SlideShare a Scribd company logo
1 of 66
Routing in MANET
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad-Hoc Introduction ,[object Object],[object Object],[object Object],Infrastr-ucture Ad-Hoc Infrastructure  Ad-Hoc Need connect to Ethernet Not need Base station single -hop multi -hop Central Control Distributed routing Cost  high Cost  low Construct  slow Construct  fast Time synchronization  easy Time synchronization  tough
Ad-Hoc Development
MANET(Mobile Ad-Hoc Network) Features
MANET Application
MANET Issue
MANET Routing Protocol(1/2)
MANET Routing Protocol(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance Vector Protocol(DSDV) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance Vector Protocol ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
The Forwarding Routing Table ,[object Object],[object Object],[object Object],[object Object],[object Object],Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH2 2 S406_MH1 T001MH4 Ptr1_MH1 MH2 MH2 1 S128_MH2 T001MH4 Ptr1_MH2 MH3 MH2 2 S564_MH3 T001MH4 Ptr1_MH3 MH4 MH4 0 S710_MH4 T001MH4 Ptr1_MH4 Etc.
Route Selection ,[object Object],[object Object],[object Object],[object Object]
Rules to set sequence number Information ,[object Object],[object Object],[object Object],[object Object],[object Object],Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH1 1 S406_MH1 T001MH2 Ptr1_MH1 MH2 MH2 0 S128_MH2 T001MH2 Ptr1_MH2 MH3 MH3  S561_MH3 T001MH2 Ptr1_MH3 MH4 MH4 1 S710_MH4 T001MH2 Ptr1_MH4 Etc.
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4  Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 1 ,[object Object],[object Object],[object Object]
Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4  advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
Adjustment in carried information ,[object Object],[object Object],[object Object],[object Object],[object Object]
Receiving Fluctuating Routes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Damping Fluctuation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Settling Time Table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DSDV Disadvantages and Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Unidirectional and Bi-directional links A B C D
DSDV Disadvantages and Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) ,[object Object],Ad-hoc On-Demand Distance Vector Routing ECE697A Advanced Computer Networks Presented by Qifeng Lu Scalable AODV with Efficient Flooding based on On-Demand (Passive) Clustering Yunjung Yi and Mario Gerla University of California, Los Angeles
Outline ,[object Object],[object Object],[object Object]
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AODV  Features V.S. DSDV Routes   are created  only when required Each node  doesn’t maintain all routes  to other nodes (only active routes) Use of  sequence numbers  at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses  symmetric links  (if a link is not symmetric it is not up) Works both on wired media and wireless media
AODV Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object]
Path Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
Route Discovery(2/2) ,[object Object],RREP RREP source_addr hop_cnt dest_addr source_sequence_# lifetime (expiration time for reverse path route entry)
Reverse Path Setup ,[object Object],S D RREP (Route Reply) RREQ (Route Request) Drop ClusterHead Gateway Ordinary Node
Forward Path Setup ,[object Object],sequence number = 99 sequence number = 101 REEQ  sequence number = 100 A C B D T^T  Send  RREQ =V=  Send  RREP Unicast
Route Table Management ,[object Object],[object Object],A B C D RERR
AODV with Efficient Flooding ,[object Object],[object Object],[object Object],[object Object],[object Object],S D ClusterHead Gateway Ordinary Node
Dynamic Source Routing  (DSR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Source Routing (DSR) ,[object Object],[object Object],[object Object]
Two Main Components ,[object Object],[object Object],[object Object],[object Object]
Route Discovery(1/13) ,[object Object],[object Object]
Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
Route Discovery(3/13) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(4/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y]  Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
Route Discovery(6/13) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
Route Discovery(8/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source Address Request ID
Route Discovery(9/13) ,[object Object],[object Object],[S,C,G] [S,E,F] [S,B,A] [S,B,H] B A S E F H J D C G I K Z Y M N L
Route Discovery(10/13) J  and  K  both broadcast RREQ to  D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
Route Discovery(11/13) D   does not forward  RREQ, because  D  is the  intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
Route Discovery(12/13) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
Route Maintenance(1/6) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
Route Maintenance(3/6) ,[object Object],[object Object],[object Object],[object Object]
Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
Route Maintenance(5/6) ,[object Object],[object Object]
Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
DSR vs. AODV AODV DSR Path  Information Limited  information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of  route path New We don’t know Delete invalid path when RRER Delete all  Only delete some node
Hybrid Protocol  ,[object Object],[object Object],[object Object],Routing Zone Inter-Zone Routing Intra-Zone Routing On-Demand Table-Driven
Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined  when needed Depend on  the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used  inside each zone , or between gateways Handling effects of mobility Usually  updates  occur at fixed  intervals. AODV,DSR uses local  route discovery  Usually  more than one path  maybe available. Single point of failures are reduced by working as a group
Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required.  Usually lower than proactive protocols  Usually  depends on the size of each cluster or zone  may become as large as proactive protocols if clusters are big Delay level Small  routes are predetermined  Higher  than proactive For local destinations small.  Inter-zone maybe  as large as  reactive protocols  Scalability level Usually up to  100  nodes.  Source routing protocols up to  few hundred  nodes. Designed for up to  1000 or more  nodes
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Q&A ,[object Object]

