SlideShare a Scribd company logo
1 of 40
Presented By:-
Ashok Panwar
Technical Officer in ECIL(NPCIL)
Tarapur, Mumbai
Routing Protocols
in MANETs
1
What is a MANET
Mobile nodes, wireless links
Infrastructure-less: by the nodes, …
Multi-hop routing: …, and for the nodes
Minimal administration: no hassles
2
Ashok Panwar
Technical Officer in ECIL
What’s unique about a MANET ?
Moving nodes  ever changing topology
Wireless links
  various and volatile link quality
Pervasive (cheap) devices
 Power constraints
Security
 Confidentiality, other attacks
3
Ashok Panwar
Technical Officer in ECIL
Challenges in MANET Routing
Need dynamic routing
Frequent topological changes possible.
Very different from dynamic routing in the Internet.
Potential of network partitions.
Routing overhead must be kept minimal
Wireless  low bandwidth
Mobile  low power
Minimize # of routing control messages
Minimize routing state at each node
4
Ashok Panwar
Technical Officer in ECIL
Other Challenges
Auto configuration issues
Address assignment
Service discovery
Security issues
Ease of denial-of-service attack
Misbehaving nodes difficult to identify
Nodes can be easily compromised
New Applications/services
Location based: Distribute some information to all nodes in a
geographic area (geocast).
Content based: Query all sensors that sensed something particular in
the past hour.
5
Ashok Panwar
Technical Officer in ECIL
MANET Protocol Zoo
Topology based routing
 Proactive approach, e.g., DSDV.
 Reactive approach, e.g., DSR, AODV, TORA.
 Hybrid approach, e.g., Cluster, ZRP.
 Position based routing
 Location Services:
DREAM, Quorum-based, GLS, Home zone etc.
 Forwarding Strategy:
Greedy, GPSR, RDF, Hierarchical, etc.
6
Ashok Panwar
Technical Officer in ECIL
Routing Protocols
Reactive (On-demand) protocols
Discover routes when needed
Source-initiated route discovery
Proactive protocols
Traditional distributed shortest-path protocols
Based on periodic updates. High routing overhead
Tradeoff
State maintenance traffic vs. route discovery traffic
Route via maintained route vs. delay for route discovery
7
Ashok Panwar
Technical Officer in ECIL
Reactive Routing
Key Goal: Reduction in routing overhead
Useful when number of traffic sessions is much lower
than the number of nodes.
No routing structure created a priori. Let the
structure emerge in response to a need
Two key methods for route discovery
source routing
backward learning (similar to intra-AS routing)
Introduces delay
8
Ashok Panwar
Technical Officer in ECIL
Reactive (on-demand) routing:
Routing only when needed
0
5
1
2
4
3
query(0)
query(0)
query(0)
query(0)
query(0)
query(0)
query(0)
reply(0)
reply(0)
reply(0)
Advantages:
 eliminate periodic updates
 adaptive to network dynamics
Disadvantages:
 high flood-search overhead with
mobility, distributed traffic
 high route acquisition latency
9
Ashok Panwar
Technical Officer in ECIL
Reactive Routing – Source initiated
Source floods the network with a route request packet
when a route is required to a destination
Flood is propagated outwards from the source
Pure flooding = every node transmits the request only once
Destination replies to request
Reply uses reversed path of route request
sets up the forward path
Two key protocols: DSR and AODV
10
Ashok Panwar
Technical Officer in ECIL
Dynamic Source Routing (DSR)
Cooperative nodes
Relatively small network diameter (5-10 hops)
Detectable packet error
Unidirectional or bidirectional link
Promiscuous mode (optional)
11
Ashok Panwar
Technical Officer in ECIL
A
B
C
E
D
G
H
F
A
A
A-B
A-C
A-C-E
A-C-E
A-C-E
A-B-D
A-B-D-G
A-B-D-G
A-B-D-G
Route Discovery
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
Route Discovery is issued with exponential back-off intervals.Route Discovery is issued with exponential back-off intervals.
Initiator ID
Initiator seq#
Target ID
Partial route
RREQ FORMATRREQ FORMAT
12
Ashok Panwar
Technical Officer in ECIL
Route Discovery: at source A
A need to send to G
