Location Awareness in Ad Hoc Wireless Mobile Neworksirchen/6204/paper/TSE01-slide.pdf(AODV): – An...

26
1 11/14/2001 Mobile Computing, Fall 2001 1 Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 2 PART I PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS

Transcript of Location Awareness in Ad Hoc Wireless Mobile Neworksirchen/6204/paper/TSE01-slide.pdf(AODV): – An...

  • 1

    11/14/2001 Mobile Computing, Fall 2001 1

    Location Awareness

    in Ad Hoc Wireless

    Mobile Neworks

    Lijuan Ai

    Wenyu Wang

    Yi Zhou

    11/14/2001 Mobile Computing, Fall 2001 2

    PART IPART I

    INTRODUCTION TO MANET

    &

    LOCATION-AWARE COMPONENTS

  • 2

    11/14/2001 Mobile Computing, Fall 2001 3

    Mobile Ad Hoc NetworkMobile Ad Hoc Network(MANET)(MANET)

    • A mobile ad hoc network that consists of a set of mobile hosts that roam at will and communicate with one another.

    • Different from traditional wireless networks– Dynamic changing topology.– No base-station support, no fixed routers.– Multihop communication capability.

    11/14/2001 Mobile Computing, Fall 2001 4

    Figure 1. Typical MANET, a mobile ad hoc network consisting of a set of mobile hosts that roam at will and communicate with one another.

  • 3

    11/14/2001 Mobile Computing, Fall 2001 5

    MANETMANET

    • A mobile host has to work as a router and cooperate with other hosts to find routes and relay messages.

    • Example applications of MANET are emergency search-and-rescue operations, meetings or conventions where users need to deploy networks immediately, without base stations or fixed network infrastructure

    11/14/2001 Mobile Computing, Fall 2001 6

    Current research on MANET:Current research on MANET:

    • Unicast.

    • Collective communications.

    • Quality-of-service routing.

  • 4

    11/14/2001 Mobile Computing, Fall 2001 7

    UnicastUnicast

    • MANET finds a routing path from a source to destination host.

    • Such protocols must deal with typical limitations of MANET, e.g.:– High power consumption.– Low bandwidth.– High error rates.

    11/14/2001 Mobile Computing, Fall 2001 8

    Routing ProtocolsRouting Protocols

    • Proactive: constantly updates the routing table at each node to maintain a nearly global view on the network topology.

    • Reactive: makes on-demand searches for a path, which can be less costly when host mobility is high.

  • 5

    11/14/2001 Mobile Computing, Fall 2001 9

    Proactive Routing ProtocolProactive Routing Protocol

    • Destination-Sequenced Distance Vector (DSDV):– Every host maintains a routing table. – Each entry is marked with a sequence number

    which enables hosts to find the freshest route.– Routing table updates are periodically transmitted

    throughout the network.– Reacts slowly to mobility in large networks.

    11/14/2001 Mobile Computing, Fall 2001 10

    Reactive Routing ProtocolReactive Routing Protocol

    • Ad Hoc On-Demand Distance Vector (AODV):– An improvement on the DSDV algorithm.– A source host initiates a path discovery process to

    locate the destination if it doesn’t have a valid route to that destination.

  • 6

    11/14/2001 Mobile Computing, Fall 2001 11

    Reactive Routing ProtocolReactive Routing Protocol

    • Dynamic Source Routing (DSR):– Route discovery similar to AODV.– Routes maintained in route cache.– Each packet carry full routing information.– Overhead is potentially larger than AODV because

    AODV packet only contains the destination address and sequence number.

    11/14/2001 Mobile Computing, Fall 2001 12

    Reactive Routing ProtocolReactive Routing Protocol

    • Zone Routing Protocol (ZRP):– A hybrid reactive/proactive protocol.– Each host proactively maintains the topological

    information within its local neighborhood (routing zone).

    – Reactively requires routes to destination beyond the routing zone.

  • 7

    11/14/2001 Mobile Computing, Fall 2001 13

    Collective CommunicationCollective Communication

    • More than one destination, e.g. multicast.– Flooding-based protocol: distributes the multicast

    message all around the network.– Tree-based protocol: establishes a multicast tree

    among the multicast members that comprises a wireless network.

    – The task of keeping the tree structure up-to-date is nontrivial!

    11/14/2001 Mobile Computing, Fall 2001 14

    QualityQuality--ofof--Service RoutingService Routing

    • Supports real-time applications such as audio and video communications.– The protocol must establish a route that satisfies

    certain QoS constrains such as delays and bandwidth.

    – A ticket-based approach avoids unwise blind flooding by using tickets to limit the number of route-searching packets.

  • 8

    11/14/2001 Mobile Computing, Fall 2001 15

    Location AwarenessLocation Awareness

    • Each mobile host uses a positioning device to determine its current physical location.

