Académique Documents
Professionnel Documents
Culture Documents
Abstract
Recent advances in portable computing and wireless technologies are opening up
exciting possibilities for the future of wireless mobile networking. A mobile ad hoc
network consists of mobile platforms, which are free to move arbitrarily. In a MANET
the nodes are mobile, and internode connectivity may change frequently due to
mobility of nodes. Recently, there has been an increasing demand for applications
like multiplayer online gaming, where players residing at different locations partici-
pate in the same gaming session through their handheld portable devices. Such
applications are characterized by a close degree of collaboration, typical of ad hoc
network scenarios. Multicasting could prove to be an efficient way of providing necessary
services for these kinds of applications; hence, it is imperative to determine what is
the best way to provide these services in an ad hoc environment. Due to very diverse
requirements of the applications and the unpredictable nature of ad hoc networks, it
is necessary to investigate and discern the applicability of existing ad hoc multicast
protocols and quantify which is more suitable for which type of applications. In this
article we provide a detailed description and comparison of ad hoc multicast proto-
cols. We also hope that the discussion presented here will be helpful to application
developers in selecting an appropriate multicast protocol and pave the way for fur-
ther research.
X Core/source
wired and infrastructured wireless networks and X
for detailed insight please refer to [2]. Here, we
focus only on multicasting over MANETs. Intermediate node
This article is organized as follows. We initially
outline specific characteristics needed to provide
11 14 18 Sender/receiver
multicast in a MANET. Next, we cover the multi-
cast routing protocols in a MANET in detail, clas-
sifying them based on the forwarding mechanism.
Open problems in the field of multicasting over Receiver
MANETs that still need careful attention are then 21 24
28
described. We conclude this article by providing Non-participating
insight into future directions of this research field. node
MANET
Well established routing protocols do exist to offer ■ Figure 1. AMRIS packet forwarding (X and 34 are sources; 11, 24, and 28
efficient multicasting service in conventional wired are recipients).
networks. These protocols, having been designed
for fixed networks, may fail to keep up with node
movements and frequent topology changes in a MANET. As overhead since a number of duplicated packets are sent and
nodes become increasingly mobile, these protocols need to packet collisions do occur in a multiple-access-based MANET.
evolve to provide efficient service in the new environment. In this section we discuss multicast routing protocols proposed
Therefore, adopting existing wired multicast protocols as such for MANETs. For simplicity, we can classify these into four
to a MANET, which completely lacks infrastructure, appears categories based on how routes are created to the members of
less promising. Host mobility increases the protocol overheads the group:
substantially. Rather, new protocols are being proposed and • Tree-based approaches
investigated that take issues such as topological changes into • Meshed-based approaches
consideration. Moreover, the nodes of a MANET rely on bat- • Stateless multicast
teries; thusm routing protocols must limit the amount of con- • Hybrid approaches
trol information passed between nodes.
The majority of applications are in areas where rapid Tree-Based Approaches
deployment and dynamic reconfiguration are necessary and a Tree-based multicast is a very well established concept in
wireline network is not available. These include military bat- wired networks. Most schemes for providing multicast in
tlefields, emergency search and rescue sites, classrooms, and wired networks are either source- or shared-tree-based. Dif-
conventions where participants share information dynamically ferent researchers have tried to extend the tree-based
using their mobile devices. These applications lend themselves approach to provide multicast in a MANET environment.
well to multicast operation. In addition, within a wireless This section gives an overview of some of those approaches.
medium, it is even more crucial to reduce transmission over-
head and power consumption. Multicasting can improve the Ad Hoc Multicast Routing Protocol Utilizing Increasing ID Num-
efficiency of the wireless links, when sending multiple copies bers (AMRIS) — AMRIS [3] is an on-demand protocol that
of messages, by exploiting the inherent broadcast property of constructs a shared multicast delivery tree (Figure 1) to sup-
the wireless medium when multiple mobile nodes are located port multiple senders and receivers in a multicast session.
within the transmission range of a node. However, besides the AMRIS dynamically assigns an ID number to each node in
issues for any ad hoc routing protocol listed above, wireless each multicast session. Based on the ID number, a multicast
mobile multicasting faces several key challenges. Multicast delivery tree — rooted at a special node with Smallest-ID
group members can move, thus precluding the use of a fixed (Sid) — is created, and the ID number increases as the tree
multicast topology. Transient loops may form during reconfig- expands from the Sid. Generally, Sid is the source or the node
uration of distribution structure (e.g., tree) as a result of the that initiates a multicast session.
