Lecture 2-Mobile Ad-hoc Network (MANET)
Lecture 2-Mobile Ad-hoc Network (MANET)
NETWORKS
1
Mobile Ad-Hoc Network
(MANET)
2
CONT . . .
3
MANET: Definition
•construct a network without infrastructure, using
networking abilities of the participants
• a network constructed for a special purpose
• extended concept of mobility: network mobility
(moving routers)
• Simplest example: a single-hop ad hoc network
Single- hop
Multi-hop
4
In MANET…
q Host movement frequent
q Topology change frequent
q No cellular infrastructure.
q Multi-hop wireless links.
q Data must be routed via intermediate
nodes.
5
MANET..
• MANETs are formed dynamically by an autonomous
system of mobile nodes that are connected via
wireless links without using existing network
infrastructure or centralized administration.
• In MANETs, the nodes are free to move and randomly
and organize themselves arbitrary.
• the network may operate in a standalone fashion or
may be connected to the larger Internet.
• Routes between nodes potentially contain multiple
hops
6
Multi-hop
• Limited range --> multi-hopping
• For many scenarios, communication with peers outside
immediate communication range is required
– Direct communication limited because of distance,
obstacle,...
– Solution: multi-hop network
7
Basic Issues
8
Problems/challenges for ad hoc network
9
Mobility: −> Suitable, adaptive protocol
11
Routing in MANET
12
Unicast Routing Protocols
• Many protocols have been proposed
• Some specifically invented for MANET
• Others adapted from protocols of wired networks
13
Routing Protocols in
MANET
14
Proactive Routing Protocols
15
Proactive routing
• Take reference from wired Routing algorithm and
protocol
– Distance vector routing algorithm, DSDV protocol
– Link state routing algorithm, OSPF protocol
• Then extended into ad hoc cases
– Information exchange in ad hoc à flooding
– Dynamic topology in ad hoc à detection of route loop
16
Proactive…
• Distance vector-based: every node maintains the distance
of each destination
– DSDV: Destination-Sequenced Distance-Vector
– WRP: Wireless routing protocol
• Link state-based: each node maintains a view of the
network topology
– OLSR: Optimized Link State Routing
• Combine DV and LS together
– FSR: Fisheye State Routing
17
Destination-Sequenced Distance-Vector
(DSDV)
• Each node maintains a routing table which stores
– next hop, cost metric towards each destination
– a sequence number that is created by the destination itself
• Each node periodically forwards routing table to neighbors
– Each node increments and appends its sequence number when
sending its local routing table
• Each route is tagged with a sequence number; routes with greater
sequence numbers are preferred
• Each node advertises a monotonically increasing even sequence
number for itself
• When a node decides that a route is broken, it increments the
sequence number of the route and advertises it with infinite
metric
• Destination advertises new sequence number
18
DSDV
Route Selection: update information is compared to own routing table
1. Select route with higher destination sequence number (This ensure to
use always newest information from destination)
2. Select the route with better metric when sequence numbers are equal.
X Y Z
A E H
C K
G
D
20
Optimized Link State Routing (OLSR)
• Nodes C and E forward information received from A
• Nodes E and K are multipoint relays for node H
• Node K forwards information received from H
B F J
A E H
C K
G
D
21
OSLR….
• OLSR
– Inherits Stability of Link-state protocol
– Selective Flooding
– only MPR retransmit control messages:
• Minimize flooding
– Suitable for large and dense networks
22
OSLR-Multipoint relays
• MPRs = Set of selected neighbor nodes
• Minimize the flooding of broadcast packets
• Each node selects its MPRs among its on hop neighbors
– The set covers all the nodes that are two hops away
23
OSLR-Multipoint relays….
• To obtain the information about one-hop neighbors:
– Use HELLO message (received by all one-hop neighbors)
24
OSLR-Multipoint relays….
E
D
F
A
25
Fisheye State Routing (FSR)
• Fisheye vision
– Fishes do have 360° (or almost) vision.
–Fishes do have a higher concentration of optic nerves
close to their focal point than elsewhere in their eye.
