Wireless Sensor Networks 5. Routing Christian Schindelhauer Technische Fakultät Rechnernetze und Telematik Albert-Ludwigs-Universität Freiburg Version.

Slides:



Advertisements
Ähnliche Präsentationen
Ad-hoc-Netzwerke und Routing in Ad-hoc-Netzwerken
Advertisements

Routing – Routing Protokolle
Peter Marwedel TU Dortmund, Informatik 12
Lanes – Ein Overlay zur Dienstsuche in Ad-hoc- Netzen.
| DC-IAP/SVC3 | © Bosch Rexroth Pneumatics GmbH This document, as well as the data, specifications and other information set forth in.
You need to use your mouse to see this presentation © Heidi Behrens.
You need to use your mouse to see this presentation © Heidi Behrens.
You need to use your mouse to see this presentation © Heidi Behrens.
CALPER Publications From Handouts to Pedagogical Materials.
Xiaojie Ding, Andreas Kreiml, Maria Modly
Universität StuttgartInstitut für Wasserbau, Lehrstuhl für Hydrologie und Geohydrologie Copulas (1) András Bárdossy IWS Universität Stuttgart.
How Does Fuzzy Arithmetic Work ? © Hartwig Jeschke Institut für Mikroelektronische Schaltungen und Systeme Universität Hannover
Vortrag Aaron Kaplan, Funkfeuer 11/2006
Institut für Angewandte Mikroelektronik und Datentechnik Phase 5 Architectural impact on ASIC and FPGA Nils Büscher Selected Topics in VLSI Design (Module.
Institut für Angewandte Mikroelektronik und Datentechnik Course and contest Results of Phase 3 Vincent Wiese Selected Topics in VLSI Design (Module 24513)
Mein Arbeitspraktikum. Today we are learning to talk about work experience we have done, giving facts, details and opinions The bigger picture: We are.
1IWF/ÖAW GRAZ Data Combination David Fischer, Rumi Nakamura (IWF/OeAW)  Fluxgate: noise + distortion gets worse than the searchcoil at ~ 6 Hz.  Searchcoil:
Die Fragen Wörter Wer? Was? Wann?.
Nominative & Accusative Basic Rules for Relative Pronouns in German:
Synchronization: Multiversion Concurrency Control
Literary Machines, zusammengestellt für ::COLLABOR:: von H. Mittendorfer Literary MACHINES 1980 bis 1987, by Theodor Holm NELSON ISBN
You need to use your mouse to see this presentation © Heidi Behrens.
Akkusativ Präpositionen
Possessive Adjectives How to show belonging… The information contained in this document may not be duplicated or distributed without the permission of.
Ordering Food A Guide. Im Restaurant An actual restaurant is the chance to use more formal ordering. “Ich hätte gern eine Pizza.” “Ich möchte eine Cola.”
GERMAN WORD ORDER ORDER s. Sentences are made up by placing a variety of words in a specific order. If the order is wrong, the sentence is difficult to.
DEUTSCH 1 den 4. Juni. TODAY IS THE LAST LESSON  Until 30 July.
COMMANDS imperative 1. you (formal): Sie 2. you (familiar plural): ihr
Magnetenzephalogramm, MEG
Imperfekt (Simple Past) Irregular or strong verbs
Kapitel 2 Grammar INDEX 1.Subjects & Verbs 2.Conjugation of Verbs 3.Subject Verb Agreement 4.Person and Number 5.Present Tense 6.Word Order: Position of.
Kapitel 8 Grammar INDEX 1.Command Forms: The Du-Command Form & Ihr- Command 2.Sentences & Clauses.
Tips for our guests in Germany. Impressum Verantwortlich
On the case of German has 4 cases NOMINATIVE ACCUSATIVE GENITIVE DATIVE.
Die Vergangenheit Das Perfekt unregelmäßige Verben.
How to play: Students are broken up into 2-3 teams (depending on class size). Students can see the game board and the categories, but not point values.
Essay structure Example: Die fetten Jahre sind vorbei: Was passiert auf der Almhütte? Welche Bedeutung hat sie für jede der vier Personen? Intro: One or.
The Umlaut “Ü” in German: Exercises Based on chapter 5.8 of Rundblick 2 and online Speaking Practice Chapter 7.8 and 9.9.
LLP DE-COMENIUS-CMP Dieses Projekt wurde mit Unterstützung der Europäischen Kommission finanziert. Die Verantwortung für den Inhalt dieser.
Kanton Basel-Stadt Howto crash a sequencer …and a path to get a difficult package to work APP-V Swissgroup / Daniel Müller.
Prof. Dr.-Ing. Thomas Schwotzer FB 4 / AI / Mobile Anwendungen Ad-hoc Networks Routing.
Fitness. An english presentation.
Quiz: word order Word order rules with conjunctions
Freizeit Thema 5 Kapitel 1 (1)
Du bist am dicksten und am dümmsten.
you: ihr ( familiar plural ) you: du ( familiar singular)
Deutsch I Telling time….
Azure Countdown Wenn der Freund und Helfer Freunde und Helfer braucht: Sichere Content-Upload-Plattform für Bürger.
Sentence Structure Connectives
You need to use your mouse to see this presentation
Jetzt machen Venues aufmachen!!! Geh zu
The dynamic ultrasound
Jetzt machen Venues aufmachen!!! Geh zu
I use this as a starter, often at the start of a revision lesson at the end of a topic . Students work in pairs. Give each pair a copy of the blank grid.
Das Taschentuch-Spiel
IETF 80 Prague DISPATCH WG
THE PERFECT TENSE IN GERMAN
To English Translations
Wie viel Uhr ist es? Telling Time.
Was ist die Verbindung hier?
ELECTR IC CARS Karim Aly University of Applied Sciences.
Official Statistics Web Cartography in Germany − Regional Statistics, Federal and European Elections, Future Activities − Joint Working Party meeting.
OFFICE 365 FOCUS SESSION SHAREPOINT ONLINE 101:LERNE DIE BASICS 19. März 2018 Höhr-Grenzhausen.
Integrating Knowledge Discovery into Knowledge Management
Practical Exercises and Theory
Niedersächsisches Ministerium
Die tiere Share: Introduce the session and PDSA.
- moodle – a internet based learning platform
Zhunussova G., AA 81. Linguistic communication, i.e. the use of language, is characteristically vocal and verbal behaviour, involving the use of discrete.
 Präsentation transkript:

