On-demand Multipath Distance Vector Routing in Ad Hoc Networks Mahesh K. Marina Samir R. Das Dept. of ECECS University of Cincinnati Cincinnati, OH 45221

Abstract On-demand routing protocols for ad hoc networks discover and maintain only the needed routes to reduce routing overheads. They use a flood-based route discovery mechanism to find routes when required. Since each route discovery incurs high overhead and latency, the frequency of route discoveries must be kept low for on-demand protocols to be effective. On-demand multipath protocols achieve this objective by computing multiple paths in a single route discovery. In this paper, we present AOMDV, an on-demand multipath distance vector protocol, in the framework of a well-known single path protocol (AODV) of similar nature. AOMDV computes multiple loop-free link disjoint paths during route discovery. We introduce the notion of an advertised hopcount to establish loop free multiple paths. We compare the performance of AOMDV with AODV using extensive simulation experiments based on ns2. Simulation results show that AOMDV is able to reduce the frequency of route discoveries by as much as 30% and also achieve a remarkable reduction in the end-to-end delay — often more than a factor of two.

1 Introduction An ad hoc network is a mobile, multihop wireless network with no stationary infrastructure. The autonomous and self-configuring nature of ad hoc networks provide several advantages such as fast and easy deployment, little or no reliance on a pre-existing infrastructure and cost-effectiveness. Until recently, ad hoc networks found application mainly in the military and emergency management. But with the advent of low cost, low power, short range radio technologies such as Bluetooth [11], ad hoc networking has potential applications in many personal and local area networking scenarios. A significant amount of current research has been directed to designing efficient dynamic routing protocols for ad hoc networks. The challenge here is to reduce routing overheads in spite of the changing topology. This is a critical issue as both link bandwidth and battery power are premium resources. Several new protocols focused on the issue of overhead reduction without compromising on application-visible performance metrics. Notable among them are a class of protocols called “on-demand” protocols, e.g., Dynamic Source Routing (DSR) [18], Ad hoc On-demand Distance Vector (AODV) [30], Temporally Ordered Routing Algorithm (TORA) [27]. Unlike, more traditional “proactive” protocols such as link-state or distance vector — that run on the Internet, on-demand protocols attempt to reduce the routing overhead by maintaining routes only between nodes that take part in data communication. Specifically, whenever a traffic source needs a route to a destination, the protocol initiates a route discovery process. Route discovery typically involves a network-wide flood of a route request and waiting for a route reply. Prior performance studies [3, 8, 17] have shown that on-demand protocols have better overhead savings in comparison with their proactive counterparts.

1

However, on-demand approach is not without problems. Since routes are computed only on-demand, route discovery latency can add to the end-to-end delay, unless a previously computed “cached” route is available. Buffering of data packets during the route discovery process can also contribute to packet losses due to buffer overflow. With single path routing, this problem becomes severe as the network becomes more dynamic. Frequency of route discoveries increases with increase in the rate of link failures. Also, since each route discovery incurs substantial packet overhead, its frequency impacts performance. The frequency can be controlled by computing multiple paths with a single route discovery. This will improve the overall performance. Two of the on-demand protocols, DSR [18] and TORA [27] have built-in capability to compute multiple paths. But each of them suffers from a different set of performance problems. DSR uses source routing, by virtue of which it can detect loops easily and can gather a lot of routing information per route discovery. However, aggresive use of route caching, lack of effective mechanisms to purge stale routes and cache pollution leads to problems such as stale caches and reply storms. These problems not just limit the performance benefits of caching multiple paths, they can even hurt performance in many cases [15, 32]. These problems are, however, being, addressed [16, 20]. TORA [18], on the other hand, builds multiple loop free paths without use of source routing and uses an interesting idea called link reversals [13] to recover from link failures. Performance studies have shown that TORA suffers from high overheads of maintaining multiple paths [3]. Our goal in this paper is to develop an on-demand multipath protocol that provides the advantages of multiple paths without suffering from any additional overhead. We present an on-demand multipath distance vector protocol in the framework of AODV [30, 31]. AODV has demonstrated competitive or superior performance relative to DSR in recent performance studies [17, 32], particularly in large networks. We refer to the resulting protocol as Ad hoc On-demand Multipath Distance Vector (AOMDV). Primary objective behind the design of AOMDV is to provide efficient fault tolerance in the sense of faster and efficient recovery from route failures. The key feature of the proposed protocol is the on-demand computation of multiple loop free link-disjoint paths. The rest of the paper is organized as follows. An overview of the AODV protocol is presented in the next section. In section 3, the AOMDV protocol is described in detail and its loop freedom property is proved. Performance of AOMDV is compared against AODV in section 4. Related work is reviewed in section 5. Conclusions are future work are presented in section 6.

2 Ad Hoc On-Demand Distance Vector Routing AODV combines the use of destination sequence numbers as in DSDV [29] with the on-demand route discovery technique in DSR [18] to formulate a loop-free, on-demand, single path, distance vector protocol. In contrast to DSR, AODV uses hop-by-hop routing instead of source routing. Below we review some of the key features of AODV to provide sufficient background for AOMDV described in the next section.