–As a result fisheye captures with high detail the
points near the focal point
26
FSR
• Observation and problem
– When destination is far away, details about path are
not relevant – only in vicinity are details required
– reducing control traffic at the expense of routing table
accuracy
• Motivation
– Look at the graph as if through a fisheye lens, to
reduce the size of the routing update messages
– Regions of different accuracy of routing information
• Solution
– Fisheye State Routing 27
FSR
• Solution
– Fisheye lens
• Relative to each node, the network is divided in different
scopes, more frequent routing updates for nodes with
smaller scope
– FSR uses different exchange periods for different
entries in the routing table
• Each node maintains topology table of network (as in LS)
• Unlike LS: only distribute link state updates locally.
28
Scope of FSR
29
FSR
• Routing update frequency decreases with distance to
destination
• Higher frequency updates within a close zone and lower
frequency updates to a remote zone
• Highly accurate routing information about the immediate
neighborhood of a node; progressively less detail for areas
further away from the node
• Major scalability benefit
– control traffic decreases significantly
• Unsolved problems
– Route table size still grows linearly with network size
– Out of date routes to remote destinations
30
Summary of proactive routing
• Table-Driven Routing Protocol:
– continuously evaluate the routes
– attempt to maintain consistent, up-to-date routing
information
• when a route is needed, one may be ready
immediately
– when the network topology changes
• the protocol responds by propagating updates throughout
the network to maintain a consistent view
31
Proactive Routing in
Protocols
q Unsuitable for such a dynamic network
q For example, consider link-state routing that
sends out network-wide floods for every link-
state change …
q Even in the absence of any existing connections,
considerable overhead spent in maintaining
“network state”
32
Goal
q Low overhead route computation
q Ability to recover from frequent failures at
low-cost
q Scalable (with respect to mobility and
number of hosts)
q Robust
33
Reactive Routing Protocol
34
Hybrid Protocol
q Adaptive
q Combination of proactive and reactive
35
Protocol Trade-Offs
q Proactive protocols
§ Always maintain routes
§ Little or no delay for route determination
§ Consume bandwidth to keep routes up-to-date
§ Maintain routes which may never be used
q Reactive protocols
§ Lower overhead since routes are determined on
demand
§ Significant delay in route determination
§ Employ flooding (global search)
§ Control traffic may be bursty 36
Reactive Routing Protocols
37
Dynamic Source Routing (DSR)
• When node S wants to send a packet to node
D, but does not know a route to D, node S
initiates a route discovery
38
CONT . . .
39
Route Discovery in DSR
Y
S Z
E
F
B
C M L
J
A G
H D
K
I N
40
Route Discovery in DSR
Y
Broadcast transmission
[S] Z
S
E
F
B
C M L
J
A G
H D
K
I N
41
Route Discovery in DSR
Y
Z
S [S,E]
E
F
B
C M L
J
A [S,C] G
H D
K
I N
42
Route Discovery in DSR
Y
Z
S E
F [S,E,F]
B
C M L
J
A G
H D
[S,C,G] K
I N
43
Route Discovery in DSR
Y
Z
S E
F [S,E,F,J]
B
C M L
J
A G
H D
K
I [S,C,G,K] N
44
Route Discovery in DSR
Y
Z
S E
[S,E,F,J,M]
F
B
C M L
J
A G
H D
K
I N
46
Route Reply in DSR
Y
Z
S RREP [S,E,F,J,D]
E
F
B
C M L
J
A G
H D
K
I N
47
Dynamic Source Routing (DSR)
• Node S on receiving RREP, caches the route
included in the RREP
