AODV - Ad hoc On-Demand Distance Vector Routing Protocols Darwin Nesakumar
Brief of AODV - Ad hoc On-Demand Distance Vector Routing Protocols with examples by Mr.Darwin Nesakumar, Assistant Professor, ECE/R.M.K.Engineering college
AODV - Ad hoc On-Demand Distance Vector Routing Protocols Darwin Nesakumar
Brief of AODV - Ad hoc On-Demand Distance Vector Routing Protocols with examples by Mr.Darwin Nesakumar, Assistant Professor, ECE/R.M.K.Engineering college
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
A mobile adhoc network is a collection of wireless mobile nodes that communicate with one another without any fixed networking infrastructure. Since the nodes in this network are mobile, the power management and energy conservation become very critical in mobile adhoc network. The nodes in this network have limited battery power and limited computational power with a small amount of memory. Such nodes must conserve energy during routing to prolong their usefulness and increase network lifetime. This research paper proposes a scheme that takes into consideration the power awareness during route selection. This scheme observes power status of each and every node in the topology and further ensures the fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the AODV protocol and the performance has been studied through simulation over NS-2.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Manet - The Art of Networking without a NetworkTarun Varshney
Mobile ad hoc network (MANET), or simply ad hoc network, comprises nodes that freely and dynamically self-organize into arbitrary and temporary network topology without any infrastructure support.
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks
Difference between analog and digital signals, Logic ICs, half and full adder/subtractor, multiplexers, demultiplexers, flip-flops, shift registers, counters.
Concept (Block diagram), properties, positive and negative feedback, loop gain, open loop gain, feedback factors; topologies of feedback amplifier; effect of feedback on gain, output impedance, input impedance, sensitivities (qualitative), bandwidth stability; effect of positive feedback: instability and oscillation, condition of oscillation, Barkhausen criteria. Introduction to integrated circuits, operational amplified and its terminal properties; Application of operational amplifier; inverting and non-inverting mode of operation, Adders, Subtractors, Constant-gain multiplier, Voltage follower, Comparator, Integrator, Differentiator
Concept of Field Effect Transistors (channel width modulation), Gate isolation types, JFET Structure and characteristics, MOSFET Structure and characteristics, depletion and enhancement type; CS, CG, CD configurations; CMOS: Basic Principles
Formation of PNP / NPN junctions, energy band diagram; transistor mechanism and principle of transistors, CE, CB, CC configuration, transistor characteristics: cut-off active and saturation mode, transistor action, injection efficiency, base transport factor and current amplification factors for CB and CE modes. Biasing and Bias stability: calculation of stability factor
Semiconductors: Crystalline material: Mechanical properties, Energy band theory, Fermi levels; Conductors, Semiconductors & Insulators: electrical properties, band diagrams. Semiconductors: intrinsic & extrinsic, energy band diagram, P&N-type semiconductors, drift & diffusion carriers.
Diodes and Diode Circuits: Formation of P-N junction, energy band diagram, built-in-potential, forward and reverse biased P-N junction, formation of depletion zone, V-I characteristics, Zener breakdown, Avalanche breakdown and its reverse characteristics; Junction capacitance and Varactor diode. Simple diode circuits, load line, linear piecewise model; Rectifier circuits: half wave, full wave, PIV, DC voltage and current, ripple factor, efficiency, idea of regulation.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
1. DSDV : Destination-Sequenced Distance
Vector Protocol
By
Mr. Darwin Nesakumar A, M.E., (P.hD)
Assistant Professor
Department of ECE
R. M. K. Engineering College
“I measure the progress of a community by the degree of progress which women have achieved”.-
Dr.B.R.Ambedkar, P.hD
Welcome
3. Review of previous session
Let’s play a Game
Open a new tab in google chrome
Type Joinmyquiz.comin the search bar
Enter the Game Code : 957012
Enter Your Name along with Register and start the Game
“Winner Certificate” will be provided for the TOP 5 students later
Thursday, July 30, 2020 DSDV Protocol
4. IMPORTANT POINTS TO BE REMEMBER
MANETs
• Multi Hop Relaying Network
• No fixed infrastructure
• No Pre existing Infrastructure
• Dynamic network topology
• Nodes in the network are mobile in general
• No central Controller ( To serve as server)
• The wireless hosts in MANET communicate
with each other without existing of fixed
infrastructure and without central controller
• Decentralized Network
• Cooperative Communications
• Heterogeneous in nature
• Device to Device Communication
• A MANET can be connected to other fixed
network or to the internet
• Limited bandwidth and power
• No peer – peer communication
• Multipath Propagation
• Proactive / Reactive Protocols
• CSMA/CA Protocol to avoid hidden
terminal problem
Thursday, July 30, 2020 DSDV Protocol
5. IMPORTANT POINTS TO BE REMEMBER
Issues in MANETs
• Computation, storage, and communications
capabilities and interoperability
• Identification of neighbouring devices and
their corresponding attributes
(Characteristics).
