A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Similar documents
Papers. Ad Hoc Routing. Outline. Motivation

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Survey of MANET based on Routing Protocols

More Efficient Routing Algorithm for Ad Hoc Network

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Scalable Routing Protocols for Mobile Ad Hoc Networks

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

Secure Ad-Hoc Routing Protocols

Overview. Ad Hoc and Wireless Mesh Networking. Ad hoc network. Ad hoc network

EVALUATIN OF QoS PARAMETERS ON TCP/IP IN WIRELESS AD HOC NETWORKS

LSA-AODV: A LINK STABILITY BASED ALGORITHM USING FUZZY LOGIC FOR MULTI-HOP WIRELESS MESH NETWORKS

A Taxonomy for Routing Protocols in Mobile Ad Hoc Networks. Laura Marie Feeney Swedish Institute of Computer Science

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

Dynamic TTL Variance Foretelling Based Enhancement Of AODV Routing Protocol In MANET

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

Wireless Internet Routing. IEEE s

CS 457 Lecture 16 Routing Continued. Spring 2010

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

GeoMAC: Geo-backoff based Co-operative MAC for V2V networks.

A Consolidated Analysis of MANET Routing Protocols

Mobile Ad-Hoc Networks Part I. Based on presentation from Matthias Hollick (Technische Universität Darmstadt)

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET

CS649 Sensor Networks IP Lecture 9: Synchronization

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

OSPF Fundamentals. Agenda. OSPF Principles. L41 - OSPF Fundamentals. Open Shortest Path First Routing Protocol Internet s Second IGP

OSPF - Open Shortest Path First. OSPF Fundamentals. Agenda. OSPF Topology Database

Configuring OSPF. Information About OSPF CHAPTER

Ad-Hoc Networks and New GPS Measurement Techniques for Robotic Follower Applications

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

TRADING OFF CONSUMPTION OF ROUTING AND PRECISION OF MEMBERSHIP IN AD HOC NETWORKS

MASTER THESIS. Ad Hoc Networks: Performance Evaluation Of Proactive, Reactive And Hybrid Routing Protocols In NS2

Link-state protocols and Open Shortest Path First (OSPF)

NAVAL POSTGRADUATE SCHOOL THESIS

Sensitivity Analysis of EADARP Multicast Protocol

Wireless Mesh Networks

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

OLSR-L. Evaluation of OLSR-L Network Protocol for Integrated Protocol for Communications and Positionig

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Analysis and Design of Link Metrics for Quality Routing in Wireless Multi-hop Networks

Link State Routing. Brad Karp UCL Computer Science. CS 3035/GZ01 3 rd December 2013

Comparative study of AODV, DSR, DSDV Routing Protocol Using Network Simulator-2

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Distance-Vector Routing

ROBUSTNESS OF SIMPLIFIED SIMULATION MODELS FOR INDOOR MANET EVALUATION. Andrés Lagar Cavilla

Link State Routing. Stefano Vissicchio UCL Computer Science CS 3035/GZ01

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

PERFORMANCE EVALUATION OF VARIOUS TRAFFIC LOADS IN MANET WITH AODV, OLSR AND DSR ROUTING PROTOCOLS

Simulating AODV and DSDV For Adynamic Wireless Sensor Networks

AODV and GPSR in a realistic VANET context. Jonathan Ledy, Benoît Hilt, Hervé Boeglen, Anne-Marie Poussard, Frédéric Drouhin, Rodolphe Vauzelle

Modeling of data networks by example: NS-2 (III) Wireless Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

On Probability of Link Availability in Original and Modified AODV, FSR and OLSR Using and p

Resource Optimization in Video Transmission Using Manet for Defence

Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs

PERFORMANCE ANALYSIS OF UNICAST ROUTING PROTOCOL IN IEEE S WIRELESS MESH NETWORK

Performance characteristics of OLSR and AODV protocols in Wireless Mesh Network

The impact of different radio propagation models for Mobile Ad-hoc NETworks (MANET) in urban area environment

