This document provides an overview of mobile ad hoc networks (MANETs) and several routing protocols used in MANETs. It defines MANETs and their characteristics. It then describes several representative routing protocols, including reactive (AODV, DSR), proactive (DSDV, TBRPF) protocols. It compares these protocols through simulations on metrics like packet delivery ratio, end-to-end delay, routing overhead under different traffic loads and node mobility. It finds that no single protocol performs best under all conditions and that fundamental open questions around scalability, energy efficiency and security remain.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
Ad Hoc wireless network that without any central controlling authority, which is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis, so nodes cooperate to route a packet.
The purpose of the routing protocols is to discover rapid changes of the topology in such a way that intermediate nodes can act as routers to forward packets on behalf of the communicating pair .
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
In mobile ad hoc networks (MANETs), multipath routing protocols are more popular due to overcomes the certain limitation of single path routing like lower end-to-end delay, load balancing, energy efficiency and network lifetime. By providing multiple paths between a source-destination pair, multipath routing protocols are avoid such above problems. AOMDV (Ad Hoc On-Demand Multipath Distance Vector) routing protocol is an on-demand multipath routing and which is a relatively maturity and extensive application protocol. It doesn’t consider residual energy and load situation of the node on the time of route discovery process. So AOMDV’s efficiency declines sharply in case of high load and fast moving velocity. To solve the above problems, we propose an improved protocol Energy Efficient- AOMDV (EAOMDV) of AOMDV routing algorithm. EAOMDV is based on a strategy of energy model and load balancing concept. It will consider the residual energy and the load situation of the nodes, when it starts the route discovery phase. After considering the above concept and according to the simulation results, the EAOMDV routing protocol improves the efficiency, the packet delivery ratio and reduces the routing load.
ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
The 1st of the 7 Highly Effectively Habits, also the most important one.
All the other 6 Habits all build upon this Foundational Habit.
It is highly recommended that you gain some fundamental ideas via "The 7 Highly Effective Habits Foundational Principles" deck before jumping into this.
That will definitely help strengthen your concept of what everything is all about.
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
In this project, AODV and Flooding routing protocols using different parameter metrics have been simulated and analyzed
Simulation results show that performance parameters of the routing protocols may vary depending on network load, mobility and network size.
Under G-Sense Model, AODV experience the highest Packet Delivery Fraction and Throughput with the increase of nodes stop time, and mobile nodes number.
AODV and Simple Flooding performance is due to their on demand characteristics to determine the freshness of the route. And it is proved also that AODV has a slightly higher Average end-to-end Delay than Simple Flooding.
In mobile ad hoc networks (MANETs), multipath routing protocols are more popular due to overcomes the certain limitation of single path routing like lower end-to-end delay, load balancing, energy efficiency and network lifetime. By providing multiple paths between a source-destination pair, multipath routing protocols are avoid such above problems. AOMDV (Ad Hoc On-Demand Multipath Distance Vector) routing protocol is an on-demand multipath routing and which is a relatively maturity and extensive application protocol. It doesn’t consider residual energy and load situation of the node on the time of route discovery process. So AOMDV’s efficiency declines sharply in case of high load and fast moving velocity. To solve the above problems, we propose an improved protocol Energy Efficient- AOMDV (EAOMDV) of AOMDV routing algorithm. EAOMDV is based on a strategy of energy model and load balancing concept. It will consider the residual energy and the load situation of the nodes, when it starts the route discovery phase. After considering the above concept and according to the simulation results, the EAOMDV routing protocol improves the efficiency, the packet delivery ratio and reduces the routing load.
ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
MANET Routing Protocols , a case studyRehan Hattab
L. Yi, Y. Zhai, Y. Wang, J. Yuan and I. You , Impacts of Internal Network Contexts on Performance of MANET Routing Protocols: a Case Study, Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing,2012.
Routing protocols for mobile ad-hoc networks have to
face the challenge of frequently changing topology, low
transmission power and asymmetric links. Both
proactive and reactive routing protocols prove to be
inefficient under these circumstances. The Zone Routing
Protocol (ZRP) combines the advantages of the proactive
and reactive approaches by maintaining an up-to-date
topological map of a zone centered on each node. Within
the zone, routes are immediately available. For
destinations outside the zone, ZRP employs a route
discovery procedure, which can benefit from the local
routing information of the zones.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
The 1st of the 7 Highly Effectively Habits, also the most important one.
All the other 6 Habits all build upon this Foundational Habit.
