This is the PPT of "Routing in Manet". It covers the entire topic of routing protocol.
This PowerPoint presentation is of Data Communication & Computer Network.
The document discusses distance vector routing, which is a type of dynamic routing. In distance vector routing, each router maintains a routing table showing the minimum distance to every other router in the network and the next hop to reach each destination. The routers periodically broadcast their routing tables to each other so that the tables can be updated to reflect the shortest paths. An example shows a network of five routers and their routing tables, with each table listing the shortest distance and next hop to reach every other router. Distance vector routing finds the least-cost route between any two routers by choosing the route with the minimum distance.
A router is a networking device that interconnects two or more computer networks and works at the network layer of the OSI model. It examines data packets and determines the best path to forward them to their destination. Routers maintain routing tables that contain information about available routes and their conditions. They can connect different network segments locally or globally. Routers allow access to resources across networks by selecting optimal paths and can change packet formats to match destination network requirements.
This document discusses wireless ad hoc and sensor networks and routing protocols. It begins by defining routing as the process of moving data packets from a source to destination, which is usually performed by routers. Common objectives of routing protocols are to route packets along optimal paths while adapting to changing network conditions. Routing protocols are then categorized as link-state or distance-vector protocols. The document also discusses the purposes and challenges of routing in wireless ad hoc networks, as well as requirements for ad hoc routing protocols. Finally, it provides an overview of different types of ad hoc unicast routing protocols, including table-driven, on-demand, and hybrid protocols.
Network devices operate at different layers and perform different functions to connect hardware on a computer network. They include hubs, repeaters, bridges, routers, brouters, switches, and gateways. Hubs connect multiple devices but don't filter data. Repeaters regenerate weak signals to extend transmission distances without amplifying signals. Bridges filter traffic between local area networks by MAC address. Routers route packets between networks using IP addresses. Brouters combine bridging and routing. Switches efficiently forward packets to the correct port. Gateways connect networks that use different protocols.
This document provides an overview of unicast routing protocols, including RIP, OSPF, and BGP. It begins by explaining key concepts like cost metrics and static versus dynamic routing tables. It then describes different types of routing protocols and how they support intra-domain and inter-domain routing. The document focuses on distance vector protocols like RIP and link state protocols like OSPF. It explains the Bellman-Ford and Dijkstra algorithms used to calculate optimal paths and build routing tables. It also covers topics like split horizon, poison reverse, and link state packet flooding in OSPF.
A simple definition of routing is "learning how to get from here to there.“
The term routing is used in a very strict sense to refer only to the process of obtaining and distributing information, but not to the process of using that information to actually get from one place to.
To discover and advertise paths from here to there and to actually move packets from here to there when necessary.
functions performed by OSI end systems and intermediate systems.
Routing is the act of moving information across an inter network from a source to a destination. Along the way, at least one intermediate node typically is encountered.
Routing is the process of finding a path from a source to every destination in the network.
Establish mutually consistent routing tables in every router in the Network.
When a packet is received by the router or is forwarded by the host, they both must make decisions as to how to send the packet.
To do this, the router and the host consult a database for information known as the routing table. This database is stored in RAM so that the lookup process is optimized
The document discusses distance vector routing, which is a type of dynamic routing. In distance vector routing, each router maintains a routing table showing the minimum distance to every other router in the network and the next hop to reach each destination. The routers periodically broadcast their routing tables to each other so that the tables can be updated to reflect the shortest paths. An example shows a network of five routers and their routing tables, with each table listing the shortest distance and next hop to reach every other router. Distance vector routing finds the least-cost route between any two routers by choosing the route with the minimum distance.
A router is a networking device that interconnects two or more computer networks and works at the network layer of the OSI model. It examines data packets and determines the best path to forward them to their destination. Routers maintain routing tables that contain information about available routes and their conditions. They can connect different network segments locally or globally. Routers allow access to resources across networks by selecting optimal paths and can change packet formats to match destination network requirements.
This document discusses wireless ad hoc and sensor networks and routing protocols. It begins by defining routing as the process of moving data packets from a source to destination, which is usually performed by routers. Common objectives of routing protocols are to route packets along optimal paths while adapting to changing network conditions. Routing protocols are then categorized as link-state or distance-vector protocols. The document also discusses the purposes and challenges of routing in wireless ad hoc networks, as well as requirements for ad hoc routing protocols. Finally, it provides an overview of different types of ad hoc unicast routing protocols, including table-driven, on-demand, and hybrid protocols.
Network devices operate at different layers and perform different functions to connect hardware on a computer network. They include hubs, repeaters, bridges, routers, brouters, switches, and gateways. Hubs connect multiple devices but don't filter data. Repeaters regenerate weak signals to extend transmission distances without amplifying signals. Bridges filter traffic between local area networks by MAC address. Routers route packets between networks using IP addresses. Brouters combine bridging and routing. Switches efficiently forward packets to the correct port. Gateways connect networks that use different protocols.
