Routing in Ad-hoc networks P R E S E N T E D B Y - L E W I S T S - - PowerPoint PPT Presentation

routing in ad hoc networks
SMART_READER_LITE
LIVE PREVIEW

Routing in Ad-hoc networks P R E S E N T E D B Y - L E W I S T S - - PowerPoint PPT Presentation

Routing in Ad-hoc networks P R E S E N T E D B Y - L E W I S T S E N G R A C H I T A G A R W A L Ad-hoc networks Infrastructure-less networks No fixed routers (potentially) mobile nodes Dynamically and arbitrarily located


slide-1
SLIDE 1

P R E S E N T E D B Y - L E W I S T S E N G R A C H I T A G A R W A L

Routing in Ad-hoc networks

slide-2
SLIDE 2

Ad-hoc networks

 Infrastructure-less networks

 No fixed routers  (potentially) mobile nodes  Dynamically and arbitrarily located

 Desired routing requirements

 High connectivity  Low overhead (how to characterize overhead?)

slide-3
SLIDE 3

Flooding at the Data-plane

3

B A S E F H J D C G I K Represents that connected nodes are within each

  • ther’s transmission range

Represents a node that has received packet P

slide-4
SLIDE 4

Flooding at the Data-plane

4

B A S E F H J D C G I K Represents transmission of packet P Represents a node that receives packet P for the first time Broadcast transmission

slide-5
SLIDE 5

Flooding at the Data-plane

5

B A S E F H J D C G I K

slide-6
SLIDE 6

Flooding at the Data-plane

6

B A S E F H J D C G I K

slide-7
SLIDE 7

Flooding at the Data-plane

7

B A S E F H J D C G I K

  • Nodes J and K both broadcast packet P to node D
  • Since nodes J and K are hidden from each other, their transmissions may collide
  • Packet P may not be delivered to node D at all, despite the use of flooding
  • Welcome to the world of wireless networks
slide-8
SLIDE 8

Advantages of flooding at the data-plane

8

 Simplicity  Potentially higher reliability of data delivery  No routing tables – just need to store neighbors

slide-9
SLIDE 9

Disadvantages of flooding at the data-plane

9

 Potentially, very high overhead  Potentially lower reliability of data delivery

 hard to implement reliable broadcast  Packet collisions

slide-10
SLIDE 10

10

Destination-Sequenced Distance-Vector (DSDV)

C B A

Dest. Next Metric Seq. A A A-550 B B 1 B-104 C B 2 C-590 Dest. Next Metric Seq. A A 1 A-550 B B B-104 C C 1 C-590 Dest. Next Metric Seq. A B 2 A-550 B B 1 B-104 C C C-590

B

  • Routing tables:
  • Each node stores, for each destination:
  • next-hop
  • cost
  • sequence number
  • Control plane:
  • periodically broadcast routing tables to neighbors
slide-11
SLIDE 11

(D, 0, D-000)

DSDV Routing tables

C B A D

Dest. Next Metric Seq. A A A-550 B B 1 B-104 C B 2 C-590 Dest. Next Metric Seq. A A 1 A-550 B B B-104 C C 1 C-590 Dest. Next Metric Seq. A B 2 A-550 B B 1 B-104 C C C-590 D D 1 D-000

  • 1. D broadcast for first

time – sends sequence number D-000

  • 2. Insert entry for D with

sequence number D-000

  • 3. Immediately broadcast own

table B

slide-12
SLIDE 12

(A, 2, A-550) (B, 1, B-102) (C, 0, C-592) (D, 1, D-000) (A, 2, A-550) (B, 1, B-102) (C, 0, C-592) (D, 1, D-000)

DSDV Routing Tables

C B A D

Dest. Next Metric Seq. A A 1 A-550 B B B-102 C C 1 C-592 D C 2 D-000 Dest. Next Metric Seq. A A A-550 B B 1 B-104 C B 2 C-590 Dest. Next Metric Seq. A B 2 A-550 B B 1 B-102 C C C-592 D D 1 D-000

… … … … … …

  • 3. C increases its sequence

number to C-592 and broadcasts its new table.