• Battery capacity
• Limitations imposed by Mobility
• Dynamically changing topologies/routes
• Lack of mobility awareness by
system/applications
• Limitations of the Mobile Computer
• Short battery lifetime
• Packet loss due to transmission errors
• Mobility-induced route changes
• Mobility-induced packet losses
• Variable capacity links
• Frequent disconnections/partitions
• Limited communication bandwidth
• Broadcast nature of the communications
• Hidden terminal problem
• Limited wireless transmission range
• Ease of snooping on wireless transmissions
(security hazard)
• Quality of Service
Thursday, July 30, 2020 DSDV Protocol
6. IMPORTANT POINTS TO BE REMEMBER
Applications of MANETs
Tactical Network - Military Communications, Telecommunication Network
Sensor Networks - Environmental / Earth Sensing -Air Pollution Monitoring, Forest Fire detection,
Water Quality Monitoring, Natural Disaster Monitoring, Industrial Monitoring - Machine health
monitoring, Data Logging, Health care monitoring - Implanted devices, Wearable devices,
Environment-embedded systems, Waste water monitoring, Area Monitoring
Emergency Services - Search and rescue -Crowd control, Commando operations, Disaster recovery
Sensors used to sense the natural disasters, Replacement of a fixed infrastructure in case of
earthquakes, hurricanes, fire, Emergency operations -108 Ambulance, Using Google Maps, KAVALAN
App, Policing and fire fighting
Location Based Services - Automatic call forwarding, Google Maps – SWIGY, OLA, UBER, OYO,
AMAZON, FLIPCART & all online based service applications, WhatsApp, Face Book, We Chat, Arokya
Setu APP – COVID 19
Thursday, July 30, 2020 DSDV Protocol
7. IMPORTANT POINTS TO BE REMEMBER
Applications of MANETs
Home and enterprise Networking- Home/office wireless networking(WLAN), e.g., shared
whiteboard, application, Use PDA (Personal Digital Assistant) to print anywhere – Bus, Super Market,
Personal area network (PAN) ,Cell phone, laptop, ear phone, SMART wrist watch, Mobile Hotspot
Educational Applications - Set up virtual classrooms or conference rooms, Google MEET, Zoom
Communications, Microsoft Meeting, My Meeting, Set up ad hoc communication during
conferences, meetings, or lectures
Commercial applications- E-commerce - Electronic payments from anywhere(Ex. In taxi) – Google
PAY, Phone Pay, PayTM, Business, Dynamic access to customer files stored in a central location.
Mobile – AADHAAR, Vehicular services -Transmission of news ,road conditions ,weather, Local ad hoc
network with nearby vehicles for road/accident guidance, Civilian environments - Taxi cab network,
Meeting rooms, Sports stadiums, Boats, small aircraft
Entertainment - Multiuser games – PUBG, Robotic pets, Outdoor internet access, Online Games -
Cricket – Tennis – Foot Ball, Online FUN Quizzes – Multiple Participants, Online Movies – NETFLIX,
AMAZON PRIME etc.
Thursday, July 30, 2020 DSDV Protocol
8. Classification of routing protocols
1. Routing information update mechanism - Proactive, Reactive, Hybrid
2. Usage of temporal information (e.g. cached routes): - Past temporal , Future temporal
3. Usage of topology information - Flat, Hierarchical
4. Usage of specific resources - Power-aware routing, Geographical information assisted routing
Thursday, July 30, 2020 DSDV Protocol
10. ROUTING PROTOCOLS
Proactive
Table-Driven Routing Protocol
• Continuously evaluate the routes
• Attempt to maintain consistent, up-to-
date routing information
• When a route is needed, one may be
ready immediately
• When the network topology changes,
the protocol responds by propagating
updates throughout the network to
maintain a consistent view
• Each node maintains a routing table which
stores - next hop, cost metric towards each
destination, a sequence number that is
created by the destination itself
• Each node periodically forwards routing
table to neighbors
• Each node increments and appends its
sequence number when sending its
local routing table
• Each route is tagged with a sequence
number; routes with greater sequence
numbers are preferred
• Each node advertises a monotonically
increasing even sequence number for itself
• When a node decides that a route is broken,
it increments the sequence number of the
route and advertises it with infinite metric
• Destination advertises new sequence
number .
