SlideShare a Scribd company logo
BIRLA INSTITUTE OF TECHNOLOGY,MESRA
JAIPUR CAMPUS
TOPIC: ROUTING IN MANET
BY:
MEGHAJ KUMAR MALLICK
(MCA/25017/18)
2ND YEAR, 4TH SEMESTER
INTRODUCTION
• Routing is the process of selecting paths in a network along
which to send data packets. An ad hoc routing protocol is a
convention, or standard, that controls how nodes decide
which way to route packets between computing devices in a
mobile ad-hoc network.
• A mobile ad hoc network (MANET), sometimes called a
mobile mesh network, is a self- configuring network of mobile
devices connected by wireless links.
• Ad hoc networks can be built around any wireless technology,
including infrared, radio frequency (RF), global positioning
system (GPS), and so on
ROUTING
● Routing consists of two fundamental steps
■
■ Forwarding packets to the next hop (from an input interface
to an output interface in a traditional wired network)
Determining how to forward packets (building a routing table
or specifying a route)
● Forwarding packets is easy, but knowing where to
forward packets (especially efficiently) is hard
■
■
■
■
■
Reach the destination
Minimize the number of hops (path length)
Minimize delay
Minimize packet loss
Minimize cost
AD-HOC NETWORKS
• Two types of wireless network:
– Infrastructured
• the mobile node can move while communicating
• the base stations are fixed
• as the node goes out of the range of a base station, it gets
into the range of another base station
– Infrastructureless or ad-hoc
• the mobile node can move while communicating
• there are no fixed base stations
• all the nodes in the network need to act as routers
– In Latin “ad-hoc” literally means “for this purpose
only”. Then an ad-hoc network can be regarded as
“spontaneous network”
• Infrastruct ured network
PDA
Pen computer
Radio tower
Laptop computer
Infrastructure
(Wired line)
Radio tower
Desktop computer
Laptop computer
AD-HOC NETWORKS
• Infrastructurless (ad-hoc) network or
MANET (Mobile Ad-hoc NETwork)
AD-HOC NETWORKS
PDA
Laptop computer
Laptop computer
Pen computer
PDA
– Single hop –
nodes are in their
reach area and
can communicate
directly
●
Multi hop – some nodes are far
and cannot communicate
directly. The traffic has to be
forwarded by other intermediate
nodes.
CLASSIFICATION OF AD-HOC NETWORKS
• Characteristics of an ad-hoc network
– Collection of mobile nodes forming a
temporary network
– Network topology changes frequently and
unpredictably
– No centralized administration or standard
support services
– Each host is an independent router
– Hosts use wireless RF transceivers as
network interface
– Number of nodes 10 to 100 or at most
1000
CHARACTERISTICS
• Why we need ad-hoc networks?
●
Setting up of fixed access points and backbone
infrastructure is not always viable
●
Infrastructure may not be present in a disaster area
or war zone
Infrastructure may not be practical for short-range
radios; Bluetooth (range ~ 10m)
●
●
Do not need backbone infrastructure support
●
Are easy to deploy
Useful when infrastructure is absent, destroyed or
impractical
●
NEED OF AD-HOC NETWORK
EXAMPLE
Example of applications of ad hoc networks:
●
Emergency search-and-rescue operations.
Meetings or conventions in which persons wish to
quickly share information.
Data acquisition operations in inhospitable terrain.
Local area networks in the future.
●
●
ROUTING DECISION POINT
● Source routing
■
■ Sender determines a route and specifies it in the packet
header
Supported in IP, although not the typical routing scheme
● Hop-by-hop (datagram) routing
■
■ A routing decision is made at each forwarding point (at each
router)
Standard routing scheme for IP
● Virtual circuit routing
■
■
Determine and configure a path prior to sending first packet
Used in ATM (and analogous to voice telephone system)
ROUTING TABLE
● A routing table contains information to determine
how to forward packets
■
■
■ Source routing: Routing table is used to determine route to
the destination to be specified in the packet
Hop-by-hop routing: Routing table is used to determine the
next hop for a given destination
Virtual circuit routing: Routing table used to determine path
to configure through the network
● A distributed algorithm is required to build the
routing table
■
■
Distance vector algorithms
Link state algorithms
DISTANCE VECTOR ALGORITHMS
● “Distance” of each link in the network is a metric that
is to be minimized
■
■
Each link may have “distance” 1 to minimize hop count
Algorithm attempts to minimize distance
● The routing table at each node…
■
■
Specifies the next hop for each destination
Specifies the distance to that destination
● Neighbors can exchange routing table information to
find a route (or a better route) to a destination
LINK-STATE ALGORITHMS
●
●
Each node shares its link information so that all
nodes can build a map of the full network topology
Link information is updated when a link changes
state (goes up or down)
■ Link state determined by sending small “hello” packets to
neighbors
● Given full topology information, a node can
determine the next best hop or a route from the
source
MANET ROUTING
● Nodes must determine how to forward packets
■
■
Source routing: Routing decision is made at the sender
Hop-by-hop routing: Routing decision is made at each
intermediate node
● Difficult to achieve good performance
■
■
■
■
Routes change over time due to node mobility
Best to avoid long delays when first sending packets
Best to reduce overhead of route discovery and
maintenance
Want to involve as many nodes as possible – to find better
paths and reduce likelihood of partitions
MANET ROUTING APPROACHES
● Decision time
■
■
Proactive or table-driven – maintain routing tables
Reactive or on-demand – determine routing on an as-needed
basis
● Network structure
■
■ Hierarchical – impose a hierarchy on a collection of nodes
and reflect this hierarchy in the routing algorithm
○ May use a proactive protocol for routing within a cluster
or zone
○ May use a reactive protocol for routing between
distinguished “cluster heads”
Non-hierarchical – make decisions among all nodes
TYPES OF MANET ROUTING
MANET Routing Protocols
Hybrid
Proactive Reactive
Example:
OLSR
Example:
AODV
COMMON FEATURES
● MANET routing protocols must…
■
■
Discover a path from source to destination
Maintain that path (e.g., if an intermediate node moves and
breaks the path)
■ Define mechanisms to exchange routing information
● Reactive protocols
■
■ Discover a path when a packet needs to be transmitted and
no known path exists
Attempt to alter the path when a routing failure occurs
● Proactive protocols
■
■
Find paths, in advance, for all source-pair destinations
Periodically exchange routing information to maintain paths
• Is it possible to use standard routing
protocols?
● Distance-vector protocols
●
● Slow convergence due to “Count to Infinity”
Problem
Creates loops during node failure, network
partition or congestion
●
Link state protocols
●
● Use flooding technique and create excessive
traffic and control overhead
Require a lot of processor power and therefore
high power consumption
PROBLEMS WITH ROUTING
PROBLEMS WITH ROUTING
• Limitations of the Wireless Network
● packet loss due to transmission errors
variable capacity links
frequent disconnections/partitions
limited communication bandwidth
Broadcast nature of the communications
●
●
●
●
• Limitations Imposed by Mobility
●
dynamically changing topologies/routes
lack of mobility awareness by
system/applications
●
• Limitations of the Mobile Computer
●
short battery lifetime
Routing in MANET

