SlideShare a Scribd company logo
DSR: The Dynamic Source Routing
Protocol for Multi-Hop Wireless Ad Hoc
Networks
                         Presenter
                 Ashraf Uddin
                  Sujit Singh
           South Asian University
      (Master of Computer Applications)
        http://ashrafsau.blogspot.in/


          http://ashrafsau.blogspot.in/
Routing Overview

 Network with nodes, edges
 Goal: Devise scheme for
 transferring message from one
                                              msg
 node to another
   Destination routing
   Source routing




              http://ashrafsau.blogspot.in/
Source (“path”) routing


 Source specifies entire route: places complete path to

  destination in message header: A – D – F – G

 Intermediate nodes just forward to specified next hop:

  D would look at path in header, forward to F

 Like airline travel – get complete set of tickets to final

  destination before departing…


              http://ashrafsau.blogspot.in/
Destination (“hop-by-hop”) routing


 Source specifies only destination in message header: G

 Intermediate nodes look at destination in

 header, consult internal tables to determine appropriate
 next hop

 Like postal service – specify only the final destination on

 an envelope, and intermediate post offices select where
 to forward next…

             http://ashrafsau.blogspot.in/
Ad Hoc Routing
 Every node participates in routing: no distinction
 between “routers” and “end nodes”

 No external network setup: “self-configuring”

 Especially useful when network topology is dynamic
 (frequent network changes – links break, nodes come
 and go)

               http://ashrafsau.blogspot.in/
Common application
 Mobile wireless hosts
    Only subset within range at

     given time

    Want to communicate with

     any other node




                  http://ashrafsau.blogspot.in/
DSR Protocol Activities
 Route discovery

   Undertaken when source needs a route to a destination

 Route maintenance

   Used when link breaks, rendering specified path

    unusable




                http://ashrafsau.blogspot.in/
Route Discovery
• The source sends a broadcast packet which contains
 source address, destination address, request id and
 path.
• If a host saw the packet before, discards it.
• Otherwise, the route looks up its route caches to
 look for a route to destination, If not find, appends its
 address into the packet, rebroadcast,
• If finds a route in its route cache, sends a route reply
 packet, which is sent to the source by route cache or
 the route discovery.

               http://ashrafsau.blogspot.in/
source broadcasts a packet containing address of source and
destination
  source                        (1,4)
       1
                                               4

                 The destination sends a reply packet to source.
                                                                   8
                     (1,3)                                             destination
                     3
                                                               7
                                                       (1,4,7)
             2
                 The node discards the packets having been seen
     (1,2)
                                                     6
                                    5
                                (1,3,5)            (1,3,5,6)

 The route looks up its route caches to look for a route to destination
 If not find, appends its address into the packet
                   http://ashrafsau.blogspot.in/
How to send a reply packet
 If the destination has a route to the source in its route
  cache, use it

 Else if symmetric links are supported, use the reverse
  of route record

 Else if symmetric links are not supported, the
  destination initiates route discovery to source


                  http://ashrafsau.blogspot.in/
Route Maintenance
 Whenever a node transmits a data packet, a route
  reply, or a route error, it must verify that the next
  hop correctly receives the packet.
 If not, the node must send a route error to the
  node responsible for generating this route header
   Intermediate nodes “eavesdrop”, adjust cached routes
 Source deletes route; tries another if one cached, or
  The source restart the route discovery



               http://ashrafsau.blogspot.in/
Route Maintenance……



A             B                   C     D   E


    Route error message: C-D
            is broken




        http://ashrafsau.blogspot.in/
DSR Optimization: Route Caching
 Each node caches a new route it learns by any means
 When node S finds route [S,E,F,J,D] to node D, node S
    also learns route [S,E,F] to node F
   When node K receives Route Request [S,C,G] destined
    for node, node K learns route [K,G,C,S] to node S
   When node F forwards Route Reply RREP
    [S,E,F,J,D], node F learns route [F,J,D] to node D
   When node E forwards Data [S,E,F,J,D] it learns route
    [E,F,J,D] to node D
   A node may also learn a route when it overhears Data
                http://ashrafsau.blogspot.in/
Additional Route Discovery features




