SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CONTENTS
 Introduction
 What are MANETs?
 MANET protocols
 Reactive vs. Proactive Ad Hoc routing protocols
 Reactive Routing Protocol
 Proactive Routing Protocol
 Comparision simulation
 Conclusion
 References
 An autonomous system of mobile routers connected by wireless
links.
 The routers are free to move randomly and organize
themselves arbitrarily.
 A MANET is a wireless mobile network that is self-forming, self
maintained, and self-healing.
 Nodes stay connected even as the network topology changes.
 Each node needs to act as a router to relay packets to nodes
out of direct communication range.
Introduction
Mobile Ad-Hoc Networks
 A Collections of mobile nodes
dynamically forming a
temporary network.
 Nodes are arbitrarely located.
 Each node in a network
acts as a router.
 Goal: Correct
and efficient route
establishment to facilitate
communication.
Characteristic
s Dynamic topology.
 Variable capacity links.
 Energy-constrained mobile nodes.
 Weakened physical security.
Why traditional protocols are not suitable for
MANETs?
No pre-existing infrastructure.
Variable capacity links.
Dynamic topologies.
Limited physical security.
MANETs Use
 For military and rescue use.
 Internet / intranet hot spots in public transportation.
 Information distribution for meetings, seminars etc.
 New mobile devices are invented constantly and used
various ways.
MANET
Protocols
Ad-Hoc Routing Protocols
Reactive Proactive
TBRPF DSDVAODV DSR
DSR
 Designed for multihop wireless
ad-hoc networks.
 Two major phases:
 Route discovery :
used to discover new source
routes across multiple
network hops destinations
in an ad-hoc network
 Route Maintainance:
 When a node receives a Route-Request, it first searches its route
cache for the target node.
 If route is found, the node can send a Route-Reply to the initiator.
 Preventing Route-Reply storms:
To avoid storms, the DSR uses a random delay before a node
can send a Route-Reply.
d = H * (h – 1 + r)
• H, small const. Delay
• h, number of hops is source route
• r, 0 or 1
AODV
 An embedded MANET protocol
 works dynamically to establish and maintain routes
 AODV algorithm enables dynamic, self-starting, multihop routing
between participating mobile nodes
 AODV allows mobile nodes
 obtain routes quickly for new destinations.
 respond to link breakages
 changes in network topology in a timely manner.
Messages for route discovery
 Message types defined by AODV are
 RREQs
 RREPs
 RERRs
 Route Creation:
 When a source node does not have a route for a required destination.
 AODV initiates a route request/route reply cycle by broadcasting a
route request (RREQ) packet across the wireless network.
 Route Deletion:
 A route will remain active as long as data continues to travel across
the route
 If a route becomes inactive for a period of time, the route will be
deleted.
 Sequence Numbers:
 To avoid routing loops and to measure the “freshness” of route
information
DSDV
 Developed at the IBM, in 1996.
 Uses the modified Bellman-Ford algorithm.
 This is a Proactive Routing protocol, where the route is always
available.
 Operation:
 Mobile nodes maintain routes to all possible destinations.
 Hop counts are used as routing metrics.
 The node assigns sequence numbers to distance vector updates.
which updates contain information about the neighbors.
TBRPF
 Provides hop-by-hop routing
along shortest paths to each
destination.
 Using a modification of
Dijkstra's algorithm,each
node computes a source
tree.
 Two main modules:
 neighbor discovery module
 routing module.
 Neighbor Discovery:
 TND protocol allows each node i to quickly detect the neighbor nodes
j such that ij and ji exists.
 Nodes with multiple interfaces run TND separately on each interface
 Routing Module:
 Each node reports only part of its source tree to neighbors.
 Each node reports RT to neighbors in periodic topology updates
and reports changes to RT in more frequent differential updates
 Periodic updates inform new neighbors of RT
 Differential updates ensure the fast propagation of each topology
update to all nodes that are affected by the update.
Comparison Simulations
 Features of protocols:
AODV DSR TBRPF
Loop-freedom Yes Yes No
Multiple routes No Yes Possible
Unidirectional link
support
Possible Yes No
Multicast Possible No No
Periodic Broadcast Possible No Yes
Maximum No. of nodes <100 200 <200
Expiration of routing info. Yes No Yes
Category Reactive Reactive Proactive
Summarizing the results
a) Low mobility, low traffic
AODV
DSR TBRPF
Packet
delivery ratio
High High High
End to end
delay
Middle Middle Middle
Routing
overhead
Low Low Middle
Path
optimality
Middle Middle Very
good
b) High mobility, High traffic
AODV
DSR TBRPF
Packet
delivery ratio
Middle Middle High
End to end
delay
Middle Middle Middle
Routing
overhead
Very
High
Middle Middle
Path
optimality
Middle Low Good
Problems of the particular
protocols AODV
 uses more, but smaller routing control packets
 worse for a higher load.
 DSR has some problems concerning the cache usage:
 multiple routing
 the source-routing principle
 TBRPF
 packet loss, waste of bandwidth and causes other
problems.
Conclusion
 protocol max throughput
 DSDV small sized
 DSR medium sized
 AODV large sized
 fundamental questions to answer
 Scalability?
 Energy efficiency?
 Security?
 Combination of physical, data-link and network layer?
References
Websites:
 http://www.ietf.org/rfc/rfc3561.txt
 http://www.isi.edu/
 http://www.cs.technion.ac.il/
Books:
 Bertsekas, D. and R. Gallager, "Data
Networks, Prentice-Hall", 1
Ad hoc
Ad hoc