2.1 Route Discovery When a traffic source needs a route to a destination, it initiates a route discovery process. Route discovery typically involves a network-wide flood of a route request (RREQ) for the destination and waiting for a route reply (RREP). Duplicate copies of a RREQ at every intermediate node are discarded. Source attaches a strictly increasing broadcast id with each RREQ it generates. Source id along with the broadcast id of the RREQ are used to detect duplicates. An intermediate node receiving a non-duplicate RREQ first sets up a reverse path to the source using the previous hop of the RREQ as the next hop on the reverse path. If a valid route is available, then the intermediate node generates a RREP, else the RREQ is rebroadcast. When the

2

if

    or     and        then    ;         ;      ;

(1)

(2) (3) (4)

endif Figure 1: AODV route update rule. This is used whenever a node  receives a route update to a destination  from a neighbor  . The variables  ,    and    represent the destination sequence number, hopcount and the nexthop, respectively, for a destination  at node . destination receives a non-duplicate RREQ for itself, it generates a RREP. The RREP is routed back to the source via the reverse path. As the RREP proceeds towards the source, a forward path to the destination is established. Note that the route discovery procedure just described requires that a bidirectional path exists between the source and the destination. Latest AODV specification [31] describes a technique to find at least one such bidirectional path in the presence of unidirectional links. In the rest of our discussions, we will assume that there are no unidirectional links and that bidirectional paths exist between every pair of nodes. Also, several optimizations have been proposed in the literature to contain the scope of the flood [5] and to reduce the redundancy of the broadcasts during the flood [25]. However, these are somewhat orthogonal to our interest, and we will limit our discussion to pure flooding in this paper.

2.2 Sequence Numbers and Loop Freedom Sequence numbers in AODV play a key role in ensuring loop freedom. Every node maintains a monotonically increasing sequence number for itself. It also maintains the highest known sequence numbers for each destination in the routing table (called “destination sequence numbers”). Destination sequence numbers are tagged on all routing messages, thus providing a mechanism to determine the relative freshness of two pieces of routing information generated by two different nodes for the same destination. The AODV protocol maintains an invariant that destination sequence numbers monotonically increase along a valid route, thus preventing routing loops. This is explained below further as it will play a crucial role in the understanding of the multipath protocol. In AODV, a node can receive a routing update via a RREQ or RREP packet either forming or updating a reverse or forward path. The update rule in Figure 1 is invoked whenever such a routing packet is received. It is easy to see why loops cannot be formed if this rule is followed. Consider the tuple       where  represents the sequence number at node  for the destination . Similarly,    represents the hopcount to the destination  from node . For any two successive nodes  and  on a valid path to the destination,  being the downstream node, the route update rule in Figure 1 enforces that      

     

where the comparison is in lexicograhic sense. Thus, the tuples

3

      along any valid

route are in a lexicographic total order, which in turn implies loop freedom.

2.3 Use of Soft State and Route Maintenance AODV uses a timer-based technique to remove stale routes promptly. Each routing entry is associated with a soft state timer called route expiration timeout. This timer is refreshed whenever a route is used. Periodically, newly expired routes are invalidated. Route maintenance is done using route error (RERR) packets. When a link failure is detected (by a link layer feedback, for example), routes to destinations that become unreachable are invalidated. A RERR is broadcast that includes the list of unreachable destinations and their sequence numbers. The RERR propagation mechanism ensures that all sources using the failed link receive the RERR. RERR is also generated when a node is unable to forward a data packet for lack of a route. A node upon receiving a RERR from a downstream neighbor for some destination invalidates the corresponding route and updates the sequence number from the RERR. RERR is rebroadcas if at least one destination becomes unreachable.

3 Ad Hoc On-Demand Multipath Distance Vector Routing The key concept in AOMDV is computing multiple loop-free paths per route discovery. With multiple redundant paths available, the protocol switches routes to a different path when an earlier path fails. Thus a new route discovery is avoided. Route discovery is initiated only when all paths to a specific destination fail. For efficiency, only link disjoint paths are computed so that the paths fail independently of each other. Note that link disjoint paths are sufficient for our purpose, as we use multipath routing for reducing routing overheads rather than for load balancing. For the latter, node disjoint paths are more useful, as switching to an alternate route is guaranteed to avoid any congested node. Link disjoint paths, on the other hand, may have common nodes. Since node disjointness is stricter than link disjointness, we use link disjointness in the hope to find more alternate routes in the network.

