SlideShare a Scribd company logo
1 of 37
Download to read offline
© Oxford University Press 2007. All rights reserved. 1
Mobile Ad-hoc and Sensor Networks
Lesson 04
Mobile Ad-hoc Network (MANET)
Routing Algorithms─ Part 1
© Oxford University Press 2007. All rights reserved. 2
Ad-hoc networks deployment
• For routing, target detection, and service
discovery
• Routing protocols used for routing by
MANET nodes
© Oxford University Press 2007. All rights reserved. 3
Dynamic Source Routing (DSR) Protocol
• Deploys source routing
• Source routing means that each data
packet includes the routing-node
addresses also
© Oxford University Press 2007. All rights reserved. 4
Reactive protocol feature of DSR
• Reacts to the changes and dynamically
maintains only the routing addresses
from source to destination, which are the
active paths to a destination at a given
instant
• Performs unicast routing
• Unicast means routing packets to a
single destined address
© Oxford University Press 2007. All rights reserved. 5
DSR Nodes
• Each node caches the specified route to
destination during source routing of a
packet through that node
• This enables a node to provide route-
specification when a packet source
routes from that node
© Oxford University Press 2007. All rights reserved. 6
DSR Nodes
• Each node deletes the specified route to
destination during routing of error packet
in reverse path to the source in case of
observing a disconnection during forward
path to destination
• The deletion of link shown in a table or
cache is called link reversal
© Oxford University Press 2007. All rights reserved. 7
Phase 1 in DSR Protocol
• Source node initiates a route discovery
process
• It broadcasts the packets, each with a
header
• It then expects return of
acknowledgement from each destination
• The packets are called route request
(RREQ) packets
© Oxford University Press 2007. All rights reserved. 8
Phase 1 in DSR Protocol
• DSR uses flooding (sends multiple
RREQs
• A header for each route request packet
has the unique request number and
source and destination addresses
• This enables identification of request at
each intermediate node in the request
and acknowledged packet(s)
© Oxford University Press 2007. All rights reserved. 9
Phase 1 in DSR Protocol
• When the process starts, initially only the
source address is given in the header
• When the packet reaches a neighbour,
that is, any intermediate node, the node
adds its own address in the header if it is
able to successfully send the packet to
its next neighbour
© Oxford University Press 2007. All rights reserved. 10
Phase 1 in DSR Protocol
• When the packet reaches the destined
address, its header therefore has all
addresses of the nodes in the path
© Oxford University Press 2007. All rights reserved. 11
Example
• Assume that node D is a source and G is
a destination and the path DEFG
is not known. In such a case the path
cannot be placed in the header.
© Oxford University Press 2007. All rights reserved. 12
Example of MANET
© Oxford University Press 2007. All rights reserved. 13
Source Route Discovery Process
• Source header from D puts the sequence
number q and source address D in the
packet header and sends the packet to
its next neighbour. When the packet
reaches E, its header is (q, D)
• Assume that no route error packet
bounced back from neighbour E
© Oxford University Press 2007. All rights reserved. 14
Source Route Discovery Process
• The packet is then transmitted to F
• When the packet reaches F, its header is
(q, D, E). Assume that no route error
packet bounced back from neighbour F
© Oxford University Press 2007. All rights reserved. 15
Source Route Discovery Process
• The packet is transmitted from F to G.
Assume that no route error packet
bounced back from neighbour G.
• When the packet reaches G, its header
is (q, D, E, F)
© Oxford University Press 2007. All rights reserved. 16
Domain Specific rules for consistency
• When packet reaches the destination, a
route reply (RREP) for the sequence
used in RREQ is generated
• On return path, the route cache builds up
at each intermediate node for
deployment at a later instant of phase 2
© Oxford University Press 2007. All rights reserved. 17
Phase 2 in DSR
• When any source node desires to send a
message, it first looks at its route cache
• If the required route is available in cache,
the source node puts all the addresses of
the nodes for the path to destination in
the header
© Oxford University Press 2007. All rights reserved. 18
Source routing addresses in DSR
• Assuming that there is a message from a
MANET node D in the network
Node Destination Cached Path
D A DCA
D B DCAB
D F DEF
D G DEFG
© Oxford University Press 2007. All rights reserved. 19
Ad-hoc On-demand Distance Vector
(AODV) Routing protocol
• A reactive protocol
• Reacts to the changes and maintains
only the active routes in the caches or
