SlideShare a Scribd company logo
Ad hoc On-demandAd hoc On-demand
Distance Vector (AODV)Distance Vector (AODV)
Routing ProtocolRouting Protocol
ECE 695ECE 695
Spring 2006Spring 2006
AODV OverviewAODV Overview
 AODV is a packet routing protocol designed forAODV is a packet routing protocol designed for
use in mobile ad hoc networks (MANET)use in mobile ad hoc networks (MANET)
 Intended for networks that may containIntended for networks that may contain
thousands of nodesthousands of nodes
 One of a class ofOne of a class of demand-drivendemand-driven protocolsprotocols
• TheThe route discoveryroute discovery mechanism is invoked only if amechanism is invoked only if a
route to a destination is not knownroute to a destination is not known
 UDPUDP is the transport layer protocolis the transport layer protocol
 Source, destinationSource, destination andand next hopnext hop are addressedare addressed
usingusing IP addressingIP addressing
 Each node maintains aEach node maintains a routing tablerouting table that containsthat contains
information about reaching destination nodes.information about reaching destination nodes.
• Each entry is keyed to a destination node.Each entry is keyed to a destination node.
Routing Table FieldsRouting Table Fields
 Destination IP addressDestination IP address
 Destination Sequence NumberDestination Sequence Number
 Valid Destination Sequence Number FlagValid Destination Sequence Number Flag
 Other state and routing flagsOther state and routing flags
 Network InterfaceNetwork Interface
 Hop Count (needed to reach destination)Hop Count (needed to reach destination)
 Next HopNext Hop
 Precursor ListPrecursor List
 Lifetime (route expiration or deletion time)Lifetime (route expiration or deletion time)
Overview (continued)Overview (continued)
 Routing table size is minimized by only includingRouting table size is minimized by only including
next hop information, not the entire route to anext hop information, not the entire route to a
destination node.destination node.
 Sequence numbers for both destination andSequence numbers for both destination and
source are used.source are used.
 Managing the sequence number is the key toManaging the sequence number is the key to
efficient routing and route maintenanceefficient routing and route maintenance
• Sequence numbers are used to indicate the relativeSequence numbers are used to indicate the relative
freshnessfreshness of routing informationof routing information
• Updated by an originating node, e.g., at initiation ofUpdated by an originating node, e.g., at initiation of
route discovery or a route reply.route discovery or a route reply.
• Observed by other nodes to determine freshness.Observed by other nodes to determine freshness.
Overview (continued)Overview (continued)
 The basic message set consists of:The basic message set consists of:
• RREQ – Route requestRREQ – Route request
• RREP – Route replyRREP – Route reply
• RERR – Route errorRERR – Route error
• HELLO – For link status monitoringHELLO – For link status monitoring
AODV Operation – Message TypesAODV Operation – Message Types
 RREQ MessagesRREQ Messages
• While communication routes between nodesWhile communication routes between nodes
are valid, AODV does not play any role.are valid, AODV does not play any role.
• A RREQ message is broadcasted when a nodeA RREQ message is broadcasted when a node
needs to discover a route to a destination.needs to discover a route to a destination.
• As a RREQ propagates through the network,As a RREQ propagates through the network,
intermediate nodes use it to update theirintermediate nodes use it to update their
routing tables (in the direction of the sourcerouting tables (in the direction of the source
node).node).
• The RREQ also contains the most recentThe RREQ also contains the most recent
sequence number for the destination.sequence number for the destination.
• A valid destination route must have a sequenceA valid destination route must have a sequence
number at least as great as that contained innumber at least as great as that contained in
the RREQ.the RREQ.
RREQ MessageRREQ Message
B?B?
B?B?
B?B?
B?B?
B?B?
B?B? B?B?
BB
AA
AODV Operation – Message TypesAODV Operation – Message Types
 RREP MessagesRREP Messages
• When a RREQ reaches a destination node, theWhen a RREQ reaches a destination node, the
destination route is made available bydestination route is made available by
unicasting a RREP back to the source route.unicasting a RREP back to the source route.
• A node generates a RREP if:A node generates a RREP if:
 It is itself the destination.It is itself the destination.
 It has an active route to the destination. Ex: anIt has an active route to the destination. Ex: an
intermediate node may also respond with an RREP ifintermediate node may also respond with an RREP if
it has a “fresh enough” route to the destination.it has a “fresh enough” route to the destination.
• As the RREP propagates back to the sourceAs the RREP propagates back to the source
node, intermediate nodes update their routingnode, intermediate nodes update their routing
tables (in the direction of the destinationtables (in the direction of the destination
node).node).
RREP MessageRREP Message
BB
AA
AA
AA
AA
AA
AA
AA
AODV Operation – Message TypesAODV Operation – Message Types
 RERR MessagesRERR Messages
• This message is broadcast for brokenThis message is broadcast for broken
linkslinks
• Generated directly by a node or passedGenerated directly by a node or passed
on when received from another nodeon when received from another node
AODV Operation – Message TypesAODV Operation – Message Types
 Hello MessagesHello Messages
• Hello Message = RREP with TTL = 1Hello Message = RREP with TTL = 1
• This message is used for broadcastingThis message is used for broadcasting
connectivity information.connectivity information.
 Ex: If a neighbor node does not receive any packetsEx: If a neighbor node does not receive any packets
(Hello messages or otherwise) for more than(Hello messages or otherwise) for more than
ALLOWED_HELLO_LOSS * HELLO_INTERVALALLOWED_HELLO_LOSS * HELLO_INTERVAL
