The document describes the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is designed for mobile ad hoc networks and uses route discovery and maintenance to dynamically discover and maintain routes. It uses sequence numbers to determine freshness of routing information and broadcasts RREQ, RREP, RERR and HELLO messages for route discovery, maintenance and link status monitoring.
CE resources are a type of hardware resource in NodeBs that measure channel demodulation capabilities. The number of CEs supported by a NodeB determines how many users and what types of services it can support. CEs are managed jointly by the RNC and NodeB to ensure resources are used properly. The number of CEs consumed depends on the type of service and can be calculated based on mappings provided in the document.
AODV is a reactive routing protocol for mobile ad hoc networks. It uses route discovery and maintenance to dynamically discover and maintain routes. Route discovery uses route request (RREQ) and route reply (RREP) messages to find routes between nodes. Route maintenance uses route error (RERR) messages to notify nodes of link breaks. Each node maintains a routing table with next hop and destination information.
The document discusses the Gateway Load Balancing Protocol (GLBP). GLBP allows multiple routers to share the traffic load and act as redundant gateways for hosts on a LAN. One router is elected as the active virtual gateway (AVG) to forward traffic and respond to ARP requests. Other routers are designated as active virtual forwarders (AVFs) and each assumes responsibility for forwarding traffic to a different virtual MAC address. This provides load sharing and redundancy if an AVG or AVF fails.
This slide contains fundamental concept about Quality of Service (QoS) technology and various types of Queuing Methods, according to the latest version of Cisco books (CCIE R&S and CCIE SP) and i taught it at IRAN TIC company.
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...Ann Joseph
The document discusses Ad hoc On-demand Multipath Distance Vector (AOMDV), which is a multipath extension of the AODV routing protocol for mobile ad hoc networks. AOMDV discovers multiple loop-free and disjoint paths between source and destination nodes in a single route discovery to improve fault tolerance. It provides benefits like lower end-to-end delay, higher throughput, and reduced route discovery operations compared to AODV, which is a single path routing protocol.
1. Routing is the process of forwarding packets between source and destination networks through routing devices. Routing protocols are used for topology and path discovery.
2. Routers maintain routing tables containing paths to known destinations and routing information like metrics, next hops, and ages. Administrative distances define route preferences.
3. The Internet uses interior gateway protocols (IGPs) within autonomous systems (ASes) and exterior gateway protocols (EGPs) between ASes. Common IGPs include RIP, OSPF, IS-IS. BGP is a prominent EGP.
The document compares the AODV and OLSR routing protocols for mobile ad hoc networks. AODV is a reactive protocol that establishes routes on demand, while OLSR is a proactive protocol that maintains routes to all nodes. OLSR generally has lower latency than AODV but higher overhead. Both protocols elect multipoint relays to reduce flooding. AODV uses less bandwidth but requires route discovery, while OLSR maintains all routes continuously.
HSRP is a first hop redundancy protocol that provides high network availability by allowing transparent failover of the default gateway device. It uses a virtual IP address and MAC address that is shared between routers to allow hosts to maintain network connectivity even if the primary gateway fails. The router with the highest priority, as determined by configured priority values and IP addresses, will become the active router and handle traffic for the virtual address. If the active router fails to send hello messages, the standby router with the next highest priority will take over as the active router in a transparent manner for connected hosts.
CE resources are a type of hardware resource in NodeBs that measure channel demodulation capabilities. The number of CEs supported by a NodeB determines how many users and what types of services it can support. CEs are managed jointly by the RNC and NodeB to ensure resources are used properly. The number of CEs consumed depends on the type of service and can be calculated based on mappings provided in the document.
AODV is a reactive routing protocol for mobile ad hoc networks. It uses route discovery and maintenance to dynamically discover and maintain routes. Route discovery uses route request (RREQ) and route reply (RREP) messages to find routes between nodes. Route maintenance uses route error (RERR) messages to notify nodes of link breaks. Each node maintains a routing table with next hop and destination information.
The document discusses the Gateway Load Balancing Protocol (GLBP). GLBP allows multiple routers to share the traffic load and act as redundant gateways for hosts on a LAN. One router is elected as the active virtual gateway (AVG) to forward traffic and respond to ARP requests. Other routers are designated as active virtual forwarders (AVFs) and each assumes responsibility for forwarding traffic to a different virtual MAC address. This provides load sharing and redundancy if an AVG or AVF fails.
This slide contains fundamental concept about Quality of Service (QoS) technology and various types of Queuing Methods, according to the latest version of Cisco books (CCIE R&S and CCIE SP) and i taught it at IRAN TIC company.
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...Ann Joseph
The document discusses Ad hoc On-demand Multipath Distance Vector (AOMDV), which is a multipath extension of the AODV routing protocol for mobile ad hoc networks. AOMDV discovers multiple loop-free and disjoint paths between source and destination nodes in a single route discovery to improve fault tolerance. It provides benefits like lower end-to-end delay, higher throughput, and reduced route discovery operations compared to AODV, which is a single path routing protocol.
1. Routing is the process of forwarding packets between source and destination networks through routing devices. Routing protocols are used for topology and path discovery.
2. Routers maintain routing tables containing paths to known destinations and routing information like metrics, next hops, and ages. Administrative distances define route preferences.
3. The Internet uses interior gateway protocols (IGPs) within autonomous systems (ASes) and exterior gateway protocols (EGPs) between ASes. Common IGPs include RIP, OSPF, IS-IS. BGP is a prominent EGP.
The document compares the AODV and OLSR routing protocols for mobile ad hoc networks. AODV is a reactive protocol that establishes routes on demand, while OLSR is a proactive protocol that maintains routes to all nodes. OLSR generally has lower latency than AODV but higher overhead. Both protocols elect multipoint relays to reduce flooding. AODV uses less bandwidth but requires route discovery, while OLSR maintains all routes continuously.
