SlideShare a Scribd company logo
1 of 25
PREPARED BY
Ms.S.MENAGA,AP/ECE
MS.J.PARUVATHAVARDHINI,AP/ECE
JSREC, TIRUPPUR
 Introduction
 Classification
 Table Driven Routing Protocols – Destination
Sequenced Distance Vector (DSDV)
 On–Demand Routing protocols –Ad hoc On–Demand
Distance Vector Routing (AODV) Hybrid routing
protocols
 The environment of Ad hoc acomplished with the following terms:
◦ Changing topology dynamically
◦ Absence of fixed infrastructure
◦ No Centralized administration(No Access point)
◦ Bandwidth constrained wireless links
◦ Energy-constrained nodes
◦ Link loss issues
Routing protocols for ad-hoc wireless networks can be
broadly classified into four categories based on:
1. Routing information update mechanism;
2. Usage of temporal information for routing(e.g.
cached routes);
3. Routing topology information;
4. Utilization of specific resources (e.g. GPS).
 Based on routing information update mechanism
◦ Proactive (table-driven) routing protocols:
-Every node maintain the network topology (routing tables)
-Periodically exchange to all nodes in the network using
flooding
◦ Reactive (on-demand) routing protocols:
- Path is acquired by connection establishment process
◦ Hybrid protocols:
- Combined of above two methods.
 Based on usage of temporal information
◦ Based on past temporal information:
-Make decision based on the past status of the links.
◦ Based on future temporal information.
-Make decision based on the expected future status of the
links.
 Based on the routing topology
◦ Flat topology routing protocols – use of flat
addressing scheme
◦ Hierarchial topology routing protocols- use of
logical hierarchy in the network
 Routing based on utilization of specific
resources:
◦ Power-aware routing-Aims at minimizing the
consumption power
◦ Geographical information assisted routing.
-Improve performnce of routing and control
overhead
 These are proactive routing protocols. – They maintain the global
topology information in the form of tables at every node.
 We consider:
• Destination Sequenced Distance Vector Routing Protocol (DSDV)
• Wireless Routing Protocol (WRP)
• Cluster Head Gateway Routing Protocol (CGCR)
• Source-tree Adaptive Routing Protocol (STAR)
 Common advantages and shortcoming of these protocols:
• Low delay of route setup process: all routes are immediately
available;
• High bandwidth requirements: updates due to link loss leads to high
control overhead;
• Low scalability: control overhead is proportional to the number of
nodes;
• High storage requirements: whole table must be in memory.
Destination sequenced distance vector routing protocol (DSDV)
Modification of the Bellman-Ford algorithm
where each node maintains:
• the shortest path to destination;
• the first node on this shortest path.
This protocol is characterized by the following:
• routes to destination are readily available at each node in the routing table (RT);
• RTs are exchanged between neighbors at regular intervals;
• RTs are also exchanged when significant changes in local topology are observed
by a node.
RT updates can be of two types:
• incremental updates: – take place when a node does not observe significant
changes in a local topology.
• full dumps: – take place when significant changes of local topology are
observed.
 The reconfiguration of path (used for ongoing data transfer)
is done as follows:
• the end node of the broken link sends a table update
message with:
- broken link’s weight assigned to infinity;
– sequence number greater than the stored sequence number for that destination.
• each node resends this message to its neighbors to propagate
the broken link to the network;
• even sequence number is generated by end node, odd – by
all other nodes.
Note: single link break leads to the propagation of RT updates
through the whole network
 Route maintenance in DSDV is performed as
follows:
 when a neighbor node perceives a link break (node 3):
 it sets all routes through broken link to ∞;
 broadcasts its routing table.
 node 5 receives update message, it informs neighbors
about the shortest distance to node 6;
 this information is propagated through the network and all
node updates their RTs;
 node 1 may now sends their packets through route 1 − 3 −
5 − 6 instead of 1 − 3 − 6.
 These protocols find paths to destination only when needed
(on-demand) to transmit a packet.
 We consider:
◦ Dynamic source routing protocol (DSR)
◦ Ad hoc on-demand distance vector routing protocol (AODV)
◦ Location aided routing (LAR)
◦ Associativity-based routing (ABR)
◦ Signal stability-based adaptive routing protocol (SSA)
 These protocols have the following advantages and
shortcomings:
◦ - high delay of route setup process: routes are established on-demand;
◦ - small control overhead: no route updates;
◦ - low scalability: no route updates;
◦ - low storage requirements: only needed routes are in cache.
 This is a source-based routing protocol.
 The difference between DSR and other on-demand routing
protocols is:
 on-demand protocols periodically exchange the so-called beacon
(hello) packets:
 hello packets are used to inform neighbors about existence of the node.
 DSR does not use hello packets.
 The basic approach of this protocol is as follows:
 during route contraction DSR floods a RouteRequest packets in the
network;
 intermediate nodes forward RouteRequest if it is not redundant;
 destination node replies with RouteReply;
 the RouteReply packet contains the path traversed by RouteRequest
packet;
 the receiver responds only if this is a first RouteRequest (not
duplicate).
 The DSR protocol uses the sequence numbers:
 RouteRequest packet carries the path traversed and the sequence number;
 the sequence numbers are used to prevent loop formation and nodes check it.
 The DSR also uses route cache in each node:
 if node has a route in the cache, this route is used.
 Refinements of DSR:
 to avoid over-flooding the network, exponential back-off is used between
RouteRequest sending;
 intermediate node is allowed to reply with RouteReply if it has a route to
destination in cache:
 if the link is broken the RouteError is sent to the sender by node adjacent to a
broken link.
 The major differences between AODV and DSR are as follows:
 in DSR a data packet carries the complete path to be traversed;
 in AODV nodes store the next hop information (hop-by-hop routing)
for each data flow.
 The RouteRequest packet in AODV carries the following information:
 the source identifier (SrcID): this identifies the source;
 the destination identifier (DestID): this identifies the destination to
which the route is required;
 the source sequence number (SrcSeqNum);
 the destination sequence number (DestSeqNum): indicates the
freshness of the route.
 the broadcast identifier (BcastID): is used to discard multiple copies of
the same RouteRequest.
 the time to live (TTL): this is used to not allow loops.
 The AODV protocol performs as follows:
 when a node does not have a valid route to destination a RouteRequest
is forwarded;
 when intermediate node receives a Route Request packet two cases are
possible:
-if it does not have a valid route to destination, the node forwards it;
-if it has a valid route, the node prepares a Route Reply message
 if the RouteRequest is received multiple times, the duplicate copies are
discarded:are determined comparing BcastID-SrcID pairs.
 when RouteRequest is forwarded, the address of previous node and its
BcastID are stored;
-are needed to forward packets to the source.
 if RouteReply is not received before a time expires, this entry is deleted;
 either destination node or intermediate node responses with valid route;
 when RouteRequest is forwarded back, the address of previous node
and its BcastID are stored;
-are needed to forward packets to the destination.
 In case of the link break:
 end-node are notified by unsolicited RouteReply with hop count set to ∞.
 end-node deletes entries and establishes a new path using new BcastID.
 link status is observed using the link-level beacons or link-level ACKs.
-connection setup delay is less
-having stale entries
-heavy control overhead
-more bandwidth consumption
Classification of routing protocols