mseconds, the node will assume that the link to thismseconds, the node will assume that the link to this
neighbor is currently lost.neighbor is currently lost.
• A node should use Hello messages only if it isA node should use Hello messages only if it is
part of an active route.part of an active route.
Message routingMessage routing
A
B D
F
C
G
E
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREQ
RREP
RREP
RREP
Source
Destination
Congestion HandlingCongestion Handling
 One method that AODV handle congestionOne method that AODV handle congestion
is:is:
• If the source node receives no RREP from theIf the source node receives no RREP from the
destination, it may broadcast another RREQ,destination, it may broadcast another RREQ,
up to a maximum of RREQ_RETRIES.up to a maximum of RREQ_RETRIES.
• For each additional attempt that a source node tried toFor each additional attempt that a source node tried to
broadcast RREQ, the waiting time for the RREP isbroadcast RREQ, the waiting time for the RREP is
multiplied by 2.multiplied by 2.
 DSR is not capable of handling congestion.DSR is not capable of handling congestion.
Congestion HandlingCongestion Handling
 Other possible methods to improve AODVOther possible methods to improve AODV
congestion handling:congestion handling:
• A route may predict when congestion is aboutA route may predict when congestion is about
to occur and try to avoid it by reduce theto occur and try to avoid it by reduce the
transmission rate.transmission rate.
• Schedule the requests so that it will notSchedule the requests so that it will not
overload the network.overload the network.
AODV RoutingAODV Routing
 There are two phasesThere are two phases
• Route Discovery.Route Discovery.
• Route Maintenance.Route Maintenance.
 Each node maintains a routing table with knowledge aboutEach node maintains a routing table with knowledge about
the network.the network.
 AODV deals with route table management.AODV deals with route table management.
 Route information maintained even for short lived routes –Route information maintained even for short lived routes –
reverse pointers.reverse pointers.
Entries in Routing TableEntries in Routing Table
 Destination IP AddressDestination IP Address
 Destination Sequence NumberDestination Sequence Number
 Valid Destination Sequence Number flagValid Destination Sequence Number flag
 Other state and routing flags (e.g., valid, invalid,Other state and routing flags (e.g., valid, invalid,
repairable, being repaired)repairable, being repaired)
 Network InterfaceNetwork Interface
 Hop Count (number of hops needed to reach destination)Hop Count (number of hops needed to reach destination)
 Next HopNext Hop
 List of PrecursorsList of Precursors
 Lifetime (expiration or deletion time of the route)Lifetime (expiration or deletion time of the route)
 DSR maintains additional table entries, causing a largerDSR maintains additional table entries, causing a larger
memory overheadmemory overhead
DiscoveryDiscovery
 Broadcast RREQ messages.Broadcast RREQ messages.
 Intermediate nodes update their routing tableIntermediate nodes update their routing table
 Forward the RREQ if it is not the destination.Forward the RREQ if it is not the destination.
 Maintain back-pointer to the originator.Maintain back-pointer to the originator.
 Destination generates RREQ message.Destination generates RREQ message.
 RREQ sent back to source using the reverseRREQ sent back to source using the reverse
pointer set uppointer set up
by the intermediate nodes.by the intermediate nodes.
 RREQ reaches destination, communication starts.RREQ reaches destination, communication starts.
Algorithm for DiscoveryAlgorithm for Discovery
 @Originator@Originator
 If a route to the destination is available, start sendingIf a route to the destination is available, start sending
data.data.
 Else generate a RREQ packet. Increment the RREQID byElse generate a RREQ packet. Increment the RREQID by
1.Increment the sequence number by 1.Destination IP1.Increment the sequence number by 1.Destination IP
address ,currently available sequence number included.address ,currently available sequence number included.
 @Intermediate Node@Intermediate Node
 Generate route reply, if a 'fresh enough' route is a validGenerate route reply, if a 'fresh enough' route is a valid
route entry for the destination whose associated sequenceroute entry for the destination whose associated sequence
number is at least as great as that contained in the RREQ.number is at least as great as that contained in the RREQ.
Change the sequence number of the destination node ifChange the sequence number of the destination node if
stale, increment the hop count by 1 and forward.stale, increment the hop count by 1 and forward.
 @Destination 1.Increment sequence number of the@Destination 1.Increment sequence number of the
destination. 2.Generate a RREQ message and sent back todestination. 2.Generate a RREQ message and sent back to
Originator.Originator.
DiscoveryDiscovery
MaintenanceMaintenance
 Hello messages broadcast byHello messages broadcast by activeactive nodes periodicallynodes periodically
HELLO_INTERVAL.HELLO_INTERVAL.
 No hello message from a neighbor in DELETE_PERIOD,linkNo hello message from a neighbor in DELETE_PERIOD,link
failure identified.failure identified.
 A local route repair to that next hop initiated.A local route repair to that next hop initiated.
 After a timeout ,error propagated both to originator andAfter a timeout ,error propagated both to originator and
destination.destination.
 Entries based on the node invalidated.Entries based on the node invalidated.
Information “Freshness”Information “Freshness”
AssuredAssured
 Each originating node maintains a monotonicallyEach originating node maintains a monotonically
increasing sequence number.increasing sequence number.
 Used by other nodes to determine the freshness ofUsed by other nodes to determine the freshness of
the information.the information.
 Every nodes routing table contains the latestEvery nodes routing table contains the latest
information available about the sequence numberinformation available about the sequence number
