EE4L CCC L5 Wireless Networking _v1

Embed Size (px)

Citation preview

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    1/109

    EE4L

    Computer & Communication

    Networks

    Part IV Wireless networking

    Dr Costas Constantinou

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    2/109

    Wireless Networking

    1. Overview

    2. Wireless MAC layer protocols

    3. Wireless LANs

    4. Mobile ad hoc networks

    Acknowledgements:

    Slides adapted from numerous sources. Thanks go (alphabetically) to, DrRomit Roy Choudhury, Duke University; Prof Jim Kurose, Univ ofMassachusetts; Prof Nitin Vaidia, Univ of Illinois at Urbana-Champaign

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    3/109

    1. Overview

    Wireless networks are becoming ubiquitous

    The edge of the Internet is fast becoming wireless

    Single hop networks:

    Wireless LANs Cellular

    Multi-hop networks: Personal area networks

    Military

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    4/109

    1. Overview

    RFID and

    Sensor Networks

    Citywatchers, Wal-Mart

    Intel, Philips, Bosch

    Personal Area

    Networks

    Motorola, Intel,

    Samsung

    Mesh Networks and

    Wireless Backbones

    Microsoft, Intel, Cisco InternetFuture network vision:

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    5/109

    1. Overview

    wireless hosts

    laptop, PDA, IP phone run applications may be stationary (non-

    mobile) or mobile wireless does not

    always mean mobility

    Elements of a wireless network

    network

    infrastructure

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    6/109

    1. Overview

    Elements of a wireless network

    network

    infrastructure

    base station

    typically connected towired network

    relay - responsible forsending packetsbetween wired networkand wireless host(s) inits area

    e.g., cell towers802.11 access points

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    7/109

    1. Overview

    Elements of a wireless network

    network

    infrastructure

    wireless link

    connects mobiles tobase station

    sometimes used as abackbone link

    multiple access protocolcoordinates link access

    data transmission rate isa function of distance

    (SNIR really)

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    8/109

    1. Overview

    infrastructure mode

    base station connectsmobiles into wirednetwork

    handover/handoff:mobile changes basestation

    Elements of a wireless network

    network

    infrastructure

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    9/109

    1. Overview

    Ad hoc mode no base stations nodes can only

    transmit to other nodeswithin coverage

    nodes organizethemselves into anetwork: route amongthemselves

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    10/109

    1. Overview

    Characteristics of selected wireless link standards

    Indoor10-30m

    Outdoor50-200m

    Mid-range

    outdoor

    200m 4 Km

    Long-range

    outdoor

    5Km 20 Km

    .056

    .384

    1

    4

    5-11

    54

    IS-95, CDMA, GSM 2G

    UMTS/WCDMA, CDMA2000 3G

    802.15

    802.11b

    802.11a,g

    UMTS/WCDMA-HSPDA, CDMA2000-1xEVDO 3G cellular

    enhanced

    802.16 (WiMAX)

    802.11a,g point-to-point

    200 802.11n

    Datarate(Mbps

    ) data

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    11/109

    1. Overview

    Wireless networks are unlike other networks

    Fundamental difference is that the concept of link asa mathematical graph edge joining a pair of nodes isnot applicable

    A node broadcasts its messages, it cannot send themeach to a chosen neighbour

    Broadcast domains do not have well-defined boundaries,are time-varying and are subject to interference, multipath,noise, etc.

    Broadcast domains are (almost always) partiallyoverlapping

    Interference happens at the receiver; interference (andcarrier sense) range is longer than communication range

    Nodes may move

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    12/109

    1. Overview

    Wired vs. wireless media access Both are on shared media

    Then, whats really the problem?

    Wired network: Collision Detection

    Nodes can transmit and receive at the same time If (Transmitted_Signal Sensed_Signal) Collision

    Channel Condition is identical at Tx and Rx

    Wireless network: No collision detection possible

    Nodes cannot transmit and receive simultaneously on same channel Channel condition varies from node to node and is never

    identical at Tx and Rx

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    13/109

    1. Overview

    Hidden terminal problem

    A, C can not hear each other means that A, C unaware oftheir interference at B

    Spatial signal variation:

