Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
Default and On demand routing - Advance Computer NetworksSonali Parab
Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks.
In packet switching networks, routing directs packet forwarding (the transit of logically addressed network packets from their source toward their ultimate destination) through intermediate nodes. Intermediate nodes are typically network hardware devices such as routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time. Multipath routing techniques enable the use of multiple alternative paths.
Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
Default and On demand routing - Advance Computer NetworksSonali Parab
Routing is the process of selecting best paths in a network. In the past, the term routing was also used to mean forwarding network traffic among networks. However this latter function is much better described as simply forwarding. Routing is performed for many kinds of networks, including the telephone network (circuit switching), electronic data networks (such as the Internet), and transportation networks.
In packet switching networks, routing directs packet forwarding (the transit of logically addressed network packets from their source toward their ultimate destination) through intermediate nodes. Intermediate nodes are typically network hardware devices such as routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time. Multipath routing techniques enable the use of multiple alternative paths.
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
In Contrast with traditional networks, ad hoc networks not require any previously built
infrastructure, they are distributed and fully self-organized systems. Due to absence of any
fixed node, each node acts as a router, providing routing capabilities of the MANET. In a
distributed network, with out any infrastructure communicating peers have to rely on the
whole network, therefore the proper security hardly can be established. This paper proposes
enhancements in Preemptive DSR to provide secured route discovery. This paper evaluates
integration of Secured Routing Protocol (SRP) and Secured Message Transmission(SMT) with
Preemptive Dynamic Source Routing (PDSR) to get Secured PDSR(S-PDSR), which is
capable of secured route discovery.
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
In Contrast with traditional networks, ad hoc networks not require any previously built
infrastructure, they are distributed and fully self-organized systems. Due to absence of any
fixed node, each node acts as a router, providing routing capabilities of the MANET. In a
distributed network, with out any infrastructure communicating peers have to rely on the
whole network, therefore the proper security hardly can be established. This paper proposes
enhancements in Preemptive DSR to provide secured route discovery. This paper evaluates
integration of Secured Routing Protocol (SRP) and Secured Message Transmission(SMT) with
Preemptive Dynamic Source Routing (PDSR) to get Secured PDSR(S-PDSR), which is
capable of secured route discovery.
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
In Contrast with traditional networks, ad hoc networks not require any previously built
infrastructure, they are distributed and fully self-organized systems. Due to absence of any
fixed node, each node acts as a router, providing routing capabilities of the MANET. In a
distributed network, with out any infrastructure communicating peers have to rely on the
whole network, therefore the proper security hardly can be established. This paper proposes
enhancements in Preemptive DSR to provide secured route discovery. This paper evaluates
integration of Secured Routing Protocol (SRP) and Secured Message Transmission(SMT) with
Preemptive Dynamic Source Routing (PDSR) to get Secured PDSR(S-PDSR), which is
capable of secured route discovery
A short tutorial on R, basically for a starter who wants to do data mining especially text data mining.
Related codes and data will be found at the following lnik: http://textanalytics.in/wm/R%20tutorial%20(DATA2014).zip
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How libraries can support authors with open access requirements for UKRI fund...
Dynamic source routing
1. DSR: The Dynamic Source Routing
Protocol for Multi-Hop Wireless Ad Hoc
Networks
Presenter
Ashraf Uddin
Sujit Singh
South Asian University
(Master of Computer Applications)
http://ashrafsau.blogspot.in/
http://ashrafsau.blogspot.in/
2. Routing Overview
Network with nodes, edges
Goal: Devise scheme for
transferring message from one
msg
node to another
Destination routing
Source routing
http://ashrafsau.blogspot.in/
3. Source (“path”) routing
Source specifies entire route: places complete path to
destination in message header: A – D – F – G
Intermediate nodes just forward to specified next hop:
D would look at path in header, forward to F
Like airline travel – get complete set of tickets to final
destination before departing…
http://ashrafsau.blogspot.in/
4. Destination (“hop-by-hop”) routing
Source specifies only destination in message header: G
Intermediate nodes look at destination in
header, consult internal tables to determine appropriate
next hop
Like postal service – specify only the final destination on
an envelope, and intermediate post offices select where
to forward next…
http://ashrafsau.blogspot.in/
5. Ad Hoc Routing
Every node participates in routing: no distinction
between “routers” and “end nodes”
No external network setup: “self-configuring”
Especially useful when network topology is dynamic
(frequent network changes – links break, nodes come
and go)
http://ashrafsau.blogspot.in/
6. Common application
Mobile wireless hosts
Only subset within range at
given time
Want to communicate with
any other node
http://ashrafsau.blogspot.in/
7. DSR Protocol Activities
Route discovery
Undertaken when source needs a route to a destination
Route maintenance
Used when link breaks, rendering specified path
unusable
http://ashrafsau.blogspot.in/
8. Route Discovery
• The source sends a broadcast packet which contains
source address, destination address, request id and
path.
• If a host saw the packet before, discards it.