for the IP address of the destination node for whichfor the IP address of the destination node for which
the routing information is maintained.the routing information is maintained.
• Updated whenever a node receives new informationUpdated whenever a node receives new information
about the sequence number from RREQ, RREP, orabout the sequence number from RREQ, RREP, or
RERR messages received related to that destination.RERR messages received related to that destination.
Information “Freshness”Information “Freshness”
AssuredAssured
 AODV depends on each node in the network to ownAODV depends on each node in the network to own
and maintain its destination sequence number.and maintain its destination sequence number.
 A destination node increments its own sequenceA destination node increments its own sequence
number immediately before it originates a routenumber immediately before it originates a route
discoverydiscovery
 A destination node increments its own sequenceA destination node increments its own sequence
number immediately before it originates a RREPnumber immediately before it originates a RREP
in response to a RREQin response to a RREQ
 The node treats its sequence number as anThe node treats its sequence number as an
unsigned number when incrementingunsigned number when incrementing
accomplishing sequence number rollover.accomplishing sequence number rollover.
 Destination information is assured by comparingDestination information is assured by comparing
the sequence number of the incoming AODVthe sequence number of the incoming AODV
message with its sequence number for thatmessage with its sequence number for that
destination.destination.
RERR MessagesRERR Messages
• Message is broadcasted when:Message is broadcasted when:
i.i. A node detects that a link with adjacentA node detects that a link with adjacent
neighbor is broken (destination no longerneighbor is broken (destination no longer
reachable).reachable).
ii.ii. If it gets a data packet destined to a nodeIf it gets a data packet destined to a node
for which it does not have an active routefor which it does not have an active route
and is not repairing.and is not repairing.
iii.iii. If it receives a RERR from a neighbor forIf it receives a RERR from a neighbor for
one or more active routes.one or more active routes.
RERR Processing (for aboveRERR Processing (for above
broadcasts)broadcasts)
• Build Affected Destination ListingBuild Affected Destination Listing
i.i. List unreachable destinations containingList unreachable destinations containing
unreachable neighbor & destination usingunreachable neighbor & destination using
unreachable as next hopunreachable as next hop
ii.ii. Only one unreachable destination, which nodeOnly one unreachable destination, which node
already has.already has.
iii.iii. List of nodes where RERR is next hopList of nodes where RERR is next hop
• Update informationUpdate information
• Transmit RERR for each item listedTransmit RERR for each item listed
RERR – information updateRERR – information update
• Destination Sequence #Destination Sequence #
- Update sequence # for case i and iiUpdate sequence # for case i and ii
- Copy sequence # for case iiiCopy sequence # for case iii
• Invalidate route entryInvalidate route entry
• Update Lifetime field as (currtime +Update Lifetime field as (currtime +
DELETE_PERIOD)DELETE_PERIOD)
• Only now may route entry be deletedOnly now may route entry be deleted
RERR message transmissionRERR message transmission
• UnicastUnicast
- Send RERR to single recipientSend RERR to single recipient
• Unicast iteritiveUnicast iteritive
- Send RERR to a number of recipientsSend RERR to a number of recipients
individuallyindividually
• BroadcastBroadcast
- Notify multiple recipients simultaniouslyNotify multiple recipients simultaniously
- Broadcast via 255.255.255.255 TTL = 1Broadcast via 255.255.255.255 TTL = 1
RERR message transmissionRERR message transmission
• UnicastUnicast
 AA node detectsnode detects that a link with adjacentthat a link with adjacent
neighbor is broken (destination no longerneighbor is broken (destination no longer
reachable).reachable).
 If it gets a data packet destined to a nodeIf it gets a data packet destined to a node
for which it does not have an active routefor which it does not have an active route
and is not repairing.and is not repairing.
 If it receives a RERR from a neighbor for oneIf it receives a RERR from a neighbor for one
or more active routes.or more active routes.
• Unicast iteritiveUnicast iteritive
• BroadcastBroadcast
How Broken Links are HandledHow Broken Links are Handled
 All nodes directly using the brokenAll nodes directly using the broken
link get a RERR packet.link get a RERR packet.
 Then those nodes sends the RERRThen those nodes sends the RERR
packet to their predecessor nodes.packet to their predecessor nodes.
 This is continued all the way to theThis is continued all the way to the
source nodes.source nodes.
How Broken Links are HandledHow Broken Links are Handled
(Cont)(Cont)
 Upon completion of sending theUpon completion of sending the
RERR packet through the sourceRERR packet through the source
node will no longer use the link.node will no longer use the link.
• AODV uses loop free-routes.AODV uses loop free-routes.
• There are only a finite number of nodesThere are only a finite number of nodes
in a ad-hoc network.in a ad-hoc network.
How Broken Links are HandledHow Broken Links are Handled
(Cont)(Cont)
 DSR does not remove the path asDSR does not remove the path as
well.well.
• In DSR nodes in the network can stillIn DSR nodes in the network can still
think the broken link is still valid.think the broken link is still valid.
• This can lead to having to search forThis can lead to having to search for
new paths multiple times.new paths multiple times.
Reestablishing a LinkReestablishing a Link
 The source node can restart theThe source node can restart the
discovery process if a path is stilldiscovery process if a path is still
needed.needed.
 The source node or any node on theThe source node or any node on the
path can rebuild the route bypath can rebuild the route by
sending out a RREQ.sending out a RREQ.