Lookup Cache for route A to G
Route
found?
Start Route
Discovery
Protocol
Continue
normal
processing
Route Discovery
finished
Packet in
buffer?
Send packet to
next-hop
done
Buffer
packet
no
Write route in
packet header
yes
yes
no
wait
13
Ashok Panwar
Technical Officer in ECIL
Route Discovery: At an intermediate node
Accept route
request packet
<src,id> in
recently seen
requests list?
Discard
route
request
yes
no
Host’s address
already in patrial
route
Discard
route
request
yes
Store <src,id> in list
Broadcast packet
Send route reply
packet
done
myAddr=t
arget
no
Append myAddr to
partial route no
yes
14
Ashok Panwar
Technical Officer in ECIL
DSR - Route Discovery
Route ReplyRoute Reply message containing path information is sent
back to the source either by
the destination, or
intermediate nodes that have a route to the destination
Reverse the order of the route record, and include it in Route
Reply.
Unicast, source routing
Each node maintains a Route CacheRoute Cache which records routes it
has learned and overheard over time
15
Ashok Panwar
Technical Officer in ECIL
Route Maintenance
Route maintenance performed only while route is in use
Error detection:
Monitors the validity of existing routes by passively listening to
data packets transmitted at neighboring nodes
Lower level acknowledgements
When problem detected, send Route ErrorRoute Error packet to
original sender to perform new route discovery
Host detects the error and the host it was attempting;
Route ErrorRoute Error is sent back to the sender the packet – original srcis sent back to the sender the packet – original src
16
Ashok Panwar
Technical Officer in ECIL
A
B
C
E
D
G
H
F
G
RERR
RERR
Route Cache (A)
G: A, B, D, G G: A,
C, E, H, G
F: B, C, F
Route Maintenance
17
Ashok Panwar
Technical Officer in ECIL
A Summary of DSRA Summary of DSR
Entirely on-demand, potentially zero control message overhead
Trivially loop-free with source routing
Conceptually supports unidirectional links as well as
bidirectional links
High packet delays/jitters associated with on-demand routing
Space overhead in packets and route caches
Promiscuous mode operations consume excessive amount of
power
18
Ashok Panwar
Technical Officer in ECIL
Break…
Then AODV
19
Ashok Panwar
Technical Officer in ECIL
AODV Routing Protocol
AODV = Ad Hoc On-demand Distance Vector
Source floods route request in the network.
Reverse paths are formed when a node hears a route request.
Each node forwards the request only once (pure flooding).
A
S E
F
B
C
G D
20
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Source floods route request in the network.
Each node forwards the request only once (pure flooding).
A
S E
F
B
C
G D
21
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Uses hop-by-hop routing.
Each node forwards the request only once (pure flooding).
Reverse paths are formed when a node hears a route request.
A
S E
F
B
C
G D
22
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Route reply forwarded via the reverse path.
A
S E
F
B
C
G D
23
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Route reply is forwarded via the reverse path …
thus forming the forward path.
The forward path is used to route data packets.
A
S E
F
B
C
G D
24
Ashok Panwar
Technical Officer in ECIL
Route Expiry
Unused paths expire based on a timer.
A
S E
F
B
C
G D
25
Ashok Panwar
Technical Officer in ECIL
AODV – Optimization
Useful optimization: An intermediate node with a
route to D can reply to route request.
Faster operation.
Quenches route request flood.
Above optimization can cause loops in presence of
link failures
26
Ashok Panwar
Technical Officer in ECIL
AODV: Routing Loops
Assume, link C-D fails, and node A does not know about it
(route error packet from C is lost).
C performs a route discovery for D.
Node A receives the route request (via path C-E-A)
Node A replies, since A knows a route to D via node B
Results in a loop: C-E-A-B-C
A B C D
E
27
Ashok Panwar
Technical Officer in ECIL
