SlideShare a Scribd company logo
Advance Computer Networks: 
Default Routing And On demand Routing
Overview: 
What is routing? 
What is default routing? 
Examples of default routing 
What is On demand routing? 
Examples of On Demand routing 
Conclusion 
Bibliography
Introduction: 
 Process of selecting best paths in a 
network. 
 Routing is performed for many kinds 
of networks, including the 
telephone network (circuit switching 
), electronic data networks (such as 
the Internet), and 
transportation networks. 
 The routing process usually directs 
forwarding on the basis of 
routing tables which maintain a 
record of the routes to various 
network destinations.
What is default routing? 
Is configured for unknown destinations. 
Generally used on internet as destinations are unknown. 
• Example: ID on gmail or yahoo, etc 
Configured at end points. 
It is last preferred routing.
 If there is no static route or learned route, the Network 
Layer checks for a default route.
The Role of the Default Route 
►Maintaining a list of all possible destinations 
►Maintains memory required to store thousands of IP addresses, 
each four octets long. 
►Detailed information about networks within the corporate 
network, so it can forward inbound packets correctly and only 
single router is represented over internet.
Default router in IP 
In IP, the default route is also known as the default gateway or 
the gateway of last resort. 
The default route is represented using a special IP address (0.0.0.0) 
and subnet mask (0.0.0.0). 
In IP, routers and end stations use a simple rule when selecting a 
route from the routing table: the best match wins. 
Eg: 192.14.17.0, 192.14.0.0, 192.0.0.0, and 0.0.0.0, and packet 
arrived destined for 192.14.17.23, the route associated with 
192.14.17.0 would be used.
Implementing the default routing. 
IP routing table, the default route can be placed there statically, or 
learned dynamically. 
Typically entered statically by a network administrator in a router 
that connects by a single path to the broader internetwork.
Example Implementing the default routing.
Introduction On Demand Routing Protocol 
A protocol used to discover other Cisco devices on either broadcast 
or non-broadcast media. 
With the help of CDP, it is possible to find the device type, the IP 
address, the Cisco IOS® version running on the neighbour Cisco 
device, the capabilities of the neighbour device, and so on. 
ODR is able to carry Variable Length Subnet Mask (VLSM) 
information.
What is On Demand Routing Protocol? 
The routes are created when required 
The source has to discover a route to the destination. 
The source and intermediate nodes have to maintain a route as long 
as it is used. 
Routes have to be repaired in case of topology changes.
On-Demand Routing Protocols 
1. Ad hoc On-demand Distance Vector Routing 
2. Dynamic Source Routing Protocol 
3. Temporally Ordered Routing Algorithm 
4. Associativity Based Routing
1.Ad Hoc On-demand Distance Vector 
Routing 
Includes route discovery and route maintenance. 
Minimizes the number of broadcasts by creating routes on-demand 
Uses only symmetric links because the route reply packet follows 
the reverse path of route request packet. 
Uses hello messages to know its neighbors and to ensure symmetic 
links.
Example. 
source 
RREQ 
The node discards the packets having been seen 
destination 
The source broadcasts a route packet 
The neighbors in turn broadcast the 
packet till it reaches the destination 
RREP 
Reply packet follows the reverse path of route 
request packet recorded in broadcast packetaa
Route Maintenance 
If the source node moves, it reinitiates the route 
discovery. 
If intermediate node moves, its upstream node sends a 
RREP to the source. The source restarts the route 
discovery.
2.Dynamic Source Routing Protocol 
A node maintains route caches containing the routes it 
knows. 
Include route discovery and route maintenance.
Route discovery 
The source sends a broadcast packet which contains 
source address, destination address, request id and path. 
If a host saw the packet before, discards it. 
Otherwise, the route looks up its route caches to look 
for a route to destination, If not find, appends its address 
into the packet, rebroadcast, 
 If finds a route in its route cache, sends a route reply 
packet, which is sent to the source by route cache or the 
route discovery.
 