More Related Content

What's hot

Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
ijcnac
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ashok Panwar
 
QoS In The Enterprise
QoS In The EnterpriseQoS In The Enterprise
QoS In The Enterprise
Private
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
AmzadKhn
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
Ismail Mukiibi
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
Darshan Rathi
 
11 bgp-ethernet
11 bgp-ethernet11 bgp-ethernet
11 bgp-ethernet
Olivier Bonaventure
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
APNIC
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
QoS marking on cisco IOS Router
QoS marking on cisco IOS RouterQoS marking on cisco IOS Router
QoS marking on cisco IOS Router
NetProtocol Xpert
 
QoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS RouterQoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS Router
NetProtocol Xpert
 
Quality of Servise
Quality of ServiseQuality of Servise
Quality of Servise
Raza_Abidi
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
Matt Bynum
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
nitss007
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
Jyothishmathi Institute of Technology and Science Karimnagar
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
Reza Farahani
 
Label distribution protocol
Label distribution protocolLabel distribution protocol
Label distribution protocol
Atakan ATAK
 
Differentiated services - Advance Routing
Differentiated services - Advance RoutingDifferentiated services - Advance Routing
Differentiated services - Advance Routing
Pradnya Saval
 

What's hot (20)

Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
 
QoS In The Enterprise
QoS In The EnterpriseQoS In The Enterprise
QoS In The Enterprise
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Traffic Characterization
Traffic CharacterizationTraffic Characterization
Traffic Characterization
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
11 bgp-ethernet
11 bgp-ethernet11 bgp-ethernet
11 bgp-ethernet
 
MPLS L3 VPN Deployment
MPLS L3 VPN DeploymentMPLS L3 VPN Deployment
MPLS L3 VPN Deployment
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
QoS marking on cisco IOS Router
QoS marking on cisco IOS RouterQoS marking on cisco IOS Router
QoS marking on cisco IOS Router
 
QoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS RouterQoS Classification on Cisco IOS Router
QoS Classification on Cisco IOS Router
 
Quality of Servise
Quality of ServiseQuality of Servise
Quality of Servise
 
BGP Overview
BGP OverviewBGP Overview
BGP Overview
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Mobile computing Mobile Transport Layer
Mobile computing Mobile Transport LayerMobile computing Mobile Transport Layer
Mobile computing Mobile Transport Layer
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
6low pan
6low pan 6low pan
6low pan
 
Mpls L3_vpn
Mpls L3_vpnMpls L3_vpn
Mpls L3_vpn
 
Label distribution protocol
Label distribution protocolLabel distribution protocol
Label distribution protocol
 
Differentiated services - Advance Routing
Differentiated services - Advance RoutingDifferentiated services - Advance Routing
Differentiated services - Advance Routing
 

Similar to 2006 aodv-group-presentation

analysins aodv
analysins aodvanalysins aodv
analysins aodv
Poulami Pal
 
Ad hoc
Ad hocAd hoc
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
IAEME Publication
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
ijtsrd
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
barodia_1437
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
B03406010
B03406010B03406010
B03406010
ijceronline
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
ijwmn
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
IJERA Editor
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
DEEPAK948083
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
Senthil Kanth
 
Manet ppt
Manet pptManet ppt
Manet ppt
sandeep Kaur
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
Sonali Parab
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
DharunMagil
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
IDES Editor
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Ad hoc on demand distance
Ad hoc on demand distanceAd hoc on demand distance
Ad hoc on demand distance
Jimit Rupani
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
ijcnes
 

