SlideShare a Scribd company logo
1 of 4
Download to read offline
IEEE MASS 2006                                                                                                                              1




           Opportunistic Routing in Dynamic Ad Hoc
               Networks: the OPRAH protocol
                                                            C´ dric Westphal
                                                             e



                        I. I NTRODUCTION                                 have the corresponding power capacity. These are the types of
                                                                         nodes that we are considering. To phrase it differently, we are
      HE promiscuous nature of the air interface has been typ-
T     ically considered a hindrance to transmit more than an
opportunity. Overhearing the other participants’ traffic in the
                                                                         presenting a protocol which applies to some ad hoc and mesh
                                                                         networks but not necessarily to wireless sensor networks.
                                                                           Before we describe the protocol, we would like to introduce
wireless communication network is assumed to be interference,
                                                                         some motivation for opportunistic protocols in general.
an issue that should be remedied. Only recently has a different
tack been taken, to use this fundamental broadcast characteris-
                                                                                      II. M OTIVATION AND R ELATED W ORK
tic of the air interface to the advantage of the communication
network.                                                                    We first consider a simple case: a square area. We wish to
   Ad hoc networks, where wireless nodes are within range of             establish a connection between two nodes that sit at some diag-
each other and use each other to relay messages seem an ob-              onally opposite corners, which we denote s and d. The nodes
vious place to attempt to leverage the broadcast nature of the           are too far to connect directly, and need relays, which are uni-
air interface. However, typical ad hoc routing protocols seem            formly distributed in the square. The connectivity between each
more interested in finding one good route for the whole life of           node pair is affected by some fading. We will discuss the fading
a connection than to make use of the diversity of paths avail-           assumptions shortly.
able at any instant. The promiscuous nature of the air interface            Depending on the channel conditions, different paths may be
might be used at the route establishment time, to for instance           available to relay the packets between s and d. The task of a
determine potential back-up paths, but is mostly ignored during          routing protocol in such ad hoc network is to find a path which
the transmission phase for current ad hoc routing protocols.             will allow the establishment of a reliable connection between s
   We will present in this document a protocol which uses the            and d.
                                                                            There are two broad types of routing protocols: reactive and
promiscuity of the air interface to find a more optimal path for
                                                                         proactive. A proactive protocol will try to identify the connec-
each packet in a dynamic network. Before going more into the
                                                                         tivity between the nodes ahead of time, and store the informa-
details, we want to emphasize a few points.
                                                                         tion in a route table somewhere, such that a route is available
   First, while cross-layer design offers means to optimize and
                                                                         when needed. A reactive protocol attempts to identify the route
enhance the protocol, we chose to focus on a strict layer sepa-
                                                                         only at the time of the connection establishment.
ration, which allows us to re-use legacy physical and link lay-
                                                                            For now, we can consider static nodes, and look at the estab-
ers. This is important for the application of the protocol in
                                                                         lishment of a single connection. In this set-up, both proactive
real systems, as it is backward compatible up to the routing
                                                                         and reactive protocol behave the same way: they attempt to
stack. While cross-layer design is valuable, we will see that the
                                                                         identify a route that will last the length of the connection. If the
link layer information, such as received signal strength indica-
                                                                         route evolves during the time of the connection, both types of
tor (RSSI) or channel quality indicator (CQI), will only give
                                                                         protocols have to handle this in some way.
an idea of the best route at the time of the connection set-up
                                                                            In a static environment, where connectivity is perturbed only
anyway, and not throughout the life of a connection.
                                                                         by fading between two fixed points, the performance of these
   Second, there is a trade-off to assess between reliability and
                                                                         protocols depends on how steady a route is. Experimental re-
the number of transmissions. This take the form in our protocol
                                                                         sults by implementing and deploying an ad hoc networks have
of potential duplicate packets. We believe this can be addressed
                                                                         shown that most protocols fare poorly. For instance, [4] shows
at the application layer –or that our protocol could be refined to
                                                                         that existing ad hoc protocols do not perform well.
handle duplicates– and that it is better to receive the packet in a         We ran some NS-2 simulations, using the Propaga-
timely manner at the cost of a few superfluous duplicates, than           tion/Shadowing module with typical outdoors parameters (with
to not receive the packet at all.                                        a path loss exponent β = 2 and a standard deviation σdB = 5)
   Third, opportunistic protocols in general should not be ap-           and the default 802.11 link layer model. We placed 20 nodes
plied to very power-scarce environments, as listening to the             in a square area with a varying size ranging from 500x500, to
other nodes’ transmissions, even if only at the MAC layer, has           2,000x2,000. Again, we added a source s and a destination d in
a cost in battery life. On the other hand, an 802.11 card for            opposite corners and computed the length of the shortest path
instance will listen to the transmissions on its channel and will        to cross the square diagonally.
 C. Westphal is with the Networking Laboratory, Nokia Research Center,      We see on Figure 1 that there is a dramatic variation of the
Mountain View, California. E-mail: cedric.westphal@nokia.com             shortest path between s and d. We see that the shortest path is
IEEE MASS 2006                                                                                                                                                                          2



                                            5
                                                     Length of Shortest Path for Different Node Densities
                                                                                                                       next hop is included in the MAC header. The intended re-
                                                                                                      500x500
                                                                                                      1000x1000
                                                                                                                       ceivers acknowledge in turn, so that the sender knows that at
                                           4.5
                                                                                                      2000x2000        least one receiver has received the packet successfully. All re-
    Number of Hops for the Shortest Path




