Professional Documents
Culture Documents
Outline
1 Introduction
2 Media access
3 Routing
4 Current research areas
www.tm.uka.de
1 Introduction
What are mobile ad hoc networks?
No central components
Example
transmission
range r
r
Node
Link
www.tm.uka.de
n
io
iss
m
ns
tra nge
ra
www.tm.uka.de
e.g. with 802.11b in the 2.4 GHz (ISM) band: no license required
distance to nearest neighbor can be lower than to the base station
Military applications
Civil applications
In case of disasters
In case of infrastructure failure (telephone network,..): e.g. earthquakes
rescue operations, e.g. after avalanches
www.tm.uka.de
www.tm.uka.de
Traffic jams
Obstacles
Dangerous spots
Speed controls
...
Demonstrator Fleetnet-Project
www.tm.uka.de
Internet
Extension of
access network
Ad-hoc communication,
Ad-hoc
communication
Extension of access
network
Ad-hoc
Communication
www.tm.uka.de
Mobility of devices
Changing properties of the wireless channel (Fading, multipath propagation)
Partitioning and merging of ad-hoc networks possible
No infrastructure
Limited bandwidth
Worsened by signaling traffic, e.g. of the routing protocol and the MAC protocol
Asymmetric/Unidirectional links
www.tm.uka.de
2. Media access
Motivation
Media access control is necessary to enable controlled access to a
medium shared by several devices
MAC algorithms for fixed networks (e.g. CSMA/CD) usually cannot be
applied in a wireless environment:
Possible algorithm
www.tm.uka.de
Data frame
SIFS
Receiver
Ack
DIFS
Other
stations
Waiting time
t
Contention period
(backoff)
Data frame
www.tm.uka.de
A sends to B
C does not receive A anymore
C wants so send to B, Medium is free for C (CS fails)
Collision at B, A does not recognize this (CD fails)
A is hidden for C
www.tm.uka.de
Virtual reservation
DIFS
Sender
RTS
data
SIFS
CTS SIFS
SIFS
ACK
Receiver
Other
Stations
Waiting time
DIFS
NAV (RTS)
NAV (CTS)
data
t
Backoff
www.tm.uka.de
Exposed terminals
Exposed terminal
B sends to A
C wants to send to D
C must wait: CS signals an that medium is busy
This is unnecessary: A is outside Cs range
C is exposed to B
www.tm.uka.de
slow convergence
too much overhead
Routing protocols for ad-hoc networks must, in contrast, converge quickly and
use as little bandwidth as possible for control traffic
Different metrics are possible for mobile ad-hoc networks
www.tm.uka.de
Classification
Flooding for data transfer
Most simple protocol: Each node forwards each packet exactly once
very high overhead
Hybrid Routing
There is not (yet) a one-fits-all routing protocol for mobile ad-hoc networks
[3]
www.tm.uka.de
Approaches
its neighbor (next hop), via which the shortest route to the specific node leads
the length of this route
www.tm.uka.de
www.tm.uka.de
Multipoint Relays
2. Determination of Multipoint Relays (MPR)
The MPRs of X are a subset of the symmetric 1-hop neighbors of X
z This subset is determined such that each symmetric 2-hop neighbor
of X can be reached via at least one MPR
z Determination of the subset according to heuristics on every change
detected within the 2-hop neigborhood
z Selected MPRs are announced in HELLO messages
z
www.tm.uka.de
Example OLSR I
Determination of neighbors, MPR and MS (HELLO messages)
B
C
Node
A
B
C
D
E
F
G
H
1-hop neighbors
2-hop neighbors
MPR
MS
www.tm.uka.de
Example OLSR II
Determination of neighbors, MPR and MS (HELLO messages)
B
C
Node
A
B
C
D
E
F
G
H
Mobile ad hoc networks 20
1-hop neighbors
2-hop neighbors
MPR
MS
A
A
A, E
A, G
G
www.tm.uka.de
C
Node
A
B
C
D
E
F
G
H
1-hop neighbors
F, D
A, D, F
A, D, F
A, E
D
A, G
F, H
G
2-hop neighbors
E, G
E, G
E, G
MPR
D, F
D, F
D, F
MS
www.tm.uka.de
Example OLSR IV
Determination of neighbors, MPR and MS (HELLO messages)
B
C
Node
A
B
C
D
E
F
G
H
Mobile ad hoc networks 22
1-hop neighbors
B, C, D, F
A, D, F
A, D, F
A, B, C, E
D
A, B, C, G
F, H
G
2-hop neighbors
E, G
E, G
E, G
F
A
D
A
MPR
D, F
D, F
D, F
B
D
B
F
MS
B, C
B, C
www.tm.uka.de
Example OLSR V
Determination of neighbors, MPR and MS (HELLO messages)
B
C
Node
A
B
C
D
E
F
G
H
1-hop neighbors
B, C, D, F
A, D, F
A, D, F
A, B, C, E
D
A, B, C, G
F, H
G
2-hop neighbors
E, G
C, E, G
B, E, G
F
A, B, C
D
A, B, C
MPR
D, F
D, F
D, F
B
D
B
F
MS
D, F
B, C
B, C
www.tm.uka.de
Example OLSR VI
Determination of neighbors, MPR and MS (HELLO messages)
B
C
Node
A
B
C
D
E
F
G
H
Mobile ad hoc networks 24
1-hop neighbors
B, C, D, F
A, D, F
A, D, F
A, B, C, E
D
A, B, C, G
F, H
G
2-hop neighbors
E, G
C, E, G
B, E, G
F
A, B, C
D, H
A, B, C
F
MPR
D, F
D, F
D, F
B
D
B, G
F
G
MS
D, F
A, B, C, E
A, B, C, G
www.tm.uka.de
C
Node
A
B
C
D
E
F
G
H
S
T
A
B
L
E
!