source broadcasts a packet containing address of source and destination 
The destination sends a reply packet to source. 
destination 
source 
1 
The node discards the packets having been seen 
6 
5 
4 
3 
2 
8 
7 
(1,4) 
(1,2) 
(1,3) 
(1,3,5) (1,3,5,6) 
(1,4,7) 
The route looks up its route caches to look for a route to destination 
If not find, appends its address into the packet
How to send a reply packet 
 If the destination has a route to the source in its 
route cache, use it 
Else if symmetric links are supported, use the 
reverse of route record 
Else if symmetric links are not supported, the 
destination initiates route discovery to source
Route maintenance 
 Whenever a node transmits a data packet, a 
route reply, or a route error, it must verify that 
the next hop correctly receives the packet. 
If not, the node must send a route error to the 
node responsible for generating this route header 
The source restart the route discovery
Add entries into route cache 
 The Source and destination in route discovery 
Intermediate hosts in route discovery 
The hosts receiving any broadcast
3.Temporally Order Routing 
Algorithm 
 Creating Routes: query/reply 
• QRY packet is flooded through network 
• UPD packet propagates back if route exist 
Maintaining Routes: link-reversal 
• UPD packets re-orient the route structure 
Erasing Routes 
• CLR packet is flood through network to erase invalid routes
The source broadcasts a QRY packet with height(D)=0, all others NULL 
(0,0,0,3,a) (0,0,0,2,d) 
a 
QRY 
Only the non-NULL node (destination) responds with a UPD packet. 
f 
e 
d 
c 
QRY QRY 
b 
h 
UPD 
g 
(-,-,-,-,d) 
(-,-,-,-,b) 
(-,-,-,-,c) 
(-,,-,-,-e) (-,-,-,-,f) 
(0,0,0,0,h) 
(-,-,-,-,a) 
(0,0,0,4,b) 
(0,0,0,4,c) 
(0,0,0,3,e) (0,0,0,2,f) 
source 
Dest. 
((0-,,0-,,-0,,-1,g,g)) 
A node receiving a UPD sets its height to one more than UPD 
Source receives a UPD with less height
TORA: Height metric 
 Each node contains a quintuple 
• Logical time of a link failure 
• Unique ID of the node that defined the new 
reference level 
• Reflection indicator bit 
• A propagation ordering parameter, height 
• Unique ID of the node
Route Maintenance and Erasing 
 No reaction necessary if all nodes still have downstream links. 
A new reference level is defined if a node loses its last downstream 
link. 
Synchronized clock is important, accomplished via GPS or 
algorithm such as Network Time Protocol. 
CLR packet to be flooded to clear the invalid packet.
a 
f 
e 
d 
c 
b 
h 
g 
(0,0,0,0,h) 
(0,0,0,4,b) 
(0,0,0,4,c) 
(0,0,0,3,e) 
(0,0,0,2,f) 
(0,0,0,3,a) (0,0,0,2,d) 
Dest. 
(0,0,0,1,g) 
Link failure with no reaction
Re-establishing route after link failure 
A new reference level is defined 
f 
e 
d 
(1,d,0,-2,s) ((10,,d0,,00,,-31,a,a)) 
c 
b 
h 
g 
(0,0,0,0,h) 
(0,0,0,4,b) 
(0,0,0,4,c) 
(0,0,0,3,e) 
(0,0,0,2,f) 
(0,0,0,2,d) 
0,0,0,4,s) 
Dest. 
(0,0,0,1,g) 
(1,d,0,0,d) 
UDP 
s a 
UDP
4.Associativity Based Routing 
 Each route keeps a associativity table 
A high value of associativity tick indicates a low 
state of node mobility 
A route is selected based on associativity states of 
nodes, finds the high value of associativity tick 
(low mobility routes)
Associativity table 
 All nodes generate periodic beacons 
When a neighbor node receives a beacon, it increases 
its associativity tick with respect to the sending node 
in associativity table 
Associativity ticks are reset when the neighbors of a 
node or the node itself move out of proximity
Route Discovery 
 The source broadcast a QRY message 
Each intermediate node appends its address and 
associativity ticks to QRY, 
The destination can examine the associativity ticks to 
select route. If the multiple paths have the same 
overall degree of stability, select the minimum 
number of hops
Route Erasing 
 If the the route is no longer desired, the source may 
not be aware of any route node changes because 
partial reconstruction. 
The source node initiates a route delete (RD) 
broadcast to erase the invalid route.
Conclusion 
Default Routing: 
 Is configured for unknown destinations. 
Generally used on internet as destinations are unknown. 
Configured at end points. 
It is last preferred routing.
Conclusion Contin…. 
On-Demand Routing: 
In On-Demand Routing the routes are created when required. 
The source and intermediate nodes have to maintain a route as 
long as it is used. 
The source has to discover a route to the destination.
Bibilography 
 http://www.hill2dot0.com/wiki/index.php?title=Default_route 
 http://www.cisco.com/c/en/us/tech/ip/on-demand-routing-odr/ 
index.html 
 http://www.slideshare.net/kishoreeekumarrr/multi-static-routng-default-routing- 
29830267?v=default&b=&from_search=2 
 https://cs.wmich.edu/wsn/cs691_sp03/adhocrouting.ppt 
 http://kiki.ee.ntu.edu.tw/mmnet1/adhoc/
Q & A?