AODV: Routing Loops
A B C D
E
• Assume, the link C-D fails, and node A does not know about
it (route error packet from C is lost).
• C performs a route discovery for D.
• Node A receives the route request (via path C-E-A)
• Node A replies, since A knows a route to D via node B
• Results in a loop: C-E-A-B-C
28
Ashok Panwar
Technical Officer in ECIL
AODV: Use Sequence Numbers
Each node X maintains a sequence number
acts as a time stamp
incremented every time X sends any message)
Each route to X (at any node Y) also has X’s
sequence number associated with it, which is Y’s
latest knowledge of X’s sequence number.
Sequence number signifies ‘freshness’ of the route
– higher the number, more up to date is the route.
29
Ashok Panwar
Technical Officer in ECIL
Use of Sequence Numbers in AODV
Loop freedom: Intermediate node replies with a route
(instead of forwarding request) only if it has a route
with a higher associated sequence number.
S Y D?
Dest seq. no. = 10 Has a route to D
with seq. no = 7 Seq. no. = 15
RREQ carries 10 Y does not reply, but
forwards the RREQ
30
Ashok Panwar
Technical Officer in ECIL
Avoidance of Loop
Link failure increments the DSN at C (now is 10).
If C needs route to D, RREQ carries the DSN (10).
A does not reply as its own DSN is less than 10.
A B C D
E
109
9
7
5
All DNS’s are for D
DSN = Destination Sequence Number.
31
Ashok Panwar
Technical Officer in ECIL
Path Maintenance
Movement not along active path triggers no action
If source moves, reinitiate route discovery
When destination or intermediate node moves
 upstream node of break broadcasts Route Error (RERR)
 RERR contains list of all destinations no longer reachable due to link
break
 RERR propagated until node with no precursors for destination is
reached
Source
Destination
1
2
3
4
3’
Source
Destination
1
2
4
3’
32
Ashok Panwar
Technical Officer in ECIL
Summary: AODV
At most one route per destination maintained at
each node
After link break, all routes using the failed link are erased.
Expiration based on timeouts.
Use of sequence numbers to prevent loops.
Optimizations
 Routing tables instead of storing full routes.
 Control flooding (incrementally increase ‘region’)
33
Ashok Panwar
Technical Officer in ECIL
Other notes
34
Ashok Panwar
Technical Officer in ECIL
Proposed Routing Approaches
Conventional wired-type schemes (global routing,
proactive):
Distance Vector; Link State
Hierarchical (global routing) schemes:
Fisheye, Hierarchical State Routing, Landmark Routing
On- Demand, reactive routing:
Source routing; backward learning
Location Assisted routing (Geo-routing):
DREAM, LAR etc
35
Ashok Panwar
Technical Officer in ECIL
Conventional wired routing limitations
Distance Vector (eg, Bellman-Ford, DSDV):
routing control O/H linearly increasing with net size
convergence problems (count to infinity); potential loops
Link State (eg, OSPF):
link update flooding O/H caused by frequent topology
changes
CONVENTIONAL ROUTING DOES NOT SCALE TO SIZE AND
MOBILITY
36
Ashok Panwar
Technical Officer in ECIL
Distance Vector
0
5
1
2
4
3
Destination Next Hop Distance
0 2 3
1 2 2
… … …
Routing table at node 5 :
Tables grow linearly with # nodes
Control O/H grows with
mobility and size
37
Ashok Panwar
Technical Officer in ECIL
Link State Routing
 At node 5, based on the link
state packets, topology table is
constructed:
 Dijkstra’s Algorithm can then
be used for the shortest path
0
5
1
2
4
3
{1}
{0,2,3}
{1,4}
{2,4}
{2,3,5}
{1,4,5}
0 1 2 3 4 5
0 1 1 0 0 0 0
1 1 1 1 1 0 0
2 0 1 1 0 1 1
3 0 1 0 1 1 0
4 0 0 1 1 1 1
5 0 0 1 0 1 1
38
Ashok Panwar
Technical Officer in ECIL
Existing On-Demand Protocols
Dynamic Source Routing (DSR)
Associativity - Based Routing (ABR)
Ad-hoc On-demand Distance Vector (AODV)
Temporarily Ordered Routing Algorithm (TORA)
Zone Routing Protocol (ZRP)
Signal Stability Based Adaptive Routing (SSA)
On Demand Multicast Routing Protocol (ODMRP)
…
39
Ashok Panwar
Technical Officer in ECIL
Questions???
Thank You!!!
40

