node can calculate optimal paths on their own - high network overhead for state (topology) maintenance + data packets can be forwarded at any time to any destination within the network 8. Ad-hoc networks, MANETs Autumn 2010 45 / 69 Ad-hoc Routing Proactive Protocols Proactive Ad-hoc Routing Destination Sequence Distance Vector (DSDV) Destination Sequence Distance Vector (DSDV): o a distance vector routing protocol inspired by RIP protocol o based on distributed Bellman Ford procedure o nodes periodically exchange whole routing tables between neighbors o on topology change, incremental route updates are possible • every node knows "where" everybody else is o == routing table maintains O(N) items o aging information is used for maintaining fresh routes and avoiding loops o simple, but does not scale (high overhead) Routing table at node 15 Eva Hladká (Fl MU) 8. Ad-hoc networks, MANETs Autumn 2010 46 / 69 Ad-hoc Routing Proactive Protocols Proactive Ad-hoc Routing Optimized Link State Routing (OLSR) Protocol Optimized Link State Routing (OLSR) Protocol: o link-state based routing protocol • links' state information is flooded through the network o == nodes keep track of the whole topology and compute the shortest paths on their own o broadcasts (topology information distribution) are optimized through MultiPoint Relays (MPRS) o instead of regular flooding, which introduces high overhead o each node selects and maintains its own MPR • the rule: "For all 2-hop neighbors there must exist a MPR through which they can contact each other." o MPRs further allow to aggregate link-state information + suitable for large and dense networks - lack of security, no support for multicast 8. Ad-hoc networks, MANETs Autumn 2010 47 / 69 Ad-hoc Routing Proactive Protocols Proactive Ad-hoc Routing Optimized Link State Routing (OLSR) Protocol - Regular Flooding o o o o o o o 8. Ad-hoc networks, MANETs Autumn 2010 48 / 69 Ad-hoc Routing Proactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 49 / 69 Ad-hoc Routing Proactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 50 / 69 Ad-hoc Routing Proactive Protocols Eva Hladka (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 51 / 69 Ad-hoc Routing Proactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 52 / 69 Ad-hoc Routing Proactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 53 / 69 Ad-hoc Routing Reactive Protocols Reactive (On-Demand) Ad-hoc Routing o routes are discovered only when needed (when data packets need to be transmitted) + saves energy and bandwidth during inactivity - additional delay is introduced for the setup of routing information + requires no (or very small) routing tables - introduces high network overhead in the flooding process when querying for routes - performance degrades with increasing mobility 8. Ad-hoc networks, MANETs Autumn 2010 54 / 69 Ad-hoc Routing Reactive Protocols Reactive (On-Demand) Ad-hoc Routing Dynamic Source Routing (DSR) Dynamic Source Routing (DSR) o source-based routing protocol o uses separate Route Request (RREQ) and Route Reply (RREP) packets to discover a route from the source node to the destination o sender floods RREQ through the network o nodes forward RREQs after appending their identification o destination node receives RREQ and unicasts a RREP back to the sender node the routing information is stored in the discovery packets o there is no need to maintain globally valid routing tables and state information in each node data packets are sent once a route has been established behaves well for smaller, less saturated wireless networks o optimization: route caching by observing RREQs and RREPs of other nodes 8. Ad-hoc networks, MANETs Autumn 2010 55 / 69 Ad-hoc Routing Reactive Protocols Reactive (On-Demand) Ad-hoc Routing Dynamic Source Routing (DSR) - Route Discovery I. 56 / 69 Ad-hoc Routing Reactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 57 / 69 Ad-hoc Routing Reactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 58 / 69 Ad-hoc Routing Reactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 59 / 69 Ad-hoc Routing Reactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 60 / 69 Ad-hoc Routing Reactive Protocols 8. Ad-hoc networks, MANETs Autumn 2010 61 / 