The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
The networks not present of any centralized or pre-established structure are known as Ad hoc networks. Ad hoc Networks are the class of wireless networks that use multiple hop radio relay. Mobile Ad-hoc Network (MANET) is a combination of wireless mobile nodes and connected other in a dynamic way. ThesisScientist.com
A Survey of Various Routing and Channel Assignment Strategies for MR-MC WMNsijsrd.com
One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. A WMN node needs to share a common channel with each of its neighbours in the communication range, requiring it to set up a virtual link. Moreover, to reduce network interference, a node should minimize the number of neighbours that it shares a common channel with. The objective of a channel assignment strategy is to ensure efficient utilization of the available channels (e.g., by minimizing interference) while maximizing connectivity in the network. However, since these two requirements are conflicting with each other, the goal is to achieve a balance between these two. The major constraints which need to be satisfied by a channel assignment scheme include fixed number of channels in the network, limited number of radios in mesh nodes, common channel between two communicating nodes, and limited channel capacity. Also, a channel assignment scheme should take the amount of traffic load supported by each mesh node into consideration.
Mobile Ad-Hoc Networks are most usefully in current environments. It’s required high performance, networks load and Throughput. In Mobile Ad-hoc Networks Routing is the hot topic for research. Basically two types routing protocols are work in the mobile Ad-hoc Networks: 1) Proactive and 2) Reactive. Researchers have projected different routing algorithm. Important work has been done on routing in ad hoc networks, some of the important works so far were the destination-sequence distance vector (DSDV) protocol, the temporally ordered routing protocol (TORA), dynamic source routing protocol (DSR) and ad hoc on demand routing protocol (AODV). These algorithms use Open Shortest Path First (OSPF) for find optimum route source to destination.ThesisScientist.com
Wireless Mesh Networks Based on MBPSO Algorithm to Improvement Throughput IJECEIAES
Wireless Mesh Networks can be regarded as a type of communication technology in mesh topology in which wireless nodes interconnect with one another. Wireless Mesh Networks depending on the semi-static configuration in different paths among nodes such as PDR, E2E delay and throughput. This study summarized different types of previous heuristic algorithms in order to adapt with proper algorithm that could solve the issue. Therefore, the main objective of this study is to determine the proper methods, approaches or algorithms that should be adapted to improve the throughput. A Modified Binary Particle Swarm Optimization (MBPSO) approach was adapted to improvements the throughput. Finally, the finding shows that throughput increased by 5.79% from the previous study.
Computer Networking (Growth of number & power of computers is driving need for interconnection)
introduction, classification. Network Topology (The geometric structure of the interconnections among the participating computers and devices in the network)
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
In the vast landscape of cinema, stories have been told, retold, and reimagined in countless ways. At the heart of this narrative evolution lies the concept of a "remake". A successful remake allows us to revisit cherished tales through a fresh lens, often reflecting a different era's perspective or harnessing the power of advanced technology. Yet, the question remains, what makes a remake successful? Today, we will delve deeper into this subject, identifying the key ingredients that contribute to the success of a remake.
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdfXtreame HDTV
In today’s digital age, streaming services have become an integral part of our entertainment lives. Among the myriad of options available, XCIPTV stands out as a premier choice for those seeking seamless, high-quality streaming. This comprehensive guide will delve into the features, benefits, and user experience of XCIPTV, illustrating why it is a top contender in the IPTV industry.
Young Tom Selleck: A Journey Through His Early Years and Rise to Stardomgreendigital
Introduction
When one thinks of Hollywood legends, Tom Selleck is a name that comes to mind. Known for his charming smile, rugged good looks. and the iconic mustache that has become synonymous with his persona. Tom Selleck has had a prolific career spanning decades. But, the journey of young Tom Selleck, from his early years to becoming a household name. is a story filled with determination, talent, and a touch of luck. This article delves into young Tom Selleck's life, background, early struggles. and pivotal moments that led to his rise in Hollywood.
Follow us on: Pinterest
Early Life and Background
Family Roots and Childhood
Thomas William Selleck was born in Detroit, Michigan, on January 29, 1945. He was the second of four children in a close-knit family. His father, Robert Dean Selleck, was a real estate investor and executive. while his mother, Martha Selleck, was a homemaker. The Selleck family relocated to Sherman Oaks, California. when Tom was a child, setting the stage for his future in the entertainment industry.
Education and Early Interests
Growing up, young Tom Selleck was an active and athletic child. He attended Grant High School in Van Nuys, California. where he excelled in sports, particularly basketball. His tall and athletic build made him a standout player, and he earned a basketball scholarship to the University of Southern California (U.S.C.). While at U.S.C., Selleck studied business administration. but his interests shifted toward acting.
Discovery of Acting Passion
Tom Selleck's journey into acting was serendipitous. During his time at U.S.C., a drama coach encouraged him to try acting. This nudge led him to join the Hills Playhouse, where he began honing his craft. Transitioning from an aspiring athlete to an actor took time. but young Tom Selleck became drawn to the performance world.
Early Career Struggles
Breaking Into the Industry
The path to stardom was a challenging one for young Tom Selleck. Like many aspiring actors, he faced many rejections and struggled to find steady work. A series of minor roles and guest appearances on television shows marked his early career. In 1965, he debuted on the syndicated show "The Dating Game." which gave him some exposure but did not lead to immediate success.
The Commercial Breakthrough
During the late 1960s and early 1970s, Selleck began appearing in television commercials. His rugged good looks and charismatic presence made him a popular brand choice. He starred in advertisements for Pepsi-Cola, Revlon, and Close-Up toothpaste. These commercials provided financial stability and helped him gain visibility in the industry.
Struggling Actor in Hollywood
Despite his success in commercials. breaking into large acting roles remained a challenge for young Tom Selleck. He auditioned and took on small parts in T.V. shows and movies. Some of his early television appearances included roles in popular series like Lancer, The F.B.I., and Bracken's World. But, it would take a
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdfGenny Knight
As the popularity of online streaming continues to rise, the significance of providing outstanding viewing experiences cannot be emphasized enough. Tailored OTT players present a robust solution for service providers aiming to enhance their offerings and engage audiences in a competitive market. Through embracing customization, companies can craft immersive, individualized experiences that effectively hold viewers' attention, entertain them, and encourage repeat usage.
From the Editor's Desk: 115th Father's day Celebration - When we see Father's day in Hindu context, Nanda Baba is the most vivid figure which comes to the mind. Nanda Baba who was the foster father of Lord Krishna is known to provide love, care and affection to Lord Krishna and Balarama along with his wife Yashoda; Letter’s to the Editor: Mother's Day - Mother is a precious life for their children. Mother is life breath for her children. Mother's lap is the world happiness whose debt can never be paid.
Skeem Saam in June 2024 available on ForumIsaac More
Monday, June 3, 2024 - Episode 241: Sergeant Rathebe nabs a top scammer in Turfloop. Meikie is furious at her uncle's reaction to the truth about Ntswaki.
Tuesday, June 4, 2024 - Episode 242: Babeile uncovers the truth behind Rathebe’s latest actions. Leeto's announcement shocks his employees, and Ntswaki’s ordeal haunts her family.
Wednesday, June 5, 2024 - Episode 243: Rathebe blocks Babeile from investigating further. Melita warns Eunice to stay clear of Mr. Kgomo.
Thursday, June 6, 2024 - Episode 244: Tbose surrenders to the police while an intruder meddles in his affairs. Rathebe's secret mission faces a setback.
Friday, June 7, 2024 - Episode 245: Rathebe’s antics reach Kganyago. Tbose dodges a bullet, but a nightmare looms. Mr. Kgomo accuses Melita of witchcraft.
Monday, June 10, 2024 - Episode 246: Ntswaki struggles on her first day back at school. Babeile is stunned by Rathebe’s romance with Bullet Mabuza.
Tuesday, June 11, 2024 - Episode 247: An unexpected turn halts Rathebe’s investigation. The press discovers Mr. Kgomo’s affair with a young employee.
Wednesday, June 12, 2024 - Episode 248: Rathebe chases a criminal, resorting to gunfire. Turf High is rife with tension and transfer threats.