More Related Content

What's hot

Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
aghacrom
 
Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
Iffat Anjum
 

What's hot (19)

Otv notes
Otv notesOtv notes
Otv notes
 
Anatomy of an AP
Anatomy of an APAnatomy of an AP
Anatomy of an AP
 
Madge Smart Ringswitch - Version 3 Software
Madge Smart Ringswitch - Version 3 SoftwareMadge Smart Ringswitch - Version 3 Software
Madge Smart Ringswitch - Version 3 Software
 
RISC-V Zce Extension
RISC-V Zce ExtensionRISC-V Zce Extension
RISC-V Zce Extension
 
Session 2,3 FPGAs
Session 2,3 FPGAsSession 2,3 FPGAs
Session 2,3 FPGAs
 
Getting started with RISC-V verification what's next after compliance testing
Getting started with RISC-V verification what's next after compliance testingGetting started with RISC-V verification what's next after compliance testing
Getting started with RISC-V verification what's next after compliance testing
 
M3
M3M3
M3
 
Evolving Data Center switching with TRILL
Evolving Data Center switching with TRILLEvolving Data Center switching with TRILL
Evolving Data Center switching with TRILL
 
Lab9500
Lab9500Lab9500
Lab9500
 
Devdutt Pawaskar Resume
Devdutt Pawaskar ResumeDevdutt Pawaskar Resume
Devdutt Pawaskar Resume
 
Zynq architecture
Zynq architectureZynq architecture
Zynq architecture
 
Xilinx 4000 series
Xilinx 4000 seriesXilinx 4000 series
Xilinx 4000 series
 
Flip Chip technology
Flip Chip technologyFlip Chip technology
Flip Chip technology
 
Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1Expl sw chapter_02_switches_part_1
Expl sw chapter_02_switches_part_1
 
MIPI DevCon 2016: MIPI C-PHY - Introduction From Basic Theory to Practical Im...
MIPI DevCon 2016: MIPI C-PHY - Introduction From Basic Theory to Practical Im...MIPI DevCon 2016: MIPI C-PHY - Introduction From Basic Theory to Practical Im...
MIPI DevCon 2016: MIPI C-PHY - Introduction From Basic Theory to Practical Im...
 
lecciones ccna3
lecciones ccna3lecciones ccna3
lecciones ccna3
 
My Project
My ProjectMy Project
My Project
 
PLC training
PLC trainingPLC training
PLC training
 
Fpga(field programmable gate array)
Fpga(field programmable gate array) Fpga(field programmable gate array)
Fpga(field programmable gate array)
 

Similar to Routing Protocols in MANET's by Ashok Panwar

RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
ImXaib
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
Sujit833143
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
AmzadKhn
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
sangusajjan
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
DEEPAK948083
 

Similar to Routing Protocols in MANET's by Ashok Panwar (20)

RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
Ad-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok PanwarAd-hoc Networks by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
 
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok PanwarSecure Routing with AODV Protocol for MANET by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Routing
RoutingRouting
Routing
 
Mona
MonaMona
Mona
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
 
B03406010
B03406010B03406010
B03406010
 

More from Ashok Panwar (8)

Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok PanwarSimulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
 
Secure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok PanwarSecure Mail Application's by Ashok Panwar
Secure Mail Application's by Ashok Panwar
 
Quality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarQuality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok Panwar
 
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok PanwarPerformance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
 
Network Management by Ashok Panwar
Network Management by Ashok PanwarNetwork Management by Ashok Panwar
Network Management by Ashok Panwar
 
Introduction to Security Management by Ashok Panwar
Introduction to Security Management by Ashok PanwarIntroduction to Security Management by Ashok Panwar
Introduction to Security Management by Ashok Panwar
 
Firewalls & Trusted Systems by Ashok Panwar
Firewalls & Trusted Systems by Ashok PanwarFirewalls & Trusted Systems by Ashok Panwar
Firewalls & Trusted Systems by Ashok Panwar
 
Ad-hoc networking with AODV
Ad-hoc networking with AODVAd-hoc networking with AODV
Ad-hoc networking with AODV
 