    B, A hear each other B, C hear each other A, C can not hear each other

    interfering at B

    AB

    C

    A B C

    As signalstrength

    space

    Cs signalstrength

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    14/109

    Hidden terminal problem

    X is transmitting to Y

    Z cannot sense X

    Z transmits to Y

    Collision at Y; high collision

    rate; wastes bandwidth

    Absence of carrier does not

    always mean it is safe to

    transmit

    Exposed terminal problem

    W is transmitting to X

    Y wants to transmit to Z but

    senses transmission of W and

    defers

    W does not exploit possiblesimultaneous transmission to Z;

    high idle rate; wastes bandwidth

    Presence of carrier does not

    always mean it is not safe to

    transmit

    X Y Z X Y ZW

    1. Overview

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    15/109

    2. Wireless MAC

    Assume that you have some basicknowledge of wired MAC such as Aloha,CSMA, CSMA/CD (a.k.a. IEEE802.3)

    Wireless MAC proved to be non-trivial research by [Karn90] (MACA)

    research by [Bhargavan94] (MACAW)

    Led to IEEE 802.11 committee

    The standard was ratified in 1999

    The predominant wireless MAC protocol isIEEE802.11 and its variants

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    16/109

    2. Wireless MAC

    IEEE802.11 basic operation/handshake

    CTS = Clear

    To Send

    RTS = Request

    To Send

    D

    Y

    S

    M

    K

    RTS

    CTS

    X

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    17/109

    2. Wireless MAC

    IEEE802.11 basic operation/handshake

    D

    Y

    S

    X

    M

    K

    silenced

    silenced

    silenced

    silencedData

    ACK

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    18/109

    2. Wireless MAC

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    19/109

    Two modes CSMA/CAA

    contention basedprotocol. In 802.11 thismode is known as

    Distributed CoordinationFunction (DCF)

    Priority-basedaccessA contentionfree access protocol

    usable on theinfrastructure mode.Known as PointCoordination Function(PCF)

    2. Wireless MAC

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    20/109

    2. Wireless MAC

    802.11 StepsAll backlogged nodes choose a random number

    R = rand (0, CW_min)

    Each node counts down R Continue carrier sensing while counting down Once carrier busy, freeze countdown

    Whoever reaches ZERO transmits RTS Neighbours freeze countdown, decode RTS

    RTS contains (CTS + DATA + ACK) duration =T_comm

    Neighbours set NAV = T_comm Remains silent for NAV time

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    21/109

    2. Wireless MAC

    802.11 Steps (cont.)

    Receiver replies with CTS Also contains (DATA + ACK) duration.

    Neighbours update NAV again

    Tx sends DATA, Rx acknowledges with ACK After ACK, everyone initiates remaining countdown

    Tx chooses new R = rand (0, CW_min)

    If RTS or DATA collides (i.e., no CTS/ACK returns)

    Indicates collision RTS chooses new random no. R1 = rand (0, 2*CW_min)

    Note Exponential Backoff Ri = rand (0, 2^i * CW_min)

    Once successful transmission, reset to rand(0, CW_min)

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    22/109

    2. Wireless MAC

    802.11 basic flow control

    Sender sends RTS with NAV (Network Allocation Vector, i.e.

    reservation parameter that determines amount of time the data packet

    needs the medium) after waiting for DIFS

    Receiver acknowledges via CTS after SIFS (if ready to receive)

    CTS reserves channel for sender, notifying possibly hidden stations;

    any station hearing CTS should be silent for NAV

    Sender can now send data at once

    t

    DIFS

    data

    defer access

    other

    stations

    receiver

    senderdata

    DIFS

    new contention

    RTS

    CTSSIFS SIFS

    NAV (RTS)

    NAV (CTS)

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    23/109

    t

    SIFS

    DIFS

    data

    ACK

    defer access

    other

    stations

    receiver

    senderdata

    DIFS

    new contention

    RTS

    CTSSIFS SIFS

    NAV (RTS)

    NAV (CTS)

    2. Wireless MAC

    802.11: RTS/CTS + ACK, the Final Version

    802.11 adds ACK in the signaling to improve reliability

    implication: to avoid conflict with ACK, any station hearing RTS should not

    send for NAV

    thus a station should not send for NAV if it hears either RTS and CTS

    Note: RTS/CTS is optional in 802.11, and thus may not bealways turned on---some network interface cards turn it on only

    when the length of a frame exceeds a given threshold

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    24/109

    2. Wireless MAC

    802.11: PCF for Polling

    tNAV

    polled

    wireless

    stations

    point

    coordinator

    NAV

    PIFSD

    U

    SIFS

    SIFSD

    contention

    period

    contention free periodmedium

    busy

    D: downstream poll, or data from point coordinator

    U: data from polled wireless station

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    25/109

    2. Wireless MAC

    How to integrate PCF and DCF?