HSRP is a first hop redundancy protocol that provides high network availability by allowing transparent failover of the default gateway device. It uses a virtual IP address and MAC address that is shared between routers to allow hosts to maintain network connectivity even if the primary gateway fails. The router with the highest priority, as determined by configured priority values and IP addresses, will become the active router and handle traffic for the virtual address. If the active router fails to send hello messages, the standby router with the next highest priority will take over as the active router in a transparent manner for connected hosts.
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAshok Panwar
The document discusses the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive routing protocol designed for use in mobile ad hoc networks. It establishes routes using a route discovery process initiated when a node requires a route to a destination. This process uses route request and route reply messages to discover routes. AODV also maintains these routes by periodically broadcasting hello messages and responding to link failures via route error messages. The document provides details on AODV's routing table structure, message types, route discovery and maintenance processes.
This document discusses MANET routing protocols and compares AODV and DSR protocols. It provides an overview of ad hoc networks and their key characteristics like being decentralized and relying on participating nodes to forward data. It then describes the main categories of ad hoc routing protocols - proactive (table-driven) and reactive (on-demand). The document dives deeper into AODV and DSR protocols, explaining their path discovery, maintenance and other mechanisms. The key differences noted are that DSR can handle uni-directional and bi-directional links while both protocols employ on-demand routing and broadcast discovery but use different approaches for route information storage and link failure handling.
Traffic characterization parameters like bandwidth, delay, and jitter requirements are used to specify network traffic flows. Traffic shaping techniques like leaky bucket and token bucket regulate traffic into defined patterns to facilitate admission control and traffic policing. The leaky bucket traffic shaper uses a finite bucket that leaks data out at a constant rate to shape traffic bursts according to the bucket size and leak rate. Queue scheduling disciplines like weighted fair queueing determine which packet is served next to affect packet delay, bandwidth, and jitter. Resource reservation protocols negotiate quality of service guarantees by reserving required network resources.
This document provides a literature review of research papers on detecting and preventing blackhole attacks in the AODV routing protocol for mobile ad hoc networks (MANETs). It summarizes 9 papers that propose various techniques like using sequence numbers, watchdog mechanisms, and route confirmation messages to identify malicious nodes and increase security. The document outlines the key ideas, results, and potential future work from each paper to improve performance and security against blackhole attacks in AODV routing.
The document discusses limitations of using local preference alone for interdomain routing. It explains that local preference allows each domain to define preferred paths but may not always converge to a stable solution. The order domains announce updates can affect the chosen paths, and some configurations could lead to perpetual route withdrawals. More attributes are needed to consistently optimize economics across domains.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
Simulation & comparison of aodv & dsr protocolPrafull Johri
This document summarizes and compares two reactive routing protocols - AODV and DSR. It discusses how NS2 was extended to simulate wireless networks and the two protocols. AODV uses route discovery to find paths, maintains route tables, and can locally repair broken links. DSR also uses route discovery but source routes are carried in packet headers. While AODV has lower initial packet loss, DSR performance improves over time, so either protocol can be used for longer simulations.
This document discusses configuring QoS marking on a Cisco IOS router. It shows how to mark telnet traffic with IP precedence 7 and HTTP traffic with DSCP AF12 by creating access lists, class maps, and a policy map. It also demonstrates verifying the marked packets are received correctly by matching on the markings at the destination router.
This document discusses quality of service (QoS) classification on Cisco IOS routers. It explains that applications like voice have different network requirements than bulk file transfers. To ensure each application gets proper treatment, traffic must be classified. Classification methods on IOS routers include header inspection of fields like ports and IP addresses, and deeper payload inspection using Network-Based Application Recognition (NBAR) which can identify applications regardless of port. The document demonstrates simple classification using an access control list matched to a class map in a policy map applied to an interface. It also shows classification using NBAR to match protocols like Telnet in a class map.
This document discusses quality of service (QoS) techniques for prioritizing different types of network traffic such as voice over IP. It describes several QoS mechanisms including weighted fair queuing, priority queuing, class-based weighted fair queuing, IP precedence, policy routing, and resource reservation protocol. These mechanisms allow administrators to classify and manage network traffic to ensure sufficient bandwidth and latency for applications like VoIP that have sensitive network requirements.
ZRP divides routing into intrazone and interzone routing. Intrazone routing uses a proactive approach to route packets within a node's routing zone. Interzone routing uses a reactive approach where the source node sends route requests to peripheral nodes when the destination is outside its zone. The optimal zone radius depends on factors like mobility and query rates, with smaller radii preferred for higher mobility. ZRP aims to reduce routing overhead through techniques like restricting floods and maintaining multiple routes.
This document discusses routing protocols for mobile ad-hoc networks (MANETs). It introduces several routing protocols including proactive (table-driven) protocols like Destination-Sequenced Distance Vector (DSDV), reactive (on-demand) protocols like Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), and hybrid protocols like Zone Routing Protocol (ZRP) that use both proactive and reactive approaches. For each protocol, it provides a brief overview of the routing approach and algorithm. It also compares the characteristics of proactive, reactive and hybrid routing protocols.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document discusses Label Distribution Protocol (LDP) configuration on a MPLS network using Juniper routers. It describes using logical systems to partition a single physical router into multiple logical devices. LDP is configured between logical systems LS1-P1, LS11-PE1, and other logical systems. LDP establishes MPLS LSPs along the best path determined by OSPF. The label bindings are verified between routers to ensure end-to-end connectivity across the MPLS domain.
This document discusses RSVP and differentiated services (DS) network models. It provides details on:
1) RSVP uses objects like INTEGRITY, SCOPE, and RESV_CONFIRM carried in messages to establish and maintain reservations. Messages include a common header followed by objects.
