Submit Search
Upload
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
•
2 likes
•
2,051 views
S
Sushant Kushwaha
Follow
Mobile Computing Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Read less
Read more
Education
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 37
Download now
Download to read offline
Recommended
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
Classification of routing protocols
Classification of routing protocols
Menaga Selvaraj
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
Routing in Manet
Routing in Manet
shiujinghan
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
Wireless routing protocols
Wireless routing protocols
barodia_1437
Cluster based routing protocol
Cluster based routing protocol
Sudhansu Dash
Recommended
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 2
Sushant Kushwaha
Classification of routing protocols
Classification of routing protocols
Menaga Selvaraj
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
Routing in Manet
Routing in Manet
shiujinghan
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
Wireless routing protocols
Wireless routing protocols
barodia_1437
Cluster based routing protocol
Cluster based routing protocol
Sudhansu Dash
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
Dr Praveen Jain
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
Narendra Singh Yadav
Ad-hoc routing protocols
Ad-hoc routing protocols
Rama Raman
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
Global state routing
Global state routing
Tata Consultancy Service Limited
Zone Routing Protocol
Zone Routing Protocol
nitss007
proactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
Dynamic source routing
Dynamic source routing
Ashraf Uddin
Routing protocols
Routing protocols
N.Jagadish Kumar
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
Editor IJMTER
AODV routing protocol
AODV routing protocol
Varsha Anandani
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
Mehedi
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
Abhiram Subhagan
Routing protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
AODV Protocol
AODV Protocol
Darshan Rathi
ZigBee
ZigBee
Sushant Kushwaha
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
Network Routing | Computer Science
Network Routing | Computer Science
Transweb Global Inc
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Sushant Kushwaha
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
Senthil Kanth
Unit 6
Unit 6
Assistant Professor
Unit 4
Unit 4
Assistant Professor
More Related Content
What's hot
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
Dr Praveen Jain
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
Narendra Singh Yadav
Ad-hoc routing protocols
Ad-hoc routing protocols
Rama Raman
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
Global state routing
Global state routing
Tata Consultancy Service Limited
Zone Routing Protocol
Zone Routing Protocol
nitss007
proactive and reactive routing comparisons
proactive and reactive routing comparisons
ITM Universe - Vadodara
Dynamic source routing
Dynamic source routing
Ashraf Uddin
Routing protocols
Routing protocols
N.Jagadish Kumar
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
Editor IJMTER
AODV routing protocol
AODV routing protocol
Varsha Anandani
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
Mehedi
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
Abhiram Subhagan
Routing protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
AODV Protocol
AODV Protocol
Darshan Rathi
ZigBee
ZigBee
Sushant Kushwaha
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
Network Routing | Computer Science
Network Routing | Computer Science
Transweb Global Inc
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Sushant Kushwaha
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
Senthil Kanth
What's hot
(20)
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
Ad-hoc routing protocols
Ad-hoc routing protocols
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Global state routing
Global state routing
Zone Routing Protocol
Zone Routing Protocol
proactive and reactive routing comparisons
proactive and reactive routing comparisons
Dynamic source routing
Dynamic source routing
Routing protocols
Routing protocols
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
MANET, Unicast Routing Protocol, Multicast Routing Protocol.