Thursday, June 13, 2024 - Episode 249: Rathebe traps Kganyago. John warns Toby to stop harassing Ntswaki.
Friday, June 14, 2024 - Episode 250: Babeile is cleared to investigate Rathebe. Melita gains Mr. Kgomo’s trust, and Jacobeth devises a financial solution.
Monday, June 17, 2024 - Episode 251: Rathebe feels the pressure as Babeile closes in. Mr. Kgomo and Eunice clash. Jacobeth risks her safety in pursuit of Kganyago.
Tuesday, June 18, 2024 - Episode 252: Bullet Mabuza retaliates against Jacobeth. Pitsi inadvertently reveals his parents’ plans. Nkosi is shocked by Khwezi’s decision on LJ’s future.
Wednesday, June 19, 2024 - Episode 253: Jacobeth is ensnared in deceit. Evelyn is stressed over Toby’s case, and Letetswe reveals shocking academic results.
Thursday, June 20, 2024 - Episode 254: Elizabeth learns Jacobeth is in Mpumalanga. Kganyago's past is exposed, and Lehasa discovers his son is in KZN.
Friday, June 21, 2024 - Episode 255: Elizabeth confirms Jacobeth’s dubious activities in Mpumalanga. Rathebe lies about her relationship with Bullet, and Jacobeth faces theft accusations.
Monday, June 24, 2024 - Episode 256: Rathebe spies on Kganyago. Lehasa plans to retrieve his son from KZN, fearing what awaits.
Tuesday, June 25, 2024 - Episode 257: MaNtuli fears for Kwaito’s safety in Mpumalanga. Mr. Kgomo and Melita reconcile.
Wednesday, June 26, 2024 - Episode 258: Kganyago makes a bold escape. Elizabeth receives a shocking message from Kwaito. Mrs. Khoza defends her husband against scam accusations.
Thursday, June 27, 2024 - Episode 259: Babeile's skillful arrest changes the game. Tbose and Kwaito face a hostage crisis.
Friday, June 28, 2024 - Episode 260: Two women face the reality of being scammed. Turf is rocked by breaking
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...Rodney Thomas Jr
#SSAPhilosophy #DjangoUnchained #DjangoFreeman #ExistentialPhilosophy #Freedom #Identity #Justice #Courage #Rebellion #Transformation
Welcome to SSA Philosophy, your ultimate destination for diving deep into the profound philosophies of iconic characters from video games, movies, and TV shows. In this episode, we explore the powerful journey and existential philosophy of Django Freeman from Quentin Tarantino’s masterful film, "Django Unchained," in our video titled, "From Slave to Scourge: The Existential Choice of Django Unchained. The Philosophy of Django Freeman!"
From Slave to Scourge: The Existential Choice of Django Unchained – The Philosophy of Django Freeman!
Join me as we delve into the existential philosophy of Django Freeman, uncovering the profound lessons and timeless wisdom his character offers. Through his story, we find inspiration in the power of choice, the quest for justice, and the courage to defy oppression. Django Freeman’s philosophy is a testament to the human spirit’s unyielding drive for freedom and justice.
Don’t forget to like, comment, and subscribe to SSA Philosophy for more in-depth explorations of the philosophies behind your favorite characters. Hit the notification bell to stay updated on our latest videos. Let’s discover the principles that shape these icons and the profound lessons they offer.
Django Freeman’s story is one of the most compelling narratives of transformation and empowerment in cinema. A former slave turned relentless bounty hunter, Django’s journey is not just a physical liberation but an existential quest for identity, justice, and retribution. This video delves into the core philosophical elements that define Django’s character and the profound choices he makes throughout his journey.
Link to video: https://youtu.be/GszqrXk38qk
Tom Selleck Net Worth: A Comprehensive Analysisgreendigital
Over several decades, Tom Selleck, a name synonymous with charisma. From his iconic role as Thomas Magnum in the television series "Magnum, P.I." to his enduring presence in "Blue Bloods," Selleck has captivated audiences with his versatility and charm. As a result, "Tom Selleck net worth" has become a topic of great interest among fans. and financial enthusiasts alike. This article delves deep into Tom Selleck's wealth, exploring his career, assets, endorsements. and business ventures that contribute to his impressive economic standing.
Follow us on: Pinterest
Early Life and Career Beginnings
The Foundation of Tom Selleck's Wealth
Born on January 29, 1945, in Detroit, Michigan, Tom Selleck grew up in Sherman Oaks, California. His journey towards building a large net worth began with humble origins. , Selleck pursued a business administration degree at the University of Southern California (USC) on a basketball scholarship. But, his interest shifted towards acting. leading him to study at the Hills Playhouse under Milton Katselas.
Minor roles in television and films marked Selleck's early career. He appeared in commercials and took on small parts in T.V. series such as "The Dating Game" and "Lancer." These initial steps, although modest. laid the groundwork for his future success and the growth of Tom Selleck net worth. Breakthrough with "Magnum, P.I."
The Role that Defined Tom Selleck's Career
Tom Selleck's breakthrough came with the role of Thomas Magnum in the CBS television series "Magnum, P.I." (1980-1988). This role made him a household name and boosted his net worth. The series' popularity resulted in Selleck earning large salaries. leading to financial stability and increased recognition in Hollywood.
"Magnum P.I." garnered high ratings and critical acclaim during its run. Selleck's portrayal of the charming and resourceful private investigator resonated with audiences. making him one of the most beloved television actors of the 1980s. The success of "Magnum P.I." played a pivotal role in shaping Tom Selleck net worth, establishing him as a major star.
Film Career and Diversification
Expanding Tom Selleck's Financial Portfolio
While "Magnum, P.I." was a cornerstone of Selleck's career, he did not limit himself to television. He ventured into films, further enhancing Tom Selleck net worth. His filmography includes notable movies such as "Three Men and a Baby" (1987). which became the highest-grossing film of the year, and its sequel, "Three Men and a Little Lady" (1990). These box office successes contributed to his wealth.
Selleck's versatility allowed him to transition between genres. from comedies like "Mr. Baseball" (1992) to westerns such as "Quigley Down Under" (1990). This diversification showcased his acting range. and provided many income streams, reinforcing Tom Selleck net worth.
Television Resurgence with "Blue Bloods"
Sustaining Wealth through Consistent Success
In 2010, Tom Selleck began starring as Frank Reagan i
Meet Dinah Mattingly – Larry Bird’s Partner in Life and Loveget joys
Get an intimate look at Dinah Mattingly’s life alongside NBA icon Larry Bird. From their humble beginnings to their life today, discover the love and partnership that have defined their relationship.
As a film director, I have always been awestruck by the magic of animation. Animation, a medium once considered solely for the amusement of children, has undergone a significant transformation over the years. Its evolution from a rudimentary form of entertainment to a sophisticated form of storytelling has stirred my creativity and expanded my vision, offering limitless possibilities in the realm of cinematic storytelling.
Meet Crazyjamjam - A TikTok Sensation | Blog EternalBlog Eternal
Crazyjamjam, the TikTok star everyone's talking about! Uncover her secrets to success, viral trends, and more in this exclusive feature on Blog Eternal.
Source: https://blogeternal.com/celebrity/crazyjamjam-leaks/
Hollywood Actress - The 250 hottest galleryZsolt Nemeth
Hollywood Actress amazon album eminent worldwide media, female-singer, actresses, alhletina-woman, 250 collection.
Highest and photoreal-print exclusive testament PC collage.
Focused television virtuality crime, novel.
The sheer afterlife of the work is activism-like hollywood-actresses point com.
173 Illustrate, 250 gallery, 154 blog, 120 TV serie logo, 17 TV president logo, 183 active hyperlink.
HD AI face enhancement 384 page plus Bowker ISBN, Congress LLCL or US Copyright.
Scandal! Teasers June 2024 on etv Forum.co.zaIsaac More
Monday, 3 June 2024
Episode 47
A friend is compelled to expose a manipulative scheme to prevent another from making a grave mistake. In a frantic bid to save Jojo, Phakamile agrees to a meeting that unbeknownst to her, will seal her fate.
Tuesday, 4 June 2024
Episode 48
A mother, with her son's best interests at heart, finds him unready to heed her advice. Motshabi finds herself in an unmanageable situation, sinking fast like in quicksand.
