Abstract
In wireless sensor networks (WSN), the sensor nodes have a limited transmission range and storage capabilities as well as their energy resources are also limited. Routing protocols for WSN are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. This paper defines the essential components of the network layer benchmark, which are: the target, the measures and the execution profile. This work investigates the behavior of the Ad Hoc On-Demand Distance Vector (AODV) routing protocol in situations of link failure. The test bed implementation and the dependability measures are carried out through the NS-3 simulator.
You have full access to this open access chapter, Download conference paper PDF
Similar content being viewed by others
Keywords
- Ad Hoc On-demand Distance Vector (AODV)
- Execution Profile
- AODV Protocol
- Route Reply (RREP)
- Fault Injection
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
1 Introduction
Wireless Sensor Networks (WSNs) represent a concrete solution for building next-generation critical monitoring systems with reduced development, deployment, and maintenance costs [3]. WSNs applications are used to perform many critical tasks. Properties that such applications must have include availability, reliability, security and etc. The notion of dependability captures these concerns within a single conceptual framework, making it possible to approach the different requirements of a critical system in a unified way. The unique characteristics of WSNs applications make dependability satisfaction in these applications more and more significant [8].
The structure of the paper is as follows. In Sect. 2, we show the related work. In Sect. 3, we describe the benchmark target. Next, in Sect. 4, is held the execution profile. Section 5 defines the faultload specification. Section 6 describes measurements and simulation results. Finally, Sect. 7 concludes the paper.
2 Related Work
Various routing protocols have been compared, in the literature, using different aspects, namely the evaluation of performance or dependability. In the first case, a set of measures is usually used to compare different solutions. Authors in [7] describe a number of quantitative parameters that can be used to evaluate the performance of Mobile Ad hoc Networking (i.e. MANET) routing protocols. In contrast the dependability measures define many properties like: time-to-failure and time-to-recovery [4]. Other measures may define the network and the sensing reliability. To perform such analysis we can use approaches like: simulation, emulation and real-world experiments [9]. We aim to define a fault injection based evaluator that handle errors and analyze the sensor networks reliability [1].
3 Benchmark Target
The network layer provides various types of communications. Which are not only messages delivering and the network layers yielded notification, but, also the paths discovery and its maintenance. Therefore, these two services are mandatory to build the workload that assesses the network layer dependability. We have used AODV [5] as the reference protocol to simulate these two services using NS3 [6].
Route Calculation: AODV broadcasts a Route Request (RREQ) to all its neighbors. Then it propagates the RREQ through the network, unless, it reaches either the destination or the node holding the newest route to the destination. The destination node sends back a RREP response to the source to prove the validity of the route [2]. Route Reply (RREP) message is unicast back and it contains hop_count, dest_ip address, dest_seqno, src_ip address and lifetime as shown in Fig. 1.
Route Maintenance: AODV sends these broadcasted “hello” messages (a special RREP) which are simple protocols used by the neighbors to refresh their valid routes set. If one node no longer receives the hello messages from a particular node, it deletes all the routes that use the unreachable link, and that form the set of the valid routes. It also notifies the affected set of nodes by sending to them a link failure notification (a special RREP see Fig. 2).
The forwardup() operation of processes, a protocol data unit (PDU) messages and delivers it to the upper layers, whereas the Receive() operation provides the requests response. These two activities define services offered by the LLC Layer.
4 Execution Profile
The execution profile activates the target system with either a realistic or a synthetic workload. Unlike performance benchmarking, which includes only the workload, the dependability assessment also needs the definition of the faultload. In this section, we describe the structure and the behavior of the workload.
4.1 Workload Structure
To apply our approach to a real structure, we chose to monitor the stability of a bridge. Figure 3 introduces the topology of the nodes which is a 3D one. In our experiments, we vary the number of nodes within the range of 10 to 50 (see Table 1). The more we define nodes, the more is dependable the structure. With ten nodes, the structure has one redundant path between the source node and the sink. Then, even though one node had failed, the emitter node would have transmitted a packet to the sink. When the structure has more nodes, it will tolerate more than one node failure.
4.2 Workload Behavior
As the assessed services is the route establishment and its maintenance by the network protocol, our workload consists on the sending of a packet from a source to the sink node. The Table 1 below summarises the simulations’ parameters.
5 Faultload Specification
It would be awkward to identify the origin of the failure using multiple modifications, therefore, to avoid the correlation drawback, our benchmark assesses the WSN behavior using a single fault injection. As the source node triggers the communication, the route construction and its maintenance, we will inject faults within the packets received by this node and therefore the change in field of its routing table. Since the source node receives the RREP packets in the route identification phase and RERR in the maintenance one, we will inject into its different fields, described in the Table 2 below.
The table above introduces two set of elements: Fixed variables and control functions which are mandatory to specify the faultload. Fixed variables are the elementary parameters of the fault, they identify the packet’s fields and their relative corrupted values. Also, the fault model specifies the faulty packet which could be the RREP or RERR packet and the fault type initializes the node’s address using a random value belonging to the network or an imaginary one. All these values have to stay constant during one the simulation. The functions, belonging to the “Control functions”, change the fields of control packets.