More Related Content

What's hot

Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingAbhiram Subhagan
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSjuno susi
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulatorsSyedAhamed44
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 

What's hot (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 

Similar to Classification of routing protocols

AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET Journal
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 

Similar to Classification of routing protocols (20)

AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Lecture 7
 Lecture 7 Lecture 7
Lecture 7
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERP
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Ad Hoc
Ad HocAd Hoc
Ad Hoc
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
En33838844
En33838844En33838844
En33838844
 
En33838844
En33838844En33838844
En33838844
 

Recently uploaded

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Classification of routing protocols

  • 2.  Introduction  Classification  Table Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV)  On–Demand Routing protocols –Ad hoc On–Demand Distance Vector Routing (AODV) Hybrid routing protocols
  • 3.  The environment of Ad hoc acomplished with the following terms: ◦ Changing topology dynamically ◦ Absence of fixed infrastructure ◦ No Centralized administration(No Access point) ◦ Bandwidth constrained wireless links ◦ Energy-constrained nodes ◦ Link loss issues
  • 4. Routing protocols for ad-hoc wireless networks can be broadly classified into four categories based on: 1. Routing information update mechanism; 2. Usage of temporal information for routing(e.g. cached routes); 3. Routing topology information; 4. Utilization of specific resources (e.g. GPS).
  • 5.  Based on routing information update mechanism ◦ Proactive (table-driven) routing protocols: -Every node maintain the network topology (routing tables) -Periodically exchange to all nodes in the network using flooding ◦ Reactive (on-demand) routing protocols: - Path is acquired by connection establishment process ◦ Hybrid protocols: - Combined of above two methods.  Based on usage of temporal information ◦ Based on past temporal information: -Make decision based on the past status of the links. ◦ Based on future temporal information. -Make decision based on the expected future status of the links.
  • 6.  Based on the routing topology ◦ Flat topology routing protocols – use of flat addressing scheme ◦ Hierarchial topology routing protocols- use of logical hierarchy in the network  Routing based on utilization of specific resources: ◦ Power-aware routing-Aims at minimizing the consumption power ◦ Geographical information assisted routing. -Improve performnce of routing and control overhead
  • 7.
  • 8.
  • 9.
  • 10.  These are proactive routing protocols. – They maintain the global topology information in the form of tables at every node.  We consider: • Destination Sequenced Distance Vector Routing Protocol (DSDV) • Wireless Routing Protocol (WRP) • Cluster Head Gateway Routing Protocol (CGCR) • Source-tree Adaptive Routing Protocol (STAR)  Common advantages and shortcoming of these protocols: • Low delay of route setup process: all routes are immediately available; • High bandwidth requirements: updates due to link loss leads to high control overhead; • Low scalability: control overhead is proportional to the number of nodes; • High storage requirements: whole table must be in memory.
  • 11. Destination sequenced distance vector routing protocol (DSDV) Modification of the Bellman-Ford algorithm where each node maintains: • the shortest path to destination; • the first node on this shortest path. This protocol is characterized by the following: • routes to destination are readily available at each node in the routing table (RT); • RTs are exchanged between neighbors at regular intervals; • RTs are also exchanged when significant changes in local topology are observed by a node. RT updates can be of two types: • incremental updates: – take place when a node does not observe significant changes in a local topology. • full dumps: – take place when significant changes of local topology are observed.
  • 12.
  • 13.  The reconfiguration of path (used for ongoing data transfer) is done as follows: • the end node of the broken link sends a table update message with: - broken link’s weight assigned to infinity; – sequence number greater than the stored sequence number for that destination. • each node resends this message to its neighbors to propagate the broken link to the network; • even sequence number is generated by end node, odd – by all other nodes. Note: single link break leads to the propagation of RT updates through the whole network
