Вы находитесь на странице: 1из 69

1

Simulation And Analysis Of Routing Protocols


For Mobile Ad-hoc Networks: A Comparison
of Performance Of Ad-hoc On Demand
Distance Vector(AODV)& Dynamic Source
Routing (DSR) Protocols

Under the able guidance of
Prof. Girish Chandra Sir
Submitted By:
Anshu Shukla Taruna Arora
0905210016 0905210062
OUTLINE
Objectives
Why talk about MANETs?
Routing Protocols in MANETs
AODV Routing Protocol
DSR Routing Protocol
Simulation Tool:NS2
Performance Metrics
Conclusion











OBJECTIVES
The objectives of the project undertaken are as follows:
Study issues pertaining to MANETs
Analysis of Existing MANETs routing protocol
Parameters pertaining to performance of these protocols
Comparison of Ad hoc On Demand distance Vector
(AODV) Routing Protocol and Dynamic Source Routing
(DSR) Protocol.
Lay guidelines to choose optimal protocol for different
situations
3
Why talk about MANETs?
Infrastructure less network having no fixed base stations.
Dynamic topology, low bandwidth and low power
consumption. multi-hop networks.
Typical application examples
Include a disaster recovery
A military operation.
group of peoples with laptops, in a business meeting at a
place where no network services is present


4
Routing Protocols in MANETs
Routing protocols define a set of rules which governs the
journey of message packets from source to destination in a
network

5

Ad hoc Routing Protocols


Hybrid Protocols


Reactive Protocols


Proactive Protocols

Proactive Routing Protocols
Also called as table driven routing protocols.
Every node maintain routing table.
This feature although useful for datagram traffic, incurs
substantial signalling traffic and power consumption.
The routing tables are updated periodically whenever the
network topology changes.
Not suitable for large networks.
Various well known proactive routing protocols:
DSDV
OLSR
WRP

6
Reactive Routing Protocols
Also known as on demand routing protocols.
Have two major components :
Route discovery
Route Maintenance
Have acknowledgement mechanism due to which route
maintenance is possible.
Well known reactive routing protocols:
DSR
AODV
TORA
LMR
8
Reactive Routing
Protocols(Cont.)
Advantages :
Decreases the routing overhead.
Disadvantages :
add latency to the network due to the route discovery
mechanism.
Applications:
these protocols are suitable in the situations where
low routing overhead is required.
9
Ad-hoc On Demand distance Vector Routing
Protocol
AODV is a beaconless protocol in which no HELLO messages are
exchanged between nodes
Instead of containing information about the complete network
topology sender only includes the address of its neighbour in the
packet.
It uses the periodic beaconing and sequence numbering procedure
Uses traditional routing tables, one entry per destination.
AODV uses destination sequence Routing to prevent routing loops.
Uses timer-based route expiry mechanism to purge stale routes.
Each node maintains at most one route per destination so the
destination replies only once to the arriving request during a route
discovery.
Invoke a new route discovery whenever the only path from the
source to the destination fails.


10
Ad-hoc On Demand distance Vector Routing
Protocol
11
When topology changes frequently, route
discovery needs to be initiated often which
can be very inefficient since route
discovery associated with significant
latency and overhead.
The advantage of AODV is that it is adaptable to highly
dynamic networks.
However, node may experience large delays during route
construction.
Link failure may initiate another route discovery, which
introduces extra delays and consumes more bandwidth as the
size of the network increases .
When topology changes frequently, route discovery needs to
be initiated often which can be very inefficient since route
discovery is associated with significant latency and overhead.
12
Ad-hoc On Demand distance Vector Routing Protocol
DYNAMI C SOURCE ROUTI NG
PROTOCOL
Designed specifically for use in multi-hop wireless ad hoc
networks of mobile nodes. The sequence of hops is included in
each packet's header.
Allows the network to be completely self-organizing and self-
configuring, without the need for any existing network
infrastructure or administration.
It uses source routing which means that the source must know
the complete hop sequence to the destination.
Node maintains a route cache, where all routes it knows are
stored.
Allows multiple routes to any destination and allows each sender
to select and control the routes used in routing its packets,
13
DYNAMI C SOURCE ROUTI NG PROTOCOL