69 Ad-hoc Routing Reactive Protocols Reactive (On-Demand) Ad-hoc Routing Ad Hoc on Demand Distance Vector (AODV) Ad Hoc on Demand Distance Vector (AODV) o another reactive routing protocol, searching paths between the source and the destination on demand o basically, the same route discovery procedure is used as in DSR o however, it copes with the per-packet overhead introduced by DSR o (source-routing - the whole route has to be stored in each packet) o in AODV, all nodes remember from where a packet came and populate their routing tables with that information o i.e., intermediate nodes in a given path maintain routing tables instead of using source routing o when an intermediate node knows a route to destination from previous communication, it may answer to RREQ instead of the destination node + lower connection setup delay (compared to DSR) 8. Ad-hoc networks, MANETs Autumn 2010 62 / 69 Ad-hoc Routing Reactive Protocols RREQs are flooded through the entire network (limited by a TTL describing the maximum network diameter) 8. Ad-hoc networks, MANETs Autumn 2010 63 / 69 Ad-hoc Routing Reactive Protocols The RouteReply (RREP) is unicasted towards the source Eva Hladka (FI MU) 8. Ad-hoc networks, MANETs Autumn 2010 64 / 69 Ad-hoc Routing Reactive Protocols Reactive (On-Demand) Ad-hoc Routing Dynamic MANET On Demand (DYMO) Dynamic MANET On Demand (DYMO) o successor of AODV o reduces the overhead in route setup and route maintenance From; A From: A From: A AODV From: D From: D From: D Path: A Path:A-FJ Path:A-B-C DYMO Path: D-C-B Path: D-C Path: D 8. Ad-hoc networks, MANETs Autumn 2010 65 / 69 Ad-hoc Routing Specialized Routing Protocols Specialized Routing Protocols Geographic Routing • instead of maintaining routing tables (to know nodes' positions), infer this information from physical placement of nodes o nodes know their geo coordinates (GPS, location service mapping node ID to node position, etc.) o send a message to a neighbor in the right direction as next hop o e.g., DREAM, GPSR, LAR Energy-Aware Routing Protocols take the nodes' energy capacity into account o several metrics can be employed: o minimize the energy consumption per packet (selecting paths with minimum transmission energy) o minimize the variance in node power levels (preffering nodes with higher energy level) etc. 8. Ad-hoc networks, MANETs Autumn 2010 66 / 69 Conclusion & Information Sources Lecture Overview Wireless Ad-hoc Networks • Motivation • (Mobile) Wireless Ad-hoc Networks • Wireless Sensor Networks » MANETs vs. WSNs • MANETs vs. P2P 2f Medium Access Control in Ad-hoc and Sensor Networks • Protocols' Classification • Contention-based protocols • Improving Energy Efficiency 3^ Ad-hoc Routing • Address-based Ad-hoc Routing Protocols Proactive Protocols Reactive Protocols • Specialized Routing Protocols 4) Conclusion & Information Sources 8. Ad-hoc networks, MANETs Autumn 2010 67 / 69 Conclusion & Information Sources Conclusions o (mobile) ad-hoc networks appear to be a good solution not only for temporary networks o but for fixed installations as well (buildings, cities, etc.) o provide many useful features as compared to infrastructure-based wireless networks o alive and well-researched area o still many challenges & research objectives: o network lifetime o robustness & fault-tolerance o in-network processing quality of service • software management (i.e., nodes' reprogramming) etc. 8. Ad-hoc networks, MANETs Autumn 2010 68 / 69 Conclusion & Information Sources Information Sources FI Courses: o PA151: Advanced Computer Networks (doc. Staudek) o PV169: Communication Systems Basics (doc. Staudek) Literature: o Falko Dressler: Self-Organization in Sensor and Actor Networks. John Wiley & Sons, 2007. o Jon S. Wilson: Sensor technology handbook. Newnes, 2005. Ananthram Swami: Wireless sensor networks: signal processing and communications perspectives. John Wiley & Sons, 2007. o Holger Karl, Andreas Willig: Protocols and Architectures for Wireless Sensor Networks. Wiley-Interscience, 2007. o Amiya Nayak, Ivan Stojmenovic Wireless Sensor and Actuator Networks: Algorithms and Protocols for Scalable Coordination and Data Communication. Wiley-Interscience, 2009. ... 8. Ad-hoc networks, MANETs Autumn 2010 69 / 69