  • 4. B gets this new

information and updates its table… … . B

slide-13
SLIDE 13

(D, 2, D-100) (D, 2, D-100)

DSDV Link Failures

C B A D

Dest.c Next Metric Seq. … … … D C 2 D-100 Dest. Next Metric Seq. … … … D B 3 D-100 Dest. Next Metric Seq. … … … D D

D-101

Node C detects broken link

  • 2. B does its broadcast –

no affect on C (old sequence number) B

slide-14
SLIDE 14

C B A D

Dest.c Next Metric Seq. … … … D C 3 D-100 Dest. Next Metric Seq. … … … D B 4 D-100 Dest. Next Metric Seq. … … … D B

1

D-100 Dest. Next Metric Seq. … … … D D

1

D-100 D D

D-101 Dest.c Next Metric Seq. … … … ... D C

2

D-100 D C

D-101 Dest. Next Metric Seq. … … … ... D B

3

D-100 D B

D-101

B

DSDV Link Failures

slide-15
SLIDE 15

Advantages of flooding at control plane

15

 Overhead due to data plane flooding avoided  Nodes maintain (almost) consistent network map

 If the network is stable, loop-free routing very easy  Resulting paths are shortest paths

slide-16
SLIDE 16

Disadvantages of flooding at control plane

16

 Scalability

 does not scale to large networks  Even for small networks, large overhead if network is dynamic

 #Data packets versus #control packets?

slide-17
SLIDE 17

Clusterhead Gateway Switch Routing (CGSR)

C A 1 B D E 2 3

  • Flood the control plane within a cluster
  • Flood the control plane among the cluster leaders

1. Partition the network

  • 2. Assign cluster leaders
slide-18
SLIDE 18

Clusterhead Gateway Switch Routing (CGSR)

C A B D E 1 2 3 Potentially longer paths

slide-19
SLIDE 19

Advantages of CGSR

19

 Improved Scalability

 Scales for large networks  Scales even for small, highly dynamic networks

 Failure reaction is more localized compared to DSDV

slide-20
SLIDE 20

Disadvantages of CGSR

20

 Inflated Path lengths

 May not route along shortest possible paths  (Price for improved scalability?)

 Failures adversely effect CGSR  #Data packets versus #control packets?

 If #data packets per unit time << 1 ?

slide-21
SLIDE 21

Dynamic Source Routing (DSR)

21

 When node S wants to send a packet to node D, but

does not know a route to D, node S initiates a route discovery

 Source node S floods Route Request (RREQ)  Each node appends own identifier when forwarding

RREQ

slide-22
SLIDE 22

Route Discovery in DSR

22

B A S E F H J D C G I K Represents a node that has received RREQ for D from S

slide-23
SLIDE 23

Route Discovery in DSR

23

B A S E F H J D C G I K Represents transmission of RREQ Broadcast transmission RREQ [S] [X,Y] Represents list of identifiers appended to RREQ

slide-24
SLIDE 24

Route Discovery in DSR

24

B A S E F H J D C G I K [S,E] [S,C]

slide-25
SLIDE 25

Route Discovery in DSR

25

B A S E F H J D C G I K [S,C,G] [S,E,F]

slide-26
SLIDE 26

Route Discovery in DSR

26

B A S E F H J D C G I K [S,C,G,K] [S,E,F,J]

slide-27
SLIDE 27

Route Discovery in DSR

27

B A S E F H J D C G I K [S,E,F,J, D] [S,C,G,K, D]

slide-28
SLIDE 28

Route Reply in DSR

28

B A S E F H J D C G I K RREP [S,E,F,J,D] Represents RREP control message

slide-29
SLIDE 29

Data Delivery in DSR

29

B A S E F H J D C G I K DATA [S,E,F,J,D]

  • Packet header includes the entire route
  • Intermediate nodes do a “packet header” look-up
slide-30
SLIDE 30