Similar to 2006 aodv-group-presentation (20)

analysins aodv
analysins aodvanalysins aodv
analysins aodv
 
Ad hoc
Ad hocAd hoc
Ad hoc
 
A study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsrA study on performance comparison of dymo with aodv and dsr
A study on performance comparison of dymo with aodv and dsr
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
B03406010
B03406010B03406010
B03406010
 
A simulation based performance evaluation
A simulation based performance evaluationA simulation based performance evaluation
A simulation based performance evaluation
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Ad hoc on demand distance
Ad hoc on demand distanceAd hoc on demand distance
Ad hoc on demand distance
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 

Recently uploaded

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
Divyanshu
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
Atif Razi
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
AjmalKhan50578
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 

Recently uploaded (20)

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Null Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAMNull Bangalore | Pentesters Approach to AWS IAM
Null Bangalore | Pentesters Approach to AWS IAM
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
Applications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdfApplications of artificial Intelligence in Mechanical Engineering.pdf
Applications of artificial Intelligence in Mechanical Engineering.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
Welding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdfWelding Metallurgy Ferrous Materials.pdf
Welding Metallurgy Ferrous Materials.pdf
 
Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 

2006 aodv-group-presentation

  • 1. Ad hoc On-demandAd hoc On-demand Distance Vector (AODV)Distance Vector (AODV) Routing ProtocolRouting Protocol ECE 695ECE 695 Spring 2006Spring 2006
  • 2. AODV OverviewAODV Overview  AODV is a packet routing protocol designed forAODV is a packet routing protocol designed for use in mobile ad hoc networks (MANET)use in mobile ad hoc networks (MANET)  Intended for networks that may containIntended for networks that may contain thousands of nodesthousands of nodes  One of a class ofOne of a class of demand-drivendemand-driven protocolsprotocols • TheThe route discoveryroute discovery mechanism is invoked only if amechanism is invoked only if a route to a destination is not knownroute to a destination is not known  UDPUDP is the transport layer protocolis the transport layer protocol  Source, destinationSource, destination andand next hopnext hop are addressedare addressed usingusing IP addressingIP addressing  Each node maintains aEach node maintains a routing tablerouting table that containsthat contains information about reaching destination nodes.information about reaching destination nodes. • Each entry is keyed to a destination node.Each entry is keyed to a destination node.
  • 3. Routing Table FieldsRouting Table Fields  Destination IP addressDestination IP address  Destination Sequence NumberDestination Sequence Number  Valid Destination Sequence Number FlagValid Destination Sequence Number Flag  Other state and routing flagsOther state and routing flags  Network InterfaceNetwork Interface  Hop Count (needed to reach destination)Hop Count (needed to reach destination)  Next HopNext Hop  Precursor ListPrecursor List  Lifetime (route expiration or deletion time)Lifetime (route expiration or deletion time)
  • 4. Overview (continued)Overview (continued)  Routing table size is minimized by only includingRouting table size is minimized by only including next hop information, not the entire route to anext hop information, not the entire route to a destination node.destination node.  Sequence numbers for both destination andSequence numbers for both destination and source are used.source are used.  Managing the sequence number is the key toManaging the sequence number is the key to efficient routing and route maintenanceefficient routing and route maintenance • Sequence numbers are used to indicate the relativeSequence numbers are used to indicate the relative freshnessfreshness of routing informationof routing information • Updated by an originating node, e.g., at initiation ofUpdated by an originating node, e.g., at initiation of route discovery or a route reply.route discovery or a route reply. • Observed by other nodes to determine freshness.Observed by other nodes to determine freshness.
  • 5. Overview (continued)Overview (continued)  The basic message set consists of:The basic message set consists of: • RREQ – Route requestRREQ – Route request • RREP – Route replyRREP – Route reply • RERR – Route errorRERR – Route error • HELLO – For link status monitoringHELLO – For link status monitoring
  • 6. AODV Operation – Message TypesAODV Operation – Message Types  RREQ MessagesRREQ Messages • While communication routes between nodesWhile communication routes between nodes are valid, AODV does not play any role.are valid, AODV does not play any role. • A RREQ message is broadcasted when a nodeA RREQ message is broadcasted when a node needs to discover a route to a destination.needs to discover a route to a destination. • As a RREQ propagates through the network,As a RREQ propagates through the network, intermediate nodes use it to update theirintermediate nodes use it to update their routing tables (in the direction of the sourcerouting tables (in the direction of the source node).node). • The RREQ also contains the most recentThe RREQ also contains the most recent sequence number for the destination.sequence number for the destination. • A valid destination route must have a sequenceA valid destination route must have a sequence number at least as great as that contained innumber at least as great as that contained in the RREQ.the RREQ.
  • 8. AODV Operation – Message TypesAODV Operation – Message Types  RREP MessagesRREP Messages • When a RREQ reaches a destination node, theWhen a RREQ reaches a destination node, the destination route is made available bydestination route is made available by unicasting a RREP back to the source route.unicasting a RREP back to the source route. • A node generates a RREP if:A node generates a RREP if:  It is itself the destination.It is itself the destination.  It has an active route to the destination. Ex: anIt has an active route to the destination. Ex: an intermediate node may also respond with an RREP ifintermediate node may also respond with an RREP if it has a “fresh enough” route to the destination.it has a “fresh enough” route to the destination. • As the RREP propagates back to the sourceAs the RREP propagates back to the source node, intermediate nodes update their routingnode, intermediate nodes update their routing tables (in the direction of the destinationtables (in the direction of the destination node).node).