More Related Content

What's hot

Routing protocols
Routing protocolsRouting protocols
Routing protocols
N.Jagadish Kumar
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
Senthil Kanth
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
Ann Joseph
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Dsdv
DsdvDsdv
Dsdv
prakash06
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET Journal
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
DharunMagil
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ashok Panwar
 
Dynamic MPLS with Feedback
Dynamic MPLS with FeedbackDynamic MPLS with Feedback
Dynamic MPLS with Feedback
IJCSEA Journal
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
ijcnac
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
Transweb Global Inc
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
Thesis Scientist Private Limited
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
ijtsrd
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 

What's hot (20)

Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Dsdv
DsdvDsdv
Dsdv
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERP
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok PanwarAd hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
 
Dynamic MPLS with Feedback
Dynamic MPLS with FeedbackDynamic MPLS with Feedback
Dynamic MPLS with Feedback
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 

Viewers also liked

VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Carmelo de Jesús
 
Image processing detect faces( معالجة الصور (كشف الأوجه)
Image processing detect faces( معالجة الصور (كشف الأوجه)Image processing detect faces( معالجة الصور (كشف الأوجه)
Image processing detect faces( معالجة الصور (كشف الأوجه)
nabeelasd
 
أنماط الصور الرقمية
أنماط الصور الرقميةأنماط الصور الرقمية
أنماط الصور الرقميةUniv of Albaha
 
معالجة الصور الرقمية
معالجة الصور الرقميةمعالجة الصور الرقمية
معالجة الصور الرقميةEman Negm
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
Yaser Rahmati
 
المهارات الحاسوبية اللازمة للمدرسين
المهارات الحاسوبية اللازمة للمدرسينالمهارات الحاسوبية اللازمة للمدرسين
المهارات الحاسوبية اللازمة للمدرسين
mariam3lshamsi
 
شبكة الانترنت 1
شبكة الانترنت 1شبكة الانترنت 1
شبكة الانترنت 1
Dr Abdalla Mahmoud
 
Digital Photographs
Digital PhotographsDigital Photographs
Digital Photographs
Nouha BC
 
شبكات و أمن المعلومات 2
شبكات و أمن المعلومات 2شبكات و أمن المعلومات 2
شبكات و أمن المعلومات 2
emad tawfeek
 
أنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزأنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرز
sultan_Alqarni
 
information security
information securityinformation security
information security
Moamen Ayyad
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
Minh Tran
 
أمن المعلومات 4
أمن المعلومات 4أمن المعلومات 4
أمن المعلومات 4
Dr Abdalla Mahmoud
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
Abdelkhalik Mosa
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
ShortestPathFirst
 

Viewers also liked (18)

VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
 
Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2Exploration Lan Switching Chapter2
Exploration Lan Switching Chapter2
 
Image processing detect faces( معالجة الصور (كشف الأوجه)
Image processing detect faces( معالجة الصور (كشف الأوجه)Image processing detect faces( معالجة الصور (كشف الأوجه)
Image processing detect faces( معالجة الصور (كشف الأوجه)
 
أنماط الصور الرقمية
أنماط الصور الرقميةأنماط الصور الرقمية
أنماط الصور الرقمية
 
معالجة الصور الرقمية
معالجة الصور الرقميةمعالجة الصور الرقمية
معالجة الصور الرقمية
 