2) The DS model aggregates traffic by service level agreements rather than per-flow reservations. Packets are marked with DS field codepoints to receive different per-hop behaviors like expedited forwarding or assured forwarding.
3) DS routers classify and condition traffic at ingress based on DS fields and traffic agreements. Core routers provide behaviors like low latency for expedited forwarding or high assurance delivery for assured forwarding traffic within configured rates.
This document discusses Ad-hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive routing protocol for mobile ad hoc networks that establishes routes on demand. It uses route discovery and route maintenance through broadcast of route request (RREQ), route reply (RREP) and route error (RERR) messages. AODV is efficient for networks with changing topologies but has higher latency for route discovery and lacks efficient route maintenance compared to proactive protocols.
AODV is an on-demand routing protocol for mobile ad-hoc networks that uses route discovery and route maintenance to dynamically discover routes. When a source node needs to send a packet to a destination, it broadcasts a route request which is forwarded through the network until it reaches the destination or an intermediate node with a fresh route. The destination or intermediate node then sends back a route reply along the reverse path set up by the route request, which is used to forward data packets. Nodes maintain routing tables with only active routes and expired routes are deleted to avoid unnecessary overhead.
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
Mobile ad hoc network is a collection of wireless nodes that are communicate other
nodes (router) without using access point, infrastructure . Mobile ad-hoc network is an
autonomous system that means no need for depaentd other nodes it have own capability
to handle and controlling all funcitionlity, to sending and receiving all information form
one device to other device. MANET has power full feature that controlling itself by
dynamic nature, multihop,low power and configuration of the system. In this paper we
analyzing, simulation and implements the TC messages and HELLO Message by MPR of
OLSR routing performance checked at 200 nodes on Qualnet 5.0.2 simulator. In Qualnet
simulator to simulate and implement the performance of OLSR routing protocols takes
various performance metrics like hello message sent (HMS) , hello message received
(HMR), TC message generated (TCMG), TC message replied (TCMR), TC messages
received on Constant Bit Rate (CBR) using random waypoint model. In this paper check
the performance OLSR routing protocol gives effective performance for lage networks.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAshok Panwar
The document discusses the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive routing protocol designed for use in mobile ad hoc networks. It establishes routes using a route discovery process initiated when a node requires a route to a destination. This process uses route request and route reply messages to discover routes. AODV also maintains these routes by periodically broadcasting hello messages and responding to link failures via route error messages. The document provides details on AODV's routing table structure, message types, route discovery and maintenance processes.
This document discusses MANET routing protocols and compares AODV and DSR protocols. It provides an overview of ad hoc networks and their key characteristics like being decentralized and relying on participating nodes to forward data. It then describes the main categories of ad hoc routing protocols - proactive (table-driven) and reactive (on-demand). The document dives deeper into AODV and DSR protocols, explaining their path discovery, maintenance and other mechanisms. The key differences noted are that DSR can handle uni-directional and bi-directional links while both protocols employ on-demand routing and broadcast discovery but use different approaches for route information storage and link failure handling.
Traffic characterization parameters like bandwidth, delay, and jitter requirements are used to specify network traffic flows. Traffic shaping techniques like leaky bucket and token bucket regulate traffic into defined patterns to facilitate admission control and traffic policing. The leaky bucket traffic shaper uses a finite bucket that leaks data out at a constant rate to shape traffic bursts according to the bucket size and leak rate. Queue scheduling disciplines like weighted fair queueing determine which packet is served next to affect packet delay, bandwidth, and jitter. Resource reservation protocols negotiate quality of service guarantees by reserving required network resources.
This document provides a literature review of research papers on detecting and preventing blackhole attacks in the AODV routing protocol for mobile ad hoc networks (MANETs). It summarizes 9 papers that propose various techniques like using sequence numbers, watchdog mechanisms, and route confirmation messages to identify malicious nodes and increase security. The document outlines the key ideas, results, and potential future work from each paper to improve performance and security against blackhole attacks in AODV routing.
The document discusses limitations of using local preference alone for interdomain routing. It explains that local preference allows each domain to define preferred paths but may not always converge to a stable solution. The order domains announce updates can affect the chosen paths, and some configurations could lead to perpetual route withdrawals. More attributes are needed to consistently optimize economics across domains.
The document provides information about an upcoming training course on deploying MPLS L3 VPNs. It includes details about the trainers, Nurul Islam Roman and Jessica Wei, their backgrounds and areas of expertise. It also outlines the course agenda which will cover topics such as MPLS VPN models, terminology, operation, configuration examples and service deployment scenarios.
Simulation & comparison of aodv & dsr protocolPrafull Johri
This document summarizes and compares two reactive routing protocols - AODV and DSR. It discusses how NS2 was extended to simulate wireless networks and the two protocols. AODV uses route discovery to find paths, maintains route tables, and can locally repair broken links. DSR also uses route discovery but source routes are carried in packet headers. While AODV has lower initial packet loss, DSR performance improves over time, so either protocol can be used for longer simulations.
This document discusses configuring QoS marking on a Cisco IOS router. It shows how to mark telnet traffic with IP precedence 7 and HTTP traffic with DSCP AF12 by creating access lists, class maps, and a policy map. It also demonstrates verifying the marked packets are received correctly by matching on the markings at the destination router.
This document discusses quality of service (QoS) classification on Cisco IOS routers. It explains that applications like voice have different network requirements than bulk file transfers. To ensure each application gets proper treatment, traffic must be classified. Classification methods on IOS routers include header inspection of fields like ports and IP addresses, and deeper payload inspection using Network-Based Application Recognition (NBAR) which can identify applications regardless of port. The document demonstrates simple classification using an access control list matched to a class map in a policy map applied to an interface. It also shows classification using NBAR to match protocols like Telnet in a class map.