                                            4
                                                                                                                       ceivers are also assumed to overhear the acknowledgement to
                                           3.5                                                                         decide whether or not to forward their copy of the packet.
                                            3                                                                             As we are interested in modifying only the routing layer, we
                                           2.5
                                                                                                                       cannot use the MAC of [1].Further, [1] is built upon a static
                                                                                                                       network, so defining the set of potential candidates to forward
                                            2
                                                                                                                       a packet is relatively easy, but it becomes problematic in a dy-
                                           1.5
                                                                                                                       naminc environment. We will define a protocol which copes
                                            1
                                                 0   10         20           30           40         50           60
                                                                                                                       with the changing environment and the mobility of the nodes,
                                                             Time (1 unit = 1 packet interarrival)
                                                                                                                       and is built on the use of standardized MAC, for instance IEEE
                                                                                                                       802.11.
Fig. 1. Shortest Path in Number of Hops as a function of time

                                                                                                                                       III. T HE OPRAH PROTOCOL
subject to some significant variations, even though we are con-
sidering a static network. Most current ad hoc protocols settle                                                           Using the lessons we derived from the literature review, we
on a single route, the shortest path at the time of establishment                                                      are now able to define some guiding principles for the investi-
for a reactive protocol, or the shortest path at the time of compi-                                                    gation of opportunistic routing in ad hoc networks.
lation of the route table, for a proactive one. Both prove harmful
to the performance of the system: either the protocol settles for                                                      A. Framework and Requirements
a shortest path that is not sustainable, or it settles for a path that
is under-performing every time there exists a shorter path.                                                               We consider an ad-hoc network composed of IP enabled
   The benefit from opportunistic routing has not been fully                                                            modes. We consider that each node listen to the same channel
tapped yet in the context of ad hoc networks. Opportunistic                                                            for reception and transmission. This assumption is motivated
scheduling has been extensively used in one-to-many transmis-                                                          by the use of an 802.11 MAC layer with single radio nodes.
sions, mostly in scheduling nodes with respect to the conditions                                                       This simplification is welcome to allow nodes to talk to each
of the channel which connects them to a base station.                                                                  other while in a dynamic environment: nodes do not have to
   Cooperative strategies have been used in information theory,                                                        agree on a dedicated channel for communication.
starting from Cover and El Gamal seminal paper [3] on the re-                                                             Each node relays traffic for the other nodes. We assume that
lay channel, and subsequent work in this community (see for                                                            all participants in the network perform their relaying duties. We
instance [?], or the earlier survey in [8]).                                                                           specifically assume that nodes have no knowledge of their rela-
   In the ad hoc context, there are relevant works to consider                                                         tive geographical positions.
which take advantage of the diversity offered by multiple users                                                           Our goal is to define a routing protocol, and the associated
over the air interface. Leveraging the promiscuous nature of the                                                       MAC protocol such that:
air interface to define multiple paths in ad hoc network has been                                                          • All nodes that could forward the packet to the destination
studied, for instance in [5] or [6]. [5] uses the fact that an AODV                                                          and are located ”closer” than the sender should compete to
route request and reply is overheard by multiple nodes to build                                                              forward the packet.
back-up routes in case the principal route fails. [6] computes                                                            • The notion of ”closer” should be defined without the assis-
multiple disjoint path to achieve the same purpose. As we will                                                               tance of external measurement or probes (as is conducted
see below, the route set-up in OPRAH is very similar to these,                                                               in [2] for instance) but only with local information.
the main difference being the use that OPRAH makes of the                                                                 • The protocol should scale. As such, this prohibits the
availability of multiple paths or relays during the connection.                                                              use of lists to replace or enhance routing tables. Reactive
   The most relevant work on our topic is [1]. This work by                                                                  AODV-like mechanisms should be preferred.
Biswas and Morris, from MIT, came out of a practical problem:                                                             • The protocol should be implementable using relatively
the RoofNet project [10] was first deployed using traditional                                                                 simple off-the-shelf components.
and standardized MAC layers and network and routing proto-                                                                • The protocol should be able to inter-operate with wired
cols. However, these protocols turned out to perform somewhat                                                                protocols, to ensure that the ad hoc network can commu-
poorly [4].                                                                                                                  nicate with the legacy wired infrastructure.
   The idea in [1] is to use diversity from one sender to multiple                                                        • The protocol should work in a low mobility environment
receiver. To achieve this, they modified two key elements: the                                                                first, as dealing with mobility will introduce new chal-
routing and the MAC protocol. The routing is modified so that                                                                 lenges.
there is not one single candidate for the next hop, but rather a                                                          There should be two phases: one is a route set-up phase. As
list of possible candidates: all the nodes that would forward the                                                      node have no or little information in their route tables, a basic
packet closer to the destination (in the network topology sense)                                                       AODV route request would be issued. However, the protocol
are included in the routing table.                                                                                     would diverge from AODV by trying not to find a single route to
   The MAC is adapted to allow for different receivers to re-                                                          the destination, but by trying to fill in some distance information
ceive the same packet: the list of intended receivers for the                                                          about the nodes up and down stream from the node.
IEEE MASS 2006                                                                                                                                3