tables for a pre-specified expiration time
• Routes that are found that are available
at a given instant
© Oxford University Press 2007. All rights reserved. 20
AODV
• Performs unicast routing
• Distance vector means a set of distant
nodes, which defines the path to
destination
© Oxford University Press 2007. All rights reserved. 21
AODV
• DEFG is a distance vector for
source-destination pair D and G
• In AODV, a distance vector is provided
on demand during forwarding of a packet
to destination by a node in the path and
not by the route cache providing path
through the header in the source data
packet [phase 2]
© Oxford University Press 2007. All rights reserved. 22
AODV
• Every node keeps a next-hop routing
table, which contains the destinations to
which it currently has a route
• A routing table entry expires if it has not
been used or reactivated for a pre-
specified expiration time
• AODV adopts the destination sequence
number technique
© Oxford University Press 2007. All rights reserved. 23
AODV
• Does not deploy flooding (multiple
RREQs)
• Stores the next hop routing information
of the active routes in the routing caches
(tables) at each node
• Therefore, has small header size and
thus reduces the network traffic
overhead
© Oxford University Press 2007. All rights reserved. 24
Phase 1 in AODV Protocol
• A node uses hello messages to notify its
existence to its neighbours
• Therefore, the link status to the next hop in
an active route is continuously monitored
© Oxford University Press 2007. All rights reserved. 25
Phase 1 in AODV Protocol
• When any node discovers a link
disconnection, it broadcasts a route error
(RERR) packet to its neighbors, who in
turn propagate the RERR packet towards
those nodes whose routes may be
affected by the disconnected link
• Then, the affected source can be informed
© Oxford University Press 2007. All rights reserved. 26
Phase 2 in AODV Protocol
• Source node initiates a route discovery
process if no route is available in the
routing table
• It broadcasts the demand through the
RREQ packets
© Oxford University Press 2007. All rights reserved. 27
Phase 2 in AODV Protocol
• Each RREQ has an ID and the addresses
of the source and destination in its header
• It expects return acknowledgement from
destination
• A node identifies the last observed
sequence number of the destination from
the ID
© Oxford University Press 2007. All rights reserved. 28
Phase 2 in AODV Protocol
• Each RREQ starts with a small TTL (time
to live) value [Number of attempts]
• If the destination is not found during the
TTL, the TTL is increased in subsequent
RREQ packets
• The node also identifies sequence number
of source node
© Oxford University Press 2007. All rights reserved. 29
Phase 2 in AODV Protocol
• Sequence numbers ensure loop-free and
up-to-date routes.
• Loop-free means free from bouncing of a
packet to a node after intermediate hops
© Oxford University Press 2007. All rights reserved. 30
Phase 2 in AODV Protocol
• Each node rejects the RREQ which it had
observed before
• This reduces flooding which means it
reduces too many RREQs present in the
network at a given instant.
© Oxford University Press 2007. All rights reserved. 31
Route table in AODV
• Keep entries for a specified period and
each node maintains a cache
• The cache saves the received RREQs
• Only the RREQ of highest sequence
numbers are accepted and previous ones
are discarded
© Oxford University Press 2007. All rights reserved. 32
Route table in AODV
• The cache also saves the return path for
each RREQ source
• When a node having a route to the
destination or the destined node receives
the RREQ, it checks the destination
sequence number it currently knows and
the one specified in the RREQ
© Oxford University Press 2007. All rights reserved. 33
Route table in AODV
• RREP packet is created and forwarded
back to the source only if the destination
sequence number is equal to or greater
than the one specified in RREQ
• It guarantees the up-dation of routing
cache information
© Oxford University Press 2007. All rights reserved. 34
Summary
• DSR
• Deploys source routing
• Reacts to the changes and dynamically
maintains only the routing addresses
from source to destination, which are the
active paths to a destination at a given
instant
…
© Oxford University Press 2007. All rights reserved. 35
…Summary
• AODV reactive protocol
• Routes that are found that are available
at a given instant
• Every node keeps a next-hop routing
table
• A routing table entry expires if it has not
been used or reactivated for a pre-
specified expiration time
© Oxford University Press 2007. All rights reserved. 36
…Summary
• AODV adopts the destination sequence
number technique
© Oxford University Press 2007. All rights reserved. 37
End of Lesson 04
Mobile Ad-hoc Network (MANET) Routing
Algorithms─ Part 1

