Ad-hoc on-demand distance vector routing pdf




















A performance comparison of the temporally-ordered routing algorithm and ideal link-state routing. A performance comparison of multi-hop wireless ad hoc network routing protocols. View 1 excerpt, references methods. Multicluster, mobile, multimedia radio network. A multi-cluster, multi-hop packet radio network architecture for wireless adaptive mobile information systems is presented. The proposed network supports multimedia traffic and relies on both time … Expand. Adaptive Mobile Multimedia Networks.

IEEE Wirel. Proceedings of the IEEE. Related Papers. By clicking accept or continuing to use the site, you agree to the terms outlined in our Privacy Policy , Terms of Service , and Dataset License. Flooding is generally used to a destination is formed, in a distributed manner, by combining to transmit control packets e. The problems with DVR are slow convergence and the tendency of creating routing loops. Periodical update vs. Based on when the routing infor- be divided into two categories: precomputed routing and on- mation will be disseminated, we can classify routing protocols as demand routing.

Precomputed routing is also called proactive routing or table- Periodical update protocols disseminate routing information peri- driven routing [24]. In this method, the routes to all destinations odically. Periodical updates will simplify protocols and maintain are computed a priori.

In order to compute routes in advance, network stability, and most importantly, enable new nodes to nodes need to store the entire or partial information about link learn about the topology and the state of the network.

However if states and network topology. In order to keep the information up the period between updates is large, the protocol may not keep the to date, nodes need to update their information periodically or information up-to-date.

On the other hand, if the period is small, whenever the link state or network topology changes. The ad- too many routing packets will be disseminated which consumes vantage of precomputed routing is that when a source needs to the precious bandwidth of a wireless network. The disadvantage is that some routes may when a link fails or a new link appears , an update packet will never be used.

Another problem is that the dissemination of rout- be broadcast and the up-to-date status can be disseminated over ing information will consume a lot of the scarce wireless network the network soon. The problem might be that if the topology of bandwidth when the link state and network topology change fast networks changes rapidly, a lot of update packets will be gener- this is especially true in a wireless ad hoc network. The conven- ated and disseminated over the network which will use a lot of tional LSR and DVR are examples of proactive routing.

We will precious bandwidth, and furthermore, may cause too much fluc- use precomputed and proactive interchangeably in this paper. One solution is to use some threshold [12, 19]. On-demand routing is also called reactive routing.

In this Periodical update and event-driven update mechanisms can be method, the route to a destination may not exist in advance and used together, forming what is called a hybrid update mechanism.

When a source needs to send packets to a destination, it periodically. Moreover, whenever a node finds that a link is bro- first finds a route or several routes to the destination. This pro- ken, it distributes a message immediately.

After the route s are discovered, the source transmits packets along the route s. During the trans- mission of packets, the route may be broken because the node s on the route move away or go down. The broken route needs to Flat structure vs. The process of detecting route breakage and rebuild- ing the route is called route maintenance. The major advantage of In a flat structure, all nodes in a network are at the same level and on-demand routing is that the precious bandwidth of wireless ad have the same routing functionality.

Flat routing is simple and hoc networks is greatly saved [15] because it limits the amount of efficient for small networks. The problem is that when a network bandwidth consumed in the exchange of routing information by becomes large, the volume of routing information will be large maintaining routes to only those destinations to which the routers and it will take a long time for routing information to arrive at need to forward data traffic. On-demand routing also obviates the remote nodes.

The primary used to solve the above problems [12, 15]. In hierarchical routing problem with on-demand routing is the large latency at the begin- the nodes in the network are dynamically organized into parti- ning of the transmission caused by route discovery.

We will use tions called clusters, then the clusters are aggregated again into on-demand and reactive interchangeably in this paper. Organizing a Apart from proactive route computation and reactive route dis- network into clusters help maintain a relatively stable network covery, there is another routing mechanism, called flooding [9, topology [15].

The high dynamics of membership and network 15]. In flooding, no route will be computed or discovered. A topology is limited within clusters. Only stable and high level packet is broadcast to all nodes in a network with the expecta- information such as the cluster level or the supercluster level will tion that at least one copy of the packet will reach the destina- be propagated across a long distance, thus the control traffic or tion.

Scoping [9] may be used to limit the overhead of flood- routing overhead may be largely reduced [10, 15]. Within a clus- ing. Flooding is the easiest routing method because it requires ter, the nodes may have complete topology information about its no knowledge of the network topology. Under light traffic con- cluster and proactive routing may be used. Intercluster routing is generally reactive, or a combina- tion of proactive and reactive routing as in [10]. Similar to cel- lular structure in cellular systems, a hierarchical cluster is read- ily deployable to achieve some kind of resource reuse such as frequency reuse and code reuse [9, 10] and interference can be reduced when using different spreading codes across clusters [9].

