SlideShare a Scribd company logo
Wireless Ad Hoc and Sensor Networks
CSE 5109
Sajeeb Saha
Assistant Professor
Dept. of CSE, JnU
Wireless Ad Hoc Routing
Protocols
2
What is Routing?
– The process of moving a packet of data from source to
destination.
– Routing is usually performed by a dedicated device called
a router.
– Each intermediary computer performs routing by passing
along the message to the next computer.
– Part of this process involves analyzing a routing table to
determine the best path.
3
Common objective:
Route packets along the optimal path
– Routing protocols adapt to changing network conditions and by
definition offers multi-hop paths
– Routing protocols differ in route table
 construction
 maintenance
 update
Next-hop routing protocols can be categorized as:
– Link-state
– Distance-vector
4
Purpose of Routing
– [Dijkstra 1959 and McQuillan+ 1980]
– Traditional link-state protocols may not be suitable
– Closer to centralized version of shortest-path algorithm
– Each node maintains a view of network topology with a cost for each link
– Link costs are broadcast periodically to keep the views consistent
– Each node updates its view and applies a shortest-path algorithm to find its
next hop for each destination
– Routing loops may occur due to propagation delays, partitioned networks, and
so on
– Alternative link-state routing approaches may not require all nodes to have
the identical link-state information and route selection algorithms and may find
routes on demand
5
Link State Routing
Distributed database problem
– [Ford+ 1962 and Leiner+ 1987]
– Based on shortest-path routing algorithms i.e., Distributed Bellman-
Ford
– DBF algorithms are also known as Distance-Vector (DV)
– Routers exchange their distances to known destinations;
– a router uses the distance vectors received from its neighbors to
compute its own distances.
– For each destination, the node stores a single route table entry along
with next-hop neighbor
– Route table entry for destination contains metric which is distance
from node to the destination and also the next-hop (vector) towards
destination
6
Distance Vector Routing
Distributed computation problem
• Mobility
– Induced route changes
– Induced packet losses
– frequent network partitions
• Error-Prone Shared Broadcast Radio Channel
– Hidden/Exposed terminal problem
– Packet losses due to transmission errors
• Bandwidth Constraint
– Less data rate
– Minimum Control Information
7
Challenges in Wireless Ad Hoc Routing
• Resource Constraint
– Battery Life
– Processing Power
• Security Hazard
– Ease of snooping on wireless transmissions
– Ease of denial-of-service attack
– Misbehaving nodes difficult to identify
– Nodes can be easily compromised
8
Challenges in Wireless Ad Hoc Routing
1. The routing protocol should be Distributed.
2. It must be adaptive to frequent topology changes.
3. Route computation and maintenance must involve a minimum
number of nodes.
4. It must be Localized.
5. The routes must be loop-free and stale-free.
6. The number of packet collisions must be kept to a minimum.
7. It must converge to a optimal route.
8. It must optimally use scarce resources such as bandwidth,
computing power, memory, and battery power.
9. It should be able to provide a certain level of quality of service
(QoS)
9
Wireless Ad Hoc Routing Requirements
Ad-Hoc Mobile
Routing
Protocols
Table Driven /
Proactive
Hybrid
On-Demand-
Driven /
Reactive
DSDV
GSR
FSR
HSR
ZHLS
CGSR
WRP
AODV
DSR
TORA
CBRP
ABR
SSR
ZRP
Cluster
OLSR
10
Wireless Ad Hoc Unicast Routing Protocols
Table Driven Routing Protocol
– proactive!!
– continuously evaluate the routes
– attempt to maintain consistent, up-to-date routing
information
• when a route is needed, one may be ready
immediately
– when the network topology changes
• the protocol responds by propagating updates
throughout the network to maintain a consistent
view
11
• Proactive: maintain routing information
independently of need for communication
• Update messages send throughout the network
periodically or when network topology changes.
• Low latency, suitable for real-time traffic
• Bandwidth might get wasted due to periodic
updates
• They maintain O(N) state per node, N = #nodes
12
Table Driven Routing Protocol
• DSDV – Destination-Sequenced Distance
Vector
• WRP – Wireless Routing Protocol
• GSR – Global State Routing
• FSR – Fisheye State Routing
• HSR – Hierarchical State Routing
• ZHLS – Zone-based Hierarchical Link State
Routing Protocol
• CGSR – Clusterhead Gateway Switch Routing
Protocol
Table Driven Routing Protocol
– reactive!!
– on-demand style: create routes only when it is
desired by the source node
• route discovery: invoke a route-determination
procedure
• the procedure is terminated when
– a route has been found
– no route is found after all route permutations
are examined
– longer delay: sometimes a route may not be ready
for use immediately when data packets come
14
On Demand Routing Protocol
• Reactive: discover route only when you need it
• Saves energy and bandwidth during inactivity
• Can be bursty -> congestion during high activity
• Significant delay might occur as a result of route
discovery
• Good for light loads, collapse in large loads
15
On Demand Routing Protocol
• AODV – Ad Hoc On-demand Distance
Vector Routing
• DSR – Dynamic Source Routing
• TORA – Temporally Ordered Routing
Algorithm
• CBRP – Cluster Based Routing Protocols
• ABR – Associativity Based Routing
• SSR – Signal Stability Routing
On Demand Routing Protocol
Hybrid Routing Protocols
• Proactive for neighborhood, Reactive for far
away (Zone Routing Protocol, Haas group)
• Proactive for long distance, Reactive for
neighborhood (Safari)
• Attempts to strike balance between the two
17
Hierarchical Routing
• Nodes are organized in clusters
• Cluster head “controls” cluster
• Trade off
– Overhead and confusion for leader election
– Scalability: intra-cluster vs intercluster
• One or Multiple levels of hierarchy
18
Geographical Routing
• Nodes know their geo coordinates (GPS)
• Route to move packet closer to end point
• Protocols DREAM, GPSR, LAR
• Propagate geo info by flooding (decrease
frequency for long distances)
19
Ad Hoc Wireless Networks:
Architectures and Protocols
• Chapter 7
Suggested Reading
20
THANK YOU