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Introduction to Local and Wide Area Networks

CROSS-LAYER DESIGNS FOR MITIGATING RANGE ATTACKS IN AD HOC NETWORKS

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

ENSC 427: Communica1on Networks

M U LT I C A S T C O M M U N I C AT I O N S. Tarik Cicic

PSA-HD: Path Selection Algorithm based on Hamming Distance to Enhance the Link Stability in Mobile Ad-hoc Networks

Wireless Networked Systems

Multi-hop Networks with Cooperative Relaying Assisted Links

Analysis on Privacy and Reliability of Ad Hoc Network-Based in Protecting Agricultural Data

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Performance Analysis of AODV, DSR and OLSR Routing Protocols in WSN

Propagating Trust in Ad-hoc Networks for Reliable Routing

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Grundlagen der Rechnernetze. Introduction

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

Data Dissemination in Wireless Sensor Networks

Ad Hoc Networks - Routing and Security Issues

Secure Reac)ve Ad Hoc Rou)ng. Hongyang Li

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Robonet - MANET for Robot Communication

Energy-Efficient Data Management for Sensor Networks

Achieving Network Consistency. Octav Chipara

Keywords mobile ad hoc network, fading, interference, shadowing, QualNet 6.1.

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

Link State Routing. In particular OSPF. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. March 4, 2008

Interlayer routing issues for wireless networks

Babel A flexible routing protocol

Performance Comparison of AODV and OLSR in VANETs Urban Environments under Realistic Mobility Patterns

Transcription:

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University Presenter - Bob Kinicki MOBICOM 1998 Dallas, Texas

Introduction Outline NS-2 Simulator Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 2

Introduction Mobile Ad Hoc Networks (MANETs) Have useful applications Battlefields, mobile robots, vehicular networks Each mobile node acts both as a host but also as a router. Ad hoc routing protocols provide multihop paths through the network to any other node. 3

Introduction Outline NS-2 Simulator Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 4

NS-2 Simulator Environment Mobile nodes have position and velocity. Needed to extend simulator to model attenuation of radio waves, propagation delays, capture effects and carrier sense. Added simulation of DCF for 802.11 MAC layer (including RTS/CTS). Simulated nodes have 50 packet drop-tail queues for packets awaiting transmission and 50 additional packets of buffer for awaiting route discovery. 5

Outline Introduction NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 6

Studying Ad Hoc Routing (circa 1998) Authors implemented the four protocols according to specifications. However, while simulating they made improvements: Broadcast ACKs deliberately jittered. Routing packets were inserted at the front of the queue. Used link breakage detection feedback from MAC layer when packet could not be forwarded (except for DSDV). 7

Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 8

Destination-Sequenced Distance Vector (DSDV) DSDV is a hop-by-hop distance vector routing protocol requiring each node to periodically broadcast routing updates. DSDV (unlike DV) is guaranteed loop free. 9

DSDV Mechanism Each node maintains a routing table listing the next hop for each reachable destination. Routes are tagged with a sequence number. Higher sequence number indicates a better route. Sequence number ties broken by lower metric. Each node periodically broadcasts routing updates. Implemented both full and incremental updates. 10

DSDV Implementation Route updates are used to broadcast changes in the topology (i.e. broken link) and triggered by: Receipt of a new sequence number for a destination (the DSDV-SQ variation). Receipt of a new metric for a destination (DSDV). Link layer breakage notification was not used due to a significant performance penalty. 11

DSDV-SQ Constants 12

Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 13

Temporally-Ordered Routing Algorithm (TORA) TORA is a distributed routing protocol based on a link reversal algorithm. Routes are discovered on demand. Provides multiple routes to destination. Designed to minimize communication overhead by localizing algorithmic reaction to topological change. Tries to avoid the overhead of discovering new routes. 14

TORA Mechanism Described in terms of water flowing downhill towards a destination node. Links between routers conceptually viewed as a height. Link is directed from the higher router to the lower router. Height adjustments occur when topology changes. 15