                                                                              Because of the nature of the flooding, a node n might receive
                                                                           several copies of the route request. When n receives another
                                                                           copy of the RREQ from S to D by way of n , it compares the
                                                                           hop count h in the packet header with the different hop count
                                                                           values stored in its route table. If the hop counts in the header is
                                                                           less than or equal to the minimal value stored in the route table
                                                                           for n’s route to S, then n replaces its entry towards S in the
                                                                           route table with the new pair (n , hS ).
                                                                              One expects the value of the hop count in the duplicate pack-
                                                                           ets to increase with time, so that the route table will accept new
                                                                           entries for a short period of time, then will ignore the next route
                                                                           requests. A duplicate route request is not broadcast again.
                                                                              The RREQ establishes thus different paths back to the
                                                                           source. The destination D proceeds with the route request just
                                                                           as any other node, except obviously that it does not forward it
                                                                           further. D creates a route reply RREP, and sends it to all its
                                                                           neighboring nodes. The route reply is addressed to a broadcast
                                                                           address, with the actual destination S a parameter in the routing
                                                                           protocol header. The route reply also includes two values: one,
                                                                           hD increases at every hop, and is used to assess the number of
                                                                           hops to route a packet from the node which receives the RREP
                                                                           back to D. The other, hSD is the total number of hops from
                                                                           D to S, and is the lowest value of the hop count for the RREQ
                                                                           which reached D.
                                                                              When a node n receives a route reply, it takes the following
Fig. 2. Establishment (top) and Update (bottom) of the Route Entries for   steps (keep in mind that the RREP now goes from D back to
Opportunistic Routing Protocol
                                                                           S):
                                                                              • It checks if it has a route to D.
   The key insight is that, for 802.11 MAC, a transmitter will                • If it does not have a route to D, it creates one with the hop
request the channel at the exclusion of its neighbors. These                     count hD .
neighbors are forced to idle until transmission ends. By using                • It checks if it has a route to S.
broadcast –albeit mostly one-hop, local broadcast– for all trans-             • If it does not have a route to S, it drops the RREP.
missions, the OPRAH protocol keeps these neighbors involved                   • If it does have a route to S, it computes the following δ =
as potential relays.                                                             hD + hS − hSD . This is the difference from the path to
   The second phase is the forwarding phase per se. Using the                    the (so far) optimal route. If δ > γ, where γ is some pre-
list of potential relays, the packets get sent from the source to                defined threshold, the packet is dropped. This ensures that
the destination. The promiscuity of the air interface can be used                the routing protocol is free of infinite loops, as an infinite
in the second phase to refine the list of potential relays at each                loop would increase hD beyond the constant value hSD +
node, and to adapt to the mobility and to the dynamic environ-                   γ.
ment.                                                                         • If δ ≤ γ, then the node wait for a time proportional to δ,
                                                                                 say δτ .
B. Protocol Description                                                       • If during the waiting time, it receives another RREP from

   We now formally describe the protocol. The discovery of                       a node n with hD ≤ hD , then it drops the RREP.
relaying candidates is performed through backward learning,                   • Otherwise, it rebroadcasts the RREP to its neighbors.

as for instance in [5].                                                       • S may broadcast a packet reception message immediately
   A source S wishes to establish a connection to a destination                  using the RREP format with hS set to 0, to prevent multi-
D. It sends a broadcast message. The broadcast message is                        ple nodes to forward the RREP on the last hop.
flooded. The format of the broadcast is that of a route request                A node n which receives the route reply from node n updates
RREQ, similar to AODV [9]. Each node n which receives the                  its route table.
RREQ for the first time, does three things:                                    • it increases the hop count hD to D by one. hD ← hD + 1.
   • n increases by one the hop count hS in the packet header.                • it insert its minimal value hS for the number of hops to-
   • n forwards the updated packet to all its neighbors, by re-                  wards S in the header.
     broadcasting it.                                                         • it adds the pair (n , hD ) as an entry in the list of potential
   • n creates an entry for the route from n to S in its route                   forwarding node towards D.
     table. An entry for a given destination is a list of (forward-           When the packet (or potentially the multiple packets) arrive
     ing node; hop count to destination hS ) pair. n adds the              back at the source S, the routing has been established in both
     pair (node it received the packet from; packet header hop             directions. The connection can then starts, with the rule to for-
     count) as the forwarding node toward S.                               ward the packets similar as the rules for the RREP in both direc-
IEEE MASS 2006                                                                                                                                                                                                    4


                                                                                                                                                         Ratio of path lengths for OPRAH vs. AODV
tion. Each packet being sent reinforce and potentially updates                                                 1



the information in the route tables, as new nodes might be added                                              0.9



by overhearing the broadcasts and responding to the packet.                                                   0.8




                                                                      Path Length of OPRAH/Path Length AODV
                                                                                                              0.7
   All entries in the route table are kept for the time of the con-
                                                                                                              0.6
nection only. They should be set in the table with a default TTL
                                                                                                              0.5

value of the order of a few round trip times. There is no need                                                0.4

to keep the information longer in highly dynamic environment,                                                 0.3

and this ensures the scalability of the protocol.                                                             0.2


   Figure 2 describes a simple case to illustrate the protocol. A                                             0.1


node A wishes to establish a connection to a node B, with relays                                               0
                                                                                                                    0                            2   4   6         8        10         12        14   16   18    20
                                                                                                                                                                       Configuration
R1, R2, and R3 potentially available in between.
   The forwarding of packets after the connection is established      Fig. 3. Length of path in static network, correlated Rayleigh model
is done using the route tables as indicated on the figure. If some
transmissions failed the first time around, then the route table is
updated after the next successful transmission. For instance, in      picked uniformly. The speed is bounded below by a small min-
Figure 2, the RREP between R2 and A is dropped, prompting             imal value so that no node stays stuck in a low speed for ever.
R1 to send the RREP again. The next packet that R2 send to               OPRAH is relatively robust to node mobility. We plot on
A might go through, at which point A includes an entry to R2          figure 4 the path length achieved by the OPRAH protocol as a
towards B in its route table.                                         function of the mobility of the node. Node mobility was gen-
   The bottom of Figure 2 describes how the route entries are         erated in NS-2 using the Random Waypoint Model with pause
updated during a connection. This allows to deal with some            time set to zero, and the speed bounded below by 0.1 m/s. We
level of mobility, or to deal with slightly outdated routes, ie.      placed 20 nodes in a square area of 1,000x1,000. Irrespective of
routes that are still working but not optimal: a better route will    the node mobility, each packet is forwarded in about two hops.
insert itself in the route tables automatically.                                                                                                          Robustness of OPRAH to mobility
   The evaluation of the proposed protocol is presented in the                                                                         2.5


next section.
                                                                                                                Length of Oprah Path