More Related Content

What's hot

BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
routing
 routing routing
routing
Srinivasa Rao
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Sushant Kushwaha
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
ArunChokkalingam
 
Global state routing
Global state routingGlobal state routing
Global state routing
Tata Consultancy Service Limited
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
Editor IJMTER
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
ArunChokkalingam
 
Ad Hoc
Ad HocAd Hoc
Routing simulator ppt
Routing simulator pptRouting simulator ppt
Routing simulator ppt
RITESH SHAW
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
ArunChokkalingam
 
Data Center Network Multipathing
Data Center Network MultipathingData Center Network Multipathing
Data Center Network Multipathing
Jason TC HOU (侯宗成)
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
CCNAStudyGuide
 
Aravindsikharam
AravindsikharamAravindsikharam
Aravindsikharamsikharam99
 
ZigBee
ZigBee ZigBee
15 coms 525 tcpip - border gateway protocols
15    coms 525 tcpip - border gateway protocols15    coms 525 tcpip - border gateway protocols
15 coms 525 tcpip - border gateway protocols
Palanivel Kuppusamy
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
MoctardOLOULADE
 

What's hot (20)

BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
routing
 routing routing
routing
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
 
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
 
Routing simulator
Routing simulatorRouting simulator
Routing simulator
 
Ad Hoc
Ad HocAd Hoc
Ad Hoc
 
Routing simulator ppt
Routing simulator pptRouting simulator ppt
Routing simulator ppt
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Data Center Network Multipathing
Data Center Network MultipathingData Center Network Multipathing
Data Center Network Multipathing
 
Distance vector and link state routing protocol
Distance vector and link state routing protocolDistance vector and link state routing protocol
Distance vector and link state routing protocol
 
Aravindsikharam
AravindsikharamAravindsikharam
Aravindsikharam
 
ZigBee
ZigBee ZigBee
ZigBee
 
15 coms 525 tcpip - border gateway protocols
15    coms 525 tcpip - border gateway protocols15    coms 525 tcpip - border gateway protocols
15 coms 525 tcpip - border gateway protocols
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 

