SlideShare a Scribd company logo
1 of 23
Guided By :
Ms. Nibedita Jagadev
Assistant Professor
Dept. of CSE
Introduction
• What are MANETs ?
• Features of MANETs
Routing Protocols
Cluster Based Routing Protocol
• Concept of Clustering
• Cluster Formation
Mechanisms in CBRP
• Routing Process
• Route Discovery
• Route Reply
• Route Error Detection
• Local Route Repair
Features Of CBRP
Conclusion
References
Routing
Protocols in
MANETs
Proactive
Routing
Reactive
Routing
Hybrid
Routing
 Presence of
Updated Routes in
the Routing Table.
 Ex : DSDV
 On-demand
Discovery of
Routes.
 Ex : AODV
 Uses the features
of both proactive
& reactive routing
 Ex : ZRP
 Clustering is a process that divides the network into
interconnected sub-structures called clusters.
 Each cluster has a cluster-head as a coordinator within the
sub-structure, which acts as a medium for data transfer
between the nodes.
 Cluster heads communicate with each other by using
gateway nodes.
 The Gateway node has two or more cluster heads as its
neighbors or— when the clusters are disjoint—at least one
cluster head and another gateway node.
Cluster Based Routing Protocol
Figure 1 : Different States in which a Node can Exist
• A node elects itself as the cluster head if
it has the lowest/highest ID in its
neighborhood. (Lowest-Id Heuristic)
Identifier-
based
Clustering
• The node, which has the most neighbor
nodes, is elected as the cluster head.
(Highest Degree Heuristic)
Connectivity
-based
Clustering
Cluster formation takes place using two mechanisms :
 CBRP uses two data structures to support the routing
process:
1) The Cluster Adjacency Table (CAT) - The CAT stores
information about neighboring clusters, i.e. whether the
links are bi-directional or unidirectional.
2) The Two-Hop Topology Database - The two-hop
topology database contains all nodes that are at most two
hops away.
 The routing process works in two steps:
1) Discovery of a route from a source node ‘S’ to a
destination node ‘D’.
2) Actual transmission of the data packets.
• In CBRP only cluster heads are flooded with route request
package (RREQ). Gateway nodes receive the RREQs and
forward them to the next cluster head.
• Initially, the source node ‘S’ broadcasts a RREQ with unique
ID containing the address of the destination node ‘D’.
• When a node ‘N’ receives a RREQ it does the following:
a) If ‘N’ is Gateway Node -> Forwards the RREQ to the
next Cluster head ‘C’.
b) If ‘N’ is Cluster Head -> Checks whether ‘D’ is a
neighbor or is two-hops away from it. It then sends the
RREQ to ‘D’. Else broadcasts it to the neighboring
Cluster head.
[3]
[3,1,8,11]
1
2
4
5
6 7
8
9
10
11
3 (S)
11 (D)
[3,1]
[3,1,6]
[3,1,8]
Example :
Source Node-[3]
Destination Node-[11]
Route Discovered- [3,1,8,11]
C. Route Reply
If the RREQ reaches the destination node ‘D’, it contains
the path called as “loose source route”, [S,C1,C2,...,Ck,D].
‘D’ sends a Route Reply message (RREP) back to S using
the reversed loose source route [D, Ck,...,C1,S], i.e. RREP
is sent back to source along reversed loose source route of
cluster heads.
Every time a cluster head receives this RREP it computes
a strict source route, which then consists only of nodes that
form the shortest path within each cluster.
Example :
Source Node-[3]
Destination Node-[11]
Loose Source Route of
RREP- [11,8,1,3]
Strict Source Route of
RREP- [11,9,4,3]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
[11][11,9]
[11,9,4]
[11,9,4,3]
Example :
Source Node-[3]
Destination Node-[11]
Loose Source Route of
RREP- [11,8,1,3]
Strict Source Route of
RREP- [11,9,4,3]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
D. Route Error Detection
After determining the route, source routing is used for actual
packet transmission.
A forwarding node sends a Route Error Message (ERR) to
packet source if the next hop in source route is unreachable.
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example:
Source route header of data
packet: [3,4,9,11]
Route error (ERR)
down link: [9->11]
E. Local Route Repair
 Objective
 Increase Packet Delivery Ratio.
 Save Route Rediscovery flooding traffic.
 Reduce overall route acquisition delay.
 A forwarding node repairs a broken route using its 2-
hop-topology information and then modifies the source
route header accordingly.
 Destination node sends a Gratuitous Route Reply to
inform source of the modified route.
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example :
Source route header of Data
Packet : [3,4,9,11]
Route error (ERR)
down link : [9->11]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example :
Source route header of Data
Packet : [3,4,9,11]
Modified source route:
[3,4,9,8,11]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example :
Source route header of Data
Packet : [3,4,9,11]
Gratuitous route reply :
[3,4,9,8,11]
MANET Routing Protocols CBRP Guide
MANET Routing Protocols CBRP Guide
MANET Routing Protocols CBRP Guide
MANET Routing Protocols CBRP Guide