14
DYNAMI C SOURCE ROUTI NG PROTOCOL
15
The main advantage is that intermediate nodes can learn routes
from the source routes in the packets they receive.
Using source routing , it avoids the need for up-to-date routing
information in the intermediate nodes through which the packets
are forwarded.
It avoids routing loops easily because the complete route is
determined by a single node instead of making the decision hop-
by-hop.
August 24,
2006 Talk at SASTRA 16
Port costs less than Rs. 1000
OVERVI EW OF PERFORMANCE METRI CS:
OVERVI EW OF PERFORMANCE
METRI CS:
August 24,
2006 Talk at SASTRA 17
Bluetooth: Wireless PAN
M1
Bluetooth (Named after Danish King
Harold Bluetooth)
Based on Master-Slave concept
Short-range (10 meters)
Eliminate the need for cables
Operates in 2.4 GHz ISM band
720 Kbps
Three modes of operation park/hold/sniff
Piconet & Scatternet (master+7 slaves)
Interference due to multiple piconets
and IEEE 802.15.1 home/person LAN
To eliminate interference frequency
hoping technique used
Ominidirectional with both voice & data

Port costs about Rs. 2000
Piconet 1 Piconet 2
S1
M 1/S1
S2
S2
S1
August 24,
2006 Talk at SASTRA 18
Wi-Fi: Wireless LAN (Hot Spot)
Wireless Fidelity based LAN
Most popular on Laptops
Replacement to wired LAN
Connectivity on the move
Short-range (100 meters)
Ad Hoc and Base station mode
Security provided at physical layer
Operates in 2.4 GHz and 5 GHz
Collection of IEEE standards
802.11a/b/g 11 Mpbs & 54 Mbps
Low range, requires more power
hence not suitable for PDAs
Difficult to control access & security
Set up is expensive
Ad Hoc
Net
Access
Point Net
August 24,
2006 Talk at SASTRA 19
Wi-Max: Wireless MAN
Wireless Max
High Speed 40-70 Mbps
Mid-range (30 Kmeters)
Eliminate the need for cables
Saving of wired cost
Operates in 2.4 GHz ISM band
IEEE standard 802.16

Issues in Wireless Networking

Infrastructured networks
Handoff
location management (mobile IP)
channel assignment

August 24,
2006 Talk at SASTRA 20
Issues in Wireless Networking
Infrastructureless networks
Wireless MAC
Security (integrity, authentication,
confidentiality)
Ad Hoc Routing Protocols
Multicasting and Broadcasting
August 24,
2006 Talk at SASTRA 21
Indoor Environments
Three popular technologies
- High Speed Wireless LANs (802.11b (2.4GHz, 11
Mbps), 802.11a (5GHz, 54 Mbps & higher)
- Wireless Personal area Networks PANs (IEEE
804.14)
HomeRF
Bluetooth, 802.15
- Wireless device networks
Sensor networks, wirelessly networked robots
August 24,
2006 Talk at SASTRA 22
What is an Ad hoc Network
Collection of mobile wireless nodes forming a
network without the aid of any infrastructure or
centralized administration
Nodes have limited transmission range
Nodes act as a routers
August 24,
2006 Talk at SASTRA 23
Ad Hoc Networks
Rapidly deployable
infrastructure
Wireless: cabling impractical
Ad-Hoc: no advance planning
Backbone network: wireless
IP routers
August 24,
2006 Talk at SASTRA 24
Network of access devices
Wireless: untethered
Ad-hoc: random deployment
Edge network: Sensor networks,
Personal Area Networks (PANs), etc.
Disaster recovery
Battlefield
Smart office
Ad Hoc Network
Characteristics
Dynamic topologies
Limited channel bandwidth
Variable capacity links
Energy-constrained operation
Limited physical security
Applications
Military battlefield networks
Personal Area Networks (PAN)
Disaster and rescue operation
Peer to peer networks
August 24,
2006 Talk at SASTRA 25
Security Challenges in Ad Hoc
Networks
Lack of Infrastructure or centralized control
Key management becomes difficult
Dynamic topology
Challenging to design sophisticated & secure routing
protocols
Communication through Radio Waves
Difficult to prevent eavesdropping
Vulnerabilities of routing mechanism
Non-cooperation of nodes
Vulnerabilities of nodes
Captured or Compromised
August 24,
2006 Talk at SASTRA 26
Security
Challenges in ad hoc network security
The nodes are constantly mobile
The protocols implemented are co-operative in nature
There is a lack of a fixed infrastructure to collect audit data
No clear distinction between normalcy and anomaly in ad hoc
networks
Secure the Routing Mechanism
A mechanism that satisfies security attributes like authentication,
confidentiality, non-repudiation and integrity
Secure the Key Management Scheme
Robust key certification and key distribution mechanism
August 24,
2006 Talk at SASTRA 27
Scalable, reliable, consistent,
distributed service
August 24,
2006 Talk at SASTRA 28
Calendar+ service
Integrate dynamic traffic & schedule
Doctor prescription service
track health indicators
Doctor write prescription
Follow me kiosk service
receive and transmit messages
Fridge & shopping service
Fridge records stock
Suggests shopping based on recipe
Shopping guide in store
Sensor services
exercise monitor
biometrics
traffic information