This document provides an overview of unicast routing protocols, including RIP, OSPF, and BGP. It begins by explaining key concepts like cost metrics and static versus dynamic routing tables. It then describes different types of routing protocols and how they support intra-domain and inter-domain routing. The document focuses on distance vector protocols like RIP and link state protocols like OSPF. It explains the Bellman-Ford and Dijkstra algorithms used to calculate optimal paths and build routing tables. It also covers topics like split horizon, poison reverse, and link state packet flooding in OSPF.
A simple definition of routing is "learning how to get from here to there.“
The term routing is used in a very strict sense to refer only to the process of obtaining and distributing information, but not to the process of using that information to actually get from one place to.
To discover and advertise paths from here to there and to actually move packets from here to there when necessary.
functions performed by OSI end systems and intermediate systems.
Routing is the act of moving information across an inter network from a source to a destination. Along the way, at least one intermediate node typically is encountered.
Routing is the process of finding a path from a source to every destination in the network.
Establish mutually consistent routing tables in every router in the Network.
When a packet is received by the router or is forwarded by the host, they both must make decisions as to how to send the packet.
To do this, the router and the host consult a database for information known as the routing table. This database is stored in RAM so that the lookup process is optimized
Network devices serve several key functions:
1. Separating and connecting networks or expanding network capacity through devices like repeaters, hubs, bridges, routers, and switches.
2. Enabling remote access through modems and other technologies.
3. Key devices include repeaters which regenerate signals, bridges which understand node addresses, switches which divide networks into logical channels, and routers which interconnect networks and determine optimal routes. Remote access devices like modems modulate digital signals for transmission over telephone lines to connect distant computers.
The document discusses routing algorithms used in computer networks. It describes how routing algorithms determine the path that packets take from source to destination. Dynamic routing algorithms adapt to changing network conditions by updating routing tables. Common dynamic algorithms include distance vector routing and link state routing. The document also covers challenges like routing in hierarchical networks, broadcast routing, multicast routing, and routing for mobile and ad-hoc networks.
Wide area networks connect smaller networks over large geographical areas. Packet switching is the dominant switching method used, breaking data into packets that are routed independently to their destination. There are two main types of packet switching: connection-oriented uses virtual circuits to establish dedicated paths for packets to follow, while connectionless treats each packet independently without pre-establishing paths. Packet switching provides more efficient use of network bandwidth compared to circuit switching.
There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
A routing algorithm determines the best path for data packets to travel between a source and destination on the Internet. This document discusses and compares different routing algorithms used within autonomous systems (ASes) and between ASes. It covers link-state algorithms like OSPF that use flooding to share full topology information, distance-vector algorithms like RIP that share routing tables with neighbors, and BGP which connects different ASes and allows policies to influence path selection.
This document describes a routing simulator project. It discusses the existing systems for routing, their drawbacks, and a proposed new system. The proposed system would simulate a network topology with routers and links. It would display statistics for each router like efficiency and packet size. Failed or down links and routers would be highlighted. The routing would be controlled by a speed controller and statistics recalculated every 500 milliseconds. The goals are to select optimal routes, function with low overhead, and quickly adapt to network changes. The project uses Java tools like the Java Development Kit and compiler to develop the simulator.
Routing and switching are key processes in computer networks. Routing involves selecting the optimal path for data transfer from source to destination using routers and routing algorithms. There are three main types of routing: static, dynamic, and default. Switching transfers information between networks using switches and occurs at the data link layer. There are different switching techniques, including circuit switching, packet switching, and message switching, as well as different switching modes and networks like datagram and virtual circuit networks.
A hub is a physical layer device that works with bits and broadcasts all traffic to all ports, creating one broadcast domain and collision domain. A switch is an intelligent layer 2 device that works with MAC addresses, maintains an address table, and can segment traffic into multiple collision domains based on the number of ports. Switches use store and forward, fragment free, or cut-through switching modes with different latency levels. Access, distribution, and core layer switches are used in a hierarchical design model with access switches connecting end devices and core switches connecting distribution switches for high-speed backbone traffic.
Network on a chip is an approach where the communication features of large-scale integrated systems are implemented on a single silicon chip. It reduces complexity in wiring design and provides better power, speed and reliability compared to other designs. Network on a chip uses switches and links to route messages from source to destination modules in a scalable, homogeneous switched fabric network. It improves power efficiency and allows for features like multi-topology support in complex system-on-chip designs.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
The document discusses various networking components:
1. Repeaters extend network cable length and reconstruct signals but do not understand packets.
2. Hubs and bridges operate on the data link layer, with bridges filtering packets between network segments.
3. Switches actively forward frames to ports like bridges but without collisions, using buffering or cut-through switching.