Weitere ähnliche Inhalte

Was ist angesagt?

proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisonsITM Universe - Vadodara
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
survey of manet protocols
survey of manet protocolssurvey of manet protocols
survey of manet protocolsIIIT Jaganathan
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETPrasanta kumr Manohari
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc NetworksKishan Patel
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc networkSubiya Nadar
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalVIKASH MAINANWAL
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case studyRehan Hattab
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Senthil Kanth
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 

Was ist angesagt? (20)

proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
survey of manet protocols
survey of manet protocolssurvey of manet protocols
survey of manet protocols
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Manet
ManetManet
Manet
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash Maianwal
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 

Andere mochten auch

Andere mochten auch (10)

Habit #1 - Be Proactive
Habit #1 - Be ProactiveHabit #1 - Be Proactive
Habit #1 - Be Proactive
 
Dynamics of Behavior in Organizations
Dynamics of Behavior in OrganizationsDynamics of Behavior in Organizations
Dynamics of Behavior in Organizations
 
Proactive Selling Presentation
Proactive Selling PresentationProactive Selling Presentation
Proactive Selling Presentation
 
Chapter 1 the dynamics of people and organizations
Chapter 1 the dynamics of people and organizations Chapter 1 the dynamics of people and organizations
Chapter 1 the dynamics of people and organizations
 
Proactive vs reactive
Proactive vs reactiveProactive vs reactive
Proactive vs reactive
 
Proactive vs reactive
Proactive vs reactiveProactive vs reactive
Proactive vs reactive
 
Habit 1 Be Proactive Stephen Covey
Habit 1   Be Proactive Stephen CoveyHabit 1   Be Proactive Stephen Covey
Habit 1 Be Proactive Stephen Covey
 
Proactivity and How to be Proactive
Proactivity and How to be ProactiveProactivity and How to be Proactive
Proactivity and How to be Proactive
 
Organizational Change and Development
Organizational Change and DevelopmentOrganizational Change and Development
Organizational Change and Development
 
ORGANIZATIONAL CHANGE
ORGANIZATIONAL CHANGEORGANIZATIONAL CHANGE
ORGANIZATIONAL CHANGE
 

Ähnlich wie Ad hoc

Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptxpriyam219327
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptxSujit833143
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.JohnWilson47710
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...IOSR Journals
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 

Ähnlich wie Ad hoc (20)

Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
Mane ts
Mane tsMane ts
Mane ts
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Manet ppt
Manet pptManet ppt
Manet ppt
 

Mehr von Shiva Krishna Chandra Shekar (20)

Airtel final
Airtel finalAirtel final
Airtel final
 
Airtel COMPNAY
Airtel COMPNAYAirtel COMPNAY
Airtel COMPNAY
 
Microsoft data access components
Microsoft data access componentsMicrosoft data access components
Microsoft data access components
 
Ldap
LdapLdap
Ldap
 
L2tp1
L2tp1L2tp1
L2tp1
 
Ivrs
IvrsIvrs
Ivrs
 
Ip sec
Ip secIp sec
Ip sec
 
I pod
I podI pod
I pod
 
Internet
InternetInternet
Internet
 
Image compression
Image compressionImage compression
Image compression
 
Hyper thread technology
Hyper thread technologyHyper thread technology
Hyper thread technology
 
Raju html
Raju htmlRaju html
Raju html
 
Raju
RajuRaju
Raju
 
Dba
DbaDba
Dba
 
Di splay systems
Di splay systemsDi splay systems
Di splay systems
 
Ananth3
Ananth3Ananth3
Ananth3
 
Ppt
PptPpt
Ppt
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Ananth1
Ananth1Ananth1
Ananth1
 
Virtual instrumentation
Virtual instrumentationVirtual instrumentation
Virtual instrumentation
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Ad hoc

