3
The 1 st International Conference on Next Generation Network (NGNCON 2006) Hyatt Regency Jeju, Korea / July 9 - 13, 2006 MoC3-8 Scalability Analysis of MANET DAD Protocols Sang-Chul Kim', Jong-Moon Chung2 ('Kookmin University, School of Computer Science, 136-702, 86 1-1 Chongnung-dong, Songbuk-gu, Seoul, Korea, Tel: +82-2-910-5462, Fax: +82-2-910-4868, Email: sckim7gkookmin.ac.kr) (2Yonsei University, School of Electrical and Electronic Engineering, 120-749, 134 Shinchon-dong, Seodaemun-gu, Seoul, Korea, Tel: +82-2-2123-5863, Fax: +82-2-313-2879, Email: jmcgyonsei.ac.kr) Abstract This paper proposes a novel method to perform a quantitative analysis of message complexity and applies this method in comparing the message complexity among the mobile ad hoc network (MANET) address autoconfiguration protocols. 1 Introduction Mobile ad hoc networks (MANETs) are self-organizing wireless networks where mobile nodes have routing capabilities to be able to forward packets to communicate with one another over multi-hop wireless links without any fixed communication infrastructure, such as a base station or an access point. Therefore, it is essential for all nodes to be able to perform the operations required for configuration of unique addresses to execute proper routing of data packets in a M\ANET. Address autoconfiguration is an important issue in MANETs since address pre-configuration is not always possible. MANETs currently depend on the mechanism of checking IP addresses of nodes to decide whether the connection and identification of nodes participating in a MANET are established or not [1]. Based on the conventional method stated in [2], DAD can be classified as Strong DAD and Weak DAD. Strong DAD uses an address discovery mechanism where a node randomly selects an address and requests the address within a M\ANET by checking if the address is being used in the M\ANET. Based on a reply for the claimed request, which needs to arrive at the node within a finite bounded time interval, the node can detect an address duplication in the MANET [1]. Weak DAD is proposed by [2], where ad hoc routing protocols are 89-955301-4-6 98560 @2006 OSIA used to detect address duplication by modification of the routing protocol packet format. MANET routing protocols can be classified into proactive and on-demand. Proactive routing protocols using periodic neighbor discovery messages and topology update messages give route information to each node before a node sends data packets to a destination. As a stateful protocol, M\ANETconf [3] uses a mutual exclusion algorithm for a node to acquire a new IP address. Therefore, if a requester wants to acquire an IP address, the IP address should be approved by all nodes in a M\ANET. In other related research, Weniger and Zitterbart summarized the current approach and future directions of address autoconfiguration in MANETs [4]. Jeong et al. studied hybrid ad hoc IP address autoconfigurations in [5]. In [6] Zhou and Mutka investigated prophet address allocation for large scale MIANETs. Additionally, Weniger proposed a passive autoconfiguration for MANETs in [7]. Since the autoconfiguration protocols in the above section have been composed of key steps introduced in Strong DAD, Weak DAD and MANETconf based on authors' literature review, this paper focuses on formalizing how to analyze and compare the message complexity of the key steps used in Strong DAD, Weak DAD and MANETconf. 2 Experiment A MANET is represented as an undirected graph G(V, E) where V is a finite nonempty set of nodes, which can be represented as V= { VIf, V20,, VG } where Il =W and E is a collection of pairs of distinct nodes from V that form a link, which can be - 75 -

[IEEE COIN-NGNCON 2006 - The Joint International Conference on Optical Internet and Next Generation Network - Jeju, Korea (2006.07.9-2006.07.13)] COIN-NGNCON 2006 - The Joint International

Embed Size (px)

Citation preview

Page 1: [IEEE COIN-NGNCON 2006 - The Joint International Conference on Optical Internet and Next Generation Network - Jeju, Korea (2006.07.9-2006.07.13)] COIN-NGNCON 2006 - The Joint International

The 1 st International Conference on Next Generation Network (NGNCON 2006)Hyatt Regency Jeju, Korea / July 9 - 13, 2006 MoC3-8

Scalability Analysis ofMANET DAD Protocols

Sang-Chul Kim', Jong-Moon Chung2

('Kookmin University, School of Computer Science, 136-702, 86 1-1 Chongnung-dong, Songbuk-gu, Seoul,

Korea, Tel: +82-2-910-5462, Fax: +82-2-910-4868, Email: sckim7gkookmin.ac.kr)(2Yonsei University, School of Electrical and Electronic Engineering, 120-749, 134 Shinchon-dong,

Seodaemun-gu, Seoul, Korea, Tel: +82-2-2123-5863, Fax: +82-2-313-2879, Email: jmcgyonsei.ac.kr)

Abstract

This paper proposes a novel method to perform a

quantitative analysis of message complexity and

applies this method in comparing the message

complexity among the mobile ad hoc network

(MANET) address autoconfiguration protocols.