    Basic Solution: Using Inter Frame Spacing to Prioritize Access

    Different inter frame spacing (IFS): if the required IFS of a type of

    message is short, the type of message has higher priority

    SIFS (Short Inter Frame Spacing) highest priority, for ACK, CTS, polling response

    PIFS (Point Coordination Function Spacing)

    medium priority, for time-bounded service using PCF

    DIFS (Distributed Coordination Function Spacing)

    lowest priority, for asynchronous data service

    random direct access ifmedium is free DIFS

    t

    medium busySIFS

    PIFS

    DIFS DIFS

    next framecontention

    Access point access ifmedium is free DIFS

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    26/109

    2. Wireless MAC

    RTS/CTS: Does it solve hidden terminal problem?

    Assuming carrier sensing zone = communication zone

    C

    F

    A B

    E

    D

    CTS

    RTS

    E does not receive CTS successfully Can later initiate transmission to D.

    Hidden terminal problem remains.

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    27/109

    2. Wireless MAC

    HT: How about increasing carrier sense range?

    E will defer on sensing carrier no collision !!!

    CB D

    Data

    A

    E

    CTS

    RTSF

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    28/109

    2. Wireless MAC

    HT: But what if barriers/obstructions exist?

    E doesnt hear C Carrier sensing does not help

    CB D

    Data

    A

    EF

    CTS

    RTS

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    29/109

    2. Wireless MAC

    ET: B should be able to transmit to A

    RTS prevents this

    CA B

    E

    D

    CTS

    RTS

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    30/109

    2. Wireless MAC

    ET: B should be able to transmit to A

    Carrier sensing makes the situation worse

    CA B

    E

    D

    CTS

    RTS

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    31/109

    2. Wireless MAC

    802.11 does not solve HT/ET completely Only alleviates the problem through RTS/CTS

    and recommends larger CS zone

    Large CS zone aggravates exposedterminals Spatial reuse reducesA tradeoff

    RTS/CTS packets also consume bandwidth

    Moreover, backing off mechanism is also wasteful 802.11 is still being optimized

    Thus, wireless MAC research still alive

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    32/109

    3. Wireless LANs

    Wireless LAN architecture wireless host

    communicates with basestation

    base station = access point

    (AP) Basic Service Set (BSS)

    (aka cell) in infrastructuremode contains:

    wireless hosts

    access point (AP): base

    station ad hoc mode: hosts only

    BSS 1

    BSS 2

    Internet

    hub, switch

    or routerAP

    AP

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    33/109

    802.11b: 2.4GHz-2.485GHz spectrum divided into 11channels at different frequencies AP admin chooses frequency for AP

    interference possible: channel can be same as that chosenby neighbouring AP!

    host: must associate with an AP scans channels, listening for beacon frames containing

    APs name (service set identifier SSID) and MACaddress

    selects AP to associate with

    may perform authentication will typically run DHCP to get IP address in APs subnet

    3. Wireless LANs

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    34/109

    802.11 frame: addressing

    frame

    control duration

    address

    1

    address

    2

    address

    4

    address

    3 payload CRC

    2 2 6 6 6 2 6 0 - 2312 4

    seq

    control

    Address 2: MAC address

    of wireless host or AP

    transmitting this frame

    Address 1: MAC address

    of wireless host or AP

    to receive this frame Address 3: MAC addressof router interface to which

    AP is attached

    Address 4: used only in

    ad hoc mode

    3. Wireless LANs

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    35/109

    Internetrouter

    AP

    H1 R1

    AP MAC addr H1 MAC addr R1 MAC addr

    address 1 address 2 address 3 802.11 frame

    R1 MAC addr AP MAC addr

    dest. address source address

    802.3 frame

    3. Wireless LANs

    802.11 frame: addressing

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    36/109

    frame

    controlduration

    address

    1

    address

    2

    address

    4

    address

    3payload CRC

    2 2 6 6 6 2 6 0 - 2312 4

    seq

    control

    TypeFrom

    APSubtype

    To

    AP

    More

    fragWEP

    More

    data

    Power

    mgtRetry Rsvd

    Protocol

    version

    2 2 4 1 1 1 1 1 11 1

    duration of reserved

    transmission time (RTS/CTS)

    frame seq #

    (for reliable ARQ)

    frame type(RTS, CTS, ACK, data)

