Ondemand Multipath Distance Vector Routing in Ad Hoc Networks
Ondemand Multipath Distance Vector Routing in Ad Hoc Networks
Sequence numbers in AODV play a key role in ensur- 3 Ad Hoc On-Demand Multipath Distance
ing loop freedom. Every node maintains a monotonically Vector Routing
increasing sequence number for itself. It also maintains the
highest known sequence numbers for each destination in the The main idea in AOMDV is to compute multiple paths
routing table (called “destination sequence numbers”). Des- during route discovery. It is designed primarily for highly
tination sequence numbers are tagged on all routing mes- dynamic ad hoc networks where link failures and route
sages, thus providing a mechanism to determine the relative breaks occur frequently. When single path on-demand rout-
freshness of two pieces of routing information generated by ing protocol such as AODV is used in such networks, a new
15
route discovery is needed in response to every route break.
Each route discovery is associated with high-overhead and
latency. This inefficiency can be avoided by having multi-
ple redundant paths available. Now, a new route discovery
I destination
sequence number
I
I
destination
seauence number
advertisedhopcount
I 1
is needed only when all paths to the destination break. routelist
A noteworthy feature of the AOMDV protocol is the use { (nezthopl, hopcountl),
of routing information already available in the underlying I expiration-timeout I
AODV protocol as much as possible. Thus little additional
overhead is required for the computation of multiple paths. (a) AODV
The AOMDV protocol has two main components: (b) AOMDV
16
if (seqnum: < seqnumjd) then (1)
else (7)
advertised-hopcount: := 0; (8)
endif
elseif (seqnum: = seqnum;) and (9)
((advertised-hopcount:, i ) > (advertised-hopcountjd, j ) ) then
endif
Figure 3. AOMDV route update rules. This is used whenever a node i receives a route advertisement to a destination
d from a neighbor j. The variables seqnum:, advertised-hopcount! and route-list: represent the sequence number,
advertisedhopcount and routelist for destination d at node i respectively.
17
x copy of copy 1
via X
via Y
B
have transmitted at least two copies of m, each received via ous than node-disjoint paths), the destination node adopts
a different neighbor of S . But in the flooding algorithm, a ‘‘looser’’ reply policy. It replies up to IC copies of RREQ
each node transmits the message at most once, a contradic- (arriving via unique neighbors), regardless of the firsthops
tion. 0
taken by these RREQs. Unique neighbors guarantee link
disjointness in the first hop of the RREP. Beyond the first
Observe that in the above property, the neighbors of S hop, the RREP follow the reverse routes that have been
uniquely identify the node-disjoint paths to S from any node set up already which are node-disjoint (and hence link-
I . Since the RREQs are flooded in AODV, replacing m disjoint). Each RREP arriving at an intermediate node takes
by RREQ and S by the source of the RREQ provides a a different reverse route when multiple routes are already
mechanism for an intermediate node ( I )to determine node- available. Note that because of the “looser” reply policy it
disjoint paths to the source. This concept is explained fur- is possible for the trajectories of RREPs to cross at an inter-
ther in Figure 5. mediate node (Figure 6).
Several changes are needed in the AODV route discov- The parameter k is used to control the number of RREPs
ery procedure to enable computation of link-disjoint paths
and thus to prevent a RREP storm. Also, our earlier ob-
between source-destination pairs. Each RREQ now carries
servation [21] indicated that additional routes beyond a few
an additional field called f irsthop to indicate the first hop
provide only marginal benefit, if any. We have used k = 3
(neighbor of the source) taken by it. Also, each node main-
in our experiments.
tains a firsthopdist for each RREQ to keep track of the
list of neighbors of the source through which a copy of the
RREQ has been received.
4 Performance Evaluation
At the intermediate nodes, unlike in AODV, duplicate
copies of RREQ are not immediately discarded. Each copy
is examined to see if it provides a new node-disjoint path to We have evaluated the performance of AOMDV with re-
the source . This is ascertained by examining the f irsthop spect to AODV using ns-2 simulations under a wide range
field in the RREQ copy and the f irsthop-list in the node of mobility and traffic scenarios. The goal is to address the
for the RREQ. If it does provide a new path, the AOMDV following questions:
route update rule (Figure 3) is invoked to check if a reverse
path can be set up. If a reverse path is set up and a valid
0 How does AOMDV compare with AODV, particularly
route to the destination is available at the intermediate node,
in terms of end-to-end delay and frequency of route
it sends back a RREP to the source. Just as in AODV, only discoveries, as node mobilities vary?
the first arriving RREQ copy is forwarded if a route to des-
tination is unavailable.