Viewers also liked

Periféricos de procesamiento de datos
Periféricos de procesamiento de datosPeriféricos de procesamiento de datos
Periféricos de procesamiento de datos
Anthony Estrella
 
Presentación3
Presentación3Presentación3
Presentación3
Marleny Pérez Ortega
 
Extended and updated: Yammer - from 0 to 1500 in three weeks
Extended and updated: Yammer - from 0 to 1500 in three weeksExtended and updated: Yammer - from 0 to 1500 in three weeks
Extended and updated: Yammer - from 0 to 1500 in three weeksMartin Risgaard Rasmussen
 
Engineers And Technicians For Germany
Engineers And Technicians For GermanyEngineers And Technicians For Germany
Engineers And Technicians For GermanyCande Krause
 
Clase1 Modulo4 Ricardo Martinez
Clase1 Modulo4 Ricardo MartinezClase1 Modulo4 Ricardo Martinez
Clase1 Modulo4 Ricardo Martinez
jricardomtzc
 
Stores management
Stores managementStores management
Stores management
Jahnavireddy Konala
 
Customer Passion: How to Create Movements
Customer Passion: How to Create MovementsCustomer Passion: How to Create Movements
Customer Passion: How to Create Movements
Maria Ogneva
 
Apple
AppleApple
Enfermedad psicosomaticas .
Enfermedad psicosomaticas .Enfermedad psicosomaticas .
Enfermedad psicosomaticas .
Cristhina Paredes
 
Panorama des cleantech 2016
Panorama des cleantech 2016 Panorama des cleantech 2016
Panorama des cleantech 2016
PEXE
 
2. hdcongtacbaoholaodong
2. hdcongtacbaoholaodong2. hdcongtacbaoholaodong
2. hdcongtacbaoholaodong
hoasengroup
 
Decision Making
Decision MakingDecision Making
Decision MakingMarcus9000
 

Viewers also liked (15)

Periféricos de procesamiento de datos
Periféricos de procesamiento de datosPeriféricos de procesamiento de datos
Periféricos de procesamiento de datos
 
Presentación3
Presentación3Presentación3
Presentación3
 
Extended and updated: Yammer - from 0 to 1500 in three weeks
Extended and updated: Yammer - from 0 to 1500 in three weeksExtended and updated: Yammer - from 0 to 1500 in three weeks
Extended and updated: Yammer - from 0 to 1500 in three weeks
 
Engineers And Technicians For Germany
Engineers And Technicians For GermanyEngineers And Technicians For Germany
Engineers And Technicians For Germany
 
Betty1
Betty1Betty1
Betty1
 
Clase1 Modulo4 Ricardo Martinez
Clase1 Modulo4 Ricardo MartinezClase1 Modulo4 Ricardo Martinez
Clase1 Modulo4 Ricardo Martinez
 
Stores management
Stores managementStores management
Stores management
 
Pandora - Pithos FINAL
Pandora - Pithos FINALPandora - Pithos FINAL
Pandora - Pithos FINAL
 
Customer Passion: How to Create Movements
Customer Passion: How to Create MovementsCustomer Passion: How to Create Movements
Customer Passion: How to Create Movements
 
Apple
AppleApple
Apple
 
Enfermedad psicosomaticas .
Enfermedad psicosomaticas .Enfermedad psicosomaticas .
Enfermedad psicosomaticas .
 
Panorama des cleantech 2016
Panorama des cleantech 2016 Panorama des cleantech 2016
Panorama des cleantech 2016
 
Cornell-Mitchell (10) (1)
Cornell-Mitchell (10) (1)Cornell-Mitchell (10) (1)
Cornell-Mitchell (10) (1)
 
2. hdcongtacbaoholaodong
2. hdcongtacbaoholaodong2. hdcongtacbaoholaodong
2. hdcongtacbaoholaodong
 
Decision Making
Decision MakingDecision Making
Decision Making
 

Similar to Lecture 7

fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
MrSSaiKumar
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
karthiksmart21
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
BinyamBekeleMoges
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
 
manet.pdf
manet.pdfmanet.pdf
manet.pdf
JJospinJeya
 
unit-4
unit-4 unit-4
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
Mugabo4
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
anushaj46
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
Kishan Patel
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
ShivamSolanki48
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Narendra Singh Yadav
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
VIKASH MAINANWAL
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
smita gupta
 