30

Advantages of DSR

 Routes maintained only between nodes who need to

communicate

 reduces overhead of route maintenance

 Allows multi-path routing  No routing tables  Shortest, loop-free paths

slide-31
SLIDE 31

31

Disadvantages of DSR

 Packet header size grows with route length

 Large overhead if data size is small

 Flood of route requests may potentially reach all

nodes in the network

 Even if the network is stable

slide-32
SLIDE 32

32

AODV

 Route Requests (RREQ) are forwarded in a manner

similar to DSR

 When a node re-broadcasts a Route Request, it sets up a

reverse path pointing towards the source

 When the intended destination receives a Route Request,

it replies by sending a Route Reply

 Route Reply travels along the reverse path set-up when

Route Request is forwarded

slide-33
SLIDE 33

33

Route Requests in AODV

B A S E F H J D C G I K Represents a node that has received RREQ for D from S

slide-34
SLIDE 34

34

Route Requests in AODV

B A S E F H J D C G I K Represents transmission of RREQ Broadcast transmission

slide-35
SLIDE 35

35

Route Requests in AODV

B A S E F H J D C G I K Represents links on Reverse Path

slide-36
SLIDE 36

36

Reverse Path Setup in AODV

B A S E F H J D C G I K

slide-37
SLIDE 37

37

Reverse Path Setup in AODV

B A S E F H J D C G I K

slide-38
SLIDE 38

38

Reverse Path Setup in AODV

B A S E F H J D C G I K

slide-39
SLIDE 39

39

Route Reply in AODV

B A S E F H J D C G I K Represents links on path taken by RREP

slide-40
SLIDE 40

40

Data Delivery in AODV

B A S E F H J D C G I K Routing table entries used to forward data packet. Route is not included in packet header. DATA

slide-41
SLIDE 41

41

Advantages of AODV

 Routes maintained only between communicating

nodes

 reduces overhead of route maintenance

 No Packet header overhead as in DSR

 but now we need (small?) routing tables

 Shortest, loop-free paths

slide-42
SLIDE 42

42

Disadvantages of AODV

 Does not work if links are not bidirectional  Does not allow multipath routing  Flood of route requests may potentially reach all

nodes in the network

 Even if the network is stable

slide-43
SLIDE 43

43

Link Reversal Algorithm (Simplified TORA)

A F B C E G D

slide-44
SLIDE 44

44

Link Reversal Algorithm

A F B C E G D Maintain a directed acyclic graph (DAG) for each destination, with the destination being the only sink This DAG is for destination node D Links are bi-directional But algorithm imposes logical directions on them

slide-45
SLIDE 45

45

Link Reversal Algorithm

Link (G,D) broke A F B C E G D Any node, other than the destination, that has no

  • utgoing links reverses all

its incoming links. Node G has no outgoing links

slide-46
SLIDE 46

46

Link Reversal Algorithm

A F B C E G D Now nodes E and F have no outgoing links Represents a link that was reversed recently

slide-47
SLIDE 47

47

Link Reversal Algorithm

A F B C E G D Represents a link that was reversed recently Now nodes B and G have no outgoing links

slide-48
SLIDE 48

48

Link Reversal Algorithm

A F B C E G D Represents a link that was reversed recently Now nodes A and F have no outgoing links

slide-49
SLIDE 49

49

Link Reversal Algorithm

A F B C E G D Represents a link that was reversed recently Now all nodes (other than the destination D) have

  • utgoing links
slide-50
SLIDE 50

50

Link Reversal Algorithm

A F B C E G D DAG has been restored with only the destination as a sink

slide-51
SLIDE 51

51

Advantages of Link Reversal Algorithm

 No flooding of control packets

 The initial construction does result in flooding of control

packets

 Purely local failure recovery

slide-52
SLIDE 52

52

Disadvantages of Link Reversal Algorithm

 Does not work if the links are not bidirectional  Requires synchronization  High overhead of route maintenance

 Routes maintained between nodes even if they do not

communicate

slide-53
SLIDE 53

What we did not cover?

 Wireless routing protocol

 Nothing interesting in particular

 Specific design of TORA

 It is good to know the fundamentals (link reversal routing)  Link reversal has strong lower bounds – too much overhead

 Associativity- and Signal-stability- based routing

 DSR/ DSDV with mobility (or the lack of)/ signal strength as a

performance metric

 What is a performance metric?

slide-54
SLIDE 54

Looking forward … .