At the destination, reverse routes are set up just like in How does AOMDV compare with AODV with in-
the case of intermediate nodes. However, in the hope of crease in offered load (i.e., number of sessions a n d o r
getting link-disjoint paths (which would be more numer- packet rate per session) ?
18
4.1 Simulation Environment - this includes all possible delays caused by buffering dur-
ing route discovery, queuing delay at the interface, retrans-
We use a detailed simulation model based on ns-2 [SI. mission delays at the MAC, propagation and transfer times;
The Monarch research group in CMU developed support (iii) Route discoveryfrequency - the total number of route
for simulating multi-hop wireless networks complete with discoveries initiated per second; (iv) Normalized routing
physical, data link and MAC layer models [3] on ns- loud - the total number of routing packets “transmitted”
2. The distributed coordination function (DCF) of IEEE for each delivered data packet. Each hop-wise transmission
802.1 1 [ 121 for wireless LANs is used as the MAC layer. of these packets is counted as one transmission.
The radio model uses characteristics similar to a commer-
cial radio interface, Lucent’s WaveLAN [32]. WaveLAN is 4.2.2 Varying mobility
a shared-media radio with a nominal bit-rate of 2 Mb/sec
Figure 7 shows the four performance metrics as a function
and a nominal radio range of 250 meters. A detailed
of mobility. Max. speed of the nodes is varied from 0 m/s
description of simulation environment and the models is
to 30 m/s to change mobility. Max. speed of 0 d s corre-
available in [3, 81 and will not be presented here. Note
sponds to a static network. Average rate of link failures in
that the same simulation environment has been used before
our mobility scenarios increases between 0-50 per second
in several recent performance studies on ad hoc networks
as the max. speed increases between 0-30 m/s. The number
[3, 10, 13, 291. In our simulations, we use the latest AODV
of sessions and packet rate are fixed at 25 and 4 packets/sec,
specification [28]. Link layer feedback is used to detect link
respectively. Performance of AODV and AOMDV are sim-
failures.
ilar in the static case. Their performance differences, how-
Mobility and traffic models are similar to previously re-
ever, become more apparent at higher speeds (Figure 7). As
ported results using this simulator [3, 13, 291. The random
expected, the fraction of packets delivered] goes down for
waypoint model (31 is used to model mobility. Here, each
both, the ptorocols. However, AOMDV loses fewer packets
node starts its journey from a random location to a random
than AODV (3-5% less) in mobile cases.
destination with a randomly chosen speed (uniformly dis-
There is a tremendous reduction in the average end-to-
tributed between 0 and max. speed). Once the destination
end delay with AOMDV as shown in Figure 7 (b). Im-
is reached, another random destination is targeted after a
provement in delay is almost always more than 100%. This
pause. We consider only the continuous mobility case (i.e.,
is because availability of alternate routes on route failures
no pauses). To change mobility, we vary the max. speed of
eliminates route discovery latency that contributes to the
the nodes. A 100 node network in a field with dimensions
delay. Interestingly, for both protocols the delay increases
2200m x 600m is used.
with mobility only until the max. speed of IO m/s and
Traffic sources are CBR (continuous bit-rate). The
beyond that delays stabilize. With additional instrumenta-
source-destination pairs (sessions) are spread randomly tion, we found that packet drops at intermediate nodes due
over the network. Only 5 12 byte data packets are used. The to link failures beyond 10 m/s are dominated by packets
number of sessions and/or the packet sending rate in each with longer path lengths. In other words, the average hop-
pair are varied to change the offered load in the network. counts of delivered data packets comes down at high speeds.
All traffic sessions are established at random times near the
Thus, delays become insensitive to increase in mobility af-
beginning of the simulation run and they stay active until the ter a point as the packets delivered at high speeds are mostly
end. Simulations are run for 500 simulated seconds. Each those that travel along shorter paths. Frequency of route dis-
data point represents an average of ten runs with identical
coveries and the routing load behave similarly with varying
traffic models, but different randomly generated mobility mobility ( Figure 7(c) and (d)). As expected, AOMDV per-
scenarios. Each plot shows error bars indicating the 90% forms better in both the metrics with improvements staying
confidence interval. Identical mobility and traffic scenarios around 20%.
are used across all protocol variations.