This document discusses quality of service (QoS) techniques for prioritizing different types of network traffic such as voice over IP. It describes several QoS mechanisms including weighted fair queuing, priority queuing, class-based weighted fair queuing, IP precedence, policy routing, and resource reservation protocol. These mechanisms allow administrators to classify and manage network traffic to ensure sufficient bandwidth and latency for applications like VoIP that have sensitive network requirements.
ZRP divides routing into intrazone and interzone routing. Intrazone routing uses a proactive approach to route packets within a node's routing zone. Interzone routing uses a reactive approach where the source node sends route requests to peripheral nodes when the destination is outside its zone. The optimal zone radius depends on factors like mobility and query rates, with smaller radii preferred for higher mobility. ZRP aims to reduce routing overhead through techniques like restricting floods and maintaining multiple routes.
This document discusses routing protocols for mobile ad-hoc networks (MANETs). It introduces several routing protocols including proactive (table-driven) protocols like Destination-Sequenced Distance Vector (DSDV), reactive (on-demand) protocols like Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR), and hybrid protocols like Zone Routing Protocol (ZRP) that use both proactive and reactive approaches. For each protocol, it provides a brief overview of the routing approach and algorithm. It also compares the characteristics of proactive, reactive and hybrid routing protocols.
MPLS L3 VPN allows companies to offer Layer 3 VPN services with advantages like scalability, security, and support for duplicate IP addresses and different network topologies. The key components that enable this are VRF tables on PE routers that separate routing information for each customer to avoid duplicate IP issues, and MP-BGP which customizes VPN routing information using a Route Distinguisher, VPN label, and Route Target to support different VPN topologies. MPLS L3 VPN provides services like multi-homed sites for redundancy, hub-and-spoke networks, internet access with security, and extranets for inter-company communication.
The document discusses Label Distribution Protocol (LDP) configuration on a MPLS network using Juniper routers. It describes using logical systems to partition a single physical router into multiple logical devices. LDP is configured between logical systems LS1-P1, LS11-PE1, and other logical systems. LDP establishes MPLS LSPs along the best path determined by OSPF. The label bindings are verified between routers to ensure end-to-end connectivity across the MPLS domain.
This document discusses RSVP and differentiated services (DS) network models. It provides details on:
1) RSVP uses objects like INTEGRITY, SCOPE, and RESV_CONFIRM carried in messages to establish and maintain reservations. Messages include a common header followed by objects.
2) The DS model aggregates traffic by service level agreements rather than per-flow reservations. Packets are marked with DS field codepoints to receive different per-hop behaviors like expedited forwarding or assured forwarding.
3) DS routers classify and condition traffic at ingress based on DS fields and traffic agreements. Core routers provide behaviors like low latency for expedited forwarding or high assurance delivery for assured forwarding traffic within configured rates.
This document discusses Ad-hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive routing protocol for mobile ad hoc networks that establishes routes on demand. It uses route discovery and route maintenance through broadcast of route request (RREQ), route reply (RREP) and route error (RERR) messages. AODV is efficient for networks with changing topologies but has higher latency for route discovery and lacks efficient route maintenance compared to proactive protocols.
AODV is an on-demand routing protocol for mobile ad-hoc networks that uses route discovery and route maintenance to dynamically discover routes. When a source node needs to send a packet to a destination, it broadcasts a route request which is forwarded through the network until it reaches the destination or an intermediate node with a fresh route. The destination or intermediate node then sends back a route reply along the reverse path set up by the route request, which is used to forward data packets. Nodes maintain routing tables with only active routes and expired routes are deleted to avoid unnecessary overhead.
A study on performance comparison of dymo with aodv and dsrIAEME Publication
This document summarizes and compares the performance of the DYMO, AODV, and DSR routing protocols for mobile ad hoc networks (MANETs). It finds that DYMO has the highest throughput as it avoids expiring good routes by appropriately updating route lifetimes. AODV shows higher throughput than DSR due to avoiding loops and maintaining fresh routes. DSR initially has very high packet loss, but this decreases substantially over time. The document analyzes the protocols based on metrics like throughput, packet loss, end-to-end delay, packet delivery fraction, and routing overhead.
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24006.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/24006/a-study-on-ad-hoc-on-demand-distance-vector-aodv-protocol/dr-r-madhanmohan
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric.
The document summarizes several routing protocols used in wireless networks. It discusses both table-driven protocols like DSDV and on-demand protocols like AODV. It provides details on how each protocol performs routing and maintains routes. It also outlines some advantages and disadvantages of protocols like DSDV, AODV, DSR, and TORA.
This document provides an overview of different routing protocols. It discusses IP routing, static routing, and dynamic routing. It also covers proactive routing protocols like DSDV which maintain routing tables and periodically update them. Reactive protocols like DSR and AODV establish routes on demand. Hybrid protocols combine proactive and reactive approaches. The document describes the key processes, advantages, and disadvantages of DSDV, DSR, AODV, and zone routing protocol.
This document summarizes a research paper that proposes a reliable node-disjoint multipath routing protocol for mobile ad-hoc networks (MANETs). The protocol aims to determine all available reliable node-disjoint routes from the source to destination with minimum overhead during route discovery. It selects primary and backup routes based on link quality and route expiration time. If the primary path fails, it uses the next available backup route. The performance is evaluated using simulations in NS-2, which show it reduces packet drop and delay, increasing packet delivery ratio.
Mobile Ad hoc Networks (MANETs) are characterized by open structure, lack of standard infrastructure
and un-accessibility to the trusted servers. The performance of various MANET routing protocols is
significantly affected due to frequently changing network topology, confined network resources and
security of data packets. In this paper, a simulation based performance comparison of one of the most
commonly used on-demand application oriented routing protocols, AODV (Ad hoc on-demand Distance
Vector) and its optimized versions R-AODV (Reverse AODV) and PHR-AODV (Path hopping based
Reverse AODV) has been presented. Basically the paper evaluates these protocols based on a wide set of
performance metrics by varying both the number of nodes and the nodes maximum speed. A NS-2 based
simulation study shows that, as compared to AODV and PHR-AODV, R-AODV enhances the packet
delivery fraction by 15-20% and reduces the latency approximately by 50%. R-AODV requires lesser node
energy for data transmission.