services
Sensors mobile devices
Services while on move
Tourist guide
Stuttgart tourist guide
Like MapQuest except on mobile device
Mapping local interests
Museums historical sites
Shopping & restaurants Sample Data
Small text with description, operating
hours
Local map
August 24,
2006 Talk at SASTRA 29
How it works
Info station
Island of wireless station
Embedded in area
Users have cheap low bandwidth components
Integrated to network with high quality connection
Requires some overlap to manage transition
between stations for hand off
Scaleable by load balancing
Each center contains unique information
Overhead of communication
Initialize externally specified; adjusts quickly
August 24,
2006 Talk at SASTRA 30
Map-on-the-move
Provide appropriate map
County resolution driving in car
Info stations small area high bandwidth
Remainder lower bandwidth




August 24,
2006 Talk at SASTRA 31
Problems in a Mobile Environment
Variable Bandwidth
Disconnected Operation
Limited Power
Implications on distributed file
system support?
August 24,
2006 Talk at SASTRA 32
Constraints in mobile computing
PDA vs. Laptop vs. cell phones
Cellular modem connection: Failure prone
Space: office vs. city vs. county
Not continuous connectivity required
Data such as pictures text files not streaming
audio and video
Heterogeneous devices
August 24,
2006 Talk at SASTRA 33
MANET: Mobile Ad hoc Networks
August 24, 2006 Talk at SASTRA 34
A collection of wireless mobile nodes dynamically forming a
network without any existing infrastructure and the relative
position dictate communication links (dynamically changing).
From DARPA Website
Rapidly Deployable Networks
Failure of communication networks is a critical problem faced
by first responders at a disaster site
major switches and routers serving the region often damaged
cellular cell towers may survive, but suffer from traffic overload and
dependence on (damaged) wired infrastructure for backhaul
In addition, existing networks even if they survive may not be
optimized for services needed at site
significant increase in mobile phone traffic needs to be served
first responders need access to data services (email, www,...)
new requirements for peer-to-peer communication, sensor net or
robotic control at the site
Motivates need for rapidly deployable networks that meet
both the above needs -> recent advances in wireless technology can
be harnessed to provide significant new capabilities
August 24,
2006 Talk at SASTRA 35
Infostations Prototype: System for Rapid
Deployment Applications
Outdoor Infostations with
radio backhaul
for first responders to set up
wireless communications
infrastructure at a disaster site
provides WLAN services and access
to cached data
wireless backhaul link
includes data cache
Project for development of:
high-speed short-range radios
802.11 MAC enhancements
content caching algorithm &
software
hardware integration including solar
panels, antennas and embedded
computing device with WLAN card
August 24, 2006 Talk at SASTRA 36
WINLABs Outdoor Infostations Prototype (2002)
Ad-Hoc Wireless Network
A flexible, open-architecture ad-hoc WLAN and sensor network
testbed ...
open-source Linux routers, APs and terminals (commercial
hardware)
Linux and embedded OS forwarding and sensor nodes (custom)
radio link and global network monitoring/visualization tools
prototype ad-hoc discovery and routing protocols