                                                                                                                                        2

                 IV. P ROTOCOL E VALUATION
   We conducted the simulations in a 500x500 square area, and
                                                                                                                                       1.5
again trying to connect two nodes situated at opposite corners
of the square via N nodes uniformly distributed in the square.
We first picked N = 75 and looked at the performance of the                                                                              1
                                                                                                                                             5               10                             15              20
protocol using the GE model described in II.                                                                                                                      Mobility (Max Speed)

   In the static case, the AODV protocol converges on a route
that is stable throughout the simulation, as the nodes do not         Fig. 4. Path Choice as a function of speed
move. On the other hand, it converges towards a route that
is sub-optimal. In Figure ??, we plot the ratio of the path
length for each packet for OPRAH divided by the path length                                         R EFERENCES
for AODV for different realization.                                   [1] S. Biswas, R. Morris, Opportunistic Routing in Multi-Hop Wireless Net-
   OPRAH consistently finds a shorter path which is on aver-               works, Proceedings of the Second Workshop on Hot Topics in Networking
                                                                          (HotNets-II), Cambridge, Massachusetts, November 2003.
age 77% of the length of the AODV path. This is significant            [2] S. Biswas, R. Morris, ExOR: Opportunistic Multi-Hop Routing for Wire-
enough, especially since the network is static. Furthermore, the          less Networks, Proceedings of ACM Sigcomm 2005.
performance of AODV also involves repairing the route after           [3] T.M. Cover, A.A. El Gamal, Capacity Theorems for the Relay Channel
                                                                          IEEE Trans. Info. Theory, vol.25, pp.572-84, Sept. 1979.
it breaks, an extra overhead which occurs less frequently with        [4] D. De Couto, D. Aguayo,J. Bicket, R. Morris, A High-Throughput Path
OPRAH.                                                                    Metric for Multi-Hop Wireless Routing, Proceedings of the 9th ACM In-
                                                                          ternational Conference on Mobile Computing and Networking (MobiCom
   Figure 3 performs the same measurement using the corre-                ’03), San Diego, California, September 2003.
lated Rayleigh fading channel model instead of the GE channel         [5] S.-J. Lee, M. Gerla, AODV-BR: Backup Routing in Ad Hoc Networks in
model. We see similar gain, with a path length for OPRAH                  Proc. WCNC 2000.
                                                                      [6] K. Marina, S. Das On-demand Multipath Distance Vector Routing in Ad
routes about three quarters on average that of AODV.                      Hoc Networks, in Proceedings of IEEE ICNP, November 2001.
   To see the impact of the route repairs, we consider a dynamic      [7] B. Milner, A. James, An Analysis of Packet Loss Models for Distributed
network in which nodes move about. In this scenario, we con-              Speech Recognition in Proc. ICSLP 2004, October 2004.
                                                                      [8] A. Nosratinia, T. Hunter, A. Hedayat, Cooperative Communication in
sider a fixed connectivity radius, and the variation in connectiv-         Wireless Networks, IEEE Communications Magazine, Oct. 2004.
ity is only due to the movement of the nodes. In our simulation,      [9] C. Perkins, E. Royer, Ad hoc On-Demand Distance Vector Routing. Pro-
N = 50 and the connectivity radius is 250m. Our mobility                  ceedings of the 2nd IEEE Workshop on Mobile Computing Systems and
                                                                          Applications, New Orleans, LA, February 1999, pp. 90-100.
model is as follows: every node picks a speed and a direction.        [10] RoofNet project, http://www.pdos.lcs.mit.edu/roofnet/
When it hits the boundary, it picks another speed and direc-
tion so that it stays within the square. Speed and directions are

More Related Content

What's hot

NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacherySenthilvel S
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...IJASCSE
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksNemesio Jr. Macabale
 
Next generation-ptn-white-paper
Next generation-ptn-white-paperNext generation-ptn-white-paper
Next generation-ptn-white-paperslahiri00
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKcscpconf
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLIJCNCJournal
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...ijasuc
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...IOSR Journals
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithmsambitlick
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 

What's hot (19)

NS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velacheryNS2 Projects 2014 in HCL velachery
NS2 Projects 2014 in HCL velachery
 
23
2323
23
 
159 163
159 163159 163
159 163
 
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
Stable and Reliable Route Identification Scheme for Efficient DSR Route Cache...
 
Congestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh NetworksCongestion Free Routes for Wireless Mesh Networks
Congestion Free Routes for Wireless Mesh Networks
 
V25112115
V25112115V25112115
V25112115
 
Next generation-ptn-white-paper
Next generation-ptn-white-paperNext generation-ptn-white-paper
Next generation-ptn-white-paper
 
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORKBETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
BETTER SCALABLE ROUTING PROTOCOL FOR HYBRID WIRELESS MESH NETWORK
 
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOLDYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
DYNAMICALLY ADAPTABLE IMPROVED OLSR (DA-IOLSR) PROTOCOL
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
PERFORMANCE ANALYSIS OF BROADCASTING IN MOBILE AD HOC NETWORKS USING CLUSTER ...
 
