0% found this document useful (0 votes)
34 views23 pages

Load Balancing in MANET: Aswin Prasanth S. M. S7 CS 07

Load balancing is important in mobile ad hoc networks (MANETs) to prevent overloading of central nodes and ensure efficient traffic distribution. Several load balancing techniques have been proposed, including logical partitioning of nodes, work load-based adaptive approaches, and dynamic routing algorithms that select paths based on metrics like interface queue length and packet delay. Modified reverse AODV routing aims to further improve path stability and maintain connectivity when links fail in high mobility environments. Applications of MANETs include military operations and emergency response scenarios where infrastructure is not available.

Uploaded by

Raj Mohan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views23 pages

Load Balancing in MANET: Aswin Prasanth S. M. S7 CS 07

Load balancing is important in mobile ad hoc networks (MANETs) to prevent overloading of central nodes and ensure efficient traffic distribution. Several load balancing techniques have been proposed, including logical partitioning of nodes, work load-based adaptive approaches, and dynamic routing algorithms that select paths based on metrics like interface queue length and packet delay. Modified reverse AODV routing aims to further improve path stability and maintain connectivity when links fail in high mobility environments. Applications of MANETs include military operations and emergency response scenarios where infrastructure is not available.

Uploaded by

Raj Mohan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Load Balancing in MANET

Aswin Prasanth S. M.
S7 CS 07
Introduction
 Mobile ad hoc networks (MANET) consist of mobile platform which c
ommunicate with each other through wireless links, without any predet
ermined infrastructure.

 If the source and destination nodes are not within the transmission rang
e of each other, then intermediate nodes would be served as intermediat
e routers for the communication between the two nodes.

 The mobile platform moves autonomously and communicates via dyna


mically changing network.

 MANET, sometimes called a mobile mesh network, is a self-configurin


g network of mobile devices connected by wireless links.

2
Why Load Balancing
 Transmission based on routing protocols which determine the path
by using least number of nodes

 Some central nodes will always be high traffic nodes

 Poorer traffic and network load increases

 Dynamical changes needs to be monitored since the nodes are mo


bile

 No particular network structure present

 Low bandwidth

3
MaNet Protocols

 Proactive Protocols  Reactive Protocols


• Table driven • On Demand
• Continuously evaluate routes • Route discovery by some glo
• No latency in route discover bal search
y • Bottleneck due to latency of
• Large network capacity to ke route discovery
ep info. current • May not be appropriate for r
• Most routing info. may neve eal time communication
r be used!
MANET TERMS
 RREQ: Route REQuest, is initiated by source node

 RREP: Route REPly, is initiated by destination on receiving of RREQ

 Interface Queue length: Length of packet queue.

 Packet Delay: Is the difference in end-to-end delay between selected packet


s in a flow with any lost packets being ignored

5
Load Balancing by logical partitioning of Mobil
e Nodes
 Source nodes divided into various
logical groups

 Some nodes in a group can access


internet via a gateway

 Nodes in one group cannot relay p


ackets from other. Nodes in gatew
ay can relay packets to internet.

Draw Back
 When large number of packets are

generated inside a single group

6
Work Load Based Adaptive Load Balancing

 Based on interface queue length a


nd the work load

 A threshold value ranged from mi


n to max used

 Initial threshold set to max value. I


f incoming RREQ falls between M
IN and MAX threshold is changed

 Its incremented if queue length re


main high for period of time decre
mented if its low

7
Dynamic Load-aware Based Load-balanced Rou
ting
 Selects route based on current routing load

 Finds the route with least traffic

 The RREQ accumulates interface queue length and packet delay of all node
s from source to destination

 When destination receives this RREQ it compares current active routes and
RREQ received

 If current RREQ has lower interface queue length and packet delay then tha
t route is taken

8
Ad hoc On Demand Vector Routing
 The network is silent until a connection is needed

 Request for connection RREQ

 Explosion of temporary routes back to the needy node RREP

 Uses the route that has the least number of hops

 Unused entries saved and used at later time

 No extra traffic for communication along existing links

 Doesn't require much memory or calculation

9
AODV Load Balancing (1/2)

10
AODV Load Balancing (2/2)
 Based on Route Workload Ind
ex(RWI)

 RWI represents the average lo


ad status of a route.