• Example DSDV (Destination Sequenced
Distance Vector)
Thursday, July 30, 2020 DSDV Protocol
11. ROUTING PROTOCOLS
Proactive
Table-Driven Routing Protocol
• Maintain routes between every host pair at
all times
• Based on periodic updates; High routing
overhead
• Traditional distributed shortest-path
protocols
• Determine routes independent of traffic
pattern
• Traditional link-state and distance-vector
routing protocols are proactive
• Route from each node to every other node
in the network
• Periodic route-update packets
• Large routing tables
• Routes are ready to use instantaneously
Thursday, July 30, 2020 DSDV Protocol
12. Reactive
On-Demand Routing Protocol
• On-demand style: create routes only
when it is desired by the source node
• The route is discovered only when it is
required/needed
• Process of route discovery occurs by
flooding the route request packets
throughout the mobile network.
Route Maintenance:
This phase performs the maintenance
work of the route as the topology in
the mobile ad-hoc network is dynamic
in nature
Route Discovery:
This phase determines the most
optimal path for the transmission of
data packets between the source and
the destination mobile nodes
Route discovery invokes a route-
determination procedure
• The procedure is terminated when
• A route has been found
• No route is found after all
route permutations are
examined
• Longer delay: sometimes a route may
not be ready for use immediately when
data packets come
• Example AODV (Ad hoc On-Demand
Distance Vector)
ROUTING PROTOCOLS
Thursday, July 30, 2020 DSDV Protocol
13. • Flood is propagated outwards from the
source
• Pure flooding = every node transmits the
request only once
• Source floods the network with a Route
Request packet when a route is not
available to the required destination
• Destination send the Route reply to Route
Request
• Reply uses reversed path of Route Request
• Sets up the forward path
On-Demand Routing Protocol
• Determine route if and when needed
• Source initiates route discovery
• Maintain routes only if needed
• Example: DSR (dynamic source routing)
• Routes from Source to Destination only
• Routes constructed when needed, higher
connection setup delay
• Route update when necessary
• Small or No routing tables
Reactive
ROUTING PROTOCOLS
Thursday, July 30, 2020 DSDV Protocol
16. Introduction
The property of ad-hoc networks
Topology may be quite dynamic
No administrative host
Hosts with finite power
17. Introduction
The properties of the ad-hoc network routing protocol
Simple
Less storage space
Loop free
Short control message (Low overhead)
Less power consumption
Multiple disjoint routes
Fast rerouting mechanism
18. Introduction
Routing Protocol:
Table-driven (proactive)
Source-initiated on-demand (reactive)
Hybrid
Routing Algorithm
Link-State algorithm:
Each node maintains a view of the network topology
Distance-Vector algorithm:
Every node maintains the distance of each destination
19. Question
In link state algorithm each node maintains
Network topology
Distance of each destination
Thursday, July 30, 2020 DSDV Protocol
20. Answer for the Question
Network topology
Thursday, July 30, 2020 DSDV Protocol
21. Link-State
Like the shortest-path computation method
Each node maintains a view of the network topology
with a cost for each link
Periodically broadcast link costs to its outgoing links to
all other nodes such as flooding
23. Question
In link state algorithm _________broadcast link costs to its outgoing
links to all other nodes such as flooding
Periodically
Never
Only Once
Thursday, July 30, 2020 DSDV Protocol
24. Answer for the Question
Periodically
Thursday, July 30, 2020 DSDV Protocol
25. Distance-Vector
known also as Distributed Bellman-Ford or RIP (Routing
Information Protocol)
Every node maintains a routing table
all available destinations
the next node to reach to destination
the number of hops to reach the destination
Periodically send table to all neighbors to maintain
topology
26. Question
In distance Vector periodically send table to __________