Recently uploaded

Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
F
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 

Recently uploaded (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
Tadepalligudem Escorts Service Girl ^ 9332606886, WhatsApp Anytime Tadepallig...
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理一比一原版田纳西大学毕业证如何办理
一比一原版田纳西大学毕业证如何办理
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 

Routing Protocols in MANET's by Ashok Panwar

  • 1. Presented By:- Ashok Panwar Technical Officer in ECIL(NPCIL) Tarapur, Mumbai Routing Protocols in MANETs 1
  • 2. What is a MANET Mobile nodes, wireless links Infrastructure-less: by the nodes, … Multi-hop routing: …, and for the nodes Minimal administration: no hassles 2 Ashok Panwar Technical Officer in ECIL
  • 3. What’s unique about a MANET ? Moving nodes  ever changing topology Wireless links   various and volatile link quality Pervasive (cheap) devices  Power constraints Security  Confidentiality, other attacks 3 Ashok Panwar Technical Officer in ECIL
  • 4. Challenges in MANET Routing Need dynamic routing Frequent topological changes possible. Very different from dynamic routing in the Internet. Potential of network partitions. Routing overhead must be kept minimal Wireless  low bandwidth Mobile  low power Minimize # of routing control messages Minimize routing state at each node 4 Ashok Panwar Technical Officer in ECIL
  • 5. Other Challenges Auto configuration issues Address assignment Service discovery Security issues Ease of denial-of-service attack Misbehaving nodes difficult to identify Nodes can be easily compromised New Applications/services Location based: Distribute some information to all nodes in a geographic area (geocast). Content based: Query all sensors that sensed something particular in the past hour. 5 Ashok Panwar Technical Officer in ECIL
  • 6. MANET Protocol Zoo Topology based routing  Proactive approach, e.g., DSDV.  Reactive approach, e.g., DSR, AODV, TORA.  Hybrid approach, e.g., Cluster, ZRP.  Position based routing  Location Services: DREAM, Quorum-based, GLS, Home zone etc.  Forwarding Strategy: Greedy, GPSR, RDF, Hierarchical, etc. 6 Ashok Panwar Technical Officer in ECIL
  • 7. Routing Protocols Reactive (On-demand) protocols Discover routes when needed Source-initiated route discovery Proactive protocols Traditional distributed shortest-path protocols Based on periodic updates. High routing overhead Tradeoff State maintenance traffic vs. route discovery traffic Route via maintained route vs. delay for route discovery 7 Ashok Panwar Technical Officer in ECIL
  • 8. Reactive Routing Key Goal: Reduction in routing overhead Useful when number of traffic sessions is much lower than the number of nodes. No routing structure created a priori. Let the structure emerge in response to a need Two key methods for route discovery source routing backward learning (similar to intra-AS routing) Introduces delay 8 Ashok Panwar Technical Officer in ECIL
  • 9. Reactive (on-demand) routing: Routing only when needed 0 5 1 2 4 3 query(0) query(0) query(0) query(0) query(0) query(0) query(0) reply(0) reply(0) reply(0) Advantages:  eliminate periodic updates  adaptive to network dynamics Disadvantages:  high flood-search overhead with mobility, distributed traffic  high route acquisition latency 9 Ashok Panwar Technical Officer in ECIL
  • 10. Reactive Routing – Source initiated Source floods the network with a route request packet when a route is required to a destination Flood is propagated outwards from the source Pure flooding = every node transmits the request only once Destination replies to request Reply uses reversed path of route request sets up the forward path Two key protocols: DSR and AODV 10 Ashok Panwar Technical Officer in ECIL
  • 11. Dynamic Source Routing (DSR) Cooperative nodes Relatively small network diameter (5-10 hops) Detectable packet error Unidirectional or bidirectional link Promiscuous mode (optional) 11 Ashok Panwar Technical Officer in ECIL