48
Data Delivery in DSR
Y
DATA [S,E,F,J,D] Z
S E
F
B
C M L
J
A G
H D
K
I N
49
DSR Optimization: Route
Caching
• Each node caches a new route it learns by any means
• When node S finds route [S,E,F,J,D] to node D, node S also
learns route [S,E,F] to node F
• When node K receives Route Request [S,C,G] destined for
node, node K learns route [K,G,C,S] to node S
• When node F forwards Route Reply RREP [S,E,F,J,D], node F
learns route [F,J,D] to node D
• When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D]
to node D
• A node may also learn a route when it overhears Data
• Problem: Stale caches may increase overheads
50
Dynamic Source Routing: Advantages
• Routes maintained only between nodes who
need to communicate
– reduces overhead of route maintenance
52
Ad Hoc On-Demand Distance Vector Routing
(AODV)
53
AODV
• Route Requests (RREQ) are forwarded in a manner
similar to DSR
Z
S E
F
B
C M L
J
A G
H D
K
I N
56
Route Requests in AODV
Y
Broadcast transmission
Z
S E
F
B
C M L
J
A G
H D
K
I N
57
Route Requests in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
58
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
59
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
60
Reverse Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
61
Forward Path Setup in AODV
Y
Z
S E
F
B
C M L
J
A G
H D
K
I N
62
Route Request and Route Reply
• Route Request (RREQ) includes the last known sequence
number for the destination
63
Link Failure
• A neighbor of node X is considered active for a routing table
entry if the neighbor sent a packet within
active_route_timeout interval which was forwarded using
that entry
• When the next hop link in a routing table entry breaks, all active
neighbors are informed
64
Route Error
• When node X is unable to forward packet P (from node S to node
D) on link (X,Y), it generates a RERR message
65
AODV: Summary
• Routes need not be included in packet headers
• Nodes maintain routing tables containing entries only for
routes that are in active use
• At most one next-hop per destination maintained at
each node
– DSR may maintain several routes for a single destination
• Sequence numbers are used to avoid old/broken routes
• Sequence numbers prevent formation of routing loops
66
Hybrid Routing Protocols
67
Zone Routing Protocol (ZRP)
• ZRP combines proactive and reactive approaches
• All nodes within hop distance at most d from a node X
are said to be in the routing zone of node X
• All nodes at hop distance exactly d are said to be
peripheral nodes of node X’s routing zone
K L
A
B
I
G
S
C E
D
H
J
70
Nodes in a Routing Zone
71
Neighbour Discovery Protocol
S performs route
discovery for D
B
S
A C
D
E
F
73
ZRP: Example with K = 2
S performs route
discovery for D
B
S
A C
D
E
F
74
ZRP: Example with K = 2
S performs route
discovery for D
B
S
A C
D
E
F
75
Interzone Routing
• The interzone routing discovers routes to the
destination reactively.
77
Interzone Route Discovery
• S sends a route request (RREQ) message to the
peripheral nodes of its zone through
bordercasting.
S C
B
D H
79
Route Reply in Interzone Routing
• If a node P finds that the destination D is within
its routing zone, P can initiate a route reply.
81
Route Maintenance
82
Route Maintenance
• Hence, repairing a broken link requires
establishing a new path between two nodes
within a routing zone.
84
Routing Zones Overlap Heavily
• Since each node has its own routing zone, the
routing zones of neighbouring nodes overlap
heavily.