Chapter 06 - Static Routing
Chapter 06 - Static RoutingChapter 06 - Static Routing
Chapter 06 - Static Routing
 
المهارات الحاسوبية اللازمة للمدرسين
المهارات الحاسوبية اللازمة للمدرسينالمهارات الحاسوبية اللازمة للمدرسين
المهارات الحاسوبية اللازمة للمدرسين
 
شبكة الانترنت 1
شبكة الانترنت 1شبكة الانترنت 1
شبكة الانترنت 1
 
Digital Photographs
Digital PhotographsDigital Photographs
Digital Photographs
 
شبكات و أمن المعلومات 2
شبكات و أمن المعلومات 2شبكات و أمن المعلومات 2
شبكات و أمن المعلومات 2
 
أنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرزأنظمة الحماية من الفايروسات و الهاكرز
أنظمة الحماية من الفايروسات و الهاكرز
 
information security
information securityinformation security
information security
 
Eigenface For Face Recognition
Eigenface For Face RecognitionEigenface For Face Recognition
Eigenface For Face Recognition
 
أمن المعلومات 4
أمن المعلومات 4أمن المعلومات 4
أمن المعلومات 4
 
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and ConfigurationLAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
LAN Switching and Wireless: Ch2 - Basic Switch Concepts and Configuration
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
IP Routing Tutorial
IP Routing TutorialIP Routing Tutorial
IP Routing Tutorial
 

Similar to Default and On demand routing - Advance Computer Networks

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
Muthukrishnan008
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
Jayaprasanna4
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
GirT2
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
Varsha Anandani
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
DEEPAK948083
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
ImXaib
 
Mona
MonaMona
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
ShivamSolanki48
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET Journal
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Mumbai Academisc
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
Sujit833143
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
Sreedhar Chowdam
 

Similar to Default and On demand routing - Advance Computer Networks (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Chapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptxChapter Four - Network Layer.pptx
Chapter Four - Network Layer.pptx
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
Mona
MonaMona
Mona
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
C 16
C 16C 16
C 16
 

More from Sonali Parab

Forensic laboratory setup requirements
Forensic laboratory setup requirementsForensic laboratory setup requirements
Forensic laboratory setup requirements
Sonali Parab
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements
Sonali Parab
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
Sonali Parab
 
Data Mining
Data MiningData Mining
Data Mining
Sonali Parab
 
Firewalls
FirewallsFirewalls
Firewalls
Sonali Parab
 
Embedded System
Embedded System Embedded System
Embedded System
Sonali Parab
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
Sonali Parab
 
Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual
Sonali Parab
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
Sonali Parab
 
Cloud Computing And Virtualization
Cloud Computing And VirtualizationCloud Computing And Virtualization
Cloud Computing And Virtualization
Sonali Parab
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in BluetoothSonali Parab
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
Sonali Parab
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
Sonali Parab
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
Sonali Parab
 
Minning www
Minning wwwMinning www
Minning www
Sonali Parab
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
Sonali Parab
 
Agile testing
Agile testingAgile testing
Agile testing
Sonali Parab
 
Minning WWW
Minning WWWMinning WWW
Minning WWW
Sonali Parab
 
Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)
Sonali Parab
 

More from Sonali Parab (19)

Forensic laboratory setup requirements
Forensic laboratory setup requirementsForensic laboratory setup requirements
Forensic laboratory setup requirements
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Data Mining
Data MiningData Mining
Data Mining
 
Firewalls
FirewallsFirewalls
Firewalls
 
Embedded System
Embedded System Embedded System
Embedded System
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
 
Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual Cloud and Ubiquitous Computing manual
Cloud and Ubiquitous Computing manual
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
 
Cloud Computing And Virtualization
Cloud Computing And VirtualizationCloud Computing And Virtualization
Cloud Computing And Virtualization
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
Public Cloud Provider
Public Cloud ProviderPublic Cloud Provider
Public Cloud Provider
 
Minning www
Minning wwwMinning www
Minning www
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
 
Agile testing
Agile testingAgile testing
Agile testing
 
Minning WWW
Minning WWWMinning WWW
Minning WWW
 
Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)Remote Method Invocation (Java RMI)
Remote Method Invocation (Java RMI)
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 