    • The geometric relationship among mobile hosts can be accurately described with the knowledge of their location information.

    11/14/2001 Mobile Computing, Fall 2001 16

    LocationLocation--Aware ComponentsAware Components

    • A Location-aware device uses an attached receiver to catch outside signal analyze and determine the current location.

    • Outdoor positioning.– GPS.

    • Indoor positioning.– Infrared sensors.– Short-range radios.

  • 9

    11/14/2001 Mobile Computing, Fall 2001 17

    Global Positioning System (GPS):Global Positioning System (GPS):

    • 24 satellites in six orbital planes operating in circular, 10,900-nautical-mile orbits at an inclination angle of 55 degrees in a 12-hour period.

    • Satellites transmit navigation messages that contain their orbital elements, clocks, and statues which a receiver uses to determine its position and roaming velocity.

    11/14/2001 Mobile Computing, Fall 2001 18

    GPSGPS

    • 3 satellites are required to determine the receiver’s longitude and latitude. Adding a 4th can determine the receiver’s altitude.

    • Positioning accuracy in the 15-meter range.

    • Drawback: satellite signals can be blocked.

  • 10

    11/14/2001 Mobile Computing, Fall 2001 19

    Infrared SensorsInfrared Sensors

    • Infrared transmitters automatically sending their own Ids can be hang from various places on a building.

    • A computing device with an infrared receiver uses these signals to determine its current position.

    • Low cost and low power consumption.

    11/14/2001 Mobile Computing, Fall 2001 20

    ShortShort--Range RadiosRange Radios

    • Infrared signals are directional and can easily be blocked by intervening objects.

    • Radio transmission is omnidirectional.

  • 11

    11/14/2001 Mobile Computing, Fall 2001 21

    PART IIPART II

    LOCATION-AWARE ROUTING

    PROTOCOLS

    11/14/2001 Mobile Computing, Fall 2001 22

    • Purpose of a routing protocol

    – Source Node ---------------------> Destination Node

    • Difficulties– dynamically changing topology– scarce wireless bandwidth– tradeoff between routing and location information

    availability

    LocationLocation--Aware Routing ProtocolsAware Routing Protocols

    Shortest Path

  • 12

    11/14/2001 Mobile Computing, Fall 2001 23

    • Approach in developing routing protocols– Use extra location information provided by MHs

    • Several routing-issue Optimizations– Location-aided routing (LAR)– Geographic distance routing (Gedir)– Grid– Zone-based two level routing

    LocationLocation--Aware Routing ProtocolsAware Routing Protocols

    11/14/2001 Mobile Computing, Fall 2001 24

    • Requesting a route in DSR, ZRP, AODV– Initiate a route request packet

    •waste a lot of bandwidth

    •can initiate a broadcast storm

    • Requesting a route in LAR– Use selective flooding

    LocationLocation--Aided Routing (LAR)Aided Routing (LAR)

  • 13

    11/14/2001 Mobile Computing, Fall 2001 25

    • Requiring a route from source S to destination D

    – System defines a smaller forwarding zone that covers both S and D

    – Forwarding zone seeks the smallest rectangle that can bound S’s current location and D’s possible location

    – Carefully choosing the forwarding zone saves bandwidth.

    LocationLocation--Aided Routing (LAR)Aided Routing (LAR)

    11/14/2001 Mobile Computing, Fall 2001 26

    LocationLocation--Aided Routing (LAR)Aided Routing (LAR)

    Figure 2. Forwarding zone optimizations confine the route-searching area:(a) rectangle, (b) bar W, © fan, and (d) dual fan

  • 14

    11/14/2001 Mobile Computing, Fall 2001 27

    • Work in a connectionless mode

    • Send data packets directly without establishing

    path a priori

    Geographic Distance Routing (Gedir)Geographic Distance Routing (Gedir)

    11/14/2001 Mobile Computing, Fall 2001 28

    • Several approaches– X always picks as Y, the next host, the receiver that

    has the smallest angle from X to Y and to thedestination

    – X always picks as Y, the receiver closest to the destination

    • Both approaches can lead to endless loop

    • Second approach may create detour

    Geographic Distance Routing (Gedir)Geographic Distance Routing (Gedir)

  • 15

    11/14/2001 Mobile Computing, Fall 2001 29

    Geographic Distance Routing (Gedir)Geographic Distance Routing (Gedir)First ApproachFirst Approach

    11/14/2001 Mobile Computing, Fall 2001 30

    Geographic Distance Routing (Gedir)Geographic Distance Routing (Gedir)Second ApproachSecond Approach

  • 16

    11/14/2001 Mobile Computing, Fall 2001 31

    • Concept of Grid– Partitioning the geographic area into several squares– There is at most one MH selected as the grid’s leader– Grid leaders is responsible for performing routing