August 24,
2006 Talk at SASTRA 37
PC-based
Linux router PC
Router network
with arbitrary topology
AP
Compute
& storage
servers
Management
stations
Radio Monitor
Forwarding Node/AP
(custom)
Sensor Node
(custom)
802.11b
PDA
802.11b
Linux PC
Commercial
802.11
What is a WSN?
A network that is formed when a set of small sensor devices
that are deployed in an ad hoc fashion no predefined
routes, cooperate for sensing a physical phenomenon.
A Wireless Sensor Network (WSN) consists of base stations
and a number of wireless sensors.
Is simple, tiny, inexpensive, and battery-powered
August 24, 2006 Talk at SASTRA 38
Sensor: The device
Observer: The end user/computer
Phenomenon: The entity of interest to the observer
Why Wireless Sensors Now?
Moores Law is making sufficient CPU performance available
with low power requirements in a small size.
Research in Materials Science has resulted in novel sensing
materials for many Chemical, Biological, and Physical
sensing tasks.
Transceivers for wireless devices are becoming smaller, less
expensive, and less power hungry (low power tiny Radio
Chips).
Power source improvements in batteries, as well as passive
power sources such as solar or vibration energy, are
expanding application options.
August 24,
2006 Talk at SASTRA 39
Typical Sensor Node Features
A sensor node has:
Sensing Material
Physical Magnetic, Light, Sound
Chemical CO, Chemical Weapons
Biological Bacteria, Viruses, Proteins
Integrated Circuitry (VLSI)
A-to-D converter from sensor to circuitry
Packaging for environmental safety
Power Supply
Passive Solar, Vibration
Active Battery power, RF Inductance
August 24,
2006 Talk at SASTRA 40
Portable and self-sustained (power, communication, intelligence).
Capable of embedded complex data processing.
Transceiver
Embedded
Processor
Sensor
Battery
Memory
Transceiver
Embedded
Processor
Sensor
Battery
Memory
1Kbps- 1Mbps
3m-300m
Lossy Transmission
8 bit, 10 MHz
Slow Computation
Limited Lifetime
Requires
Supervision
Multiple sensors
128Kb-1Mb
Limited Storage
August 24, 2006 Talk at SASTRA 41
Sensor Node Hardware
Sensor + Actuator + ADC + Microprocessor + Powering Unit
+ Communication Unit (RF Transceiver) + GPS
Sensors and Wireless Radio
Types of sensors:
-Pressure,
-Temperature
-Light
-Biological
-Chemical
-Strain, fatigue
-Tilt
Capable to survive harsh
environments (heat, humidity,
corrosion, pollution etc).
No source of interference to
systems being monitored and/or
surrounding systems.
Could be deployed in large
numbers.
August 24, 2006 Talk at SASTRA 42
Wireless Sensor Networks
ZigBee Wireless Communication
Protocol
Based on the IEEE 802.15.4 standard
Small form factor
Relatively Inexpensive
Low Power Consumption
Low Data Rate of Communication
Self Organising, Self-Healingmulti-
hop nodes
Integrated Sensors
Ideal for Wireless Sensor Network
Applications

August 24,
2006 Talk at SASTRA 43
WSN APPLICATIONS
Potential for new intelligent applications:
Smart Homes
Process monitoring and control
Security/Surveillance
Environmental Monitoring
Construction
Medical/Healthcare




Implemented with Wireless Sensor Networks!