Wednesday, 5 June 2024
Episode 49
A woman fabricates a diabolical lie to cover up an indiscretion. Overwhelmed by guilt, she makes a spontaneous confession that could be devastating to another heart.
Thursday, 6 June 2024
Episode 50
Linda unwittingly discloses damning information. Nhlamulo and Vuvu try to guide their friend towards the right decision.
Friday, 7 June 2024
Episode 51
Jojo's life continues to spiral out of control. Dintle weaves a web of lies to conceal that she is not as successful as everyone believes.
Monday, 10 June 2024
Episode 52
A heated confrontation between lovers leads to a devastating admission of guilt. Dintle's desperation takes a new turn, leaving her with dwindling options.
Tuesday, 11 June 2024
Episode 53
Unable to resort to violence, Taps issues a verbal threat, leaving Mdala unsettled. A sister must explain her life choices to regain her brother's trust.
Wednesday, 12 June 2024
Episode 54
Winnie makes a very troubling discovery. Taps follows through on his threat, leaving a woman reeling. Layla, oblivious to the truth, offers an incentive.
Thursday, 13 June 2024
Episode 55
A nosy relative arrives just in time to thwart a man's fatal decision. Dintle manipulates Khanyi to tug at Mo's heartstrings and get what she wants.
Friday, 14 June 2024
Episode 56
Tlhogi is shocked by Mdala's reaction following the revelation of their indiscretion. Jojo is in disbelief when the punishment for his crime is revealed.
Monday, 17 June 2024
Episode 57
A woman reprimands another to stay in her lane, leading to a damning revelation. A man decides to leave his broken life behind.
Tuesday, 18 June 2024
Episode 58
Nhlamulo learns that due to his actions, his worst fears have come true. Caiphus' extravagant promises to suppliers get him into trouble with Ndu.
Wednesday, 19 June 2024
Episode 59
A woman manages to kill two birds with one stone. Business doom looms over Chillax. A sobering incident makes a woman realize how far she's fallen.
Thursday, 20 June 2024
Episode 60
Taps' offer to help Nhlamulo comes with hidden motives. Caiphus' new ideas for Chillax have MaHilda excited. A blast from the past recognizes Dintle, not for her newfound fame.
Friday, 21 June 2024
Episode 61
Taps is hungry for revenge and finds a rope to hang Mdala with. Chillax's new job opportunity elicits mixed reactions from the public. Roommates' initial meeting starts off on the wrong foot.
Monday, 24 June 2024
Episode 62
Taps seizes new information and recruits someone on the inside. Mary's new job
240529_Teleprotection Global Market Report 2024.pdfMadhura TBRC
The teleprotection market size has grown
exponentially in recent years. It will grow from
$21.92 billion in 2023 to $28.11 billion in 2024 at a
compound annual growth rate (CAGR) of 28.2%. The
teleprotection market size is expected to see
exponential growth in the next few years. It will grow
to $70.77 billion in 2028 at a compound annual
growth rate (CAGR) of 26.0%.
Experience the thrill of Progressive Puzzle Adventures, like Scavenger Hunt Games and Escape Room Activities combined Solve Treasure Hunt Puzzles online.
Panchayat Season 3 - Official Trailer.pdfSuleman Rana
The dearest series "Panchayat" is set to make a victorious return with its third season, and the fervor is discernible. The authority trailer, delivered on May 28, guarantees one more enamoring venture through the country heartland of India.
Jitendra Kumar keeps on sparkling as Abhishek Tripathi, the city-reared engineer who ends up functioning as the secretary of the Panchayat office in the curious town of Phulera. His nuanced depiction of a young fellow exploring the difficulties of country life while endeavoring to adjust to his new environmental factors has earned far and wide recognition.
Neena Gupta and Raghubir Yadav return as Manju Devi and Brij Bhushan Dubey, separately. Their dynamic science and immaculate acting rejuvenate the hardships of town administration. Gupta's depiction of the town Pradhan with an ever-evolving outlook, matched with Yadav's carefully prepared exhibition, adds profundity and credibility to the story.
New Difficulties and Experiences
The trailer indicates new difficulties anticipating the characters, as Abhishek keeps on wrestling with his part in the town and his yearnings for a superior future. The series has reliably offset humor with social editorial, and Season 3 looks ready to dig much more profound into the intricacies of rustic organization and self-awareness.
Watchers can hope to see a greater amount of the enchanting and particular residents who have become fan top picks. Their connections and the one of a kind cut of-life situations give a reviving and interesting portrayal of provincial India, featuring the two its appeal and its difficulties.
A Mix of Humor and Heart
One of the signs of "Panchayat" is its capacity to mix humor with sincere narrating. The trailer features minutes that guarantee to convey giggles, as well as scenes that pull at the heartstrings. This equilibrium has been a critical calculate the show's prosperity, resounding with crowds across different socioeconomics.
Creation Greatness
The creation quality remaining parts first rate, with the beautiful setting of Phulera town filling in as a scenery that upgrades the narrating. The meticulousness in portraying provincial life, joined with sharp composition and solid exhibitions, guarantees that "Panchayat" keeps on hanging out in the packed web series scene.
Expectation and Delivery
As the delivery date draws near, expectation for "Panchayat" Season 3 is at a record-breaking high. The authority trailer has previously created critical buzz, with fans enthusiastically anticipating the continuation of Abhishek Tripathi's excursion and the new undertakings that lie ahead in Phulera.
All in all, the authority trailer for "Panchayat" Season 3 recommends that watchers are in for another drawing in and engaging ride. Yet again with its charming characters, convincing story, and ideal mix of humor and show, the new season is set to enamor crowds. Write in your schedules and prepare to get back to the endearing universe of "Panchayat."
1. 1
Design and
Implementation of
Reactive Routing
Protocols for
Wireless AD-Hoc
Networks
Project Guide : Dr. Chiranjeev Kumar
PROJECT TEAM:
RAJESH KUMAR K(9724)
VINAY MAJETY(9604)
LAKSHMIPATHI SASTRY CH(9586)
1
2. 2|Page
Acknowledgement
We express thanks and gratitude to Dr.Chiranjeev Kumar (Asst. Professor,
Dept. Of CSE ,ISM) for his encouraging support and guidance in carrying out
the project.
I extend my gratefulness to Dr.G.P.Biswas , HOD , Dept of CSE for trusting us
and helped in providing us with the project.
Last but not the least; we are indebted a lot to our PARENTS with out whom
we are no where.
Vinay Majety
Lakshmipathi Sastry CH
Rajesh Kumar K
4. 4|Page
INTRODUCTION
Two variants of wireless networks-infrastructure based, AD-HOC.
Many WLAN require infrastructure networks.
Infra networks---provide access to other networks, MAC, forwarding functions etc.
WIRELESS ACCESS POINT:
a wireless access point (AP) is a device that allows wireless communication devices to connect to a
wireless network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a wired
network, and can relay data between the wireless devices (such as computers or printers) and wired
devices on the network.
WAP functions as a gateway for clients to access the wired network.
The access point not only controls medium access, but also acts as a bridge to other wired or wireless
networks.
Most of the network functionality lies within access point.
APPLICATIONS-HOME WIRELESS NETWORKS,CELLULAR PHONES FOR WIDE AREAS.
DISADVANTAGES OF ACCESS POINTS:
• Infrastructure based networks lose some flexibility that wireless networks offer. One IEEE
802.11 WAP can typically communicate with 30 client systems located within a radius of
10000 m.
• The actual range of communication can vary significantly, depending on such variables as
indoor or outdoor placement, height above ground, nearby obstructions, other electronic
devices that might actively interfere with the signal by broadcasting on the same frequency,
type of antenna, the current weather, operating radio frequency, and the power output of
devices.
• Network designers can extend the range of WAPs through the use of repeaters and
reflectors.
• Adjacent WAPs will use different frequencies to communicate with their clients in order to
avoid interference between the two nearby systems. However, the limited number of
frequencies becomes problematic in crowded downtown areas with tall buildings using
multiple WAPs. In such an environment, signal overlap becomes an issue causing
interference, which results in signal dropage and data errors.