Routers use packet headers to choose optimal paths between networks and can link different types of networks, operating on the network layer. Gateways connect between different network types from the transport layer up.
Routing is the operation of transferring information transversely through an internetwork from a source to a destination. Alongside the approach, as a minimum one middle node normally is found. Routing is frequently compared with bridging, Copy the link given below and paste it in new browser window to get more information on Network Routing:- http://www.transtutors.com/homework-help/computer-science/network-routing.aspx
Routing is the process of finding the path to a destination network. When a host needs to communicate with another network, a router acts as a gateway between the networks. Routers maintain routing tables that contain routes defining where to forward packets based on the destination address. If a route exists in the routing table for the destination network, the router will forward the packet to the next hop router on the path. If no route exists, the packet cannot be forwarded and will be dropped.
Network devices such as hubs, repeaters, bridges, switches, routers, gateways, and brouters are used to establish connections between devices on a computer network. Hubs operate at the physical layer and send data to all connected devices. Repeaters regenerate weak signals between network segments. Bridges operate at the data link layer and filter packets between network segments. Switches operate at the data link and network layers, perform error checking, and improve performance over hubs. Routers operate at the network layer, connect LANs and WANs using IP addresses, and divide broadcast domains. Gateways connect networks using different protocols. Brouters combine the functions of bridges and routers to connect networks using different protocols.
Network devices like repeaters, hubs, bridges, switches, wireless access points, and routers were discussed.
Repeaters and hubs operate at the physical layer and broadcast signals to all ports. Bridges and switches operate at the data link layer and can filter traffic between specific ports based on MAC addresses. Wireless access points allow devices to connect to a network without wires. Network interface cards install into devices to connect them to a network. Routers operate at the network layer and can connect multiple networks and select the best path for traffic between networks.
This document discusses computer networks and their basic components. It describes the three common network modes: simplex, half-duplex, and full-duplex. It also outlines the five main network topologies: bus, ring, star, mesh and tree. Each topology is defined and its advantages and disadvantages are provided. The document serves as an introductory overview of computer networks.
The document discusses routing protocols in mobile ad hoc networks. It describes the characteristics of ad hoc networks and why routing is different compared to traditional networks due to factors like host mobility and dynamic topology. The document categorizes and explains examples of different types of routing protocols including table-driven, on-demand, and hybrid protocols. It provides examples of specific protocols like DSDV, AODV, DSR, and ZRP and compares their key aspects.
The document discusses mobile ad-hoc networks (MANETs) and routing protocols for MANETs. It begins with an introduction to MANETs, describing their characteristics such as lack of fixed infrastructure and dynamic topologies. It then covers several popular routing protocols for MANETs, including proactive protocols like DSDV, reactive protocols like DSR, and hybrid protocols like ZRP. For each protocol, it provides a brief overview of how the protocol works and its advantages and disadvantages.
Experimental Analysis Of On Demand Routing Protocolsmita gupta
The document discusses experimental analysis of on-demand routing protocols for mobile ad hoc networks. It provides an outline and introduces key terminologies for multi-hop networks, protocols, routers, hubs, switches, and network topologies. The literature review summarizes several research papers that analyze routing protocols like AODV, DSR, and DSDV using simulation tools to evaluate metrics such as packet delivery ratio, end-to-end delay, and network throughput under different mobility conditions. The problem statement indicates the document will experimentally analyze and compare the performance of on-demand routing protocols.
The document provides information about ad-hoc networks, including their characteristics, applications, design issues, and routing protocols. Some key points:
- Ad-hoc networks are infrastructure-less and use multi-hop wireless links between mobile nodes, requiring distributed routing protocols. They are suitable for situations requiring quick deployment like emergencies or military operations.
- Challenges for routing in ad-hoc networks include the dynamic topology, limited bandwidth and energy of nodes, and lack of a centralized entity. Traditional link-state and distance-vector routing protocols are examined.
- Popular link-state protocols like OSPF work by flooding link-state information to build a shared topology database and calculate the shortest path tree
Network devices serve several key functions:
1. Separating and connecting networks or expanding network capacity through devices like repeaters, hubs, bridges, routers, and switches.
2. Enabling remote access through modems and other technologies.
3. Key devices include repeaters which regenerate signals, bridges which understand node addresses, switches which divide networks into logical channels, and routers which interconnect networks and determine optimal routes. Remote access devices like modems modulate digital signals for transmission over telephone lines to connect distant computers.
The document discusses routing algorithms used in computer networks. It describes how routing algorithms determine the path that packets take from source to destination. Dynamic routing algorithms adapt to changing network conditions by updating routing tables. Common dynamic algorithms include distance vector routing and link state routing. The document also covers challenges like routing in hierarchical networks, broadcast routing, multicast routing, and routing for mobile and ad-hoc networks.