3.1 AOMDV Route Discovery Several changes are necessary in the basic AODV route discovery mechanism to enable computation of multiple link disjoint routes between source destination pairs. Note that any intermediate node  on the route between a source  and a destination  can also form such multiple routes to  , thus making available a large number of routes between  and  . Recall that in the route discovery procedure a reverse path is set up backwards to the source via the same path the route request (RREQ) has traversed. If duplicates of the RREQ coming via different paths are ignored as before, only one reverse path can be formed. To form multiple routes, all duplicates of the RREQ arriving at a node are examined (but not propagated), as each duplicate defines an alternate route. See Figure 2(a). However, each of these alternate routes may not be disjoint. For example, in Figure 2(b) three copies of RREQ reach destination  , two of which are not via disjoint paths. How do we differentiate between duplicate RREQs that come via disjoint routes and that do not? Reverse routes should be formed only using the former type. Note that the copies of a RREQ reaching  via node disjoint paths must take different first hops from  . Were their trajectories to meet again at an another node (e.g., node A in Figure 2(c)), the copy arriving later in that node will not be propagated further. Thus, all trajectories of a RREQ between any pair of nodes with unique first hops are guaranteed to be disjoint. To determine this, however, the first hop information needs to be included in the RREQ packet as an additional field. Each node remembers the first hop of each RREQ (in a firsthop list) it has seen with the same source id and broadcast id. A reverse path is always formed when

4

S

D

(a)

S D

(b)

S

A

D

(c)

Figure 2: Several network configurations explaining various protocol features. (a) Suppose, the second copy of RREQ is transmitted over the dotted link. AODV ignores it. But AOMDV forms a reverse path through the previous hop. Either protocol does not forward the second copy. (b) Three copie of RREQ will reach D; but only two are via disjoint routes. (c) Use of this figure is explained in the text.

5

A

X copy 1 via A

S

I

D

copy 2 via B

B

copy of copy 1 via X

Y

copy of copy 1 via Y

Figure 3: The second copy of RREQ via B is suppressed at intermediate node I. However two copies of the first copy (via A) still reaches the destination D. Both are replied to by D even though both carry the same first hop. The reverse paths will merge at I and then split again. But they will remain link disjoint. the first hop is unique. However, as in regular AODV, only the first copy of the RREQ is forwarded. Thus there is no additional routing overhead. All these reverse paths can be used to propagate multiple RREPs towards the source so that multiple forward paths can be formed. Note that all such paths are node disjoint. In the hope of getting link disjoint paths (which would be more numerous than node disjoint paths) the destination node adopts a “looser” reply policy. It replies up to  copies of RREQ arriving via unique neighbors, disregarding the first hops of these RREQs. Unique neighbors guarantee link disjointness in the first hop of the RREP. Beyond the first hop, the RREP follows the reverse route that have been set up already which are node disjoint (and hence link disjoint). Each RREP arriving at an intermediate node takes a different reverse route when multiple routes are already available. Note that because of the “looser” reply policy it is possible for the trajectories of RREPs to cross at an intermediate node. See Figure 3. The parameter  is used to prevent a RREP explosion. Also, our earlier observation [24] indicated that additional routes beyond a few provide only marginal benefit, if any. We have used    in our experiments.

3.2 Sequence Numbers and Loop Freedom Revisited If only the destination replies to a RREQ as in the preceeding treatment, loops are not possible. This is because RREQs cannot loop as only the first arriving copy is propagated further. This prevents any loop in the reverse or forward paths either. But are we still free from loops when intermediate nodes choose to reply to a RREP? Recall that AODV uses a sequence number-based invariant to guarantee loop freedom. A similar invariant is maintained in the multipath technique is as well. However, its design is trickier and needs a somewhat elaborate description. Unlike the single path case, different routes for the same destination will now have different hop counts. Nodes must be consistent regarding which of these multiple routes it advertises to others. (An advertisement occurs when an intermediate node replies to a RREQ, or propagates a RREQ to its neighbors, for example). If two nodes on a route advertise routes such that the advertisement from the upstream node has a smaller hopcount, it presents a sure recipe for loops. But how do we prevent such situations given that each node maintains more than one routes in general? Note that a route can be formed through an intermediate node only when the latter advertises it. This is regardless of how many routes this node actually maintains. We establish a strict route advertisement policy to prevent loops. It is controlled by a field, “advertised hopcount,” in the routing table entry, which is initialized each time the sequence number of this route entry is updated.

6

destination sequence number hopcount expiration timeout nexthop (a) AODV

destination sequence number advertised hopcount expiration timeout route list

   ½    ½    ¾    ¾   (b) AOMDV

Figure 4: Structure of routing table entries for AODV and AOMDV. The basic structure of a routing table entry in the AOMDV in comparison with AODV is shown in Figure 4. There are two main differences: (i) the hopcount is replaced by advertised hopcount in the AOMDV and (ii) the nexthop is replaced by the route list. The route list is simply the list of nexthops and hopcounts corresponding to different paths to the destination. The advertised hopcount represents the maximum of the hopcounts of each of those multiple paths so long as a strict route update rule is followed. This update rule is presented in Figure 5. This rule is invoked whenever a node  receives a RREQ or RREP packet from a neighbor  . As in AODV, routes corresponding to only the highest known sequence number for the destination are maintained. However, AOMDV allows for multiple routes for the same destination sequence number. Multiple routes can form via any neighbor  upon receiving a RREQ or RREP from that neighbor. Lines (9)-(10) ensure loop freedom. A proof is provided in the appendix. The node  updates its advertised hopcount for a destination  whenever it propagates a RREQ from  or when it generates/forwards a RREP for . Specifically, it is updated as follows:      







                  

A key observation here is that similar to AODV the following condition holds good for two successive nodes  and  on any valid route to destination .          