B03406010
B03406010B03406010
B03406010
 
Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...Cross-layer based performance optimization for different mobility and traffic...
Cross-layer based performance optimization for different mobility and traffic...
 
A Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETsA Study of Routing Techniques in Intermittently Connected MANETs
A Study of Routing Techniques in Intermittently Connected MANETs
 
Hn analysis
Hn analysisHn analysis
Hn analysis
 
The blue active queue management algorithms
The blue active queue management algorithmsThe blue active queue management algorithms
The blue active queue management algorithms
 
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSEFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Ho2413421346
Ho2413421346Ho2413421346
Ho2413421346
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 

Viewers also liked

Anne-Marie Mai
Anne-Marie MaiAnne-Marie Mai
Anne-Marie MaiSbruun
 
Requisitos y oferta.compressed ilovepdf-compressed
Requisitos y oferta.compressed ilovepdf-compressedRequisitos y oferta.compressed ilovepdf-compressed
Requisitos y oferta.compressed ilovepdf-compressedAlcaldiaArboletes
 
WENWEN AND YANG'S ISS
WENWEN AND YANG'S ISSWENWEN AND YANG'S ISS
WENWEN AND YANG'S ISSliw937
 
Iben fonnesberg schmidt
Iben fonnesberg schmidtIben fonnesberg schmidt
Iben fonnesberg schmidtSbruun
 
Major studio first week assignment
Major studio first week assignmentMajor studio first week assignment
Major studio first week assignmentliw937
 
Fp7 kulturstyrelsen Melanie Büscher
Fp7 kulturstyrelsen Melanie BüscherFp7 kulturstyrelsen Melanie Büscher
Fp7 kulturstyrelsen Melanie BüscherSbruun
 
Power point activity 1
Power point activity 1Power point activity 1
Power point activity 1Shehyee
 

Viewers also liked (9)

Anne-Marie Mai
Anne-Marie MaiAnne-Marie Mai
Anne-Marie Mai
 
Requisitos y oferta.compressed ilovepdf-compressed
Requisitos y oferta.compressed ilovepdf-compressedRequisitos y oferta.compressed ilovepdf-compressed
Requisitos y oferta.compressed ilovepdf-compressed
 
WENWEN AND YANG'S ISS
WENWEN AND YANG'S ISSWENWEN AND YANG'S ISS
WENWEN AND YANG'S ISS
 
Iben fonnesberg schmidt
Iben fonnesberg schmidtIben fonnesberg schmidt
Iben fonnesberg schmidt
 
10.1.1.61.7321
10.1.1.61.732110.1.1.61.7321
10.1.1.61.7321
 
Major studio first week assignment
Major studio first week assignmentMajor studio first week assignment
Major studio first week assignment
 
Fp7 kulturstyrelsen Melanie Büscher
Fp7 kulturstyrelsen Melanie BüscherFp7 kulturstyrelsen Melanie Büscher
Fp7 kulturstyrelsen Melanie Büscher
 
Group 2 Economics,
Group 2 Economics,Group 2 Economics,
Group 2 Economics,
 
Power point activity 1
Power point activity 1Power point activity 1
Power point activity 1
 

Similar to 10.1.1.61.7321

A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer NetworkingRuchita Tomar
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...IDES Editor
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksPriyanka Gurnani
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...IJASCSE
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to 10.1.1.61.7321 (20)

O26087092
O26087092O26087092
O26087092
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
Hs2413641369
Hs2413641369Hs2413641369
Hs2413641369
 
47 50
47 5047 50
47 50
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
Ip2515381543
Ip2515381543Ip2515381543
Ip2515381543
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Some of the terms about Computer Networking
Some of the terms about Computer NetworkingSome of the terms about Computer Networking
Some of the terms about Computer Networking
 
Eb35725731
Eb35725731Eb35725731
Eb35725731
 
P15
P15P15
P15
 
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
A Cross-Layer Based Multipath Routing Protocol To Improve QoS In Mobile Adhoc...
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
 
Mobile adhoc networks
Mobile adhoc networksMobile adhoc networks
Mobile adhoc networks
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
OfdmaClosed-Form Rate Outage Probability for OFDMA Multi-Hop Broadband Wirele...
 
C0351725
C0351725C0351725
C0351725
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