4.2.3 Varying offered load
4.2 Simulation Results
We first vary the number of sessions from 10-50 with packet
4.2.1 Performance Metrics rate per session fixed at 2 packetslsec (Figure 8). We keep
the max. speed constant at 10 m/s in this set of experiments.
We evaluate four key performance metrics: (i) Packet de- Figure 8 (a) plots the average delay (in seconds) against the
liveqfruction - ratio of the data packets delivered to the throughput (in Kb/s). Note the significant reduction in de-
destination to those generated by the CBR sources; or a re- lay for AOMDV for the same throughput - hallmark of a
lated metric received throughput in Kb/sec received at the good routing protocol [2]. Reduction in routing load is also
destination; (ii) Average end-to-end delay of data packets observed (Figure 8 (b)) as before.
19
I , I
AODV
AOMDV
-
0.6
0.55 - AOMDV
AODV -
1 - - --.
-3
C 0.95
0.9 I 0.4 -
.e- 2 0.35 - ,
5
- 0.85 0.3 - X
-4
B ..... .I .
D
e 0.8 I ,
:
0.15 - 4.............,,A.___......-..;.,.......----?
0.75 0.1 r ;
0 5 10 15 20 25 30
0.05 I I
Max. Speed (ds) 50 100 I50 200 250 300 350
Throughpul (Kbls)
(a) Packet Delivery
(a) Delay vs. Throughput
0.6
15
0.5 AODV -
-p 0.4
14 AOMDV
a6 0.3
2 0.2
0.I
n
0 5 10 15 20 25 30
Max. Speed (IPA)
IO 15 20 25 30 35 40 45 50
(b) End-to-End Delay
#Sessions
20
shortest pairs of node- (link-) disjoint paths. Later, an im-
0.9 proved technique was proposed by Sidhu et al. [311 to com-
pute node-disjoint paths. Another well known example of
a multipath routing algorithm is the OSPF [ 191, a link state
0.6
protocol that computes multiple paths of equal cost. More
recently, multipath distance vector algorithms that use dif-
0.4
fusing computations to construct and maintain DAGS have
0.2
been proposed [33, 351. However, all the above algorithms
0. I have high overheads that make them inefficient for band-
01 ' " " " " width limited wireless networks. They are designed to work
0 50 100 150 200 250 300 350 400 450
in the framework of proactive protocols, prevalent in the In-
Throughput (Kbk)
ternet, where overheads are not such major concern.
(a) Delay vs. Throughput There has been some interest in the ad hoc networking
community to employ multipath routing algorithms. Two of
24
the on-demand protocols, DSR [ 141 and TORA [24] have
AODV
AOMDV
-
........ . built-in capability to compute multiple paths. But either
of them suffers from a different set of performance prob-
lems. DSR uses source routing, by virtue of which it can
detect loops easily and can gather a lot of routing informa-
tion per route discovery. However, aggressive use of route
caching, lack of effective mechanisms to purge stale routes
and cache pollution leads to problems such as stale caches
and reply storms. These problems not just limit the per-
0 1 2 3 4 5 6 7 8 formance benefits of caching multiple paths, they can even
Packet rate (packetskec) hurt performance in many cases [IO, 291. These problems
(b) Routing Load are, however, being addressed [ l 1, 171. TORA [14], on the
other hand, builds and maintains multiple loop free paths
without use of source routing. It also can detect network
partitions. TORA uses an idea based on link reversals [9] to
Figure 9. Performance with varying packet rates. recover from link failures. Performance studies have shown
that TORA suffers from high overheads primarily because
high rates, the network is already under saturation (almost of the requirement of reliable, in-order delivery of routing
40% packets are dropped by both protocols), and in an over- control messages [3].
all sense, AOMDV still performs better as it gives lower Routing On-demand Acyclic Multipath (ROAM) [30] is
end-to-end delay. an on-demand, multipath distance vector algorithm based
on diffusing computations. Like TORA, ROAM can also
5 Related Work detect network partitions. But on the downside, state infor-
mation must be maintained at each node during route dis-
Multipath routing and its applications [4, 181 have been covery; this requires close coordination between nodes in-
well studied in the networking literature, in particular for creasing overheads. Thus ROAM is better suited for static
wired networks. In a broad sense, multipath routing en- ad hoc networks or networks with low node mobility.
ables fault tolerance and also facilitates load balancing. An A technique is proposed in [ 151 to allow AODV to main-
early work by Maxemchuk [ 181 on an application of mul- tain backup routes at the neighboring nodes of a primary
tipath routing known as dispersity routing discusses how route. This can be done with no additional overheads. The
a message can be dispersed along multiple paths by split- idea is to avoid dropping packets in flight when the primary
ting it in order to achieve smaller average delay and delay route fails. However, every node still has at most one route
variance. Since then, there has been a significant amount per destination just as in AODV. Finally, none of the above
of work done on multipath routing for both connection- mentioned protocols explicitly take path disjointness into
oriented (e.g., [ 1,6]) and connection-less technologies (e.g., account.