AD HOC NETWORKS:
5. 5|Page
A wireless ad hoc network is a decentralized wireless network.
An Ad-Hoc network uses a connection between two or more devices without using an access
point: the devices communicate directly. An Ad-Hoc network is used in situations such as a
quick data exchange or a multiplayer LAN game because it is easy to set up and does not
require an access point. Due to its peer-to-peer layout, Ad-Hoc connections are similar to
Bluetooth ones and are generally not recommended for a permanent installation.Nodes
with in ad hoc can communicate if one node is in other’s radio range or if one node can
forward message to other.Complexity of every node increases as each node has to
implement MAC, priority mechanisms etc.
NOTE: AD HOC networks may have only selected nodes within range to
forward data.Most of the nodes have to connect to a special node to transmit
data if the receiver node is not in the range.
A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self-configuring
network of mobile devices connected by wireless links.
Each device in a MANET is free to move independently in any direction, and will therefore change its
links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore
be a router. The primary challenge in building a MANET is equipping each device to continuously
maintain the information required to properly route traffic.
Commercial Applications
• Emergency services
• Damaged infrastructure
• Difficult to set up infrastructure
• Sensor network
AD HOC NETWORKS HISTORY
Inspired by the ALOHA network and the early development of fixed network packet
switching, DARPA began work, in 1973, on the PRnet (packet radio network)Ña
multihop network.2 In this context, multihopping means that nodes cooperated to
relay traffic on behalf of one another to reach distant stations that would otherwise have
been out of range. PRnet provided mechanisms for managing operation centrally as well as
on a distributed basis. As an additional benefit, it was realized that multihopping techniques
increased network capacity,since the spatial domain could be reused for concurrent but
physically separate multihop sessions.
Although many experimental packetradio networks were later developed, these
wireless systems did not ever really take off in the consumer segment. When developing
IEEE 802.11Ña standard for wireless local area networks (WLAN)Ñthe Institute
of Electrical and Electronic Engineering (IEEE) replaced the term packet-radio network
with ad hoc network.
6. 6|Page
AD HOC NETWORKS:PROTOCOLS,PERFORMANCE,ISSUES
The IEEE 802.11 standard defines two operational modes for WLANs: infrastructure-based
and infrastructure-less or adhoc. Network interface cards can be set to work in either of these
modes but not in both simultaneously.
The drawbacks of an infrastructure-based WLAN are the costs associated with purchasing
and installing the infrastructure. These costs may not be acceptable for dynamic
environments where people and/or vehicles need to be temporarily interconnected in areas
without a pre-existing communication infrastructure (e.g., inter-vehicular and disaster
networks), or where the infrastructure cost is not justified (e.g., in-building networks, specific
residential communities networks, etc.).
Any station that is within the transmission range of any other, after a synchronization phase,
can start communicating.
if one of the stations operating in the ad hoc mode also has a connection to the
wired network, stations forming the ad hoc network have a wireless access to the Internet.
Routing extends the range of the ad hoc network beyond the transmission radium of the
source station.
Routing solutions designed for wired networks (e.g., the Internet) are not suitable for
the ad hoc environment, primarily due to the dynamic topology of ad hoc networks.
In AD HOC networks(limitation)
the transmission range is limited since the RF-RADIO FREQUENCY energy disperses
as the distance from the transmitter increases.
So, if the bit rate is increased....
The characteristics of the wireless medium and the dynamic nature of ad hoc networks make
(IEEE 802.11) multi-hop networks fundamentally different from wired networks.
the behavior of an ad hoc network that relies upon a carrier-sensing random
access protocol, such as the IEEE 802.11, is further complicated by the presence of hidden
stations, exposed stations, “capturing” phenomena [XuS01, XuS02], and so on.
The DCF provides the basic access method of the 802.11 MAC protocol and is based on a
7. 7|Page
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) scheme. The PCF is
implemented on top of the DCF and is based on a polling scheme. It uses a Point Coordinator
That cyclically polls stations, giving them the opportunity to transmit.
PCF cannot be adopted in ad hoc mode, it will not be considered hereafter.
This is due to the fact that there is no central authority to act as a PointCoordinator (PC). Peer-to-
peer ad-hoc mode in the IEEE802.11 standard only implements the DistributedCoordination
Function (DCF).
COMMON PROBLEMS IN WIRELESS AD HOC NETWORKS
• The wireless medium has neither absolute nor readily observable boundaries
outside of which stations are known to be unable to receive network frames;
• The channel is unprotected from outside signals;
• The wireless medium is significantly less reliable than wired media;
• The channel has time-varying and asymmetric propagation properties.
• Since ad hoc networks rely on forwarding data
packets sent by other nodes, power consumption becomes a critical issue
• The wireless medium characteristics generate complex phenomena such as the
hidden-station and exposed-station problems.
THE ABOVE PROBLEM CAN BE SOLVED BY USING VIRTUAL CARRIER
SENSING MECHANISM Request To Send (RTS) and Clear To Send (CTS),
This information can be read by any listening station that uses this information to set up a
timer called Network Allocation Vector (NAV). While the NAV timer is greater than zero the
station must refrain from accessing the wireless medium.
8. 8|Page
The “exposed station” problem may thus result in a throughput reduction.
Ad Hoc Networking Support
IEEE 802.11 standard, an ad hoc network is named Independent Basic Service Set (IBSS).
9. 9|Page
Due to the flexibility of the CSMA/CA protocol, to receive and transmit data correctly it is
sufficient that all stations within the IBSS are synchronized to a common clock. The
standard specifies a Timing Synchronization Function (TSF) to achieve clock
synchronization between stations.
In an IBSS, due to the lack a centralized station, clock synchronization is achieved through a
distributed algorithm. In both cases synchronization is obtained by transmitting special
frames, called beacons, containing timing information.
In an infra-structured network the clock synchronization is provided by the AP, and
all stations synchronizes their own clock to the AP’s clock. In an IBSS, due to the lack a
centralized station, clock synchronization is achieved through a distributed algorithm.
The TSF requires two fundamental functionalities, namely synchronization maintenance
And synchronization acquirement, that will be sketched below.
SYNCHRONIZATION MAINTANANCE:
Each station has a TSF timer (clock) with modulus 264 counting in increments of
microseconds. Stations expect to receive beacons at a nominal rate defined by the a
BeaconPeriod parameter. This parameter is decided by the station initiating the IBSS, and is
then used by any other station joining the IBSS. Stations use their TSF timers to determine
the beginning of beacon intervals or periods. At the beginning of a beacon interval each
station performs the following procedure:
i. it suspends the decrementing of the backoff timer for any pending (non-beacon)
transmission;
ii. it generates a random delay interval uniformly distributed in the range between zero
and twice the minimum value of the Contention Window.
iii. it waits for the random delay;
iv. if a beacon arrives before the random delay timer has expired, it stops the random
delay timer, cancel the pending beacon transmission, and resumes the backoff timer;
v. if the random delay timer has expired and no beacon has been received, it sends a
beacon frame.
Synchronization acquirement.
This functionality is necessary when a station wants to join an already existing IBSS.
POWER MANAGEMENT:
Power management functionalities are extremely important both in the infrastructure-based
and in the ad hoc modes as portable devices have limited energetic resources since they are
Powered through batteries.
A station may be in one of two different power states: awake (station is fully powered) or
doze (the station is not able to transmit or receive).
10. 10 | P a g e
All awake stations are made to know the directed frames destined to a power-conse
power conserving
station using Ad hoc Traffic Indication Map(ATIM). A station operating in the PS mode
Map(ATIM
listens to these announcements and, based on them, decides whether it has to remain awake
or not.
AD HOC NETWORKS VS WIRELESS NETWORKS
ROUTING FOR AD HOC NETWORKS
An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way
to route packets between computing devices in a mobile ad-hoc network .
CHARACTERISTICS AND DESIRED PROPERTISE OF AD HOC ROUTING
PROTOCOLS
Distributed operation:
A node in an ad hoc network cannot rely on a network in the background to support security and
routing functions. Instead these functions must be designed so that they can operate efficiently under
distributed conditions.