AODV routing protocol
AODV routing protocol
Comparison between aodv and olsr protocol
Comparison between aodv and olsr protocol
A comparative study of reactive and proactive routing
A comparative study of reactive and proactive routing
Routing protocols in ad hoc network
Routing protocols in ad hoc network
AODV Protocol
AODV Protocol
ZigBee
ZigBee
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Network Routing | Computer Science
Network Routing | Computer Science
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
Viewers also liked
Unit 6
Unit 6
Assistant Professor
Unit 4
Unit 4
Assistant Professor
Unit 7
Unit 7
Assistant Professor
Mobile Computing UNIT-6
Mobile Computing UNIT-6
Ramesh Babu
Unit 2
Unit 2
Assistant Professor
AI Lesson 41
AI Lesson 41
Assistant Professor
It6601 mobile computing unit 5
It6601 mobile computing unit 5
RMK ENGINEERING COLLEGE, CHENNAI
Mobile computing unit 5
Mobile computing unit 5
Assistant Professor
Unit 3
Unit 3
Assistant Professor
Viewers also liked
(9)
Unit 6
Unit 6
Unit 4
Unit 4
Unit 7
Unit 7
Mobile Computing UNIT-6
Mobile Computing UNIT-6
Unit 2
Unit 2
AI Lesson 41
AI Lesson 41
It6601 mobile computing unit 5
It6601 mobile computing unit 5
Mobile computing unit 5
Mobile computing unit 5
Unit 3
Unit 3
Similar to Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Ad hoc
Ad hoc
Ali Forooghie
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
ArunChokkalingam
Ad hoc on demand distance
Ad hoc on demand distance
Jimit Rupani
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
DEEPAK948083
AODV protocol
AODV protocol
Shanka Mahakumbura
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
ijsrd.com
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
HODElex
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
Sonali Parab
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
Routing protocol
Routing protocol
AmzadKhn
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
HODElex
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
Adhoc routing protocols
Adhoc routing protocols
Senthil Kanth
NetworkAlgorithms.ppt
NetworkAlgorithms.ppt
21121A0594
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
Editor IJMTER
C 16
C 16
Pratik waghmare
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
Similar to Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
(20)
Ad hoc
Ad hoc
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
Ad hoc on demand distance
Ad hoc on demand distance
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
AODV protocol
AODV protocol
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Unit 4_Network Layer_Part II.pptx
Unit 4_Network Layer_Part II.pptx
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Routing protocol
Routing protocol
Unit 3_Network Layer_Part II.pptx
Unit 3_Network Layer_Part II.pptx
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
Adhoc routing protocols
Adhoc routing protocols
NetworkAlgorithms.ppt
NetworkAlgorithms.ppt
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
EFFECT OF PAUSE TIME AND NODES ON PERFORMANCE OF AODV AND DSR ROUTING PROTOCO...
C 16
C 16
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
More from Sushant Kushwaha
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
Sushant Kushwaha
Mobile Operating System
Mobile Operating System
Sushant Kushwaha
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
Sushant Kushwaha
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Sushant Kushwaha
Snooping TCP
Snooping TCP
Sushant Kushwaha
Mobile computing : Indirect TCP
Mobile computing : Indirect TCP
Sushant Kushwaha
Mobile computing-tcp data flow control
Mobile computing-tcp data flow control
Sushant Kushwaha
Incremental and iterative stratergy
Incremental and iterative stratergy
Sushant Kushwaha
More from Sushant Kushwaha
(8)
IRDA Infrared Data Association (IrDA)
IRDA Infrared Data Association (IrDA)
Mobile Operating System
Mobile Operating System
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc Network (MANET) Applications
Mobile Ad-hoc and Sensor Networks
Mobile Ad-hoc and Sensor Networks
Snooping TCP
Snooping TCP
Mobile computing : Indirect TCP
Mobile computing : Indirect TCP
Mobile computing-tcp data flow control
Mobile computing-tcp data flow control
Incremental and iterative stratergy
Incremental and iterative stratergy
Recently uploaded
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
InMediaRes1
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
Virag Sontakke
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Virag Sontakke
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
YousafMalik24
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
UnboundStockton
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
M56BOOKSTORE PRODUCT/SERVICE
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
GaneshChakor2
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Sarwono Sutikno, Dr.Eng.,CISA,CISSP,CISM,CSX-F
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
socialsciencegdgrohi
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Celine George
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
CapitolTechU
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
mkooblal
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
adityarao40181
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
Dr. Mazin Mohamed alkathiri
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
JiesonDelaCerna
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Sumit Tiwari
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
InMediaRes1
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
Marc Dusseiller Dusjagr
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
unnathinaik
Recently uploaded
(20)
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
1.
© Oxford University
Press 2007. All rights reserved. 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
2.
© Oxford University
Press 2007. All rights reserved. 2 Ad-hoc networks deployment • For routing, target detection, and service discovery • Routing protocols used for routing by MANET nodes
3.