  • 10. AODV Operation – Message TypesAODV Operation – Message Types  RERR MessagesRERR Messages • This message is broadcast for brokenThis message is broadcast for broken linkslinks • Generated directly by a node or passedGenerated directly by a node or passed on when received from another nodeon when received from another node
  • 11. AODV Operation – Message TypesAODV Operation – Message Types  Hello MessagesHello Messages • Hello Message = RREP with TTL = 1Hello Message = RREP with TTL = 1 • This message is used for broadcastingThis message is used for broadcasting connectivity information.connectivity information.  Ex: If a neighbor node does not receive any packetsEx: If a neighbor node does not receive any packets (Hello messages or otherwise) for more than(Hello messages or otherwise) for more than ALLOWED_HELLO_LOSS * HELLO_INTERVALALLOWED_HELLO_LOSS * HELLO_INTERVAL mseconds, the node will assume that the link to thismseconds, the node will assume that the link to this neighbor is currently lost.neighbor is currently lost. • A node should use Hello messages only if it isA node should use Hello messages only if it is part of an active route.part of an active route.
  • 12. Message routingMessage routing A B D F C G E RREQ RREQ RREQ RREQ RREQ RREQ RREQ RREQ RREQ RREP RREP RREP Source Destination
  • 13. Congestion HandlingCongestion Handling  One method that AODV handle congestionOne method that AODV handle congestion is:is: • If the source node receives no RREP from theIf the source node receives no RREP from the destination, it may broadcast another RREQ,destination, it may broadcast another RREQ, up to a maximum of RREQ_RETRIES.up to a maximum of RREQ_RETRIES. • For each additional attempt that a source node tried toFor each additional attempt that a source node tried to broadcast RREQ, the waiting time for the RREP isbroadcast RREQ, the waiting time for the RREP is multiplied by 2.multiplied by 2.  DSR is not capable of handling congestion.DSR is not capable of handling congestion.
  • 14. Congestion HandlingCongestion Handling  Other possible methods to improve AODVOther possible methods to improve AODV congestion handling:congestion handling: • A route may predict when congestion is aboutA route may predict when congestion is about to occur and try to avoid it by reduce theto occur and try to avoid it by reduce the transmission rate.transmission rate. • Schedule the requests so that it will notSchedule the requests so that it will not overload the network.overload the network.
  • 15. AODV RoutingAODV Routing  There are two phasesThere are two phases • Route Discovery.Route Discovery. • Route Maintenance.Route Maintenance.  Each node maintains a routing table with knowledge aboutEach node maintains a routing table with knowledge about the network.the network.  AODV deals with route table management.AODV deals with route table management.  Route information maintained even for short lived routes –Route information maintained even for short lived routes – reverse pointers.reverse pointers.
  • 16. Entries in Routing TableEntries in Routing Table  Destination IP AddressDestination IP Address  Destination Sequence NumberDestination Sequence Number  Valid Destination Sequence Number flagValid Destination Sequence Number flag  Other state and routing flags (e.g., valid, invalid,Other state and routing flags (e.g., valid, invalid, repairable, being repaired)repairable, being repaired)  Network InterfaceNetwork Interface  Hop Count (number of hops needed to reach destination)Hop Count (number of hops needed to reach destination)  Next HopNext Hop  List of PrecursorsList of Precursors  Lifetime (expiration or deletion time of the route)Lifetime (expiration or deletion time of the route)  DSR maintains additional table entries, causing a largerDSR maintains additional table entries, causing a larger memory overheadmemory overhead
  • 17. DiscoveryDiscovery  Broadcast RREQ messages.Broadcast RREQ messages.  Intermediate nodes update their routing tableIntermediate nodes update their routing table  Forward the RREQ if it is not the destination.Forward the RREQ if it is not the destination.  Maintain back-pointer to the originator.Maintain back-pointer to the originator.  Destination generates RREQ message.Destination generates RREQ message.  RREQ sent back to source using the reverseRREQ sent back to source using the reverse pointer set uppointer set up by the intermediate nodes.by the intermediate nodes.  RREQ reaches destination, communication starts.RREQ reaches destination, communication starts.
  • 18. Algorithm for DiscoveryAlgorithm for Discovery  @Originator@Originator  If a route to the destination is available, start sendingIf a route to the destination is available, start sending data.data.  Else generate a RREQ packet. Increment the RREQID byElse generate a RREQ packet. Increment the RREQID by 1.Increment the sequence number by 1.Destination IP1.Increment the sequence number by 1.Destination IP address ,currently available sequence number included.address ,currently available sequence number included.  @Intermediate Node@Intermediate Node  Generate route reply, if a 'fresh enough' route is a validGenerate route reply, if a 'fresh enough' route is a valid route entry for the destination whose associated sequenceroute entry for the destination whose associated sequence number is at least as great as that contained in the RREQ.number is at least as great as that contained in the RREQ. Change the sequence number of the destination node ifChange the sequence number of the destination node if stale, increment the hop count by 1 and forward.stale, increment the hop count by 1 and forward.  @Destination 1.Increment sequence number of the@Destination 1.Increment sequence number of the destination. 2.Generate a RREQ message and sent back todestination. 2.Generate a RREQ message and sent back to Originator.Originator.
  • 20. MaintenanceMaintenance  Hello messages broadcast byHello messages broadcast by activeactive nodes periodicallynodes periodically HELLO_INTERVAL.HELLO_INTERVAL.  No hello message from a neighbor in DELETE_PERIOD,linkNo hello message from a neighbor in DELETE_PERIOD,link failure identified.failure identified.  A local route repair to that next hop initiated.A local route repair to that next hop initiated.  After a timeout ,error propagated both to originator andAfter a timeout ,error propagated both to originator and destination.destination.  Entries based on the node invalidated.Entries based on the node invalidated.