Wireless Sensor Networks 5. Routing Christian Schindelhauer Technische Fakultät Rechnernetze und Telematik Albert-Ludwigs-Universität Freiburg Version

Routing in MANETs  Routing -Determination of message paths -Transport of data  Protocol types -proactive Routing tables with updates -reactive repairm of message paths only when necessary -hybrid combination of proactive and reactive 2

Routing Protocols 3  Proactive Routes are demand independent Standard Link-State und Distance- Vector Protocols -Destination Sequenced Distance Vector (DSDV) -Optimized Link State Routing (OLSR)  Reactive Route are determined when needed -Dynamic Source Routing (DSR) -Ad hoc On-demand Distance Vector (AODV) -Dynamic MANET On-demand Routing Protocol -Temporally Ordered Routing Algorithm (TORA)  Hybrid combination of reactive und proactive -Zone Routing Protocol (ZRP) -Greedy Perimeter Stateless Routing (GPSR)

Trade-Off  Latency because of route discovery -Proactive protocols are faster -Reactive protocols need to find routes  Overhead of Route discovery and maintenance -Reactive protocols have smaller overhead (number of messages) -Proactive protocols may have larger complexity  Traffic-Pattern and mobility -decides which type of protocol is more efficient 4

Flooding  Algorithm -Sender S broadcasts data packet to all neighbors -Each node receiving a new packet broadcasts this packet if it is not the receiver  Sequence numbers -identifies messages to prevent duplicates  Packet always reaches the target -if possible 5

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 6

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 7 Packet for Receiver F

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 8 Possible collision at B

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 9 Receiver F gets packet and stops Nodes G, H, I do not receive the packet

Flooding  Advantage -simple and robust -the best approach for short packet lengths, small number of participants in highly mobile networks with light traffic  Disadvantage -High overhead -Broadcasting is unreliable lack of acknowledgements hidden, exposed terminals lead to data loss or delay 10

Flooding  Produces too many unnecessary (long) data packets -in the worst case, each participant sends each packet -many long transmissions collisions lead to long waiting times in the medium access  Better approach: -Use of control packets for route determination -Flooding of control packet leads to DSR 11