1 Introduction

Mobile ad hoc networks (MANETs) are

self-organizing wireless networks where mobile nodeshave routing capabilities to be able to forward packetsto communicate with one another over multi-hopwireless links without any fixed communicationinfrastructure, such as a base station or an access point.Therefore, it is essential for all nodes to be able to

perform the operations required for configuration of

unique addresses to execute proper routing of datapackets in a M\ANET. Address autoconfiguration isan important issue in MANETs since addresspre-configuration is not always possible. MANETscurrently depend on the mechanism of checking IP

addresses of nodes to decide whether the connectionand identification of nodes participating in a MANETare established or not [1]. Based on the conventionalmethod stated in [2], DAD can be classified as StrongDAD and Weak DAD. Strong DAD uses an address

discovery mechanism where a node randomly selectsan address and requests the address within a M\ANETby checking if the address is being used in the

M\ANET. Based on a reply for the claimed request,

which needs to arrive at the node within a finitebounded time interval, the node can detect an address

duplication in the MANET [1]. Weak DAD is

proposed by [2], where ad hoc routing protocols are

89-955301-4-6 98560 @2006 OSIA

used to detect address duplication by modification ofthe routing protocol packet format. MANET routingprotocols can be classified into proactive andon-demand. Proactive routing protocols using periodicneighbor discovery messages and topology updatemessages give route information to each node before a

node sends data packets to a destination. As a statefulprotocol, M\ANETconf [3] uses a mutual exclusionalgorithm for a node to acquire a new IP address.Therefore, if a requester wants to acquire an IP

address, the IP address should be approved by allnodes in a M\ANET. In other related research, Wenigerand Zitterbart summarized the current approach andfuture directions of address autoconfiguration in

MANETs [4]. Jeong et al. studied hybrid ad hoc IP

address autoconfigurations in [5]. In [6] Zhou andMutka investigated prophet address allocation forlarge scale MIANETs. Additionally, Weniger proposeda passive autoconfiguration for MANETs in [7]. Sincethe autoconfiguration protocols in the above sectionhave been composed of key steps introduced in StrongDAD, Weak DAD and MANETconf based on authors'literature review, this paper focuses on formalizinghow to analyze and compare the message complexityof the key steps used in Strong DAD, Weak DAD andMANETconf.

2 ExperimentA MANET is represented as an undirected graph

G(V, E) where V is a finite nonempty set of nodes,

which can be represented as V= { VIf, V20,, VG }

where Il =W and E is a collection of pairs of distinctnodes from V that form a link, which can be

- 75 -

Page 2: [IEEE COIN-NGNCON 2006 - The Joint International Conference on Optical Internet and Next Generation Network - Jeju, Korea (2006.07.9-2006.07.13)] COIN-NGNCON 2006 - The Joint International

conflict probabilities.represented as E= {El , E2 I .. Ew . In order to

analyze the message complexity of each addressautoconfiguration protocol, a standalone M\ANETenvironment is needed, where the MANET nodeshave no connection to an external network like the

Internet. Therefore, a computer simulator was

developed where nodes are randomly distributed withuniform density in a network area of 1km2. A

discrete-event simulator was developed in Matlab in

order to verify the various network topologies and to

calculate the message complexity of each addressautoconfiguration protocol. The random nodegenerator and simulator performance was verified (forthe numbers of nodes 100, 125, 150, and 175) so thatthe average number of nodes per cluster as well as

several specs in the ADB algorithm [8] matched withthe results in [8], which was performed by QualNet,with less than a 1% difference for almost all cases. In

the Strong DAD protocol, five is used for retry count

limit (n) and three is used for DAD retry count limit

(m). In the Weak DAD and MANETconf protocols,five is used for retry count limit (n) and one is used forDAD retry count limit (m). In addition, 1OOm isselected as the transmission range of nodes. Thenumber of nodes is varied from 10 to 50 for thetransmission range.