It is highly recommended that you gain some fundamental ideas via "The 7 Highly Effective Habits Foundational Principles" deck before jumping into this.
That will definitely help strengthen your concept of what everything is all about.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
A mobile ad hoc network (MANET) is a temporary coll
ection of mobile nodes randomly moved within a
limited terrain area. The nodes are connected to fo
rm a wireless network without use any communication
infrastructure. Because of the limiting resources o
f MANET nodes, multiple hops
scheme is proposed for
data exchange
across the network. Varieties of mobile ad hoc rout
ing protocols have been developed to
support the multi-hop scheme of ad hoc networks. A
popular Transmission Control Protocol (TCP)
provides a reliable connection in a computer networ
k environment; it sets its congestion window size i
n
response to the behavior of the network to achieve
the best performance. This work aims to investigate
and
compare the MANET protocol
performance, such as DSDV, AODV and DSR in terms of
network
throughput, average routing load, the packet delive
ry ratio (PDR), and average end-to-end delay by
varying the maximum congestion window size. Our si
mulation has been implemented using a well-known
NS-2.35 network simulator. The simulated results sh
ow that the demonstrates of the concepts of MANET
routing protocols with respect to TCP congestion wi
ndow size in MANET environment
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...ijsrd.com
In Mobile Ad hoc network (MANETS), no fixed infrastructure is available. Different wireless hosts are free to move from one location to another without any centralized administration, so, the topology changes rapidly or unpredictably. Every node operates as router as well as an end system. Routing in MANETs has been a challenging task ever since the wireless networks came into existence. The major reason for this is continues changes in network topology because of high degree of node mobility. The MANET routing protocols have mainly two classes: Proactive routing (or table-driven routing) protocols and Reactive routing (or on-demand routing) protocols. In this paper, we have analyzed various Random based mobility models: Random Waypoint model, Random Walk model, Random Direction model and Probabilistic Random Walk model using AODV and DSDV protocols in Network Simulator (NS 2.35). The performance comparison of MANET mobility models have been analyzed by varying number of nodes using traffic TCP. The comparative conclusions are drawn on the basis of various performance metrics such as: Routing Overhead (packets), Packet Delivery Fraction (%), Normalized Routing Load, Average End-to-End Delay (milliseconds) and Packet Loss (%).
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.JohnWilson47710
Mobile ad hoc network(MANET) is an advance technology of mobile allowing communication without the help of base framing or station. For more detail visit: https://myassignmenthelp.com/free-samples/comp7055-mobile-and-wireless-networks/proactive-and-reactive-routing-file-A1E62A9.html
Ad hoc networks are multi-hop networks consisting of wireless autonomous hosts, where each host may serve as a router to assists traffic from other nodes. Wireless ad hoc networks cover a wide range of network scenarios, including sensor, mobile ad hoc, personal area, and rooftop/mesh networks
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
A Mobile Ad hoc NETwork (MANET), is a self-configuring infra structure less network of mobile devices
connected by wireless links. ad hoc is Latin and means "for this purpose". Each device in a MANET is free
to move independently in any direction, and will therefore change its links to other devices frequently. Each
must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building
a MANET is equipping each device to continuously maintain the information required to properly route
traffic. QOS is defined as a set of service requirements to be met by the network while transporting a
packet stream from source to destination. Intrinsic to the notion of QOS is an agreement or a guarantee by
the network to provide a set of measurable pre-specified service attributes to the user in terms of delay,
jitter, available bandwidth, packet loss, and so on. The analysis is mainly between proactive or table-driven
protocols like OLSR (Optimized Link State Routing) viz DSDV (Destination Sequenced Distance Vector) &
CGSR (Cluster Head Gateway Switch Routing) and reactive or source initiated routing protocols viz
AODV (Ad hoc on Demand distance Vector) & DSR (Dynamic Source Routing). The QoS analysis of the
above said protocols is simulated on NS2 and results are shown thereby.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
JMeter webinar - integration with InfluxDB and Grafana
Ad hoc
1.
2. CONTENTS
Introduction
What are MANETs?
MANET protocols
Reactive vs. Proactive Ad Hoc routing protocols
Reactive Routing Protocol
Proactive Routing Protocol
Comparision simulation
Conclusion
References
3. An autonomous system of mobile routers connected by wireless
links.
The routers are free to move randomly and organize
themselves arbitrarily.
A MANET is a wireless mobile network that is self-forming, self
maintained, and self-healing.
Nodes stay connected even as the network topology changes.
Each node needs to act as a router to relay packets to nodes
out of direct communication range.
