Professional Documents
Culture Documents
Disadvantage of Amris Protocol and Its Solution IJERTV1IS5091
Disadvantage of Amris Protocol and Its Solution IJERTV1IS5091
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
Abstract
Multicasting reduces the communication costs for periodic updates of the routing table. The overhead of
applications that send the same data to multiple storage and channel utilization limits the scalability of
recipients within a network. Instead of sending via mobile ad hoc networks where each mobile node is a
multiple unicasts, multicasting minimizes the link router. By maintaining only the active entries on an on-
bandwidth consumption, sender and router processing, demand basis, one can reduce overhead, thus improving
and delivery delay. In addition, multicasting provides a performance and scalability of network. The AMRIS
simple yet robust communication mechanism whereby protocol is employed in ad hoc networks. The protocol
a receiver’s individual address is known or changeable has its merits and demerits. In this paper, a careful and
without any knowledge by the source. This paper critical study of this protocol has been done. On the
concentrates on the one current multicast routing basis of the study, some problems with this protocol
protocol. The reason for this is to handle the problem were identified and their solutions have been proposed.
encountered when traditional wire-line multicast The AMRIS, a tree-based protocol suffers from some
protocols have been modified for the wireless drawbacks such as collision of data packets with
environment. It is found, in research, that these beacons. The solution proposed for the problems are
protocols are not suitable in terms of scalability and based on a complex structure, which is used to store the
performance with increased mobility. These protocols information about the parent node and sibling node in
do not need to keep an entry for each destination router the network.
in the routing table and maintain the information by
Introduction
A mobile ad hoc network (MANET) consists of a majority of nodes will rely on some exhaustible
collection of dynamic nodes with sometimes rapidly means for energy, thus routing protocols must limit
changing multihop topologies. In MANETs, there is the amount of control information that is passed
no assumption of an underlying fixed infrastructure. between nodes. In summary, an ad hoc network
Nodes are free to move around arbitrarily. Each routing protocol must be simple, robust, and
mobile node functions as a router to establish minimizes control message exchanges. The goal of
connections between any two nodes. Since each node MANET is to extend mobility into the realm of
has a limited transaction range, not all messages may autonomous, mobile, wireless domains, where a set
reach all the intended hosts. To provide of nodes from the network routing infrastructure in
communication through the whole network, a source ad hoc fashion. The majority of applications for the
to destination path could be relayed through several MANET technology are in areas where rapid
intermediate neighboring nodes. Unlike typical deployment and dynamic reconfiguration is necessary
wireless routing protocols, ad hoc routing protocols and the wire line network is not available. These
must address a diverse range of issues. For instance, include military battlefields, emergency search and
the network topology can change randomly and rescue sites, classrooms, and conventions where
rapidly at unpredictable times. As well, since wireless participants share information dynamically using
links generally have lower capacity, congestion is their mobile devices. Alongside the growth in
typically the norm rather than the exception. The wireless applications, there has been a tremendous
www.ijert.org 1
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
growth in the demand for group-oriented computing. precluding the use of a fixed multicast topology.
There are more and more applications where one-to- Transient loops may form during tree reconfiguration.
many dissemination is necessary. The multicast As well, tree reconfiguration schemes should be
service is critical in applications characterized by the simple to keep channel overhead low. In multicasting,
close collaboration of teams with audio and video the key problem is to enable efficient routing of
conferencing requirements and sharing of text and packets from a sender to multiple receivers. Now,
images. In general, wireless mobile multicasting coupled with the MANET characteristics, one can
poses several key challenges. Multicast sources move, appreciate that providing a suitable multicast service
making source oriented multicast protocols within an ad hoc network becomes extremely
inefficient. Multicast group members move, thus challenging.
AMRIS [1, 33] is a source-initiated multicast routing Child Node: A node Y is the child node of a node X
protocol in which a shared-tree is constructed to if node Y successfully joined the multicast session
support multiple sources and receivers. The main through X. Node Y must have a larger msm-id than
idea in this protocol is that each tree node has a node X.
session specific multicast session member identifier Bigger-id node: If a node X has a bigger multicast id
(MSM-ID) which indicates its logical height in the then Y, then X is called bigger-id node.
shared tree. The purpose of MSM-ID is to avoid any Smaller-id node: If a node X has a smaller multicast
loop formation and repair the broken links locally. id then Y, then X is called smaller-id node.
