cmpe 257: wireless networking set 5:

64
Mar 25, 2022 UCSC CMPE252 1 CMPE 257: Wireless Networking SET 5: Unicast Routing in MANETs

Upload: nichole-whitehead

Post on 31-Dec-2015

24 views

Category:

Documents


3 download

DESCRIPTION

CMPE 257: Wireless Networking SET 5:. Unicast Routing in MANETs. Proactive Approaches. Optimized Link State Routing (OLSR) [Jacquet00ietf]. Overhead of flooding link state information reduced by having fewer nodes forward the information. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 1

CMPE 257: Wireless Networking

SET 5:

Unicast Routing in MANETs

Page 2: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 2

Proactive Approaches

Page 3: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 3

Optimized Link State Routing (OLSR) [Jacquet00ietf]

Overhead of flooding link state information reduced by having fewer nodes forward the information.

Broadcast from X only forwarded by its multipoint relays (MPRs).

Page 4: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 4

Proactive Approaches

Schemes: Topology broadcast (OLSR) Partial topology information or path

information Distance vectors with some constraint

(typically a sequence number)Techniques: Same three types of termination

detection

Page 5: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 5

OLSR

OLSR is proactive. It floods information through MPRs. Flooded information contains links

connecting nodes to respective MPRs. I.e., node sends info on nodes that selected it

as their MPR. Periodic HELLO messages inform nodes which

other nodes selected it as their MPR. Routes used by OLSR only include

multipoint relays as intermediate nodes.

Page 6: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 6

MPRs

Multipoint relays of node X are its neighbors such that each two-hop neighbor of X is a one-hop neighbor of at least one multipoint relay of X. Each node transmits its neighbor list in

periodic beacons, so that all nodes know their 2-hop neighbors.

MPRs of X are 1-hop neighbors of X covering X’s 2-hop neighbors.

Page 7: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 7

Optimized Link State Routing (OLSR)

C and E are multipoint relays of A.

A

B F

C

D

E H

GK

J

Node that has broadcast state information from A

Page 8: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 8

Optimized Link State Routing (OLSR)

Nodes C and E forward information received from A.

A

B F

C

D

E H

GK

J

Node that has broadcast state information from A

Page 9: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 9

Optimized Link State Routing (OLSR)

E and K are multipoint relays for H. K forwards information received from

H. E has already forwarded the same

information once.

A

B F

C

D

E H

GK

J

Node that has broadcast state information from A

L

Page 10: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 10

Termination Detection over Cycles

Page 11: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 11

Motivation Topology broadcast and distance

flooding incur too many updates. Diffusing computations may incur too

many update messages when nodes need to synchronize over many hops.

Objective: Have the same information regarding paths available with topology-broadcast algorithms, without the communication overhead.

Page 12: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 12

Basic Approach Each router maintains the entire path to

each destination. Update for destination j report the length

and node constituency of path to j. Complete path information is used to

detect loops. A router can always adopt a path to a

destination that does not already include the router itself and has the shortest length among all valid paths.

Example: BGP

Page 13: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 13

Detecting Loops Using Path Information

S

A

B D

j

C

1

5

2

10

2

2

1

10

2

2, (C,j)

2, (D,j)

0, (j)

3, (B,D,j)

5, (A,B,D,j)

X6, (S,A,B,D,j)

Page 14: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 14

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

12, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

Page 15: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 15

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

12, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j) LOOP!

Page 16: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 16

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

12, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

U (j: 5; C,B,D,j)

U (j: 12; D,C,j)

Page 17: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 17

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

13, (B,D,C,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

Update from D forces B to update its path to j

5, (C,B,D,j)

12, (D,C,j)

U (j: 13; B,D,C,j)

Page 18: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 18

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

13, (B,D,C,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

5, (C,B,D,j)

U (j: oo; --)

Update from C makes D detect and break loopAll paths reported to D include D, and it must set j as unreachable

U (j: 13; B,D,C,j)

Page 19: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 19

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

13, (B,D,C,j)

15, (A,B,D,j)

6, (S,A,B,D,j)

oo, (--)

Update from B makes A update its path to j;update from D makes all reported paths include C

U (j: 15; A,B,D,j) U (j: oo; --)

Page 20: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 20

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

5, (A,B,D,j)

6, (S,A,B,D,j)

U (j: oo; --) oo, (--)

After update from D, all finite-length paths reported to B include B, and it must set j as unreachable

U (j: 15; A,B,D,j)

oo, (--)

Page 21: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 21

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

5, (A,B,D,j)

16, (S,A,B,D,j)

oo, (--)

Update from A makes S change its path to j

oo, (--)

U (j: 16; S,A,B,D,j)

Page 22: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 22

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

oo, (--)

16, (S,A,B,D,j)

U (j: oo; --)

After update from B, all finite-length paths reported to A include A, and it must set j as unreachable

Page 23: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 23

Detecting Loops Using Path Information

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

oo, (--)

oo, (--)

U (j: oo; --)

No counting to infinity, but temporary loops exist!