More Related Content

What's hot

Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDr Praveen Jain
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocolsRama Raman
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisonsITM Universe - Vadodara
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.Editor IJMTER
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocolMehedi
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingAbhiram Subhagan
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer ScienceTransweb Global Inc
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksSushant Kushwaha
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Senthil Kanth
 

What's hot (20)

Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocolComparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
 
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routingA comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
AODV Protocol
AODV ProtocolAODV Protocol
AODV Protocol
 
ZigBee
ZigBee ZigBee
ZigBee
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 

Viewers also liked (9)

Unit 6
Unit 6Unit 6
Unit 6
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 7
Unit 7Unit 7
Unit 7
 
Mobile Computing UNIT-6
Mobile Computing UNIT-6Mobile Computing UNIT-6
Mobile Computing UNIT-6
 
Unit 2
Unit 2Unit 2
Unit 2
 
AI Lesson 41
AI Lesson 41AI Lesson 41
AI Lesson 41
 
It6601 mobile computing unit 5
It6601 mobile computing unit 5It6601 mobile computing unit 5
It6601 mobile computing unit 5
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Unit 3
Unit 3Unit 3
Unit 3
 

Similar to Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1

MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxHirazNor
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
Ad hoc on demand distance
Ad hoc on demand distanceAd hoc on demand distance
Ad hoc on demand distanceJimit Rupani
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxHODElex
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksSonali Parab
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxHODElex
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsSenthil Kanth
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt21121A0594
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...Editor IJMTER
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 

Similar to Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1 (20)

Ad hoc
Ad hocAd hoc
Ad hoc
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
Ad hoc on demand distance
Ad hoc on demand distanceAd hoc on demand distance
Ad hoc on demand distance
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptxUnit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptxUnit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
NetworkAlgorithms.ppt
NetworkAlgorithms.pptNetworkAlgorithms.ppt
NetworkAlgorithms.ppt
 
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
 
C 16
C 16C 16
C 16
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 

More from Sushant Kushwaha

IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)Sushant Kushwaha
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsSushant Kushwaha
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksSushant Kushwaha
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCPSushant Kushwaha
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow controlSushant Kushwaha
 
Incremental and iterative stratergy
Incremental and iterative stratergyIncremental and iterative stratergy
Incremental and iterative stratergySushant Kushwaha
 

More from Sushant Kushwaha (8)

IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
 
Mobile Operating System
Mobile Operating SystemMobile Operating System
Mobile Operating System
 
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) ApplicationsMobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
 
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor NetworksMobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
 
Snooping TCP
Snooping TCPSnooping TCP
Snooping TCP
 
Mobile computing : Indirect TCP
Mobile computing : Indirect TCPMobile computing : Indirect TCP
Mobile computing : Indirect TCP
 
Mobile computing-tcp data flow control
Mobile computing-tcp data flow controlMobile computing-tcp data flow control
Mobile computing-tcp data flow control
 
Incremental and iterative stratergy
Incremental and iterative stratergyIncremental and iterative stratergy
Incremental and iterative stratergy
 