More Related Content

What's hot

Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
334839757 task-assignment
334839757 task-assignment334839757 task-assignment
334839757 task-assignmentsachinmore76
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using PythonKarim Sonbol
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layersjayaprakash
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)FabMinds
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocolasimnawaz54
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets myrajendra
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]MithunPChandra
 
11. grid scheduling and resource managament
11. grid scheduling and resource managament11. grid scheduling and resource managament
11. grid scheduling and resource managamentDr Sandeep Kumar Poonia
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Chord Algorithm
Chord AlgorithmChord Algorithm
Chord AlgorithmSijia Lyu
 

What's hot (20)

AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
334839757 task-assignment
334839757 task-assignment334839757 task-assignment
334839757 task-assignment
 
Network programming Using Python
Network programming Using PythonNetwork programming Using Python
Network programming Using Python
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Design issues for the layers
Design issues for the layersDesign issues for the layers
Design issues for the layers
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Introduction for internet connectivity (IoT)
 Introduction for internet connectivity (IoT) Introduction for internet connectivity (IoT)
Introduction for internet connectivity (IoT)
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
5. icmp
5. icmp5. icmp
5. icmp
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]Fast detection of transformed data leaks[mithun_p_c]
Fast detection of transformed data leaks[mithun_p_c]
 
Transport layer protocols : TCP and UDP
Transport layer protocols  : TCP and UDPTransport layer protocols  : TCP and UDP
Transport layer protocols : TCP and UDP
 
Network layer u3
Network  layer u3Network  layer u3
Network layer u3
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
DHCP
DHCPDHCP
DHCP
 
11. grid scheduling and resource managament
11. grid scheduling and resource managament11. grid scheduling and resource managament
11. grid scheduling and resource managament
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Chord Algorithm
Chord AlgorithmChord Algorithm
Chord Algorithm
 

Similar to MANET Routing Protocols CBRP Guide

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksSonali Parab
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 

Similar to MANET Routing Protocols CBRP Guide (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
CBRP
CBRPCBRP
CBRP
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
C 16
C 16C 16
C 16
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

