SlideShare a Scribd company logo
1 of 85
Download to read offline
CS6003 ADHOC & SENSOR
NETWORKS
UNIT – III
Dr.A.Kathirvel, Professor and Head, Dept of CSE
Anand Institute of Higher Technology, Chennai
Unit - III
ROUTING PROTOCOLS AND
TRANSPORT LAYER IN AD HOC
WIRELESS NETWORKS
Issues in designing a routing and Transport
Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid
routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks.
2
Routing Protocols
for
Ad Hoc Wireless Networks
3
Issues in designing a routing protocol
Mobility
Bandwidth constraint
Error-prone shared broadcast radio channel
Hidden and Exposed terminal problems
Resource constraints
Characteristics of an ideal RP for AWN
4
Characteristics of an ideal RP
 It must be fully distributed, as centralized routing involves high
control overhead and hence is not scalable. More fault tolerant
than centralized.
 Frequent topology changes caused by mobility
 Minimum connection setup time is desired.
 Localized state maintenance
 Loop-free and free from stale routes.
 No. of packet collisions must be kept to a min
 Convergence must be quick
 Optimally use scare resources such as BW, power(computing &
battery), memory
 Provide a certain level of QoS
5
6
Classifications of Routing Protocols
Routing information update mechanism
use of temporal information for routing
routing topology
Utilization of specific resources
7
Table-Driven Routing Protocols
Extension of wired networks routing protocols
global topology information is maintained in the form
of table at every node
tables are updated frequently in order to maintain
consistent and accurate networks state information.
Example
Destination sequenced Distance-vector RP
Wireless RP
Cluster-Head Gateway Switch RP
Source-Tree Adaptive RP
8
DSDV
 Enhanced version of Bellman ford algorithm where each node maintains a table that
contains shortest path from first node to every other node in the networks.
 It incorporates table updates with increasing sequence number tags to prevent loops
to counter the counter to infinity problem and for faster convergence
 tables are also exchanged frequently to keep an up to date view of the n/w topology
 tables are also forwarded if a node observes a significant change in local topology
 tables update 1. Incremental update 2. Full dumps Table updates are always initiated
by the destination node with a new sequence number which is always greater than
the previous one.
 Upon receiving an updated table, a node either updates it table or holds it for some
time to select the best metric(which may be the lowest no. of hops)
 based on the sequence no. of table it may forward or reject table.
Incremental Update Full dumps
It takes a single networks data packet unit
(NDPU)
Multiple NDPUs
Used when a node does not observe a
significant change in local topology
Done either when local topology changes
significantly or when an incremental update
requires more than one NDPU
9
DSDV
10
DSDV
 The routing table of node1 indicates that the shortest route to the destination node
(node 8) is available through node 4 and the distance to it is 3 hops.
 Reconfiguration of path
 the end node of broken link initiates a table update message with the broken links
weight assigned to infinity and with a seqno greater than the seqno stored for that
destination.
 Each node upon receiving an update with weight, quickly passes it to its neighbors
in order to propagate the broken link information to the whole n/w.
 Consider the case when node 5 moves from the current position. When the
neighbor node previous path breaks, it sets all the paths passing thro’ the broken
link with distance as infinity. For ex, when node4 knows about the link break, it
sets the path node 5 as infi and broadcasts its routing table to its neighbors. Those
neighbors detecting significant changes in their routing tables rebroadcast it to
their neighbors. In this way, the broken links information is propagated thro’ the
n/w. when node 8 receives table update mesg from 5, it informs the neighbors
about the shortest distance to node 5. This information also propagated
throughout the n/w. All nodes receiving the new update mesg with the higher
seqno. Set the new distance to node 5 in their corresponding tables.
11
DSDV
Advantages
 The availability of routes to all destinations at all times implies
that much less delay is involved in node setup.
 Existing wired n/w protocol can be applied to adhoc wireless
n/w with many fever modifications (seqno).
Disadvantages
 The updates due to broken links leads to a heavy control
overhead during high mobility. Therefore it is not scalable in
adhoc n/w which have limited BW and whose topologies are
highly dynamic.
 In order to obtain information about a particular destination a
node has to wait for a table update mesg initiated by the same
destination node.
12
Wireless Routing Protocol
 Similar to DSDV, inherits the prop. Of distributed Bellman ford algorithm
 it differs from table maintenance and in the update process
 WRP uses a set of tables to maintain more accurate information they are
 Distance Table (DT)-distance, predecessor node for a particular destination
 Routing Table (RT) - shortest distance, predecessor, successor flag
 Link Cost Table (LCT) - cost of relaying through each link
 Message Retransmit Table (MRT) - entry for every update msg that is to be retxd
and counter for each entry.
 When the link b/n 7 and 9 breaks, all nodes having a route to the D with
predecessor as node 7 delete their corresponding routing entries. Both node 9 & 7
send update msg to their neighbors indicating the cost of the link b/n node 7 &
node 9 is infi. If the nodes have any other alternate route to D 9 they udate their
table and send the changes to its neighbors. A neighbor node after receiving an
update msg, updates its routing table only if the new path is better than the
existing path.
13
WRP
14
WRP
Advantages
 WRP has the same advantages as that of DSDV
 In addition it has faster convergence and involves fewer table
updates
Disadvantages
 The complexity of maintenance of multiple tables demands a
larger memory and greater processing power from nodes.
 At high mobility, the control overhead involved in updating
table entries is almost the same as that of DSDV and hence is
not suitable for highly dynamic and also for very large ad hoc
wireless networks.
15
Cluster head Gateway Switch RP
CGSR employs hierarchical networks topology
unlike other table driven routing approaches that uses
flat topologies.
CGSR organizes nodes into cluster
cluster head coordinates all the nodes in cluster
cluster heads are elected dynamically by employing a
Least Cluster Change algo.
A node ceases to be a cluster head only when it
comes under the range of another cluster head, where
the tie is broken either using lowest id or highest
connectivity algo.
16
Cluster head Gateway Switch RP
Different cluster-heads can operate on different
spreading codes on a CDMA systems
Inside a cluster, the cluster head can coordinate the
channel access based on a token-polling protocol
intercluster communication takes place via gateways
the gateways which are members of more than one
cluster can listen to multiple spreading codes.
Every member node maintains a routing table
containing the dest. Cluster head for every node in
the network.
17
CGSR
18
Cluster head Gateway Switch RP
In addition each node maintains a routing table which
keeps track the list of next hop nodes for reaching ever
dest. Cluster.
Each node before sending date gets token from its
cluster head it obtains the dest. Cluster head and the next
hop node from cluster member table and the routing
table respectively.
A path from any node a to any node b will be similar to
a-c1-G1-c2-G2- .. Ci-Gj.. Gn-b where Gi, cj are the ith
gateway and jth cluster head resp.
a path from node 2 to node 10 would follow 2 -1-3-7-10
19
CGSR
Advantages
clustering provides a mech. For allocating the BW.
Hence BW util. Is Better
easy to imp. Priority scheduling schemes with token
scheduling and gateway code scheduling
Disadvantages
Increase in path length and instability in the system at
high mobility when the rate of change of cluster heads
is high
power consumption at the cluster head is high
20
Source-Tree Adaptive Routing Protocol
Proposed by Garcia-Luna-Aceves and Spohn
Variation of table driven rp, with the least overhead routing
approach (LORA) as the key concept rather than the
optimum routing approach (ORA)
ORA - quick update mechanism LORA - Feasible path, not
guaranteed to be optimal, but less overhead.
STAR - Every node broadcasts its source-tree information
source tree of a node consists of the wireless links used by
the node in its preferred path to destinations
Every node, using its adjacent links and the source-tree
broadcast by its neighbors, builds a partial graph of
topology
21
Source-Tree Adaptive Routing Protocol
During initialization, a node sends an update msg to its
neighbors. Also every node is required to originate
update msg about new destination, the chances of routing
loops and the cost of paths exceeding a given threshold.
Hence, each node will have path to every dest node. Path
be sub-optimal
Absence of a reliable link layer broadcast mechanism, it
originates an update msg to all its neighbors indicate the
absence of a path to d. After getting the source tree
update from a neighbor, the node s update its source tree
and, using this it finds a path to all nodes in the network.
22
STAR
 Presence of reliable broadcast mechanism, STAR -implicit route
maintenance
 the link update mech. About the unavailability of a next hop
node triggers an update msg from a neighbor which has an
alternate source tree indicating an alternate next hop node to the
destination.
 When an intermediate node receives a Route Repair update msg,