• Otherwise, the route looks up its route caches to
look for a route to destination, If not find, appends its
address into the packet, rebroadcast,
• If finds a route in its route cache, sends a route reply
packet, which is sent to the source by route cache or
the route discovery.
http://ashrafsau.blogspot.in/
9. source broadcasts a packet containing address of source and
destination
source (1,4)
1
4
The destination sends a reply packet to source.
8
(1,3) destination
3
7
(1,4,7)
2
The node discards the packets having been seen
(1,2)
6
5
(1,3,5) (1,3,5,6)
The route looks up its route caches to look for a route to destination
If not find, appends its address into the packet
http://ashrafsau.blogspot.in/
10. How to send a reply packet
If the destination has a route to the source in its route
cache, use it
Else if symmetric links are supported, use the reverse
of route record
Else if symmetric links are not supported, the
destination initiates route discovery to source
http://ashrafsau.blogspot.in/
11. Route Maintenance
Whenever a node transmits a data packet, a route
reply, or a route error, it must verify that the next
hop correctly receives the packet.
If not, the node must send a route error to the
node responsible for generating this route header
Intermediate nodes “eavesdrop”, adjust cached routes
Source deletes route; tries another if one cached, or
The source restart the route discovery
http://ashrafsau.blogspot.in/
12. Route Maintenance……
A B C D E
Route error message: C-D
is broken
http://ashrafsau.blogspot.in/
13. DSR Optimization: Route Caching
Each node caches a new route it learns by any means
When node S finds route [S,E,F,J,D] to node D, node S
also learns route [S,E,F] to node F
When node K receives Route Request [S,C,G] destined
for node, node K learns route [K,G,C,S] to node S
When node F forwards Route Reply RREP
[S,E,F,J,D], node F learns route [F,J,D] to node D
When node E forwards Data [S,E,F,J,D] it learns route
[E,F,J,D] to node D
A node may also learn a route when it overhears Data
http://ashrafsau.blogspot.in/
14. Additional Route Discovery features
DSR route discovery does not allow nodes like F to
reply to RREQ
http://ashrafsau.blogspot.in/
17. Additional Route Discovery features
Node C may infer
Preventing Route Reply that the initiator has
already received a h=2
storms
Route Reply giving
Many Route Reply message C
a better route
could be send to A from the because the data
A’s neighbors packet received
To avoid a possible local from B contains a
congestion, each nodes must value of “h” less
wait a variable period before than its h’s value
A B G
sending the reply.
Delay period d = H(h - 1 + r) h=1
Each node network interfaces
works into “promiscuous” E
receive mode.
h=3
http://ashrafsau.blogspot.in/
18. Additional Route Discovery features
Route request Hop limits
“Nonpropagating” Route Request(hop lim 0)
To determine if the target is
2 Hop limit
neighbour or a neighbour has a route
1 Hop limit
to the target cached.
“Propagating” Route Request( no hop lim) Non
Propagating
If no route reply is recived after a Route
Request The expanding ring search
approach can carry to the
short timeout. average latency increasing
“Expanding ring”
Increase hop value stepwise if no
route reply is recieved.
http://ashrafsau.blogspot.in/
23. Support for Heterogeneous networks & mobile IP
Heteregenous network :
Different kind of devices with different interfaces.
Possibly , multiple interfaces( short range & long range)
http://ashrafsau.blogspot.in/
24. DSR evaluation
Simulation
To analyse the behavior and performance of DSR.
To Compare with other routing protocols
Set Up:
Ad hoc of 50 mobiles nodes
15 minutes ( 900 seconds) simulation time.
CBR data traffic
20 mobile nodes traffic sources; 4 packets/sec.
Random waypoint mobility model ( pause time)
http://ashrafsau.blogspot.in/
29. RESULT
At both movement speeds, DSR delivers almost all
data packets, regardless of pause time.
100% delivery ratio at pause time 900 sec, a stationary
network.
At 1 m/s delivery ratio> 99.5%
At 20 m/s delivery ratio> 98%
http://ashrafsau.blogspot.in/
30. Advantages
Routes maintain only between nodes who need to
communicate. Reduces overhead of routing
maintenance.
route caching reduces route discovery overhead.
A single route may yield many routes to the
destination.
http://ashrafsau.blogspot.in/
31. Disadvantages
Packet header size grows with route length due to
source routing.
Flood route request may potentially reach all nodes in
the network.
Route reply storm problem.
http://ashrafsau.blogspot.in/
32. Conclusion
Excellent performance for routing in multi-hop ad hoc.
Very low routing overhead.
Able to deliver almost all originated data packets, even
with rapid motion of all nodes.
http://ashrafsau.blogspot.in/
34. Reference
[1]. David B. Johnson, David A. Maltz, and Josh
Broch, "DSR: The Dynamic Source Routing Protocol
for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc
Networking, edited by Charles
E. Perkins, Chapter 5, pp. 139-172, Addison-
Wesley, 2001. Invited paper.
http://ashrafsau.blogspot.in/