MANET Routing Protocols CBRP Guide

  • 1. Guided By : Ms. Nibedita Jagadev Assistant Professor Dept. of CSE
  • 2. Introduction • What are MANETs ? • Features of MANETs Routing Protocols Cluster Based Routing Protocol • Concept of Clustering • Cluster Formation Mechanisms in CBRP • Routing Process • Route Discovery • Route Reply • Route Error Detection • Local Route Repair Features Of CBRP Conclusion References
  • 3.
  • 4. Routing Protocols in MANETs Proactive Routing Reactive Routing Hybrid Routing  Presence of Updated Routes in the Routing Table.  Ex : DSDV  On-demand Discovery of Routes.  Ex : AODV  Uses the features of both proactive & reactive routing  Ex : ZRP
  • 5.  Clustering is a process that divides the network into interconnected sub-structures called clusters.  Each cluster has a cluster-head as a coordinator within the sub-structure, which acts as a medium for data transfer between the nodes.  Cluster heads communicate with each other by using gateway nodes.  The Gateway node has two or more cluster heads as its neighbors or— when the clusters are disjoint—at least one cluster head and another gateway node. Cluster Based Routing Protocol
  • 6. Figure 1 : Different States in which a Node can Exist
  • 7. • A node elects itself as the cluster head if it has the lowest/highest ID in its neighborhood. (Lowest-Id Heuristic) Identifier- based Clustering • The node, which has the most neighbor nodes, is elected as the cluster head. (Highest Degree Heuristic) Connectivity -based Clustering Cluster formation takes place using two mechanisms :
  • 8.
  • 9.  CBRP uses two data structures to support the routing process: 1) The Cluster Adjacency Table (CAT) - The CAT stores information about neighboring clusters, i.e. whether the links are bi-directional or unidirectional. 2) The Two-Hop Topology Database - The two-hop topology database contains all nodes that are at most two hops away.  The routing process works in two steps: 1) Discovery of a route from a source node ‘S’ to a destination node ‘D’. 2) Actual transmission of the data packets.
  • 10. • In CBRP only cluster heads are flooded with route request package (RREQ). Gateway nodes receive the RREQs and forward them to the next cluster head. • Initially, the source node ‘S’ broadcasts a RREQ with unique ID containing the address of the destination node ‘D’. • When a node ‘N’ receives a RREQ it does the following: a) If ‘N’ is Gateway Node -> Forwards the RREQ to the next Cluster head ‘C’. b) If ‘N’ is Cluster Head -> Checks whether ‘D’ is a neighbor or is two-hops away from it. It then sends the RREQ to ‘D’. Else broadcasts it to the neighboring Cluster head.
  • 11. [3] [3,1,8,11] 1 2 4 5 6 7 8 9 10 11 3 (S) 11 (D) [3,1] [3,1,6] [3,1,8] Example : Source Node-[3] Destination Node-[11] Route Discovered- [3,1,8,11]
  • 12. C. Route Reply If the RREQ reaches the destination node ‘D’, it contains the path called as “loose source route”, [S,C1,C2,...,Ck,D]. ‘D’ sends a Route Reply message (RREP) back to S using the reversed loose source route [D, Ck,...,C1,S], i.e. RREP is sent back to source along reversed loose source route of cluster heads. Every time a cluster head receives this RREP it computes a strict source route, which then consists only of nodes that form the shortest path within each cluster.
  • 13. Example : Source Node-[3] Destination Node-[11] Loose Source Route of RREP- [11,8,1,3] Strict Source Route of RREP- [11,9,4,3] 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) [11][11,9] [11,9,4] [11,9,4,3]
  • 14. Example : Source Node-[3] Destination Node-[11] Loose Source Route of RREP- [11,8,1,3] Strict Source Route of RREP- [11,9,4,3] 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D)
  • 15. D. Route Error Detection After determining the route, source routing is used for actual packet transmission. A forwarding node sends a Route Error Message (ERR) to packet source if the next hop in source route is unreachable. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example: Source route header of data packet: [3,4,9,11] Route error (ERR) down link: [9->11]
  • 16. E. Local Route Repair  Objective  Increase Packet Delivery Ratio.  Save Route Rediscovery flooding traffic.  Reduce overall route acquisition delay.  A forwarding node repairs a broken route using its 2- hop-topology information and then modifies the source route header accordingly.  Destination node sends a Gratuitous Route Reply to inform source of the modified route.
  • 17. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example : Source route header of Data Packet : [3,4,9,11] Route error (ERR) down link : [9->11]
  • 18. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example : Source route header of Data Packet : [3,4,9,11] Modified source route: [3,4,9,8,11]
  • 19. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example : Source route header of Data Packet : [3,4,9,11] Gratuitous route reply : [3,4,9,8,11]