Mobile Ad Hoc Networks.ppt

上传人:laozhun 文档编号:2347021 上传时间:2023-02-14 格式:PPT 页数:229 大小:790.50KB
返回 下载 相关 举报
Mobile Ad Hoc Networks.ppt_第1页
第1页 / 共229页
Mobile Ad Hoc Networks.ppt_第2页
第2页 / 共229页
Mobile Ad Hoc Networks.ppt_第3页
第3页 / 共229页
Mobile Ad Hoc Networks.ppt_第4页
第4页 / 共229页
Mobile Ad Hoc Networks.ppt_第5页
第5页 / 共229页
点击查看更多>>
资源描述

《Mobile Ad Hoc Networks.ppt》由会员分享,可在线阅读,更多相关《Mobile Ad Hoc Networks.ppt(229页珍藏版)》请在三一办公上搜索。

1、1,Mobile Ad Hoc Networks,Nitin H.VaidyaTexas A&M Universityvaidyacs.tamu.eduhttp:/www.cs.tamu.edu/faculty/vaidya/2000 Nitin Vaidya,2,Notes,For a larger set of tutorial slides,please go tohttp:/www.cs.tamu.edu/faculty/vaidyaand follow the link to Seminars,3,Notes,Names in brackets,as in Xyz00,refer t

2、o a document in the list of referencesThe handout may not be as readable as the original slides,since the slides contain colored text and figuresNote that different colors in the colored slides may look identically black in the black-and-white handout,4,Tutorial Outline,IntroductionUnicast routingMe

3、dium Access Control Performance of UDP and TCPSecurity IssuesImplementation IssuesStandards activitiesOpen problems,5,Notes,Only most important features of various schemes are typically discussedMost schemes include many more details,and optimizationsNot possible to cover all details in this tutoria

4、lBe aware that some protocol specs have changed several timesJargon used to discuss a scheme may occasionally differ from that used by the proposers,6,Mobile Ad Hoc Networks(MANET)Introduction and Generalities,7,Mobile Ad Hoc Networks,Formed by wireless hosts which may be mobileWithout(necessarily)u

5、sing a pre-existing infrastructureRoutes between nodes may potentially contain multiple hops,8,Mobile Ad Hoc Networks,May need to traverse multiple links to reach a destination,9,Mobile Ad Hoc Networks(MANET),Mobility causes route changes,10,Why Ad Hoc Networks?,Ease of deploymentSpeed of deployment

6、Decreased dependence on infrastructure,11,Many Applications,Personal area networkingcell phone,laptop,ear phone,wrist watchMilitary environmentssoldiers,tanks,planesCivilian environmentstaxi cab networkmeeting roomssports stadiumsboats,small aircraftEmergency operationssearch-and-rescuepolicing and

7、fire fighting,12,Many Variations,Fully Symmetric Environmentall nodes have identical capabilities and responsibilitiesAsymmetric Capabilitiestransmission ranges and radios may differ battery life at different nodes may differprocessing capacity may be different at different nodesspeed of movementAsy

8、mmetric Responsibilitiesonly some nodes may route packets some nodes may act as leaders of nearby nodes(e.g.,cluster head),13,Many Variations,Traffic characteristics may differ in different ad hoc networksbit ratetimeliness constraintsreliability requirementsunicast/multicast/geocasthost-based addre

9、ssing/content-based addressing/capability-based addressingMay co-exist(and co-operate)with an infrastructure-based network,14,Many Variations,Mobility patterns may be differentpeople sitting at an airport loungeNew York taxi cabskids playingmilitary movementspersonal area networkMobility characteris

10、ticsspeedpredictabilitydirection of movementpattern of movementuniformity(or lack thereof)of mobility characteristics among different nodes,15,Challenges,Limited wireless transmission rangeBroadcast nature of the wireless mediumHidden terminal problem(see next slide)Packet losses due to transmission

11、 errorsMobility-induced route changesMobility-induced packet lossesBattery constraintsPotentially frequent network partitionsEase of snooping on wireless transmissions(security hazard),16,Hidden Terminal Problem,Nodes A and C cannot hear each otherTransmissions by nodes A and C can collide at node B

12、Nodes A and C are hidden from each other,17,Research on Mobile Ad Hoc Networks,Variations in capabilities&responsibilities XVariations in traffic characteristics,mobility models,etc.XPerformance criteria(e.g.,optimize throughput,reduce energy consumption)+Increased research funding=Significant resea

13、rch activity,18,The Holy Grail,A one-size-fits-all solutionPerhaps using an adaptive/hybrid approach that can adapt to situation at handDifficult problemMany solutions proposed trying to address asub-space of the problem domain,19,Assumption,Unless stated otherwise,fully symmetric environment is ass

14、umed implicitlyall nodes have identical capabilities and responsibilities,20,Unicast RoutinginMobile Ad Hoc Networks,21,Why is Routing in MANET different?,Host mobilitylink failure/repair due to mobility may have different characteristics than those due to other causesRate of link failure/repair may

