SlideShare ist ein Scribd-Unternehmen logo
1 von 66
Routing in MANET
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad-Hoc Introduction ,[object Object],[object Object],[object Object],Infrastr-ucture Ad-Hoc Infrastructure  Ad-Hoc Need connect to Ethernet Not need Base station single -hop multi -hop Central Control Distributed routing Cost  high Cost  low Construct  slow Construct  fast Time synchronization  easy Time synchronization  tough
Ad-Hoc Development
MANET(Mobile Ad-Hoc Network) Features
MANET Application
MANET Issue
MANET Routing Protocol(1/2)
MANET Routing Protocol(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance Vector Protocol(DSDV) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance Vector Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
The Forwarding Routing Table ,[object Object],[object Object],[object Object],[object Object],[object Object],Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH2 2 S406_MH1 T001MH4 Ptr1_MH1 MH2 MH2 1 S128_MH2 T001MH4 Ptr1_MH2 MH3 MH2 2 S564_MH3 T001MH4 Ptr1_MH3 MH4 MH4 0 S710_MH4 T001MH4 Ptr1_MH4 Etc.
Route Selection ,[object Object],[object Object],[object Object],[object Object]
Rules to set sequence number Information ,[object Object],[object Object],[object Object],[object Object],[object Object],Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH1 1 S406_MH1 T001MH2 Ptr1_MH1 MH2 MH2 0 S128_MH2 T001MH2 Ptr1_MH2 MH3 MH3  S561_MH3 T001MH2 Ptr1_MH3 MH4 MH4 1 S710_MH4 T001MH2 Ptr1_MH4 Etc.
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4  Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 1 ,[object Object],[object Object],[object Object]
Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4  advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
Adjustment in carried information ,[object Object],[object Object],[object Object],[object Object],[object Object]
Receiving Fluctuating Routes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Damping Fluctuation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Settling Time Table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DSDV Disadvantages and Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unidirectional and Bi-directional links A B C D
DSDV Disadvantages and Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) ,[object Object],Ad-hoc On-Demand Distance Vector Routing ECE697A Advanced Computer Networks Presented by Qifeng Lu Scalable AODV with Efficient Flooding based on On-Demand (Passive) Clustering Yunjung Yi and Mario Gerla University of California, Los Angeles
Outline ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AODV  Features V.S. DSDV Routes   are created  only when required Each node  doesn’t maintain all routes  to other nodes (only active routes) Use of  sequence numbers  at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses  symmetric links  (if a link is not symmetric it is not up) Works both on wired media and wireless media
AODV Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object]
Path Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
Route Discovery(2/2) ,[object Object],RREP RREP source_addr hop_cnt dest_addr source_sequence_# lifetime (expiration time for reverse path route entry)
Reverse Path Setup ,[object Object],S D RREP (Route Reply) RREQ (Route Request) Drop ClusterHead Gateway Ordinary Node
Forward Path Setup ,[object Object],sequence number = 99 sequence number = 101 REEQ  sequence number = 100 A C B D T^T  Send  RREQ =V=  Send  RREP Unicast
Route Table Management ,[object Object],[object Object],A B C D RERR
AODV with Efficient Flooding ,[object Object],[object Object],[object Object],[object Object],[object Object],S D ClusterHead Gateway Ordinary Node
Dynamic Source Routing  (DSR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Source Routing (DSR) ,[object Object],[object Object],[object Object]
Two Main Components ,[object Object],[object Object],[object Object],[object Object]
Route Discovery(1/13) ,[object Object],[object Object]
Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
Route Discovery(3/13) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(4/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y]  Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
Route Discovery(6/13) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
Route Discovery(8/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source Address Request ID
Route Discovery(9/13) ,[object Object],[object Object],[S,C,G] [S,E,F] [S,B,A] [S,B,H] B A S E F H J D C G I K Z Y M N L
Route Discovery(10/13) J  and  K  both broadcast RREQ to  D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
Route Discovery(11/13) D   does not forward  RREQ, because  D  is the  intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
Route Discovery(12/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
Route Maintenance(1/6) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
Route Maintenance(3/6) ,[object Object],[object Object],[object Object],[object Object]
Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
Route Maintenance(5/6) ,[object Object],[object Object]
Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
DSR vs. AODV AODV DSR Path  Information Limited  information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of  route path New We don’t know Delete invalid path when RRER Delete all  Only delete some node
Hybrid Protocol  ,[object Object],[object Object],[object Object],Routing Zone Inter-Zone Routing Intra-Zone Routing On-Demand Table-Driven
Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined  when needed Depend on  the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used  inside each zone , or between gateways Handling effects of mobility Usually  updates  occur at fixed  intervals. AODV,DSR uses local  route discovery  Usually  more than one path  maybe available. Single point of failures are reduced by working as a group
Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required.  Usually lower than proactive protocols  Usually  depends on the size of each cluster or zone  may become as large as proactive protocols if clusters are big Delay level Small  routes are predetermined  Higher  than proactive For local destinations small.  Inter-zone maybe  as large as  reactive protocols  Scalability level Usually up to  100  nodes.  Source routing protocols up to  few hundred  nodes. Designed for up to  1000 or more  nodes
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q&A ,[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 