[20, 351). Path disjointness has been considered in [2 1,25, 16,341,
Distributed protocols to compute multiple disjoint and but all of them use source routing. Nasipuri et al. [21] pro-
loop-free paths are more related to our interests. Ogier pose extensions to DSR to compute multiple disjoint paths
and Shacham [23] describe a distributed algorithm to find for overhead reduction in mobile networks. They study the
21
effect of number of multiple paths, path lengths on rout- 0096264. Mahesh Marina is supported by an OBR comput-
ing performance using analytical modeling and packet-level ing research award in the ECECS department, University of
simulations. Split Multipath Routing (SMR) [ 161 is another Cincinnati.
disjoint multipath protocol using source routing. SMR is
similar to multipath DSR [21] except that the former uses Appendix
a modified flooding algorithm and the data traffic is split
among the multiple paths. Pearlman et al. [25] analyze
Theorem 1. The route update rule in AOMDV (Figure 3 )
the performance impacts of alternative path routing for loud
yields loop free routes.
balancing. They use a technique called diversity injection
to compute node-disjoint paths. In [34], an improvement P r o o j Suppose that a loop of size m, (il,i2, ..,im,il)
over the diversity injection technique [25] is proposed to forms in a route to a destination d. Note that nodes i and
find more node-disjoint paths. j in the code are two consecutive nodes in the route, and
22
[5] R. Castaneda and S. R. Das. Query Localization Techniques [231 R. Ogier, V. Rutenburg, and N. Shacham. Distributed Algo-
for On-demand Protocols in Ad Hoc Networks. In Proceed- rithms for Computing Shortest Pairs of Disjoint Paths. IEEE
ings of the IEEEIACM MOBICOM, pages 186-194, 1999. Transactions on Information Theory, 39(2):443-4.55, 1993.
[6] I. Cidon, R. Rom, and Y. Shavitt. Analysis of Multi-Path [24] V. D. Park and M. S. Corson. A Highly Adaptive Distributed
Routing. IEEE Transactions on Networking, 7(6):885-896, Routing Algorithm for Mobile Wireless Networks. In Pro-
1999. ceedings of the IEEE INFOCOM, pages 1405-1413, 1997.
[7] S. R. Das, R. Castaneda, and J. Yan. Simulation-based Per- [25] M. R. Pearlman, Z. J. Haas, P. Sholander, and S. S. Tabrizi.
formance Evaluation of Routing Protocols for Mobile Ad On the Impact of Alternate Path Routing for Load Balancing
hoc Networks. ACMIBaltzer Mobile Networks and Applica- in Mobile Ad Hoc Networks. In Proceedings of the ACM
tions (MONET),5(3): 179-189, 2000. MobiHoc, pages 3 -10,2000.
(81 K. Fall and K. Varadhan(Eds.). ns notes and documentation, [26] C. E. Perkins and P. Bhagwat. Highly Dynamic Destination-
1999. available from http://www-mash.cs.berkeley.edu/ns/. Sequenced Distance-Vector Routing (DSDV) for Mobile
[9] E. Gafni and D. Bertsekas. Distributed Algorithms for Computers. In Proceedings of the ACM SIGCOMM, pages
Generating Loop-free Routes in Networks with Frequently 234-244, 1994.
Changing Topology. IEEE Transactions on Communica- [27] C. E. Perkins and E. M. Royer. Ad Hoc On-Demand Dis-
tions, 29(1):11-18, 1981. tance Vector Routing. In Proceedings of the IEEE Workshop
[IO] G. Holland and N. H. Vaidya. Analysis of TCP Perfor- on Mobile Computing Systems and Applications (WMCSA),
mance over Mobile Ad Hoc Networks. In Proceedings of pages 90-100, 1999.
the IEEE/ACM MOBICOM, pages 219-230, 1999. [28] C. E. Perkins, E. M. Royer, and S. R. Das. Ad
[ 1 I] Y.-C. Hu and D. Johnson. Caching strategies in On-demand Hoc On Demand Distance Vector (AODV) Routing.