 The discussion so far assumed that nodes

communicate with each other

 Today, networks are information-oriented  Do not care about the location of the information

 Directed diffusion

 Interested in information rather than the end-host  route on “flat” identifiers

slide-55
SLIDE 55

Looking forward … .

 What are links in wireless networks?

 Who are my neighbors?  How to assign weights to these links?  hop-count could be a really bad metric – why?  LOF – how (not) to assign link weights!

 Who are my neighbors?

 Fundamental trade-off:  Transmit at higher power: more neighbors, more interference  Transmit at lower power: fewer neighbors, less interference

slide-56
SLIDE 56

Directed Diffusion: A Scalable and R b t C i ti P di f Robust Communication Paradigm for Sensor Networks

Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin @USC/UCLA Mobicomm 2000 P d b R hi A l & L i T Presented by Rachit Agarwal & Lewis Tseng

Some of the slide Some of the slide figures based on the paper and the following presentation: figures based on the paper and the following presentation: <http://snslab.kangwon.ac.kr/home/page/semFile/2004sum/Directed%20Diffusion%20for%20Wireless%2 <http://snslab.kangwon.ac.kr/home/page/semFile/2004sum/Directed%20Diffusion%20for%20Wireless%2 0Sensor%20Networks(dkmoon).ppt > 0Sensor%20Networks(dkmoon).ppt >

1

slide-57
SLIDE 57

Outline Outline

  • Motivation

Motivation

  • Core Design

i C ib i

  • Main Contribution
  • Evaluation
  • Discussion

2

slide-58
SLIDE 58

Motivation Motivation

  • What if sensor do not have global knowledge?

What if sensor do not have global knowledge?

  • “How many four‐legged animal do you observe in the

geographical region X?” g g p g

Cheap sensor system:

  • Simple
  • Spatial dense  Close to object  High SNR
  • Spatial dense  Close to object  High SNR
  • Energy efficient
  • Able to route through holes

3

slide-59
SLIDE 59

Motivation Motivation

  • Need a new set of communication primitives

Need a new set of communication primitives that is energy efficient and considers the following: following: ‐ Task‐specific D i ‐ Data‐centric ‐ Based on only local information ‐ Coordination

4

slide-60
SLIDE 60

Naming & Interest Naming & Interest

  • Task is known to every node in advance
  • Task is known to every node in advance
  • Task descriptions contains some attribute‐

l value pairs

  • Query/Interest:

Q y/

‐ Type = four‐legged animal ‐ Interval = 20 ms ‐ Duration = 10 sec. ‐ Rect = [‐100,100,200,400]

5

slide-61
SLIDE 61

Directed Diffusion Directed Diffusion

  • Sink broadcasts interest to neighbors

S b oadcasts te est to e g bo s

  • Any node receiving a new interest first caches it

and then sets up gradients towards the neighbor p g g sending (or forwarding) the interest

  • When source detects something, it checks its

cache; if it finds match, sends reply using gradient

  • Any node receiving a reply checks its cache, and

f d i di t forwards using gradient

  • Sink then reinforce the “best” route

6

slide-62
SLIDE 62

Interests & Gradient Interests & Gradient

  • Sink broadcasts interest to neighbors

Sink broadcasts interest to neighbors

  • Node sets up gradient

Gradient

Source

Interest

Sink

7

slide-63
SLIDE 63

Data Propagation Data Propagation

  • If source finds matched interest in the cache

If source finds matched interest in the cache, it unicasts to neighbor using gradient

  • Node forwards accordingly
  • Node forwards accordingly

Gradient

Source

Data

Sink

8

slide-64
SLIDE 64

(Positive) Reinforcement (Positive) Reinforcement

  • Sink reinforces one particular neighbor in

Sink reinforces one particular neighbor in

  • rder to pull higher quality observations by

some local rules or to perform local repair some local rules or to perform local repair

Gradient

Source

Data Reinforcement

Sink

9

slide-65
SLIDE 65

(Negative) Reinforcement (Negative) Reinforcement

  • Negative reinforcement can be used to

Negative reinforcement can be used to perform route truncation, loop removal or reinforce a consistently better route reinforce a consistently better route