it removes itself from the top of the route repair path and reliabl
sends it to the head of the route repair path.
Advantages
 Low overhead among all the table driven routing protocols
 use of the LORA approach in this table driven rp reduces the avg
control overhead compared to several other on demand rp
23
On Demand Routing Protocols
Execute path finding process and exchange
routing information only when a path is required
by a node to communicate with destination.
Example
DSR
AODV
TORA
LAR
ABR
SSA
24
Dynamic Source Routing
Eliminates the periodic table-update messages and
thereby reduces the BW consumed by control packets.
Beaconless & hence doesn’t require periodic message
transmission
when a source node has a data packets to be sent to the
dest. It initiates a RREQ
RREQ is flooded throughout the network
each node upon receiving RREQ can fwd it if
it has not fwd the RREQ already
it is not a dest node
25
Dynamic Source Routing
Time to live(TTL) of packet has not exceeded
each RREQ carries a seqno generates by S node and
the path it has traversed
a node upon receiving the RREQ checks the seqno
before fwd it.
Seqno is used to avoid loop formations and to prevent
multiple transmission of the same RREQ by
intermediate nodes.
D node after receiving the first RREQ packet; sends a
RREP using the reverse path traversed by the RREQ
packet
26
Dynamic Source Routing
This protocol uses the route cache that stores all
possible info. Extracted from source route contained in
data packet
if an intermediate node receiving a RREQ has a route
to the destination in its route cache it sends RREP with
a complete route from S to D
Optimizations:
1. Route Cache
This cache information is used by intermediate nodes
to reply to the S node when they receive a RREQ and
if they have a route to the corresponding D
27
28
DSR
2. Promiscuous mode
 By operating in this mode, an intermediate node learns abt the path
breaks. Info. Gained is used to update the route cache so that the
active routes maintained in route cache don’t use such links
3. During networks partition
 The affected nodes initiate RREQ packets an exponential backoff
algo. Is used to avoid frequent RREQ flooding in the network when
the D is in another dispoint set.
Route maintenance
 when an intermediate node moves away causing a wireless link to break. For
ex. If the link between node 5 & 7 fails, a route error msg is generated by a
node adjacent to path break to inform the source node. The source node
reinitiates the route establishment procedure. The cached entries at the
intermediate node and S node are removed when the route error packet is
received.
29
DSR
Advantages
 it eliminates periodical table update msg
 intermediate nodes utilize the route cache info efficiently to
reduce the ctrl overhead
Disadvantages
 route setup delay is more
 route maintenance mech doesn’t efficiently repair the path
break efficiently
 the performance of this protocol degrades rapidly with
increasing mobility
30
Adhoc Ondemand Distance Vector
 AODV uses ondemand approach, ie a route is established
only when it is required by a S node for transmitting data
packet
 it differs from DSR from the fact that DSR uses source
routing in which a data packet carries complete path to the D
 in AODV, the S node and intermediate nodes stores the next
hop info corresponding to each flow for packet txn
 uses dest. Seqno to determine an up-to-date path to the D
 a node updates its path info only if the destseqno of the
current packet received is greater than the last destseqnum
stored at the node
31
Adhoc Ondemand Distance Vector
 a RREQ carries SID,DID,S-seqno,D-seqno,BcastID and TTL
 source 1 initiates the RREQ to be flooded in the nxw for D 15
 Assuming that the Dseqno as 3 and Sseqno as 1. When the nodes
2,5 & 6 receive the RREQ, they check their route to the D. In case
a route to the D is not avail they fwd it to their neighbors. Here
nodes 3, 4 and 10 are neighbors of nodes 2,5 and 6. This is with
the assumption that the nodes 3 & 10 have routes to the D node 15
that is thro paths 10-14-15 & 3-7-9-13-15 resp.
 If the Dseqno at node 10 is 4 and is 1 at intermediate node 3 then
only node 10 is allowed to reply along the cached route to S. when
a path breaks for ex bet nodes 4 and 5, both nodes initiates RERR
msg to inform their end nodes abt the link breaks
32
33
AODV
 the end nodes deletes the corresponding entries from their
tables. The source node reinitiates the path finding process
with the new BcastID and the previous Dseqno
 Advantages
 routes are estab. On demand and Dseqno are used to identify
the latest path
 route set up delay is less
 disadvantages
 Multiple RREP in response to a RREQ packet can lead to a
heavy ctrl overhead
 periodic beaconing leads to unnecessary BW consumption
34
Temporally ordered Routing Algor.
Source initiated on demand routing algo which provides
loop free routes to the D
each node maintains its one-hop local topology and also
has the ability to delete partitions
distance metric used in TORA is length of path or height of
node N from the D
3 functions: establishment, maintaining and erasing routes
route estab is performed only when a node requires a path
to a D but doesn’t have any directed link
this process estab D oriented Directed Acyclic Graph
(DAG) using query/update mech.
35
36
Temporally ordered Routing Algor.
 When a node has a data packet to send to D node 7 it sends
query packet. This query packet is fwd by intermediate nodes 2,
3, 4, 5 & 6and reaches D node 7 or any other node which has
route to D node.
 When the query packet reaches D, it sends reply containing its
distance from D.
 Each node that receives the update packet sets its distance to a
higher value than the distance of the sender of the update
packet. By doing this, a set of directed links from the node
which originated the query to the D node 7 is created.
 When an intermediate node(5) discovers that the route to the D
is invalid, it changes its distance value to a higher value than its
neighbor and originates an update packet.
37
TORA
The neighbour node 4 that recives the update packet
reverses the link b/n 1 and 4 and forwards the update
packet. This is done to update the DAG
corresponding to D node 7.
Advantages
by limiting the ctrl packets for route reconfigurations
to a small region, TORA incurs less ctrl overhead
Disadvantages
the local reconfiguration of paths results in non-
optimal routes
38
Location Aided Routing
 Uses the location info for improving the efficiency of routing by
reducing the ctrl overhead
 availability of GPS for obtaining the position info necessary for
routing
 LAR designates two regions for selective fwd of ctrl packets
namely
1. Expected Zone
 region in which the destination node is expected to be present
given info regarding its location in the past and its mobility info
2. Request Zone
 geographic region within which the path finding ctrl packets are
permitted to be propagated
39
LAR 1 & 2
 LAR uses flooding but here flooding is restricted to a small
geographical region
 the node forward or discard ctrl packets based on two algo namely
LAR1 and LAR2
 The source node explicitly specifies the req zone in RREQ packet
 as per LAR1 the RZ is a small rectangle that includes src and dest
nodes sides of which are parallel to x and y axis when S is outside
the EZ
 when S is inside the EZ the RZ is reduced to EZ
 the src node (node 1) originates the RREQ which is broadcast to
its neigh(2,5,6)
 nodes 2 and 6 forwards the RREQ & node 5 discards the RREQ
because it is outside the RZ
40
41
LAR 1 & 2
 finally the RREQ reaches the dest (node 8) which orginates route
reply that contains current location and current time of the node
 the src node uses these info for route establishment
 the src node (node 1) includes the distance b/w itself and the dest
node (node 11) along with (x,y) coordinates of D in the RREQ
packet
 when the intermediate node receives this RREQ packet it
computes the distance b/w itself to D node.
 If this distance is less than the distance from S to D+* where * is a
parameter of the algo decided based on the err in location
estimation and mobility then the RREQ packet is fwd. Otherwise
RREQ is discarded
42
43
LAR 2
 Node 5 sends the RREQ this is received by nodes 1,2,4,7 and 6
 only nodes 4 & 7 forwards the RREQ
 other nodes 1,6,2 discards the RREQ because the distance b/w these
nodes and the D node is greater than the distance b/w S node and D
node
 once the RREQ reaches the D(node 11) it generates and send RREP
which contains the path thro which future data packets are to be
propagated
Advantages
 LAR reduces the ctrl overhead by limiting the search area for
finding a path
Disadvantages
 protocol cannot be used in place where GPS access is not possible
44
Signal-Stability based Adaptive RP
SSA is an on demand routing that uses the signal
stability as a prime factor for finding stable routes
it is beacon-based in which the signal strength of
beacon is measured for determining link stability
protocol consist of 2 parts
Forwarding Protocol(FP)-performs actual routing to
forward a pack on its way to the D
Dynamic RP(DRP)- uses an extended radio interface
that measures the signal strength from beacons - it
maintains a rt by interacting with DRP processes on
other hosts
45
Signal-Stability based Adaptive RP
Every node maintains a table that contains the beacon
count and the signal strength of each of its neighbors
if the node has received strong beacons for the past few
beacon the node classifies the link as strong/stable link
the link is otherwise classified as weak/unstable link
a src node which doesn’t have a route to the D floods the
n/w with RREQ pack
The nodes that employ SSA protocol process a RREQ
only if it is received only if it is received over a strong
link
a RREQ received thro weak link is dropped without
processing
46
47
SSA