10.1.1.61.7321

  • 1. IEEE MASS 2006 1 Opportunistic Routing in Dynamic Ad Hoc Networks: the OPRAH protocol C´ dric Westphal e I. I NTRODUCTION have the corresponding power capacity. These are the types of nodes that we are considering. To phrase it differently, we are HE promiscuous nature of the air interface has been typ- T ically considered a hindrance to transmit more than an opportunity. Overhearing the other participants’ traffic in the presenting a protocol which applies to some ad hoc and mesh networks but not necessarily to wireless sensor networks. Before we describe the protocol, we would like to introduce wireless communication network is assumed to be interference, some motivation for opportunistic protocols in general. an issue that should be remedied. Only recently has a different tack been taken, to use this fundamental broadcast characteris- II. M OTIVATION AND R ELATED W ORK tic of the air interface to the advantage of the communication network. We first consider a simple case: a square area. We wish to Ad hoc networks, where wireless nodes are within range of establish a connection between two nodes that sit at some diag- each other and use each other to relay messages seem an ob- onally opposite corners, which we denote s and d. The nodes vious place to attempt to leverage the broadcast nature of the are too far to connect directly, and need relays, which are uni- air interface. However, typical ad hoc routing protocols seem formly distributed in the square. The connectivity between each more interested in finding one good route for the whole life of node pair is affected by some fading. We will discuss the fading a connection than to make use of the diversity of paths avail- assumptions shortly. able at any instant. The promiscuous nature of the air interface Depending on the channel conditions, different paths may be might be used at the route establishment time, to for instance available to relay the packets between s and d. The task of a determine potential back-up paths, but is mostly ignored during routing protocol in such ad hoc network is to find a path which the transmission phase for current ad hoc routing protocols. will allow the establishment of a reliable connection between s We will present in this document a protocol which uses the and d. There are two broad types of routing protocols: reactive and promiscuity of the air interface to find a more optimal path for proactive. A proactive protocol will try to identify the connec- each packet in a dynamic network. Before going more into the tivity between the nodes ahead of time, and store the informa- details, we want to emphasize a few points. tion in a route table somewhere, such that a route is available First, while cross-layer design offers means to optimize and when needed. A reactive protocol attempts to identify the route enhance the protocol, we chose to focus on a strict layer sepa- only at the time of the connection establishment. ration, which allows us to re-use legacy physical and link lay- For now, we can consider static nodes, and look at the estab- ers. This is important for the application of the protocol in lishment of a single connection. In this set-up, both proactive real systems, as it is backward compatible up to the routing and reactive protocol behave the same way: they attempt to stack. While cross-layer design is valuable, we will see that the identify a route that will last the length of the connection. If the link layer information, such as received signal strength indica- route evolves during the time of the connection, both types of tor (RSSI) or channel quality indicator (CQI), will only give protocols have to handle this in some way. an idea of the best route at the time of the connection set-up In a static environment, where connectivity is perturbed only anyway, and not throughout the life of a connection. by fading between two fixed points, the performance of these Second, there is a trade-off to assess between reliability and protocols depends on how steady a route is. Experimental re- the number of transmissions. This take the form in our protocol sults by implementing and deploying an ad hoc networks have of potential duplicate packets. We believe this can be addressed shown that most protocols fare poorly. For instance, [4] shows at the application layer –or that our protocol could be refined to that existing ad hoc protocols do not perform well. handle duplicates– and that it is better to receive the packet in a We ran some NS-2 simulations, using the Propaga- timely manner at the cost of a few superfluous duplicates, than tion/Shadowing module with typical outdoors parameters (with to not receive the packet at all. a path loss exponent β = 2 and a standard deviation σdB = 5) Third, opportunistic protocols in general should not be ap- and the default 802.11 link layer model. We placed 20 nodes plied to very power-scarce environments, as listening to the in a square area with a varying size ranging from 500x500, to other nodes’ transmissions, even if only at the MAC layer, has 2,000x2,000. Again, we added a source s and a destination d in a cost in battery life. On the other hand, an 802.11 card for opposite corners and computed the length of the shortest path instance will listen to the transmissions on its channel and will to cross the square diagonally. C. Westphal is with the Networking Laboratory, Nokia Research Center, We see on Figure 1 that there is a dramatic variation of the Mountain View, California. E-mail: cedric.westphal@nokia.com shortest path between s and d. We see that the shortest path is
  • 2. IEEE MASS 2006 2 5 Length of Shortest Path for Different Node Densities next hop is included in the MAC header. The intended re- 500x500 1000x1000 ceivers acknowledge in turn, so that the sender knows that at 4.5 2000x2000 least one receiver has received the packet successfully. All re- Number of Hops for the Shortest Path 4 ceivers are also assumed to overhear the acknowledgement to 3.5 decide whether or not to forward their copy of the packet. 3 As we are interested in modifying only the routing layer, we 2.5 cannot use the MAC of [1].Further, [1] is built upon a static network, so defining the set of potential candidates to forward 2 a packet is relatively easy, but it becomes problematic in a dy- 1.5 naminc environment. We will define a protocol which copes 1 0 10 20 30 40 50 60 with the changing environment and the mobility of the nodes, Time (1 unit = 1 packet interarrival) and is built on the use of standardized MAC, for instance IEEE 802.11. Fig. 1. Shortest Path in Number of Hops as a function of time III. T HE OPRAH PROTOCOL subject to some significant variations, even though we are con- sidering a static network. Most current ad hoc protocols settle Using the lessons we derived from the literature review, we on a single route, the shortest path at the time of establishment are now able to define some guiding principles for the investi- for a reactive protocol, or the shortest path at the time of compi- gation of opportunistic routing in ad hoc networks. lation of the route table, for a proactive one. Both prove harmful to the performance of the system: either the protocol settles for A. Framework and Requirements a shortest path that is not sustainable, or it settles for a path that is under-performing every time there exists a shorter path. We consider an ad-hoc network composed of IP enabled The benefit from opportunistic routing has not been fully modes. We consider that each node listen to the same channel tapped yet in the context of ad hoc networks. Opportunistic for reception and transmission. This assumption is motivated scheduling has been extensively used in one-to-many transmis- by the use of an 802.11 MAC layer with single radio nodes. sions, mostly in scheduling nodes with respect to the conditions This simplification is welcome to allow nodes to talk to each of the channel which connects them to a base station. other while in a dynamic environment: nodes do not have to Cooperative strategies have been used in information theory, agree on a dedicated channel for communication. starting from Cover and El Gamal seminal paper [3] on the re- Each node relays traffic for the other nodes. We assume that lay channel, and subsequent work in this community (see for all participants in the network perform their relaying duties. We instance [?], or the earlier survey in [8]). specifically assume that nodes have no knowledge of their rela- In the ad hoc context, there are relevant works to consider tive geographical positions. which take advantage of the diversity offered by multiple users Our goal is to define a routing protocol, and the associated over the air interface. Leveraging the promiscuous nature of the MAC protocol such that: air interface to define multiple paths in ad hoc network has been • All nodes that could forward the packet to the destination studied, for instance in [5] or [6]. [5] uses the fact that an AODV and are located ”closer” than the sender should compete to route request and reply is overheard by multiple nodes to build forward the packet. back-up routes in case the principal route fails. [6] computes • The notion of ”closer” should be defined without the assis- multiple disjoint path to achieve the same purpose. As we will tance of external measurement or probes (as is conducted see below, the route set-up in OPRAH is very similar to these, in [2] for instance) but only with local information. the main difference being the use that OPRAH makes of the • The protocol should scale. As such, this prohibits the availability of multiple paths or relays during the connection. use of lists to replace or enhance routing tables. Reactive The most relevant work on our topic is [1]. This work by AODV-like mechanisms should be preferred. Biswas and Morris, from MIT, came out of a practical problem: • The protocol should be implementable using relatively the RoofNet project [10] was first deployed using traditional simple off-the-shelf components. and standardized MAC layers and network and routing proto- • The protocol should be able to inter-operate with wired cols. However, these protocols turned out to perform somewhat protocols, to ensure that the ad hoc network can commu- poorly [4]. nicate with the legacy wired infrastructure. The idea in [1] is to use diversity from one sender to multiple • The protocol should work in a low mobility environment receiver. To achieve this, they modified two key elements: the first, as dealing with mobility will introduce new chal- routing and the MAC protocol. The routing is modified so that lenges. there is not one single candidate for the next hop, but rather a There should be two phases: one is a route set-up phase. As list of possible candidates: all the nodes that would forward the node have no or little information in their route tables, a basic packet closer to the destination (in the network topology sense) AODV route request would be issued. However, the protocol are included in the routing table. would diverge from AODV by trying not to find a single route to The MAC is adapted to allow for different receivers to re- the destination, but by trying to fill in some distance information ceive the same packet: the list of intended receivers for the about the nodes up and down stream from the node.
  • 3. IEEE MASS 2006 3 Because of the nature of the flooding, a node n might receive several copies of the route request. When n receives another copy of the RREQ from S to D by way of n , it compares the hop count h in the packet header with the different hop count values stored in its route table. If the hop counts in the header is less than or equal to the minimal value stored in the route table for n’s route to S, then n replaces its entry towards S in the route table with the new pair (n , hS ). One expects the value of the hop count in the duplicate pack- ets to increase with time, so that the route table will accept new entries for a short period of time, then will ignore the next route requests. A duplicate route request is not broadcast again. The RREQ establishes thus different paths back to the source. The destination D proceeds with the route request just as any other node, except obviously that it does not forward it further. D creates a route reply RREP, and sends it to all its neighboring nodes. The route reply is addressed to a broadcast address, with the actual destination S a parameter in the routing protocol header. The route reply also includes two values: one, hD increases at every hop, and is used to assess the number of hops to route a packet from the node which receives the RREP back to D. The other, hSD is the total number of hops from D to S, and is the lowest value of the hop count for the RREQ which reached D. When a node n receives a route reply, it takes the following Fig. 2. Establishment (top) and Update (bottom) of the Route Entries for steps (keep in mind that the RREP now goes from D back to Opportunistic Routing Protocol S): • It checks if it has a route to D. The key insight is that, for 802.11 MAC, a transmitter will • If it does not have a route to D, it creates one with the hop request the channel at the exclusion of its neighbors. These count hD . neighbors are forced to idle until transmission ends. By using • It checks if it has a route to S. broadcast –albeit mostly one-hop, local broadcast– for all trans- • If it does not have a route to S, it drops the RREP. missions, the OPRAH protocol keeps these neighbors involved • If it does have a route to S, it computes the following δ = as potential relays. hD + hS − hSD . This is the difference from the path to The second phase is the forwarding phase per se. Using the the (so far) optimal route. If δ > γ, where γ is some pre- list of potential relays, the packets get sent from the source to defined threshold, the packet is dropped. This ensures that the destination. The promiscuity of the air interface can be used the routing protocol is free of infinite loops, as an infinite in the second phase to refine the list of potential relays at each loop would increase hD beyond the constant value hSD + node, and to adapt to the mobility and to the dynamic environ- γ. ment. • If δ ≤ γ, then the node wait for a time proportional to δ, say δτ . B. Protocol Description • If during the waiting time, it receives