    3. Wireless LANs

    802.11 frame: more

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    37/109

    3. Wireless LANs

    Mobility within the

    same subnet H1 remains in same IP

    subnet: IP address canremain same

    switch: which AP is

    associated with H1?

    self-learning: switch will see

    frame from H1 and

    remember which switch portcan be used to reach H1

    hub or

    switch

    AP 2

    AP 1

    H1 BBS 2

    BBS 1

    router

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    38/109

    4. MANETs

    Mobile ad hoc Network (MANET)

    Formed by wireless hosts which may be

    mobile

    Without (necessarily) using a pre-existinginfrastructure

    Routes between nodes may potentially

    contain multiple hops

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    39/109

    4. MANETs

    May need to traverse multiple links to

    reach a destination

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    40/109

    4. MANETs

    Mobility causes route changes

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    41/109

    4. MANETs

    Why ad hocNetworks ? Ease of deployment

    Speed of deployment

    Decreased dependence on infrastructure

    Applications

    Personal area networking cell phone, laptop, ear phone, wrist watch Military environments

    soldiers, tanks, planes

    Civilian environments taxi cab network

    meeting rooms

    sports stadiums boats, small aircraft

    Emergency operations search-and-rescue

    policing and fire fighting

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    42/109

    4. MANETs

    Many variants Fully Symmetric Environment

    all nodes have identical capabilities and responsibilities

    Asymmetric Capabilities transmission ranges and radios may differ

    battery life at different nodes may differ

    processing capacity may be different at different nodes speed of movement

    Asymmetric Responsibilities only some nodes may route packets

    some nodes may act as leaders of nearby nodes (e.g., cluster head)

    Traffic characteristics may differ in different ad hoc networks bit rate

    timeliness constraints reliability requirements

    unicast / multicast / geocast

    host-based addressing / content-based addressing / capability-based addressing

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    43/109

    4. MANETs

    Many variants (cont.) May co-exist (and co-operate) with an infrastructure-based

    network

    Mobility patterns may be different people sitting at an airport lounge

    taxis

    kids playing

    military movements

    personal area network

    Mobility characteristics speed

    predictability direction of movement

    pattern of movement

    uniformity (or lack thereof) of mobility characteristics among differentnodes

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    44/109

    4. MANETs

    MANET challenges Must address all of these issues

    Limited wireless transmission range

    Broadcast nature of the wireless medium

    Packet losses due to transmission errors

    Mobility-induced route changes

    Mobility-induced packet losses

    Battery constraints

    Potentially frequent network partitions

    Ease of snooping on wireless transmissions (security hazard)

    No protocol solution fits all MANET scenarios Protocol performance metrics do not scale well with

    increasing mobility and/or number of nodes

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    45/109

    4. MANETs

    Unicast routing in MANETs Whats special about MANET routing?

    Host mobility link failure/repair due to mobility may have different characteristics than those due

    to other causes

    Rate of link failure/repair may be high when nodes move fast

    New performance criteria may be used route stability despite mobility

    energy consumption

    Unicast MANET routing protocol classes Proactive protocols

    Determine routes independent of traffic pattern

    Traditional link-state and distance-vector routing protocols are proactive Reactive protocols

    Maintain routes only if needed

    Hybrid protocols

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    46/109

    4. MANETs

    Routing protocol trade-offs Delay in route discovery

    Proactive protocols may have lower delay since routes are

    maintained at all times

    Reactive protocols may have higher delay because a route from Xto Y will be found only when X attempts to transmit to Y

    Overhead of route discovery/maintenance

    Reactive protocols have lower overhead since routes are

    determined only if needed

    Proactive protocols can (but not necessarily) result in higher

    overhead due to continuous route updating

    Which approach achieves a better trade-off depends on traffic &

    mobility patterns

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    47/109

    4. MANETs

    We shall examine briefly1. Flooding

    2. Dynamic Source Routing (DSR) protocol

    3. Ad hoc On-Demand Distance Vector (AODV) routingprotocol

    4.1 Flooding for Data Delivery Sender S broadcasts data packet P to all its neighbours

    Each node receiving P forwards P to its neighbours

    Sequence numbers used to avoid the possibility offorwarding the same packet more than once