 the dest. Selects the first RREQ and initiates RREP packet to notify the
selected route to the S
 when a link breaks the end nodes of the broken link notify the corresponding
end nodes of the path. A src node rebroadcasts the RREQ to find another
stable route. If no strong path is available when a link gets broken then the
new route is estab. By considering weak links also.
Advantages
 It finds more stable routes when compared to the shortest path route selection
protocols such as DSR and AODV
Disadvantages
 it puts a strong RREQ fwd condition which results in RREQ failures
 a failed RREQ reinitiates a path find process without considering stability
criteria - BW is consumed
 strong links criterion increases the path length as shortest paths may be
ignored for more stable paths
48
Zone Routing Protocol
 Hybird rp which effectively combines the adv of both proactive
and reactive
 proactive - Intra zone RP(IARP)- for nodes within a particular
zone
 Reactive - Inter zone RP(IERP) - for nodes beyond this zone
 the routing zone of a given node is a subset of the n/w within
which all nodes are reachable within less than or equal to zone
radius hops
 within routing zone each node maintains the info abt the routes
to all nodes by exchanging periodic route update packets
 IERP is responsible for finding paths to nodes which are not
within the routing zone
49
50
Zone Routing Protocol
 when a node S(8) has packet to be sent to node D(16) it checks
whether D is within its zone. If the dest. Belongs its own zone then it
delivers the pack directly.
 Otherwise node S bordercast(uses unicast routing to deliver pack
directly to the border nodes) the RREQ to its peripheral
nodes(2,3,5,19,14,15).
 If any peripheral finds a path to node D then it sends RREP
otherwise it rebordercast the RREQ. This process continues until D is
located.
 Nodes 10 and 14 find the info abt 16 therefore they send RREP pack
back to node 8.
 When an intermediate node in an active path detects a broken link in
the path it performs a local path reconfig. In which broken link is
bypassed by means of a shorter alternate path
51
ZRP
Advantages
reduces ctrl overhead compared to the RREQ
flooding mechanism employed in on-demand
approaches and the periodic flooding of routing info
in table driven approaches
Disadvantages
the decisions on the zone radius has a significant
impact on the performance of the protocol
52
Power Aware Routing Protocol
 Power consumption by the nodes is a serious factor to be taken
into consideration by RP for AWN
 the routes are also equally power constrained just as the nodes are
 power aware routing metrics
 singh et al. Proposed a set of routing metrics that supports
conservation of bat power
1. Minimal energy consumption per packet - min the power
consumed by a packet in traversing from S to D. The energy
consumed is the sum of energies required at every intermediate
hop in that path. The energy consumed at intermediate path is a
fun. Of distance b/w the nodes that form the link and load on the
link
53
Power Aware Routing Protocol1. q
2. Maximum n/w connectivity - balancing the routing load among
the out-set
3. Minimum variance in node power levels - to distribute the load
among all nodes in the n/w so that the power consumption pattern
remains uniform across them
4. Minimum cost per packet - in order to max the life of every node
in the n/w, this routing metric is made as a fun. Of the state of the
nodes bat. A nodes cost decreases with an increase in its bat
charge and vice versa
5. Minimize maximum node cost - min the max cost per node for a
pack after routing a number of packets or after a specific period.
This delays the failure of a node occurring due to higher
discharge because of pack forwarding
54
Transport layer
in Ad Hoc Networks
55
Transport layer, Security protocols
 The objectives of transport layer include setting up of end to
end connection, end to end delivery of data packets, flow
control and congestion control
 Example
 UDP-Simple, Unreliable, Connectionless
 TCP- Reliable, Byte stream based, Connection oriental.
 These traditional wired transport layer protocols are not
suitable for adhoc wireless n/w due to inherent problems
associated with the latter.
 The adhoc networks are highly vulnerable to security compared
to wired networks. Therefore, security protocols used in other
n/w cannot be directly applied to adhoc wireless networks.
56
Issues of designing a TL protocol
 Induced traffic
 The traffic at any given lines due to the traffic in neighboring lines is referred as
induced traffic. This induced traffic affects the throughput achieved by the transport
layer protocol.
 Induced throughput unfairness
 This refers to throughput unfairness at the transport layer due to the throughput/delay
unfairness existing at the lower layers such as the network and MAC layer.
 Separation of congestion control, flow control and reliability
 The reliability and flow control are end to end activities whereas the congestion at
time can be local activity. The performance of the transport layer protocol can be
improved if these are handled separately.
 Power and BW constraints
 The performance of a transport layer protocol is significantly affected by there
constraints.
57
Issues of designing a TL protocol
 Misinterpretation of congestion control
 Packet loss occurs in adhoc n/w due to high error rates of channel, hidden
terminal problem etc. This may lead to misinterpretation of congestion.
 Completely decoupled transport layer
 Wired n/w transport layer protocols are completely decoupled from the lower
layers. In adhoc n/w, the cross layer interaction b/n transport layers and lower
layers is important for transport layer to adopt to the changing environment.
 Dynamic topology
 Some of the deployment scenarios of adhoc wireless networks experience
rapidly changing n/w topology due to mobility of nodes. Hence, the
performance of transport layer protocol is affected by the rapid changes in n/w
topology.
58
Design goals of a TLP
Should maximize the throughput/connection
Should provide throughput fairness across contending flows
Should have mechanisms for flow control and congestion
control
Should be able to provides both reliable and unreliable
connections as per the req.
Should incur min connection set up and connection
maintenance overhead
Should minimize the resource requirements for setting up
and maintaining the connection
59
Design goals of a TLP
Should be able to adopt to the dynamics of the n/w
BW must be used efficiently
Should be aware of resource constraints such as battery
power and buffer sizes and make efficient use of them
Should make use of the information from the lower layers
for improving networks throughput
Should have well defined cross layer interaction framework
for effective scalable and protocol independent interaction
with lower layers
Should maintain end to end
60
61
Why does TCP not program well in AN
1.Miss interpretation of packet loss
2.Frequent path breaks
3.Effect of path length
4.Miss interpretation of congestion window
5.Asymmetric link behavior
6.Unidirectional path
7.Multipath routing
8.Network partitioning and reemerging
9.The use of sliding window based transmission.
62
Feed back based TCP (TCP-F)
 TCP-F is a feedback-based
approach. It requires the support of
a reliable link layer and routing
protocol that can provide FB to the
TCP sender about the path break.
The routing protocol is expected to
repair the broken link within a
reasonable period.
 A TCP session is setup b/n node A
and D over the path A-B-C-D
 When the intermediate link b/n
node C and node D fails, node C
originates the RFN packet and
forwards it on the reverse path to
the source node.
63
Feed back based TCP (TCP-F)
 Senders TCP stale is changed to snooze stale upon the receipt of
RFN packet.
 In snooze stale a sender stops sending anymore packet to the
destination cancels all the timers, freezes its congestion window,
freezes the retransmission timer and sets up a route failure timer.
 When route failure expires the TCP sender changes stale from
snooze stale to connected state.
 If the link CD rejoins or if any of the intermediate nodes obtains
a path to destination node a RRN packet is sent to node A and the
TCP state is updated bark to connected state.
64
Feed back based TCP (TCP-F)
Advantages
 TCP-F provides a simple FB based solution to minimize the problem arising
out of frequent path breaks in adhoc wireless networks.
 At the same time, it also permits the TCP congestion control mechanism to
respond to congestion in the n/w.
Disadvantages
 If the route to the sender is not available at the FP then additional control
packets may need to be generated for routing the RFN packet.
 TCP-F has an additional state compared to the traditional TCP state m/c, and
hence its implementation requires modifications to the existing TCP libraries.
 Congestion window used after a new route is obtained may not reflect the
achievable transmission rate to the n/w and the TCP-F receiver
65
TCP with Explicit Link Failure Notification -ELFN
 The ELFN is originated by the node detecting a path break upon
detection of a link failure to the TCP sender. This can be
implemented in two ways:
 By sending Internet Control message protocol (ICMP) destination
unreasonable (DUR) message to the sender.
 By piggy barking this information on the Route Error message
that is sent to the sender.
 Once the TCP sender receives ELFN packet it disables its
retransmission timers and enters a standby state. In this state it
periodically originates probe packets to see if a new route is
reestablished.
 Upon reception of ACK by the TCP receiver for probe packets, it
leaves the standby state, restores the retransmission timers, and
continues to function as normal.
66
TCP with Explicit Link Failure Notification -ELFN
Advantages