          

where the comparison is in the lexicographic sense. We complete our description of AOMDV with mentions of a few other details. As shown in Fig. 4, each routing table entry has one common expiration timeout regardless of the number of paths to the destination. If none of the paths are used until the timeout expires, then all of the paths are invalidated and the advertised hopcount is reinitialized. We also investigated with having individual timeouts per path similar to the expiration mechanism in AODV. But simulation experiments did not show any additional benefit with this added complexity. Route maintenance in AOMDV is similar to AODV except that a destination is declared unreachable only when all routes to it break. Also, it is necessary to keep track of the maximum sequence number heard from RERRs through multiple downstream neighbors so that when all paths break, the destination sequence number is updated to this maximum value.

4 Performance Evaluation We have evaluated the performance of AOMDV with respect to AODV using ns-2 simulations under a wide range of mobility and traffic scenarios. The goal is to address the following questions:

7

if

    then

(1)

   ; if    then       



(2) (3) (4) (5) (6)

;

else        ;

endif

elseif

     = NULL; insert          into      ;

(7) (8)

    and                  then

(9)

insert       

 

into      ;

(10)

endif

Figure 5: AOMDV route updation rules. This is used whenever a node  receives a route update to a destination  from a neighbor  . The variables  ,       and      represent the sequence number, advertised hopcount and the route list for a destination  from a node  respectively.

8

 

How does AOMDV compare with AODV, particularly in terms of end-to-end delay and frequency of route discoveries, as node mobilities vary? How does AOMDV compare with AODV with increase offered load (i.e., number of sessions and/or packet rate per session) ?

4.1 Simulation Environment We use a detailed simulation model based on ns-2 [12]. The Monarch research group in CMU developed support for simulating multi-hop wireless networks complete with physical, data link and MAC layer models [3] on ns-2. The distributed coordination function (DCF) of IEEE 802.11 [10] for wireless LANs is used as the MAC layer. The radio model uses characteristics similar to a commercial radio interface, Lucent’s WaveLAN [35]. WaveLAN is a shared-media radio with a nominal bit-rate of 2 Mb/sec and a nominal radio range of 250 meters. A detailed description of simulation environment and the models is available in [3, 12] and will not be presented here. Note that the same simulation environment has been used before in several recent performance studies on ad hoc networks [3, 15, 17, 9]. In our simulations, we use the latest AODV specification [31]. Link layer feedback is used to detect link failures. Mobility and traffic models are similar to previously reported results using this simulator [3, 17, 9]. The random waypoint model [3] is used to model mobility. Here, each node starts its journey from a random location to a random destination with a randomly chosen speed (uniformly distributed between 0 and max. speed). Once the destination is reached, another random destination is targeted after a pause. We consider only the continuous mobility case (i.e., no pauses). To change mobility, we vary the max. speed of the mobiles. A 100 node network in a field with dimensions 2200m 600m is used. Traffic sources are CBR (continuous bit-rate). The source-destination pairs (sessions) are spread randomly over the network. Only 512 byte data packets are used. The number of sessions and/or the packet sending rate in each pair are varied to change the offered load in the network. All traffic sessions are established at random times near the beginning of the simulation run and they stay active until the end. Simulations are run for 500 simulated seconds. Each data point represents an average of five runs with identical traffic models, but different randomly generated mobility scenarios. Identical mobility and traffic scenarios are used across all protocol variations.

4.2 Simulation Results 4.2.1

Performance Metrics

We evaluate four key performance metrics: (i) Packet delivery fraction — ratio of the data packets delivered to the destination to those generated by the CBR sources; or a related metric received throughput in Kb/sec received at the destination. (ii) Average end-to-end delay of data packets — this includes all possible delays caused by buffering during route discovery, queuing delay at the interface, retransmission delays at the MAC, propagation and transfer times; (iii) Route discovery frequency — the total number of route discoveries initiated per second; (iv) Normalized routing load — the total number of routing packets “transmitted” for each delivered data packet. Each hop-wise transmission of these packets is counted as one transmission. 4.2.2

Varying mobility

Fig. 6 shows the four performance metrics as a function of mobility. Max. speed of the nodes is varied from 0 m/s to 30 m/s to change mobility. Max. speed of 0 m/s corresponds to a static network. Avg. rate of link failures in our mobility scenarios increases from 0-50 per second as the max. speed increases from 0-30 m/s. The number of sessions and packet rate are fixed at 25 and 4 packets/sec respectively. Performance of

9

1

0.5

AODV AOMDV

0.4 Avg. Delay (sec)

0.95

Packet Delivery Fraction

AODV AOMDV

0.45

0.9 0.85 0.8

0.35 0.3 0.25 0.2 0.15 0.1 0.05

0.75

0 0

5

10 15 20 Max. Speed (m/s)

25

30

0

5

7

11

AODV AOMDV

6

25

30

25

30

(b) End-to-End Delay

AODV AOMDV

10 Normalized Routing Load

Route Discovery Frequency (per sec)

(a) Packet Delivery

10 15 20 Max. Speed (m/s)

5 4 3 2 1

9 8 7 6 5 4 3 2

0

1 0

5

10 15 20 Max. Speed (m/s)

25

30

(c) Route Discovery Frequency

0

5

10 15 20 Max. Speed (m/s) (d) Routing Load

Figure 6: Performance with varying mobility.