  • 21. Information “Freshness”Information “Freshness” AssuredAssured  Each originating node maintains a monotonicallyEach originating node maintains a monotonically increasing sequence number.increasing sequence number.  Used by other nodes to determine the freshness ofUsed by other nodes to determine the freshness of the information.the information.  Every nodes routing table contains the latestEvery nodes routing table contains the latest information available about the sequence numberinformation available about the sequence number for the IP address of the destination node for whichfor the IP address of the destination node for which the routing information is maintained.the routing information is maintained. • Updated whenever a node receives new informationUpdated whenever a node receives new information about the sequence number from RREQ, RREP, orabout the sequence number from RREQ, RREP, or RERR messages received related to that destination.RERR messages received related to that destination.
  • 22. Information “Freshness”Information “Freshness” AssuredAssured  AODV depends on each node in the network to ownAODV depends on each node in the network to own and maintain its destination sequence number.and maintain its destination sequence number.  A destination node increments its own sequenceA destination node increments its own sequence number immediately before it originates a routenumber immediately before it originates a route discoverydiscovery  A destination node increments its own sequenceA destination node increments its own sequence number immediately before it originates a RREPnumber immediately before it originates a RREP in response to a RREQin response to a RREQ  The node treats its sequence number as anThe node treats its sequence number as an unsigned number when incrementingunsigned number when incrementing accomplishing sequence number rollover.accomplishing sequence number rollover.  Destination information is assured by comparingDestination information is assured by comparing the sequence number of the incoming AODVthe sequence number of the incoming AODV message with its sequence number for thatmessage with its sequence number for that destination.destination.
  • 23. RERR MessagesRERR Messages • Message is broadcasted when:Message is broadcasted when: i.i. A node detects that a link with adjacentA node detects that a link with adjacent neighbor is broken (destination no longerneighbor is broken (destination no longer reachable).reachable). ii.ii. If it gets a data packet destined to a nodeIf it gets a data packet destined to a node for which it does not have an active routefor which it does not have an active route and is not repairing.and is not repairing. iii.iii. If it receives a RERR from a neighbor forIf it receives a RERR from a neighbor for one or more active routes.one or more active routes.
  • 24. RERR Processing (for aboveRERR Processing (for above broadcasts)broadcasts) • Build Affected Destination ListingBuild Affected Destination Listing i.i. List unreachable destinations containingList unreachable destinations containing unreachable neighbor & destination usingunreachable neighbor & destination using unreachable as next hopunreachable as next hop ii.ii. Only one unreachable destination, which nodeOnly one unreachable destination, which node already has.already has. iii.iii. List of nodes where RERR is next hopList of nodes where RERR is next hop • Update informationUpdate information • Transmit RERR for each item listedTransmit RERR for each item listed
  • 25. RERR – information updateRERR – information update • Destination Sequence #Destination Sequence # - Update sequence # for case i and iiUpdate sequence # for case i and ii - Copy sequence # for case iiiCopy sequence # for case iii • Invalidate route entryInvalidate route entry • Update Lifetime field as (currtime +Update Lifetime field as (currtime + DELETE_PERIOD)DELETE_PERIOD) • Only now may route entry be deletedOnly now may route entry be deleted
  • 26. RERR message transmissionRERR message transmission • UnicastUnicast - Send RERR to single recipientSend RERR to single recipient • Unicast iteritiveUnicast iteritive - Send RERR to a number of recipientsSend RERR to a number of recipients individuallyindividually • BroadcastBroadcast - Notify multiple recipients simultaniouslyNotify multiple recipients simultaniously - Broadcast via 255.255.255.255 TTL = 1Broadcast via 255.255.255.255 TTL = 1
  • 27. RERR message transmissionRERR message transmission • UnicastUnicast  AA node detectsnode detects that a link with adjacentthat a link with adjacent neighbor is broken (destination no longerneighbor is broken (destination no longer reachable).reachable).  If it gets a data packet destined to a nodeIf it gets a data packet destined to a node for which it does not have an active routefor which it does not have an active route and is not repairing.and is not repairing.  If it receives a RERR from a neighbor for oneIf it receives a RERR from a neighbor for one or more active routes.or more active routes. • Unicast iteritiveUnicast iteritive • BroadcastBroadcast
  • 28. How Broken Links are HandledHow Broken Links are Handled  All nodes directly using the brokenAll nodes directly using the broken link get a RERR packet.link get a RERR packet.  Then those nodes sends the RERRThen those nodes sends the RERR packet to their predecessor nodes.packet to their predecessor nodes.  This is continued all the way to theThis is continued all the way to the source nodes.source nodes.
  • 29. How Broken Links are HandledHow Broken Links are Handled (Cont)(Cont)  Upon completion of sending theUpon completion of sending the RERR packet through the sourceRERR packet through the source node will no longer use the link.node will no longer use the link. • AODV uses loop free-routes.AODV uses loop free-routes. • There are only a finite number of nodesThere are only a finite number of nodes in a ad-hoc network.in a ad-hoc network.
  • 30. How Broken Links are HandledHow Broken Links are Handled (Cont)(Cont)  DSR does not remove the path asDSR does not remove the path as well.well. • In DSR nodes in the network can stillIn DSR nodes in the network can still think the broken link is still valid.think the broken link is still valid. • This can lead to having to search forThis can lead to having to search for new paths multiple times.new paths multiple times.
  • 31. Reestablishing a LinkReestablishing a Link  The source node can restart theThe source node can restart the discovery process if a path is stilldiscovery process if a path is still needed.needed.  The source node or any node on theThe source node or any node on the path can rebuild the route bypath can rebuild the route by sending out a RREQ.sending out a RREQ.