Multicast group: Nodes that are participating in
Overview of Amris multicast communication which includes the
The protocol is explained in the following sequence: senders/sources, receivers and intermediate nodes are
1. Terminology Used called multicast group.
2. Tree Initialization Multicast Session ID (ms-id): MS-ID is a unique
3. Tree Maintenance Phase value identifying a particular multicast session.
4. Where does Sid come from? Multicast Session Member ID (msm-id): MSM-ID is
5. Joining the Multicast Session an ID number that all nodes must have within a
6. Forwarding Policy multicast session. The ID differs among nodes and
7. Reaction to Network partition generally increases in numerical value from Sid.
8. Group Membership Neighbour-Status Table: Neighbor-status table is a
9. Terminating the Multicast Session conceptual data structure that is employed to keep
information regarding the neighbouring nodes and
1 Terminology Used their status.
Multicast Beacon: This is a periodic one-hop
Smallest-ID node (Sid): A node is called Sid that broadcast sent by all nodes to update neighbouring
starts/initiates a multicast session because it has the nodes about its multicast state information. Multicast
smallest msm-id compared with all other nodes for state information would include the node’s unique ID,
that multicast session. msm-id as well as it’s parent and child msm-ids.
Node: A node is a device in the ad-hoc network that Interested node (I-node): A node that is interested in
willing to participate in the routing protocol. a specific multicast session and wishes to join is
Potential Parent Node (PPx): If a node X receive any called interested node.
New Session message from PPx and PPx has a Uninterested Node (U-node): A node that is not
smaller msm-id than node X, then PPx is considered interested in a specific multicast session but is
as a Potential Parent Node of X. “forced” and became part of the session anyway
Parent Node: A node X is the parent node of a node because it is required to be a relay/intermediate node
Y if node Y successfully joined the multicast session on the multicast delivery path is called uninterested
through X. Node X must have a smaller msm-id than node.
node Y.
www.ijert.org 2
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
www.ijert.org 3
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
R2 6
3
required to repair the broken links. In AMRIS [1, 33], 2
node R1 moves from A to B, then the link I3-R1 fails. JoinReq control packet
Since node R1 has neighboring potential node I4, it JoinAck control packet
JoinConf packet
sends the join request packet to node I4. The node I4 Fig. 3: Tree maintenance by BR2 subroutine .
6 3
0 6
resorting to localized broadcast right away. If the
immediate neighbouring nodes are nodes already on
3
2 I1
the multicast tree, then this 1-hop approach is very
5
fast and efficient. The presence of msm-id helps in
S1
8 5 I
4 I
4
identifying the likelihood of a successful join. A node
8
2
R3 X joins a multicast session in one of several ways
7 I I1
depending on the situation:
3
B
I2
1. Node X has a valid msm-id and has a neighbour
R1 I1
that also has a valid msm-id. (This is normally the
A
case after tree initialization.)
I2 2. Node X does not have a valid msm-id and has a
JoinReq control packet neighbour that also has a valid msm-id. (This is
JoinAck control packet
normally the case when node X missed the new
Fig. 2: Tree maintenance by BR1 subroutine
session broadcast.)
3. Node X has a valid msm-id and does not have any
neighbours with valid msm-id. (This is normally the
www.ijert.org 4
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
case when the neighbours have timed out that msm- core. The node in the other partition will not. If there
ids. In this case node X will find other nodes that is a tie, the one with largest unique id will inform its
have valid msm-ids.) core. The core will send a join request back to its
4. Node X does not have a valid msm-id and does not child node if after it compares the msm-ids,unique ids,
have any neighbours with valid msm-id. (This is of the reporting nodes and the other partitions
normally the case when node X missed the new reporting nodes. The temp core may receive several
session broadcast.) of such messages. It will choose the one with the best
routing metric and send a join request message back
6. Forwarding Policy to the node. When a join acknowlegement returns in
response to the join request, the temp core may need
The forwarding policy rules are as follows for to send out modify-msm-id messages to a subset of
multicast data traffic: its child ndoes that lie on the path to the other
1. When a multicast datagram is received, it first partition. So in this situation, there are two partitions
checks if the originator is itself, if so, it will drop the to join together. The node with the smallest msm-id
datagram. will eventually become the new Sid. However there
2. If a multicast datagram is received from its is a problem if it has two partitions whose core have
registered parent node, it will forward to all the same msm-id, then neither partition will join with