Manet
ManetManet

Similar to Lecture 7 (20)

fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
fdocuments.in_chapter-7-routing-protocols-for-ad-hoc-wireless-networks-7-rout...
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
manet.pdf
manet.pdfmanet.pdf
manet.pdf
 
unit-4
unit-4 unit-4
unit-4
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Manet
ManetManet
Manet
 

More from Syed Ariful Islam Emon

Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
Syed Ariful Islam Emon
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Syed Ariful Islam Emon
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
Syed Ariful Islam Emon
 
Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1
Syed Ariful Islam Emon
 
Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4
Syed Ariful Islam Emon
 
Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1
Syed Ariful Islam Emon
 
M.sc. engg (ict) admission guide database management system 4
M.sc. engg (ict) admission guide   database management system 4M.sc. engg (ict) admission guide   database management system 4
M.sc. engg (ict) admission guide database management system 4
Syed Ariful Islam Emon
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
Syed Ariful Islam Emon
 
08 neural networks(1).unlocked
08 neural networks(1).unlocked08 neural networks(1).unlocked
08 neural networks(1).unlocked
Syed Ariful Islam Emon
 

More from Syed Ariful Islam Emon (10)

Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3Ch2 the application layer protocols_http_3
Ch2 the application layer protocols_http_3
 
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
Ch2 the application layer protocols_ftp_telnet_samba_dhcp_4
 
Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5Ch1 delays, loss, and throughput l5
Ch1 delays, loss, and throughput l5
 
Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1
 
Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4Ch1 computer networks internet_encapsulation_4
Ch1 computer networks internet_encapsulation_4
 
Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1Ch1 computer networks internet_basic_1
Ch1 computer networks internet_basic_1
 
M.sc. engg (ict) admission guide database management system 4
M.sc. engg (ict) admission guide   database management system 4M.sc. engg (ict) admission guide   database management system 4
M.sc. engg (ict) admission guide database management system 4
 
M.sc
M.scM.sc
M.sc
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
08 neural networks(1).unlocked
08 neural networks(1).unlocked08 neural networks(1).unlocked
08 neural networks(1).unlocked
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Lecture 7