The CTL (Computation Tree Logic) formulae written below specify the faultload used to assess the dependability of the routing layer. The expression (1) and (5) specifies respectively, a fault injection within the RREP and RERR packet. The fault type can take a false value of an another node within our architecture or a value of a non existing one. When we inject in the RREP packet, the fault may cover four fields: HC(3), DST(3), SRC(4) or DSN(4). In the RERR injection, the fault may alter these following fields: UNDST, UNDSN(7). In this section, we present the fault injection specification in the AODV protocol. The fault injection will be modeled in the primitive Forwardup () at the entrance of the network layer.
RREP Injection:
RERR Injection:
6 Measurements and Simulation Results
We need measurements to determine the dependability of the WSN:
-
Remaining energy: Is the average of remaining energy of all nodes.
-
Time of route recovery: It is the time taken by a protocol to find another path to the destination.
-
Time of route identification: It is the time taken by a protocol to find a route to the destination.
6.1 Route Calculation
In the following sections, we will present the results and analyze them. The after simulation results are viewed in the form of line graphs. The study of AODV is based on the varying of the workload and the faultload. This study is done on parameters remaining energy and time of route identification. The Fig. 4a shows the AODV power consumption compared to the number of nodes. In the Fig. 4b, we note that AODV is very fast to find the route especially when the number of nodes decreases.
The AODV protocol is robust to the hopcount and the lifetime fields injection. It find the route and keep the same performances as if we did not interfere.
AODV is not robust to the source address fields injection. When we inject in a node that belongs to the route and despite that there is an another one, the protocol don’t find the path. With the Dest and the DSN fields injection, the protocol sends another RREQ which increases the route identification time and the remaining energy as shown in Fig. 5.
6.2 Route Maintenance
To evaluate the route maintenance we produce the failure of an intermediate node. Figure 6 shows the remaining energy and the recovery time without fault injection. To study the behavior of the AODV protocol during the route maintenance, we injected the fault after provoking the failure of the intermediate node. The fault model and the injection model used are defined in the section four. AODV protocol is robust with respect to the both filds to the Unreachable Dest Address and Unreachable DSN. Nevertheless the RERR packet rate increases which saves energy during the simulation.
7 Conclusion
We studied the AODV dependability, considering the remaining energy, the time of route recovery and the time of route identification. After the benchmarking campaigns, we noticed that the AODV protocol is robust with respect to eight filds introduced in the section three except the source address in the packet RREP.
References
Sailhan, F., Delot, T., Pathak, A., Puech, A., Roy, M.: Dependable Sensor Networks, Atelier sur la GEstion des Donnes dans les Systmes d’Information Pervasifs (GEDSIP) au sein de la confrence INFormatique des ORganisations et Systmes d’Information et de Dcision (INFORSID), pp. 1–15, May 2010
Kumari, S., Maakar, S., Kumar, S., Rathy, R.K.: Traffic pattern based performance comparison of AODV, DSDV and OLSR MANET routing protocols using freeway mobility model. Int. J. Comput. Sci. Inf. Technol. 2, 1606–1611 (2011)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Chipara, O., Lu, C., Bailey, T.C., Roman, G.-C., Networks, reliable clinical monitoring using wireless sensor: experiences in a step-down Hospital unit. In: Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems, vol. 14, pp. 155–168 (2010)
Perkins, C.E., Royer, E.M.: Ad-hoc on demand distance vector routing. In: Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (1999)
The NS-3 Network Simulator. http://www.nsnam.org
Corson, S., Macker, J.: Routing protocol performance issues and evaluation considerations. RFC2501, IETF Network Working Group, January 1999
Taherkordi, A., Taleghan, M.A., Sharifi, M.: Dependability considerations in wireless sensor networks applications. J. Netw. 1(6) (2006)
Kulla, E., Ikeda, M., Barolli, L., Xhafa, F., Younas, M., Takizawa, M.: Investigation of AODV throughput considering RREQ, RREP and RERR packets. In: Advanced Information Networking and Applications (AINA), pp. 169–174 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, duplication, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, a link is provided to the Creative Commons license and any changes made are indicated.
The images or other third party material in this chapter are included in the work’s Creative Commons license, unless indicated otherwise in the credit line; if such material is not included in the work’s Creative Commons license and the respective action is not permitted by statutory regulation, users will need to obtain permission from the license holder to duplicate, adapt or reproduce the material.
Copyright information
© 2016 The Author(s)
About this paper
Cite this paper
Belkneni, M., Bennani, M.T., Ben Ahmed, S., Kalakech, A. (2016). Network Layer Benchmarking: Investigation of AODV Dependability. In: Czachórski, T., Gelenbe, E., Grochla, K., Lent, R. (eds) Computer and Information Sciences. ISCIS 2016. Communications in Computer and Information Science, vol 659. Springer, Cham. https://doi.org/10.1007/978-3-319-47217-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-47217-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47216-4
Online ISBN: 978-3-319-47217-1
eBook Packages: Computer ScienceComputer Science (R0)