August 24,
2006 Talk at SASTRA 44
August 24,
2006 Talk at SASTRA 45
Medical and Healthcare Appln
Backbone
Network
Possibility for Remote consulting
(including Audio Visual communication)
Net Switch
Wireless Remote
consultation
Net Switch
Remote
Databases
In Hospital
Physician
August 24,
2006 Talk at SASTRA 46
Medical and Healthcare
Applications
Sensors equipped
with BlueTooth
Source: USC Web Site
iBadge - UCLA
Investigate behavior of children/patient
Features:
Speech recording / replaying
Position detection
Direction detection / estimation (compass)
Weather data: Temperature, Humidity,
Pressure, Light
August 24,
2006 Talk at SASTRA 47
Other Examples
MIT d'Arbeloff Lab The ring sensor
Monitors the physiological status of the
wearer and transmits the information to
the medical professional over the Internet
Oak Ridge National Laboratory
Nose-on-a-chip is a MEMS-based sensor
It can detect 400 species of gases and
transmit a signal indicating the level to a
central control station
VERICHIP: Miniaturised, Implanted,
Identification Technology

August 24, 2006 Talk at SASTRA 48
Structural Health Monitoring
August 24,
2006 Talk at SASTRA 49
Semi-active Hydraulic Damper
(SHD), Kajima Corporation, Japan Model bridge with attached wireless sensors,
B.F. Spencers Lab, Civil E., U. Illinois U-C
Accelerometer board prototype,
Ruiz-Sandoval, Nagayama & Spencer,
Civil E., U. Illinois Urbana-Champaign
Application in Environment Monitoring
Measuring pollutant
concentration
Pass on information to
monitoring station
Predict current
location of pollutant
volume based on
various parameters
Take corrective action
August 24, 2006 Talk at SASTRA 50
Pollutants monitored by sensors in
the river
Sensors report to the base
monitoring station
ST
August 24,
2006 Talk at SASTRA 51
August 24,
2006 Talk at SASTRA 52
Vehicular Traffic Control
VMesh: Distributed Data Sensing, Relaying, &
Computing via Vehicular Wireless Mesh Networks August 24,
2006 Talk at SASTRA 53
US FCC allocated 5.850 to
5.925 GHz dedicated short
range communication
(DSRC)
Road side to Vehicle
Vehicle to vehicle
communication
Project at The University of California, Davis
Network characteristics of WSN
Generally, the network:
Consists of a large number of sensors (10
3
to 10
6
)
Spread over large geographical region (radius = 1

to
10
3
km)
Spaced out in 1, 2, or 3 dimensions
Is self-organizing
Uses wireless media
May use intermediate collators
August 24,
2006 Talk at SASTRA 54
Sensor Network Topology
Hundreds of nodes require careful handling of topology
maintenance.
Predeployment and deployment phase
Numerous ways to deploy the sensors (mass, individual
placement, dropping from plane..)
Postdeployment phase
Factors are sensor nodes position change, reachability due
to jamming, noise, obstacles etc, available energy,
malfunctioning, theft, sabotage
Redeployment of additional nodes phase
Redeployment because of malfunctioning of units
August 24,
2006 Talk at SASTRA 55
Organization into Ad Hoc Net
Individual sensors are quite limited.
Full potential is realized only by using a
large number of sensors.
Sensors are then organized into an ad hoc
network.
Need efficient protocols to route and
manage data in this network.
August 24,
2006 Talk at SASTRA 56
Network Topologies
Star
Single Hop Network
All nodes communicate
directly with Gateway
No router nodes
Cannot self-heal
Range 30-100m
Consumes lowest power
August 24,
2006 Talk at SASTRA 57
Network Topologies
Mesh
Multi-hopping network
All nodes are routers
Self-configuring network
Node fails, network self-heals
Re-routes data through
shortest path
Highly fault tolerant network
Multi-hopping provides
much longer range
Higher power
consumptionnodes must
always listen!