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
MANETS suffer from constraints in power, storage and computational resources ,as a result, they are more
vulnerable to various communications security related attacks. therefore we attempt to focus on analyzing and
improving the security of routing protocol for MANETS viz. the Ad hoc On Demand Distance Vector
(AODV)routing protocol. We propose modifications to the AODV we propose an algorithm to counter the
Black hole attack on the routing protocols in MANETs. All the routes has unique sequence number and the
malicious node has the highest Destination Sequence number and it is the first RREP to arrive. So the
comparison is made only to the first entry in the table without checking other entries in the table
This document summarizes several routing protocols for ad hoc wireless networks. It describes the challenges in this domain including dynamic topologies and limited resources. It then categorizes and explains several types of routing protocols, including proactive protocols like DSDV, reactive protocols like AODV and DSR, hybrid protocols like ZRP, and geographic routing. It provides details on the route discovery and maintenance mechanisms of some of these prominent protocols. It also discusses theoretical limits on network capacity and the impact of mobility and hierarchy.
Routing Protocols for Ad-Hoc Networks. This is a book for Ad-hoc On-Demand Distance Vector Routing
&
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. November 2011,
Authors : Giorgos Papadakis & Manolis Surligas
This document compares the AODV and DSR MANET routing protocols. It provides background on MANETs and categories of routing protocols. It then describes the key features of the AODV and DSR reactive protocols. The document outlines a methodology to simulate scenarios using these two protocols in NS2 and compare their performance based on throughput and packet delivery ratio. It proposes improving AODV security using cryptography for future work.
Default and On demand routing - Advance Computer NetworksSonali Parab
Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks.
In packet switching networks, routing directs packet forwarding (the transit of logically addressed network packets from their source toward their ultimate destination) through intermediate nodes. Intermediate nodes are typically network hardware devices such as routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time. Multipath routing techniques enable the use of multiple alternative paths.
The document discusses two on-demand routing protocols for ad-hoc networks: AODV and DSR. It provides an overview of ad-hoc networks and routing algorithms. It then describes the key mechanisms and operations of AODV, including path discovery using route requests, path maintenance through link failure detection, and local connectivity maintenance with hello messages. It also outlines the general approach and basic route discovery and maintenance processes used in DSR.
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Mobility and Node Density Based Performance Analysis of AODV Protocol for Adh...IDES Editor
A mobile ad-hoc network (MANET) is a collection of
mobile nodes, which communicate over radio. These networks
have an important advantage; they do not require any
existing infrastructure or central administration. Therefore,
mobile ad-hoc networks are suitable for temporary
communication links. This flexibility, however, comes at a
price: communication is difficult to organize due to frequent
topology changes. In this paper we propose on-demand
routing algorithm for mobile, multi-hop ad-hoc networks. The
algorithm is based on ant algorithms, which are a class of
swarm intelligence. The main goal in the design of the
algorithm is to reduce the overhead for routing. Furthermore,
in this paper the performance of AODV protocol is analyzed
by varying mobility and node density parameters through
simulation of results ns2 simulator.
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
The document summarizes the Ad Hoc On-Demand Distance Vector (AODV) routing protocol. AODV is a reactive routing protocol that uses route discovery cycles to find routes on demand. It uses sequence numbers to prevent loops and maintain freshness of routes. Routes are discovered and maintained through route request (RREQ), route reply (RREP), and route error (RERR) messages. When a route is needed, AODV floods RREQ messages and the destination or intermediate nodes reply with RREPs if they have a valid route. If a link breaks, RERR messages are propagated to invalidate routes using that link.
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
Appropriate routing protocol in data transfer is a challenging problem of network in terms of lower end-to-end delay in delivery of data packets with improving packet delivery ratio and lower overhead as well. In this paper we explain an effective and scalable AODV (called as AODV-ES) for Wireless Ad hoc Sensor Networks (WASN) by using third party reply model, n-hop local ring and time-to-live based local recovery. Our goal is to reduce time delay for delivery of the data packets, routing overhead and improve the data packet delivery ratio. The resulting algorithm AODV-ES is then simulated by NS-2 under Linux operating system. The performance of routing protocol is evaluated under various mobility rates and found that the proposed routing protocol is better than AODV.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Software Engineering and Project Management - Introduction, Modeling Concepts...
2006 aodv-group-presentation
1. Ad hoc On-demandAd hoc On-demand
Distance Vector (AODV)Distance Vector (AODV)
Routing ProtocolRouting Protocol
ECE 695ECE 695
Spring 2006Spring 2006
2. AODV OverviewAODV Overview
AODV is a packet routing protocol designed forAODV is a packet routing protocol designed for
use in mobile ad hoc networks (MANET)use in mobile ad hoc networks (MANET)
Intended for networks that may containIntended for networks that may contain
thousands of nodesthousands of nodes
One of a class ofOne of a class of demand-drivendemand-driven protocolsprotocols
• TheThe route discoveryroute discovery mechanism is invoked only if amechanism is invoked only if a
route to a destination is not knownroute to a destination is not known
UDPUDP is the transport layer protocolis the transport layer protocol
Source, destinationSource, destination andand next hopnext hop are addressedare addressed
usingusing IP addressingIP addressing
Each node maintains aEach node maintains a routing tablerouting table that containsthat contains
information about reaching destination nodes.information about reaching destination nodes.
• Each entry is keyed to a destination node.Each entry is keyed to a destination node.