 If RWI of route X is lesser tha


n RWI of route Y then route
X is less loaded and hence pre
ferred for transmission

11
Reverse AODV algorithm (RAODV)
 Route request packet in RAOD  When the destination node rece
V contains the source and desti ives first route request messag
nation addresses, together with e, it generates reverse request
the broadcast ID, uniquely iden (R-RREQ) message and broadc
tify this RREQ packet. asts it to neighbor nodes within
transmission range.

12
Reverse AODV algorithm (RAODV)
 When broadcasted reverse request packet arrives to intermediate nod
e, it will check for redundancy.

 If it already received the same message, the message is dropped,


otherwise forwards to next nodes and when the source node receives
first reverse request message, then it starts packet transmission, and l
ate arrived R-RREQs are saved for future use.

 The saved R-RREQ can be used when traffic in the current active ro
ute becomes high.

13
Modified Reverse Ad Hoc On Demand Distance Vector
(MRAODV) routing algorithm
 In the proposed routing algorithm (MRAODV), when a source node
wants to communicate with a destination node, first it broadcasts a R
REQ packet.

 When destination receives a RREQ message, it broadcasts R-RREQ


message to find source node.

 Each intermediate node which receives the R-RREQ message, calcul


ates route stability

14
Modified Reverse Ad Hoc On Demand Distance Vector
(MRAODV) routing algorithm
 When source node receives R-RREQ, it will have multiple routes to
destination, so it selects stable route to destination node. This proces
s is illustrated in figure.

15
Modified Reverse Ad Hoc On Demand Distance Vector
(MRAODV) routing algorithm
 Here when one intermediate node moves and causes link breaks then
active route fails and a new route must be selected.

 In AODV, this process is done by initializing route discovery proced


ure and in RAODV with selecting one available route with minimum
hop count.

 In MRAODV, a new route with maximum stability is selected betwe


en available routes.

16
Path Maintenance in MRAODV Routing Algorithm
 When a route established between source and destination, data trans
mission stage can be started.

 In high mobility environments, link failure is a common phenomeno


n which can be occurred.

 In both reverse RAODV and AODV routing algorithms, source node


selects new path based on shortest path method and when mobile no
de moves quickly, these algorithms can not show good performance.

17
Issues in Ad hoc Wireless Networks
 Self-Organization is required in ad hoc wireless networks:

• Neighbor discovery
• Topology organization
• Topology reorganization

 Information disclosure: a compromised node can act as an informer.

 Interference: jam wireless communication by creating a wide-spectrum noise.


Issues in Ad hoc Wireless Networks
• Denial of service

• Resource consumption

 Energy depletion: deplete the battery power of critical nodes

 Buffer overflow: flooding the routing table or consuming the data pac
ket buffer space

• Host impersonation: A compromised node can act as another node.

19
Applications of Ad hoc Wireless Networks

 Military applications

• Ad hoc wireless networks is useful in establishing communication in a


battle field.

 Collaborative and Distributed Computing

• A group of people in a conference can share data in ad hoc networks.

• Streaming of multimedia objects among the participating nodes.

20
APPLICATIONS
 Emergency Operations

• Ad hoc wireless networks are useful in emergency operations such as sea


rch and rescue, and crowd control.

 A Wireless Mesh Network is a mesh network that is built upon wireless co


mmunications and allows for continuous connections and reconfiguration ar
ound blocked paths by "hopping" from node to node until a connection can
be established.

21
QUESTIONS!!

22
THANK YOU

23

You might also like