10

0.5

13

AODV AOMDV

0.4 Avg. Delay (sec)

AODV AOMDV

12 Normalized Routing Load

0.45

0.35 0.3 0.25 0.2 0.15

11 10 9 8 7 6

0.1 0.05

5 50

100

150 200 250 Throughput (Kb/s)

300

350

(a) Delay vs. Throughput

10

15

20

25

30 35 #Sessions

40

45

50

(b) Routing Load

Figure 7: Performance with varying number of sessions. AODV and AOMDV are similar in the static case. Their performance differences, however, become more apparent at higher speeds (see Fig. 6). As expected, the fraction of packets delivered goes down for both the protocols. However, AOMDV loses fewer packets than AODV (3-5% less) in mobile cases. There is a tremendous reduction in the average end-to-end delay with AOMDV as shown in Fig. 6 (b). Improvement in delay is almost always more than 100%. This is because availablity of alternate routes on route failures eliminates route discovery latency that contributes to the delay. Interestingly, for both protocols the delay increases with mobility only until the max. speed of 10 m/s and beyond that delays stabilize. With additional instrumentation, we found that packet drops at intermediate nodes due to link failures beyond 10 m/s are dominated by packets with longer path lengths. In other words, the average hopcounts of delivered data packets comes down at high speeds. Thus, delays become insensitive to increase in mobility after a point as the packets delivered at high speeds are mostly those that travel along shorter paths. Frequency of route discoveries and the routing load behave similarly with varying mobility (see Fig. 6(c) and (d)). As expected, AOMDV performs better in both the metrics with improvements going upto 30%. 4.2.3

Varying offered load

We first vary the number of sessions from 10-50 with packet rate per session fixed at 2 packets/sec. See Fig. 7. We keep the max. speed constant at 10 m/s in this set of experiments. Fig. 7 (a) plots the average delay (in seconds) against the throughput (in Kb/s). Note the significant reduction in delay for AOMDV for the same throughput — hallmark of a good routing protocol [2]. Reduction in routing load is also observed (Fig. 7 (b)) as before. Fig. 8 studies the performance with varying packet rate. We vary the packet rate at each source from 0.58 packets/sec while keeping the max. speed and the number of sessions fixed at 10 m/s and 25 respectively. As before, AOMDV provides much lower delay for the same throughput (Fig. 8(a)). But what is more interesting is that the % improvements in routing load with AOMDV increase with packet rate until a point and then fall down from then on (see Fig. 8 (b)). This is somewhat expected. At very low packet rates, most routes become invalid by the time they are used again no matter how many routes are computed each time. This is because link failure rates are very high compared to packet rate. So, multipath and single path

11

0.8

AODV AOMDV

18 Normalized Routing Load

0.7 Avg. Delay (sec)

20

AODV AOMDV

0.6 0.5 0.4 0.3 0.2 0.1

16 14 12 10 8 6

0

4 0

50 100 150 200 250 300 350 400 450 500 Throughput (Kb/s) (a) Delay vs. Throughput

0

1

2

3 4 5 6 Packet rate (packets/sec)

7

8

(b) Routing Load

Figure 8: Performance with varying packet rates. protocols perform alike at low packet rates. AOMDV starts performing better as the packet rate is increased beyond the rate of link failures. At higher packet rates, however, we found that the routing overhead in both the protocols is dominated by route retry attempts as it takes longer to get a route due to the high network load. Relatively, AOMDV is affected more since it also has the additional overhead of more RREPs per route discovery. But notice that at these high rates, the network is already under saturation (almost 40% packets are dropped by both protocols) and in an overall sense AOMDV still performs better as it gives lower end-to-end delay.

5 Related Work Multipath routing and its applications [21, 4] have been well studied in the networking literature, wired networks in particular. In a broad sense, multipath routing facilitates load balancing and enables fault tolerance. An early work by Maxemchuk [21] on an application of multipath routing known as dispersity routing discusses how a message can be dispersed along multiple paths by splitting it in order to achieve smaller average delay and delay variance. Since then there has been a significant amount of work done on multipath routing for both connection-oriented (e.g., [1, 6]) and connection-less technologies (e.g., [23, 37]). Distributed protocols proposed in the past that compute multiple loop free disjoint paths are more related to our interests. Ogier and Shacham [26] describe a distributed algorithm to find shortest pairs of node (link) disjoint paths. Later, an improved technique was proposed [34] by Sidhu et al. to compute node disjoint paths. Another well known example of multipath routing algorithm is the OSPF [22], a link state protocol that computes multiple paths of equal cost. More recently, multipath algorithms have been proposed that construct and maintain DAGs using diffusing computations [37, 36]. However all the above algorithms have high overheads that make them inefficient for bandwidth limited wireless networks. They are designed to work in the framework of proactive protocols, prevalent in the Internet, where efficiency is not such a major concern. There is a growing interest in the ad hoc networking community to employ multipath routing algorithms. Main reason is the potential of multipath routing for overhead reduction and congestion avoidance. An