Wide area networks connect smaller networks over large geographical areas. Packet switching is the dominant switching method used, breaking data into packets that are routed independently to their destination. There are two main types of packet switching: connection-oriented uses virtual circuits to establish dedicated paths for packets to follow, while connectionless treats each packet independently without pre-establishing paths. Packet switching provides more efficient use of network bandwidth compared to circuit switching.
There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
A routing algorithm determines the best path for data packets to travel between a source and destination on the Internet. This document discusses and compares different routing algorithms used within autonomous systems (ASes) and between ASes. It covers link-state algorithms like OSPF that use flooding to share full topology information, distance-vector algorithms like RIP that share routing tables with neighbors, and BGP which connects different ASes and allows policies to influence path selection.
This document describes a routing simulator project. It discusses the existing systems for routing, their drawbacks, and a proposed new system. The proposed system would simulate a network topology with routers and links. It would display statistics for each router like efficiency and packet size. Failed or down links and routers would be highlighted. The routing would be controlled by a speed controller and statistics recalculated every 500 milliseconds. The goals are to select optimal routes, function with low overhead, and quickly adapt to network changes. The project uses Java tools like the Java Development Kit and compiler to develop the simulator.
Routing and switching are key processes in computer networks. Routing involves selecting the optimal path for data transfer from source to destination using routers and routing algorithms. There are three main types of routing: static, dynamic, and default. Switching transfers information between networks using switches and occurs at the data link layer. There are different switching techniques, including circuit switching, packet switching, and message switching, as well as different switching modes and networks like datagram and virtual circuit networks.
A hub is a physical layer device that works with bits and broadcasts all traffic to all ports, creating one broadcast domain and collision domain. A switch is an intelligent layer 2 device that works with MAC addresses, maintains an address table, and can segment traffic into multiple collision domains based on the number of ports. Switches use store and forward, fragment free, or cut-through switching modes with different latency levels. Access, distribution, and core layer switches are used in a hierarchical design model with access switches connecting end devices and core switches connecting distribution switches for high-speed backbone traffic.
Network on a chip is an approach where the communication features of large-scale integrated systems are implemented on a single silicon chip. It reduces complexity in wiring design and provides better power, speed and reliability compared to other designs. Network on a chip uses switches and links to route messages from source to destination modules in a scalable, homogeneous switched fabric network. It improves power efficiency and allows for features like multi-topology support in complex system-on-chip designs.
This presentation is about the introduction to network switch layer technology. A network switch is a device tha is used to connect different segments over the network.This ppt includes introduction to switch,types of switches or layer specification,advantages and disadvantages of switch..
I hope it will be very helpful for the engineering students and the others who are interested to search in deep about network switch.
The document discusses various networking components:
1. Repeaters extend network cable length and reconstruct signals but do not understand packets.
2. Hubs and bridges operate on the data link layer, with bridges filtering packets between network segments.
3. Switches actively forward frames to ports like bridges but without collisions, using buffering or cut-through switching.
Routers use packet headers to choose optimal paths between networks and can link different types of networks, operating on the network layer. Gateways connect between different network types from the transport layer up.
Routing is the operation of transferring information transversely through an internetwork from a source to a destination. Alongside the approach, as a minimum one middle node normally is found. Routing is frequently compared with bridging, Copy the link given below and paste it in new browser window to get more information on Network Routing:- http://www.transtutors.com/homework-help/computer-science/network-routing.aspx
Routing is the process of finding the path to a destination network. When a host needs to communicate with another network, a router acts as a gateway between the networks. Routers maintain routing tables that contain routes defining where to forward packets based on the destination address. If a route exists in the routing table for the destination network, the router will forward the packet to the next hop router on the path. If no route exists, the packet cannot be forwarded and will be dropped.
Network devices such as hubs, repeaters, bridges, switches, routers, gateways, and brouters are used to establish connections between devices on a computer network. Hubs operate at the physical layer and send data to all connected devices. Repeaters regenerate weak signals between network segments. Bridges operate at the data link layer and filter packets between network segments. Switches operate at the data link and network layers, perform error checking, and improve performance over hubs. Routers operate at the network layer, connect LANs and WANs using IP addresses, and divide broadcast domains. Gateways connect networks using different protocols. Brouters combine the functions of bridges and routers to connect networks using different protocols.
Network devices like repeaters, hubs, bridges, switches, wireless access points, and routers were discussed.
Repeaters and hubs operate at the physical layer and broadcast signals to all ports. Bridges and switches operate at the data link layer and can filter traffic between specific ports based on MAC addresses. Wireless access points allow devices to connect to a network without wires. Network interface cards install into devices to connect them to a network. Routers operate at the network layer and can connect multiple networks and select the best path for traffic between networks.