More Related Content

What's hot

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 

What's hot (20)

Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 
Vanet ppt
Vanet pptVanet ppt
Vanet ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 

Viewers also liked

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkChandra Meena
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc networkskobu
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocolsshashi712
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 

Viewers also liked (20)

Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]Mobile ad-hoc network [autosaved]
Mobile ad-hoc network [autosaved]
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Mobile ad hoc network
Mobile ad hoc networkMobile ad hoc network
Mobile ad hoc network
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
DYNAMIC SOURCE ROUTING (DSR)
DYNAMIC SOURCE ROUTING  (DSR)DYNAMIC SOURCE ROUTING  (DSR)
DYNAMIC SOURCE ROUTING (DSR)
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Manet
ManetManet
Manet
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
MANET
MANETMANET
MANET
 
Manet
ManetManet
Manet
 

Similar to Routing Protocols in MANET

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsDharunMagil
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.pptImXaib
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 

Similar to Routing Protocols in MANET (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
A41040105
A41040105A41040105
A41040105
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
networking
networkingnetworking
networking
 
Routing
RoutingRouting
Routing
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
F41023946
F41023946F41023946
F41023946
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Routing Protocols in MANET

  • 2.
  • 3.
  • 9.
  • 10.
  • 11.
  • 12. Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
  • 13.
  • 14.
  • 15.
  • 16. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
  • 17. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4 Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
  • 18.
  • 19. Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4 advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. AODV Features V.S. DSDV Routes are created only when required Each node doesn’t maintain all routes to other nodes (only active routes) Use of sequence numbers at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses symmetric links (if a link is not symmetric it is not up) Works both on wired media and wireless media
  • 31.
  • 32.
  • 33. Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
  • 44.
  • 45.
  • 46. Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y] Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
  • 47.
  • 48. Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
  • 49.
  • 50.
  • 51. Route Discovery(10/13) J and K both broadcast RREQ to D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 52. Route Discovery(11/13) D does not forward RREQ, because D is the intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
  • 53.
  • 54. Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
  • 55.
  • 56. Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
  • 57.
  • 58. Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
  • 59.
  • 60. Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 61. DSR vs. AODV AODV DSR Path Information Limited information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of route path New We don’t know Delete invalid path when RRER Delete all Only delete some node
  • 62.
  • 63. Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined when needed Depend on the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used inside each zone , or between gateways Handling effects of mobility Usually updates occur at fixed intervals. AODV,DSR uses local route discovery Usually more than one path maybe available. Single point of failures are reduced by working as a group
  • 64. Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required. Usually lower than proactive protocols Usually depends on the size of each cluster or zone may become as large as proactive protocols if clusters are big Delay level Small routes are predetermined Higher than proactive For local destinations small. Inter-zone maybe as large as reactive protocols Scalability level Usually up to 100 nodes. Source routing protocols up to few hundred nodes. Designed for up to 1000 or more nodes
  • 65.
  • 66.