12

early draft by Corson et al. [7] on ad hoc networking architecture motivates the need for multipath routing algorithms. Subsequent work on on-demand multipath ad hoc routing mostly relies on source routing to compute multiple disjoint paths [24, 28, 19]. Source routing by itself can be a high source of overhead in large diameter networks. Nasipuri et al. [24] propose multipath extensions to DSR and study the effect of number of multiple paths, path lengths on performance using analytical modeling and packet-level simulations. They observe that the delays increase with multipath routing and attribute it to the longer alternate paths. We believe that this is an artifact of their simulator that does not use a link layer model. From our performance results, we see that there is not very much correlation between path lengths and end-to-end delays. Pearlman et al. analyze the performance impacts of alternative path routing for load balancing using the Zone Routing Protocol [14] which has both proactive and reactive components. The reactive algorithm uses source routing and a technique called diversity injection to compute disjoint paths. We have not addressed the issue of load balancing in this paper and it is the subject of our future work. Another on-demand multipath protocol [19] is proposed recently which is similar to multipath DSR [24] except that it uses a modified flooding algorithm and the data traffic is split among the multiple paths. There is also some work on on-demand multipath routing based on diffusing computations for static ad hoc networks [33].

6 Conclusions and Future Work Multipath routing can be used in on-demand protocols to achieve faster and efficient recovery from route failures in highly dynamic ad hoc networks. In this paper, we have proposed an on-demand multipath distance vector protocol AOMDV that extends the single path AODV protocol to compute multiple paths. There are two main contributions of this work: 1. We show how route discovery mechanism in the AODV protocol can be modified to obtain link disjoint multiple paths from source and intermediate nodes to the destination. 2. We use the notion of an advertised hopcount to maintain multiple loop free paths in the distance vector framework. We have studied the performance of AOMDV relative to AODV under a wide range of mobility and traffic scenarios. We observe that AOMDV offers a significant reduction in delay, often more than a factor of two. It also provides upto about 20%-30% reduction in the routing load and the frequency of route discoveries. In general, AOMDV always offers a superior overall routing performance than AODV in a variety of mobility and traffic conditions. We are currently working on augmenting the AOMDV protocol with a technique to uniquely identify each disjoint path uniquely on an end-to-end basis. This feature is very useful when it is necessary to route always along one specific path. For example, TCP retransmission timeout computation is sensitive to message reordering which can be avoided by always following one end-to-end route as long as it is available. We will also look into other issues related to on-demand multipath routing — for example, the availability of multiple routes in relationship with node density and load balancing with multiple paths.

Appendix Claim:

The route update rule in AOMDV in Figure 5 yields loop free routes.

13

Proof: Suppose that a loop of size , ½  ¾     ½  forms in a route to a destination . Note that nodes  and  in the code are two consecutive nodes in the route, and 



 

Therefore, the following must be true among the nodes in the loop so formed. ½



¾







½ 

which implies ½  ¾        ½ 

This in turn implies the following condition holds in line .      ½  ½       ¾  ¾  

              ½  ½ 

Then,      ½  ½       ½  ½ 

which clearly is impossible. Thus, routes formed by AOMDV are loop free.

¾

References [1] S. Bahk and M. E. Zarki. Dynamic Multi-path Routing and How it Compares with other Dynamic Routing Algorithms for High Speed Wide Area Networks. In Proceedings of the ACM SIGCOMM, pages 53–64, 1992. [2] D. Bertsekas and R. Gallager. Data Networks. Prentice-Hall, 1992. [3] J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the IEEE/ACM MOBICOM, pages 85–97, 1998. [4] J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. A Digital Fountain Approach to Reliable Distribution of Bulk Data. In Proceedings of the ACM SIGCOMM, pages 56–67, 1998. [5] R. Castaneda and S. R. Das. Query Localization Techniques for On-demand Protocols in Ad Hoc Networks. In Proceedings of the IEEE/ACM MOBICOM, pages 186–194, 1999. [6] I. Cidon, R. Rom, and Y. Shavitt. Analysis of Multi-Path Routing. IEEE Transactions on Networking, 7(6):885– 896, Dec 1999. [7] M.S. Corson, J. Macker, and S. Batsell. Architectural considerations for mobile mesh networking. http://tonnant.itd.nrl.navy.mil/mmnet/mmnetRFC.txt, May 1996. Request for Comments Draft. [8] S. R. Das, R. Castaneda, J. Yan, and R. Sengupta. Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc Networks. In Proceedings of the 7th Int’l. Conf. on Computer Communications and Networks (IC3N), pages 153–161, 1998. [9] S. R. Das, C. E. Perkins, and E. M. Royer. Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. In Proceedings of the IEEE INFOCOM, pages 3–12, 2000. [10] IEEE Standards Department. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE standard 802.11–1997, 1997. [11] J. Haarsten et. al. Bluetooth: Vision, Goals, and Architecture. ACM SIGMOBILE Mobile Computing and Communications Review, 2(4):38–45, Oct 1998.

