SlideShare ist ein Scribd-Unternehmen logo
1 von 66
Routing in MANET
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad-Hoc Introduction ,[object Object],[object Object],[object Object],Infrastr-ucture Ad-Hoc Infrastructure  Ad-Hoc Need connect to Ethernet Not need Base station single -hop multi -hop Central Control Distributed routing Cost  high Cost  low Construct  slow Construct  fast Time synchronization  easy Time synchronization  tough
Ad-Hoc Development
MANET(Mobile Ad-Hoc Network) Features
MANET Application
MANET Issue
MANET Routing Protocol(1/2)
MANET Routing Protocol(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance Vector Protocol(DSDV) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance Vector Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
The Forwarding Routing Table ,[object Object],[object Object],[object Object],[object Object],[object Object],Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH2 2 S406_MH1 T001MH4 Ptr1_MH1 MH2 MH2 1 S128_MH2 T001MH4 Ptr1_MH2 MH3 MH2 2 S564_MH3 T001MH4 Ptr1_MH3 MH4 MH4 0 S710_MH4 T001MH4 Ptr1_MH4 Etc.
Route Selection ,[object Object],[object Object],[object Object],[object Object]
Rules to set sequence number Information ,[object Object],[object Object],[object Object],[object Object],[object Object],Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH1 1 S406_MH1 T001MH2 Ptr1_MH1 MH2 MH2 0 S128_MH2 T001MH2 Ptr1_MH2 MH3 MH3  S561_MH3 T001MH2 Ptr1_MH3 MH4 MH4 1 S710_MH4 T001MH2 Ptr1_MH4 Etc.
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4  Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 1 ,[object Object],[object Object],[object Object]
Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4  advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
Adjustment in carried information ,[object Object],[object Object],[object Object],[object Object],[object Object]
Receiving Fluctuating Routes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Damping Fluctuation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Settling Time Table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DSDV Disadvantages and Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unidirectional and Bi-directional links A B C D
DSDV Disadvantages and Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) ,[object Object],Ad-hoc On-Demand Distance Vector Routing ECE697A Advanced Computer Networks Presented by Qifeng Lu Scalable AODV with Efficient Flooding based on On-Demand (Passive) Clustering Yunjung Yi and Mario Gerla University of California, Los Angeles
Outline ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AODV  Features V.S. DSDV Routes   are created  only when required Each node  doesn’t maintain all routes  to other nodes (only active routes) Use of  sequence numbers  at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses  symmetric links  (if a link is not symmetric it is not up) Works both on wired media and wireless media
AODV Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object]
Path Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
Route Discovery(2/2) ,[object Object],RREP RREP source_addr hop_cnt dest_addr source_sequence_# lifetime (expiration time for reverse path route entry)
Reverse Path Setup ,[object Object],S D RREP (Route Reply) RREQ (Route Request) Drop ClusterHead Gateway Ordinary Node
Forward Path Setup ,[object Object],sequence number = 99 sequence number = 101 REEQ  sequence number = 100 A C B D T^T  Send  RREQ =V=  Send  RREP Unicast
Route Table Management ,[object Object],[object Object],A B C D RERR
AODV with Efficient Flooding ,[object Object],[object Object],[object Object],[object Object],[object Object],S D ClusterHead Gateway Ordinary Node
Dynamic Source Routing  (DSR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Source Routing (DSR) ,[object Object],[object Object],[object Object]
Two Main Components ,[object Object],[object Object],[object Object],[object Object]
Route Discovery(1/13) ,[object Object],[object Object]
Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
Route Discovery(3/13) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(4/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y]  Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
Route Discovery(6/13) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
Route Discovery(8/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source Address Request ID
Route Discovery(9/13) ,[object Object],[object Object],[S,C,G] [S,E,F] [S,B,A] [S,B,H] B A S E F H J D C G I K Z Y M N L
Route Discovery(10/13) J  and  K  both broadcast RREQ to  D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
Route Discovery(11/13) D   does not forward  RREQ, because  D  is the  intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
Route Discovery(12/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
Route Maintenance(1/6) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
Route Maintenance(3/6) ,[object Object],[object Object],[object Object],[object Object]
Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
Route Maintenance(5/6) ,[object Object],[object Object]
Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
DSR vs. AODV AODV DSR Path  Information Limited  information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of  route path New We don’t know Delete invalid path when RRER Delete all  Only delete some node
Hybrid Protocol  ,[object Object],[object Object],[object Object],Routing Zone Inter-Zone Routing Intra-Zone Routing On-Demand Table-Driven
Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined  when needed Depend on  the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used  inside each zone , or between gateways Handling effects of mobility Usually  updates  occur at fixed  intervals. AODV,DSR uses local  route discovery  Usually  more than one path  maybe available. Single point of failures are reduced by working as a group
Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required.  Usually lower than proactive protocols  Usually  depends on the size of each cluster or zone  may become as large as proactive protocols if clusters are big Delay level Small  routes are predetermined  Higher  than proactive For local destinations small.  Inter-zone maybe  as large as  reactive protocols  Scalability level Usually up to  100  nodes.  Source routing protocols up to  few hundred  nodes. Designed for up to  1000 or more  nodes
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q&A ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
3. the-wireless-channel-2
3. the-wireless-channel-23. the-wireless-channel-2
3. the-wireless-channel-2Naga Sirisha
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 
Handoff and its type
Handoff and its typeHandoff and its type
Handoff and its typeSHIVANI SONI
 