  • 12. A B C E D G H F A A A-B A-C A-C-E A-C-E A-C-E A-B-D A-B-D-G A-B-D-G A-B-D-G Route Discovery A-B-C A-B-C Route Request (RREQ) Route Reply (RREP) Route Discovery is issued with exponential back-off intervals.Route Discovery is issued with exponential back-off intervals. Initiator ID Initiator seq# Target ID Partial route RREQ FORMATRREQ FORMAT 12 Ashok Panwar Technical Officer in ECIL
  • 13. Route Discovery: at source A A need to send to G Lookup Cache for route A to G Route found? Start Route Discovery Protocol Continue normal processing Route Discovery finished Packet in buffer? Send packet to next-hop done Buffer packet no Write route in packet header yes yes no wait 13 Ashok Panwar Technical Officer in ECIL
  • 14. Route Discovery: At an intermediate node Accept route request packet <src,id> in recently seen requests list? Discard route request yes no Host’s address already in patrial route Discard route request yes Store <src,id> in list Broadcast packet Send route reply packet done myAddr=t arget no Append myAddr to partial route no yes 14 Ashok Panwar Technical Officer in ECIL
  • 15. DSR - Route Discovery Route ReplyRoute Reply message containing path information is sent back to the source either by the destination, or intermediate nodes that have a route to the destination Reverse the order of the route record, and include it in Route Reply. Unicast, source routing Each node maintains a Route CacheRoute Cache which records routes it has learned and overheard over time 15 Ashok Panwar Technical Officer in ECIL
  • 16. Route Maintenance Route maintenance performed only while route is in use Error detection: Monitors the validity of existing routes by passively listening to data packets transmitted at neighboring nodes Lower level acknowledgements When problem detected, send Route ErrorRoute Error packet to original sender to perform new route discovery Host detects the error and the host it was attempting; Route ErrorRoute Error is sent back to the sender the packet – original srcis sent back to the sender the packet – original src 16 Ashok Panwar Technical Officer in ECIL
  • 17. A B C E D G H F G RERR RERR Route Cache (A) G: A, B, D, G G: A, C, E, H, G F: B, C, F Route Maintenance 17 Ashok Panwar Technical Officer in ECIL
  • 18. A Summary of DSRA Summary of DSR Entirely on-demand, potentially zero control message overhead Trivially loop-free with source routing Conceptually supports unidirectional links as well as bidirectional links High packet delays/jitters associated with on-demand routing Space overhead in packets and route caches Promiscuous mode operations consume excessive amount of power 18 Ashok Panwar Technical Officer in ECIL
  • 20. AODV Routing Protocol AODV = Ad Hoc On-demand Distance Vector Source floods route request in the network. Reverse paths are formed when a node hears a route request. Each node forwards the request only once (pure flooding). A S E F B C G D 20 Ashok Panwar Technical Officer in ECIL
  • 21. AODV Route Discovery Source floods route request in the network. Each node forwards the request only once (pure flooding). A S E F B C G D 21 Ashok Panwar Technical Officer in ECIL
  • 22. AODV Route Discovery Uses hop-by-hop routing. Each node forwards the request only once (pure flooding). Reverse paths are formed when a node hears a route request. A S E F B C G D 22 Ashok Panwar Technical Officer in ECIL
  • 23. AODV Route Discovery Route reply forwarded via the reverse path. A S E F B C G D 23 Ashok Panwar Technical Officer in ECIL
  • 24. AODV Route Discovery Route reply is forwarded via the reverse path … thus forming the forward path. The forward path is used to route data packets. A S E F B C G D 24 Ashok Panwar Technical Officer in ECIL
  • 25. Route Expiry Unused paths expire based on a timer. A S E F B C G D 25 Ashok Panwar Technical Officer in ECIL
  • 26. AODV – Optimization Useful optimization: An intermediate node with a route to D can reply to route request. Faster operation. Quenches route request flood. Above optimization can cause loops in presence of link failures 26 Ashok Panwar Technical Officer in ECIL