1-hop neighbors
B, C, D, F
A, D, F
A, D, F
A, B, C, E
D
A, B, C, G
F, H
G
2-hop neighbors
E, G
C, E, G
B, E, G
F
A, B, C
D, H
A, B, C
F
MPR
D, F
D, F
D, F
B
D
B, G
F
G
MS
D, F
A, B, C, E
A, B, C, G
F, H
www.tm.uka.de
Not all nodes forward the message, but only the MPRs
Y forwards a message received from X, if X is an MS of Y
Efficient
flooding with MPR
Mobile ad hoc networks 26
www.tm.uka.de
S
T
A
B
L
E
!
MPRs of B
www.tm.uka.de
Example OLSR IX
Efficient flooding of messages, example: source node B
MPR of F
MPR of D
www.tm.uka.de
Example OLSR X
Efficient flooding of messages, example: source node B
MPR of G
Node B does not forward the packet received by F and D again (sequence numbers)
Node G is an MPR of F and forwards the packet received from F
Node F does not forward the packet received by G again (sequence numbers)
Mobile ad hoc networks 29
www.tm.uka.de
www.tm.uka.de
Only when a node wants so send data to a node, but does not yet have a route to that
node
Advantage
Only routes that are actually needed are determined and maintained
z No periodic transmission of messages necessary less use of resources
z
Disadvantage
Time delay at the beginning of a communication: route has to be determined first
z Control overhead depends on number of connections and mobility
z
www.tm.uka.de
Route Discovery
Nodes that are involved in forwarding the RREQs store the address of
the node from which they received the RREQ
The so-called Reverse Path into the direction of the sender S is built
up
www.tm.uka.de
Y
Z
S
E
F
G
H
K
I
www.tm.uka.de
Y
Broadcast
Z
S
E
F
G
H
K
I
D
N
RREQ
www.tm.uka.de
Y
Z
S
E
F
G
H
K
I
Reverse Path
Each node stores the address of the neighbor from which a RREQ packet
has been received
Requires state maintenance in all nodes
www.tm.uka.de
Y
Z
S
E
F
G
H
K
I
J
D
The Reverse Path from each intermediate node to the sender is built up
www.tm.uka.de
Y
Z
S
E
F
G
H
K
I
www.tm.uka.de
Y
Z
S
E
F
G
H
K
I
J
D
www.tm.uka.de
Y
Forward Path for data
Z
S
E
RREP
G
H
www.tm.uka.de
Exception: Overflows
In case of equal Destination Sequence Numbers, the one with the lowest Hop Count
is selected
www.tm.uka.de
AODV: Optimizations
Expanding Ring Search
z
z
www.tm.uka.de
Soft-state approach
www.tm.uka.de
www.tm.uka.de
AODV: Optimizations
Local Route Repair
Node detecting a link break searches a new route to the destination itself
(RREQ)
www.tm.uka.de
Multicast-Routing
z
Autoconfiguration
z
Control over topology by variation of transmit power of each device and thereby
minimization of interference between the nodes
Security
z
How can the integration of mobility protocols (Mobile IP) and routing in mobile ad-hoc
networks be realized?
Power Control
z
Service Awareness
z
Scalability, ...
www.tm.uka.de
IP-Autoconfiguration in MANETs
Internet Protocol (IP) requires unique IP addresses
Autoconfiguration of the network
Requirements
Address
5
path
D
a
t
a
D
4
C
?
2
F
www.tm.uka.de
Routing protocol
instance
Application
comm.
Transport.
Network
PACMAN
Data Link
Routing protocol
packets
PACMAN:
Passive Autoconfiguration
for Mobile Ad hoc Networks
Physical
www.tm.uka.de
SA: 4
SN: 5
LS: 1,2,3
4
D
Utilization of bidirectional
neighborhood relationships
z
Maintenance of an NH table
with addresses which were
neighbors in the past time span td
A
B
NH table(C)
2,3
C 1
www.tm.uka.de
Prototype Implementation
www.tm.uka.de
Multicast-Routing
Multicast is a 1:n communication which enables group communication
Streaming
z
Multiplayer games
E-Learning
Service Discovery
www.tm.uka.de
Group members forward a copy of the multicast data packet to each of their
downstream members
sender
Group member
Non-group member
Real link
Overlay link
Mobile ad hoc networks 51
www.tm.uka.de
References
[1] C.-K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems,
Prentice Hall, 2002
[2] C. Perkins, Ad-hoc Networking, Addison Wesley, 2000
[3] IETF MANET Working Group, http://www.ietf.org/html.charters/manetcharter.html
www.tm.uka.de