© Oxford University
Press 2007. All rights reserved. 3 Dynamic Source Routing (DSR) Protocol • Deploys source routing • Source routing means that each data packet includes the routing-node addresses also
4.
© Oxford University
Press 2007. All rights reserved. 4 Reactive protocol feature of DSR • Reacts to the changes and dynamically maintains only the routing addresses from source to destination, which are the active paths to a destination at a given instant • Performs unicast routing • Unicast means routing packets to a single destined address
5.
© Oxford University
Press 2007. All rights reserved. 5 DSR Nodes • Each node caches the specified route to destination during source routing of a packet through that node • This enables a node to provide route- specification when a packet source routes from that node
6.
© Oxford University
Press 2007. All rights reserved. 6 DSR Nodes • Each node deletes the specified route to destination during routing of error packet in reverse path to the source in case of observing a disconnection during forward path to destination • The deletion of link shown in a table or cache is called link reversal
7.
© Oxford University
Press 2007. All rights reserved. 7 Phase 1 in DSR Protocol • Source node initiates a route discovery process • It broadcasts the packets, each with a header • It then expects return of acknowledgement from each destination • The packets are called route request (RREQ) packets
8.
© Oxford University
Press 2007. All rights reserved. 8 Phase 1 in DSR Protocol • DSR uses flooding (sends multiple RREQs • A header for each route request packet has the unique request number and source and destination addresses • This enables identification of request at each intermediate node in the request and acknowledged packet(s)
9.
© Oxford University
Press 2007. All rights reserved. 9 Phase 1 in DSR Protocol • When the process starts, initially only the source address is given in the header • When the packet reaches a neighbour, that is, any intermediate node, the node adds its own address in the header if it is able to successfully send the packet to its next neighbour
10.
© Oxford University
Press 2007. All rights reserved. 10 Phase 1 in DSR Protocol • When the packet reaches the destined address, its header therefore has all addresses of the nodes in the path
11.
© Oxford University
Press 2007. All rights reserved. 11 Example • Assume that node D is a source and G is a destination and the path DEFG is not known. In such a case the path cannot be placed in the header.
12.
© Oxford University
Press 2007. All rights reserved. 12 Example of MANET
13.
© Oxford University
Press 2007. All rights reserved. 13 Source Route Discovery Process • Source header from D puts the sequence number q and source address D in the packet header and sends the packet to its next neighbour. When the packet reaches E, its header is (q, D) • Assume that no route error packet bounced back from neighbour E
14.
© Oxford University
Press 2007. All rights reserved. 14 Source Route Discovery Process • The packet is then transmitted to F • When the packet reaches F, its header is (q, D, E). Assume that no route error packet bounced back from neighbour F
15.
© Oxford University
Press 2007. All rights reserved. 15 Source Route Discovery Process • The packet is transmitted from F to G. Assume that no route error packet bounced back from neighbour G. • When the packet reaches G, its header is (q, D, E, F)
16.
© Oxford University
Press 2007. All rights reserved. 16 Domain Specific rules for consistency • When packet reaches the destination, a route reply (RREP) for the sequence used in RREQ is generated • On return path, the route cache builds up at each intermediate node for deployment at a later instant of phase 2
17.
© Oxford University
Press 2007. All rights reserved. 17 Phase 2 in DSR • When any source node desires to send a message, it first looks at its route cache • If the required route is available in cache, the source node puts all the addresses of the nodes for the path to destination in the header
18.
© Oxford University
Press 2007. All rights reserved. 18 Source routing addresses in DSR • Assuming that there is a message from a MANET node D in the network Node Destination Cached Path D A DCA D B DCAB D F DEF D G DEFG
19.
© Oxford University
Press 2007. All rights reserved. 19 Ad-hoc On-demand Distance Vector (AODV) Routing protocol • A reactive protocol • Reacts to the changes and maintains only the active routes in the caches or tables for a pre-specified expiration time • Routes that are found that are available at a given instant
20.