  • 1. Wireless Ad Hoc and Sensor Networks CSE 5109 Sajeeb Saha Assistant Professor Dept. of CSE, JnU
  • 2. Wireless Ad Hoc Routing Protocols 2
  • 3. What is Routing? – The process of moving a packet of data from source to destination. – Routing is usually performed by a dedicated device called a router. – Each intermediary computer performs routing by passing along the message to the next computer. – Part of this process involves analyzing a routing table to determine the best path. 3
  • 4. Common objective: Route packets along the optimal path – Routing protocols adapt to changing network conditions and by definition offers multi-hop paths – Routing protocols differ in route table  construction  maintenance  update Next-hop routing protocols can be categorized as: – Link-state – Distance-vector 4 Purpose of Routing
  • 5. – [Dijkstra 1959 and McQuillan+ 1980] – Traditional link-state protocols may not be suitable – Closer to centralized version of shortest-path algorithm – Each node maintains a view of network topology with a cost for each link – Link costs are broadcast periodically to keep the views consistent – Each node updates its view and applies a shortest-path algorithm to find its next hop for each destination – Routing loops may occur due to propagation delays, partitioned networks, and so on – Alternative link-state routing approaches may not require all nodes to have the identical link-state information and route selection algorithms and may find routes on demand 5 Link State Routing Distributed database problem
  • 6. – [Ford+ 1962 and Leiner+ 1987] – Based on shortest-path routing algorithms i.e., Distributed Bellman- Ford – DBF algorithms are also known as Distance-Vector (DV) – Routers exchange their distances to known destinations; – a router uses the distance vectors received from its neighbors to compute its own distances. – For each destination, the node stores a single route table entry along with next-hop neighbor – Route table entry for destination contains metric which is distance from node to the destination and also the next-hop (vector) towards destination 6 Distance Vector Routing Distributed computation problem
  • 7. • Mobility – Induced route changes – Induced packet losses – frequent network partitions • Error-Prone Shared Broadcast Radio Channel – Hidden/Exposed terminal problem – Packet losses due to transmission errors • Bandwidth Constraint – Less data rate – Minimum Control Information 7 Challenges in Wireless Ad Hoc Routing
  • 8. • Resource Constraint – Battery Life – Processing Power • Security Hazard – Ease of snooping on wireless transmissions – Ease of denial-of-service attack – Misbehaving nodes difficult to identify – Nodes can be easily compromised 8 Challenges in Wireless Ad Hoc Routing
  • 9. 1. The routing protocol should be Distributed. 2. It must be adaptive to frequent topology changes. 3. Route computation and maintenance must involve a minimum number of nodes. 4. It must be Localized. 5. The routes must be loop-free and stale-free. 6. The number of packet collisions must be kept to a minimum. 7. It must converge to a optimal route. 8. It must optimally use scarce resources such as bandwidth, computing power, memory, and battery power. 9. It should be able to provide a certain level of quality of service (QoS) 9 Wireless Ad Hoc Routing Requirements
  • 10. Ad-Hoc Mobile Routing Protocols Table Driven / Proactive Hybrid On-Demand- Driven / Reactive DSDV GSR FSR HSR ZHLS CGSR WRP AODV DSR TORA CBRP ABR SSR ZRP Cluster OLSR 10 Wireless Ad Hoc Unicast Routing Protocols
  • 11. Table Driven Routing Protocol – proactive!! – continuously evaluate the routes – attempt to maintain consistent, up-to-date routing information • when a route is needed, one may be ready immediately – when the network topology changes • the protocol responds by propagating updates throughout the network to maintain a consistent view 11
  • 12. • Proactive: maintain routing information independently of need for communication • Update messages send throughout the network periodically or when network topology changes. • Low latency, suitable for real-time traffic • Bandwidth might get wasted due to periodic updates • They maintain O(N) state per node, N = #nodes 12 Table Driven Routing Protocol
  • 13. • DSDV – Destination-Sequenced Distance Vector • WRP – Wireless Routing Protocol • GSR – Global State Routing • FSR – Fisheye State Routing • HSR – Hierarchical State Routing • ZHLS – Zone-based Hierarchical Link State Routing Protocol • CGSR – Clusterhead Gateway Switch Routing Protocol Table Driven Routing Protocol
  • 14. – reactive!! – on-demand style: create routes only when it is desired by the source node • route discovery: invoke a route-determination procedure • the procedure is terminated when – a route has been found – no route is found after all route permutations are examined – longer delay: sometimes a route may not be ready for use immediately when data packets come 14 On Demand Routing Protocol
  • 15. • Reactive: discover route only when you need it • Saves energy and bandwidth during inactivity • Can be bursty -> congestion during high activity • Significant delay might occur as a result of route discovery • Good for light loads, collapse in large loads 15 On Demand Routing Protocol
  • 16. • AODV – Ad Hoc On-demand Distance Vector Routing • DSR – Dynamic Source Routing • TORA – Temporally Ordered Routing Algorithm • CBRP – Cluster Based Routing Protocols • ABR – Associativity Based Routing • SSR – Signal Stability Routing On Demand Routing Protocol
  • 17. Hybrid Routing Protocols • Proactive for neighborhood, Reactive for far away (Zone Routing Protocol, Haas group) • Proactive for long distance, Reactive for neighborhood (Safari) • Attempts to strike balance between the two 17
  • 18. Hierarchical Routing • Nodes are organized in clusters • Cluster head “controls” cluster • Trade off – Overhead and confusion for leader election – Scalability: intra-cluster vs intercluster • One or Multiple levels of hierarchy 18
  • 19. Geographical Routing • Nodes know their geo coordinates (GPS) • Route to move packet closer to end point • Protocols DREAM, GPSR, LAR • Propagate geo info by flooding (decrease frequency for long distances) 19
  • 20. Ad Hoc Wireless Networks: Architectures and Protocols • Chapter 7 Suggested Reading 20