Dynamic Source Routing (DSR)  Johnson, Maltz -Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, 1996  Algorithm -Sender initiates route discovery by flooding of Route-Request (RREQ)-packets Each forwarding node appends his ID to the RREQ-packet -The receiver generates the routing information from the RREQ packet by producing a Route-Reply (RREP)-packet using the route information of the packet is sent back to the sender -Transmitter sends data packet along with route information to the receiver 12

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 13

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 14

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 15

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 16

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 17

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 18

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 19

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 20 Data Packet

Requirements  Route Reply -requires bidirectional connections -unidirectional links must be tested for symmetry or Route-Reply must trigger its own route-request  Data packet has all the routing information in the header -hence: Source-Routing  Route determination -if no valid route is known 21

DSR Extensions and Modifications  Intermediate nodes can cache information RREP -Problem: stale information  Listening to control messages -can help to identify the topology  Random delays for answers -To prevent many RREP-packets (Reply-Storm) -if many nodes know the answer (not for media access)  Repair -If an error is detected then usually: route recalculation -Instead: a local change of the source route  Cache Management -Mechanisms for the deletion of outdated cache information 22

DSR Optimization Route Caching  Each node stores information from all available -Header of data packets -Route Request -Route-Reply -partial paths  From this information, a route reply is generated 23

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 24

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 25 for

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 26

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 27 Data packet

DSR Optimization Route Caching  If any information is incorrect -because a route no longer exists -then this path is deleted from the cache -alternative paths are used -or RREQ is generated  Missing links are distributed by (RERR) packets in the network 28

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 29

DSR Discussion  Benefits -Routes are maintained only between communicating nodes -Route caching reduces route search -Caches help many alternative routes to find  Disadvantages -Header size grows with distance -Network may be flooded with route requests -Route-Reply-Storm -Outdated information may cause cache overhead 30

AODV  Perkins, Royer -Ad hoc On-Demand Distance Vector Routing, IEEE Workshop on Mobile Computing Systems and Applications,1999  Reaktives Routing-Protokoll  Reactive routing protocol -Improvement of DSR -no source routing -Distance Vector Tables but only for nodes with demand -Sequence number to help identify outdated cache info -Nodes know the origin of a packet and update the routing table 31

AODV  Algorithm -Route Request (RREQ) like in DSR -Intermediate nodes set a reverse pointer towards thesender -If the target is reached, a Route Reply (RREP) is sent -Route Reply follow the pointers  Assumption: symmetric connections 32

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 33

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 34

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 35

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 36

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 37

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 38

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 39

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 40

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 41

Route Reply in AODV  Intermediate nodes -may send route-reply packets, if their cache information is up-to-date  Destination Sequence Numbers -measure the up-to-dateness of the route information -AODV uses cached information less frequently than DSR -A new route request generates a greater destination sequence number -Intermediate nodes with a smaller sequence number may not generate a route reply (RREP) packets 42

Timeouts  Reverse pointers are deleted after a certain time -RREP timeout allows the transmitter to go back  Routing table information to be deleted -if they have not been used for some time -Then a new RREQ is triggered 43

Link Failure Reporting  Neighbors of a node X are active, -if the routing table cache are not deleted  If a link of the routing table is interrupted, -then all active neighbors are informed  Link failures are distributed by Route Error (RERR) packets to the sender -also update the Destination Sequence Numbers -This creates new route request 44

Informatik III Winter 2007/08 Rechnernetze und Telematik Albert-Ludwig-Universität Freiburg Christian Schindelhauer 45

Detection of Link Failure  Hello messages -neighboring nodes periodically exchange hello packets from -Absence of this message indicates link failure  Alternative -use information from MAC protocol 46

Sequence Numbers  When a node receives a message with destination sequence number N -then this node sets its number to N -if it was smaller before  In order to prevent loops -If A has not noticed the loss of link (C, D) (for example, RERR is lost) -If C sends a RREQ on path C-E-A -Without sequence numbers, a loop will be constructed since A "knows" a path to D, this results in a loop (for instance, CEABC) 47

Sequence Numbers 48

Optimization Expanding Ring Search  Route Requests -start with small time-to-live value (TTL) -if no Route Reply (RREP) is received, the value is increased by a constant factor and resent  This optimization is also applicable for DSR 49

Routing in MANETs  Routing -Determination of message paths -Transport of data  Protocol types -proactive Routing tables with updates -reactive repair of message paths only when necessary -hybrid combination of proactive and reactive 50