15、 be high when nodes move fastNew performance criteria may be usedroute stability despite mobilityenergy consumption,22,Unicast Routing Protocols,Many protocols have been proposedSome have been invented specifically for MANETOthers are adapted from previously proposed protocols for wired networksNo s

16、ingle protocol works well in all environmentssome attempts made to develop adaptive protocols,23,Routing Protocols,Proactive protocolsDetermine routes independent of traffic patternTraditional link-state and distance-vector routing protocols are proactiveReactive protocolsMaintain routes only if nee

17、dedHybrid protocols,24,Trade-Off,Latency of route discoveryProactive protocols may have lower latency since routes are maintained at all timesReactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to YOverhead of route discovery/maintenanceR

18、eactive protocols may have lower overhead since routes are determined only if neededProactive protocols can(but not necessarily)result in higher overhead due to continuous route updatingWhich approach achieves a better trade-off depends on the traffic and mobility patterns,25,Overview of Unicast Rou

19、ting Protocols,26,Flooding for Data Delivery,Sender S broadcasts data packet P to all its neighborsEach node receiving P forwards P to its neighborsSequence numbers used to avoid the possibility of forwarding the same packet more than oncePacket P reaches destination D provided that D is reachable f

20、rom sender SNode D does not forward the packet,27,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,Represents that connected nodes are within each others transmission range,Z,Y,Represents a node that has received packet P,M,N,L,28,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,Represents trans

21、mission of packet P,Represents a node that receives packet P forthe first time,Z,Y,Broadcast transmission,M,N,L,29,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,Node H receives packet P from two neighbors:potential for collision,Z,Y,M,N,L,30,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,No

22、de C receives packet P from G and H,but does not forward it again,because node C has already forwarded packet P once,Z,Y,M,N,L,31,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,M,Nodes J and K both broadcast packet P to node D Since nodes J and K are hidden from each other,their transmission

23、s may collide=Packet P may not be delivered to node D at all,despite the use of flooding,N,L,32,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,Node D does not forward packet P,because node D is the intended destination of packet P,M,N,L,33,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,F

24、looding completed Nodes unreachable from S do not receive packet P(e.g.,node Z)Nodes for which all paths from S go through the destination D also do not receive packet P(example:node N),Z,Y,M,N,L,34,Flooding for Data Delivery,B,A,S,E,F,H,J,D,C,G,I,K,Flooding may deliver packets to too many nodes(in

25、the worst case,all nodes reachable from sender may receive the packet),Z,Y,M,N,L,35,Flooding for Data Delivery:Advantages,SimplicityMay be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by oth

26、er protocols is relatively higherthis scenario may occur,for instance,when nodes transmit small data packets relatively infrequently,and many topology changes occur between consecutive packet transmissionsPotentially higher reliability of data deliveryBecause packets may be delivered to the destinat

27、ion on multiple paths,36,Flooding for Data Delivery:Disadvantages,Potentially,very high overheadData packets may be delivered to too many nodes who do not need to receive themPotentially lower reliability of data deliveryFlooding uses broadcasting-hard to implement reliable broadcast delivery withou

28、t significantly increasing overheadBroadcasting in IEEE 802.11 MAC is unreliableIn our example,nodes J and K may transmit to node D simultaneously,resulting in loss of the packet in this case,destination would not receive the packet at all,37,Flooding of Control Packets,Many protocols perform(potent

29、ially limited)flooding of control packets,instead of data packetsThe control packets are used to discover routesDiscovered routes are subsequently used to send data packet(s)Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods,38,Dy

30、namic Source Routing(DSR)Johnson96,When node S wants to send a packet to node D,but does not know a route to D,node S initiates a route discoverySource node S floods Route Request(RREQ)Each node appends own identifier when forwarding RREQ,39,Route Discovery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,Represe

31、nts a node that has received RREQ for D from S,M,N,L,40,Route Discovery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Represents transmission of RREQ,Z,Y,Broadcast transmission,M,N,L,S,X,Y Represents list of identifiers appended to RREQ,41,Route Discovery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Node H receives packet RREQ

32、from two neighbors:potential for collision,Z,Y,M,N,L,S,E,S,C,42,Route Discovery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Node C receives RREQ from G and H,but does not forward it again,because node C has already forwarded RREQ once,Z,Y,M,N,L,S,C,G,S,E,F,43,Route Discovery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,M,

33、Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other,their transmissions may collide,N,L,S,C,G,K,S,E,F,J,44,Route Discovery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,Node D does not forward RREQ,because node D is the intended target of the route discovery,M,N,L,S,E,F,J

34、,M,45,Route Discovery in DSR,Destination D on receiving the first RREQ,sends a Route Reply(RREP)RREP is sent on a route obtained by reversing the route appended to received RREQRREP includes the route from S to D on which RREQ was received by node D,46,Route Reply in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,