 TCP-ELFN improves the TCP notification performance by
decoupling the path break information from congestion
information by the use of ELFN.
 It is less dependent on routing protocol and requires only link
failure notification about the pat break.
Disadvantages
 When the n/w is temporarily partitioned the path failure may last
longer and this can lead to the origination of periodic probe
packets consuming BW and power.
 The congestion window used after a new route is obtained may
not reflect the achievable transmissions rate acceptable to the n/w
and the TCP receiver.
67
TCP-Bus
 TCP with buffering capacity and sequence information (TCP-Bus) is
similar to TCP-F and TCP-ELFN in its use of feedback information from
an intermediate node on detection of a path break. TCP-Bus was
proposed with Associativity bared routing (ABR) scheme. TCP-Bus
works as follows.
 Upon detection of a path break an upstream intermediate node (called
pivot node PN) originates explicit route disconnection notification
(ERDN) message.
 This ERDN is propagated to the TCP-Bus sender
 Upon reception of ERDN, the TCP-Bus sender stops transmissions and
freezes all times and windows.
 The packets in transit at the intermediate nodes from TCP-Bus sender to
PN are buffered until a new partial path from the PN to the TCP-Bus
receiver is obtained by PN
68
69
TCP-Bus
 Upon detection of a path break, the down stream node originates
the route notification (RN) packet to the TCP bus receiver
 PN attempts to final an alternate route to the TCP-Bus receiver
and availability of such partial route is to destination is intimated
to the TCP-Bus sender through an explicit route successful
notification (ERSN) packet.
 The Local Query (LQ) packet carries the sequence number of the
segment at the head of the queue buffered at the PN and REPLY
carries the sequence number of the last successful segment the
TC-Bus receiver received. This enable the TCP-Bus receiver to
understand the packets lost in transition and those buffered at the
intermediate nodes.
 The Lost packets are retransmitted by the TCP-Bus sender.
70
TCP-Bus
Advantages
Performance improvement and avoidance of fast
retransmission due to the use of buffering, seq
numbering and selective acknowledgement.
It takes advantage of ABR
Disadvantages
Increased dependency on the routing protocol and
buffering at intermediate nodes
The failure of intermediate nodes that buffer the packets
may lead to loss of packets and performance
degradation
71
Ad Hoc TCP (ATCP)
 ATCP also uses the feedback mechanism to make the sender aware
of the status of the network path. Based on the feedback information
retrieved from the intermediate nodes, the TCP sender changes its
state to the persist state, congestion control state, or the retransmit
state.
72
The major functions of the
ATCP layer is to monitor the
packets sent and received by the
TCP sender, the state of the
TCP sender, and the state of the
network.
ATCP
 The four states in the ATCP are (I) NORMAL (II) CONGESTED (III) LOSS
(IV) DISCONN
 When a TCP connection is established, the ATCP sender is in NORMAL
State. In this state, ATCP does not interfere with the operation of TCP
 When packets are lot or arrive out-of-order at the destination, it generates
duplicate ACKs. In traditional TCP, upon reception of duplicate ACKs, the
TCP sender invokes the congestion control. But the ATCP sender counts the
number of duplicate ACKs received, if it reaches three, of it puts TCP in
persists state and ATCP in loss state
 When a new ACK comes from TCP receiver. It is forwarded to TCP and the
TCP sender is removed from the persists state and then the ATCP sender
change to the NORMAL state.
 When ATCP sender is in loss state, the receipt of an ECN message charges it
to the CONGESTED State. Along with this transition, ATCP sender removes
the TCP from the persists state.
 When the n/w gets congested, the ECN flag is set in the data and the ACK
packets.
73
ATCP
 When ACTP sender receives this ECN message in the normal state, it
changes to the CONGESTED State, and permits TCP to invoke
congestion control mechanism.
 When a route failure or n/w partition occurs in the n/w, the n/w layer
details these and informs to the ATCP sender through DUR message.
 Upon reception of DUR message, ATCP puts the TCP sender in
persists state and enters into DISCONN state
 It remains in the DISCONN state until it is connected and receives
data or duplicate ACKs
 On the occurrence of any of three events, ATCP changes to the
NORMAL State.
 The receipt of DUR message in the LOSS state or CONGESTED
state causes a transition to the DISCONN state
74
ATCP
Advantages
 It maintains the end to end
semantics of TCP
 It is compatible with traditional
TCP
Disadvantages
 The dependency on the networks
layers protocol to detect the route
changes and partitions, which not
all-routing protocols may
implement.
 The addition of thin TCP layer to
the protocol stack that requires
changes in the interface functions
currently used.
75
Split TCP
 In networks, the short connections generally obtain much higher
throughput than long connections. This can also lead to unfairness
among TCP session, where one session may obtain a much higher
throughput than the other sessions.
 Split TCP provides the solution to the throughput unfairness problem by
splitting the transport layers objectives into congestion control and end
to end reliability. The congestion control is mostly a local solution. At
the same time, reliability is an end to end requirement and needs end to
end acknowledgements.
 The operation of the split TCP is shown in fig where a three stage split
connection exists b/n node 1 and node 15.
 A proxy node receive the TC packet, reads it, store it in its local buffer
and sends LACK to the source ( or the previous proxy)
76
Split TCP
 The responsibility of further delivery of packets is assigned to
proxy node. A proxy node clears a buffered packet once it
receives LACK from the immediate success or proxy for that
packet
 the split TCP maintains the end to end ACK mechanism in
addition to zone wise LACK.
 The source node clears the buffered packets only after receiving
the end to end acknowledgements.
77
78
Split TCP
Advantages
 improved throughput
 improved throughput fairness
 Lessened impact of mobility. Since in split TCP the path length
can be shorter than the end to end path length, the effect of
mobility on throughput is lessened.
Disadvantages
 It require modifications to TCP protocol
 The end to end connection handling of traditional TCP is
violated
 The failure of proxy nodes can lead to the throughput
degradation.
79
Application Controlled TP (ACTP)
 ACTP assigns the responsibility of ensuring reliability to the application
layer. It is more like UDP with FB of delivery and state maintenance. ACTP
stands b/n UDP and TCP It is not an extension of TCP.
 As shown in fig the application layer uses API functions to interact with the
ATCP layer. Each API function sends a packet (Send To ( ) ) to the ACTP
layer which contains information such as maximum delay the packet can
tolerate the message number of the packet and the priority of the packet. The
ATCP also maintains the delivery status through another API function. Is
ACKed <message number> and is available for application layer. A zero in
the delay field refers to the highest priority packet, which requires immediate
txn with min delay.
80
Application Controlled TP (ACTP)
Advantages
It is scalable for large n/w
throughput is not affected by path break as much as
in TCP.
It provides freedom of choosing the required
reliability level to the application layer.
Disadvantages
It is not compatible with TCP.
81
Ad hoc transport protocol (ATP)
 ATP is specifically designed for AWN and is not a variant of TCP. The major
aspects by which ATP defers from TCP are
 Coordination among multiple layers
 Rate based transmission
 Decoupling congestion ctrl and reliability
 Assisted congestion ctrl
 ATP uses information from lower layers for
 Estimation of the initial transmission rate
 Detection, avoidance and control of the congestion
 Detection of Path breaks
 The intermediate nodes attach the congestion information to every ATP packet
and the ATP receiver collects it before including it in the next ACK packet. The
congestion information is expressed in terms of the weighted average queuing
delay (DQ) and contention delay (DC) experienced by the packet.
82
ATP
 During a connection setup process or when ATP recovers from a path breaks,
the txn rate to be used is determined by a process called quick start. During
quick start process, the ATP sender propagates a probe packet to which the
intermediate nodes attach the transmission rate, which is received by ATP send
receiver, and an ACK is sent back to ATP sender. The ATP sender starts using
the newly obtained transmission rate by setting the data transmission timers.
 After congestion occurs, ATP controls it using three phases, namely, increase,
decrease, and maintain
 If R>S(1+r) then the current txn rate is increased by a factor k. where R->
new txn rate S->current txn rate r->threshold k->difference b/n new txn
rate and current txn rate
 If the new txn rate is higher than the current transmission rate but less than
the threshold then the current txn rate is maintained.
 If an ATP sender has not received any ACK packets for two consecutive
feedback periods it undergoes a multiplicate decrease of the txn rate.
83
ATP
After a third period without any ack the connection is
assumed to be lost and the ATP sender goes to the
connection initiation phase during which it periodically
generates probe packets
Advantages
Improved performance
Decoupling of the congestion control and reliability
mechanism
Avoidance of congestion window fluctuations
Disadvantages
Lack of interoperability with TCP
84
Questions ?