mobility. Therefore, the reconfiguration scheme should be The first step in AMRIS protocol operation is the selection
kept simple to maintain the channel overhead low. of Sid. If there is only one sender for a group, the Sid is gener-
As we can see, providing efficient multicasting over ally the source of the group. In case of multiple senders, a Sid
MANET faces many challenges, including dynamic group is selected among the given set of senders. Once a Sid is identi-
membership and constant update of delivery path due to node fied, it sends a NEW-SESSION message to its neighbors. The
movement. In the next sections we cover the major protocols contents of this message includes Sid’s multicast session mem-
proposed so far and compare them under several criteria. ber ID (msm-id) and the routing metrics. Nodes receiving the
NEW-SESSION message generate their own msm-ids, which
are larger than the msm-id of the sender. If a node receives
Multicast Routing Protocols multiple NEW-SESSION messages from different nodes, it
One straightforward way to provide multicast in a MANET is keeps the message with the best routing metrics and calculates
through flooding. With this approach, data packets are sent its msm-ids. To join an ongoing session, a node checks the
throughout the MANET, and every node that receives this NEW-SESSION message, determines a parent with the small-
packet broadcasts it to all its immediate neighbor nodes exact- est msm-id, and unicasts a JOIN-REQ to its potential parent
ly once. It is suggested that in a highly mobile ad hoc network, node. If tge parent node is already in the multicast delivery
flooding of the whole network may be a viable alternative for tree, it replies with a JOIN-ACK. Otherwise, the parent itself
reliable multicast. However, this approach has considerable tries to join the multicast tree by sending a JOIN-REQ to its
EQ
P
shortest hop count to the nearest member of the
RRE
RR
multicast tree for a specified period of time, and
RREQ disregards other routes. At the end of this peri-
od, it enables the selected next hop in its multi-
RREP
Multicast cast route table, and unicasts an activation
receiver Mobile node Control message message (MACT) to this selected next hop. The
next hop, on receiving this message, enables the
entry for the source node in its multicast routing
■ Figure 2. Route discovery in the MAODV protocol. table. If this node is a member of the multicast
tree, it does not propagate the message any fur-
ther. However, if this node is not a member of
parent. If a node is unable to find any potential parent node, the multicast tree, it would have received one or more RREPs
it executes a branch reconstruction (BR) process to rejoin the from its neighbors. It keeps the best next hop for its route to
tree. BR consists of two subroutines. BR1 is executed when a the multicast group, unicasts MACT to that next hop, and
node has a potential parent node for a group (as discussed enables the corresponding entry in its multicast route table.
above). If it does not find any potential parent node, BR2 is This process continues until the node that originated the cho-
executed. In BR2, instead of sending a unicast JOIN_REQ to sen RREP (member of tree) is reached. The activation mes-
a potential parent node, the node broadcasts a JOIN-REQ sage ensures that the multicast tree does not have multiple
that consists of a range field R to specify the nodes till R hops. paths to any tree node. Note that the nodes forward data
Upon link breakage, the node with the larger msm-id tries to packets only along activated routes.
rejoin the tree by executing any of the BR mechanisms. It is The first member of the multicast group becomes the lead-
to be noted that AMRIS detects link disconnection by a bea- er for that group, which also becomes responsible for main-
coning mechanism. Hence, until the tree is reconstructed, taining the multicast group sequence number and broadcasting
packets could possibly be dropped. this number to the multicast group. This update is done
through a Group Hello message. The Group Hello contains
Multicast Ad Hoc On-Demand Distance Vector (MAODV) Proto- extensions that indicate the multicast group IP address and
col — MAODV routing protocol [4] follows directly from uni- sequence numbers (incremented every Group Hello) of all
cast AODV, and discovers multicast routes on demand using multicast groups for which the node is the group leader. Since
a broadcast route discovery mechanism employing the same AODV keeps “hard-state” in its routing table, the protocol
route request (RREQ) and route reply (RREP) messages that has to actively track and react to changes in this tree. If a
exist in the unicast AODV protocol. A mobile node originates member terminates its membership with the group, the multi-
an RREQ message when it wishes to join a multicast group, cast tree requires pruning. Links in the tree are monitored to
or has data to send to a multicast group but does not have a detect link breakages, and the node that is farther from the
route to that group. Only a member of the desired multicast multicast group leader (downstream of the break) takes the
group may respond to a join RREQ. If the RREQ is not a responsibility to repair the broken link. If the tree cannot be
join request, any node with a fresh enough route (based on reconnected, a new leader for the disconnected downstream
group sequence number) to the multicast group may respond. node is chosen as follows. If the node that initiated the route
If an intermediate node receives a join RREQ for a multicast rebuilding is a multicast group member, it becomes the new
group of which it is not a member, or it receives a RREQ and multicast group leader. On the other hand, if it was not a
does not have a route to that group, it rebroadcasts the group member and has only one next hop for the tree, it
RREQ to its neighbors. prunes itself from the tree by sending its next hop a prune
As the RREQ is broadcast across the network, nodes set up message. This continues until a group member is reached.