TORA Mechanism A logically separate copy of TORA exists at each node and is run for each destination. A node needing a route broadcasts a QUERY packet containing the destination address. Packet propagates through network until it reaches the destination or to a node having a route to the destination. 16

TORA Mechanism Node with route to destination broadcasts an UPDATE packet listing its height with respect to destination. Nodes receiving UPDATE sets its height greater than that of neighbor from which UPDATE was received. The effect is to create a series of directed links from the original sender of the query to the node that generated the UPDATE. 17

TORA Mechanism Layered on top of IMEP (Internet MANET Encapsulation Protocol) for reliable in-order delivery of all routing control messages, and link state notifications. Periodic BEACON / HELLO packets. IMEP - implemented to support TORA. Attempts to aggregate TORA and IMEP control messages (objects) into a single packet (object block) to reduce overhead. Chose to aggregate only HELLO and ACK packets Parameters are chosen through experimentation. 18

TORA Constants 19

Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 20

Dynamic Source Routing (DSR) DSR uses source routing rather than hop-by-hop routing with each packet carrying in its header the complete ordered list of nodes through which the packet must pass. Eliminates the need for periodic route advertisement and neighbor detection packets. Designed specifically for multi-hop wireless ad hoc networks. Two mechanisms: Route Discovery and Route Maintenance. 21

DSR Route Discovery Node S wishes to send a packet to destination D obtains a source route to D. S broadcasts a ROUTE REQUEST packet that is flooded through the network and is answered by a ROUTE REPLY packet from either the destination node or another node that knows the route to the destination. 22

DSR Route Discovery To reduce the cost of Route Discovery, each node maintains a cache of source routes learned or overhead. Cache significantly reduce the number of ROUTE REQUESTs sent. 23

DSR Route Maintenance Route Maintenance is the mechanism by which a packet s sender S detects if the network topology has changed such that it can no longer use its route to the destination. When route is broken, S is notified with a ROUTE ERROR packet. S can use another route in cache or invoke route discovery. 24

DSR Constants DSR is bidirectional due to 802.11. This means ROUTE REPLY uses reverse path. 25

DSR Advantages/Disadvantages Advantages: uses a reactive approach which eliminates the need to periodically flood the network with table update messages which are in the table-driven approach. The intermediate nodes also utilize the route cache information efficiently to reduce the control overhead. Disadvantage: The route maintenance mechanism does not locally repair a broken link. Stale route cache information can produce inconsistencies during the route reconstruction phase. 26

27 Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions

Ad Hoc On-Demand Distance vector (AODV) AODV combines DSR and DSDV Uses on-demand Route Discovery and Route Maintenance from DSR plus hopby-hop routing, sequence numbers and periodic beacons from DSDV. When S needs a route to D, it broadcasts a ROUTE REQUEST message to its neighbors, including last known sequence number for that destination. 28

AODV ROUTE REQUEST is control-flooded until it reaches a node that has a route to the destination D and each node that forwards a ROUTE REQUEST creates a reverse route back to S. Node that has route to D generates a ROUTE REPLY that contains number of hops to reach D and sequence number for D most recently seen. Each node that forwards the REPLY back towards S creates a forward route to D. 29

AODV This scheme is hop-by-hop in that each node remembers only next hop. To maintain routes, each node periodically transmits a HELLO message. Failure to receive three consecutive HELLO meesages is an indicator that the link to neighbor is down. Alternatively, use link layer feedback (AODV-LL). Since this eliminates need for HELLO messages, only AODV-LL reported in the paper. 30

AODV When a link goes down, any upstream node that recently forwarded packets through that link is notified via an UNSOLICITED ROUTE REPLY with an infinite metric. Upon receiving this reply, the node must use Route Discovery to find a new route to the destination. 31