This document discusses computer networks and their basic components. It describes the three common network modes: simplex, half-duplex, and full-duplex. It also outlines the five main network topologies: bus, ring, star, mesh and tree. Each topology is defined and its advantages and disadvantages are provided. The document serves as an introductory overview of computer networks.
The document discusses routing protocols in mobile ad hoc networks. It describes the characteristics of ad hoc networks and why routing is different compared to traditional networks due to factors like host mobility and dynamic topology. The document categorizes and explains examples of different types of routing protocols including table-driven, on-demand, and hybrid protocols. It provides examples of specific protocols like DSDV, AODV, DSR, and ZRP and compares their key aspects.
The document discusses mobile ad-hoc networks (MANETs) and routing protocols for MANETs. It begins with an introduction to MANETs, describing their characteristics such as lack of fixed infrastructure and dynamic topologies. It then covers several popular routing protocols for MANETs, including proactive protocols like DSDV, reactive protocols like DSR, and hybrid protocols like ZRP. For each protocol, it provides a brief overview of how the protocol works and its advantages and disadvantages.
Experimental Analysis Of On Demand Routing Protocolsmita gupta
The document discusses experimental analysis of on-demand routing protocols for mobile ad hoc networks. It provides an outline and introduces key terminologies for multi-hop networks, protocols, routers, hubs, switches, and network topologies. The literature review summarizes several research papers that analyze routing protocols like AODV, DSR, and DSDV using simulation tools to evaluate metrics such as packet delivery ratio, end-to-end delay, and network throughput under different mobility conditions. The problem statement indicates the document will experimentally analyze and compare the performance of on-demand routing protocols.
The document provides information about ad-hoc networks, including their characteristics, applications, design issues, and routing protocols. Some key points:
- Ad-hoc networks are infrastructure-less and use multi-hop wireless links between mobile nodes, requiring distributed routing protocols. They are suitable for situations requiring quick deployment like emergencies or military operations.
- Challenges for routing in ad-hoc networks include the dynamic topology, limited bandwidth and energy of nodes, and lack of a centralized entity. Traditional link-state and distance-vector routing protocols are examined.
- Popular link-state protocols like OSPF work by flooding link-state information to build a shared topology database and calculate the shortest path tree
Mobile Adhoc Networks (MANETs) are peer-to-peer, multihop wireless networks where nodes are free to move and the network topology can change randomly. Routing in MANETs must be distributed and avoid broadcasts as much as possible due to limited resources and dynamic topologies. There are two main routing approaches - proactive protocols continuously evaluate routes while reactive protocols find routes on demand. Ad Hoc On-Demand Distance Vector (AODV) routing is a reactive protocol where a source node initiates a route discovery by broadcasting a route request to find destinations, and intermediate nodes reply with route replies to establish forward paths.
Routing algorithms in computer networks determine the best path for data transfer between nodes. There are two main types - non-adaptive algorithms which use static routes regardless of network conditions, and adaptive algorithms which can change routes dynamically based on conditions. Examples of routing algorithms include flooding, which broadcasts to all nodes, and link state routing which uses Dijkstra's algorithm to calculate the most efficient paths based on information shared between nodes.
Module 3 Part B - computer networks module 2 pptanushaj46
The document discusses several key issues in network layer design including store-and-forward packet switching, services provided to the transport layer, implementation of connectionless and connection-oriented services, and comparison of virtual-circuit and datagram networks. It also covers routing algorithms such as shortest path, flooding, distance vector, link state, and hierarchical routing.
Dynamic routing is a networking technique
that provides optimal data routing. Unlike
static routing, dynamic routing enables routers
to select paths according to real-time logical
network layout changes. ... The most popular
are Routing Information Protocol (RIP) and
Open Shortest Path First (OSPF).
ip routing and troubleshooting algorithmsVo Cong Minh
Types of MANET ROUTING.
Objectives
● Present the basic principles of routing in general
packet-switched networks
● Describe the basic principles of mobile ad hoc
networks (MANETs) and MANET routing protocols
● Describe AODV and OLSR as example MANET
routing protocols
● Discuss issues related to mobile ad hoc networks
and MANET routing protocols
This document discusses ad-hoc and mobile ad-hoc networks (MANETs). It defines an ad-hoc network as a wireless local area network where devices are part of the network only during communication sessions. A MANET is defined as a self-configuring network of mobile routers connected by wireless links. The document outlines the network architecture of MANETs and discusses applications, characteristics, requirements, and challenges of routing in these networks. It describes different types of routing protocols for MANETs including proactive, reactive, table-driven, and hybrid protocols.