Editor's Notes

  1. *As a routing protocol for mobile ad hoc networks, AODV is intended to accommodate networks that are as large as several thousand nodes. *It is one of several demand-driven (or on-demand) protocols that are in existence today. Hence, the protocol is invoked only when a node (host) has data to transmit. It is a reactive protocol. *The AODV RFC indicates that the transport layer protocol is UDP, which of course only offers best effort delivery of packets, and does not support either error recovery or flow control. *Addressing is handled using IP addressing *Since each node acts as both a host and routing node, each must maintain a routing table that contains information about known destination nodes. Entries are keyed to destinations.
  2. *Each entry in the routing table contains nine fields. In addition to the destination node IP address, the fields contain routing information and information that relates to the qualitative state of the route for maintenance purposes. *Note that unlike some other protocols, AODV only maintains information on the next destination (hop) in the route, not the entire routing list. This saves memory and lowers computational overhead for route maintenance. *It also contains information enabling the host to share information with other nodes when link states change
  3. The sequence number, unique to each destination route, are the key to maintaining up to date routing information. Protocol messages that contain routing information also include a sequence number. By observing the value of the sequence number, an intermediate node can determine the “freshness” of the routing information. Sequence numbers will be covered in detail later in the presentation.
  4. The basic message set includes a route request message, route reply message, route error message, and a hello message. The mechanics of each of these messages will be covered in detail later in the presentation. Briefly, however, a host (node) multicasts a RREQ message when it needs to find a route to a destination (either not already contained in its routing table, or one whose status is invalid).
  5. Make sure you explain how an intermediate node distinguishes between copies of the same RREQ. In your graph, the node in the middle receives two copies of the RREQ. In this case, the hop count from the source (A) is the same, so it doesn’t matter how its own routing back to A is updated. If you look at the example graph I included in the overview, you see that node B and the destination node F both receive multiple copies of the RREQ. In both cases, each copy followed a different route to get to the respective node. Therefore, B and F must choose the correct version of the message to use for updating their own routing tables and also for forwarding. The hop count field is the key that allows them to decide which message to keep and which message to throw away.
  6. You should point out that the RREQ/RREP mechanism depends on the assumption that links are symmetrical, or bidirectional.
  7. Charles, you may not want to include this slide, and leave coverage of the topic to whomever is covering either message types (Visal) or route discovery (Fahd?). My intention was just to introduce the basic message flow, and not get into details. In the example shown, the basic flow is clear, but some explanation is required to show how nodes B and F handle duplicates of the RREQ, i.e., how do they decide to throw away the RREQs from C, E and G? I think the Hop Count field in the message is the key, but describing this starts to encroach on later parts of the presentation.
  8. Explain why DSR can’t handle congestion
  9. Good ideas. Can you provide a brief explanation of possible implementations for each?