© Oxford University
Press 2007. All rights reserved. 20 AODV • Performs unicast routing • Distance vector means a set of distant nodes, which defines the path to destination
21.
© Oxford University
Press 2007. All rights reserved. 21 AODV • DEFG is a distance vector for source-destination pair D and G • In AODV, a distance vector is provided on demand during forwarding of a packet to destination by a node in the path and not by the route cache providing path through the header in the source data packet [phase 2]
22.
© Oxford University
Press 2007. All rights reserved. 22 AODV • Every node keeps a next-hop routing table, which contains the destinations to which it currently has a route • A routing table entry expires if it has not been used or reactivated for a pre- specified expiration time • AODV adopts the destination sequence number technique
23.
© Oxford University
Press 2007. All rights reserved. 23 AODV • Does not deploy flooding (multiple RREQs) • Stores the next hop routing information of the active routes in the routing caches (tables) at each node • Therefore, has small header size and thus reduces the network traffic overhead
24.
© Oxford University
Press 2007. All rights reserved. 24 Phase 1 in AODV Protocol • A node uses hello messages to notify its existence to its neighbours • Therefore, the link status to the next hop in an active route is continuously monitored
25.
© Oxford University
Press 2007. All rights reserved. 25 Phase 1 in AODV Protocol • When any node discovers a link disconnection, it broadcasts a route error (RERR) packet to its neighbors, who in turn propagate the RERR packet towards those nodes whose routes may be affected by the disconnected link • Then, the affected source can be informed
26.
© Oxford University
Press 2007. All rights reserved. 26 Phase 2 in AODV Protocol • Source node initiates a route discovery process if no route is available in the routing table • It broadcasts the demand through the RREQ packets
27.
© Oxford University
Press 2007. All rights reserved. 27 Phase 2 in AODV Protocol • Each RREQ has an ID and the addresses of the source and destination in its header • It expects return acknowledgement from destination • A node identifies the last observed sequence number of the destination from the ID
28.
© Oxford University
Press 2007. All rights reserved. 28 Phase 2 in AODV Protocol • Each RREQ starts with a small TTL (time to live) value [Number of attempts] • If the destination is not found during the TTL, the TTL is increased in subsequent RREQ packets • The node also identifies sequence number of source node
29.
© Oxford University
Press 2007. All rights reserved. 29 Phase 2 in AODV Protocol • Sequence numbers ensure loop-free and up-to-date routes. • Loop-free means free from bouncing of a packet to a node after intermediate hops
30.
© Oxford University
Press 2007. All rights reserved. 30 Phase 2 in AODV Protocol • Each node rejects the RREQ which it had observed before • This reduces flooding which means it reduces too many RREQs present in the network at a given instant.
31.
© Oxford University
Press 2007. All rights reserved. 31 Route table in AODV • Keep entries for a specified period and each node maintains a cache • The cache saves the received RREQs • Only the RREQ of highest sequence numbers are accepted and previous ones are discarded
32.
© Oxford University
Press 2007. All rights reserved. 32 Route table in AODV • The cache also saves the return path for each RREQ source • When a node having a route to the destination or the destined node receives the RREQ, it checks the destination sequence number it currently knows and the one specified in the RREQ
33.
© Oxford University
Press 2007. All rights reserved. 33 Route table in AODV • RREP packet is created and forwarded back to the source only if the destination sequence number is equal to or greater than the one specified in RREQ • It guarantees the up-dation of routing cache information
34.
© Oxford University
Press 2007. All rights reserved. 34 Summary • DSR • Deploys source routing • Reacts to the changes and dynamically maintains only the routing addresses from source to destination, which are the active paths to a destination at a given instant …
35.
© Oxford University
Press 2007. All rights reserved. 35 …Summary • AODV reactive protocol • Routes that are found that are available at a given instant • Every node keeps a next-hop routing table • A routing table entry expires if it has not been used or reactivated for a pre- specified expiration time
36.
© Oxford University
Press 2007. All rights reserved. 36 …Summary • AODV adopts the destination sequence number technique
37.
© Oxford University
Press 2007. All rights reserved. 37 End of Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms─ Part 1
Download now