3 Message Complexity AnalysisFig. 1 shows the message complexity of the singlenode joining case for the Strong DAD protocol basedon the different conflict probabilities. In Figs. 1-4, thehorizontal axis represents the number of nodes in thenetwork area and the vertical axis indicates thenumber of messages for each case. As the conflict

probability increases, it is shown that the number of

messages to resolve the duplicated IP address alsoincreases. Figs. 2 and 3 show the message complexityof Weak DAD respectively for proactive routingprotocols and on demand routing protocols, based on

the different conflict probabilities. Fig. 4 shows the

message complexity of the single node joining case ofthe M\ANETconf protocol based on the different

R=lOOm (Single Node Joining Case: Strong DAD)

Fig. 1. Message complexity of Strong DAD.

R=lOOm wVeak DAD with Proactive Routing Protocols)

Fig. 2. Message complexity of Weak DAD withproactive routing protocols.

u2

R=lOOm (Weak DAD with On Demand Routing Protocols)

25 30No of Nodes

Fig. 3. Message complexity of Weak DAD with on

demand routing protocols.

- 76 -

10

Page 3: [IEEE COIN-NGNCON 2006 - The Joint International Conference on Optical Internet and Next Generation Network - Jeju, Korea (2006.07.9-2006.07.13)] COIN-NGNCON 2006 - The Joint International

R=lOnm (Single Node Joining Case: MANETcon)

Fig. 4. Message complexity of MANETconf.

Figs. 1-4 show that as the conflict probability

approached 1 the message complexity approaches the

derived theoretical message complexity upper bounds.

However for the case of NIANETconf in Fig 4, due to

the difference in the consideration of the stateful

addressing procedures, a small difference between the

upper bound and the p=1 case can be observed.

4 Conclusion

For the conflict probability of 0.5, 0.7, 0.9 and 1,Weak DAD with proactive routing protocols has thesmallest message complexity and Strong DAD has thelargest message complexity. However, since proactiverouting protocols depend on a periodic message to

update the network topology and on demand routingprotocols do not need a periodic message, it is not fairfor the two routing protocols to be compared using thenumber of messages. The result above can be used

only in the case where the Weak DAD protocol uses

M\ANET routing protocols for nodes to configure its

IP address and solve the duplicate IP address detection.Based on the simulation results and analysis of themessage complexity, when nominal n, m values andtransmission range have been assigned in a singlenode joining case with p < 1, the message complexitycan be compared as follows: Weak DAD withproactive routing protocol < Weak DAD with on

demand routing protocol < MANETconf < StrongDAD. In the view point of the message complexity,

when a MANET area is composed of a high conflict

probability, Weak DAD with MANET routing

protocols becomes a more suitable protocol than

MANETconf and Strong DAD since Weak DAD with

M\ANET routing protocols provides both routing and

address autoconfiguration and much less message

complexity compared to MANETconf and Strong

DAD.

5 References

[1]C. E. Perkins, J. T. Malinen, R. Wakikawa, E. M. Royer,

and Y. Sun, "IP address autoconfiguration for ad hoc

networks," IETF draft, 2001,

http //www.cs.ucsb.edu/-ebelding/txt/autoconlf.txt.[2]N. H. Vaidya, "Weak duplicate address detection in

mobile ad hoc networks," Proc. ACM MobiHoc 2002, pp.

206-216, June 2002, Lausanne, Switzerland.

[3] S. Nesargi and R. Prakash, "MANETconf:

Configuration of hosts in a mobile ad hoc network,"

Proc. IEEE Infocom 2002, June 2002, New York,

USA.

[4]K. Weniger, and M. Zitterbart, "Address

autoconfiguration in mobile ad hoc networks: Current

Approaches and Future Directions," IEEE Network, pp.

6-1 1, Jul./Aug. 2004.

[5]J-. P. Jeong, J. Park, H. Kim, and D. Kim, "Ad hoc IP

address autoconfiguration," IETF draft, July 2004.

[6] H. Zhou, L. M. Ni, and M. W. Mutka, "Prophet

Address Allocation for Large Scale MANETs," Ad

Hoc Networks Journal, vol. 1, issue 4, pp. 423-434,

Nov. 2003.

[7]K. Weniger, "Passive duplicate address detection in

mobile ad hoc networks," Proc. IEEE WCNC 2003, Mar.

2003, New Orleans, USA.

[8] C-. C. Shen, and C. Srisathapornphat, and R. L. Z.

Huang, and C. Jaikaeo, and E. L. Lloyd, "CLTC: A

cluster-based topology control framework for ad hoc

networks," IEEE Trans. Mobile Computing, vol. 3,

no.1, pp. 18-32, Jan.-Mar. 2004.

- 77 -