    Packet P reaches destination D provided that D isreachable from sender S

    Node D does not forward the packet

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    48/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Represents connected nodes that are within each

    others transmission range

    Z

    Y

    Represents a node that has received packet P

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    49/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Represents transmission of packet P

    Represents a node that receives packet P for

    the first time

    Z

    Y

    Broadcast transmission

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    50/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Node H receives packet P from two neighbours:

    Potential for collision

    Z

    Y

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    51/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Node C receives packet P from G and H, but does not forward it again,

    because node C has already forwarded packet P once

    Z

    Y

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    52/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    Nodes J and K both broadcast packet P to node D

    Since nodes J and K are hidden from each other, their

    transmissions may collide

    => Packet P may not be delivered to node D at all,

    despite the use of flooding

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    53/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    Node D does not forward packet P, because node D

    is the intended destination of packet P

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    54/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Flooding completed

    Nodes unreachable from S do not receive packet P (e.g., node Z)

    Nodes for which all paths from S go through the destination D also do not

    receive packet P (example: node N)

    Z

    Y

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    55/109

    4.1 Flooding

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Flooding may deliver packets to too many nodes (in the worst case, all

    nodes reachable from sender may receive the packet)

    Z

    Y

    M

    N

    L

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    56/109

    4.1 Flooding

    Advantages of flooding as a data deliverymechanism

    Simplicity

    May be more efficient than other protocols when rate

    of information transmission is low enough that theoverhead of explicit route discovery/maintenanceincurred by other protocols is relatively higher

    this scenario may occur, for instance, when nodes transmitsmall data packets relatively infrequently, and many topology

    changes occur between consecutive packet transmissions Potentially higher reliability of data delivery

    Because packets may be delivered to the destination onmultiple paths

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    57/109

    4.1 Flooding

    Disadvantages of flooding as a data deliverymechanism Potentially very high overhead

    Data packets may be delivered to too many nodes who

    do not need to receive them Potentially lower reliability of data delivery

    Flooding uses broadcasting hard to implementreliable broadcast delivery without significantlyincreasing overhead

    Broadcasting in IEEE 802.11 MAC is unreliable In our example, nodes J and K may transmit to node Dsimultaneously, resulting in loss of the packet

    in this case, destination would not receive the packet at all

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    58/109

    4.1 Flooding

    Flooding of control packets

    Many protocols perform (potentially limited)

    flooding of control packets, instead of data

    packets The control packets are used to discover routes

    Discovered routes are subsequently used to send

    data packet(s)

    Overhead of control packet flooding is amortizedover data packets transmitted between

    consecutive control packet floods

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    59/109

    B

    D

    C

    A

    4.2 Broadcast Storm

    Broadcast Storm Problem [Ni99] When node A broadcasts a route query, nodes B and C both

    receive it

    B and C both forward to their neighbours

    B and C transmit at about the same time since they are reactingto receipt of the same message from A

    This results in a high probability of collisions

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    60/109

    4.2 Broadcast Storm

    Redundancy:A given node may receive the same route

    request from too many nodes, when one copy would

    have sufficed

    Node D may receive from both nodes B and C

    B

    D

    C

    A

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    61/109

    4.2 Broadcast Storm

    Possible solutions Probabilistic scheme: On receiving a route request

    for the first time, a node will re-broadcast (forward)

    the request with probabilityp

    Also, re-broadcasts by different nodes should bestaggered by using a collision avoidance technique

    (wait a random delay when channel is idle)

    this will reduce the probability that nodes B and C forward a

    packet simultaneously in the previous example

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    62/109

    B

    D

    C

    A

    F

    E

    4.2 Broadcast Storm

    Possible solutions (cont.) Counter-Based Scheme: If node E hears more than k

    neighbours broadcasting a given RREQ, before it can

    forward it, then node E will not forward the request

    Intuition: kneighbours together have probably alreadyforwarded the request to all of Es neighbours

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    63/109

    E

    Z

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    64/109

    4.2 Broadcast Storm

    Summary of Broadcast Storm Problem

    Flooding is used in many protocols, such as Dynamic

    Source Routing (DSR, next)