More Related Content

What's hot

WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Miles Kevin Galario
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocolPriya Kaushal
 
PRACTICAL HANDOFF CONSIDERATION
PRACTICAL HANDOFF CONSIDERATIONPRACTICAL HANDOFF CONSIDERATION
PRACTICAL HANDOFF CONSIDERATIONAJAL A J
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
The cellular concept
The cellular conceptThe cellular concept
The cellular conceptZunAib Ali
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 

What's hot (20)

WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)Frequency Division Multiple Access (FDMA)
Frequency Division Multiple Access (FDMA)
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
Packet radio protocol
Packet radio protocolPacket radio protocol
Packet radio protocol
 
PRACTICAL HANDOFF CONSIDERATION
PRACTICAL HANDOFF CONSIDERATIONPRACTICAL HANDOFF CONSIDERATION
PRACTICAL HANDOFF CONSIDERATION
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Precoding
PrecodingPrecoding
Precoding
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Bandwidth utilization
Bandwidth utilizationBandwidth utilization
Bandwidth utilization
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 

Similar to Routing Protocols and Transport Layer in Ad Hoc Wireless Networks

Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingKlawal13
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETijasuc
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 

Similar to Routing Protocols and Transport Layer in Ad Hoc Wireless Networks (20)

Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Zaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routingZaharaddeen karami lawal distance vector routing
Zaharaddeen karami lawal distance vector routing
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
An Insight on Routing
An Insight on RoutingAn Insight on Routing
An Insight on Routing
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANETPERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 

More from Kathirvel Ayyaswamy

22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTUREKathirvel Ayyaswamy
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2Kathirvel Ayyaswamy
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security Kathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network SecurityKathirvel Ayyaswamy
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information TechnologyKathirvel Ayyaswamy
 

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Routing Protocols and Transport Layer in Ad Hoc Wireless Networks