3. Routing Table FieldsRouting Table Fields
Destination IP addressDestination IP address
Destination Sequence NumberDestination Sequence Number
Valid Destination Sequence Number FlagValid Destination Sequence Number Flag
Other state and routing flagsOther state and routing flags
Network InterfaceNetwork Interface
Hop Count (needed to reach destination)Hop Count (needed to reach destination)
Next HopNext Hop
Precursor ListPrecursor List
Lifetime (route expiration or deletion time)Lifetime (route expiration or deletion time)
4. Overview (continued)Overview (continued)
Routing table size is minimized by only includingRouting table size is minimized by only including
next hop information, not the entire route to anext hop information, not the entire route to a
destination node.destination node.
Sequence numbers for both destination andSequence numbers for both destination and
source are used.source are used.
Managing the sequence number is the key toManaging the sequence number is the key to
efficient routing and route maintenanceefficient routing and route maintenance
• Sequence numbers are used to indicate the relativeSequence numbers are used to indicate the relative
freshnessfreshness of routing informationof routing information
• Updated by an originating node, e.g., at initiation ofUpdated by an originating node, e.g., at initiation of
route discovery or a route reply.route discovery or a route reply.
• Observed by other nodes to determine freshness.Observed by other nodes to determine freshness.
5. Overview (continued)Overview (continued)
The basic message set consists of:The basic message set consists of:
• RREQ – Route requestRREQ – Route request
• RREP – Route replyRREP – Route reply
• RERR – Route errorRERR – Route error
• HELLO – For link status monitoringHELLO – For link status monitoring
6. AODV Operation – Message TypesAODV Operation – Message Types
RREQ MessagesRREQ Messages
• While communication routes between nodesWhile communication routes between nodes
are valid, AODV does not play any role.are valid, AODV does not play any role.
• A RREQ message is broadcasted when a nodeA RREQ message is broadcasted when a node
needs to discover a route to a destination.needs to discover a route to a destination.
• As a RREQ propagates through the network,As a RREQ propagates through the network,
intermediate nodes use it to update theirintermediate nodes use it to update their
routing tables (in the direction of the sourcerouting tables (in the direction of the source
node).node).
• The RREQ also contains the most recentThe RREQ also contains the most recent
sequence number for the destination.sequence number for the destination.
• A valid destination route must have a sequenceA valid destination route must have a sequence
number at least as great as that contained innumber at least as great as that contained in
the RREQ.the RREQ.
8. AODV Operation – Message TypesAODV Operation – Message Types
RREP MessagesRREP Messages
• When a RREQ reaches a destination node, theWhen a RREQ reaches a destination node, the
destination route is made available bydestination route is made available by
unicasting a RREP back to the source route.unicasting a RREP back to the source route.
• A node generates a RREP if:A node generates a RREP if:
It is itself the destination.It is itself the destination.
It has an active route to the destination. Ex: anIt has an active route to the destination. Ex: an
intermediate node may also respond with an RREP ifintermediate node may also respond with an RREP if
it has a “fresh enough” route to the destination.it has a “fresh enough” route to the destination.
• As the RREP propagates back to the sourceAs the RREP propagates back to the source
node, intermediate nodes update their routingnode, intermediate nodes update their routing
tables (in the direction of the destinationtables (in the direction of the destination
node).node).
10. AODV Operation – Message TypesAODV Operation – Message Types
RERR MessagesRERR Messages
• This message is broadcast for brokenThis message is broadcast for broken
linkslinks
• Generated directly by a node or passedGenerated directly by a node or passed
on when received from another nodeon when received from another node
11. AODV Operation – Message TypesAODV Operation – Message Types
Hello MessagesHello Messages
• Hello Message = RREP with TTL = 1Hello Message = RREP with TTL = 1
• This message is used for broadcastingThis message is used for broadcasting
connectivity information.connectivity information.
Ex: If a neighbor node does not receive any packetsEx: If a neighbor node does not receive any packets
(Hello messages or otherwise) for more than(Hello messages or otherwise) for more than
ALLOWED_HELLO_LOSS * HELLO_INTERVALALLOWED_HELLO_LOSS * HELLO_INTERVAL
mseconds, the node will assume that the link to thismseconds, the node will assume that the link to this
neighbor is currently lost.neighbor is currently lost.
• A node should use Hello messages only if it isA node should use Hello messages only if it is
part of an active route.part of an active route.
13. Congestion HandlingCongestion Handling
One method that AODV handle congestionOne method that AODV handle congestion
is:is:
• If the source node receives no RREP from theIf the source node receives no RREP from the
destination, it may broadcast another RREQ,destination, it may broadcast another RREQ,
up to a maximum of RREQ_RETRIES.up to a maximum of RREQ_RETRIES.
• For each additional attempt that a source node tried toFor each additional attempt that a source node tried to
broadcast RREQ, the waiting time for the RREP isbroadcast RREQ, the waiting time for the RREP is
multiplied by 2.multiplied by 2.
DSR is not capable of handling congestion.DSR is not capable of handling congestion.
14. Congestion HandlingCongestion Handling
Other possible methods to improve AODVOther possible methods to improve AODV
congestion handling:congestion handling:
• A route may predict when congestion is aboutA route may predict when congestion is about
to occur and try to avoid it by reduce theto occur and try to avoid it by reduce the
transmission rate.transmission rate.
• Schedule the requests so that it will notSchedule the requests so that it will not
overload the network.overload the network.
15. AODV RoutingAODV Routing
There are two phasesThere are two phases
• Route Discovery.Route Discovery.
• Route Maintenance.Route Maintenance.
Each node maintains a routing table with knowledge aboutEach node maintains a routing table with knowledge about
the network.the network.
AODV deals with route table management.AODV deals with route table management.
Route information maintained even for short lived routes –Route information maintained even for short lived routes –
reverse pointers.reverse pointers.
