the basics of wireless...
TRANSCRIPT
![Page 1: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/1.jpg)
The Basics of Wireless Communication
Octav Chipara
![Page 2: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/2.jpg)
Agenda•Channel model: the protocol model• High-level media access
• TDMA, CSMA• hidden/exposed terminal problems
•WLAN• Fundamentals of routing
• proactive• on-demand
2
![Page 3: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/3.jpg)
Channel models• Channel models - document assumptions of wireless properties
• the basis upon which we build and analyze network protocols
• A good model is one that is• simple - reason effectively about the properties of protocols• accurate - capture prevalent properties of wireless channels• these requirements are often conflicting
• Must provide insight into fundamental problems• media access• routing• congestion
• Today, simple channel model..., next lecture more realistic models
3
![Page 4: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/4.jpg)
Protocol model• Network is modeled as a graph
• vertices - all nodes in a graph• edges - connect nodes that may communicate
• Properties: • captures connectivity information• packet collisions (collisions happen only at the receiver)• radios are half-duplex
4
A B
C
![Page 5: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/5.jpg)
Protocol model• Network is modeled as a graph
• vertices - all nodes in a graph• edges - connect nodes that may communicate
• Properties: • captures connectivity information• packet collisions (collisions happen only at the receiver)• radios are half-duplex
4
A B
C
![Page 6: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/6.jpg)
Protocol model• Network is modeled as a graph
• vertices - all nodes in a graph• edges - connect nodes that may communicate
• Properties: • captures connectivity information• packet collisions (collisions happen only at the receiver)• radios are half-duplex
4
A B
C
![Page 7: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/7.jpg)
Media Access and Control (MAC)• Problem: multiple nodes want to transmit concurrently
• nodes transmitting concurrently ➔ packet collisions
• Metrics for characterizing MAC performance• throughput - number of packets delivered per second• latency - time to deliver a packet• energy efficiency - energy consumed for tx and rx• fairness - each node gets its “fair” share of the channel• flexibility - how does the MAC handle changes in workload
• Approaches• CSMA - Carrier Sense Multiple Access• TDMA - Time Division Multiple Access
5
![Page 8: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/8.jpg)
CSMA•CSMA - Carrier Sense Multiple Access• Approach:
• 1: node will attempt to transmit after a random delay t ∈ CW• 2: check if channel is available
• free ➔ perform packet transmission• busy ➔ CW = CW * 2, go to step 1
• Notes:• nodes operate independently!• the underlying performance is highly dependent on selecting CW
• CW - reflects the expected number of contenders for the channel• CW increases exponentially [the rate depends on protocol]
• assumption: the sender can accurately check if channel is free/busy• usually holds because:
receiver sensibility << channel quality required for communication6
![Page 9: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/9.jpg)
CSMA•CSMA - Carrier Sense Multiple Access• Approach:
• 1: node will attempt to transmit after a random delay t ∈ CW• 2: check if channel is available
• free ➔ perform packet transmission• busy ➔ CW = CW * 2, go to step 1
• Notes:• nodes operate independently!• the underlying performance is highly dependent on selecting CW
• CW - reflects the expected number of contenders for the channel• CW increases exponentially [the rate depends on protocol]
• assumption: the sender can accurately check if channel is free/busy• usually holds because:
receiver sensibility << channel quality required for communication6
![Page 10: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/10.jpg)
Signal propagation ranges
distance
sender
transmission
detection
interference
• Transmission range• communication possible• low error rate
• Detection range• detection of the signal
possible• no communication
possible• Interference range
• signal may not be detected
• signal adds to the background noise
7
![Page 11: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/11.jpg)
TDMA• TDMA - Time Division Multiple Access• Approach:
• 1: construct a frame in which each node gets a slot to transmit• F - frame size, fn - slot in which node n is assigned to transmit
• 2: a node n will transmit at time (t mod F) = fn
• Notes:• time synchronization is required• frame construction requires a global agreement among nodes• underlying performance depends on matching a node’s workload
demand with its slot allocations• hard to do due to dynamic workloads and channel properties
• assumption: only one successful transmission per slot
8
![Page 12: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/12.jpg)
TDMA• TDMA - Time Division Multiple Access• Approach:
• 1: construct a frame in which each node gets a slot to transmit• F - frame size, fn - slot in which node n is assigned to transmit
• 2: a node n will transmit at time (t mod F) = fn
• Notes:• time synchronization is required• frame construction requires a global agreement among nodes• underlying performance depends on matching a node’s workload
demand with its slot allocations• hard to do due to dynamic workloads and channel properties
• assumption: only one successful transmission per slot
8
![Page 13: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/13.jpg)
Single-hop vs. multiple hops• Single-hop networks
• both CSMA and TDMA protocols are easy to implement• Multi-hop networks
• important challenges arise due to asymmetrical views of the networks• hidden-terminal problem• exposed-terminal problem
9
![Page 14: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/14.jpg)
Hidden terminal problem
10
A B C
• Node A and C are hidden (edge (AC) is not in the graph)• they cannot sense their packet transmissions
• Consequences for MAC protocols• CSMA protocols will never increase CW • TDMA protocols will have to agree on a frame over multiple hops
![Page 15: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/15.jpg)
Hidden terminal problem
10
A B C
• Node A and C are hidden (edge (AC) is not in the graph)• they cannot sense their packet transmissions
• Consequences for MAC protocols• CSMA protocols will never increase CW • TDMA protocols will have to agree on a frame over multiple hops
![Page 16: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/16.jpg)
Hidden terminal problem
10
A B C
• Node A and C are hidden (edge (AC) is not in the graph)• they cannot sense their packet transmissions
• Consequences for MAC protocols• CSMA protocols will never increase CW • TDMA protocols will have to agree on a frame over multiple hops
undetected collisions
![Page 17: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/17.jpg)
Exposed terminal problem
•Node B and C can communicate• (BA) and (CD) can occur currently (collisions at receivers)
• Consequences for MAC protocols• CSMA will increase CW unnecessarily
11
CBA D
![Page 18: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/18.jpg)
Exposed terminal problem
•Node B and C can communicate• (BA) and (CD) can occur currently (collisions at receivers)
• Consequences for MAC protocols• CSMA will increase CW unnecessarily
11
CBA D
false positives
![Page 19: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/19.jpg)
RTS/CTS a solution for CSMA protocols• Add two additional messages to the TDMA protocol
• RTS - request to send• CTS - clear to send
• Algorithm• node n wants to send packet to m
• transmit RTS(n, m)• node a1, a2, ..., an, m receive RTS(n, m)
• node m replies with CTS(n, m) if its channel is free • node b1, b2, ..., bn, n receives CTS(n, m)
• node n transmits the data packet• The algorithm signals access requests over 2-hops
12
![Page 20: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/20.jpg)
Hidden terminal problem
13
A B C
![Page 21: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/21.jpg)
Hidden terminal problem
13
A B C
send RTS(C,B)
![Page 22: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/22.jpg)
Hidden terminal problem
13
A B C
send RTS(C,B)recv RTS(C,B)
![Page 23: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/23.jpg)
Hidden terminal problem
13
A B C
A B C
send RTS(C,B)
send CTS(C,B)
recv RTS(C,B)
![Page 24: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/24.jpg)
Hidden terminal problem
13
A B C
A B C
send RTS(C,B)
send CTS(C,B)
recv RTS(C,B)
recv CTS(C,B) recv CTS(C,B)
![Page 25: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/25.jpg)
Exposed terminal problem
14
CBA D
send RTS(C,D)
![Page 26: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/26.jpg)
Exposed terminal problem
14
CBA D
send RTS(C,D)
CBA D
send CTS
![Page 27: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/27.jpg)
Exposed terminal problem
14
CBA D
send RTS(C,D)
CBA D
send CTS ready to tx
![Page 28: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/28.jpg)
Exposed terminal problem
14
CBA D
send RTS(C,D)
CBA D
send CTS
CBA D
send RTS(B, A)
ready to tx
ready to tx
![Page 29: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/29.jpg)
Exposed terminal problem
14
CBA D
send RTS(C,D)
CBA D
send CTS
CBA D
send RTS(B, A)
CBA D
send CTS
ready to tx
ready to tx
ready to tx
![Page 30: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/30.jpg)
Exposed terminal problem
14
CBA D
send RTS(C,D)
CBA D
send CTS
CBA D
send RTS(B, A)
CBA D
send CTS
ready to tx
ready to tx
ready to tx
ready to tx
![Page 31: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/31.jpg)
• Protocol soup:
• Goals: • seamless operation• leverage on existing wired infrastructure• low-power operation on stations
• Two architectures: infrastructure + ad-hoc
WLAN technology
15
WiFi Local wireless networks WLAN 802.11
802.11a
802.11b 802.11i/e/…/w
802.11g
802.11h
![Page 32: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/32.jpg)
802.11: Architecture of an infrastructure network
●Station (STA)■ terminal with wireless access
mechanisms to contact the access point
●Basic Service Set (BSS)■ group of stations using the same radio
frequency●Access Point■ station integrated into the wireless LAN
and the distribution system●Portal■ bridge to other (wired) networks●Distribution System■ interconnection network to/form one
logical network
Distribution System
Portal
802.x LAN
Access Point
802.11 LAN
BSS2
802.11 LAN
BSS1
Access Point
STA1
STA2 STA3
ESS
16
![Page 33: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/33.jpg)
802.11: Architecture of an ad-hoc network• Direct communication within a limited range• Station (STA):
terminal with access mechanisms to the wireless medium
• Independent Basic Service Set (IBSS):group of stations using the same radio frequency
•When no direct link is feasible between two station, a third station may act as a relay (multi-hop communications)
17
802.11 LAN
802.11 LAN
BSS1
STA1
STA2
STA3
![Page 34: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/34.jpg)
802.11b - Distributed Coordination Function• Exponential back-off
• Chosen for uniformly from (0, CW-1),• CW increase exponentially with the
number of failed attempts• CWmin – minimum contention window• CWmax = 2mCWmin – maximum
contention window
18
![Page 35: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/35.jpg)
802.11b - Distributed Coordination Function•Message resent when the backoff counter reaches zero• Backoff counter decremented only when the channel is idle• Backoff counter is reset to zero after a successful transmission
19
![Page 36: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/36.jpg)
Routing• Routing consists of two fundamental steps
• Forwarding packets to the next hop (from an input interface to an output interface in a traditional wired network)
• Determining how to forward packets (building a routing table or specifying a route)
• Forwarding packets is easy, but knowing where to forward packets (especially efficiently) is hard• Reach the destination• Minimize the number of hops (path length)• Minimize delay• Minimize packet loss• Minimize cost
20
![Page 37: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/37.jpg)
Routing Decision Point• Source routing
• Sender determines a route and specifies it in the packet header• Hop-by-hop (datagram) routing
• A routing decision is made at each forwarding point (at each router)• Standard routing scheme for IP
• Virtual circuit routing• Determine and configure a path prior to sending first packet• Used in ATM (and analogous to voice telephone system)
21
![Page 38: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/38.jpg)
Routing Table• A routing table contains information to determine how to forward packets• Source routing: Routing table is used to determine route to the
destination to be specified in the packet• Hop-by-hop routing: Routing table is used to determine the next hop
for a given destination• Virtual circuit routing: Routing table used to determine path to configure
through the network
22
![Page 39: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/39.jpg)
Routing Approaches• Reactive (On-demand) protocols
• discover routes when needed• source-initiated route discovery
• Proactive protocols• traditional distributed shortest-path protocols• based on periodic updates. High routing overhead
• Tradeoff• state maintenance traffic vs. route discovery traffic• route via maintained route vs. delay for route discovery
![Page 40: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/40.jpg)
Distance Vector Algorithms (1)• “Distance” of each link in the network is a metric that is to be minimized• each link may have “distance” 1 to minimize hop count• algorithm attempts to minimize distance
• The routing table at each node…• specifies the next hop for each destination• specifies the distance to that destination
• Neighbors can exchange routing table information to find a route (or a better route) to a destination
24
![Page 41: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/41.jpg)
Distance Vector Algorithms (2)
A
B
C D
BDest Next Metric
B 1C B 2D B 3
ADest Next Metric
A 1C C 1D C 2
ADest Next Metric
B 2B B 1D D 1
ADest Next Metric
C 3B C 2C C 1
25
![Page 42: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/42.jpg)
Distance Vector Algorithms (3)
• Node A will learn of Node C’s shorter path to Node D and update its routing table
A
B
C D
BDest Next Metric
B 1C C 1D C 2
ADest Next Metric
A 1B B 1D D 1
26
![Page 43: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/43.jpg)
Reactive Routing – Source initiated• Source floods the network with a route request packet when a route is required to a destination• flood is propagated outwards from the source• pure flooding = every node transmits the request only once
• Destination replies to request• reply uses reversed path of route request• sets up the forward path
27
![Page 44: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/44.jpg)
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
![Page 45: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/45.jpg)
A
AA-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
![Page 46: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/46.jpg)
A
A
A-B
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
![Page 47: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/47.jpg)
A
A
A-B
A-C
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
![Page 48: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/48.jpg)
A
A
A-B
A-C
A-C-E
A-C-EA-C-E
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
![Page 49: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/49.jpg)
A
A
A-B
A-C
A-C-E
A-C-EA-C-E
A-B-D
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
![Page 50: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/50.jpg)
A
A
A-B
A-C
A-C-E
A-C-EA-C-E
A-B-D
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
A-C-E-H
![Page 51: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/51.jpg)
A
A
A-B
A-C
A-C-E
A-C-EA-C-E
A-B-D
A-B-D-GA-B-D-G
A-B-D-G
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
RREQ FORMATRoute Discovery
A
B
C
D
E
F
H
G
28
Initiator
Initiator seq #
Destination IDPartial Route
A-C-E-H
![Page 52: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/52.jpg)
Send packet to next-hop
Write route in packet header
A need to send to G
Continue normal
processing
Buffer packet
Route Discovery finished
Start Route Discovery Protocol
Lookup Cache for route A to G
Route found?
Packet in buffer?
done
no
yes
yes
no
wait
29
Route Discovery: at source A
![Page 53: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/53.jpg)
Append myAddr to
partial route
Accept route request packet
<src,id> in recent requests
list?
Discard route
request
yes
Discard route
request
yes
Store <src,id> in list
Broadcast packet
Send route reply packet
done
myAddr=target
nono
30
Route Discovery: At an intermediate node
no
Host already in partial
route
![Page 54: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/54.jpg)
Route Discovery• Route Reply message containing path information is sent back to the source either by• the destination, or• intermediate nodes that have a route to the destination• reverse the order of the route record, and include it in Route Reply.• unicast, source routing
• Each node maintains a Route Cache which records routes it has learned and overheard over time
31
![Page 55: The Basics of Wireless Communicationhomepage.divms.uiowa.edu/~ochipara/classes/sensing_the_world/Sensing the World/lectures...terminal with wireless access mechanisms to contact the](https://reader034.vdocuments.us/reader034/viewer/2022042101/5e7d7ae64dade1547d009670/html5/thumbnails/55.jpg)
Route Maintenance• Route maintenance performed only while route is in use• Error detection:
• monitors the validity of existing routes by passively listening to data packets transmitted at neighboring nodes
•When problem detected, send Route Error packet to original sender to perform new route discovery• Host detects the error and the host it was attempting;• Route Error is sent back to the sender the packet – original src
32