  • 1. CS6003 ADHOC & SENSOR NETWORKS UNIT – III Dr.A.Kathirvel, Professor and Head, Dept of CSE Anand Institute of Higher Technology, Chennai
  • 2. Unit - III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks. 2
  • 3. Routing Protocols for Ad Hoc Wireless Networks 3
  • 4. Issues in designing a routing protocol Mobility Bandwidth constraint Error-prone shared broadcast radio channel Hidden and Exposed terminal problems Resource constraints Characteristics of an ideal RP for AWN 4
  • 5. Characteristics of an ideal RP  It must be fully distributed, as centralized routing involves high control overhead and hence is not scalable. More fault tolerant than centralized.  Frequent topology changes caused by mobility  Minimum connection setup time is desired.  Localized state maintenance  Loop-free and free from stale routes.  No. of packet collisions must be kept to a min  Convergence must be quick  Optimally use scare resources such as BW, power(computing & battery), memory  Provide a certain level of QoS 5
  • 6. 6
  • 7. Classifications of Routing Protocols Routing information update mechanism use of temporal information for routing routing topology Utilization of specific resources 7
  • 8. Table-Driven Routing Protocols Extension of wired networks routing protocols global topology information is maintained in the form of table at every node tables are updated frequently in order to maintain consistent and accurate networks state information. Example Destination sequenced Distance-vector RP Wireless RP Cluster-Head Gateway Switch RP Source-Tree Adaptive RP 8
  • 9. DSDV  Enhanced version of Bellman ford algorithm where each node maintains a table that contains shortest path from first node to every other node in the networks.  It incorporates table updates with increasing sequence number tags to prevent loops to counter the counter to infinity problem and for faster convergence  tables are also exchanged frequently to keep an up to date view of the n/w topology  tables are also forwarded if a node observes a significant change in local topology  tables update 1. Incremental update 2. Full dumps Table updates are always initiated by the destination node with a new sequence number which is always greater than the previous one.  Upon receiving an updated table, a node either updates it table or holds it for some time to select the best metric(which may be the lowest no. of hops)  based on the sequence no. of table it may forward or reject table. Incremental Update Full dumps It takes a single networks data packet unit (NDPU) Multiple NDPUs Used when a node does not observe a significant change in local topology Done either when local topology changes significantly or when an incremental update requires more than one NDPU 9
  • 11. DSDV  The routing table of node1 indicates that the shortest route to the destination node (node 8) is available through node 4 and the distance to it is 3 hops.  Reconfiguration of path  the end node of broken link initiates a table update message with the broken links weight assigned to infinity and with a seqno greater than the seqno stored for that destination.  Each node upon receiving an update with weight, quickly passes it to its neighbors in order to propagate the broken link information to the whole n/w.  Consider the case when node 5 moves from the current position. When the neighbor node previous path breaks, it sets all the paths passing thro’ the broken link with distance as infinity. For ex, when node4 knows about the link break, it sets the path node 5 as infi and broadcasts its routing table to its neighbors. Those neighbors detecting significant changes in their routing tables rebroadcast it to their neighbors. In this way, the broken links information is propagated thro’ the n/w. when node 8 receives table update mesg from 5, it informs the neighbors about the shortest distance to node 5. This information also propagated throughout the n/w. All nodes receiving the new update mesg with the higher seqno. Set the new distance to node 5 in their corresponding tables. 11
  • 12. DSDV Advantages  The availability of routes to all destinations at all times implies that much less delay is involved in node setup.  Existing wired n/w protocol can be applied to adhoc wireless n/w with many fever modifications (seqno). Disadvantages  The updates due to broken links leads to a heavy control overhead during high mobility. Therefore it is not scalable in adhoc n/w which have limited BW and whose topologies are highly dynamic.  In order to obtain information about a particular destination a node has to wait for a table update mesg initiated by the same destination node. 12
  • 13. Wireless Routing Protocol  Similar to DSDV, inherits the prop. Of distributed Bellman ford algorithm  it differs from table maintenance and in the update process  WRP uses a set of tables to maintain more accurate information they are  Distance Table (DT)-distance, predecessor node for a particular destination  Routing Table (RT) - shortest distance, predecessor, successor flag  Link Cost Table (LCT) - cost of relaying through each link  Message Retransmit Table (MRT) - entry for every update msg that is to be retxd and counter for each entry.  When the link b/n 7 and 9 breaks, all nodes having a route to the D with predecessor as node 7 delete their corresponding routing entries. Both node 9 & 7 send update msg to their neighbors indicating the cost of the link b/n node 7 & node 9 is infi. If the nodes have any other alternate route to D 9 they udate their table and send the changes to its neighbors. A neighbor node after receiving an update msg, updates its routing table only if the new path is better than the existing path. 13
  • 15. WRP Advantages  WRP has the same advantages as that of DSDV  In addition it has faster convergence and involves fewer table updates Disadvantages  The complexity of maintenance of multiple tables demands a larger memory and greater processing power from nodes.  At high mobility, the control overhead involved in updating table entries is almost the same as that of DSDV and hence is not suitable for highly dynamic and also for very large ad hoc wireless networks. 15
  • 16. Cluster head Gateway Switch RP CGSR employs hierarchical networks topology unlike other table driven routing approaches that uses flat topologies. CGSR organizes nodes into cluster cluster head coordinates all the nodes in cluster cluster heads are elected dynamically by employing a Least Cluster Change algo. A node ceases to be a cluster head only when it comes under the range of another cluster head, where the tie is broken either using lowest id or highest connectivity algo. 16
  • 17. Cluster head Gateway Switch RP Different cluster-heads can operate on different spreading codes on a CDMA systems Inside a cluster, the cluster head can coordinate the channel access based on a token-polling protocol intercluster communication takes place via gateways the gateways which are members of more than one cluster can listen to multiple spreading codes. Every member node maintains a routing table containing the dest. Cluster head for every node in the network. 17
  • 19. Cluster head Gateway Switch RP In addition each node maintains a routing table which keeps track the list of next hop nodes for reaching ever dest. Cluster. Each node before sending date gets token from its cluster head it obtains the dest. Cluster head and the next hop node from cluster member table and the routing table respectively. A path from any node a to any node b will be similar to a-c1-G1-c2-G2- .. Ci-Gj.. Gn-b where Gi, cj are the ith gateway and jth cluster head resp. a path from node 2 to node 10 would follow 2 -1-3-7-10 19
  • 20. CGSR Advantages clustering provides a mech. For allocating the BW. Hence BW util. Is Better easy to imp. Priority scheduling schemes with token scheduling and gateway code scheduling Disadvantages Increase in path length and instability in the system at high mobility when the rate of change of cluster heads is high power consumption at the cluster head is high 20
  • 21. Source-Tree Adaptive Routing Protocol Proposed by Garcia-Luna-Aceves and Spohn Variation of table driven rp, with the least overhead routing approach (LORA) as the key concept rather than the optimum routing approach (ORA) ORA - quick update mechanism LORA - Feasible path, not guaranteed to be optimal, but less overhead. STAR - Every node broadcasts its source-tree information source tree of a node consists of the wireless links used by the node in its preferred path to destinations Every node, using its adjacent links and the source-tree broadcast by its neighbors, builds a partial graph of topology 21
  • 22. Source-Tree Adaptive Routing Protocol During initialization, a node sends an update msg to its neighbors. Also every node is required to originate update msg about new destination, the chances of routing loops and the cost of paths exceeding a given threshold. Hence, each node will have path to every dest node. Path be sub-optimal Absence of a reliable link layer broadcast mechanism, it originates an update msg to all its neighbors indicate the absence of a path to d. After getting the source tree update from a neighbor, the node s update its source tree and, using this it finds a path to all nodes in the network. 22
  • 23. STAR  Presence of reliable broadcast mechanism, STAR -implicit route maintenance  the link update mech. About the unavailability of a next hop node triggers an update msg from a neighbor which has an alternate source tree indicating an alternate next hop node to the destination.  When an intermediate node receives a Route Repair update msg, it removes itself from the top of the route repair path and reliabl sends it to the head of the route repair path. Advantages  Low overhead among all the table driven routing protocols  use of the LORA approach in this table driven rp reduces the avg control overhead compared to several other on demand rp 23
  • 24. On Demand Routing Protocols Execute path finding process and exchange routing information only when a path is required by a node to communicate with destination. Example DSR AODV TORA LAR ABR SSA 24
  • 25. Dynamic Source Routing Eliminates the periodic table-update messages and thereby reduces the BW consumed by control packets. Beaconless & hence doesn’t require periodic message transmission when a source node has a data packets to be sent to the dest. It initiates a RREQ RREQ is flooded throughout the network each node upon receiving RREQ can fwd it if it has not fwd the RREQ already it is not a dest node 25
  • 26. Dynamic Source Routing Time to live(TTL) of packet has not exceeded each RREQ carries a seqno generates by S node and the path it has traversed a node upon receiving the RREQ checks the seqno before fwd it. Seqno is used to avoid loop formations and to prevent multiple transmission of the same RREQ by intermediate nodes. D node after receiving the first RREQ packet; sends a RREP using the reverse path traversed by the RREQ packet 26
  • 27. Dynamic Source Routing This protocol uses the route cache that stores all possible info. Extracted from source route contained in data packet if an intermediate node receiving a RREQ has a route to the destination in its route cache it sends RREP with a complete route from S to D Optimizations: 1. Route Cache This cache information is used by intermediate nodes to reply to the S node when they receive a RREQ and if they have a route to the corresponding D 27
  • 28. 28
  • 29. DSR 2. Promiscuous mode  By operating in this mode, an intermediate node learns abt the path breaks. Info. Gained is used to update the route cache so that the active routes maintained in route cache don’t use such links 3. During networks partition  The affected nodes initiate RREQ packets an exponential backoff algo. Is used to avoid frequent RREQ flooding in the network when the D is in another dispoint set. Route maintenance  when an intermediate node moves away causing a wireless link to break. For ex. If the link between node 5 & 7 fails, a route error msg is generated by a node adjacent to path break to inform the source node. The source node reinitiates the route establishment procedure. The cached entries at the intermediate node and S node are removed when the route error packet is received. 29
  • 30. DSR Advantages  it eliminates periodical table update msg  intermediate nodes utilize the route cache info efficiently to reduce the ctrl overhead Disadvantages  route setup delay is more  route maintenance mech doesn’t efficiently repair the path break efficiently  the performance of this protocol degrades rapidly with increasing mobility 30
  • 31. Adhoc Ondemand Distance Vector  AODV uses ondemand approach, ie a route is established only when it is required by a S node for transmitting data packet  it differs from DSR from the fact that DSR uses source routing in which a data packet carries complete path to the D  in AODV, the S node and intermediate nodes stores the next hop info corresponding to each flow for packet txn  uses dest. Seqno to determine an up-to-date path to the D  a node updates its path info only if the destseqno of the current packet received is greater than the last destseqnum stored at the node 31