86
Routing Summary
• Protocols
– Typically divided into proactive, reactive and hybrid
– Plenty of routing protocols. Discussion here is far from
exhaustive
• Actual trade-off depends a lot on traffic and mobility
patterns
– Higher traffic diversity (more source-destination pairs)
increases overhead in on-demand protocols
– Higher mobility will always increase overhead in all
protocols
87
Transport in MANET
88
User Datagram Protocol (UDP)
• Studies comparing different routing protocols for MANET typically
measure UDP performance
• Several performance metrics are used
– routing overhead per data packet
– packet delivery delay
– throughput/loss
• Many variables affect performance
– Traffic characteristics
– Mobility characteristics
– Node capabilities
• Difficult to identify a single scheme that will perform well in all
environments
• Several relevant studies [Broch98Mobicom, Das9ic3n,
Johansson99Mobicom, Das00Infocom, Jacquet00Inria]
On the evaluation of TCP in MANETs,
89
Transmission Control Protocol (TCP)
• Reliable ordered delivery
– Reliability achieved by means of retransmissions if necessary
• End-to-end semantics
– Receiver sends cumulative acknowledgements for in-sequence packets
– Receiver sends duplicate acknowledgements for out-of-sequence packets
90
Detection of packet loss in TCP
91
TCP in MANET
Several factors affect TCP performance in MANET:
• Wireless transmission errors
– may cause fast retransmit, which results in
• retransmission of lost packet
• reduction in congestion window
– reducing congestion window in response to errors is
unnecessary
• Multi-hop routes on shared wireless medium
– Longer connections are at a disadvantage compared to shorter
connections, because they have to contend for wireless
access at each hop
No
throughput
No throughput
despite route repair
D D D
C C C
B B B A
A
A
95
Impact of Route Caching
TCP performance typically degrades when caches are used for route
repair
96
Caching and TCP performance
97
Impact of Acknowledgements
• TCP Acks (and link layer acks) share the wireless bandwidth with
TCP data packets
• Data and Acks travel in opposite directions
– In addition to bandwidth usage, acks require additional receive-send
turnarounds, which also incur time penalty
• Reduction of contention between data and acks, and frequency of
send-receive turnaround
• Mitigation [Balakrishnan97]
– Piggybacking link layer acks with data
– Sending fewer TCP acks - ack every d-th packet (d may be chosen
dynamically)
– Ack filtering - Gateway may drop an older ack in the queue, if a new ack
arrives
98
TCP Parameters after Route Repair
• Window Size after route repair
– Same as before route break: may be too optimistic
– Same as startup: may be too conservative
– Better be conservative than overly optimistic
– Reset window to small value; let TCP learn the window size
• Retransmission Timeout (RTO) after route repair
– Same as before route break: may be too small for long routes
– Same as TCP start-up: may be too large and respond slowly to
packet loss
– new RTO could be made a function of old RTO and route
lengths
99
Improving TCP Throughput
• Network feedback
– Network knows best (why packets are lost)
– Need to modify transport & network layer to receive/send
feedback
- Need mechanisms for information exchange between layers
• Inform TCP of route failure by explicit message
• Let TCP know when route is repaired
– Probing
– Explicit notification
– Better route caching mechanisms
101
Energy in MANET
102
Energy
103
Main reason for Energy management in
ad hoc networks
• Limited Energy Reserve: The improvement in battery
technologies is very slow
• Difficulties in replacing the batteries: E.g. in battlefields or
emergency applications
• Lack of central coordination: In ad hoc networks as distributed
networks some nodes may work as relay nodes; when relay
traffic is heavy the power consumption is high
• Constraints on the battery source: The batteries should be small
and not heavy; So low power is available at each node
• Selection of optimal transmission power: Higher
transmission power results in high
104
Classification..
how to consume?
how to supply?
= power control
105
Classification..
• Battery management :
– Concerned with problems that lie in the selection of battery
technologies, finding the optimal capacity of the battery
• Transmission power management:
– Attempt to find an optimum power level for the nodes in
the ad hoc wireless network
• System power management:
– Deals mainly with minimizing the power required by hardware
peripherals of a node (such as CPU, DRAM and LCD display)
106
Battery Management Schemes
107
Battery …
A) Device depending schemes:
I. Battery scheduling techniques:
• In a battery package of L cells, a subset of batteries can be
scheduled for transmitting a given packet leaving other cells
o recover their charge. There are some approaches to select
the subset of cells, e.g.:
B) Data link Layer Battery Management
Lazy Packet Scheduling:
• Reduce the power ⇒ Increase the transmission time (lower
bit rate)
• But this may not suit practical wireless environment packets
– a transmission schedule is designed taking into account the delay
constraints of the packets 108
Transmission power management
111
Transmission power management
• As a solution to this problem, RTS-CTS are transmitted at
the highest possible power level but DATA and ACK at
the minimum power level necessary to communicate
• In figure nodes A and B send RTS and CTS respectively
with highest power level such that node C receives the
CTS and defers its transmission
• By using a lower power level for DATA and ACK packets,
nodes can save energy
112
Transmission power management
• In the previous scheme, RTS-CTS handshake is used to
decide the transmission power for subsequent DATA and
ACK which can be achieved in two different ways
1. Suppose node A wants to send a packet to node B. Node A
transmit RTS at power level pmax (maximum possible). When
B receives the RTS from A with signal level pr, B calculates the
minimum necessary transmission power level, pdesired. For the
DATA packet based on received power level, pr, transmitted
power level, pmax, and noise level at the receiver B. Node B
specifies pdesired in its CTS to node A. After receiving CTS,
node A sends DATA using power level pdesired.