Dynamic network topology:
In general, the nodes will be mobile, which sooner or
n
later will result in a varying network topology. Nonetheless, connectivity in the network should be
b
maintained to allow applications and services to operate
undisrupted
11. 11 | P a g e
Loop Free:
Routes supplied must be loop free.
Demand based operation:
The protocol must not broadcast control information periodically.Only when necessary.TO
MINIMIZE OVERHEAD ON NETWORK.
Security
The radio system is vulnerable to attacks.So authentication techniques like encryption and
decr. Must be followed and problem here is in distributing keys.
Power Consumption
Multiple routes
To reduce the no. of reactions to topological changes and congestion, multiple routes is
followed as even if 1 gets invalid….
DESIGN ISSUES OF AD HOC ROUTING PROTOCOLS
Network Architecture:
In most self-organized networks, the hosts will be acting as independent. routers,
which implies that routing architecture should conceptually be flat, that
is, each address serves only as an identifier and does not convey any information
about one host that is topologically located with respect to any other node. In a flat
self-organized network, the mobility management is not necessary because all of
the nodes are visible to each other via routing protocols. In flat routing algorithms
such as Destination-Sequenced Distance Vector (DSDV) and Wireless Routing
Protocol (WRP), the routing tables have entries to all hosts in the self-organized
network. However, a flat routing algorithm does not have good scalability. The
routing overhead increases rapidly when the network becomes larger. Clustering is the most common
technique employed in hierarchicalrouting architectures. When an ordinary node wants to send a packet,
the node can send the packet to the clusterhead that routes the packet toward the destination.
Unidirectional Links Support
Almost every existing routing protocol tends to assume that all links are bidirectional.
However, there are a number of factors that will make wireless links unidirectional.
They are as follows:
Different radio capabilities: Radios within a network can have different
Transmit powers or receive sensitivities.
Interference: This is due to either hostile jammers or friendly interference,
which will reduce a nearby receiver’s sensitivity. For example, host A can
receive packets from host B as there is very little interference in A’s vicinity.
However, B may be in the vicinity of an interference node, and therefore
cannot receive packets from A. So, the link between A and B is directed
from B to A.
Mute mode: An extreme instance, applicable only in tactical mobile networks,
is when hosts cannot transmit due to an impending threat. In such a case,
12. 12 | P a g e
it still needs to receive information; however, it cannot participate in bidirectional
communications.
The state of link direction is time varying: The directional state of the wireless
link may be either a persistent or a transient phenomenon. The frequency of
such transitions and the duration of stay in each state will be a function of
offered traffic, terrain, mobility patter, and energy availability.
Quality of Service (QoS) Routing
For datagram traffic, shortest path routing may be sufficient. However, these wireless links in self-
organized networks, typically scarce and dynamic, make it difficult to perform efficient resource utilization
or to execute critical real-time applications in such environments.
QoS routing means that it selects
routes with sufficient resources for the requested QoS parameters. The goal of QoS
routing has two points. The first one is to meet the QoS requirements for each
admitted connection, and the second one is to achieve global efficiency in resource
utilization. In a selforganized
network, there are many metrics to be considered: the (1) most reliable
path, (2) most stable path, (3) maximum total power remained path, (4) maximumavailable
bandwidth path, and so forth.
Multicast Support
multicast routing is a network-layer function that constructs paths
along which data packets from a source are distributed to reach many, but not all,
destinations in a communication network. In contrast to unicast routing, multicast routing is a very useful
and efficient
way to support group communication
STANDARD ROUTING PROTOCOLS
Proactive Routing Protocols
•It is a table driven routing that computes routing path
• Both link-state and distance vectorare “proactive,” that is, routes are
established and updated even if they are never needed.
• If there is almost no mobility, proactive algorithms are superior
because they never have to exchange information and find
optimal routes easily.
Reactive Routing Protocols
• Flooding is “reactive,” but does not scale
• If mobility is high and data transmission rare, reactive algorithms are superior; in the
extreme case of almost no data and very much mobility the simple flooding protocol might be
a good choice.
Classification of Routing Protocols by Cast Property :
Unicast Routing Protocals
13. 13 | P a g e
Multicast Routing Protocals
Geocast/Broad Cast Routing Protocals
On the basis of fundamental design and implementation
Communication Model:
Seperate protocols designed for multichannel and single channel transmission.
Multi channel routing protocols combine channel assignment and routing functionality.
Eg:Clustered gateway switched routing.
STRUCTURE:
ROUTING protocols can be classified as uniform and non-uniform protocols.
• No node takes a distinguishing role, i.e all nodes are alike and they accept and send
frames.
• Scalability becomes a problem in large networks.
NON-UNIFORM-
• Reduce routing complexity by reducing the number of nodes for routing computation.
• Reduces scalability and communication overhead.
• Supports load branching and QoS.
o OF TWO TYPES-protocols in which routing depends on neighbouring routers
o Protocols in which network is topologically partitioned,i.e,nodes are
partitioned into clusters. Some nodes acts as cluster heads.
STATE INFORMATION:
On the basis of state information obtained at each nodes and/or exchanged among nodes.
• TOPOLOGY BASED PROTOCOLS: Every node maintains topology information.
Eg. Link state protocols.
Each node advertises its connectivity with its neighbours to all other nodes.So based
on it short path info is found.
Effective for routing in fixed networks.
• Destination based Protocols:
Do not maintain large scale topological information.
14. 14 | P a g e
Eg.-Distance vector routing.Each node maintains hop count and vector to a
destination.
SCHEDULING
Depends on when a source obtains scheduling information.
• Proactive protocols(Table driven)
• Reactive protocols(On demand)
Unicast,Establishing and Maintaining efficient,current route between pair of nodes. MANETS are
subdivided into three types.
Pro-Active Routing Protocols
Re-Active Routing Protocols
Hybrid Routing Protocols
Pro-Active Routing Protocols :
Derived from Distance-Vector(DV) and Link-State(LS) routing Protocols.
It is the constant maintanance of a route by each node to all other n/w nodes and updates routing
information for each pair,by propagating pro-actively,updates at fixed intervals of time.Routing info
is usually maintained in table,so its known as “Table-Driven Protocols.”
Re-Active Routing Protocols :
Route between two nodes is discovered only when needed.i.e only when
Source is requests a route to Destination.Special route request packets are flooded over the
n/w.once route is discovered Route Req. Comes to an end.Route maintanance procedure maintains
active routes till completion of Communication.
15. 15 | P a g e
DYNAMIC SOURCE ROUTING
INTRODUCTION:
Source routing is a routing technique in which the sender of a packet determines the complete
sequence of nodes through which to forward the packet; the sender explicitly lists this route in
the packet’s header, identifying each forwarding “hop” by the address of the next node to which
to transmit the packet on its way to the destination host.
The DSR protocol is designed mainly for mobile ad hoc networks of up to about two hundred nodes
and is designed to work well even with very high rates of mobility.
In designing DSR, we sought to create a routing protocol that had very low overhead yet was able to
react very quickly to changes in the network
The DSR protocol is composed of two main mechanisms that work together to allow the discovery
and maintenance of source routes in the ad hoc network.
• Route Discovery is the mechanism by which a node S wishing to send a packet to a
destination node D obtains a source route to D. Route Discovery is used only when S
attempts to send a packet to D and does not already know a route to D.
• Route Maintenance is the mechanism by which node S is able to detect, while using a source
route to D, if the network topology has changed such that it can no longer use its route to D
because a link along the route no longer works. When Route Maintenance indicates a source
route is broken, S can attempt to use any other route it happens to know to D, or it can invoke
Route Discovery again to find a new route for subsequent packets to D. Route Maintenance
for this route is used only when S is actually sending packets to D.
This entirely on-demand behavior and lack of periodic activity allows the number of overhead packets
caused by DSR to scale all the way down to zero, when all nodes are approximately stationary with
respect to each other and all routes needed for current communication have already been discovered.
Advantages over conventional routing protocols:
• Our protocol uses no periodic routing advertisement messages, thereby reducing
network bandwidth
• Overhead, particularly during periods when little or no significant host movement is taking
place. Battery power is also conserved on the mobile hosts, both by not sending the
advertisements and by not needing to receive them.