Page 24: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 24

Limitations of Basic Approach Temporary loops occur. Complete path information is not necessary

in updates! Loop detection based on reported paths

exclusively is not very efficient! A router can believe a neighbor whose reported

path includes a neighbor that has just reported an updated path that is invalid!

Fixing these limitations leads to the Loop-Free Path Finding Algorithm (LPA).

Page 25: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 25

Path Finding A tree rooted at s can be represented by

specifying the nodes in the path traversed from s to each other node in the tree.

This has too much redundancy! The same tree can be represented by

specifying the second-to-last hop of the path traversed from s to each other node in the tree.

The second-to-last hop in the path to destination d is called the predecessor of d.

Page 26: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 26

Path Finding

S

A

B D

j

C

1

5

2

10

2

2

1

10

2

2, (C,j)

2, (D,j)

0, (j)

3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

U( j: 6; D) U( D: 4; B) U( B: 3; A)U( A: 1; S)U( S: 0; S)

j

If A is the next hop to j, it must also be the next hop to each node in the path to j

Page 27: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 27

Path Finding

S

A

B D

j

C

1

5

2

10

2

2

1

10

2

Source Tree at s: j: 6; DD: 4; BC: 5; B

B: 3; A A: 1; SS: 0; S

Each router conveys to its neighbors its shortest-path routing tree.This is the same information obtained from having complete topology maps!

Page 28: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 28

Path Finding with Link-State Information

The same solution can be applied to routing using partial link-state information.

Each router maintains and reports the state of those links along the shortest paths to each destination.

Each node keeps the shortest-path tree reported by each neighbor, and runs local path selection algorithm over the aggregated graph.

Examples: Link Vector Algorithm (Jochen Behrens and JJ, SIGCOMM 94 and

IEEE JSAC 94) Source Tree Adaptive Routing (Marcelo Spohn and JJ, MONET

Journal 2001)

Page 29: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 29

Path Finding with Link States

S

A

B D

j

C

1

5

2

10

2

2

1

10

2

Source Tree at s:(D,j): 2(B,D): 1(B,C): 2 (A,B): 2(S,A): 1(S,S): 0

Each router conveys to its neighbors its shortest-path routing tree.Tricky part is how to reduce communication overhead.

Page 30: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 30

Location-Aided Routing (LAR) [Ko98Mobicom]

Exploits location information to limit scope of route request flood. Location information may be obtained using GPS.

Expected Zone : region expected to hold the current location of the destination. Expected region based on old location information,

and knowledge of destination’s speed. Route requests limited to a Request Zone

that contains Expected Zone and location of sender node.

Page 31: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 31

Expected Zone in LAR

X

Y

r

X = last known location of node D, at time t0

Y = location of node D at current time t1, unknown to node S

r = (t1 - t0) * estimate of D’s speed

Expected Zone

Page 32: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 32

Request Zone in LAR

X

Y

r

S

Request Zone

Network Space

BA

Page 33: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 33

LAR

Only nodes within request zone forward RREQs. Node A does not forward RREQ, but node B

does. Request zone explicitly specified in the

RREQ. Each node must know its physical

location to determine whether it is within the request zone.

Page 34: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 34

LAR

If route discovery using smaller request zone fails to find a route, sender initiates another route discovery (after a timeout) using larger request zone. Larger request zone may be the entire

network. Rest of route discovery protocol similar

to DSR.

Page 35: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 35

LAR Variations: Adaptive Request Zone

Each node may modify the request zone included in the forwarded request

Modified request zone may be determined using more recent/accurate information, and may be smaller than the original request zone

Page 36: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 36

Adaptive Request Zones

S

B

Request zone adapted by B

Request zone defined by sender S

Page 37: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 37

LAR Variations: Implicit Request Zone

In the previous scheme, RREQ explicitly specified request zone.

Alternate approach: node X forwards RREQ received from Y if X is deemed to be closer to expected zone as compared to Y.

The motivation is to attempt to bring the RREQ physically closer to the destination node after each forwarding.

Page 38: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 38

Implicit Request Zone

S

D

N

I

K

dn

ds

dk

di

RREQ includes positionof D and distance ofcurrent node to D.

Page 39: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 39

More on LAR…

Basic LAR assumes that, initially, location information for X becomes known to Y only during route discovery.

This location information is used for future route discovery. Why?

Variations Location information can also be

piggybacked on any message from Y to X. Y may also proactively distribute its location.

Similar to other protocols (e.g., DREAM, GLS).