Introduction
4. Mobile Ad-Hoc Networks
A Collections of mobile nodes
dynamically forming a
temporary network.
Nodes are arbitrarely located.
Each node in a network
acts as a router.
Goal: Correct
and efficient route
establishment to facilitate
communication.
5. Characteristic
s Dynamic topology.
Variable capacity links.
Energy-constrained mobile nodes.
Weakened physical security.
Why traditional protocols are not suitable for
MANETs?
No pre-existing infrastructure.
Variable capacity links.
Dynamic topologies.
Limited physical security.
6. MANETs Use
For military and rescue use.
Internet / intranet hot spots in public transportation.
Information distribution for meetings, seminars etc.
New mobile devices are invented constantly and used
various ways.
8. DSR
Designed for multihop wireless
ad-hoc networks.
Two major phases:
Route discovery :
used to discover new source
routes across multiple
network hops destinations
in an ad-hoc network
9. Route Maintainance:
When a node receives a Route-Request, it first searches its route
cache for the target node.
If route is found, the node can send a Route-Reply to the initiator.
Preventing Route-Reply storms:
To avoid storms, the DSR uses a random delay before a node
can send a Route-Reply.
d = H * (h – 1 + r)
• H, small const. Delay
• h, number of hops is source route
• r, 0 or 1
10. AODV
An embedded MANET protocol
works dynamically to establish and maintain routes
AODV algorithm enables dynamic, self-starting, multihop routing
between participating mobile nodes
AODV allows mobile nodes
obtain routes quickly for new destinations.
respond to link breakages
changes in network topology in a timely manner.
11. Messages for route discovery
Message types defined by AODV are
RREQs
RREPs
RERRs
12. Route Creation:
When a source node does not have a route for a required destination.
AODV initiates a route request/route reply cycle by broadcasting a
route request (RREQ) packet across the wireless network.
Route Deletion:
A route will remain active as long as data continues to travel across
the route
If a route becomes inactive for a period of time, the route will be
deleted.
Sequence Numbers:
To avoid routing loops and to measure the “freshness” of route
information
13. DSDV
Developed at the IBM, in 1996.
Uses the modified Bellman-Ford algorithm.
This is a Proactive Routing protocol, where the route is always
available.
Operation:
Mobile nodes maintain routes to all possible destinations.
Hop counts are used as routing metrics.
The node assigns sequence numbers to distance vector updates.
which updates contain information about the neighbors.
14. TBRPF
Provides hop-by-hop routing
along shortest paths to each
destination.
Using a modification of
Dijkstra's algorithm,each
node computes a source
tree.
Two main modules:
neighbor discovery module
routing module.
15. Neighbor Discovery:
TND protocol allows each node i to quickly detect the neighbor nodes
j such that ij and ji exists.
Nodes with multiple interfaces run TND separately on each interface
Routing Module:
Each node reports only part of its source tree to neighbors.
Each node reports RT to neighbors in periodic topology updates
and reports changes to RT in more frequent differential updates
Periodic updates inform new neighbors of RT
Differential updates ensure the fast propagation of each topology
update to all nodes that are affected by the update.
16. Comparison Simulations
Features of protocols:
AODV DSR TBRPF
Loop-freedom Yes Yes No
Multiple routes No Yes Possible
Unidirectional link
support
Possible Yes No
Multicast Possible No No
Periodic Broadcast Possible No Yes
Maximum No. of nodes <100 200 <200
Expiration of routing info. Yes No Yes
Category Reactive Reactive Proactive
17. Summarizing the results
a) Low mobility, low traffic
AODV
DSR TBRPF
Packet
delivery ratio
High High High
End to end
delay
Middle Middle Middle
Routing
overhead
Low Low Middle
Path
optimality
Middle Middle Very
good
b) High mobility, High traffic
AODV
DSR TBRPF
Packet
delivery ratio
Middle Middle High
End to end
delay
Middle Middle Middle
Routing
overhead
Very
High
Middle Middle
Path
optimality
Middle Low Good
18. Problems of the particular
protocols AODV
uses more, but smaller routing control packets
worse for a higher load.
DSR has some problems concerning the cache usage:
multiple routing
the source-routing principle
TBRPF
packet loss, waste of bandwidth and causes other
problems.
19. Conclusion
protocol max throughput
DSDV small sized
DSR medium sized
AODV large sized
fundamental questions to answer
Scalability?
Energy efficiency?
Security?
Combination of physical, data-link and network layer?