Default and On demand routing - Advance Computer Networks

  • 1. Advance Computer Networks: Default Routing And On demand Routing
  • 2. Overview: What is routing? What is default routing? Examples of default routing What is On demand routing? Examples of On Demand routing Conclusion Bibliography
  • 3. Introduction:  Process of selecting best paths in a network.  Routing is performed for many kinds of networks, including the telephone network (circuit switching ), electronic data networks (such as the Internet), and transportation networks.  The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations.
  • 4. What is default routing? Is configured for unknown destinations. Generally used on internet as destinations are unknown. • Example: ID on gmail or yahoo, etc Configured at end points. It is last preferred routing.
  • 5.  If there is no static route or learned route, the Network Layer checks for a default route.
  • 6. The Role of the Default Route ►Maintaining a list of all possible destinations ►Maintains memory required to store thousands of IP addresses, each four octets long. ►Detailed information about networks within the corporate network, so it can forward inbound packets correctly and only single router is represented over internet.
  • 7. Default router in IP In IP, the default route is also known as the default gateway or the gateway of last resort. The default route is represented using a special IP address (0.0.0.0) and subnet mask (0.0.0.0). In IP, routers and end stations use a simple rule when selecting a route from the routing table: the best match wins. Eg: 192.14.17.0, 192.14.0.0, 192.0.0.0, and 0.0.0.0, and packet arrived destined for 192.14.17.23, the route associated with 192.14.17.0 would be used.
  • 8. Implementing the default routing. IP routing table, the default route can be placed there statically, or learned dynamically. Typically entered statically by a network administrator in a router that connects by a single path to the broader internetwork.
  • 9. Example Implementing the default routing.
  • 10. Introduction On Demand Routing Protocol A protocol used to discover other Cisco devices on either broadcast or non-broadcast media. With the help of CDP, it is possible to find the device type, the IP address, the Cisco IOS® version running on the neighbour Cisco device, the capabilities of the neighbour device, and so on. ODR is able to carry Variable Length Subnet Mask (VLSM) information.
  • 11. What is On Demand Routing Protocol? The routes are created when required The source has to discover a route to the destination. The source and intermediate nodes have to maintain a route as long as it is used. Routes have to be repaired in case of topology changes.
  • 12. On-Demand Routing Protocols 1. Ad hoc On-demand Distance Vector Routing 2. Dynamic Source Routing Protocol 3. Temporally Ordered Routing Algorithm 4. Associativity Based Routing
  • 13. 1.Ad Hoc On-demand Distance Vector Routing Includes route discovery and route maintenance. Minimizes the number of broadcasts by creating routes on-demand Uses only symmetric links because the route reply packet follows the reverse path of route request packet. Uses hello messages to know its neighbors and to ensure symmetic links.
  • 14. Example. source RREQ The node discards the packets having been seen destination The source broadcasts a route packet The neighbors in turn broadcast the packet till it reaches the destination RREP Reply packet follows the reverse path of route request packet recorded in broadcast packetaa
  • 15. Route Maintenance If the source node moves, it reinitiates the route discovery. If intermediate node moves, its upstream node sends a RREP to the source. The source restarts the route discovery.
  • 16. 2.Dynamic Source Routing Protocol A node maintains route caches containing the routes it knows. Include route discovery and route maintenance.
  • 17. Route discovery The source sends a broadcast packet which contains source address, destination address, request id and path. If a host saw the packet before, discards it. Otherwise, the route looks up its route caches to look for a route to destination, If not find, appends its address into the packet, rebroadcast,  If finds a route in its route cache, sends a route reply packet, which is sent to the source by route cache or the route discovery.
  • 18.  source broadcasts a packet containing address of source and destination The destination sends a reply packet to source. destination source 1 The node discards the packets having been seen 6 5 4 3 2 8 7 (1,4) (1,2) (1,3) (1,3,5) (1,3,5,6) (1,4,7) The route looks up its route caches to look for a route to destination If not find, appends its address into the packet
