Professional Documents
Culture Documents
WIRELESS NETWORKS
Community Networks
• Extending coverage of Access Points eg FON promoted by Skype &
Google
• OLPC
Issues in Wireless Communication
Security- Need for Encryption
Reactive- they ask their neighbours for a route when they have data to send. If
the neighbours do not have any known route, they broadcast the request, and so
on. Once the final destination has been reached by these broadcasts, an answer is
built and forwarded back to the source. This source can then transmit the data on
the newly discovered route.
Hybrid- will use the two above algorithms. The main goal is to reduce
broadcasts and latency, but improve the dynamism impact. The whole network
will be separated into logical zones, and each zone will have a gateway. Inside each
zone, a proactive protocol will be used. For inter-zone routing, a reactive protocol
will be used.
PRO-ACTIVE PROTOCOLS
Destination Sequenced Distance Vector (DSDV)
a. One of the first protocols for ad-hoc networks
b. Based on Bellman Ford Algorithm
c. Each routing table contains all available destinations, with the
associated next hop, the associated metric (numbers of hops), and a
sequence number originated by the destination node.
d. The route selection is performed on the metric and sequence
number criteria.
e. Tables are updated in the topology per exchange between nodes.
Each node will broadcast to its neighbours entries in its table. This
exchange of entries can be made by dumping the whole routing
table, or by performing an incremental update, that means
exchanging just recently updated routes. Nodes who receive this data
can then update their tables if they received a better route, or a new
one. Updates are performed on a regular basis, and are instantly
scheduled if a new event is detected in the topology.
Illustration of DSDV
Consider two following topologies. At t=0, the network is organized as shown. We
suppose at this time the network is stable, each node has a correct routing table of all
destinations.
algorithm.
A particularity of OLSR is to use a mechanism of multipoint relays (MPR).
Multipoint relays for a specific node are the only ones to forward routing
Each node assigns a relay to a few of its direct neighbours, for covering every node at a two-
hop distance.
A has to choose relays for the network. Its direct neighbours are B, C, D and E.
The relay selection algorithm will check which one of these direct neighbours can cover the
two-hop distance one (F, G, H, I, J, K).
In this case, B and E are the only nodes able to cover these two-hop nodes for A, so, A will
select them as primary relays.
MPR (continued)
In the end, the best neighbours are qualified depending on how many
nodes they can cover.
It brings more effectiveness for the routing protocol by avoiding
duplicate traffic.
Leads to a good traffic distribution between each node. With OLSR, this
relay selection avoids unnecessary traffic, as only MPR can relay routing
table updates.
Reactive Protocols
Ad hoc On-demand Distance Vector (AODV)
a. It is a distance vector routing protocol, which means routing decisions will be taken depending on the
number of hops to destination.
Algorithm:
a. Inspired from the Bellman-Ford algorithm like DSDV.
c. The node will be silent while it does not have data to send. Then, if the upper layer is requesting a
route for a packet, a “ROUTE REQUEST” packet will be sent to the direct neighbourhood.
d. If a neighbour has a route corresponding to the request, a packet “ROUTE REPLY” will be returned.
This packet is like a “use me” answer.
e. Otherwise, each neighbour will forward the “ROUTE REQUEST” to their own neighbourhood, except
for the originator and increment the hop value in the packet data. They also use this packet for
building a reverse route entry (to the originator). This process occurs until a route has been found.
AODV (continued)
Another part of this algorithm is the route maintenance. While a
neighbour is no longer available, if it was a hop for a route, this route is
not valid anymore.
B and D add A in their routing table, as a reverse route, and forward the “ROUTE REQUEST” packet to
their neighbours.
B and D ignored the packet they exchanged each other (as duplicates). The forwarding process continues
while no route is known.
I receives the “ROUTE REQUEST” from G.
It generates the “ROUTE REPLY” packet and sends it to the node it received from. Duplicate packets
continue to be ignored while the “ROUTE REPLY” packet goes on the shortest way to A, using previously
established reverse routes (e and f ).
The reverse routes created by the other nodes that have not been used for the “ROUTE REPLY” are deleted
after a delay. G and D will add the route to I once they receive the “ROUTE REPLY” packet.
Reactive Protocols (continued)
Dynamic Source Routing (DSR)
Algorithm:
a. DSR uses explicit source routing, which means that each time a data packet is sent, it contains the
list of nodes it will use to be forwarded. In other terms, a sent packet contains the route it will use.
b. This mechanism allows nodes on the route to cache new routes, and also, allows the originator to
specify the route it wants, depending on criteria such as load balancing, QoS. This mechanism also
avoids routing loops.
c. If a node has to send a packet to another one, and it has no route for that, it initiates a route
discovery process. This process is very similar to the AODV protocol as a route request is broadcast
to the initiator neighbourhood until a route is found.
d. The difference is that every node used for broadcasting this route request packet deduces the route
to the originator, and keeps it in cache. Also, there can be many route replies for a single request.
DSR (continued)
DSR Route Delivery Process
a. In figure A wants a route to E. It broadcasts a route request to its neighbours with an
arbitrary chosen ID.
b. Neighbours forward this broadcast, and at each node, the reverse route entry is added
into the route request packet.
c. When E receives this route request, it can sent a route reply to A using the reverse route
included in the packet. The route reply packet contains the request ID and the reverse
route.
ZRP relies on the simple fact that nearest changes are the most important. So, in order
to reduce useless traffic on the topology, the approach is to define zones for each node.
Inside each zone, a proactive routing protocol will be used. This proactive protocol
will be defined as IntrAzone Routing Protocol (IARP) in the ZRP protocol, in
opposition to the IntErzone Routing Protocol (IERP) which will be used for finding a
route outside the defined zone.
This inter-zone routing protocol will be a reactive protocol. ZRP did not define any
specific protocol for IARP. In fact, ZRP is more a framework than an entire solution,
and then, IARP and IERP are free to be chosen.
In addition to this, two other protocols are defined in the framework; they are used for
zoning Specific problems. These protocols are Neighbour Detection Protocol (NDP)
and Border Resolution Protocol (BRP).
ZRP (continued)
Reactive protocols- A new approach for wireless networks, with the “On Demand”
routing mechanism. They have the advantage of not being vulnerable to dynamism in
topologies, but have the disadvantage of having higher delays than proactive
protocols. They can rely on old routing techniques, such as the vector distance that
AODV adapts to the “On Demand” approach, or can use less current mechanisms,
such as the source routing characterising DSR.
There is no perfect solution. The test carried out shows that protocol efficiency
depends on the context. On large and dynamic topologies, reactive protocols will
have an advantage, while on small and relatively fixed topologies; proactive protocols
will be more efficient. Nevertheless, hybrid protocols have a slight advantage on both
approaches, as they use a proactive protocol for small distances and a reactive
protocol for longer distances.
YO U
A N K
TH