pointers to establish the reverse route in their route
tables. A node receiving an RREQ first updates its
route table to record the sequence number and the
next hop information for the source node. This n2
reverse route entry may later be used to relay a n2 n1
n1
response back to the source. For join RREQs, an
additional entry is added to the multicast route table n4 S
S n3 n5 n4
n3 n5
and is not activated unless the route is selected to be
part of the multicast tree. If a node receives a join n7
n7
RREQ for a multicast group, it may reply if it is a
member of the multicast group’s tree and its record- n6
n6
n8
ed sequence number for the multicast group is at n8
least as great as that contained in the RREQ. The
responding node updates its route and multicast
route tables by placing the requesting node’s next (a) LGK tree (k = 2) construction (b) LGS tree construction
hop information in the tables, and then unicasts an
RREP back to the source. As nodes along the path ■ Figure 3. Location guided tree construction algorithms.
ry
qu
lower IP address, it can initiate reconnec-
ue
er
ery
y
nq
tion of the multicast tree.
qu
ly
Joi
rep
in
Jo
n
Lightweight Adaptive Multicast — The
Joi
y
Join quer
e ry
Lightweight Adaptive Multicast (LAM) [5]
qu
in
protocol draws on the Core-Based Tree
Jo
(CBT) algorithm[2] and Temporal Order- Multicast
y
pl
Join reply
re
receiver Jo
ing Routing Algorithm (TORA) in order to in ry
in
que
Jo
qu
provide multicast services. Similar to CBT, er Join
y
Joi
it builds a group-shared multicast routing nr
ep
ly ly
tree for each multicast group centered at rep
Join
the CORE. Nodes in LAM maintain two
variables, POTENTIAL-PARENT and Mobile node Control message
PARENT, and two lists, POTENTIAL-
CHILD-LIST and CHILD-LIST. The PAR-
ENT variable is used to remember the ■ Figure 4. Mesh creation in ODMRP.
parent node in the multicast tree. The
CHILD-LIST stores identities of one-hop
children in the multicasting tree. These potential data objects tion if it has any data packets to send. If a node has no data
are used when the node is in a “join” or “rejoin” waiting state. packet to send for an extended period of time, it sends a peri-
Since LAM is based on the CBT approach to building the odic update wherein a null packet is sent with its present geo-
multicast delivery tree, with one CORE to a group, LAM is not metric location.
very robust, especially in a MANET environment. To address
the problem posed by having a single centralized core, Inter- Mesh-Based Approaches
core LAM (IC-LAM) is proposed. IC-LAM is a tunnel-based In contrast to a tree-based approach, mesh-based multicast pro-
protocol connecting multiple cores. By allowing multiple cores, tocols may have multiple paths between any source and receiv-
IC-LAM avoids total group failure due to a single core failure. er pair. Existing studies show that tree-based protocols are not
necessarily best suited for multicast in a MANET where net-
Location Guided Tree Construction Algorithm for Small Group work topology changes frequently. In such an environment,
Multicast — Location Guided Tree (LGT) [6] is a small group mesh-based protocols seem to outperform tree-based proposals
multicast scheme based on packet encapsulation. It builds an due to the availability of alternative paths, which allow multi-
overlay multicast packet distribution tree on top of the under- cast datagrams to be delivered to the receivers even if links fail.
lying unicast routing protocol. Multicast data is encapsulated This section gives an overview of some of the mesh-based
in a unicast packet and transmitted only among the group approaches to provide multicast in a MANET.
nodes. It is based on the construction of two types of tree,
location-guided k-array (LGK) and location-guided Steiner On-Demand Multicast Routing Protocol (ODMRP) — ODMRP
(LGS). The geometric location information of the destination [7] is a mesh-based protocol that uses a forwarding group con-
nodes is utilized to construct the packet distribution tree with- cept (only a subset of nodes forwards the multicast packets).
out knowing the global topology of the network (Fig. 3). It is A soft state approach is taken in ODMRP to maintain multi-
assumed that the longer the geometric distance is, the longer cast group members. No explicit control message is required
the network-level hops to reach the destination will be. There- to leave the group. In ODMRP, group membership and multi-
fore, the algorithm attempts to construct a tree with geometri- cast routes are established and updated by the source on
cally shorter tree edges. The protocol also supports an demand. When a multicast source has packets to send, but no
optimization mechanism through route caching, wherein a route to the multicast group, it broadcasts a Join-Query con-
node can cache the computed route and reuse it the next time trol packet to the entire network. This Join-Query packet is
a new packet comes in with the same set of destinations. periodically broadcast to refresh the membership information
In the LGK tree approach, the sender first selects the nearest and updates routes as depicted in Fig. 4. When an intermedi-
k destinations as children nodes. The sender then groups the ate node receives a Join-Query packet, it stores the source ID
rest of the nodes to its k children according to close geometric and the sequence number in its message cache to detect any
proximity. Once the group nodes are mapped to its correspond- potential duplicate. The routing table is updated with an
ing child nodes, the sender forwards a copy of the encapsulated appropriate node ID (i.e., backward learning) from which the
packet to each of the k children with its corresponding subtree message has been received. If the message is not a duplicate
(subdestination list of group members) as destinations. The pro- and the TTL is greater than zero, it is rebroadcast.