Page 40: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 40

LAR Summary

Advantages: Reduces scope of route request flood. Reduces overhead of route discovery.

Disadvantages: Nodes need to know their physical

locations. Choice of request zone.

Page 41: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 41

Hybrid Protocols

Page 42: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 42

ZRP [Haas98]

Zone Routing Protocol combines: Proactive protocol: which pro-actively

updates network state and maintains routes regardless of whether any data traffic exists or not.

Reactive protocol: which only determines route to a destination if there is some data to be sent to the destination.

Page 43: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 43

ZRP “Hybridness”

Limits scope of proactive procedure to a node’s local neighborhood.

Limits scope of topology changes to local neighborhood.

Reactive protocol executed for routes to destination far-away.

Page 44: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 44

Routing Zone

All nodes within hop distance of at most d from node X are said to be in the routing zone (RZ) of X.

All nodes at hop distance exactly d are said to be peripheral nodes of X’s routing zone.

Each node maintains its own RZ.

Page 45: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 45

ZRP

Intra-zone routing: Pro-actively maintain state information for links within a short distance from any given node. Routes to nodes within short distance are thus

maintained proactively (using, say, link state or distance vector protocol).

Inter-zone routing: Uses reactive protocol for determining routes to far away nodes. Route discovery is similar to DSR with the exception that route requests are propagated via peripheral nodes.

Page 46: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 46

ZRP: Example withZone Radius d = 2

SCA

EF

B

D

S performs routediscovery for D

Denotes route request

Page 47: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 47

ZRP: Example with d = 2

SCA

EF

B

D

S performs routediscovery for D

Denotes route reply

E knows route from E to D, so route request need not beforwarded to D from E

Page 48: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 48

ZRP: Example with d = 2

SCA

EF

B

D

S performs routediscovery for D

Denotes route taken by Data

Page 49: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 49

Page 50: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 50

Path Finding: Improved Path Updating

If neighbor k reports a new path to destination j: Traverse the paths for j reported by the

other neighbors. If neighbor n’s path to j includes node k,

substitute the new path to j reported by k as the subpath from k to j reported by n.

Page 51: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 51

Improved Path Updating

S

A

B D

j

C

1

5

2

10

2

2

1

10

2

2, (C,j)

2, (D,j)

0, (j)

3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

X

Page 52: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 52

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

2, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

Page 53: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 53

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

12, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j) LOOP!

Improved Path Updating

Page 54: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 54

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

2, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

U (j: 5,D) no changes for B or D: D: 3, B B: 2, C

U (j: 12,C)

t1

t2

Page 55: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 55

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

2, (D,C,j)3, (B,D,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

With update from C, B modifies the implicit subpath from C to j in the path from D to j, and a loop is detected!

(D,C,B,D,j)2, (D,C,j)

Page 56: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 56

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)

2, (D,C,j)

5, (A,B,D,j)

6, (S,A,B,D,j)

oo, (--)U (j: oo; --)

B detects and breaks loop

Page 57: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 57

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)5, (A,B,D,j)

6, (S,A,B,D,j)

oo, (--)U (j: oo; --)

Update from C enables D to detect and break loop

oo, (--)

U (j: oo; --)

Page 58: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 58

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

5, (C,B,D,j)5, (A,B,D,j)

6, (S,A,B,D,j)

oo, (--) oo, (--)

(A,B,--)(A,B,D,j)

Update from B makes the path reported by A inconsistent at node C

Page 59: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 59

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

5, (A,B,D,j)

6, (S,A,B,D,j)

U (j: oo; --)

C has no valid paths to destination j

Page 60: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 60

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

5, (A,B,D,j)

6, (S,A,B,D,j)

U (j: oo; --)

(C,B,--)(C,B,D,j)

Update from B makes the path reported by C inconsistent at node A

Page 61: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 61

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

oo, (--)

6, (S,A,B,D,j)

U (j: oo; --)

A has no valid paths to destination j

U (j: oo; --)

Page 62: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 62

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

oo, (--)

6, (S,A,B,D,j)

U (j: oo; --) U (j: oo; --)

(A,B,--)(A,B,D,j)

Update from B makes the path reported by A inconsistent at node S

Page 63: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 63

Improved Path Updating

S

A

B D

C

1

5

2

10

2

1

10

oo, (--)

oo, (--)oo, (--)

oo, (--)

U (j: oo; --) U (j: oo; --)

oo, (--)

U (j: oo; --)

A has no valid paths to destination j

Page 64: CMPE 257: Wireless Networking  SET 5:

Apr 19, 2023 UCSC CMPE252 64

Improved Path Updating Temporary loops are still possible. Convergence is much faster. Fewer update messages are needed,

and fewer temporary loops can be expected.

Sequence numbers can be used to validate paths more safely.