14

[12] K. Fall and K. Varadhan (Eds.). mash.cs.berkeley.edu/ns/.

ns notes and documentation, 1999.

available from http://www-

[13] E. Gafni and D. Bertsekas. Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Trans. on Communication, 29(1):11–18, January 1981. [14] Z. Haas. A New Routing Protocol for the Reconfigurable Wireless Networks. In Proceedings of the IEEE Int’l Conf. on Universal Personal Communications, 1997. [15] G. Holland and N. H. Vaidya. Analysis of TCP Performance over Mobile Ad Hoc Networks. In Proceedings of the IEEE/ACM MOBICOM, pages 219–230, 1999. [16] Y-C. Hu and D. Johnson. Caching strategies in On-demand Routing Protocols for Wireless Ad Hoc Networks. In Proceedings of the IEEE/ACM MOBICOM, pages 231–242, 2000. [17] P. Johansson, T. Larsson, N. Hedman, and B. Mielczarek. Routing Protocols for Mobile Ad-hoc Networks - A Comparative Performance Analysis. In Proceedings of the IEEE/ACM MOBICOM, pages 195–206, 1999. [18] D. Johnson and D. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile computing, chapter 5. Kluwer Academic, 1996. [19] S. J. Lee and M. Gerla. Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks. In Proceedings of the IEEE ICC, 2001. to appear. [20] M. K. Marina and S. R. Das. Performance of Route Caching Strategies in Dynamic Source Routing. In Proceedings of the Int’l Workshop on Wireless Networks and Mobile Computing (WNMC) in conjunction with Int’l Conf. on Distributed Computing Systems (ICDCS), pages 425–432, Apr 2001. [21] N. F. Maxemchuk. Dispersity Routing. In Proceedings of the IEEE ICC, pages 41–10–41–13, 1975. [22] J. Moy. OSPF version 2. RFC 1247, July 1991. [23] S. Murthy and J. J. Garcia-Luna-Aceves. Congestion-Oriented Shortest Multipath Routing. In Proceedings of the IEEE INFOCOM, March 1996. [24] A. Nasipuri, R. Castaneda, and S. R. Das. Performance of Multipath Routing for On-demand Protocols in Mobile Ad Hoc Networks. ACM/Baltzer MONET Journal, 2001. to appear. [25] S.-Y. Ni, Y.-C. Tseng, Y.-S. Chen, and J.-P. Sheu. The Broadcast Storm Problem in a Mobile Ad Hoc Network. In Proceedings of the IEEE/ACM MOBICOM), pages 151–162, 1999. [26] R. Ogier and N. Shacham. A Distributed Algorithm for Finding Shortest Pairs of Disjoint Paths. In Proceedings of the IEEE INFOCOM, pages 173–182, 1989. [27] V. D. Park and M. S. Corson. A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. In Proceedings of the IEEE INFOCOM, April 1997. [28] M. R. Pearlman, Z. J. Haas, P. Sholander, and S. S. Tabrizi. On the Impact of Alternate Path Routing for Load Balancing in Mobile Ad Hoc Networks. In Proceedings of the ACM MobiHoc, pages 3 –10, 2000. [29] C. E. Perkins and P. Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proceedings of the ACM SIGCOMM, pages 234–244, August 1994. [30] C. E. Perkins and E. M. Royer. Ad hoc on-demand distance vector routing. In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb 1999. [31] C. E. Perkins, E. M. Royer, and S. R. Das. Ad Hoc On Demand Distance Vector (AODV) Routing. http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-07.txt, Nov 2000. IETF Internet Draft (work in progress). [32] C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina. Performance Comparison of Two On-demand Routing Protocols for Ad Hoc Networks. IEEE Personal Communications, 8(1):16–28, Feb 2001. [33] J. Raju and J. J. Garcia-Luna-Aceves. A New Approach to On-demand Loop-Free Multipath Routing. In Proceedings of the Int’l Conf. on Computer Communications and Networks (IC3N), 1999.

15

[34] D. Sidhu, R. Nair, and S. Abdallah. Finding Disjoint Paths in Networks. In Proceedings of the ACM SIGCOMM, pages 43–51, 1991. [35] B. Tuch. Development of WaveLAN, an ISM band wireless LAN. AT&T Technical Journal, 72(4):27–33, July/Aug 1993. [36] S. Vutukury and J. J. Garcia-Luna-Aceves. MDVA: A Distance-Vector Multipath Routing Protocol. In Proceedings of the IEEE INFOCOM, 2001. to appear. [37] W.T. Zaumen and J. J. Garcia-Luna-Aceves. Shortest multipath routing using generalized diffusing computations. In Proceedings of the IEEE INFOCOM, March 1998.