cess stops when an incoming packet has an empty destination When a Join-Query packet reaches a multicast receiver, it
list. In the LGS scheme, based on the geometric distance as a creates and broadcasts a Join-Reply to its neighbors. When a
measurement of closeness, a Steiner tree is constructed that uses node receives a Join-Reply, it checks if the next hop node ID
the multicast group members as tree nodes. of one of the entries matches its own ID. If it does, the node
The protocol uses a hybrid mechanism for location/mem- realizes that it is on the path to the source and thus part of
bership update, which includes in-band and periodic update. the forwarding group, and sets the forwarding group flag
In in-band update, a node always includes its geometric loca- (FG_FLAG). It then broadcasts its own Join-Reply built on
Acknowledgment
This work has been supported by the Ohio Board of Regents
Doctoral Enhancements Funds and the National Science
Foundation under Grant CCR-0013361.
References
[1] D. P. Agrawal and Q-A. Zeng, Introduction to Wireless and Mobile Systems,
Brooks/Cole, 2003.
[2] H. Gossain, C. M. Cordeiro, and D. P. Agrawal, “Multicast: Wired to Wire-
less,” IEEE Commun. Mag., vol. 40, no. 6, June 2002, pp. 116–23.
[3] C. W. Wu, Y.C. Tay, and C.-K. Toh, “Ad Hoc Multicast Routing Protocol Uti-
lizing Increasing id-numberS (AMRIS) Functional Specification,” Internet
draft, Nov. 1998.
[4] E. M. Royer and C. E. Perkins, “Multicast Operation of the Ad Hoc On-
Demand Distance Vector Routing Protocol,” ACM MOBICOM, Aug. 1999,
pp. 207–18.
[5] L. Ji and M. Scott Corson, “A Lightweight Adaptive Multicast Algorithm,”
GLOBECOM 1998, pp. 1036–42.
[6] K. Chen and K. Nahrstedt, “Effective Location-Guided Tree Construction
Algorithms for Small Group Multicast in MANET,” Proc. INFOCOM, 2002,
pp. 1180–89.
[7] M. Gerla, S.-J. Lee, and W. Su. “On-Demand Multicast Routing Protocol
(ODMRP) for Ad Hoc Networks,” Internet draft, draft-ietf-manet-odmrp-
02.txt, 2000.
[8] J. J. Garcia-Luna-Aceves and E.L. Madruga, “The Core-Assisted Mesh Proto-
col,” IEEE JSAC, Aug. 1999, pp. 1380–94.
[9] C.-C. Chiang, M. Gerla, and L. Zhang, “Forwarding Group Multicast Proto-
col (FGMP) for Multihop, Mobile Wireless Networks,” AJ. Cluster Comp,
Special Issue on Mobile Computing, vol. 1, no. 2, 1998, pp. 187–96.
[10] L. Ji, and M. S. Corson, “Differential Destination Multicast — A MANET Multicast
Routing Protocol for Small Groups,” Proc. INFOCOM, 2001, pp. 1192–02.
[11] E. Bommaiah et al., “AMRoute: Adhoc Multicast Routing Protocol,” Internet
draft, Aug. 1998.
[12] P. Sinha, R. Sivakumar, and V. Bharghavan, “MCEDAR: Multicast Core-
Extraction Distributed Ad hoc Routing,” IEEE Wireless Commun. and Net.
Conf., Sept. 1999, pp. 1313–17.
[13] S.-J. Lee et al., “A Performance Comparison Study of Ad Hoc Wireless Mul-
ticast Protocols,” Proc. INFOCOM 2000, Mar. 2000, pp. 565–74.
Biography
CARLOS DE MORAIS CORDEIRO (cordeicm@ececs.uc.edu) received his B.Sc. and
M.Sc. in computer science in 1998 and 2000, respectively, from the Federal
University of Pernambuco, Brazil. He is presently pursuing a Ph.D. degree in
computer science and engineering at the University of Cincinnati where he is a
research assistant in the Center of Distributed and Mobile Computing. His
research interests and papers are mostly in the area of wireless and mobile com-
munications including ad hoc networks, multicast, TCP over wireless, and short-
range radio communication such as Bluetooth. He has prior work experience
with IBM in San Jose, California.