Was ist angesagt? (20)

AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
OLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing ProtocolOLSR | Optimized Link State Routing Protocol
OLSR | Optimized Link State Routing Protocol
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Olsr protocol ppt
Olsr protocol pptOlsr protocol ppt
Olsr protocol ppt
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 

Andere mochten auch

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 

Andere mochten auch (20)

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Manet
ManetManet
Manet
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
MANET
MANETMANET
MANET
 
Manet
ManetManet
Manet
 

Ähnlich wie Routing Protocols in MANET

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsDharunMagil
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.pptImXaib
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 

Ähnlich wie Routing Protocols in MANET (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
A41040105
A41040105A41040105
A41040105
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
networking
networkingnetworking
networking
 
Routing
RoutingRouting
Routing
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
F41023946
F41023946F41023946
F41023946
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Routing Protocols in MANET

  • 2.
  • 3.
  • 9.
  • 10.
  • 11.
  • 12. Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
  • 13.
  • 14.
  • 15.
  • 16. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
  • 17. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4 Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
  • 18.
  • 19. Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4 advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. AODV Features V.S. DSDV Routes are created only when required Each node doesn’t maintain all routes to other nodes (only active routes) Use of sequence numbers at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses symmetric links (if a link is not symmetric it is not up) Works both on wired media and wireless media
  • 31.
  • 32.
  • 33. Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
  • 44.
  • 45.
  • 46. Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y] Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
  • 47.
  • 48. Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
  • 49.
  • 50.
  • 51. Route Discovery(10/13) J and K both broadcast RREQ to D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 52. Route Discovery(11/13) D does not forward RREQ, because D is the intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
  • 53.
  • 54. Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
  • 55.
  • 56. Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
  • 57.
  • 58. Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
  • 59.
  • 60. Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 61. DSR vs. AODV AODV DSR Path Information Limited information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of route path New We don’t know Delete invalid path when RRER Delete all Only delete some node
  • 62.
  • 63. Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined when needed Depend on the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used inside each zone , or between gateways Handling effects of mobility Usually updates occur at fixed intervals. AODV,DSR uses local route discovery Usually more than one path maybe available. Single point of failures are reduced by working as a group
  • 64. Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required. Usually lower than proactive protocols Usually depends on the size of each cluster or zone may become as large as proactive protocols if clusters are big Delay level Small routes are predetermined Higher than proactive For local destinations small. Inter-zone maybe as large as reactive protocols Scalability level Usually up to 100 nodes. Source routing protocols up to few hundred nodes. Designed for up to 1000 or more nodes
  • 65.
  • 66.