• The operation of both Route Discovery and Route Maintenance in DSR are
designed to allow unidirectional links and asymmetric routes to be supported. In
particular, as noted in Section 2, in wireless networks, it is possible that a link
between two nodes may not work equally well in both directions, due to differing
transmit power levels or sources of interference.
In response to a single Route Discovery (as well as through routing information from other
packets overheard), a node may learn and cache multiple routes to any destination. This support
for multiple routes allows the reaction to routing changes to be much more rapid, since a node
with multiple routes to a destination can try another cached route if the one it has been using
should fail.
This caching of multiple routes also avoids the overhead of needing to perform a new Route
Discovery each time a route in use breaks.
Assumptions:
16. 16 | P a g e
• In particular, each host participating in the network should also be willing to forward
packets for other hosts in the network.
• Number of hops necessary for a packet to reach from any host located at one extreme
Edge of the network to another host located at the opposite extreme, as the diameter
of the network.
Hosts can move but the speed is moderate
We assume that a node receiving a corrupted packet can detect the error, such as
through a standard link-layer checksum or Cyclic Redundancy Check (CRC), and
discard the packet.
Operates in promiscuous receive mode. When a network card receives a packet, it
normally drops it unless the packet is addressed to that card. In promiscuous mode,
however, the card allows all packets through, thus allowing the computer to read
packets intended for other machines or network devices.
DSR Overview:
• The sender constructs a source route in the packet’s header, giving the address of each
host. Each mobile host participating in the ad hoc network maintains a route cache in
which it caches source routes that it has learned. When one host sends a packet to
another host, the sender first checks its route cache for a source route to the
destination. If a route is found, the sender uses this route to transmit the packet. If no
route is found, the sender may attempt to discover one using the route discovery
protocol.
• The host may buffer the original packet in order to transmit it once the route is learned
from route discovery, or it may discard the packet, relying on higher-layer protocol
software to retransmit the packet if needed. Each entry in the route cache has
associated with it an expiration period, after which the entry is deleted from the cache.
ROUTE DISCOVERY:
• In addition to the address of the original initiator of the request and the target of the
request, each route request packet contains a route record, in which is accumulated a
record of the sequence of hops taken by the route request packet as it is propagated
through the ad hoc network during this route discovery.
• Each route request packet also contains a unique request id, set by the initiator from a
locally-maintained sequence number. In order to detect duplicate route requests
received, each host in the ad hoc network maintains a list of the initiator address,
request id pairs that it has recently received on any route request.
When any host receives a route request packet, it processes the request according to the
following steps:
1. If the pair <initiator address, request id> for this route request is found in this host’s
list of recently seen requests, then discard the route request packet and do not process
it further.
17. 17 | P a g e
2. Otherwise, if this host’s address is already listed in the route record in the request,
then discard the route request packet and do not process it further.
3. Otherwise, if the target of the request matches this host’s own address, then the
route record in the packet contains the route by which the request reached this host from
the initiator of the route request.
Return a copy of this route in a route reply packet to the initiator.
4. Otherwise, append this host’s own address to the route record in the route request
packet, and re-broadcast the request.
Destination returning route reply to the source:
A is source & E is destination.
• Node E will typically examine its own Route Cache for a route back to A and, if one
is found, will use it for the source route for delivery of the packet containing the
Route Reply.
• Otherwise, E SHOULD perform its own Route Discovery for target node A.
But to avoid possible infinite recursion of Route Discoveries, it MUST in this case
piggyback this Route Reply on the packet containing its own Route Request for A.
• It is also possible to piggyback other small data packets, such as a TCP SYN packet,
on a Route Request using this same mechanism.
• Node E could instead simply reverse the sequence of hops in the route record that it is
trying to send in the Route Reply and use this as the source route on the packet
carrying the Route Reply itself.
Regarding Send buffer:
• When initiating a Route Discovery, the sending node saves a copy of the original
packet (that triggered the discovery) in a local buffer called the "Send Buffer".
• Each packet in the Send Buffer is logically associated with the time that it was placed
into the Send Buffer and is discarded after residing in the Send Buffer for some
timeout period Send Buffer Timeout.
Limiting of route discoveries:
• The node MUST limit the rate at which such new Route Discoveries for the same
address are initiated, since it is possible that the destination node is not currently
reachable.
• In order to reduce the overhead from such Route Discoveries, a node SHOULD use
an exponential back-off algorithm to limit the rate at which it initiates new Route
Discoveries for the same target, doubling the timeout between each successive
discovery initiated for the same target.
ROUTE MAINTANENCE:
18. 18 | P a g e
• At each hop, the host transmitting the packet for that hop can determine if that
hop of the route is still working. If the data link level reports a transmission problem
for which it cannot recover this host sends a route error packet to the original sender
of the packet encountering the error. The route error packet contains the addresses of
the hosts at both ends of the hop in error: the host that detected the error and the host
to which it was attempting to transmit the packet on this hop.
• Or, After sending a packet to the next hop mobile host, the sender may be able to hear
that host transmitting the packet again. This type of acknowledgement is known as a
passive acknowledgement.
• As a last resort, a bit in the packet header could be included to allow a host
transmitting a packet to request an explicit acknowledgement from the next-hop
receiver. If no other acknowledgement signal has been received in some time from the
next hop on some route, the host could use this bit to inexpensively probe the status of
this hop on the route.
• If a built-in acknowledgement mechanism is not available, the node transmitting the
packet can explicitly request that a DSR-specific software acknowledgement be
returned by the next node along the route; this software acknowledgement will
normally be transmitted directly to the sending node, but if the link between these two
nodes is unidirectional, this software acknowledgement could travel over a different,
multi-hop path.
Host returning route error packet to Source:
• If this host has an entry for the original sender in its route cache, it may send the route
error packet using that route.
• Otherwise, this host may reverse the route from the packet in error.
• Perform route discovery from the host.
ADDITIONAL ROUTE DISCOVERY FEATURES:
Caching Overheard Routing Information:
A node forwarding or otherwise overhearing any packet SHOULD add all usable routing
information from that packet to its own Route Cache.
The usefulness of routing information in a packet depends on the directionality characteristics
of the physical medium, as well as on the MAC protocol being used. Specifically, three
distinct
19. 19 | P a g e
Cases are possible:
1. Links in the network frequently are capable of operating only unidirectionally (not
bidirectionally), and the MAC protocol in use in the network is capable of transmitting
unicast packets over unidirectional links:
The route being returned in a Route Reply SHOULD all be cached by any node in
The "forward" direction ONLY.
2. Link bidirectional& Unidirectional Occasional & MAC unidirectional:
The links described above SHOULD be cached in both directions.
3. MAC bidirectional for unicast operation: (DOUBT)
links from a source route SHOULD be cached in both directions, except when the packet
also contains a Route Reply, in which case only the links already traversed in this source
route SHOULD be cached. However, the links not yet traversed in this route SHOULD
NOT be cached.
Replying to Route Requests Using Cached Routes:
Before transmitting a Route Reply packet that was generated using information from its
Route Cache in this way, a node MUST verify that the resulting route being returned in the
Route Reply, after this concatenation, contains no duplicate nodes listed in the route record.
Route Request Hop Limits:
Each Route Request message contains a "hop limit" that may be used to limit the number of
intermediate nodes allowed to forward that copy of the Route Request. This hop limit is
implemented using the Time-to-Live (TTL) field in the IP header of the packet carrying the
Route Request. As the Request is forwarded, this limit is decremented, and the Request
packet is discarded if the limit reaches zero before finding the target.
Eg: Implementing a non propagating route request:
A node using this technique sends its first Route Request attempt for some target node using a
hop limit of 1, such that any node receiving the initial transmission of the Route Request will not
forward the Request to other nodes by re-broadcasting it. This form of Route Request is called a
"non-propagating" Route Request.
20. 20 | P a g e
If no Route Reply is received after a short timeout, then the node sends a "propagating" Route
Request for the target node (i.e., with hop limit as defined by the value of the DiscoveryHopLimit
configuration variable).
Additional Route Maintenance Features:
Packet Salvaging:
When an intermediate node forwarding a packet detects through Route Maintenance that the
next hop along the route for that packet is broken, if the node has another route to the packet's
destination in its Route Cache, the node SHOULD "salvage" the packet rather than discard it.