  • 1.
  • 2. CONTENTS  Introduction  What are MANETs?  MANET protocols  Reactive vs. Proactive Ad Hoc routing protocols  Reactive Routing Protocol  Proactive Routing Protocol  Comparision simulation  Conclusion  References
  • 3.  An autonomous system of mobile routers connected by wireless links.  The routers are free to move randomly and organize themselves arbitrarily.  A MANET is a wireless mobile network that is self-forming, self maintained, and self-healing.  Nodes stay connected even as the network topology changes.  Each node needs to act as a router to relay packets to nodes out of direct communication range. Introduction
  • 4. Mobile Ad-Hoc Networks  A Collections of mobile nodes dynamically forming a temporary network.  Nodes are arbitrarely located.  Each node in a network acts as a router.  Goal: Correct and efficient route establishment to facilitate communication.
  • 5. Characteristic s Dynamic topology.  Variable capacity links.  Energy-constrained mobile nodes.  Weakened physical security. Why traditional protocols are not suitable for MANETs? No pre-existing infrastructure. Variable capacity links. Dynamic topologies. Limited physical security.
  • 6. MANETs Use  For military and rescue use.  Internet / intranet hot spots in public transportation.  Information distribution for meetings, seminars etc.  New mobile devices are invented constantly and used various ways.
  • 8. DSR  Designed for multihop wireless ad-hoc networks.  Two major phases:  Route discovery : used to discover new source routes across multiple network hops destinations in an ad-hoc network
  • 9.  Route Maintainance:  When a node receives a Route-Request, it first searches its route cache for the target node.  If route is found, the node can send a Route-Reply to the initiator.  Preventing Route-Reply storms: To avoid storms, the DSR uses a random delay before a node can send a Route-Reply. d = H * (h – 1 + r) • H, small const. Delay • h, number of hops is source route • r, 0 or 1
  • 10. AODV  An embedded MANET protocol  works dynamically to establish and maintain routes  AODV algorithm enables dynamic, self-starting, multihop routing between participating mobile nodes  AODV allows mobile nodes  obtain routes quickly for new destinations.  respond to link breakages  changes in network topology in a timely manner.
  • 11. Messages for route discovery  Message types defined by AODV are  RREQs  RREPs  RERRs
  • 12.  Route Creation:  When a source node does not have a route for a required destination.  AODV initiates a route request/route reply cycle by broadcasting a route request (RREQ) packet across the wireless network.  Route Deletion:  A route will remain active as long as data continues to travel across the route  If a route becomes inactive for a period of time, the route will be deleted.  Sequence Numbers:  To avoid routing loops and to measure the “freshness” of route information
  • 13. DSDV  Developed at the IBM, in 1996.  Uses the modified Bellman-Ford algorithm.  This is a Proactive Routing protocol, where the route is always available.  Operation:  Mobile nodes maintain routes to all possible destinations.  Hop counts are used as routing metrics.  The node assigns sequence numbers to distance vector updates. which updates contain information about the neighbors.
  • 14. TBRPF  Provides hop-by-hop routing along shortest paths to each destination.  Using a modification of Dijkstra's algorithm,each node computes a source tree.  Two main modules:  neighbor discovery module  routing module.
  • 15.  Neighbor Discovery:  TND protocol allows each node i to quickly detect the neighbor nodes j such that ij and ji exists.  Nodes with multiple interfaces run TND separately on each interface  Routing Module:  Each node reports only part of its source tree to neighbors.  Each node reports RT to neighbors in periodic topology updates and reports changes to RT in more frequent differential updates  Periodic updates inform new neighbors of RT  Differential updates ensure the fast propagation of each topology update to all nodes that are affected by the update.
  • 16. Comparison Simulations  Features of protocols: AODV DSR TBRPF Loop-freedom Yes Yes No Multiple routes No Yes Possible Unidirectional link support Possible Yes No Multicast Possible No No Periodic Broadcast Possible No Yes Maximum No. of nodes <100 200 <200 Expiration of routing info. Yes No Yes Category Reactive Reactive Proactive
  • 17. Summarizing the results a) Low mobility, low traffic AODV DSR TBRPF Packet delivery ratio High High High End to end delay Middle Middle Middle Routing overhead Low Low Middle Path optimality Middle Middle Very good b) High mobility, High traffic AODV DSR TBRPF Packet delivery ratio Middle Middle High End to end delay Middle Middle Middle Routing overhead Very High Middle Middle Path optimality Middle Low Good
  • 18. Problems of the particular protocols AODV  uses more, but smaller routing control packets  worse for a higher load.  DSR has some problems concerning the cache usage:  multiple routing  the source-routing principle  TBRPF  packet loss, waste of bandwidth and causes other problems.
  • 19. Conclusion  protocol max throughput  DSDV small sized  DSR medium sized  AODV large sized  fundamental questions to answer  Scalability?  Energy efficiency?  Security?  Combination of physical, data-link and network layer?
  • 20. References Websites:  http://www.ietf.org/rfc/rfc3561.txt  http://www.isi.edu/  http://www.cs.technion.ac.il/ Books:  Bertsekas, D. and R. Gallager, "Data Networks, Prentice-Hall", 1