The document discusses distance vector routing, which is a type of dynamic routing. In distance vector routing, each router maintains a routing table showing the minimum distance to every other router in the network and the next hop to reach each destination. The routers periodically broadcast their routing tables to each other so that the tables can be updated to reflect the shortest paths. An example shows a network of five routers and their routing tables, which list the shortest distance and next hop for each destination router. Distance vector routing finds the least-cost route between any two routers by choosing the route with the minimum distance in the routing tables.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
This document discusses wireless sensor network protocols. It covers multi-hop routing, where sensor nodes act as relays to propagate data to the base station. Common routing protocols are discussed, including reactive protocols like AODV that establish routes on demand and proactive protocols like DSDV that maintain routing tables with periodic updates. MAC protocols help manage access to the shared wireless medium and examples covered include S-MAC and B-MAC. The OSI model layers and responsibilities are also summarized.
Lecture number 5 Theory.pdf(machine learning)ZainabShahzad9
This document discusses computer networks and routing protocols. It provides an overview of key topics including:
- The difference between routed protocols like IPv4 and IPv6 that transfer user data, and routing protocols like RIP and OSPF that send route update packets.
- Common routing and routed protocols including IGPs, EGPs, RIP, OSPF, EIGRP and BGP.
- Desirable properties of routing algorithms such as correctness, robustness, stability, fairness and efficiency.
- Types of routing including fixed, flooding, dynamic and default routing. Characteristics of distance vector and link state routing protocols are also outlined.
This document compares the AODV and DSR MANET routing protocols. It provides background on MANETs and categories of routing protocols. It then describes the key features of the AODV and DSR reactive protocols. The document outlines a methodology to simulate scenarios using these two protocols in NS2 and compare their performance based on throughput and packet delivery ratio. It proposes improving AODV security using cryptography for future work.
Mobile Ad Hoc Network of Simulation Framework Based on OPNETateeq ateeq
This document discusses mobile ad hoc networks (MANETs) and their simulation in OPNET. It defines MANETs as wireless networks without centralized administration composed of nodes that can freely and dynamically self-organize. The key characteristics of MANETs are that nodes are equal, there is no central control, and topology is dynamic. Common routing protocols for MANETs include DSDV, AODV, DSR. The document outlines modeling MANETs in OPNET including the network model with nodes, node model with routing/wireless modules, and analyzing performance metrics like delay from simulation results.
The network layer provides logical communication between hosts. It has a data plane that forwards datagrams between router interfaces and a control plane that determines the routing paths between sources and destinations using routing algorithms. The key functions of the network layer are forwarding datagrams at routers according to forwarding tables, and routing to determine the paths using routing algorithms in the control plane. IPv4 and IPv6 are the main network layer protocols, with IPv6 addressing limitations of IPv4 and introducing features like anycast addressing.
routing table ,What is routing ? , what is static routing , what is dynamic routing , types of routing , routing protocols , routing strategy , Download Routing pdf , Download routing ppt , download routing notes , paper on routing
To Download Complete Documentation Visit My Blog
http://studyofcs.blogspot.com/2015/06/what-is-routerwhat-is-routing.html
Download completer BS Computer Science Degree Study Data
http://studyofcs.blogspot.com/p/bs.html
Et3003 sem2-1314-9 network layers vi (routing protocols)Tutun Juhana
This document provides a summary of unicast routing protocols including RIP, OSPF, and BGP. It discusses key concepts in routing such as metrics, static versus dynamic routing tables, and interior versus exterior routing protocols. For distance vector protocols like RIP, it covers topics like the Bellman-Ford algorithm, split horizon, and convergence issues. For link state protocols like OSPF, it describes how routers flood the network with link state advertisements and use the Dijkstra algorithm to calculate shortest paths. It also provides an overview of path vector routing and BGP, including attributes, path selection, and the roles of different types of autonomous systems.
What are the only force you have become too much of work and all I can be done by my name Vishnu namaste I have to do you have to do you have to do you have to do you have to.
This document defines and provides examples of partial order relations. It discusses the key properties of a partial order being reflexive, antisymmetric, and transitive. Examples are given to show that the relation of greater than or equal to (≥) forms a partial order on integers, while division (|) forms a partial order on positive integers. The document also discusses comparability, total orders, well-ordered sets, and Hasse diagrams which are used to visually represent partial orders.
The primary focus of the PPT is to develop the initial skill of using HTML & CSS programming language to develop a static web page like Portfolio.
This PowerPoint Presentation is of Front End Design.
This PPT will give an entire view on developing the static web page.
This PPT covers the entire topic of Macro Assembler. This Includes the topic such as design of a macro assembler, 3 passes of macro assembler etc.
This is the PPT of System Programming.
This is an PPT about the Icons that are used in Graphical User Interface, the Images that are used for developing a web page & the use of multimedia for various purpose.
This is an PowerPoint Presentation of Front End Design.