Decentralized computation vs. The route computation in LSR is a typical example of decentralized computation. In a distributed computation-based protocol, every node in the network only maintains partial and local information about the network topology. When a route needs to be computed, many nodes collaborate to compute the route. Another important parameter associated hello messages can be used to ensure symmetric links, with routing entries is the route caching timeout, or the as well as to detect link failures, as described in Sec- time after which the route is considered to be invalid.

Alternatively, and with far less latency, such In each routing table entry, the address of active failures could be detected by using link-layer acknowl- neighbors through which packets for the given desti- edgments LLACKS. A link failure is also indicated if nation are received is also maintained. A neighbor attempts to forward a packet to the next hop fail. This in- with a fresh sequence number i.

A route entry is considered active if neighbors. Those nodes subsequently relay that mes- it is in use by any active neighbors. The path from sage to their active neighbors and so on. To determine whether A mobile node maintains a route table entry for each a route is still needed, a node may check whether the destination of interest. Each route table entry contains route has been used recently, as well as inspect upper- the following information: level protocol control blocks to see whether connec- tions remain open using the indicated destination.

Session-Dependent Traffic Parameters. Whenever a node receives a broadcast from a neigh- The main objective of our simulations is to show bor, it updates its local connectivity information to that on-demand route establishment with AODV is ensure that it includes this neighbor. In the event both quick and accurate.

Additional objectives include that a node has not sent any packets to all of its ac- showing that AODV scales well to large networks, and tive downstream neighbors within hello interval, it determining the optimal value for each of the necessary broadcasts to its neighbors a hello message a spe- parameters. The node's sequence number is 3. Simulation Environment not changed for hello message transmissions.

This hello message is prevented from being rebroadcast out- Our simulations were run using networks of 50, , side the neighborhood of the node because it con- , and nodes.

The movement algorithm for all tains a time to live TTL value of 1. Neighbors network sizes is the same. During the ity information to the node. Receiving a broadcast simulation, nodes are free to move anywhere within this or a hello from a new neighbor, or failing to receive area. Each node chooses a speed from a uniform distri- allowed hello loss consecutive hello messages from bution between 0. Fail- The node moves until it reaches that spot, then chooses ing to receive hello messages from inactive neighbors a rest period from a uniform distribution between 60 does not trigger any protocol action.

If hello mes- and seconds. After the rest period, the node travels sages are not received from the next hop along an ac- towards another randomly selected spot. Section 2. We have determined the optimal value Each of the simulations also uses the same channel for allowed hello loss is two, as is shown in Sec- model. Before beginning a transmission, carrier sens- tion 3. For this purpose, each hello sent by a node lists attempted the retransmission and waits this amount of the nodes from which it has heard.

Each node checks time before listening to the channel again. A node at- to make sure that it uses only routes to neighbors that tempts to transmit a packet max retrans times before have heard the node's hello message. To save local dropping the packet. If node A transmits to node B, and node C, unable to hear node A's transmission, 3.

Simulations and Results simultaneously transmits to node B, we assume the packets collide at node B and both packets are dropped. For our simulations, we held Rmax constant Route Expiration msec at 10m. Two nodes can communicate directly, and are Reverse Route Life msec thus considered each other's neighbors, if they are less Maximum of Retransmissions 10 than Rmax distance apart.

For nodes, Table 2. The parameters for for AODV. The parameter values were chosen because each of the session types are given in Table 1. We chose they minimize network congestion while allowing the to use the small data packet sessions for most of our algorithm to operate as quickly and as accurately as simulations because the larger size of the voice packets possible.

Results and Discussion ratio. Since we did not on the protocol. Timeouts are value we intuitively guessed would be reasonable. Fig- triggered when a node has sent a RREQ for a particular ure 3 shows the goodput ratios for 50 and nodes destination and has not received a valid route within using the S DATA session type.

For 50 nodes, the route discovery timeout. Each simulation is run for seconds, and new ses- values of rreq retries. Broch et al. Achieved Goodput for Varying Figure 4. Route Acquisition Latency for Figure 6.

If a route to a destination was corresponds with their results for the same size net- never found, this time lapse was not taken into account work, with our results being slightly better. We disre- in the computation. WuWNeT ' Wireless lan medium access control mac and physical layer phy specifications. The medium access control MAC and physical characteristics for wireless local area networks LANs are specified in this standard, part of a series of standards for local and metropolitan area … Expand.

Ad-hoc On-demand Distance Vector. Sun, " Mobile ad hoc networking: an essential technology for pervasive computing " , Proceedings of International Conferences on info-tech and Info-net, vol.

This definition is independent of any particular implementation. In particular, the … Expand. Mobility Related Terminology. View 1 excerpt, references methods. Fault origin adjudication. FMSP ' Mobility Related Terminology work in progress.



0コメント

  • 1000 / 1000