    Problems associated with flooding

    Collisions

    Redundancy

    Collisions may be reduced by jittering (waiting for a

    random interval before propagating the flood)

    Redundancy may be reduced by selectively re-

    broadcasting packets from only a subset of the nodes

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    65/109

    4.2 DSR

    Dynamic Source Routing (DSR) [Johnson96]

    When node S wants to send a packet to node D, but

    does not know a route to D, node S initiates a route

    discovery

    Source node S floods Route Request (RREQ)

    Each node appends own identifierwhen forwarding

    RREQ

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    66/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    Represents a node that has received RREQ for D from S

    M

    N

    L

    Route Discovery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    67/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Represents transmission of RREQ

    Z

    Y

    Broadcast transmission

    M

    N

    L

    [S]

    [X,Y] Represents list of identifiers appended to RREQ

    Route Discovery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    68/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Node H receives packet RREQ from two neighbours:

    potential for collision

    Z

    Y

    M

    N

    L

    [S,E]

    [S,C]

    Route Discovery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    69/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Node C receives RREQ from G and H, but does not forward

    it again, because node C has already forwarded RREQ once

    Z

    Y

    M

    N

    L

    [S,C,G]

    [S,E,F]

    Route Discovery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    70/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    Nodes J and K both broadcast RREQ to node D

    Since nodes J and K are hidden from each other, their

    transmissions may collide

    N

    L

    [S,C,G,K]

    [S,E,F,J]

    Route Discovery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    71/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    Node D does not forward RREQ, because node D

    is the intended target of the route discovery

    M

    N

    L

    [S,E,F,J,M]

    Route Discovery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    72/109

    4.3 DSR

    Route Discovery in DSR

    Destination D on receiving the first RREQ,

    sends a Route Reply (RREP)

    RREP is sent on a route obtained byreversing the route appended to received

    RREQ

    RREP includes the route from S to D on which

    RREQ was received by node D

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    73/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    RREP [S,E,F,J,D]

    Represents RREP control message

    Route Reply

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    74/109

    4.3 DSR

    Route Reply can be sent by reversing the route inRoute Request (RREQ) only if links are guaranteed tobe bi-directional To ensure this, RREQ should be forwarded only if it

    received on a link that is known to be bi-directional

    If unidirectional (asymmetric) links are allowed, thenRREP may need a route discovery for S from node D Unless node D already knows a route to node S

    If a route discovery is initiated by D for a route to S, thenthe Route Reply is piggybacked on the Route Request

    from D. If IEEE 802.11 MAC is used to send data, then links

    have to be bi-directional (since Ack is used)

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    75/109

    4.3 DSR

    Node S on receiving RREP, caches the routeincluded in the RREP

    When node S sends a data packet to D, the

    entire route is included in the packet header hence the name source routing

    Intermediate nodes use the source route

    included in a packet to determine to whom a

    packet should be forwarded

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    76/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    DATA [S,E,F,J,D]

    Packet header size grows with route length

    Data Delivery

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    77/109

    S

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    78/109

    4.3 DSR

    Use of Route Caching When node S learns that a route to node D is broken, it uses

    another route from its local cache, if such a route to D exists in

    its cache. Otherwise, node S initiates route discovery by sending

    a route request

    Node X on receiving a Route Request for some node D can

    send a Route Reply if node X knows a route to node D

    Use of route cache

    can speed up route discovery

    can reduce propagation of route requests

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    79/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    [P,Q,R] Represents cached route at a node

    (DSR maintains the cached routes in a tree format)

    M

    N

    L

    [S,E,F,J,D][E,F,J,D]

    [C,S]

    [G,C,S]

    [F,J,D],[F,E,S]

    [J,F,E,S]

    Z

    Use of Route Caching

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    80/109

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    81/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    [S,E,F,J,D][E,F,J,D]

    [C,S]

    [G,C,S]

    [F,J,D],[F,E,S]

    [J,F,E,S]

    RREQ

    Assume that there is no link between D and Z.

    Route Reply (RREP) from node K limits flooding of RREQ.

    In general, the reduction may be less dramatic.