August 24,
2006 Talk at SASTRA 58
Network Topologies
Star-Mesh Hybrid
Combines of stars low power
and
meshs self-healing and
longer range
All endpoint sensor nodes
can communicate with
multiple routers
Improves fault tolerance
Increases network
communication range
High degree of flexibility and
mobility

August 24,
2006 Talk at SASTRA 59
Self-Organizing WLAN
Opportunistic ad-hoc wireless networking concepts starting to mature
Initial use to extend WLAN range in user-deployed networks
Based on novel auto-discovery and multi-hop routing protocols
extends the utility and reach of low-cost/high speed WiFi equipment
August 24,
2006 Talk at SASTRA 60
Wired Network
Infrastructure AP1
AP2
802.11 Access to
AP
Ad-hoc radio link
(w/multi-hop routing
Mobile Node (MN)
(end-user)
Ad-hoc access
To FN
Self-organizing
Ad-hoc WLAN
Forwarding Node (FN)
Forwarding
Node (FN)
Ad-hoc
Infrastructure
links
How to get information
from Data-centric Sensor Networks?
August 24, 2006 Talk at SASTRA 61
Types of Queries:
Historical Queries: Analysis of data collected over time
One Time Queries: Snapshot view of the network
Persistent Queries: Periodic monitoring at long and regular
intervals
Routing required to respond to a Query:
Application specific
Data centric
Data aggregation capability desirable
Need to minimize energy consumption
Software Framework
August 24,
2006 Talk at SASTRA 62
MAC layer (Tiny OS, routing)
Configuration Table
Power consumption status & replacement strategy
Sensor Data Management
Middleware
Application (passing parameters via API)
Technical challenges
Sensor design
Self-organizing network, that requires 0-
configuration of sensors
Random or planned deployment of sensors, and
collators
Auto-addressing
Auto-service discovery
Sensor localization
August 24,
2006 Talk at SASTRA 63
Power Consumption
Limited Power Source
Battery Lifetime is limited
Each sensor node plays a dual role of data
originator and data router (data processor)
The malfunctioning of a few nodes consumes
lot of energy (rerouting of packets and
significant topological changes)
August 24,
2006 Talk at SASTRA 64
Environmental Factors
Wireless sensors need to operate in
conditions that are not encountered by
typical computing devices:
Rain, sleet, snow, hail, etc.
Wide temperature variations
May require separating sensor from electronics
High humidity
Saline or other corrosive substances
High wind speeds
August 24,
2006 Talk at SASTRA 65
Historical Comparison
August 24,
2006 Talk at SASTRA 66
Consider a 40 Year Old Computer
Model Honeywell H-300 Mica 2
Date 6/1964 7/2003
CPU 2 MHz 4 MHz
Memory 32 KB 128 KB
SRAM ??? 512 KB
Advances in Wireless Sensor Nodes
Consider Multiple Generations of Berkeley Motes
August 24,
2006 Talk at SASTRA 67
Model Rene 2 Rene 2 Mica Mica 2
Date 10/2000 6/2001 2/2002 7/2003
CPU 4 MHz 8 MHz 4 MHz 4 MHz
Flash
Memory
8 KB 16 KB 128 KB 128 KB
SRAM 32 KB 32 KB 512 KB 512 KB
Radio 10 Kbps 10 Kbps 40 Kbps 40 Kbps
Summary
Sensor networks will facilitate one to address several
societal issues:
Early-warning systems
Disaster mitigation
Applications in other sectors
Security, transportation, irrigation
Technology is available today
Research into new sensors
Needs experimentation, pilot deployment
Lots needs to be done in Software (OS, MAC, Application)
While cost is an issue today, it will not be so tomorrow
August 24,
2006 Talk at SASTRA 68
References
Wireless & Mobile Systems Prof Dharma Prakash Agrawal
and H. Deng

Integrating Wireless Technology in the Enterprise by
Williams Wheeler, Elsevier Digital Press

Circuits & Systems for Wireless Communications Edited by
Markus Helfenstein and George S. Moschytz, Kluwer
Academic Publishers
August 24,
2006 Talk at SASTRA 69
August 24,
2006 Talk at SASTRA 70
Any
Questions?

Вам также может понравиться