This PPT describes about the "Project Tracking" activity & statistical process control at Infosys.
It covers the entire topic such as project tracking, activities tracking, defect tracking, issue tracking, etc.
It covers all main activity of SPC such as SPC analysis, control chart for SPC etc.
This PowerPoint presentation is of "Software Project Management".
This is the PowerPoint presentation on the topic "Peephole Optimization". This presentation covers the entire topic of peephole optimization.
This PowerPoint presentation is of Compiler Design.
The document discusses the design of a two-pass macro preprocessor. In pass one, macro definitions are identified and stored in a macro definition table along with their parameters. A macro name table is also created. In pass two, macro calls are identified and replaced by retrieving the corresponding macro definition and substituting actual parameters for formal parameters using an argument list array. Databases like the macro definition table, macro name table, and argument list array are used to store and retrieve macro information to enable expansion of macro calls. The algorithm scans the input sequentially in each pass to process macro definitions and calls.
This document discusses Vehicular Ad-Hoc Networks (VANETs) which allow vehicles to communicate with each other to share safety and traffic information. It outlines the architecture of VANETs including vehicle-to-vehicle and vehicle-to-infrastructure communication. The document also discusses security issues in VANETs such as bogus information attacks, identity disclosure, and denial-of-service attacks. It proposes the use of authentication, message integrity, privacy, traceability and availability to address these security requirements. The document assumes that roadways are divided into regions managed by trusted roadside infrastructure units.
This document discusses breadth-first search (BFS) and depth-first search (DFS) algorithms for traversing graphs. It provides examples of how BFS uses a queue to search all neighbors at the current level before moving to the next level, while DFS uses a stack and explores each branch as far as possible before backtracking. The document compares key differences between BFS and DFS such as their time and space complexities, usefulness for finding shortest paths, and whether queues or stacks are used. Application areas for each algorithm are also mentioned.
Secant method in Numerical & Statistical MethodMeghaj Mallick
This is an PPT of a Mathematical Paper i.e Numerical & Statistical Method. It contsin the following topic such as "Secant method in Numerical & Statistical Method ".
This document discusses communication and barriers to effective communication. It defines communication as the exchange of information, ideas, thoughts and feelings between individuals through speech, writing and behavior. It then outlines some common barriers to communication, including badly expressed messages, loss in transmission, semantic problems, over or under communication, prejudices on the sender's part, and poor attention, inattentive listening, evaluation, interests/attitudes and refutation on the receiver's part. The document suggests identifying and addressing such barriers to improve communication.
This document provides an introduction to hashing and hash tables. It defines hashing as a data structure that uses a hash function to map values to keys for fast retrieval. It gives an example of mapping list values to array indices using modulo. The document discusses hash tables and their operations of search, insert and delete in O(1) time. It describes collisions that occur during hash function mapping and resolution techniques like separate chaining and linear probing.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Routing in MANET
1. BIRLA INSTITUTE OF TECHNOLOGY,MESRA
JAIPUR CAMPUS
TOPIC: ROUTING IN MANET
BY:
MEGHAJ KUMAR MALLICK
(MCA/25017/18)
2ND YEAR, 4TH SEMESTER
2. INTRODUCTION
• Routing is the process of selecting paths in a network along
which to send data packets. An ad hoc routing protocol is a
convention, or standard, that controls how nodes decide
which way to route packets between computing devices in a
mobile ad-hoc network.
• A mobile ad hoc network (MANET), sometimes called a
mobile mesh network, is a self- configuring network of mobile
devices connected by wireless links.
• Ad hoc networks can be built around any wireless technology,
including infrared, radio frequency (RF), global positioning
system (GPS), and so on
3. ROUTING
● Routing consists of two fundamental steps
■
■ Forwarding packets to the next hop (from an input interface
to an output interface in a traditional wired network)
Determining how to forward packets (building a routing table
or specifying a route)
● Forwarding packets is easy, but knowing where to
forward packets (especially efficiently) is hard
■
■
■
■
■
Reach the destination
Minimize the number of hops (path length)
Minimize delay
Minimize packet loss
Minimize cost
4. AD-HOC NETWORKS
• Two types of wireless network:
– Infrastructured
• the mobile node can move while communicating
• the base stations are fixed
• as the node goes out of the range of a base station, it gets
into the range of another base station
– Infrastructureless or ad-hoc
• the mobile node can move while communicating
• there are no fixed base stations
• all the nodes in the network need to act as routers
– In Latin “ad-hoc” literally means “for this purpose
only”. Then an ad-hoc network can be regarded as
“spontaneous network”
7. – Single hop –
nodes are in their
reach area and
can communicate
directly
●
Multi hop – some nodes are far
and cannot communicate
directly. The traffic has to be
forwarded by other intermediate
nodes.