registered child nodes. each other but they are still in different partitions
3. If a multicast datagram is received from a because the original core may be destroyed.
registered child node,it will forward to all other
registered child nodes and to all its registered parent 8. Group Membership
node.
4. If a multicast datagram is received from any other Group membership is dynamic in nature, any node is
node, it is not forwarded to any other nodes. free to join or leave the node at any time except for
the Sid. If Sid wishes to leave, another node will have
7. Reaction to Network partition to be designated as the new Sid. On-tree nodes can be
detected by listening to its neighbours beacons and
A network partition will cause the multicast tree to be detecting if any of the neighbours are already an on-
divided into different segments. If BR does not tree node. If the node is unable to locate any
succeed after n-tries, it can be assume that a network neighboring on-tree nodes, it will begin a N-hop-
partition has take place. Within each partition, lifetime join request broadcast to its neighbours. N
multicast traffic continues to be forwarded in begins from 2 to Max-TTL. After sending the
accordance to the forwarding rules i.e.intra-partition broadcast, it will wait for a reply. If no reply is
traffic can continue as per normal but inter-partition received within time T1, it will increase N by one and
traffic cannot take place.When this happens, the child send again.Any node that receives the join request
node at the point of link breakage will become the and is not an on-tree node will update its Neighbor-
new temporary Sid-temp, i.e. the node with the Status table and rebroadcast. The behaviour here is
smallest msm-id within that partition. At a later time, similar to tree initialization except that the
the network may be such that a path now exists either intermediate nodes may not yet have a msm-id.
between the Sid-temp or one of its child node back to Similarly the I-node also does not yet have a msm-id.
the original partition. When a partition takes place, Eventually, the join request will be received by an
the Sid-temp should send a Partition-Id change on-tree node which will reply with a join
message to its decendent nodes. The message can be acknowledgement. The nodes along the path from the
sent standalone or piggybacked along multicast I-node to the on-tree node will then dynamically
traffic. This will update all child nodes eventually. program their msm-id using their respective parent
The multicast beacon will carry the new partition-id. node’s msm-id. A leaf node can leave the multicast
Subsequently, any node that hears a beacon for the session by sending a session leave message to its
same multicastsession but with a different partition id parent node. If the parent node is a U-node in the
will send a Found-Partition message to its own multicast session, it will also send a session leave
partition’s Sid-temp. Only the node with the smallest message to its own parent node provided it.
msm-id will send the message to its own partition’s
www.ijert.org 5
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
9. Terminating the Multicast Session source, leading to increased delay and increased
probability of packet losses.
Only Sid can close a multicast session. Nodes are of
course free to leave. Sid closes the multicast session ENHANCED AMRIS PROTOCOL
by sending a Session-End message down to its child
nodes. This is rebroadcasted by intermediate nodes. This section presents the solutions to the problems,
All nodes that receive the Session-End message which were identified The solution to these problems
purge any entries/state associated with the multicast has been proposed through resolving the following
session. The nodes store the session-id for up to time issues.
T seconds before finally expiring that entry. If the 1. What is required information and what is its
network is partitioned, the original Sid may have storage structure.
closed the session but the other partitions have not 2. How to initialize the structure.
since they did not receive the message. For this 3. How a new node will join the network.
reason, nodes which receive the End-Session The next subsections discuss the above issues.