16. Entries in Routing TableEntries in Routing Table
Destination IP AddressDestination IP Address
Destination Sequence NumberDestination Sequence Number
Valid Destination Sequence Number flagValid Destination Sequence Number flag
Other state and routing flags (e.g., valid, invalid,Other state and routing flags (e.g., valid, invalid,
repairable, being repaired)repairable, being repaired)
Network InterfaceNetwork Interface
Hop Count (number of hops needed to reach destination)Hop Count (number of hops needed to reach destination)
Next HopNext Hop
List of PrecursorsList of Precursors
Lifetime (expiration or deletion time of the route)Lifetime (expiration or deletion time of the route)
DSR maintains additional table entries, causing a largerDSR maintains additional table entries, causing a larger
memory overheadmemory overhead
17. DiscoveryDiscovery
Broadcast RREQ messages.Broadcast RREQ messages.
Intermediate nodes update their routing tableIntermediate nodes update their routing table
Forward the RREQ if it is not the destination.Forward the RREQ if it is not the destination.
Maintain back-pointer to the originator.Maintain back-pointer to the originator.
Destination generates RREQ message.Destination generates RREQ message.
RREQ sent back to source using the reverseRREQ sent back to source using the reverse
pointer set uppointer set up
by the intermediate nodes.by the intermediate nodes.
RREQ reaches destination, communication starts.RREQ reaches destination, communication starts.
18. Algorithm for DiscoveryAlgorithm for Discovery
@Originator@Originator
If a route to the destination is available, start sendingIf a route to the destination is available, start sending
data.data.
Else generate a RREQ packet. Increment the RREQID byElse generate a RREQ packet. Increment the RREQID by
1.Increment the sequence number by 1.Destination IP1.Increment the sequence number by 1.Destination IP
address ,currently available sequence number included.address ,currently available sequence number included.
@Intermediate Node@Intermediate Node
Generate route reply, if a 'fresh enough' route is a validGenerate route reply, if a 'fresh enough' route is a valid
route entry for the destination whose associated sequenceroute entry for the destination whose associated sequence
number is at least as great as that contained in the RREQ.number is at least as great as that contained in the RREQ.
Change the sequence number of the destination node ifChange the sequence number of the destination node if
stale, increment the hop count by 1 and forward.stale, increment the hop count by 1 and forward.
@Destination 1.Increment sequence number of the@Destination 1.Increment sequence number of the
destination. 2.Generate a RREQ message and sent back todestination. 2.Generate a RREQ message and sent back to
Originator.Originator.
20. MaintenanceMaintenance
Hello messages broadcast byHello messages broadcast by activeactive nodes periodicallynodes periodically
HELLO_INTERVAL.HELLO_INTERVAL.
No hello message from a neighbor in DELETE_PERIOD,linkNo hello message from a neighbor in DELETE_PERIOD,link
failure identified.failure identified.
A local route repair to that next hop initiated.A local route repair to that next hop initiated.
After a timeout ,error propagated both to originator andAfter a timeout ,error propagated both to originator and
destination.destination.
Entries based on the node invalidated.Entries based on the node invalidated.
21. Information “Freshness”Information “Freshness”
AssuredAssured
Each originating node maintains a monotonicallyEach originating node maintains a monotonically
increasing sequence number.increasing sequence number.
Used by other nodes to determine the freshness ofUsed by other nodes to determine the freshness of
the information.the information.
Every nodes routing table contains the latestEvery nodes routing table contains the latest
information available about the sequence numberinformation available about the sequence number
for the IP address of the destination node for whichfor the IP address of the destination node for which
the routing information is maintained.the routing information is maintained.
• Updated whenever a node receives new informationUpdated whenever a node receives new information
about the sequence number from RREQ, RREP, orabout the sequence number from RREQ, RREP, or
RERR messages received related to that destination.RERR messages received related to that destination.
22. Information “Freshness”Information “Freshness”
AssuredAssured
AODV depends on each node in the network to ownAODV depends on each node in the network to own
and maintain its destination sequence number.and maintain its destination sequence number.
A destination node increments its own sequenceA destination node increments its own sequence
number immediately before it originates a routenumber immediately before it originates a route
discoverydiscovery
A destination node increments its own sequenceA destination node increments its own sequence
number immediately before it originates a RREPnumber immediately before it originates a RREP
in response to a RREQin response to a RREQ
The node treats its sequence number as anThe node treats its sequence number as an
unsigned number when incrementingunsigned number when incrementing
accomplishing sequence number rollover.accomplishing sequence number rollover.
Destination information is assured by comparingDestination information is assured by comparing
the sequence number of the incoming AODVthe sequence number of the incoming AODV
message with its sequence number for thatmessage with its sequence number for that
destination.destination.
23. RERR MessagesRERR Messages
• Message is broadcasted when:Message is broadcasted when:
i.i. A node detects that a link with adjacentA node detects that a link with adjacent
neighbor is broken (destination no longerneighbor is broken (destination no longer
reachable).reachable).
ii.ii. If it gets a data packet destined to a nodeIf it gets a data packet destined to a node
for which it does not have an active routefor which it does not have an active route
and is not repairing.and is not repairing.
iii.iii. If it receives a RERR from a neighbor forIf it receives a RERR from a neighbor for
one or more active routes.one or more active routes.