Recently uploaded

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1

  • 1. © Oxford University Press 2007. All rights reserved. 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
  • 2. © Oxford University Press 2007. All rights reserved. 2 Ad-hoc networks deployment • For routing, target detection, and service discovery • Routing protocols used for routing by MANET nodes
  • 3. © Oxford University Press 2007. All rights reserved. 3 Dynamic Source Routing (DSR) Protocol • Deploys source routing • Source routing means that each data packet includes the routing-node addresses also
  • 4. © Oxford University Press 2007. All rights reserved. 4 Reactive protocol feature of DSR • Reacts to the changes and dynamically maintains only the routing addresses from source to destination, which are the active paths to a destination at a given instant • Performs unicast routing • Unicast means routing packets to a single destined address
  • 5. © Oxford University Press 2007. All rights reserved. 5 DSR Nodes • Each node caches the specified route to destination during source routing of a packet through that node • This enables a node to provide route- specification when a packet source routes from that node
  • 6. © Oxford University Press 2007. All rights reserved. 6 DSR Nodes • Each node deletes the specified route to destination during routing of error packet in reverse path to the source in case of observing a disconnection during forward path to destination • The deletion of link shown in a table or cache is called link reversal
  • 7. © Oxford University Press 2007. All rights reserved. 7 Phase 1 in DSR Protocol • Source node initiates a route discovery process • It broadcasts the packets, each with a header • It then expects return of acknowledgement from each destination • The packets are called route request (RREQ) packets
  • 8. © Oxford University Press 2007. All rights reserved. 8 Phase 1 in DSR Protocol • DSR uses flooding (sends multiple RREQs • A header for each route request packet has the unique request number and source and destination addresses • This enables identification of request at each intermediate node in the request and acknowledged packet(s)
  • 9. © Oxford University Press 2007. All rights reserved. 9 Phase 1 in DSR Protocol • When the process starts, initially only the source address is given in the header • When the packet reaches a neighbour, that is, any intermediate node, the node adds its own address in the header if it is able to successfully send the packet to its next neighbour
  • 10. © Oxford University Press 2007. All rights reserved. 10 Phase 1 in DSR Protocol • When the packet reaches the destined address, its header therefore has all addresses of the nodes in the path
  • 11. © Oxford University Press 2007. All rights reserved. 11 Example • Assume that node D is a source and G is a destination and the path DEFG is not known. In such a case the path cannot be placed in the header.
  • 12. © Oxford University Press 2007. All rights reserved. 12 Example of MANET
  • 13. © Oxford University Press 2007. All rights reserved. 13 Source Route Discovery Process • Source header from D puts the sequence number q and source address D in the packet header and sends the packet to its next neighbour. When the packet reaches E, its header is (q, D) • Assume that no route error packet bounced back from neighbour E
  • 14. © Oxford University Press 2007. All rights reserved. 14 Source Route Discovery Process • The packet is then transmitted to F • When the packet reaches F, its header is (q, D, E). Assume that no route error packet bounced back from neighbour F
  • 15. © Oxford University Press 2007. All rights reserved. 15 Source Route Discovery Process • The packet is transmitted from F to G. Assume that no route error packet bounced back from neighbour G. • When the packet reaches G, its header is (q, D, E, F)
  • 16. © Oxford University Press 2007. All rights reserved. 16 Domain Specific rules for consistency • When packet reaches the destination, a route reply (RREP) for the sequence used in RREQ is generated • On return path, the route cache builds up at each intermediate node for deployment at a later instant of phase 2
  • 17. © Oxford University Press 2007. All rights reserved. 17 Phase 2 in DSR • When any source node desires to send a message, it first looks at its route cache • If the required route is available in cache, the source node puts all the addresses of the nodes for the path to destination in the header
  • 18. © Oxford University Press 2007. All rights reserved. 18 Source routing addresses in DSR • Assuming that there is a message from a MANET node D in the network Node Destination Cached Path D A DCA D B DCAB D F DEF D G DEFG
  • 19. © Oxford University Press 2007. All rights reserved. 19 Ad-hoc On-demand Distance Vector (AODV) Routing protocol • A reactive protocol • Reacts to the changes and maintains only the active routes in the caches or tables for a pre-specified expiration time • Routes that are found that are available at a given instant