When salvaging a packet, a count is maintained in the packet of the number of times that it
has been salvaged, to prevent a single packet from being salvaged endlessly. Otherwise,
since the TTL is decremented only once by each node, a single node could salvage a packet
an unbounded number of times. Even if we chose to require the TTL to be decremented on
each salvage attempt, packet salvaging is an expensive operation, so it is desirable to bound
the maximum number of times a packet can be salvaged independently of the maximum
number of hops a packet can traverse.
Queued Packets Destined over a Broken Link:
In addition to handling that packet as defined for Route Maintenance, the node SHOULD
also handle in a similar way any pending packets that it has queued that are destined over this
new broken link.
Automatic Route Shortening:
Source routes in use MAY be automatically shortened if one or more intermediate nodes in the
route become no longer necessary. If a node is able to overhear a packet carrying a source
Route then this node examines the unexpended portion of that source route.
In this case, this node (node D) SHOULD return a "gratuitous" Route Reply to the original sender
of the packet (node A). In this example, the route returned in the gratuitous Route Reply
message sent from D to A gives the new route as the sequence of hops from A to B to D to E.
(THIS DONE ON THE BASIS OF SIGNAL TO NOISE RATIO).
Increased Spreading of Route Error Messages:
When a source node receives a Route Error for a data packet that it originated, this source node
propagates this Route Error to its neighbors by piggybacking it on its next Route Request. In this
way, stale information in the caches of nodes around this source node will not generate Route
Replies that contain the same invalid link for which this source node received the Route Error.
21. 21 | P a g e
Conceptual Data Structures:
Route Cache:
Anytime a node adds new information to its Route Cache, the node SHOULD check each
packet in its own Send Buffer to determine whether a route to that packet's IP Destination
Address now exists in the node's Route Cache (including the information just added to the
Cache). If so, the packet SHOULD then be sent using that route and removed from the Send
Buffer.
The Route Cache SHOULD support storing more than one route to each destination. The
following properties describe this searching function on a Route Cache:
• Each implementation of DSR at any node MAY choose any appropriate strategy and
algorithm for searching its Route Cache and selecting a "best" route to the destination
from among those found.
• If there are multiple cached routes to a destination, the selection of routes when
searching the Route Cache SHOULD prefer routes that do not have the External flag set
on any link. This preference will select routes that lead directly to the target node over
routes that attempt to reach the target via any external networks connected to the DSR
ad hoc network.(WHY?)
The following properties describe the management of available space within a node's
Route Cache:
• Each implementation of DSR at each node MAY choose any appropriate policy for
managing the entries in its Route Cache when memory of route cache is limited.
Eg: "least recently used" (LRU) cache replacement policy.
• However, the Route Cache replacement policy SHOULD allow routes to be categorized
based upon "preference", where routes with a higher preferences are less likely to be
removed from the cache.
Any suitable data structure organization, consistent with this specification, MAY be used to
implement the Route Cache in any node. For example, the following two types of organization
are possible:
• By caching each of these paths separately, a "path cache" organization for the Route
Cache can be formed. To search for a route in a path cache data structure, the sending
node can simply search its Route Cache for any path (or prefix of a path) that leads to
the intended destination node.
• A "link cache" organization could be used for the Route Cache, in which each individual
link (hop) in the routes returned in Route Reply packets (or otherwise learned from the
header of overhead packets) is added to a unified graph data structure of this node's
current view of the network topology. To search for a route in link cache, the sending
node must use a more
22. 22 | P a g e
complex graph search algorithm, such as the well-known Dijkstra's shortest-path
algorithm, to find the current best path through the graph to the destination node.
However, a link cache organization is more powerful than a path cache organization, in its ability
to effectively utilize all of the potential information that a node might learn about the state of the
network.
Send Buffer:
• Queue of packets that cannot be sent by that node because it does not yet have a
source
Route to each such packet's destination.
• a FIFO strategy SHOULD be used to evict packets before they time out to prevent the
buffer from overflowing.
Route Request Table:
• Records information about Route Requests that have been recently originated or
forwarded by this node. The table is indexed by IP address.
• The Route Request Table on a node records the following information
About nodes to which this node has initiated a Route Request:
• The Time-to-Live (TTL) field used in the IP header of the Route Request for
the last Route Discovery initiated by this node for that target node.
• The time that this node last originated a Route Request for that target node.
• The number of consecutive Route Discoveries initiated for this target since
receiving a valid Route Reply giving a route to that target node.
• The remaining amount of time before which this node MAY next attempt at a
Route Discovery for that target node. A node MUST implement a back-off
algorithm in determining this timeout.
In addition, the Route Request Table on a node also records the following information about
initiator nodes from which this node has received a Route Request:
• A FIFO cache of size RequestTableIds entries containing the Identification value and
target address from the most recent Route Requests received by this node from that
initiator node.(DOUBT)
DSR Options Header Format
• IS included in existing IP packet.
• Small fixed-sized, 4-octet portion followed by a sequence of zero or more DSR
options carrying optional information.
• For IPv4, the DSR Options header MUST immediately follow the IP header in the
packet followed by traditional (e.g., TCP or UDP) transport layer header.
Fixed Portion of DSR Options Header:
23. 23 | P a g e
If any headers follow the DSR Options header in a packet, the total
length of the DSR Options header (and thus the total, combined length
of all DSR options present) MUST be a multiple of 4 octets.
Next Header:
8-bit selector. Identifies the type of header immediately following the DSR Options header.
59, "No Next Header"
Flow State Header (F):
Flag bit. MUST be set to 0. This bit is set in a DSR Flow State header and clear in a DSR
Options header.
Payload Length
The length of the DSR Options header, excluding the 4-octet fixed portion.
Options:
One or more pieces of optional information encoded in type-length-value (TLV) format.
Each DSR option is assigned a unique Option Type code.
• The most significant bit in the Option Type value (that is, Option Type & 0x80) represents
whether or not a node receiving this Option Type (when the node does not implement
processing for this Option Type) SHOULD respond to such a DSR option with a Route
Error of type OPTION_NOT_SUPPORTED.
• he two following bits in the Option Type value (that is, Option Type & 0x60) are a two-bit
field indicating how such a node that does not support this Option Type MUST process
the packet:
00 = Ignore Option
01 = Remove Option
10 = Mark Option
11 = Drop Packet
The following types of DSR options are defined in this document for
use within a DSR Options header:
- Route Request option
- Route Reply option
- Route Error option
- Acknowledgement Request option
24. 24 | P a g e
- Acknowledgement option
- DSR Source Route option
- Pad1 option
- PadN option
Optimizations:
Full Use of route cache:
• A host can add entries to its route cache any time it learns a new route.
• We avoid the problems of many simultaneous replies and attempt to eliminate replies
indicating routes longer than the shortest reply, by causing each mobile host to delay
slightly before replying from its cache. Before replying from its route cache, a host
performs the following actions:
1. Pick a delay period
D=H*(h-1+r)
, where is the length in number of network hops for the route to be returned in this
host’s reply, is a random number between 0 and 1, and is a small constant delay to be
introduced per hop.
2. Delay transmitting the route reply from this host for a period of .
3. Within this delay period, promiscuously receive all packets at this host. If a packet
is received by this host during the delay period addressed to the target of this route
discovery (the target is the final destination address for the packet, through any
sequence of intermediate hops), and if the length of the route on this packet is less
than, then cancel the delay and do not transmit the route reply from this host; this host
may infer that the initiator of this route discovery has already received a route reply,
giving an equal or better route.
Improved handling of errors:
• The case in which the network effectively becomes partitioned.
• Two hosts that wish to communicate are not within transmission range of each other,
and there are not enough other mobile hosts between them to form a sequence of hops
through which they can forward packets.
25. 25 | P a g e
Modifications to DSR
Scalability Improvement in DSR
DSR:
Abstract: The Overhead in finding Source Route to Destination in a Large Network is
Destination
more. Thus it reduces the Efficiency of DSR Protocol. A Modification is proposed for
odification
DSR, has less overhead and delay compared to Conventional DSR.
,
Introduction:
At Moderate traffic load , DSR performed better than AODV , indicates limited
Scalability of DSR.