113
Transmission…
2. When a destination node receives an RTS, it
responds by sending a CTS (at power level pmax).
When source node receives CTS, it calculates pdesired
based on received power level, pr, and transmitted
power level (pmax) as
Pdesired= (pmax / pr) x Rxthresh x c
where Rxthresh is minimum necessary received signal
strength and c is a constant
114
System power management scheme
• Efficient design of the hardware brings about
significant reduction in the power consumed.
• This can be effected by operating some of the
peripheral devices in power-saving mode by
turning them off under idle conditions.
• System power consists of the power used by all
hardware units of the node. This power can be
conserved significantly by applying the following
schemes:
– Processor power management schemes
– Device power management schemes 115
Summary
116
Vulnerability of MANET
Wireless
Links
Different
requirement
Dynamic
s for
Topology
different
appl. Vulnerabilit
y
Resource Cooperative
Constraints ness
Lack of
clear line of
defense
117
Security in MANET
q Goal
§ Authentication
§ Confidentiality
§ Integrity
§ Non-repudiation
§ Isolation and detection
118
Security in MANET
q Authentication: A node must know the
identity of the peer it is communicating
with.
q Confidentiality: Ensure certain
information is never disclosed to
unauthorized entity.
q Integrity: Message being transmitted is
not corrupted.
119
Security in MANET
q Non-repudiation: The sender cannot later
deny sending information & the receiver
cannot deny reception.
q Isolation & detection: Require the
protocol can identify misbehaving node &
render them unable to interfere with
routing.
120
Classification of attack in
MANET
• Basic mechanism
• Internal
• Security mechanism
• External
By their type
• Passive
• Active
121
Attack: Internal or
External Source
q An external source of attack is not a
legitimate user of the network.
q An internal source attacker is an
authorized node.
§ These can disrupt the network
communication intentionally.
122
Attacks: Passive Attacks
q Eavesdropping Attack: Are attacks by
external or internal nodes.
§ The attacker can analyses broadcast
messages to reveal some useful
information about the network.
123
Attacks: Passive Attacks
q Traffic Analysis: Determine the
location and identity of
communicating hosts and could
observe the frequency and length of
messages being exchanged.
124
Attacks: Active Attacks
q Dropping Attacks: Malicious nodes &
selfish nodes deliberately drop all
packets that are not destined for them.
125
Attacks: Active Attacks
q Modification Attacks: Insider
attackers modify packets to disrupt
the network.
q Fabrication Attacks: T h e a tta ck er
forges network packet.
126
Attacks: Active Attacks
q Timing Attacks: An attacker attacks
other nodes by causing itself to
appear closer to those nodes than it
really is.
127
Attacks: By Mechanism
q Basic Mechanisms: Routing disruption
and resource consumption.
q Security Mechanisms: Key
management.
128
Black hole Attack in AODV
F
M
D
C
E
D
C
E
130
Black hole Attack in AODV
<A,1,1,E, ,0>
F
M
A
<A,1,1,E, ,0>
D
C
E
131
Black hole Attack in AODV
<E,A,120,2>
F
M
A
<A,1,1,E, ,0>
D
C
E
132
Black hole Attack in AODV
F
M
Dest Next Hop Seq
E M 3 120
A
<E,A,120,2>
<A,1,1,E, ,0>
D
C
E
133
Black hole Attack in AODV
F
est Next Hop Seq M
E M 3 120
A
Data, E
<A,1,1,E, ,0>
D
C
E
134
Black hole Attack in AODV
F
est Next Hop Seq M
E M 3 120 Data, E
A
<A,1,1,E, ,0>
D
C
E
135
THANK YOU!!
Q&A?
136