  • 19. How to send a reply packet  If the destination has a route to the source in its route cache, use it Else if symmetric links are supported, use the reverse of route record Else if symmetric links are not supported, the destination initiates route discovery to source
  • 20. Route maintenance  Whenever a node transmits a data packet, a route reply, or a route error, it must verify that the next hop correctly receives the packet. If not, the node must send a route error to the node responsible for generating this route header The source restart the route discovery
  • 21. Add entries into route cache  The Source and destination in route discovery Intermediate hosts in route discovery The hosts receiving any broadcast
  • 22. 3.Temporally Order Routing Algorithm  Creating Routes: query/reply • QRY packet is flooded through network • UPD packet propagates back if route exist Maintaining Routes: link-reversal • UPD packets re-orient the route structure Erasing Routes • CLR packet is flood through network to erase invalid routes
  • 23. The source broadcasts a QRY packet with height(D)=0, all others NULL (0,0,0,3,a) (0,0,0,2,d) a QRY Only the non-NULL node (destination) responds with a UPD packet. f e d c QRY QRY b h UPD g (-,-,-,-,d) (-,-,-,-,b) (-,-,-,-,c) (-,,-,-,-e) (-,-,-,-,f) (0,0,0,0,h) (-,-,-,-,a) (0,0,0,4,b) (0,0,0,4,c) (0,0,0,3,e) (0,0,0,2,f) source Dest. ((0-,,0-,,-0,,-1,g,g)) A node receiving a UPD sets its height to one more than UPD Source receives a UPD with less height
  • 24. TORA: Height metric  Each node contains a quintuple • Logical time of a link failure • Unique ID of the node that defined the new reference level • Reflection indicator bit • A propagation ordering parameter, height • Unique ID of the node
  • 25. Route Maintenance and Erasing  No reaction necessary if all nodes still have downstream links. A new reference level is defined if a node loses its last downstream link. Synchronized clock is important, accomplished via GPS or algorithm such as Network Time Protocol. CLR packet to be flooded to clear the invalid packet.
  • 26. a f e d c b h g (0,0,0,0,h) (0,0,0,4,b) (0,0,0,4,c) (0,0,0,3,e) (0,0,0,2,f) (0,0,0,3,a) (0,0,0,2,d) Dest. (0,0,0,1,g) Link failure with no reaction
  • 27. Re-establishing route after link failure A new reference level is defined f e d (1,d,0,-2,s) ((10,,d0,,00,,-31,a,a)) c b h g (0,0,0,0,h) (0,0,0,4,b) (0,0,0,4,c) (0,0,0,3,e) (0,0,0,2,f) (0,0,0,2,d) 0,0,0,4,s) Dest. (0,0,0,1,g) (1,d,0,0,d) UDP s a UDP
  • 28. 4.Associativity Based Routing  Each route keeps a associativity table A high value of associativity tick indicates a low state of node mobility A route is selected based on associativity states of nodes, finds the high value of associativity tick (low mobility routes)
  • 29. Associativity table  All nodes generate periodic beacons When a neighbor node receives a beacon, it increases its associativity tick with respect to the sending node in associativity table Associativity ticks are reset when the neighbors of a node or the node itself move out of proximity
  • 30. Route Discovery  The source broadcast a QRY message Each intermediate node appends its address and associativity ticks to QRY, The destination can examine the associativity ticks to select route. If the multiple paths have the same overall degree of stability, select the minimum number of hops
  • 31. Route Erasing  If the the route is no longer desired, the source may not be aware of any route node changes because partial reconstruction. The source node initiates a route delete (RD) broadcast to erase the invalid route.
  • 32. Conclusion Default Routing:  Is configured for unknown destinations. Generally used on internet as destinations are unknown. Configured at end points. It is last preferred routing.
  • 33. Conclusion Contin…. On-Demand Routing: In On-Demand Routing the routes are created when required. The source and intermediate nodes have to maintain a route as long as it is used. The source has to discover a route to the destination.
  • 34. Bibilography  http://www.hill2dot0.com/wiki/index.php?title=Default_route  http://www.cisco.com/c/en/us/tech/ip/on-demand-routing-odr/ index.html  http://www.slideshare.net/kishoreeekumarrr/multi-static-routng-default-routing- 29830267?v=default&b=&from_search=2  https://cs.wmich.edu/wsn/cs691_sp03/adhocrouting.ppt  http://kiki.ee.ntu.edu.tw/mmnet1/adhoc/
  • 35.