Reduce Overhead by Reducing the number of RREP packets and header size of DSR
Data Packets.
Modification:
Limit the number of RREP Packets to one.
Sent through the route from which first RREQ Received.
This route is Active and transmission is fast in this route.
Hence it reduces Delay and Overhead in RREP Packets(Like Congestion & Wasta
Wastage
of Power).
Less no. of Control Packets and Higher Packet Delivery Ratio.
Modification in DSR Data Packet:
26. 26 | P a g e
Algorithm:
Source broadcasts RREQ packets which are heard by nodes within the coverage area.
The neighboring nodes re-broadcast the received RREQ till it reaches the destination.
re broadcast
Destination initiates a RREP only to the first received RREQ.
Every node which receives the RREP checks whether a RREP with same
sequence number is already received. If so, RREP is dropped. Else, the following step
is performed.
Node checks whether its address is present in the RREP. If so, it designates itself as
intermediate node and performs the following step. Else it drops the packet.
The intermediate node stores the source address, destination address and
precursor node address in memory before broadcasting the RREP.
Every intermediate node performs steps 4, 5, and 6 till the RREP reaches source node.
Upon receiving the RREP, source starts to transmit the data packet. The data packet
contains only source and destination addresses in its header.
27. 27 | P a g e
As the data packet travels from source to destination, every node confirms whether it
acts as intermediate node for the source destination pair. Only the intermediate
nodes broadcast the data packet towards destination. Other nodes drop the packet.
After broadcasting data packet, acknowledgement is sent to the precursor node.
Fuzzy Logic QoS Dynamic Source Routing:
Most of the existing algorithms couldn’t provide QoS.
Extension to DSR protocol.
Factors: Bandwidth, End to End delay, Cost of path.
Assumption: Maximum hop count<10
Route Discovery:
Three main tasks:
◦ Multiple paths establishment
◦ Link state collection
◦ Fuzzy QoS route choosing
a) Multiple paths establishment
b) Link state collection: Node must keep updated informatiion about all outgoing links.
a) Done by using MAC layer.
Residual bandwidth calculated using resource reservation function.
Correspondingly, additional fields in route cache are added.
28. 28 | P a g e
C) Fuzzy QoS route choosing:
• Source waits for multiple paths from route discovery.
• Finds out which one is most appropriate.
Traffic Fuzzy Controller:
• The request of bandwidth is divided among 5
categories:lower,low,medium,high,higher(R1,R2,R3,R4,R5).
lower,low,medium,high,higher(R1,R2,R3,R4,R5).
• End to End delay is represented as short,middle,long(S,M,L)
29. 29 | P a g e
Traffic Fuzzy Controller:
We use fuzzy decision theory to define fuzzy rules:
Route Fuzzy Controller & QoS Matching Controller:
Route Fuzzy Controller:
It’s structure & functioning is same as that of route fuzzy controller.
Here the input linguistics are “path delay” & “path bandwidth”.
QoS Matching Controller:
The control rules of this element are based on the match degree(MD) between “Integrative
Fuzzy Request” & “Integrative Route state”.
Route Selecting:
If “path bandwidth” >= “Request bandwidth” goto 2 else goto 4.
If there are two or more paths which satisfy condition 1, the route which has the least
cost will be selected else goto 3.
Select the route & transmit the packet & exit.
If no route satisfies the condition, the request of the route is refused.
Conclusion:
Supporting uni-directional links are possible.
Decision is taken without a considerable increase in controller capacity.
QoS achieved.
Suitable only for smaller MANETS, further study to be made to implement them for
massive MANETS.
30. 30 | P a g e
Our Proposal:
Proposed theory & Study
QoS routing in ADHOC networks accompanied by Route Cache Optimization:
Need for the design:
• Most of the existing algorithms couldn’t provide QoS.
• Extension to DSR protocol.
• Factors: Bandwidth, End to End delay, Cost of path, link stability.
In the traditional DSR algorithm:
• No mechanism to select optimal QoS route.
• Selects the route randomly.
• No mechanism to improve route cache.
Problems identified with fuzzy logic approach:
• Implementing Fuzzy logic is complex & time taking.
• Link stability factor not considered.
Main problems identified with route cache:
• Presence of stale routes.
• Inability to access new routes.
Modified DSR for Route cache optimization:
• After every regular intervals, perform route discovery from source to destination to
cache some new routes.
• After regular intervals, some node will generate a test packet that traverses each and
every node to check the network topology.
NEED FOR OUR PROPOSAL:
To perform QoS routing, giving preference to path stability followed by
bandwidth,delay & hop count.
To perform route cache optimization in a much better & optimal way.
A proposal to optimize sending route error using promiscuous mode is also made.
Algorithm:
• When performing route discovery, wait at the receiver for some timeout to receive
other RREQ packets.
• When the route request packets are received, perform route selection using Selection
algorithm or Genetic algorithm.
• Send route reply & piggyback only first two optimal routes.
• Source uses the first route until error occurs. When error occurs, perform route error
reply using proposed scheme.
• Now, packet is sent through second route & receiver is informed regarding breaking
of first path.
• Receiver performs route discovery & sends next optimal route.
31. 31 | P a g e
Selection algorithm:
• Let the priorities be bandwidth, delay, hop count.(These priorities are secondary)
• Now, consider some thresholds for each factor.
• Consider some threshold distance R corresponding to each factor.
Eg: let threshold bw=b , bandwidth of a path=b1
if |b1-b|>=R then put the value in selection matrix as 1 else 0.
• Selection matrix is N*3 Matrix. Now, calculate no. of 1’s in each row.
• Select the path with maximum no. of 1’s.
• If some clash arises, use priority.
Optimization in case of an error:
• When a node leaves a network, the node sends BYE packets to its neighbours.
• So the neighbours will know that a link has broken.
• A separate field is placed in the route cache to indicate that a link is broken.
• Now, a node wants to access a previous path, so it sends a packet through it as it is
unaware regarding the breaking of the link.
• When the packet reaches one of the neighbours of the node that has left the network,
from the special field that has been included in the table the packet realises that the
link has been broken. So, the node doesn’t wait for the ACK and this saves time.
• The node in turn doesn’t send a RERR packet.
• Now, a special field is included in the packet header to indicate that the link is broken.
• The node checks if there is any path to destination.
• If the path is found, packet is sent.
• As all the nodes are in promiscuous mode, the neighbours of the tends to cache to
packet being sent by it & from the special field indicated, they too update their route
cache.
• When the next time a packet is sent through same path, when the packet reaches the
neighbour of the node, since their is special field in route cache of neighbour, RERR
will be sent.
• Advantage is that hop count of RERR is minimized & delay is reduced.
32. 32 | P a g e
Network Simulators NS
NS-2:
What is ns-2?
• Ns-2 stands for network simulator version 2.
2
• Ns-2:
• It is a discrete event simulator for network research.
• Work at packet level.
• Provide substantial support to support bunch of protocols like TCP,UDP,FTP
& DSR.
• Simulate wired & wireless networks.
• Use TCL as its scripting language.
33. 33 | P a g e
Bibliography:
• Wireless ad hoc networking—The art of networking without a network by Magnus
Frodigh, Per Johansson and Peter Larsson-Ericsson Review No. 4,
• A Taxonomy for routing protocols in mobile ADHOC networks-Laura Maria Feeny-
SICS Technical report.
• IEEE 802.11 Ad Hoc Networks: Protocols, Performance and Open Issues-Giuseppe
Anastasi Marco Conti, Enrico Gregori
• The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4-
- D. Johnson,Rice University,Y. Hu UIUC,D. Maltz,Microsoft Research
,February 2007---RFC:4728
• Scalability Improved DSR Protocol for MANETs-M.Tamilaras, Shyam Sunder V R2
, Udara Milinda Haputhanthri , International Conference of computational
Intelligence & Multimedia applications-2007.
• Fuzzy Logic QoS dynamic source routing for mobile ADHOC networks—Xu
ZHANG-IEEE Xplore.
• Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks.
• Route cache optimization using watch packets--ACM Mobile Networks and Ap-
plications Journal, pp. 183-197, Oct. 2006.