    • Fully location-aware

    • Scalability

    GridGrid

    11/14/2001 Mobile Computing, Fall 2001 32

    • Route discovery– Eliminate redundant route request packets– This filtering mechanism suitable for a crowded

    environment

    • Packet relay– Grid ID represents a route, not a host ID– Each entry in routing table records the next grid that

    will lead to the destination– Stronger, more resilient route maintenance

    GridGrid

  • 17

    11/14/2001 Mobile Computing, Fall 2001 33

    • Route maintenance– Highly resilient to host mobility

    – In other protocols, when an intermediate host in a

    route roams outside its neighbor’s range, the route

    breaks

    – Leader election protocol

    – Routing table handoff via broadcast

    GridGrid

    11/14/2001 Mobile Computing, Fall 2001 34

    GridGrid

  • 18

    11/14/2001 Mobile Computing, Fall 2001 35

    • Concept of two-level– Peer - to - peer but hierarchical– Geographic area is divided into zones– Each MH knows its current position and thus zone ID– Distributes link states throughout network

    • Intrazone and interzone– Propagation of any change in connectivity inside a

    zone is limited to within zone itself

    ZoneZone--based twobased two--level routinglevel routing

    11/14/2001 Mobile Computing, Fall 2001 36

    ZoneZone--based twobased two--level routinglevel routing

  • 19

    11/14/2001 Mobile Computing, Fall 2001 37

    • Gateway– MH connects to one or more hosts in other zones– Local changes causes global flooding only if it changes interzone connectivity

    • Routing– Use information exchange and routing tables– Search for a route

    ZoneZone--based twobased two--level routinglevel routing

    11/14/2001 Mobile Computing, Fall 2001 38

    • Three issues for a manet routing protocol– Route discovery– Packet relay– Route maintenance

    • Categories– Non-location aware– Partially location aware– Fully location aware

    Protocol ComparisonProtocol Comparison

  • 20

    11/14/2001 Mobile Computing, Fall 2001 39

    Protocol ComparisonProtocol Comparison

    11/14/2001 Mobile Computing, Fall 2001 40

    PART IIIPART III

    LOCATION-AWARE SERVICES

    & CONCLUSION

  • 21

    11/14/2001 Mobile Computing, Fall 2001 41

    •Navigation/ Position identification

    •Geographic messaging/ advertising

    •Neighbor-and-service discovery

    LocationLocation--Aware ServicesAware Services

    11/14/2001 Mobile Computing, Fall 2001 42

    LocationLocation--Aware ServicesAware Services

    LAR unicast

    Geocast

    Grid

    Geogrid

    TORA

    Geotora

    Protocolsto provide geographic services

  • 22

    11/14/2001 Mobile Computing, Fall 2001 43

    GeocastGeocast

    •Differs from traditional multicast– multicast group vs. geographic region

    •Uses two approaches– Forwarding Zone– Distance to the center of geocast region

    11/14/2001 Mobile Computing, Fall 2001 44

    GeogridGeogrid

    •Differs from traditional multicast– multicast group vs. geographic region

    •Uses two approaches– Forwarding Zone– Distance to the center of geocast region

  • 23

    11/14/2001 Mobile Computing, Fall 2001 45

    GeotoraGeotora

    •Derives from TORA

    •Uses modified DAG created in TORA

    •Requires two-phase geocasting– inside/outside geocast region

    11/14/2001 Mobile Computing, Fall 2001 46

    DAG and TORADAG and TORA

    •Directed Acyclic Graph– graph/directed link/height/sink

    •Temporally Ordered Routing Algorithm– creates a route by using DAG

  • 24

    11/14/2001 Mobile Computing, Fall 2001 47

    Two Two DAGsDAGs

    11/14/2001 Mobile Computing, Fall 2001 48

    GeotoraGeotora

    •Derives from TORA

    •Uses modified DAG created in TORA

    •Requires two-phase geocasting– inside/outside geocast region

  • 25

    11/14/2001 Mobile Computing, Fall 2001 49

    Geogrid vs. GeotoraGeogrid vs. Geotora

    •Geogrid– connectionless– forwarding zone plus grid leader prohibition

    •Geotora– connection oriented– costly if mobility is high– worthwhile if sending large amount of data

    11/14/2001 Mobile Computing, Fall 2001 50

    LocationLocation--aware Tour Guideaware Tour Guide

    •GPS receiver connected to a laptop

    •Software part implemented by Java– 2D map– 3D virtual world– Web page information– Interact with other guide users

  • 26

    11/14/2001 Mobile Computing, Fall 2001 51

    Interface of the tourInterface of the tour--guide systemguide system

    11/14/2001 Mobile Computing, Fall 2001 52

    ConclusionConclusion

    •Location information– is natural and inevitable to be exploited

    •Challenges– positioning accuracy– mapping location to web data