16

On-demand Multipath Distance Vector Routing in Ad Hoc Networks

On-demand routing protocols for ad hoc networks discover and maintain only the ... An ad hoc network is a mobile, multihop wireless network with no stationary infrastructure. ...... Conf. on Computer Communications and Networks ... Workshop on Mobile Computing Systems and Applications, pages 90–100, Feb 1999.

181KB Sizes 78 Downloads 346 Views

Recommend Documents

On-Demand Multipath Routing for Mobile Ad Hoc Networks Asis ...
Division of Computer Science ... A mobile, ad hoc network is an autonomous system of ... route set up and maintenance in a packet radio network with moderate ...

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

Secure Anonymous routing in Ad Hoc networks
vulnerable to packet type analysis attacks thus do not provide complete ... requiring operations, this goal effectively means that the protocol should make ...

AODV-BR: Backup Routing in Ad hoc Networks
Computer Science Department. University ... A recent trend in ad hoc network routing is the reactive on-demand ... Mobile Information Systems (GloMo) program.

QoS routing in ad hoc wireless networks
show this improvement. Index Terms—Ad hoc wireless networks, code division multiple ...... degree in the Department of Computer and Infor- mation Science ...

routing in mobile ad hoc networks pdf
pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. routing in mobile ad hoc networks pdf. routing in mobile ad hoc ...

Ad Hoc Networks Using Opportunistic Routing
Jun 29, 2007 - [10] show achievable scaling laws do not change funda- mentally if ... This workwas supported in part by the University Information Technology.

QoS Routing for Wireless Ad Hoc Networks: Problems ...
Quality of service (QoS) provisioning is becoming a critical issue in designing wireless ad hoc net- works due to the necessity of providing multime- dia applications in such networks. These applications are typically delay-sensitive and have high ba

Routing Architecture for Vehicular Ad-Hoc Networks - Sites
applications of vehicular networks [6], also providing services with the possible link ... Figure 1 is the proposed architecture for VANETs. The routing protocols ...

QoS routing for mobile ad hoc networks
Abstract—A Quality-of-Service (QoS) routing protocol is devel- oped for mobile ad hoc networks. It can establish QoS routes with reserved bandwidth on a per ...

Chapter 3 Routing Protocols for Ad Hoc Wireless Networks
New York London. Ad Hoc Mobile. Wireless Networks. Subir Kumar Sarkar. T G Basavaraju. C Puttamadappa. Principles, Protocols, and Applications ... Printed in the United States of America on acid‑free paper. 10 9 8 7 6 5 4 3 2 1 ...... cause difficu

Scalable Routing Protocols for Mobile Ad Hoc Networks
While the infrastructured cellular system is a traditional model for mobile ... home agent), such a strategy cannot be directly applied. A considerable body of ...

Multi-Tier Mobile Ad Hoc Routing - CiteSeerX
Cross-Tier MAC Protocol .... black and is searching for the best neighbor to use as its black ... COM, send a Connection Relay Message (CRM) to G3 telling.

Secure Mobile Ad hoc Routing - IEEE Xplore
In mobile ad hoc networks (MANETs), multi-hop mes- sage relay is the common way for nodes to communicate and participate in network operations, making ...

Multi-Tier Mobile Ad Hoc Routing - CiteSeerX
enable assured delivery of large volumes of critical data within a battlefield by ground nodes and airborne communication nodes (ACNs) at various altitudes.

Minimum Energy Reliable Multipath Ad Hoc ... - Semantic Scholar
relax the bound on the reliability of the energy information required for the program and use the C.L.T. approximation to add a confidence bound on the minimum ...

Throughput Versus Routing Overhead in Large Ad Hoc ...
Consider a wireless ad hoc network with n nodes distributed uniformly on ... not made or distributed for profit or commercial advantage and that copies bear this ...

wireless ad hoc networks pdf
Loading… Page 1. Whoops! There was a problem loading more pages. wireless ad hoc networks pdf. wireless ad hoc networks pdf. Open. Extract. Open with.

Modelling cooperation in mobile ad hoc networks: a ...
one. However, the general approach followed was proposing a mechanism or a protocol ... network with probability one. ... nodes from all the network services.

Mitigating starvation in Wireless Ad hoc Networks: Multi ...
sage indicating the transmission power Pd. Upon receiving the ATIM-ACK, node S ..... mation Computing Development Program through the Na- tional Research ...

Overhearing-aided Data Caching in Wireless Ad Hoc Networks
Abstract—The wireless ad hoc network is a promising networking technology to provide users with various network services anywhere anytime. To cope with resource constraints of wireless ad hoc networks, data caching is widely used to efficiently red

Connected k-Hop Clustering in Ad Hoc Networks
information transmission flooding could be confined within each cluster. In an ad ...... dominating set (CDS) to carry out data propagation. Find- ing a minimum ...