  • 20. © Oxford University Press 2007. All rights reserved. 20 AODV • Performs unicast routing • Distance vector means a set of distant nodes, which defines the path to destination
  • 21. © Oxford University Press 2007. All rights reserved. 21 AODV • DEFG is a distance vector for source-destination pair D and G • In AODV, a distance vector is provided on demand during forwarding of a packet to destination by a node in the path and not by the route cache providing path through the header in the source data packet [phase 2]
  • 22. © Oxford University Press 2007. All rights reserved. 22 AODV • Every node keeps a next-hop routing table, which contains the destinations to which it currently has a route • A routing table entry expires if it has not been used or reactivated for a pre- specified expiration time • AODV adopts the destination sequence number technique
  • 23. © Oxford University Press 2007. All rights reserved. 23 AODV • Does not deploy flooding (multiple RREQs) • Stores the next hop routing information of the active routes in the routing caches (tables) at each node • Therefore, has small header size and thus reduces the network traffic overhead
  • 24. © Oxford University Press 2007. All rights reserved. 24 Phase 1 in AODV Protocol • A node uses hello messages to notify its existence to its neighbours • Therefore, the link status to the next hop in an active route is continuously monitored
  • 25. © Oxford University Press 2007. All rights reserved. 25 Phase 1 in AODV Protocol • When any node discovers a link disconnection, it broadcasts a route error (RERR) packet to its neighbors, who in turn propagate the RERR packet towards those nodes whose routes may be affected by the disconnected link • Then, the affected source can be informed
  • 26. © Oxford University Press 2007. All rights reserved. 26 Phase 2 in AODV Protocol • Source node initiates a route discovery process if no route is available in the routing table • It broadcasts the demand through the RREQ packets
  • 27. © Oxford University Press 2007. All rights reserved. 27 Phase 2 in AODV Protocol • Each RREQ has an ID and the addresses of the source and destination in its header • It expects return acknowledgement from destination • A node identifies the last observed sequence number of the destination from the ID
  • 28. © Oxford University Press 2007. All rights reserved. 28 Phase 2 in AODV Protocol • Each RREQ starts with a small TTL (time to live) value [Number of attempts] • If the destination is not found during the TTL, the TTL is increased in subsequent RREQ packets • The node also identifies sequence number of source node
  • 29. © Oxford University Press 2007. All rights reserved. 29 Phase 2 in AODV Protocol • Sequence numbers ensure loop-free and up-to-date routes. • Loop-free means free from bouncing of a packet to a node after intermediate hops
  • 30. © Oxford University Press 2007. All rights reserved. 30 Phase 2 in AODV Protocol • Each node rejects the RREQ which it had observed before • This reduces flooding which means it reduces too many RREQs present in the network at a given instant.
  • 31. © Oxford University Press 2007. All rights reserved. 31 Route table in AODV • Keep entries for a specified period and each node maintains a cache • The cache saves the received RREQs • Only the RREQ of highest sequence numbers are accepted and previous ones are discarded
  • 32. © Oxford University Press 2007. All rights reserved. 32 Route table in AODV • The cache also saves the return path for each RREQ source • When a node having a route to the destination or the destined node receives the RREQ, it checks the destination sequence number it currently knows and the one specified in the RREQ
  • 33. © Oxford University Press 2007. All rights reserved. 33 Route table in AODV • RREP packet is created and forwarded back to the source only if the destination sequence number is equal to or greater than the one specified in RREQ • It guarantees the up-dation of routing cache information
  • 34. © Oxford University Press 2007. All rights reserved. 34 Summary • DSR • Deploys source routing • Reacts to the changes and dynamically maintains only the routing addresses from source to destination, which are the active paths to a destination at a given instant …
  • 35. © Oxford University Press 2007. All rights reserved. 35 …Summary • AODV reactive protocol • Routes that are found that are available at a given instant • Every node keeps a next-hop routing table • A routing table entry expires if it has not been used or reactivated for a pre- specified expiration time
  • 36. © Oxford University Press 2007. All rights reserved. 36 …Summary • AODV adopts the destination sequence number technique
  • 37. © Oxford University Press 2007. All rights reserved. 37 End of Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1