  DSR route discovery does not allow nodes like F to
  reply to RREQ

            http://ashrafsau.blogspot.in/
Additional Route Discovery features




      http://ashrafsau.blogspot.in/
Additional Route Discovery features




      http://ashrafsau.blogspot.in/
Additional Route Discovery features

                                               Node C may infer
 Preventing Route Reply                      that the initiator has
                                               already received a          h=2
 storms
                                               Route Reply giving
   Many Route Reply message                                               C
                                                  a better route
    could be send to A from the                because the data
    A’s neighbors                                packet received
   To avoid a possible local                  from B contains a
    congestion, each nodes must                  value of “h” less
    wait a variable period before               than its h’s value
                                                                       A         B     G
    sending the reply.
   Delay period d = H(h - 1 + r)                                                h=1
   Each node network interfaces
    works into “promiscuous”                        E
    receive mode.
                                                  h=3
                  http://ashrafsau.blogspot.in/
Additional Route Discovery features

 Route request Hop limits
   “Nonpropagating” Route Request(hop lim 0)
       To determine if the target is
                                                   2 Hop limit
        neighbour or a neighbour has a route
                                                   1 Hop limit
        to the target cached.
   “Propagating” Route Request( no hop lim)           Non
                                                   Propagating
     If no route reply is recived after a            Route
                                                     Request     The expanding ring search
                                                                 approach can carry to the
      short timeout.                                             average latency increasing

   “Expanding ring”
     Increase hop value stepwise if no
      route reply is recieved.




                   http://ashrafsau.blogspot.in/
Additional Route Maintenance features




         http://ashrafsau.blogspot.in/
Additional Route Maintenance features




          http://ashrafsau.blogspot.in/
Additional Route Maintenance features




        http://ashrafsau.blogspot.in/
Additional Route Maintenance features




        http://ashrafsau.blogspot.in/
Support for Heterogeneous networks & mobile IP

 Heteregenous network :
         Different kind of devices with different interfaces.
         Possibly , multiple interfaces( short range & long range)




                http://ashrafsau.blogspot.in/
DSR evaluation
 Simulation
    To analyse the behavior and performance of DSR.
    To Compare with other routing protocols
 Set Up:
    Ad hoc of 50 mobiles nodes
    15 minutes ( 900 seconds) simulation time.
    CBR data traffic
    20 mobile nodes traffic sources; 4 packets/sec.
    Random waypoint mobility model ( pause time)



                http://ashrafsau.blogspot.in/
Packet Delivery Ratio(with movement speed 1m/s)




           http://ashrafsau.blogspot.in/
Routing Overhead(with movement speed 1m/s)




          http://ashrafsau.blogspot.in/
Packet Delivery Ratio(with movement speed 20m/s)




            http://ashrafsau.blogspot.in/
Routing Overhead(with movement speed 20m/s)




           http://ashrafsau.blogspot.in/
RESULT
 At both movement speeds, DSR delivers almost all
  data packets, regardless of pause time.
 100% delivery ratio at pause time 900 sec, a stationary
  network.
 At 1 m/s delivery ratio> 99.5%
 At 20 m/s delivery ratio> 98%




               http://ashrafsau.blogspot.in/
Advantages
 Routes maintain only between nodes who need to
  communicate. Reduces overhead of routing
  maintenance.
 route caching reduces route discovery overhead.
 A single route may yield many routes to the
  destination.




              http://ashrafsau.blogspot.in/
Disadvantages

 Packet header size grows with route length due to
  source routing.
 Flood route request may potentially reach all nodes in
  the network.
 Route reply storm problem.




               http://ashrafsau.blogspot.in/
Conclusion

 Excellent performance for routing in multi-hop ad hoc.
 Very low routing overhead.
 Able to deliver almost all originated data packets, even
  with rapid motion of all nodes.




                http://ashrafsau.blogspot.in/
THANKS



http://ashrafsau.blogspot.in/
Reference
[1]. David B. Johnson, David A. Maltz, and Josh
 Broch, "DSR: The Dynamic Source Routing Protocol
 for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc
 Networking, edited by Charles
 E. Perkins, Chapter 5, pp. 139-172, Addison-
 Wesley, 2001. Invited paper.


               http://ashrafsau.blogspot.in/
??????
     QUESTION


??????
http://ashrafsau.blogspot.in/

More Related Content

What's hot

Mobile IP
Mobile IPMobile IP
Mobile IP
Mukesh Chinta
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Acad
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
FabMinds
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
chirag bhatt
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
k33a
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
Siddique Ibrahim
 