neighbors to maintain topology
All
Close
Few
Thursday, July 30, 2020 DSDV Protocol
27. Answer for the Question
All
Thursday, July 30, 2020 DSDV Protocol
28. Distance Vector (Tables)
C
Dest. Next Metric …
A A 1
B B 0
C C 2
Dest. Next Metric …
A A 0
B B 1
C B 3
1 2
Dest. Next Metric …
A B 3
B B 2
C C 0
BA
29. (A, 1)
(B, 0)
(C, 1)
(A, 1)
(B, 0)
(C, 1)
Distance Vector (Update)
C
Dest. Next Metric …
A A 1
B B 0
C C 1
Dest. Next Metric …
A A 0
B B 1
C B 3 2
1 1
Dest. Next Metric …
A B 3 2
B B 1
C C 0
BA
B broadcasts the new routing
information to his neighbors
Routing table
is updated
30. (D, 0)
(A, 2)
(B, 1)
(C, 0)
(D, 1)
(A, 1)
(B, 0)
(C, 1)
(D, 2)
Distance Vector (New Node)
C
1 1
BA D
1
broadcasts to update
tables of C, B, A with
new entry for D
Dest. Next Metric …
A B 2
B B 1
C C 0
D D 1
Dest. Next Metric …
A A 1
B B 0
C C 1
D C 2
Dest. Next Metric …
A A 0
B B 1
C B 2
D B 3
31. Distance Vector (Broken Link)
C
1 1
BA D
1
Dest.c Next Metric …
… … …
D C 2
Dest. Next Metric …
… … …
D B 3
Dest. Next Metric …
… … …
D B 1
Dest. Next Metric …
… … …
D D
32. (D, 2)(D, 2)
Distance Vector (Loops)
C
1 1
BA D
1
Dest. Next Metric …
… … …
D B 3
Dest. Next Metric …
… … …
D C 2
Dest. Next Metric …
… … …
D B 3
43. Answer for the Question
TRUE
Thursday, July 30, 2020 DSDV Protocol
44. DSDV Protocol
DSDV is Proactive (Table Driven)
Each node maintains routing information for all known
destinations
Routing information must be updated periodically
Traffic overhead even if there is no change in network topology
Maintains routes which are never used
45. DSDV Protocol
Keep the simplicity of Distance Vector
Guarantee Loop Freeness
New Table Entry for Destination Sequence Number
Allow fast reaction to topology changes
Make immediate route advertisement on significant
changes in routing table
but wait with advertising of unstable routes
(damping fluctuations)
46. DSDV (Table Entries)
Sequence number originated from destination. Ensures
loop freeness.
Install Time when entry was made (used to delete stale
entries from table)
Stable Data Pointer to a table holding information on
how stable a route is. Used to damp fluctuations in
network.
Destination Next Metric Seq. Nr Install Time Stable Data
A A 0 A-550 001000 Ptr_A
B B 1 B-102 001200 Ptr_B
C B 3 C-588 001200 Ptr_C
D B 4 D-312 001200 Ptr_D
47. Question
What is the use of Install Time
To ensure loop freeness
To delete stale entries from the table
Thursday, July 30, 2020 DSDV Protocol
48. Answer for the Question
To delete stale entries from the table
Thursday, July 30, 2020 DSDV Protocol
49. DSDV (Route Advertisements)
Advertise to each neighbor own routing information
Destination Address
Metric = Number of Hops to Destination
Destination Sequence Number
Rules to set sequence number information
On each advertisement increase own destination sequence
number (use only even numbers)
If a node is no more reachable (timeout) increase
sequence number of this node by 1 (odd sequence
number) and set metric =
50. Question
What is Metric?
No of hops to source
No of hops to intermediate nodes
No of hops to destination
Thursday, July 30, 2020 DSDV Protocol
51. Answer for the Question
No of hops to destination
Thursday, July 30, 2020 DSDV Protocol
52. DSDV (Route Selection)
Update information is compared to own routing
table
1. Select route with higher destination sequence
number (This ensure to use always newest information
from destination)
2. Select the route with better metric when sequence
numbers are equal.
53. DSDV (Tables)
C
Dest. Next Metric Seq
A A 1 A-550
B B 0 B-100
C C 2 C-588
Dest. Next Metric Seq
A A 0 A-550
B B 1 B-100
C B 3 C-588
Dest. Next Metric Seq.
A B 3 A-550
B B 2 B-100
C C 0 C-588
BA 1 2
54. (A, 1, A-500)
(B, 0, B-102)
(C, 1, C-588)
(A, 1, A-500)
(B, 0, B-102)
(C, 1, C-588)
DSDV (Route Advertisement)
CBA
B increases Seq.Nr from 100 -> 102
B broadcasts routing information
to Neighbors A, C including
destination sequence numbers
Dest. Next Metric Seq
A A 0 A-550
B B 1 B-102
C B 2 C-588
Dest. Next Metric Seq
A A 1 A-550
B B 0 B-102
C C 1 C-588
Dest. Next Metric Seq.