    [K,G,C,S]

    RREP

    Use of Route Caching

    Can Reduce

    Propagation ofRoute

    Requests

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    82/109

    4.3 DSR

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    RERR [J-D]

    J sends a route error to S along route J-F-E-S when its attempt to forward the

    data packet S (with route SEFJD) on J-D fails

    Nodes hearing RERR update their route cache to remove link J-D

    Route Error (RERR)

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    83/109

    4.3 DSR

    Disadvantages of Route Caching: Stale caches can adversely affect performance

    With passage of time and host mobility, cached

    routes may become invalid

    A sender host may try several stale routes (obtained

    from local cache, or replied from cache by other

    nodes), before finding a good route

    Adverse impact on TCP

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    84/109

    4.3 DSR

    Advantages of Dynamic Source Routing: Routes maintained only between nodes who need to

    communicate

    Reduces overhead of route maintenance

    Route caching can further reduce route discovery

    overhead

    A single route discovery may yield many routes to the

    destination, due to intermediate nodes replying from

    local caches

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    85/109

    4.3 DSR

    Disadvantages of Dynamic Source Routing: Packet header size grows with route length

    Flood of route requests may potentially reach all

    nodes in the network

    Care must be taken to avoid collisions between route

    requests propagated by neighbouring nodes

    Insertion of random delays before forwarding RREQ

    Increased contention if too many route replies come

    back due to nodes replying using their local cache

    Route Reply Storm problem

    Reply storm may be eased by preventing a node from

    sending RREP if it hears another RREP with a shorter route

    4 3 DSR

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    86/109

    4.3 DSR

    Disadvantages of Dynamic Source Routing(cont.):

    An intermediate node may send Route Reply using a

    stale cached route, thus polluting other caches

    This problem can be eased if some mechanism to

    purge (potentially) invalid cached routes is

    incorporated.

    Cache invalidation can be caused by:

    Static timeouts

    Adaptive timeouts based on link stability

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    87/109

    4.4 AODV

    Ad Hoc On-Demand Distance Vector Routing (AODV)[Perkins99]

    DSR includes source routes in packet headers

    Resulting large headers can sometimes degrade performance

    Particularly when data contents of a packet are small AODV attempts to improve on DSR by maintaining routing tables

    at the nodes, so that data packets do not have to contain routes

    AODV retains the desirable feature of DSR that routes are

    maintained only between nodes which need to communicate

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    88/109

    4.4 AODV

    Route Requests (RREQ) are forwarded in a mannersimilar to DSR

    When a node re-broadcasts a Route Request, it sets up

    a reverse path pointing towards the source

    AODV assumes symmetric (bi-directional) links

    When the intended destination receives a Route

    Request, it replies by sending a Route Reply

    Route Reply travels along the reverse path set-up when

    Route Request is forwarded

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    89/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    Represents a node that has received RREQ for D from S

    M

    N

    L

    Route Request

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    90/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Represents transmission of RREQ

    Z

    YBroadcast transmission

    M

    N

    L

    Route Request

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    91/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Represents links on Reverse Path

    Z

    Y

    M

    N

    L

    Route Request

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    92/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Node C receives RREQ from G and H, but does not forward

    it again, because node C has already forwarded RREQ once

    Z

    Y

    M

    N

    L

    Reverse Path Setup

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    93/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    Reverse Path Setup

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    94/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    Node D does not forward RREQ, because node D

    is the intended target of the RREQ

    M

    N

    L

    Reverse Path Setup

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    95/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    Represents links on path taken by RREP

    M

    N

    L

    Route Reply

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    96/109

    4.4 AODV

    Route reply in AODV An intermediate node (not the destination) may also

    send a Route Reply (RREP) provided that it knows amore recent path than the one previously known tosender S

    To determine whether the path known to anintermediate node is more recent, destinationsequence numbers are used

    The likelihood that an intermediate node will send aRoute Reply when using AODV not as high as DSR

    A new Route Request by node S for a destination is assigneda higher destination sequence number. An intermediate nodewhich knows a route, but with a smaller sequence number,cannot send Route Reply

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    97/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    Forward links are setup when RREP travels along

    the reverse path

    Represents a link on the forward path

    Forward Path Setup

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    98/109

    4.4 AODV

    B

    A

    S E

    F

    H

    J

    D

    C

    G

    I

    K

    Z

    Y

    M

    N

    L

    Routing table entries used to forward data packet.

    Route is not included in packet header.