Gradient

Source

Data Negative Reinforcement

Sink

10

slide-66
SLIDE 66

Cache Cache

  • Interest Cache

‐ Stores

Interest C di i d di Corresponding timestamp and gradient

‐ Contains no information about sink

  • Data Cache
  • Data Cache

‐ Stores

reply message (Type Instance Location Intensity Confidence reply message (Type, Instance, Location, Intensity, Confidence, Timestamp)

  • To prevent from loop and to perform aggregation

11

slide-67
SLIDE 67

Summary Summary

  • A reactive routing scheme:

‐ Broadcast: multiplicity of routes p y ‐ Gradient: data‐centric routing ‐ Reinforcement: empirically best route

12

p y ‐ Cache: loop avoidance, aggregation

slide-68
SLIDE 68

Contribution Contribution

  • A new set of communication primitives:

A new set of communication primitives: ‐ Task‐specific i

Onl neighbor to neighbor comm Every node can interpret data & Interest; Simple naming scheme

‐ Data‐centric ‐ Based on only local information

Only neighbor‐to‐neighbor comm.; Usage of Interest & Gradient

‐ Coordination

No globally unique ID & knowledge; Usage of gradient & reinforcement Every node can cache, aggregation and process message

13

slide-69
SLIDE 69

Evaluation ‐ Methodology Evaluation Methodology

  • Result on average of 3 runs of ns2 simulation

Result on average of 3 runs of ns2 simulation

  • 50‐250 sensors with roughly same density

( d l h ) d i k

  • 5 sources (randomly chosen) and 5 sinks

(uniformly scattered)

  • Congestion‐free communication

14

slide-70
SLIDE 70

Comparative Evaluation Comparative Evaluation

Flooding O i i l i Omniscient Multicast has lower

0.018

Omniscient Multicast Directed Diffusion Directed Diffusion has lowest Average Dissipated Energy due to shortest‐path multicast tree

0.012 0.014 0.016

Energy

Average Dissipated Energy due to in‐network aggregation

0.006 0.008 0.01

Dissipated E

0.002 0.004 0.006

Average D

00 50 100 150 200 250 300

Network Size

total dissipated energy # distinct events seen by sinks

15

slide-71
SLIDE 71

Comparative Evaluation Comparative Evaluation

Flooding O i i l i Omniscient Multicast and Omniscient Multicast Directed Diffusion directed diffusion have roughly the same delay Flooding is an order of

0.25 0.3

ay (secs)

magnitude higher due to artifact

  • f the MAC layer broadcast

0.15 0.2

erage Dela

0.05 0.1

Av

00 50 100 150 200 250 300

Network Size

16

slide-72
SLIDE 72

Impact of node failure Impact of node failure

Directed diffusion is somewhat robust to node failure

17

slide-73
SLIDE 73

Impact of node failure Impact of node failure

Not much overhead used to

  • vercome node failure

18

slide-74
SLIDE 74

Sensitivity Sensitivity

Negative reinforcement really contributes In‐network aggregation really contributes

19

really contributes really contributes

  • Other factors (more realistic energy model, # sinks, #sources…etc.) in the tech. report
slide-75
SLIDE 75

Discussion Discussion

  • They list naming scheme as a possible future

y g p

  • work. This will certainly affect the expressivity of
  • tasks. But will naming affect performance of

directed diffusion by much? directed diffusion by much? ‐ General attribute‐based v.s. hierarchical naming

  • Query/Interest:

Query/Interest:

‐ Type = four‐legged animal ‐ Interval = 20 ms Interval 20 ms ‐ Duration = 10 sec. ‐ Rect = [‐100,100,200,400] [ , , , ]

20

slide-76
SLIDE 76

Discussion Discussion

  • How do you think about the idea of purely

How do you think about the idea of purely data‐centric routing? What other types of scheme can be adopted? scheme can be adopted?

  • Though we are not aware of any practical

usage of directed diffusion the core idea of usage of directed diffusion, the core idea of this paper can be utilized in other fields. Could you think of any usage? you think of any usage?