Routing Protocols for Wireless Ad Hoc Networks. In Pro- http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-
ceedings of the IEEE/ACM MOBICOM, pages 23 1-242, 07.txt, Nov 2000. IETF Internet Draft (work in progress).
2000. [29] C. E. Perkins, E. M. Royer, S . R. Das, and M. K. Marina.
[I21 IEEE Standards Department. Wireless LAN medium ac- Performance Comparison of Two On-demand Routing Pro-
cess control (MAC) and physical layer (PHY) specifications, tocols for Ad Hoc Networks. IEEE Personal Communica-
IEEE standard 802.1 1-1997. tions, 8(1):16-28, 2001.
[13] P. Johansson, T. Larsson, N. Hedman, and B. Mielczarek. [30] J. Raju and J. J. Garcia-Luna-Aceves. A New Approach to
Routing Protocols for Mobile Ad-hoc Networks - A Com- On-demand Loop-Free Multipath Routing. In Proceedings
parative Performance Analysis. In Proceedings of the of the Int’l Con$ on Computer Communications and Net-
IEEE/ACM MOBICOM, pages 195-206, 1999. works (IC3N),pages 522-521, 1999.
[ 141 D. Johnson and D. Maltz. Dynamic Source Routing in Ad
Hoc Wireless Networks. In T.Imielinski and H. Korth, edi- [31] D. Sidhu, R. Nair, and S. Abdallah. Finding Disjoint Paths
in Networks. In Proceedings of the ACM SIGCOMM, pages
tors, Mobile computing, chapter 5. Kluwer Academic, 1996. 43-51, 1991.
[I51 S. J. Lee and M. Gerla. AODV-BR: Backup Routing in Ad
hoc Networks. In Proceedings of the IEEE Wireless Commu- [32] B. Tuch. Development of WaveLAN, an ISM band wireless
LAN. AT&T Technical Journal, 72(4):27-33, 1993.
nications and Networking Conference(WCNC),pages 1311-
[33] S. Vutukury and J. J. Garcia-Luna-Aceves. MDVA: A
1316,2000.
Distance-Vector Multipath Routing Protocol. In Proceed-
[I61 S. J. Lee and M. Gerla. Split Multipath Routing with Max-
ings of the IEEE INFOCOM, pages 5.57-564, 2001.
imally Disjoint Paths in Ad Hoc Networks. In Proceedings
of the IEEE ICC, pages 3201-3205,2001.
[34] K. Wu and J. Harms. Performance Study of a Multipath
[I71 M. K. Manna and S. R. Das. Performance of Route Routing Method for Wireless Mobile Ad Hoc Networks.
Caching Strategies in Dynamic Source Routing. In Proceed- In Proceedings of the IEEE Int ’1 Symposium on Modeling,
ings of the Int’l Workshop on Wireless Networks and Mo- Analysis and Simulation of Computer and Telecommunica-
bile Computing ( WNMC) in conjunction with Int ’1 Cont on tion Systems (MASCOTS),pages 99-107,2001.
Distributed Computing Systems (ICDCS), pages 42.5-432, [35] W. Zaumen and J. J. Garcia-Luna-Aceves. Shortest multi-
2001. path routing using generalized diffusing computations. In
[I81 N. F. Maxemchuk. Dispersity Routing. In Proceedings of Proceedings of the IEEE INFOCOM, pages 1408-1417,
the IEEE ICC, pages 41:1O-41:13, 1975. 1998.
[I91 J. Moy. OSPF version 2. RFC 1247, 1991.
[20] S. Murthy and J. J. Garcia-Luna-Aceves. Congestion-
Oriented Shortest Multipath Routing. In Proceedings ofthe
IEEE INFOCOM, pages 1028-1036, 1996.
[21] A. Nasipuri, R. Castaneda, and S. R. Das. Performance of
Multipath Routing for On-demand Protocols in Mobile Ad
Hoc Networks. ACM/Kluwer Mobile Networks and Appli-
cations (MONET),6(4):339-349, 2001.
[22] S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu. The
Broadcast Storm Problem in a Mobile Ad Hoc Network. In
Proceedings of the IEEE/ACM MOBICOM, pages 151-1 62,
1999.
23