AODV Constants 32

AODV Advantages/Disadvantages Advantages: AODV routes established on demand with destination sequence numbers used to find the latest route to destination. The connection setup delay is less. Disadvantages: intermediate nodes can yield inconsistent routes if the source sequence number is very old and the intermediate nodes have a higher but not the latest destination sequence number (stale entries). Also multiple ROUTE REPLY packets in response to a single ROUTE REQUEST packet can lead to heavy control overhead. 33

Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 34

Simulation Methodology Simulations focused on routing protocols ability to react to topology changes and viewing performance under a range of conditions. 50 wireless nodes in ad hoc network over a 1500m x 300m grid for 900 simulated seconds of time. Physical characteristics meant to model WaveLAN DSSS (Note this is old technology now!). 35

Simulation Methodology Simulations driven by input scenario file describing exact motion and sequence of packets originated by nodes. 210 different scenarios were pre-generated and ran all four protocols against each scenario file. Movement is characterized by a pause time whereby a node remains stationary for pause time seconds. 36

Simulation Methodology At the end of pause time, the node selects a random destination and moves at a speed uniformly distributed between 0 and some maximum (1m/s or 20m/s). Simulation alternates between pause times and movement times for each node. 10 movement patterns were generated for each pause time of 0, 30, 60, 120, 300, 600, & 900 seconds (total of 70 movement patterns for each protocol tested). 0 pause time corresponds to continuous motion. 900 second pause time is no movement. 37

Communication Model Issues Experimented with 1, 4 and 8 packets per second and then fixed rate at 4 packets/sec. 10, 20 and 30 CBR (constant bit rate) sources with peer-to-peer conversations. Tried 64 and 1024-byte packets 1024-byte packets caused congestion. Packet size fixed at 64 bytes because they wanted to factor out congestion effects. 38

Scenario Characteristics Internal mechanism determines shortest path (in hops) assuming 250m transmission range. Average data packet made 2.6 hops and farthest reachable node was 8 hops away. 39

Figure 1 Shortest Path Distribution 40

Table V Link Connectivity Changes 41

Metrics Packet Delivery Ratio :: The ratio between the number of packets originated by the application layer CBR sources and the number of packets received by the CBR sink at the final destination. Routing Overhead :: The total number of routing packets transmitted during the simulation. Note, each transmission hop counts as one transmission. Path Optimality :: The difference between the number of hops taken to reach destination and the length of the shortest path that physically existed through the network when the packet was originated 42

Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results (20 m/s first) Conclusions 43

Figure 2 Packet Delivery Ratio (as a function of pause time) DSDV does not converge 20 Sources 44

Figure 3 Routing Packets Sent (as a function of pause time) 20 Sources 45

Figure 4: Packet Delivery Ratio 46

Figure 5: Routing Overhead different scales 47

Figure 6: Path Length Excess Results are averaged over all mobility levels. 48

Figure 7: Application Packets Sent (as a function of pause time) Speed = 1m/s 20 Sources 49

Figure 8: Routing Packets Sent (as a function of pause time) Speed = 1m/s 20 Sources 50

Figure 9 Routing Overhead 20 Sources accounts for extra bytes in DSR packets 51

Figure 10 Packet Delivery Ratio DSDV vs DSDV-SQ 52

Figure 11 Routing Overhead DSDV vs DSDV-SQ 53

Introduction Outline NS-2 Simulation Environment Ad Hoc Routing Protocols DSDV TORA DSR AODV Simulation Methodology Simulation Results Conclusions 54

Conclusions Paper Contributions: Modifications to the ns-2 simulator to model 802.11 MAC layer issues. Detailed simulation results that compared four protocols. Each protocol performs well in some cases and has drawbacks in others. 55

Conclusions TORA was the worst. DSR was the best. DSDV-SQ performs well when load and mobility is low, poorly as mobility increases. AODV-LL performs nearly as well as DSR, but has high overhead at high mobility levels. 56

Well written. Critique Good scientific method. Comments!! 57

Acknowledgments Thanks to Angel Pagan and Xiang Li for most of the figures from the original paper. 58

Questions?? A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols