Professional Documents
Culture Documents
Adhoc networks
Routing protocols Transport issues
Implementations
802.11, HIPERLAN, Bluetooth
Other issues
Security
Advantages
Flexible deployment Minimal wiring difficulties More robust against disasters (earthquake etc) Historic buildings, conferences, trade shows,
Disadvantages
Low bandwidth compared to wired networks (1-10 Mbit/s) Proprietary solutions Need to follow wireless spectrum regulations
AP
ad-hoc network
Source: Schiller
Radio
typically using the license free ISM band at 2.4 GHz
Advantages
experience from wireless WAN and mobile phones can be used coverage of larger areas possible (radio can penetrate walls, furniture etc.)
Advantages
simple, cheap, available in many mobile devices no licenses needed simple shielding possible
Disadvantages
interference by sunlight, heat sources etc. many things shield or absorb IR light low bandwidth
Disadvantages
very limited license free frequency bands shielding more difficult, interference with other electrical devices
Example
Ir DA (Infrared Data Association) interface available everywhere
Example
Wave LAN, HIPERLAN, Bluetooth
Source: Schiller
If both A and C sense the channel to be idle at the same time, they send at the same time. Collision can be detected at sender in Ethernet. Half-duplex radios in wireless cannot detect collision at sender.
Hidden terminals
A and C cannot hear each other. A sends to B, C cannot receive A. C wants to send to B, C senses a free medium (CS fails) Collision occurs at B. A cannot receive the collision (CD fails). A is hidden for C.
Solution?
Hidden terminal is peculiar to wireless (not found in wired) Need to sense carrier at receiver, not sender! virtual carrier sensing: Sender asks receiver whether it can hear something. If so, behave as if channel busy.
A C
Exposed terminals
A starts sending to B. C senses carrier, finds medium in use and has to wait for A->B to end. D is outside the range of A, therefore waiting is not necessary. A and C are exposed terminals.
B
CTS
RTS
RTS
A
CTS
MAC: Reliability
Wireless links are prone to errors. High packet loss rate detrimental to transport-layer performance. Solution: Use of acknowledgements
When B receives DATA from A, B sends an ACK. If A fails to receive an ACK, A retransmits the DATA. Both C and D remain quiet until ACK (to prevent collision of ACK). Expected duration of transmission+ACK is included in RTS/CTS packets. This approach adopted in many protocols [802.11].
RTS
Time spent counting down backoff intervals is part of MAC overhead large cw leads to larger backoff intervals small cw leads to larger number of collisions
DCF Example
B1 = 25 wait data B2 = 20
B1 = 5
data wait B2 = 15 B2 = 10
cw = 31
Changing of IP address
DNS updates take to long time TCP connections break security problems
Solution requirements
retain same IP address, use same layer 2 protocols authentication of registration messages,
MN
Router 3
Source: Vaidya
MN
Source: Vaidya
MN
3
FA
receiver
foreign network
CN
sender
1. Sender sends to the IP address of MN, HA intercepts packet (proxy ARP) 2. HA tunnels packet to COA, here FA, by encapsulation 3. FA forwards the packet to the MN
Source: Schiller
MN
sender
FA
foreign network
CN
receiver
1. Sender sends to the IP address of the receiver as usual, FA works as default router
Source: Schiller
MN
1
FA
sender
foreign network
CN
receiver
1. MN sends to FA 2. FA tunnels packets to HA by encapsulation 3. HA forwards the packet to the receiver (standard case)
Source: Schiller
Agent Advertisement
HA/FA periodically send advertisement messages into their physical subnets MN listens to these messages and detects, if it is in home/foreign network MN reads a COA from the FA advertisement messages
Registration
MN signals COA to the HA via the FA HA acknowledges via FA to MN limited lifetime, need to be secured by authentication
Optimizations
Triangular Routing HA informs sender the current location of MN Change of FA new FA informs old FA to avoid packet loss, old FA now forwards remaining packets to new FA
No cellular infrastructure. Multi-hop wireless links. Data must be routed via intermediate nodes.
Source: Vaidya
Routing in MANET
Mobile IP needs infrastructure
Home Agent/Foreign Agent in the fixed network DNS, routing etc. are not designed for mobility
MANET
no default router available every node also needs to be a router
Traditional Routing
A routing protocol sets up a routing table in routers
Both allow a router to determine global routing information by talking to its neighbors Distance vector - router knows cost to each destination Link state - router knows entire network topology and computes shortest path
Source: Keshav
Source: Keshav
Proactive protocols
Extension of traditional routing protocols Maintain routes between every host pair at all times Example: DSDV (destination sequenced distance vector)
Hybrid protocols
Adaptive; Combination of proactive and reactive Example : ZRP (zone routing protocol)
Multicast routing
Z
S B A H I C G K D N E F M L
[S]
S B A H I C G K D E F M
Z
S B A H I C [S,C] G K D N E [S,E] F M L
Node H receives packet RREQ from two neighbors: potential for collision
Z
S B A H I C G [S,C,G] K D N E F [S,E,F] M L
Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once
Z
S B A H I C G K D [S,C,G,K] N E F [S,E,F,J] M L
Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide
Z
S B A H I C G K D N E F [S,E,F,J,M]
Node D does not forward RREQ, because node D is the intended target of the route discovery
Z
S B A H I C G K D N E RREP [S,E,F,J,D] F M L
DATA [S,E,F,J,D]
S B A H I C G K D E F M
DSR Issues
Optimizations: cache routes learnt by any means
When S finds route [S,E,F,J,D] to D, S also learns route [S,E,F] to F When K receives RREQ[S,C,G] for G, K learns route [K,G,C,S] to S When F forwards RREP [S,E,F,J,D], F learns route [F,J,D] to D When E forwards Data [S,E,F,J,D], E learns route [E,F,J,D] to D
Advantages
Routes maintained only between nodes who need to communicate Reduces overhead of route maintenance Caching (at intermediate nodes) can further reduce route discovery overhead
Disadvantages
Packet header size grows with route length due to source routing Flood of route requests may potentially reach all nodes in the network Route Reply Storm problem: Many intermediate nodes reply from local cache Stale caches will lead to increased overhead
Each route is tagged with a sequence number; routes with greater sequence numbers are preferred Each node advertises a monotonically increasing even sequence number for itself When a node decides that a route is broken, it increments the sequence number of the route and advertises it with infinite metric Destination advertises new sequence number
If S(X) > S(Y), then X ignores the routing information received from Y If S(X) = S(Y), and cost of going through Y is smaller than the route known to X, then X sets Y as the next hop to Z If S(X) < S(Y), then X sets Y as the next hop to Z, and S(X) is updated to equal S(Y)
Proactive protocols
Always maintain routes Little or no delay for route determination Consume bandwidth to keep routes up-to-date Maintain routes which may never be used
Which approach achieves a better trade-off depends on the traffic and mobility patterns
ZRP: Example
Performance Studies
Typically studied by simulations using ns, discrete event simulator Nodes (10-30) remains stationary for pause time seconds (0-900s) and then move to a random destination (1500m X300m space) at a uniform speed (0-20m/s). CBR traffic sources (4-30 packets/sec, 64-1024 bytes/packet) Attempt to estimate latency of route discovery, routing overhead
39
34
38
35
37
36
41
34
40
35
39
36
38
37
data
ack
Source: Vaidya
40
33
39
38
35
37
41
40
35
39
38
37
38
37
36
42
41
36
40
39
36
Dupack On receipt of 38
37
38
36
41
40
39
36
37
36
Dupack On receipt of 38
Duplicate ACKs
may be generated due to packet loss or out-of-order delivery sender assumes packet loss if it receives three consecutive dupacks
Fast Retransmit
RTO expiry may take too long sender assumes packet loss if it receives three consecutive dupacks
On detecting a packet loss, TCP sender assumes that network congestion has occurred and drastically reduces the congestion window
Congestion Avoidance On each new ack, increase cwnd by 1/cwnd packets cwnd increases linearly with time during congestion avoidance
1/2 MSS per RTT if every other packet ackd 1 MSS per RTT if every packet ackd
Congestion Control: Timeout timeout occurs when no more packets are getting across
ssthresh is set to half the window size before packet loss cwnd is reduced to the initial value of 1 MSS slow start is initiated
Congestion Control: Fast Retransmit Fast retransmit occurs when multiple (>= 3) dupacks are received Fast recovery follows fast retransmit (different from timeout)