    DATAData Delivery

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    99/109

    4.4 AODV

    Timeouts A routing table entry maintaining a reverse path is

    purged after a timeout interval

    Timeout should be long enough to allow RREP to come back

    A routing table entry maintaining a forward path ispurged if not usedfor a active_route_timeout interval

    If no is data being sent using a particular routing table entry,

    that entry will be deleted from the routing table (even if the

    route may actually still be valid)

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    100/109

    4.4 AODV

    Link failure reporting A neighbour of node X is considered active for a

    routing table entry if the neighbour sent a packet

    within active_route_timeout interval, which was

    forwarded using that entry When the next hop link in a routing table entry breaks,

    all active neighbours are informed

    Link failures are propagated by means of Route Error

    messages, which also update destination sequencenumbers

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    101/109

    4.4 AODV

    Route error handling When node X is unable to forward packet P (from node S

    to node D) on link (X,Y), it generates a RERR message

    Node X increments the destination sequence number for Dcached at node X

    The incremented sequence number Nis included in theRERR

    When node S receives the RERR, it initiates a new routediscovery for D using destination sequence number atleast as large as N

    Destination sequence number When node D receives the route request with destinationsequence number N, node D will set its sequence numberto N, unless it is already larger than N

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    102/109

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    103/109

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    104/109

    4.4 AODV

    Why use sequence numbers in AODV

    Loop C-E-A-B-C

    A B C D

    E

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    105/109

    4.4 AODV

    AODV algorithm optimisation: Expanding RingSearch

    Route Requests are initially sent with small Time-to-

    Live (TTL) field, to limit their propagation

    DSR also includes a similar optimisation

    If no Route Reply is received, then larger TTL tried

    4 4 AODV

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    106/109

    4.4 AODV

    Summary of AODV Routes need not be included in packet headers

    Nodes maintain routing tables containing entries only

    for routes that are in active use

    At most one next-hop per destination maintained at

    each node

    DSR may maintain several routes for a single destination

    Unused routes expire even if topology does not

    change

    5 Open Problems

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    107/109

    5. Open Problems

    Wireless MAC Power control increases spatial reuse

    Rate control based on channel quality

    Exploit channel diversity

    Exploit spatial diversity using directional antennas

    Controlling unwanted interactions between complementary techniques

    Wireless networks Concept of link between two nodes does not capture physics of

    broadcast radio transmission need new mathematical

    abstraction/formalism

    Wireless peer-to-peer network maximum throughput scales badly with

    increasing network node numbers [Gupta00] Network coding [Ahlswede00] is a promising idea for overcoming this

    fundamental limitation, but is riddled with practical difficulties

    Finding economical alternatives to flooding for initial location

    discovery, perhaps by summarising/clustering node locations

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    108/109

    7 References

  • 7/24/2019 EE4L CCC L5 Wireless Networking _v1

    109/109

    7. References

    Wireless MAC1. Karn, P. 1990. MACAA new channel access method for packet radio.ARRL/CRRL Amateur Radio 9th Computer Networking Conference, 134-140.

    2. Bhargavan, V., Demers, A., Shenker S. and Zhang L. 1994. MACAW: A MediaAccess Protocol for Wireless LANs. Proceedings of ACM SIGCOMM 94.

    3. IEEE Std 802.11Part 11: Wireless LAN Medium Access Control (MAC) andPhysical Layer (PHY) Specifications, IEEE, 1999.

    MANET

    1. Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S. and Sheu, J.-P. 1999. The broadcast stormproblem in a mobile ad hoc network. Proc. 5thACM/IEEE MOBICOM99, 151-162.

    2. Johnson, D.B. and Maltz, D.A. 1996. Dynamic source routing in ad hoc wirelessnetworks. Mobile Computing, lmielinski, T. and Korth, H. (Eds.), Kluwer, 153-81.

    3. Perkins, C.E. and Royer, E.M. 1999. Ad-hoc On-Demand Distance Vector Routing.Proc. 2ndIEEE Wksp. Mobile Comp. Sys. and Apps., 90-100.

    4. Haas, Z.J. and Pearlman, M.R. 1998. The performance of a new routing protocolfor the reconfigurable wireless networks. Proc. IEEE ICC98, 156-160.

    Wireless networks theory1. Gupta, P. and Kumar, P.R. 2000. The capacity of wireless networks. IEEE Trans.

    Inform. Theory, 46, 388-404.

    2. Ahlswede, R., Cai, N., Li, S. R. and Yeung, R. 2000. Network information flow.IEEE Trans. Inform. Theory, 46, 1204-1216.