Was ist angesagt? (20)

Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
3. the-wireless-channel-2
3. the-wireless-channel-23. the-wireless-channel-2
3. the-wireless-channel-2
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Handoff and its type
Handoff and its typeHandoff and its type
Handoff and its type
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Grayhole
GrayholeGrayhole
Grayhole
 

Andere mochten auch

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 

Andere mochten auch (20)

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Manet
ManetManet
Manet
 
MANET
MANETMANET
MANET
 
Manet
ManetManet
Manet
 

Ähnlich wie Routing Protocols in MANET

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsDharunMagil
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.pptImXaib
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 

Ähnlich wie Routing Protocols in MANET (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
A41040105
A41040105A41040105
A41040105
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
networking
networkingnetworking
networking
 
Routing
RoutingRouting
Routing
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
F41023946
F41023946F41023946
F41023946
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 

Kürzlich hochgeladen

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Kürzlich hochgeladen (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

Routing Protocols in MANET

  • 2.
  • 3.
  • 9.
  • 10.
  • 11.
  • 12. Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
  • 13.
  • 14.
  • 15.
  • 16. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
  • 17. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4 Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
  • 18.
  • 19. Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4 advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. AODV Features V.S. DSDV Routes are created only when required Each node doesn’t maintain all routes to other nodes (only active routes) Use of sequence numbers at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses symmetric links (if a link is not symmetric it is not up) Works both on wired media and wireless media
  • 31.
  • 32.
  • 33. Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
  • 44.
  • 45.
  • 46. Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y] Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
  • 47.
  • 48. Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
  • 49.
  • 50.
  • 51. Route Discovery(10/13) J and K both broadcast RREQ to D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 52. Route Discovery(11/13) D does not forward RREQ, because D is the intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
  • 53.
  • 54. Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
  • 55.
  • 56. Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
  • 57.
  • 58. Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
  • 59.
  • 60. Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 61. DSR vs. AODV AODV DSR Path Information Limited information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of route path New We don’t know Delete invalid path when RRER Delete all Only delete some node
  • 62.
  • 63. Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined when needed Depend on the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used inside each zone , or between gateways Handling effects of mobility Usually updates occur at fixed intervals. AODV,DSR uses local route discovery Usually more than one path maybe available. Single point of failures are reduced by working as a group
  • 64. Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required. Usually lower than proactive protocols Usually depends on the size of each cluster or zone may become as large as proactive protocols if clusters are big Delay level Small routes are predetermined Higher than proactive For local destinations small. Inter-zone maybe as large as reactive protocols Scalability level Usually up to 100 nodes. Source routing protocols up to few hundred nodes. Designed for up to 1000 or more nodes
  • 65.
  • 66.