CLASSIFICATION OF AD-HOC NETWORKS
8. • Characteristics of an ad-hoc network
– Collection of mobile nodes forming a
temporary network
– Network topology changes frequently and
unpredictably
– No centralized administration or standard
support services
– Each host is an independent router
– Hosts use wireless RF transceivers as
network interface
– Number of nodes 10 to 100 or at most
1000
CHARACTERISTICS
9. • Why we need ad-hoc networks?
●
Setting up of fixed access points and backbone
infrastructure is not always viable
●
Infrastructure may not be present in a disaster area
or war zone
Infrastructure may not be practical for short-range
radios; Bluetooth (range ~ 10m)
●
●
Do not need backbone infrastructure support
●
Are easy to deploy
Useful when infrastructure is absent, destroyed or
impractical
●
NEED OF AD-HOC NETWORK
10. EXAMPLE
Example of applications of ad hoc networks:
●
Emergency search-and-rescue operations.
Meetings or conventions in which persons wish to
quickly share information.
Data acquisition operations in inhospitable terrain.
Local area networks in the future.
●
●
11. ROUTING DECISION POINT
● Source routing
■
■ Sender determines a route and specifies it in the packet
header
Supported in IP, although not the typical routing scheme
● Hop-by-hop (datagram) routing
■
■ A routing decision is made at each forwarding point (at each
router)
Standard routing scheme for IP
● Virtual circuit routing
■
■
Determine and configure a path prior to sending first packet
Used in ATM (and analogous to voice telephone system)
12. ROUTING TABLE
● A routing table contains information to determine
how to forward packets
■
■
■ Source routing: Routing table is used to determine route to
the destination to be specified in the packet
Hop-by-hop routing: Routing table is used to determine the
next hop for a given destination
Virtual circuit routing: Routing table used to determine path
to configure through the network
● A distributed algorithm is required to build the
routing table
■
■
Distance vector algorithms
Link state algorithms
13. DISTANCE VECTOR ALGORITHMS
● “Distance” of each link in the network is a metric that
is to be minimized
■
■
Each link may have “distance” 1 to minimize hop count
Algorithm attempts to minimize distance
● The routing table at each node…
■
■
Specifies the next hop for each destination
Specifies the distance to that destination
● Neighbors can exchange routing table information to
find a route (or a better route) to a destination
14. LINK-STATE ALGORITHMS
●
●
Each node shares its link information so that all
nodes can build a map of the full network topology
Link information is updated when a link changes
state (goes up or down)
■ Link state determined by sending small “hello” packets to
neighbors
● Given full topology information, a node can
determine the next best hop or a route from the
source
15. MANET ROUTING
● Nodes must determine how to forward packets
■
■
Source routing: Routing decision is made at the sender
Hop-by-hop routing: Routing decision is made at each
intermediate node
● Difficult to achieve good performance
■
■
■
■
Routes change over time due to node mobility
Best to avoid long delays when first sending packets
Best to reduce overhead of route discovery and
maintenance
Want to involve as many nodes as possible – to find better
paths and reduce likelihood of partitions
16. MANET ROUTING APPROACHES
● Decision time
■
■
Proactive or table-driven – maintain routing tables
Reactive or on-demand – determine routing on an as-needed
basis
● Network structure
■
■ Hierarchical – impose a hierarchy on a collection of nodes
and reflect this hierarchy in the routing algorithm
○ May use a proactive protocol for routing within a cluster
or zone
○ May use a reactive protocol for routing between
distinguished “cluster heads”
Non-hierarchical – make decisions among all nodes
18. COMMON FEATURES
● MANET routing protocols must…
■
■
Discover a path from source to destination
Maintain that path (e.g., if an intermediate node moves and
breaks the path)
■ Define mechanisms to exchange routing information
● Reactive protocols
■
■ Discover a path when a packet needs to be transmitted and
no known path exists
Attempt to alter the path when a routing failure occurs
● Proactive protocols
■
■
Find paths, in advance, for all source-pair destinations
Periodically exchange routing information to maintain paths
19. • Is it possible to use standard routing
protocols?
● Distance-vector protocols
●
● Slow convergence due to “Count to Infinity”
Problem
Creates loops during node failure, network
partition or congestion
●
Link state protocols
●
● Use flooding technique and create excessive
traffic and control overhead
Require a lot of processor power and therefore
high power consumption
PROBLEMS WITH ROUTING
20. PROBLEMS WITH ROUTING
• Limitations of the Wireless Network
● packet loss due to transmission errors
variable capacity links
frequent disconnections/partitions
limited communication bandwidth
Broadcast nature of the communications
●
●
●
●
• Limitations Imposed by Mobility
●
dynamically changing topologies/routes
lack of mobility awareness by
system/applications
●
• Limitations of the Mobile Computer
●
short battery lifetime