  • 32. Adhoc Ondemand Distance Vector  a RREQ carries SID,DID,S-seqno,D-seqno,BcastID and TTL  source 1 initiates the RREQ to be flooded in the nxw for D 15  Assuming that the Dseqno as 3 and Sseqno as 1. When the nodes 2,5 & 6 receive the RREQ, they check their route to the D. In case a route to the D is not avail they fwd it to their neighbors. Here nodes 3, 4 and 10 are neighbors of nodes 2,5 and 6. This is with the assumption that the nodes 3 & 10 have routes to the D node 15 that is thro paths 10-14-15 & 3-7-9-13-15 resp.  If the Dseqno at node 10 is 4 and is 1 at intermediate node 3 then only node 10 is allowed to reply along the cached route to S. when a path breaks for ex bet nodes 4 and 5, both nodes initiates RERR msg to inform their end nodes abt the link breaks 32
  • 33. 33
  • 34. AODV  the end nodes deletes the corresponding entries from their tables. The source node reinitiates the path finding process with the new BcastID and the previous Dseqno  Advantages  routes are estab. On demand and Dseqno are used to identify the latest path  route set up delay is less  disadvantages  Multiple RREP in response to a RREQ packet can lead to a heavy ctrl overhead  periodic beaconing leads to unnecessary BW consumption 34
  • 35. Temporally ordered Routing Algor. Source initiated on demand routing algo which provides loop free routes to the D each node maintains its one-hop local topology and also has the ability to delete partitions distance metric used in TORA is length of path or height of node N from the D 3 functions: establishment, maintaining and erasing routes route estab is performed only when a node requires a path to a D but doesn’t have any directed link this process estab D oriented Directed Acyclic Graph (DAG) using query/update mech. 35
  • 36. 36
  • 37. Temporally ordered Routing Algor.  When a node has a data packet to send to D node 7 it sends query packet. This query packet is fwd by intermediate nodes 2, 3, 4, 5 & 6and reaches D node 7 or any other node which has route to D node.  When the query packet reaches D, it sends reply containing its distance from D.  Each node that receives the update packet sets its distance to a higher value than the distance of the sender of the update packet. By doing this, a set of directed links from the node which originated the query to the D node 7 is created.  When an intermediate node(5) discovers that the route to the D is invalid, it changes its distance value to a higher value than its neighbor and originates an update packet. 37
  • 38. TORA The neighbour node 4 that recives the update packet reverses the link b/n 1 and 4 and forwards the update packet. This is done to update the DAG corresponding to D node 7. Advantages by limiting the ctrl packets for route reconfigurations to a small region, TORA incurs less ctrl overhead Disadvantages the local reconfiguration of paths results in non- optimal routes 38
  • 39. Location Aided Routing  Uses the location info for improving the efficiency of routing by reducing the ctrl overhead  availability of GPS for obtaining the position info necessary for routing  LAR designates two regions for selective fwd of ctrl packets namely 1. Expected Zone  region in which the destination node is expected to be present given info regarding its location in the past and its mobility info 2. Request Zone  geographic region within which the path finding ctrl packets are permitted to be propagated 39
  • 40. LAR 1 & 2  LAR uses flooding but here flooding is restricted to a small geographical region  the node forward or discard ctrl packets based on two algo namely LAR1 and LAR2  The source node explicitly specifies the req zone in RREQ packet  as per LAR1 the RZ is a small rectangle that includes src and dest nodes sides of which are parallel to x and y axis when S is outside the EZ  when S is inside the EZ the RZ is reduced to EZ  the src node (node 1) originates the RREQ which is broadcast to its neigh(2,5,6)  nodes 2 and 6 forwards the RREQ & node 5 discards the RREQ because it is outside the RZ 40
  • 41. 41
  • 42. LAR 1 & 2  finally the RREQ reaches the dest (node 8) which orginates route reply that contains current location and current time of the node  the src node uses these info for route establishment  the src node (node 1) includes the distance b/w itself and the dest node (node 11) along with (x,y) coordinates of D in the RREQ packet  when the intermediate node receives this RREQ packet it computes the distance b/w itself to D node.  If this distance is less than the distance from S to D+* where * is a parameter of the algo decided based on the err in location estimation and mobility then the RREQ packet is fwd. Otherwise RREQ is discarded 42
  • 43. 43
  • 44. LAR 2  Node 5 sends the RREQ this is received by nodes 1,2,4,7 and 6  only nodes 4 & 7 forwards the RREQ  other nodes 1,6,2 discards the RREQ because the distance b/w these nodes and the D node is greater than the distance b/w S node and D node  once the RREQ reaches the D(node 11) it generates and send RREP which contains the path thro which future data packets are to be propagated Advantages  LAR reduces the ctrl overhead by limiting the search area for finding a path Disadvantages  protocol cannot be used in place where GPS access is not possible 44
  • 45. Signal-Stability based Adaptive RP SSA is an on demand routing that uses the signal stability as a prime factor for finding stable routes it is beacon-based in which the signal strength of beacon is measured for determining link stability protocol consist of 2 parts Forwarding Protocol(FP)-performs actual routing to forward a pack on its way to the D Dynamic RP(DRP)- uses an extended radio interface that measures the signal strength from beacons - it maintains a rt by interacting with DRP processes on other hosts 45
  • 46. Signal-Stability based Adaptive RP Every node maintains a table that contains the beacon count and the signal strength of each of its neighbors if the node has received strong beacons for the past few beacon the node classifies the link as strong/stable link the link is otherwise classified as weak/unstable link a src node which doesn’t have a route to the D floods the n/w with RREQ pack The nodes that employ SSA protocol process a RREQ only if it is received only if it is received over a strong link a RREQ received thro weak link is dropped without processing 46
  • 47. 47
  • 48. SSA  the dest. Selects the first RREQ and initiates RREP packet to notify the selected route to the S  when a link breaks the end nodes of the broken link notify the corresponding end nodes of the path. A src node rebroadcasts the RREQ to find another stable route. If no strong path is available when a link gets broken then the new route is estab. By considering weak links also. Advantages  It finds more stable routes when compared to the shortest path route selection protocols such as DSR and AODV Disadvantages  it puts a strong RREQ fwd condition which results in RREQ failures  a failed RREQ reinitiates a path find process without considering stability criteria - BW is consumed  strong links criterion increases the path length as shortest paths may be ignored for more stable paths 48
  • 49. Zone Routing Protocol  Hybird rp which effectively combines the adv of both proactive and reactive  proactive - Intra zone RP(IARP)- for nodes within a particular zone  Reactive - Inter zone RP(IERP) - for nodes beyond this zone  the routing zone of a given node is a subset of the n/w within which all nodes are reachable within less than or equal to zone radius hops  within routing zone each node maintains the info abt the routes to all nodes by exchanging periodic route update packets  IERP is responsible for finding paths to nodes which are not within the routing zone 49
  • 50. 50
  • 51. Zone Routing Protocol  when a node S(8) has packet to be sent to node D(16) it checks whether D is within its zone. If the dest. Belongs its own zone then it delivers the pack directly.  Otherwise node S bordercast(uses unicast routing to deliver pack directly to the border nodes) the RREQ to its peripheral nodes(2,3,5,19,14,15).  If any peripheral finds a path to node D then it sends RREP otherwise it rebordercast the RREQ. This process continues until D is located.  Nodes 10 and 14 find the info abt 16 therefore they send RREP pack back to node 8.  When an intermediate node in an active path detects a broken link in the path it performs a local path reconfig. In which broken link is bypassed by means of a shorter alternate path 51
  • 52. ZRP Advantages reduces ctrl overhead compared to the RREQ flooding mechanism employed in on-demand approaches and the periodic flooding of routing info in table driven approaches Disadvantages the decisions on the zone radius has a significant impact on the performance of the protocol 52
  • 53. Power Aware Routing Protocol  Power consumption by the nodes is a serious factor to be taken into consideration by RP for AWN  the routes are also equally power constrained just as the nodes are  power aware routing metrics  singh et al. Proposed a set of routing metrics that supports conservation of bat power 1. Minimal energy consumption per packet - min the power consumed by a packet in traversing from S to D. The energy consumed is the sum of energies required at every intermediate hop in that path. The energy consumed at intermediate path is a fun. Of distance b/w the nodes that form the link and load on the link 53
  • 54. Power Aware Routing Protocol1. q 2. Maximum n/w connectivity - balancing the routing load among the out-set 3. Minimum variance in node power levels - to distribute the load among all nodes in the n/w so that the power consumption pattern remains uniform across them 4. Minimum cost per packet - in order to max the life of every node in the n/w, this routing metric is made as a fun. Of the state of the nodes bat. A nodes cost decreases with an increase in its bat charge and vice versa 5. Minimize maximum node cost - min the max cost per node for a pack after routing a number of packets or after a specific period. This delays the failure of a node occurring due to higher discharge because of pack forwarding 54
  • 55. Transport layer in Ad Hoc Networks 55
  • 56. Transport layer, Security protocols  The objectives of transport layer include setting up of end to end connection, end to end delivery of data packets, flow control and congestion control  Example  UDP-Simple, Unreliable, Connectionless  TCP- Reliable, Byte stream based, Connection oriental.  These traditional wired transport layer protocols are not suitable for adhoc wireless n/w due to inherent problems associated with the latter.  The adhoc networks are highly vulnerable to security compared to wired networks. Therefore, security protocols used in other n/w cannot be directly applied to adhoc wireless networks. 56
  • 57. Issues of designing a TL protocol  Induced traffic  The traffic at any given lines due to the traffic in neighboring lines is referred as induced traffic. This induced traffic affects the throughput achieved by the transport layer protocol.  Induced throughput unfairness  This refers to throughput unfairness at the transport layer due to the throughput/delay unfairness existing at the lower layers such as the network and MAC layer.  Separation of congestion control, flow control and reliability  The reliability and flow control are end to end activities whereas the congestion at time can be local activity. The performance of the transport layer protocol can be improved if these are handled separately.  Power and BW constraints  The performance of a transport layer protocol is significantly affected by there constraints. 57
  • 58. Issues of designing a TL protocol  Misinterpretation of congestion control  Packet loss occurs in adhoc n/w due to high error rates of channel, hidden terminal problem etc. This may lead to misinterpretation of congestion.  Completely decoupled transport layer  Wired n/w transport layer protocols are completely decoupled from the lower layers. In adhoc n/w, the cross layer interaction b/n transport layers and lower layers is important for transport layer to adopt to the changing environment.  Dynamic topology  Some of the deployment scenarios of adhoc wireless networks experience rapidly changing n/w topology due to mobility of nodes. Hence, the performance of transport layer protocol is affected by the rapid changes in n/w topology. 58
  • 59. Design goals of a TLP Should maximize the throughput/connection Should provide throughput fairness across contending flows Should have mechanisms for flow control and congestion control Should be able to provides both reliable and unreliable connections as per the req. Should incur min connection set up and connection maintenance overhead Should minimize the resource requirements for setting up and maintaining the connection 59