24. RERR Processing (for aboveRERR Processing (for above
broadcasts)broadcasts)
• Build Affected Destination ListingBuild Affected Destination Listing
i.i. List unreachable destinations containingList unreachable destinations containing
unreachable neighbor & destination usingunreachable neighbor & destination using
unreachable as next hopunreachable as next hop
ii.ii. Only one unreachable destination, which nodeOnly one unreachable destination, which node
already has.already has.
iii.iii. List of nodes where RERR is next hopList of nodes where RERR is next hop
• Update informationUpdate information
• Transmit RERR for each item listedTransmit RERR for each item listed
25. RERR – information updateRERR – information update
• Destination Sequence #Destination Sequence #
- Update sequence # for case i and iiUpdate sequence # for case i and ii
- Copy sequence # for case iiiCopy sequence # for case iii
• Invalidate route entryInvalidate route entry
• Update Lifetime field as (currtime +Update Lifetime field as (currtime +
DELETE_PERIOD)DELETE_PERIOD)
• Only now may route entry be deletedOnly now may route entry be deleted
26. RERR message transmissionRERR message transmission
• UnicastUnicast
- Send RERR to single recipientSend RERR to single recipient
• Unicast iteritiveUnicast iteritive
- Send RERR to a number of recipientsSend RERR to a number of recipients
individuallyindividually
• BroadcastBroadcast
- Notify multiple recipients simultaniouslyNotify multiple recipients simultaniously
- Broadcast via 255.255.255.255 TTL = 1Broadcast via 255.255.255.255 TTL = 1
27. RERR message transmissionRERR message transmission
• UnicastUnicast
AA node detectsnode detects that a link with adjacentthat a link with adjacent
neighbor is broken (destination no longerneighbor is broken (destination no longer
reachable).reachable).
If it gets a data packet destined to a nodeIf it gets a data packet destined to a node
for which it does not have an active routefor which it does not have an active route
and is not repairing.and is not repairing.
If it receives a RERR from a neighbor for oneIf it receives a RERR from a neighbor for one
or more active routes.or more active routes.
• Unicast iteritiveUnicast iteritive
• BroadcastBroadcast
28. How Broken Links are HandledHow Broken Links are Handled
All nodes directly using the brokenAll nodes directly using the broken
link get a RERR packet.link get a RERR packet.
Then those nodes sends the RERRThen those nodes sends the RERR
packet to their predecessor nodes.packet to their predecessor nodes.
This is continued all the way to theThis is continued all the way to the
source nodes.source nodes.
29. How Broken Links are HandledHow Broken Links are Handled
(Cont)(Cont)
Upon completion of sending theUpon completion of sending the
RERR packet through the sourceRERR packet through the source
node will no longer use the link.node will no longer use the link.
• AODV uses loop free-routes.AODV uses loop free-routes.
• There are only a finite number of nodesThere are only a finite number of nodes
in a ad-hoc network.in a ad-hoc network.
30. How Broken Links are HandledHow Broken Links are Handled
(Cont)(Cont)
DSR does not remove the path asDSR does not remove the path as
well.well.
• In DSR nodes in the network can stillIn DSR nodes in the network can still
think the broken link is still valid.think the broken link is still valid.
• This can lead to having to search forThis can lead to having to search for
new paths multiple times.new paths multiple times.
31. Reestablishing a LinkReestablishing a Link
The source node can restart theThe source node can restart the
discovery process if a path is stilldiscovery process if a path is still
needed.needed.
The source node or any node on theThe source node or any node on the
path can rebuild the route bypath can rebuild the route by
sending out a RREQ.sending out a RREQ.
Editor's Notes
*As a routing protocol for mobile ad hoc networks, AODV is intended to accommodate networks that are as large as several thousand nodes.
*It is one of several demand-driven (or on-demand) protocols that are in existence today. Hence, the protocol is invoked only when a node (host) has data to transmit. It is a reactive protocol.
*The AODV RFC indicates that the transport layer protocol is UDP, which of course only offers best effort delivery of packets, and does not support either error recovery or flow control.
*Addressing is handled using IP addressing
*Since each node acts as both a host and routing node, each must maintain a routing table that contains information about known destination nodes. Entries are keyed to destinations.
*Each entry in the routing table contains nine fields. In addition to the destination node IP address, the fields contain routing information and information that relates to the qualitative state of the route for maintenance purposes.
*Note that unlike some other protocols, AODV only maintains information on the next destination (hop) in the route, not the entire routing list. This saves memory and lowers computational overhead for route maintenance.
*It also contains information enabling the host to share information with other nodes when link states change
The sequence number, unique to each destination route, are the key to maintaining up to date routing information. Protocol messages that contain routing information also include a sequence number. By observing the value of the sequence number, an intermediate node can determine the “freshness” of the routing information.
Sequence numbers will be covered in detail later in the presentation.
The basic message set includes a route request message, route reply message, route error message, and a hello message.
The mechanics of each of these messages will be covered in detail later in the presentation.
Briefly, however, a host (node) multicasts a RREQ message when it needs to find a route to a destination (either not already contained in its routing table, or one whose status is invalid).
Make sure you explain how an intermediate node distinguishes between copies of the same RREQ. In your graph, the node in the middle receives two copies of the RREQ. In this case, the hop count from the source (A) is the same, so it doesn’t matter how its own routing back to A is updated.
If you look at the example graph I included in the overview, you see that node B and the destination node F both receive multiple copies of the RREQ. In both cases, each copy followed a different route to get to the respective node. Therefore, B and F must choose the correct version of the message to use for updating their own routing tables and also for forwarding. The hop count field is the key that allows them to decide which message to keep and which message to throw away.
You should point out that the RREQ/RREP mechanism depends on the assumption that links are symmetrical, or bidirectional.
Charles, you may not want to include this slide, and leave coverage of the topic to whomever is covering either message types (Visal) or route discovery (Fahd?). My intention was just to introduce the basic message flow, and not get into details. In the example shown, the basic flow is clear, but some explanation is required to show how nodes B and F handle duplicates of the RREQ, i.e., how do they decide to throw away the RREQs from C, E and G? I think the Hop Count field in the message is the key, but describing this starts to encroach on later parts of the presentation.
Explain why DSR can’t handle congestion
Good ideas. Can you provide a brief explanation of possible implementations for each?