  • 27. AODV: Routing Loops Assume, link C-D fails, and node A does not know about it (route error packet from C is lost). C performs a route discovery for D. Node A receives the route request (via path C-E-A) Node A replies, since A knows a route to D via node B Results in a loop: C-E-A-B-C A B C D E 27 Ashok Panwar Technical Officer in ECIL
  • 28. AODV: Routing Loops A B C D E • Assume, the link C-D fails, and node A does not know about it (route error packet from C is lost). • C performs a route discovery for D. • Node A receives the route request (via path C-E-A) • Node A replies, since A knows a route to D via node B • Results in a loop: C-E-A-B-C 28 Ashok Panwar Technical Officer in ECIL
  • 29. AODV: Use Sequence Numbers Each node X maintains a sequence number acts as a time stamp incremented every time X sends any message) Each route to X (at any node Y) also has X’s sequence number associated with it, which is Y’s latest knowledge of X’s sequence number. Sequence number signifies ‘freshness’ of the route – higher the number, more up to date is the route. 29 Ashok Panwar Technical Officer in ECIL
  • 30. Use of Sequence Numbers in AODV Loop freedom: Intermediate node replies with a route (instead of forwarding request) only if it has a route with a higher associated sequence number. S Y D? Dest seq. no. = 10 Has a route to D with seq. no = 7 Seq. no. = 15 RREQ carries 10 Y does not reply, but forwards the RREQ 30 Ashok Panwar Technical Officer in ECIL
  • 31. Avoidance of Loop Link failure increments the DSN at C (now is 10). If C needs route to D, RREQ carries the DSN (10). A does not reply as its own DSN is less than 10. A B C D E 109 9 7 5 All DNS’s are for D DSN = Destination Sequence Number. 31 Ashok Panwar Technical Officer in ECIL
  • 32. Path Maintenance Movement not along active path triggers no action If source moves, reinitiate route discovery When destination or intermediate node moves  upstream node of break broadcasts Route Error (RERR)  RERR contains list of all destinations no longer reachable due to link break  RERR propagated until node with no precursors for destination is reached Source Destination 1 2 3 4 3’ Source Destination 1 2 4 3’ 32 Ashok Panwar Technical Officer in ECIL
  • 33. Summary: AODV At most one route per destination maintained at each node After link break, all routes using the failed link are erased. Expiration based on timeouts. Use of sequence numbers to prevent loops. Optimizations  Routing tables instead of storing full routes.  Control flooding (incrementally increase ‘region’) 33 Ashok Panwar Technical Officer in ECIL
  • 35. Proposed Routing Approaches Conventional wired-type schemes (global routing, proactive): Distance Vector; Link State Hierarchical (global routing) schemes: Fisheye, Hierarchical State Routing, Landmark Routing On- Demand, reactive routing: Source routing; backward learning Location Assisted routing (Geo-routing): DREAM, LAR etc 35 Ashok Panwar Technical Officer in ECIL
  • 36. Conventional wired routing limitations Distance Vector (eg, Bellman-Ford, DSDV): routing control O/H linearly increasing with net size convergence problems (count to infinity); potential loops Link State (eg, OSPF): link update flooding O/H caused by frequent topology changes CONVENTIONAL ROUTING DOES NOT SCALE TO SIZE AND MOBILITY 36 Ashok Panwar Technical Officer in ECIL
  • 37. Distance Vector 0 5 1 2 4 3 Destination Next Hop Distance 0 2 3 1 2 2 … … … Routing table at node 5 : Tables grow linearly with # nodes Control O/H grows with mobility and size 37 Ashok Panwar Technical Officer in ECIL
  • 38. Link State Routing  At node 5, based on the link state packets, topology table is constructed:  Dijkstra’s Algorithm can then be used for the shortest path 0 5 1 2 4 3 {1} {0,2,3} {1,4} {2,4} {2,3,5} {1,4,5} 0 1 2 3 4 5 0 1 1 0 0 0 0 1 1 1 1 1 0 0 2 0 1 1 0 1 1 3 0 1 0 1 1 0 4 0 0 1 1 1 1 5 0 0 1 0 1 1 38 Ashok Panwar Technical Officer in ECIL
  • 39. Existing On-Demand Protocols Dynamic Source Routing (DSR) Associativity - Based Routing (ABR) Ad-hoc On-demand Distance Vector (AODV) Temporarily Ordered Routing Algorithm (TORA) Zone Routing Protocol (ZRP) Signal Stability Based Adaptive Routing (SSA) On Demand Multicast Routing Protocol (ODMRP) … 39 Ashok Panwar Technical Officer in ECIL