35、M,N,L,RREP S,E,F,J,D,Represents RREP control message,47,Route Reply in DSR,Route Reply can be sent by reversing the route in Route Request(RREQ)only if links are guaranteed to be bi-directionalTo ensure this,RREQ should be forwarded only if it received on a link that is known to be bi-directionalIf

36、unidirectional(asymmetric)links are allowed,then RREP may need a route discovery for S from node D Unless node D already knows a route to node SIf a route discovery is initiated by D for a route to S,then the Route Reply is piggybacked on the Route Request from D.If IEEE 802.11 MAC is used to send d

37、ata,then links have to be bi-directional(since Ack is used),48,Dynamic Source Routing(DSR),Node S on receiving RREP,caches the route included in the RREPWhen node S sends a data packet to D,the entire route is included in the packet headerhence the name source routingIntermediate nodes use the sourc

38、e route included in a packet to determine to whom a packet should be forwarded,49,Data Delivery in DSR,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,M,N,L,DATA S,E,F,J,D,Packet header size grows with route length,50,When to Perform a Route Discovery,When node S wants to send data to node D,but does not know a valid r

39、oute node D,51,DSR Optimization:Route Caching,Each node caches a new route it learns by any meansWhen node S finds route S,E,F,J,D to node D,node S also learns route S,E,F to node FWhen node K receives Route Request S,C,G destined for node,node K learns route K,G,C,S to node SWhen node F forwards Ro

40、ute Reply RREP S,E,F,J,D,node F learns route F,J,D to node DWhen node E forwards Data S,E,F,J,D it learns route E,F,J,D to node DA node may also learn a route when it overhears Data packets,52,Use of Route Caching,When node S learns that a route to node D is broken,it uses another route from its loc

41、al cache,if such a route to D exists in its cache.Otherwise,node S initiates route discovery by sending a route requestNode X on receiving a Route Request for some node D can send a Route Reply if node X knows a route to node DUse of route cache can speed up route discoverycan reduce propagation of

42、route requests,53,Use of Route Caching,B,A,S,E,F,H,J,D,C,G,I,K,P,Q,R Represents cached route at a node(DSR maintains the cached routes in a tree format),M,N,L,S,E,F,J,D,E,F,J,D,C,S,G,C,S,F,J,D,F,E,S,J,F,E,S,Z,54,Use of Route Caching:Can Speed up Route Discovery,B,A,S,E,F,H,J,D,C,G,I,K,Z,M,N,L,S,E,F,

43、J,D,E,F,J,D,C,S,G,C,S,F,J,D,F,E,S,J,F,E,S,RREQ,When node Z sends a route requestfor node C,node K sends back a routereply Z,K,G,C to node Z using a locallycached route,K,G,C,S,RREP,55,Use of Route Caching:Can Reduce Propagation of Route Requests,B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,M,N,L,S,E,F,J,D,E,F,J,D,C,

44、S,G,C,S,F,J,D,F,E,S,J,F,E,S,RREQ,Assume that there is no link between D and Z.Route Reply(RREP)from node K limits flooding of RREQ.In general,the reduction may be less dramatic.,K,G,C,S,RREP,56,Route Error(RERR),B,A,S,E,F,H,J,D,C,G,I,K,Z,Y,M,N,L,RERR J-D,J sends a route error to S along route J-F-E-

45、S when its attempt to forward the data packet S(with route SEFJD)on J-D failsNodes hearing RERR update their route cache to remove link J-D,57,Route Caching:Beware!,Stale caches can adversely affect performanceWith passage of time and host mobility,cached routes may become invalidA sender host may t

46、ry several stale routes(obtained from local cache,or replied from cache by other nodes),before finding a good routeAn illustration of the adverse impact on TCP will be discussed later in the tutorial Holland99,58,Dynamic Source Routing:Advantages,Routes maintained only between nodes who need to comm

47、unicatereduces overhead of route maintenanceRoute caching can further reduce route discovery overheadA single route discovery may yield many routes to the destination,due to intermediate nodes replying from local caches,59,Dynamic Source Routing:Disadvantages,Packet header size grows with route leng

48、th due to source routingFlood of route requests may potentially reach all nodes in the networkCare must be taken to avoid collisions between route requests propagated by neighboring nodesinsertion of random delays before forwarding RREQIncreased contention if too many route replies come back due to

49、nodes replying using their local cacheRoute Reply Storm problemReply storm may be eased by preventing a node from sending RREP if it hears another RREP with a shorter route,60,Dynamic Source Routing:Disadvantages,An intermediate node may send Route Reply using a stale cached route,thus polluting oth

50、er cachesThis problem can be eased if some mechanism to purge(potentially)invalid cached routes is incorporated.For some proposals for cache invalidation,see Hu00Mobicom,61,Flooding of Control Packets,How to reduce the scope of the route request flood?LAR Ko98MobicomQuery localization Castaneda99Mob

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号