a packet is lost, but latter packets get through ack clock is still there; no need to slow start ssthresh is set to half the window size before packet loss missing segment is retransmitted (fast retransmit) cwnd is reduced to ssthresh (by half) when a new ACK is received enter congestion avoidance phase
Packet transmission can occur on at most one hop among three consecutive hops
Increasing the number of hops from 1 to 2, 3 results in increased delay, and decreased throughput
Increasing number of hops beyond 3 allows simultaneous transmissions on more than one link, however, degradation continues due to contention between TCP Data and ACKs traveling in opposite directions When number of hops is large enough (>6), throughput stabilizes [Holland99]
Route is repaired
B
A
B
A
Low speed: (Route from A to D is broken for ~1.5 seconds) When TCP sender times after 1 second, route still broken. TCP times out after another 2 seconds, and only then resumes
High speed: (Route from A to D is broken for ~0.75 seconds) When TCP sender times out after 1 second, route is repaired TCP timeout interval somewhat (not entirely) independent of speed Network state at higher speed may sometimes be more favorable than lower speed
When a route is broken, route discovery returns a cached route from local cache or from a nearby node After a time-out, TCP sender transmits a packet on the new route. However, typically the cached route has also broken after it was cached
timeout, cached timeout, second cached route is broken route also broken
Another route discovery, and TCP time-out interval Process repeats until a good route is found
If cache accuracy is not high enough, gains in routing overhead may be offset by loss of TCP performance due to multiple time-outs Need mechanisms for determining when cached routes are stale
Impact of Acknowledgements
TCP ACKs (and link layer acks) share the wireless bandwidth with TCP data packets Data and ACKs travel in opposite directions
In addition to bandwidth usage, ACKs require additional receive-send turnarounds, which also incur time penalty
Reduction of contention between data and ACKs, and frequency of send-receive turnaround Mitigation [Balakrishnan97]
Piggybacking link layer acks with data Sending fewer TCP acks - ack every d-th packet (d may be chosen dynamically) Ack filtering - Gateway may drop an older ack in the queue, if a new ack arrives
Classification 2:
based on where modifications are needed At the sender node only At the receiver node only At intermediate node(s) only Combinations of the above
wireless TCP
standard TCP
Source: Schiller
access point1
Internet
access point2
mobile host
Source: Schiller
I-TCP: Issues
Advantages
no changes in the fixed network necessary no changes for the hosts (TCP protocol) necessary all current optimizations to TCP still work transmission errors on wireless link do not propagate into the fixed network simple to control, mobile TCP is used only for one wireless hop a very fast retransmission of packets is possible (short delay on the mobile hop is known)
Disadvantages
loss of end-to-end semantics, ACK to sender does not guarantee that the packet was received (FA may crash) buffering and forwarding of packets from one FA to another, may increase latency
Snooping TCP
Transparent extension of TCP within the foreign agent
buffer packets sent to the mobile host lost packets on the wireless link (both directions) are retransmitted immediately by the mobile host or foreign agent, respectively foreign agent snoops the packet flow and recognizes ACKs in both directions; it also filters ACKs
local retransmission
correspondent host
mobile host
snooping of ACKs
buffering of data
Problems
snooping TCP does not isolate the wireless link as good as I-TCP snooping might be useless depending on encryption schemes
Supervisory host
no caching, no retransmission monitors all packets, if disconnection detected set sender window size to 0 sender automatically goes into persistent mode old or new SH reopens the window
Advantages
maintains semantics, supports disconnection, no buffer forwarding
Disadvantages
loss on wireless link propagated into fixed network adapted TCP on wireless link
Snoop protocol
soft state need not be moved while the new foreign agent builds new state, packet losses may not be recovered locally
Frequent handoffs a problem for schemes that rely on significant amount of hard/soft state at base stations
hard state should not be lost soft state needs to be recreated to benefit performance
Inform TCP of route failure by explicit message Let TCP know when route is repaired
Probing Explicit notification Better route caching mechanisms
Reducing congestion window in response to errors is unnecessary Reduction in congestion window reduces the throughput