message will remember the session-id for time T
seconds. If the node hears a beacon with state about 1 Required information and its storage structure
the session, it will forward the End-Session message
to it. Each multicast entry in the neighbour-status In order to avoid the problem of collision of beacons
table has an associated timeout value. Session with data packets, one possible solution is to provide
termination can also be done via a soft state approach, a separate path for beacons. The nodes which are not
i.e. when the entries expire in the neighbour-status involved in transmission of data packets can only be
table. the part of this separate path on which beacons will
be sent. The node, which want to send beacons and
also involved in transmission will choose a neighbor
node to establish a separate path from receiver to
Problems Identified in Amris source. The neighboring node will go on storing the
beacon information from receiving node and after a
After a critical analysis of the AMRIS protocol, the specified interval of time the neighbor node will send
following problems were observed. this beacon information to source node to inform the
(1) Wastage of bandwidth due to usage of beacons. A presence of receiving node. This way collision can be
beacon is a very small message which is periodically avoided and also the bandwidth of the path on which
sent by each node to show the connectivity with the data packets are transferred can be saved. This
network. Due to these beacons some amount of separate path can be found out if a node knows
bandwidth is wasted. sibling of its ancestor nodes. Also a node requires its
(2) Loss of data packets due to collisions with sibling information in order to transfer it to its new
beacons. Some times data packets use full channel children. This required information at each node of
bandwidth. At this stage the beacon collides with the the network has been stored in hierarchical structures
data packets and results in loss of some data packets. as shown in Fig 4. The structure L1 is used to store
(3) The protocol follows hard state route maintenance the information about the ancestor nodes’ siblings of
scheme. When a parent node leaves network or it a node and L2 is used to store the information of
fails, its child node needs another parent node so that sibling/children of a node (i.e. node under
it could remain connected in the network. To find consideration). If a node is source node (i.e. initial
suitable parent node, the child node has to search a node) its L1 linked-list will be empty as it does not
potential parent amongst the existing nodes in the have any parent node but it may contain the
network. This search process, wastes a lot of time, information of its immediate neighbors/siblings in the
delays packet delivery and loss of data packets. L2 depending upon current status of network. Each
(4) Selection of potential parent nodes based on Node in L1 linked-list will contains a field for node
MSM-ID. In the existing protocol, the selection of ID of some parent node, a pointer to the linked-list
potential parent node by a new node is based upon containing children information, if they exist and a
the MSM-ID value. This results in increase in the pointer to next Node containing information about
average hop-length between the receivers and the the node having same status as that of the node which
www.ijert.org 6
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
Fegure: 4
4 5
Format of a node in linked-list L1
www.ijert.org 7
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
intermediate node or one of the last node of the Case 1: When new node connects to node 4 (i.e.
network. Intermediate node is one who has a non intermediate node)
blank child linked-list L2 and the last node is that one Send updated List L2 to node 6, 7, and 8
who has a blank child linked-list L2.
The actions at the following levels will be performed. Case 2: When new node connects to node 6 (i.e.
A. At parent node level leaf node)
1. Parent node will update its child list L2. This node has no existing children so it will not
2. Parent node will send updated list. follow step 2.
3. Parent will send list L1 and updated list L2
to the newly joined node. 3. Parent will send list L1 and updated list L2 to the
B. At the level of already connected children of newly joined node.
parent node. Case 1: When new node connects to node 4 (i.e.
1. Existing child will update their sibling’s intermediate node)
information. Send L1 and updated L2 to node 9.
C. At newly joined node’s level
1. New node will make its list L1 and L2. Case 2: When new node connects to node 6 (i.e.
The following example shows the action taken by the leaf node)
various nodes in order to connect a new node. Let Send L1 and updated L2 to node 9
new node with node ID 9 wants to join the network. B) Existing Child’s level
The following actions have to be taken.
Case 1: When new node connects to node 4 (i.e.
A). Action at Parent Node’s level intermediate node)
1. Receive request, update child list L2. Existing children 6, 7, and 8 will change its
Case 1: When new node connects to node 4 (i.e. sibling
intermediate node)
6 0 7 0 8 0 0
6 7 8 9 0
Previous sibling list L1
New Request
6 7 8 9 6 0 7 0 8 0 9 0 0
0
www.ijert.org 8
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
www.ijert.org 9
International Journal of Engineering Research & Technology (IJERT)
ISSN: 2278-0181
Vol. 1 Issue 5, July - 2012
References:
www.ijert.org 10