  • 60. Design goals of a TLP Should be able to adopt to the dynamics of the n/w BW must be used efficiently Should be aware of resource constraints such as battery power and buffer sizes and make efficient use of them Should make use of the information from the lower layers for improving networks throughput Should have well defined cross layer interaction framework for effective scalable and protocol independent interaction with lower layers Should maintain end to end 60
  • 61. 61
  • 62. Why does TCP not program well in AN 1.Miss interpretation of packet loss 2.Frequent path breaks 3.Effect of path length 4.Miss interpretation of congestion window 5.Asymmetric link behavior 6.Unidirectional path 7.Multipath routing 8.Network partitioning and reemerging 9.The use of sliding window based transmission. 62
  • 63. Feed back based TCP (TCP-F)  TCP-F is a feedback-based approach. It requires the support of a reliable link layer and routing protocol that can provide FB to the TCP sender about the path break. The routing protocol is expected to repair the broken link within a reasonable period.  A TCP session is setup b/n node A and D over the path A-B-C-D  When the intermediate link b/n node C and node D fails, node C originates the RFN packet and forwards it on the reverse path to the source node. 63
  • 64. Feed back based TCP (TCP-F)  Senders TCP stale is changed to snooze stale upon the receipt of RFN packet.  In snooze stale a sender stops sending anymore packet to the destination cancels all the timers, freezes its congestion window, freezes the retransmission timer and sets up a route failure timer.  When route failure expires the TCP sender changes stale from snooze stale to connected state.  If the link CD rejoins or if any of the intermediate nodes obtains a path to destination node a RRN packet is sent to node A and the TCP state is updated bark to connected state. 64
  • 65. Feed back based TCP (TCP-F) Advantages  TCP-F provides a simple FB based solution to minimize the problem arising out of frequent path breaks in adhoc wireless networks.  At the same time, it also permits the TCP congestion control mechanism to respond to congestion in the n/w. Disadvantages  If the route to the sender is not available at the FP then additional control packets may need to be generated for routing the RFN packet.  TCP-F has an additional state compared to the traditional TCP state m/c, and hence its implementation requires modifications to the existing TCP libraries.  Congestion window used after a new route is obtained may not reflect the achievable transmission rate to the n/w and the TCP-F receiver 65
  • 66. TCP with Explicit Link Failure Notification -ELFN  The ELFN is originated by the node detecting a path break upon detection of a link failure to the TCP sender. This can be implemented in two ways:  By sending Internet Control message protocol (ICMP) destination unreasonable (DUR) message to the sender.  By piggy barking this information on the Route Error message that is sent to the sender.  Once the TCP sender receives ELFN packet it disables its retransmission timers and enters a standby state. In this state it periodically originates probe packets to see if a new route is reestablished.  Upon reception of ACK by the TCP receiver for probe packets, it leaves the standby state, restores the retransmission timers, and continues to function as normal. 66
  • 67. TCP with Explicit Link Failure Notification -ELFN Advantages  TCP-ELFN improves the TCP notification performance by decoupling the path break information from congestion information by the use of ELFN.  It is less dependent on routing protocol and requires only link failure notification about the pat break. Disadvantages  When the n/w is temporarily partitioned the path failure may last longer and this can lead to the origination of periodic probe packets consuming BW and power.  The congestion window used after a new route is obtained may not reflect the achievable transmissions rate acceptable to the n/w and the TCP receiver. 67
  • 68. TCP-Bus  TCP with buffering capacity and sequence information (TCP-Bus) is similar to TCP-F and TCP-ELFN in its use of feedback information from an intermediate node on detection of a path break. TCP-Bus was proposed with Associativity bared routing (ABR) scheme. TCP-Bus works as follows.  Upon detection of a path break an upstream intermediate node (called pivot node PN) originates explicit route disconnection notification (ERDN) message.  This ERDN is propagated to the TCP-Bus sender  Upon reception of ERDN, the TCP-Bus sender stops transmissions and freezes all times and windows.  The packets in transit at the intermediate nodes from TCP-Bus sender to PN are buffered until a new partial path from the PN to the TCP-Bus receiver is obtained by PN 68
  • 69. 69
  • 70. TCP-Bus  Upon detection of a path break, the down stream node originates the route notification (RN) packet to the TCP bus receiver  PN attempts to final an alternate route to the TCP-Bus receiver and availability of such partial route is to destination is intimated to the TCP-Bus sender through an explicit route successful notification (ERSN) packet.  The Local Query (LQ) packet carries the sequence number of the segment at the head of the queue buffered at the PN and REPLY carries the sequence number of the last successful segment the TC-Bus receiver received. This enable the TCP-Bus receiver to understand the packets lost in transition and those buffered at the intermediate nodes.  The Lost packets are retransmitted by the TCP-Bus sender. 70
  • 71. TCP-Bus Advantages Performance improvement and avoidance of fast retransmission due to the use of buffering, seq numbering and selective acknowledgement. It takes advantage of ABR Disadvantages Increased dependency on the routing protocol and buffering at intermediate nodes The failure of intermediate nodes that buffer the packets may lead to loss of packets and performance degradation 71
  • 72. Ad Hoc TCP (ATCP)  ATCP also uses the feedback mechanism to make the sender aware of the status of the network path. Based on the feedback information retrieved from the intermediate nodes, the TCP sender changes its state to the persist state, congestion control state, or the retransmit state. 72 The major functions of the ATCP layer is to monitor the packets sent and received by the TCP sender, the state of the TCP sender, and the state of the network.
  • 73. ATCP  The four states in the ATCP are (I) NORMAL (II) CONGESTED (III) LOSS (IV) DISCONN  When a TCP connection is established, the ATCP sender is in NORMAL State. In this state, ATCP does not interfere with the operation of TCP  When packets are lot or arrive out-of-order at the destination, it generates duplicate ACKs. In traditional TCP, upon reception of duplicate ACKs, the TCP sender invokes the congestion control. But the ATCP sender counts the number of duplicate ACKs received, if it reaches three, of it puts TCP in persists state and ATCP in loss state  When a new ACK comes from TCP receiver. It is forwarded to TCP and the TCP sender is removed from the persists state and then the ATCP sender change to the NORMAL state.  When ATCP sender is in loss state, the receipt of an ECN message charges it to the CONGESTED State. Along with this transition, ATCP sender removes the TCP from the persists state.  When the n/w gets congested, the ECN flag is set in the data and the ACK packets. 73
  • 74. ATCP  When ACTP sender receives this ECN message in the normal state, it changes to the CONGESTED State, and permits TCP to invoke congestion control mechanism.  When a route failure or n/w partition occurs in the n/w, the n/w layer details these and informs to the ATCP sender through DUR message.  Upon reception of DUR message, ATCP puts the TCP sender in persists state and enters into DISCONN state  It remains in the DISCONN state until it is connected and receives data or duplicate ACKs  On the occurrence of any of three events, ATCP changes to the NORMAL State.  The receipt of DUR message in the LOSS state or CONGESTED state causes a transition to the DISCONN state 74
  • 75. ATCP Advantages  It maintains the end to end semantics of TCP  It is compatible with traditional TCP Disadvantages  The dependency on the networks layers protocol to detect the route changes and partitions, which not all-routing protocols may implement.  The addition of thin TCP layer to the protocol stack that requires changes in the interface functions currently used. 75
  • 76. Split TCP  In networks, the short connections generally obtain much higher throughput than long connections. This can also lead to unfairness among TCP session, where one session may obtain a much higher throughput than the other sessions.  Split TCP provides the solution to the throughput unfairness problem by splitting the transport layers objectives into congestion control and end to end reliability. The congestion control is mostly a local solution. At the same time, reliability is an end to end requirement and needs end to end acknowledgements.  The operation of the split TCP is shown in fig where a three stage split connection exists b/n node 1 and node 15.  A proxy node receive the TC packet, reads it, store it in its local buffer and sends LACK to the source ( or the previous proxy) 76
  • 77. Split TCP  The responsibility of further delivery of packets is assigned to proxy node. A proxy node clears a buffered packet once it receives LACK from the immediate success or proxy for that packet  the split TCP maintains the end to end ACK mechanism in addition to zone wise LACK.  The source node clears the buffered packets only after receiving the end to end acknowledgements. 77
  • 78. 78
  • 79. Split TCP Advantages  improved throughput  improved throughput fairness  Lessened impact of mobility. Since in split TCP the path length can be shorter than the end to end path length, the effect of mobility on throughput is lessened. Disadvantages  It require modifications to TCP protocol  The end to end connection handling of traditional TCP is violated  The failure of proxy nodes can lead to the throughput degradation. 79
  • 80. Application Controlled TP (ACTP)  ACTP assigns the responsibility of ensuring reliability to the application layer. It is more like UDP with FB of delivery and state maintenance. ACTP stands b/n UDP and TCP It is not an extension of TCP.  As shown in fig the application layer uses API functions to interact with the ATCP layer. Each API function sends a packet (Send To ( ) ) to the ACTP layer which contains information such as maximum delay the packet can tolerate the message number of the packet and the priority of the packet. The ATCP also maintains the delivery status through another API function. Is ACKed <message number> and is available for application layer. A zero in the delay field refers to the highest priority packet, which requires immediate txn with min delay. 80
  • 81. Application Controlled TP (ACTP) Advantages It is scalable for large n/w throughput is not affected by path break as much as in TCP. It provides freedom of choosing the required reliability level to the application layer. Disadvantages It is not compatible with TCP. 81
  • 82. Ad hoc transport protocol (ATP)  ATP is specifically designed for AWN and is not a variant of TCP. The major aspects by which ATP defers from TCP are  Coordination among multiple layers  Rate based transmission  Decoupling congestion ctrl and reliability  Assisted congestion ctrl  ATP uses information from lower layers for  Estimation of the initial transmission rate  Detection, avoidance and control of the congestion  Detection of Path breaks  The intermediate nodes attach the congestion information to every ATP packet and the ATP receiver collects it before including it in the next ACK packet. The congestion information is expressed in terms of the weighted average queuing delay (DQ) and contention delay (DC) experienced by the packet. 82
  • 83. ATP  During a connection setup process or when ATP recovers from a path breaks, the txn rate to be used is determined by a process called quick start. During quick start process, the ATP sender propagates a probe packet to which the intermediate nodes attach the transmission rate, which is received by ATP send receiver, and an ACK is sent back to ATP sender. The ATP sender starts using the newly obtained transmission rate by setting the data transmission timers.  After congestion occurs, ATP controls it using three phases, namely, increase, decrease, and maintain  If R>S(1+r) then the current txn rate is increased by a factor k. where R-> new txn rate S->current txn rate r->threshold k->difference b/n new txn rate and current txn rate  If the new txn rate is higher than the current transmission rate but less than the threshold then the current txn rate is maintained.  If an ATP sender has not received any ACK packets for two consecutive feedback periods it undergoes a multiplicate decrease of the txn rate. 83
  • 84. ATP After a third period without any ack the connection is assumed to be lost and the ATP sender goes to the connection initiation phase during which it periodically generates probe packets Advantages Improved performance Decoupling of the congestion control and reliability mechanism Avoidance of congestion window fluctuations Disadvantages Lack of interoperability with TCP 84