  • 14.
  • 15.  Route maintenance in DSDV is performed as follows:  when a neighbor node perceives a link break (node 3):  it sets all routes through broken link to ∞;  broadcasts its routing table.  node 5 receives update message, it informs neighbors about the shortest distance to node 6;  this information is propagated through the network and all node updates their RTs;  node 1 may now sends their packets through route 1 − 3 − 5 − 6 instead of 1 − 3 − 6.
  • 16.  These protocols find paths to destination only when needed (on-demand) to transmit a packet.  We consider: ◦ Dynamic source routing protocol (DSR) ◦ Ad hoc on-demand distance vector routing protocol (AODV) ◦ Location aided routing (LAR) ◦ Associativity-based routing (ABR) ◦ Signal stability-based adaptive routing protocol (SSA)  These protocols have the following advantages and shortcomings: ◦ - high delay of route setup process: routes are established on-demand; ◦ - small control overhead: no route updates; ◦ - low scalability: no route updates; ◦ - low storage requirements: only needed routes are in cache.
  • 17.  This is a source-based routing protocol.  The difference between DSR and other on-demand routing protocols is:  on-demand protocols periodically exchange the so-called beacon (hello) packets:  hello packets are used to inform neighbors about existence of the node.  DSR does not use hello packets.  The basic approach of this protocol is as follows:  during route contraction DSR floods a RouteRequest packets in the network;  intermediate nodes forward RouteRequest if it is not redundant;  destination node replies with RouteReply;  the RouteReply packet contains the path traversed by RouteRequest packet;  the receiver responds only if this is a first RouteRequest (not duplicate).
  • 18.  The DSR protocol uses the sequence numbers:  RouteRequest packet carries the path traversed and the sequence number;  the sequence numbers are used to prevent loop formation and nodes check it.  The DSR also uses route cache in each node:  if node has a route in the cache, this route is used.
  • 19.  Refinements of DSR:  to avoid over-flooding the network, exponential back-off is used between RouteRequest sending;  intermediate node is allowed to reply with RouteReply if it has a route to destination in cache:  if the link is broken the RouteError is sent to the sender by node adjacent to a broken link.
  • 20.  The major differences between AODV and DSR are as follows:  in DSR a data packet carries the complete path to be traversed;  in AODV nodes store the next hop information (hop-by-hop routing) for each data flow.  The RouteRequest packet in AODV carries the following information:  the source identifier (SrcID): this identifies the source;  the destination identifier (DestID): this identifies the destination to which the route is required;  the source sequence number (SrcSeqNum);  the destination sequence number (DestSeqNum): indicates the freshness of the route.  the broadcast identifier (BcastID): is used to discard multiple copies of the same RouteRequest.  the time to live (TTL): this is used to not allow loops.
  • 21.  The AODV protocol performs as follows:  when a node does not have a valid route to destination a RouteRequest is forwarded;  when intermediate node receives a Route Request packet two cases are possible: -if it does not have a valid route to destination, the node forwards it; -if it has a valid route, the node prepares a Route Reply message  if the RouteRequest is received multiple times, the duplicate copies are discarded:are determined comparing BcastID-SrcID pairs.  when RouteRequest is forwarded, the address of previous node and its BcastID are stored; -are needed to forward packets to the source.  if RouteReply is not received before a time expires, this entry is deleted;  either destination node or intermediate node responses with valid route;  when RouteRequest is forwarded back, the address of previous node and its BcastID are stored; -are needed to forward packets to the destination.
  • 22.
  • 23.  In case of the link break:  end-node are notified by unsolicited RouteReply with hop count set to ∞.  end-node deletes entries and establishes a new path using new BcastID.  link status is observed using the link-level beacons or link-level ACKs.
  • 24. -connection setup delay is less -having stale entries -heavy control overhead -more bandwidth consumption