A B 2 A-550
B B 1 B-102
C C 0 C-588
1 1
55. DSDV (Respond to Topology Changes)
Immediate advertisements
Information on new Routes, broken Links, metric
change is immediately propagated to neighbors.
Full/Incremental Update:
Full Update: Send all routing information from own
table.
Incremental Update: Send only entries that has
changed. (Make it fit into one single packet)
56. (D, 0, D-000)
DSDV (New Node)
CBA D
Dest. Next Metric Seq.
A A 0 A-550
B B 1 B-104
C B 2 C-590
Dest. Next Metric Seq.
A A 1 A-550
B B 0 B-104
C C 1 C-590
Dest. Next Metric Seq.
A B 2 A-550
B B 1 B-104
C C 0 C-590
D D 1 D-000
1. D broadcast for first time
Send Sequence number D-000
2. Insert entry for D with
sequence number D-000
Then immediately broadcast own
table
57. (A, 2, A-550)
(B, 1, B-102)
(C, 0, C-592)
(D, 1, D-000)
(A, 2, A-550)
(B, 1, B-102)
(C, 0, C-592)
(D, 1, D-000)
DSDV (New Node cont.)
CBA D
Dest. Next Metric Seq.
A A 1 A-550
B B 0 B-102
C C 1 C-592
D C 2 D-000
Dest. Next Metric Seq.
A A 0 A-550
B B 1 B-104
C B 2 C-590
Dest. Next Metric Seq.
A B 2 A-550
B B 1 B-102
C C 0 C-592
D D 1 D-000
………
………
3. C increases its sequence
number to C-592 then
broadcasts its new table.4. B gets this new information
and updates its table…….
58. (D, 2, D-100)(D, 2, D-100)
DSDV (no loops, no count to infinity)
CBA D
Dest.c Next Metric Seq.
… … …
D C 2 D-100
Dest. Next Metric Seq.
… … …
D B 3 D-100
Dest. Next Metric Seq.
… … …
D D D-101
1. Node C detects broken Link:
-> Increase Seq. Nr. by 1
(only case where not the destination
sets the sequence number -> odd
number)
2. B does its broadcast
-> no affect on C (C knows that B
has stale information because C has
higher seq. number for destination D)
-> no loop -> no count to infinity
59. (D, , D-101)(D, , D-101)
DSDV (Immediate Advertisement)
CBA D
Dest.c Next Metric Seq.
… … …
D C 3 D-100
Dest. Next Metric Seq.
… … …
D B 4 D-100
Dest. Next Metric Seq.
… … …
D B 1 D-100
Dest. Next Metric Seq.
… … …
D D 1 D-100
D D D-101
1. Node C detects broken Link:
-> Increase Seq. Nr. by 1
(only case where not the destination
sets the sequence number -> odd
number)
3. Immediate propagation
B to A:
(update information has higher
Seq. Nr. -> replace table entry)
2. Immediate propagation
C to B:
(update information has higher
Seq. Nr. -> replace table entry)
Dest.c Next Metric Seq.
… … … ...
D C 2 D-100
D C D-101
Dest. Next Metric Seq.
… … … ...
D B 3 D-100
D B D-101
60. DSDV (Problem of Fluctuations)
What are Fluctuations
Entry for D in A: [D, Q, 14, D-100]
D makes Broadcast with Seq. Nr. D-102
A receives from Q Update (D, 14, D-102)
-> Entry for D in A: [D, Q, 14, D-102]
A must propagate this route immediately.
A receives from P Update (D, 15, D-102)
-> Entry for D in A: [D, P, 15, D-102]
A must propagate this route immediately.
This can happen every time D or any other node does its
broadcast and lead to unnecessary route advertisements
in the network, so called fluctuations.
A
D
QP
10 Hops11 Hops
(D,0,D-102)
61. DSDV (Damping Fluctuations)
A
D
QP
10 Hops11 Hops
How to damp fluctuations
Record last and avg. Settling Time of every Route in
a separate table. (Stable Data)
Settling Time = Time between arrival of first route
and the best route with a given seq. nr.
A still must update his routing table on the first
arrival of a route with a newer seq. nr., but he can
wait to advertising it. Time to wait is proposed to be
2*(avg. Settling Time).
Like this fluctuations in larger networks can be
damped to avoid unececarry adverdisment, thus
saving bandwith.
62. Summary
Advantages
Simple (almost like Distance Vector)
Loop free through destination seq. numbers
No latency caused by route discovery
Disadvantages
No sleeping nodes
Overhead: most routing information never used