another RREP from We now formally describe the protocol. The discovery of a node n with hD ≤ hD , then it drops the RREP. relaying candidates is performed through backward learning, • Otherwise, it rebroadcasts the RREP to its neighbors. as for instance in [5]. • S may broadcast a packet reception message immediately A source S wishes to establish a connection to a destination using the RREP format with hS set to 0, to prevent multi- D. It sends a broadcast message. The broadcast message is ple nodes to forward the RREP on the last hop. flooded. The format of the broadcast is that of a route request A node n which receives the route reply from node n updates RREQ, similar to AODV [9]. Each node n which receives the its route table. RREQ for the first time, does three things: • it increases the hop count hD to D by one. hD ← hD + 1. • n increases by one the hop count hS in the packet header. • it insert its minimal value hS for the number of hops to- • n forwards the updated packet to all its neighbors, by re- wards S in the header. broadcasting it. • it adds the pair (n , hD ) as an entry in the list of potential • n creates an entry for the route from n to S in its route forwarding node towards D. table. An entry for a given destination is a list of (forward- When the packet (or potentially the multiple packets) arrive ing node; hop count to destination hS ) pair. n adds the back at the source S, the routing has been established in both pair (node it received the packet from; packet header hop directions. The connection can then starts, with the rule to for- count) as the forwarding node toward S. ward the packets similar as the rules for the RREP in both direc-
  • 4. IEEE MASS 2006 4 Ratio of path lengths for OPRAH vs. AODV tion. Each packet being sent reinforce and potentially updates 1 the information in the route tables, as new nodes might be added 0.9 by overhearing the broadcasts and responding to the packet. 0.8 Path Length of OPRAH/Path Length AODV 0.7 All entries in the route table are kept for the time of the con- 0.6 nection only. They should be set in the table with a default TTL 0.5 value of the order of a few round trip times. There is no need 0.4 to keep the information longer in highly dynamic environment, 0.3 and this ensures the scalability of the protocol. 0.2 Figure 2 describes a simple case to illustrate the protocol. A 0.1 node A wishes to establish a connection to a node B, with relays 0 0 2 4 6 8 10 12 14 16 18 20 Configuration R1, R2, and R3 potentially available in between. The forwarding of packets after the connection is established Fig. 3. Length of path in static network, correlated Rayleigh model is done using the route tables as indicated on the figure. If some transmissions failed the first time around, then the route table is updated after the next successful transmission. For instance, in picked uniformly. The speed is bounded below by a small min- Figure 2, the RREP between R2 and A is dropped, prompting imal value so that no node stays stuck in a low speed for ever. R1 to send the RREP again. The next packet that R2 send to OPRAH is relatively robust to node mobility. We plot on A might go through, at which point A includes an entry to R2 figure 4 the path length achieved by the OPRAH protocol as a towards B in its route table. function of the mobility of the node. Node mobility was gen- The bottom of Figure 2 describes how the route entries are erated in NS-2 using the Random Waypoint Model with pause updated during a connection. This allows to deal with some time set to zero, and the speed bounded below by 0.1 m/s. We level of mobility, or to deal with slightly outdated routes, ie. placed 20 nodes in a square area of 1,000x1,000. Irrespective of routes that are still working but not optimal: a better route will the node mobility, each packet is forwarded in about two hops. insert itself in the route tables automatically. Robustness of OPRAH to mobility The evaluation of the proposed protocol is presented in the 2.5 next section. Length of Oprah Path 2 IV. P ROTOCOL E VALUATION We conducted the simulations in a 500x500 square area, and 1.5 again trying to connect two nodes situated at opposite corners of the square via N nodes uniformly distributed in the square. We first picked N = 75 and looked at the performance of the 1 5 10 15 20 protocol using the GE model described in II. Mobility (Max Speed) In the static case, the AODV protocol converges on a route that is stable throughout the simulation, as the nodes do not Fig. 4. Path Choice as a function of speed move. On the other hand, it converges towards a route that is sub-optimal. In Figure ??, we plot the ratio of the path length for each packet for OPRAH divided by the path length R EFERENCES for AODV for different realization. [1] S. Biswas, R. Morris, Opportunistic Routing in Multi-Hop Wireless Net- OPRAH consistently finds a shorter path which is on aver- works, Proceedings of the Second Workshop on Hot Topics in Networking (HotNets-II), Cambridge, Massachusetts, November 2003. age 77% of the length of the AODV path. This is significant [2] S. Biswas, R. Morris, ExOR: Opportunistic Multi-Hop Routing for Wire- enough, especially since the network is static. Furthermore, the less Networks, Proceedings of ACM Sigcomm 2005. performance of AODV also involves repairing the route after [3] T.M. Cover, A.A. El Gamal, Capacity Theorems for the Relay Channel IEEE Trans. Info. Theory, vol.25, pp.572-84, Sept. 1979. it breaks, an extra overhead which occurs less frequently with [4] D. De Couto, D. Aguayo,J. Bicket, R. Morris, A High-Throughput Path OPRAH. Metric for Multi-Hop Wireless Routing, Proceedings of the 9th ACM In- ternational Conference on Mobile Computing and Networking (MobiCom Figure 3 performs the same measurement using the corre- ’03), San Diego, California, September 2003. lated Rayleigh fading channel model instead of the GE channel [5] S.-J. Lee, M. Gerla, AODV-BR: Backup Routing in Ad Hoc Networks in model. We see similar gain, with a path length for OPRAH Proc. WCNC 2000. [6] K. Marina, S. Das On-demand Multipath Distance Vector Routing in Ad routes about three quarters on average that of AODV. Hoc Networks, in Proceedings of IEEE ICNP, November 2001. To see the impact of the route repairs, we consider a dynamic [7] B. Milner, A. James, An Analysis of Packet Loss Models for Distributed network in which nodes move about. In this scenario, we con- Speech Recognition in Proc. ICSLP 2004, October 2004. [8] A. Nosratinia, T. Hunter, A. Hedayat, Cooperative Communication in sider a fixed connectivity radius, and the variation in connectiv- Wireless Networks, IEEE Communications Magazine, Oct. 2004. ity is only due to the movement of the nodes. In our simulation, [9] C. Perkins, E. Royer, Ad hoc On-Demand Distance Vector Routing. Pro- N = 50 and the connectivity radius is 250m. Our mobility ceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100. model is as follows: every node picks a speed and a direction. [10] RoofNet project, http://www.pdos.lcs.mit.edu/roofnet/ When it hits the boundary, it picks another speed and direc- tion so that it stays within the square. Speed and directions are