Transport layer
Transport layer Transport layer
Transport layer
Mukesh Chinta
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slidesMahesh Rajawat
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
Pradeep Kumar TS
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
Aman Saurabh
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Sohebuzzaman Khan
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 

What's hot (20)

Mobile IP
Mobile IPMobile IP
Mobile IP
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
message communication protocols in IoT
message communication protocols in IoTmessage communication protocols in IoT
message communication protocols in IoT
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
Cellular network
Cellular networkCellular network
Cellular network
 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Transport layer
Transport layer Transport layer
Transport layer
 
TCP over wireless slides
TCP over wireless slidesTCP over wireless slides
TCP over wireless slides
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Mobility management in adhoc network
Mobility management in adhoc networkMobility management in adhoc network
Mobility management in adhoc network
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 

Similar to Dynamic source routing

Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
Sonali Parab
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
Muthukrishnan008
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networks
huda2018
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
ImXaib
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
Sujit833143
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
Ayush Chhangani
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
VIKASH MAINANWAL
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
Sreedhar Chowdam
 
Mona
MonaMona
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Mumbai Academisc
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
ShivamSolanki48
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
Varsha Anandani
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 

Similar to Dynamic source routing (20)

Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networks
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Routing
RoutingRouting
Routing
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
Mona
MonaMona
Mona
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 

More from Ashraf Uddin

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on r
Ashraf Uddin
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
Ashraf Uddin
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large Clusters
Ashraf Uddin
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
Ashraf Uddin
 

More from Ashraf Uddin (7)

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on r
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large Clusters
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
Freenet
FreenetFreenet
Freenet
 

Recently uploaded

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 

Recently uploaded (20)

Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 

Dynamic source routing

  • 1. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks Presenter Ashraf Uddin Sujit Singh South Asian University (Master of Computer Applications) http://ashrafsau.blogspot.in/ http://ashrafsau.blogspot.in/
  • 2. Routing Overview  Network with nodes, edges  Goal: Devise scheme for transferring message from one msg node to another  Destination routing  Source routing http://ashrafsau.blogspot.in/
  • 3. Source (“path”) routing  Source specifies entire route: places complete path to destination in message header: A – D – F – G  Intermediate nodes just forward to specified next hop: D would look at path in header, forward to F  Like airline travel – get complete set of tickets to final destination before departing… http://ashrafsau.blogspot.in/
  • 4. Destination (“hop-by-hop”) routing  Source specifies only destination in message header: G  Intermediate nodes look at destination in header, consult internal tables to determine appropriate next hop  Like postal service – specify only the final destination on an envelope, and intermediate post offices select where to forward next… http://ashrafsau.blogspot.in/
  • 5. Ad Hoc Routing  Every node participates in routing: no distinction between “routers” and “end nodes”  No external network setup: “self-configuring”  Especially useful when network topology is dynamic (frequent network changes – links break, nodes come and go) http://ashrafsau.blogspot.in/
  • 6. Common application  Mobile wireless hosts  Only subset within range at given time  Want to communicate with any other node http://ashrafsau.blogspot.in/
  • 7. DSR Protocol Activities  Route discovery  Undertaken when source needs a route to a destination  Route maintenance  Used when link breaks, rendering specified path unusable http://ashrafsau.blogspot.in/
  • 8. Route Discovery • The source sends a broadcast packet which contains source address, destination address, request id and path. • If a host saw the packet before, discards it. • Otherwise, the route looks up its route caches to look for a route to destination, If not find, appends its address into the packet, rebroadcast, • If finds a route in its route cache, sends a route reply packet, which is sent to the source by route cache or the route discovery. http://ashrafsau.blogspot.in/
  • 9. source broadcasts a packet containing address of source and destination source (1,4) 1 4 The destination sends a reply packet to source. 8 (1,3) destination 3 7 (1,4,7) 2 The node discards the packets having been seen (1,2) 6 5 (1,3,5) (1,3,5,6) The route looks up its route caches to look for a route to destination If not find, appends its address into the packet http://ashrafsau.blogspot.in/
  • 10. How to send a reply packet  If the destination has a route to the source in its route cache, use it  Else if symmetric links are supported, use the reverse of route record  Else if symmetric links are not supported, the destination initiates route discovery to source http://ashrafsau.blogspot.in/
  • 11. Route Maintenance  Whenever a node transmits a data packet, a route reply, or a route error, it must verify that the next hop correctly receives the packet.  If not, the node must send a route error to the node responsible for generating this route header  Intermediate nodes “eavesdrop”, adjust cached routes  Source deletes route; tries another if one cached, or The source restart the route discovery http://ashrafsau.blogspot.in/
  • 12. Route Maintenance…… A B C D E Route error message: C-D is broken http://ashrafsau.blogspot.in/
  • 13. DSR Optimization: Route Caching  Each node caches a new route it learns by any means  When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F  When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S  When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D  When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D  A node may also learn a route when it overhears Data http://ashrafsau.blogspot.in/
  • 14. Additional Route Discovery features DSR route discovery does not allow nodes like F to reply to RREQ http://ashrafsau.blogspot.in/
  • 15. Additional Route Discovery features http://ashrafsau.blogspot.in/
  • 16. Additional Route Discovery features http://ashrafsau.blogspot.in/
  • 17. Additional Route Discovery features Node C may infer  Preventing Route Reply that the initiator has already received a h=2 storms Route Reply giving  Many Route Reply message C a better route could be send to A from the because the data A’s neighbors packet received  To avoid a possible local from B contains a congestion, each nodes must value of “h” less wait a variable period before than its h’s value A B G sending the reply.  Delay period d = H(h - 1 + r) h=1  Each node network interfaces works into “promiscuous” E receive mode. h=3 http://ashrafsau.blogspot.in/
  • 18. Additional Route Discovery features  Route request Hop limits  “Nonpropagating” Route Request(hop lim 0)  To determine if the target is 2 Hop limit neighbour or a neighbour has a route 1 Hop limit to the target cached.  “Propagating” Route Request( no hop lim) Non Propagating  If no route reply is recived after a Route Request The expanding ring search approach can carry to the short timeout. average latency increasing  “Expanding ring”  Increase hop value stepwise if no route reply is recieved. http://ashrafsau.blogspot.in/
  • 19. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 20. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 21. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 22. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 23. Support for Heterogeneous networks & mobile IP  Heteregenous network : Different kind of devices with different interfaces. Possibly , multiple interfaces( short range & long range) http://ashrafsau.blogspot.in/
  • 24. DSR evaluation  Simulation  To analyse the behavior and performance of DSR.  To Compare with other routing protocols  Set Up:  Ad hoc of 50 mobiles nodes  15 minutes ( 900 seconds) simulation time.  CBR data traffic  20 mobile nodes traffic sources; 4 packets/sec.  Random waypoint mobility model ( pause time) http://ashrafsau.blogspot.in/
  • 25. Packet Delivery Ratio(with movement speed 1m/s) http://ashrafsau.blogspot.in/
  • 26. Routing Overhead(with movement speed 1m/s) http://ashrafsau.blogspot.in/
  • 27. Packet Delivery Ratio(with movement speed 20m/s) http://ashrafsau.blogspot.in/
  • 28. Routing Overhead(with movement speed 20m/s) http://ashrafsau.blogspot.in/
  • 29. RESULT  At both movement speeds, DSR delivers almost all data packets, regardless of pause time.  100% delivery ratio at pause time 900 sec, a stationary network.  At 1 m/s delivery ratio> 99.5%  At 20 m/s delivery ratio> 98% http://ashrafsau.blogspot.in/
  • 30. Advantages  Routes maintain only between nodes who need to communicate. Reduces overhead of routing maintenance.  route caching reduces route discovery overhead.  A single route may yield many routes to the destination. http://ashrafsau.blogspot.in/
  • 31. Disadvantages  Packet header size grows with route length due to source routing.  Flood route request may potentially reach all nodes in the network.  Route reply storm problem. http://ashrafsau.blogspot.in/
  • 32. Conclusion  Excellent performance for routing in multi-hop ad hoc.  Very low routing overhead.  Able to deliver almost all originated data packets, even with rapid motion of all nodes. http://ashrafsau.blogspot.in/
  • 34. Reference [1]. David B. Johnson, David A. Maltz, and Josh Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139-172, Addison- Wesley, 2001. Invited paper. http://ashrafsau.blogspot.in/
  • 35. ?????? QUESTION ?????? http://ashrafsau.blogspot.in/