21

slide-77
SLIDE 77

Thank you for your attention! Thank you for your attention!

22

slide-78
SLIDE 78

Learn on the Fly: Data-driven Link Estimation and Routing in Sensor Network Backbones

P R E S E N T E D B Y :

  • R A C H I T A G A R W A L
  • L E W I S T S E N G
slide-79
SLIDE 79

Sensor Network Routing

 Sensor Network Routing requirements

  • energy efficiency
  • low latency
  • data reliability

 High-volume data traffic in a batch  Large scale (possibly long route)

  • Directed diffusion is not suitable
slide-80
SLIDE 80

Fundamental Questions

 Which next-hop should I forward the packet to?  How to estimate link quality?

slide-81
SLIDE 81

Traditional Approach

 Use control-plane beacon packets

 Broadcast a “small” beacon packet to all your neighbors  Small beacons to avoid high overhead  Estimate link properties based on the broadcast results

 Unicast the (potentially much larger) data packet to

the “best” neighbor

slide-82
SLIDE 82

Problems with traditional approach (I)

Difference in packet delivery rate between broadcast and unicast

slide-83
SLIDE 83

Problems in traditional approach (II)

Difference in packet delivery rate (broadcast) for packets of varying sizes 120 0 bytes 30 0 bytes

slide-84
SLIDE 84

Problems with traditional approach (III)

Variation in packet delivery rate due to change in traffic pattern (interference)

2 4 6 8 10 12 14 20 40 60 80 100

distance (meter) Mean broadcast reliability (%)

interferer-free interferer-close interferer-middle interferer-far interferer-exscal

slide-85
SLIDE 85

Problems with traditional approach (IV)

 Temporal variations  Spatial variations

 Different coordination methods at the MAC layer

 Broadcast and unicast have different transmission

rates

 Temporal correlations between link quality

slide-86
SLIDE 86

Idea 1. Data-plane link estimation

 Main idea: link estimation using the data packets

 Requires no and very few beacon packets  Further reduces the energy consumption (?)

 Exploit MAC feedback mechanism –

 Success or failure  MAC latency  time spent in transmitting a packet (including retries)

slide-87
SLIDE 87

Idea 2. ELD metric

 Expected MAC latency per unit distance to the

destination

 MAC latency reflects link reliability (number of MAC

layer retries)

 Routes of lower MAC latency tend to be more reliable  Reducing end-to-end MAC latency also improves network

throughput

slide-88
SLIDE 88

50 100 150 200 250 300 10 10

1

10

2

10

3

window of comparison (seconds) sample size 75-percentile 80-percentile 85-percentile 90-percentile 95-percentile

# data packets required for selecting next-hop

slide-89
SLIDE 89

Experiment design: protocols studied

 Beacon-based routing

 ETX: expected transmission count; geography unaware

(Alec Woo et al. 2003, Douglas Couto et al. 2003)

 PRD: product of link reliability and distance progress;

geography based (Karim Seada et al., 2004)

 Several versions of LOF

slide-90
SLIDE 90

Experiment design: evaluation method

 802.11b testbed of Kansei

 15 × 13 grid

 Traffic flow

 from the right-bottom corner to the upper-left corner  ExScal traffic trace  50 runs for each protocol (50 × 19 = 950 packets)

 Evaluation criteria

 End-to-end MAC latency  Energy efficiency  Links used in routing

slide-91
SLIDE 91

LOF End-to-end MAC latency

LOF reduces MAC latency by a factor of 3

ETX PRD LOF L-hop L-ns L-sd L-se 50 100 150 200 250 end-to-end MAC latency (ms)

median 25-percentile 75-percentilee

slide-92
SLIDE 92

LOF transmission reliability

LOF uses reliable links

ETX PRD LOF L-hop L-ns L-sd L-se 200 400 600 800 1000 1200 # of transmission failures

slide-93
SLIDE 93

LOF path length

slide-94
SLIDE 94

Summary

 Demonstrates that beacon based link estimation

approach is inefficient

 Proposes to perform link estimation at the data-plane  Proposes ELD: a new performance metric for routing in

sensor networks

 Design of a routing protocol that uses data-plane link

estimation and ELD