More Related Content

What's hot

Network devices
Network devicesNetwork devices
Network devices
Gopal Krishna
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
Haripritha
 
Computer networks-WAN
Computer networks-WANComputer networks-WAN
Computer networks-WAN
Crystal Rose
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
Sudhasini Baskaran
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
MoctardOLOULADE
 
Manet
ManetManet
Routing simulator
Routing simulatorRouting simulator
Routing simulator
arun prakash
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
Aashif Raza
 
Switch
SwitchSwitch
Network on chip by shoeb
Network on chip by shoebNetwork on chip by shoeb
Network on chip by shoeb
Shoeb Ahmed
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
CYBERINTELLIGENTS
 
Network switch
Network switchNetwork switch
Network switch
Ravinder Kaur
 
Acn Experiment No 2
Acn Experiment No 2Acn Experiment No 2
Acn Experiment No 2
Garima Singh
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
Transweb Global Inc
 
routing
routingrouting
routing
sheanbaylon
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
KarthicaMarasamy
 
Network hardware essentials Lec#3
Network hardware essentials Lec#3Network hardware essentials Lec#3
Network hardware essentials Lec#3
Punjab and Superior College, Pakpattan
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
wahab2433
 
Ad Hoc
Ad HocAd Hoc

What's hot (19)

Network devices
Network devicesNetwork devices
Network devices
 
Presentation 2
Presentation 2Presentation 2
Presentation 2
 
Computer networks-WAN
Computer networks-WANComputer networks-WAN
Computer networks-WAN
 
Connecting devices
Connecting devicesConnecting devices
Connecting devices
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Manet
ManetManet
Manet
 
Routing simulator
Routing simulatorRouting simulator
Routing simulator
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
Switch
SwitchSwitch
Switch
 
Network on chip by shoeb
Network on chip by shoebNetwork on chip by shoeb
Network on chip by shoeb
 
Day 9 routing
Day 9 routingDay 9 routing
Day 9 routing
 
Network switch
Network switchNetwork switch
Network switch
 
Acn Experiment No 2
Acn Experiment No 2Acn Experiment No 2
Acn Experiment No 2
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
routing
routingrouting
routing
 
Network (Hub,switches)
Network  (Hub,switches)Network  (Hub,switches)
Network (Hub,switches)
 
Network hardware essentials Lec#3
Network hardware essentials Lec#3Network hardware essentials Lec#3
Network hardware essentials Lec#3
 
NETWORK TOPOLOGY
NETWORK TOPOLOGYNETWORK TOPOLOGY
NETWORK TOPOLOGY
 
Ad Hoc
Ad HocAd Hoc
Ad Hoc
 

Similar to Routing in MANET

unit-4
unit-4 unit-4
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
smita gupta
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
karthiksmart21
 
manet.pdf
manet.pdfmanet.pdf
manet.pdf
JJospinJeya
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
Mugabo4
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
anushaj46
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
ajeela mushtaq
 
ip routing and troubleshooting algorithms
ip routing and troubleshooting algorithmsip routing and troubleshooting algorithms
ip routing and troubleshooting algorithms
Vo Cong Minh
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
BinyamBekeleMoges
 
Golu
GoluGolu
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
MohitKumarSingh71
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
ZainabShahzad9
 
Manet ppt
Manet pptManet ppt
Manet ppt
sandeep Kaur
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
ateeq ateeq
 
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
PocketRocketDC
 
computer communications
computer communicationscomputer communications
computer communications
JAYASHSINGHRA2111003
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
Mohsin Ali
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
AayushMishra89
 

Similar to Routing in MANET (20)

unit-4
unit-4 unit-4
unit-4
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
manet.pdf
manet.pdfmanet.pdf
manet.pdf
 
Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1Routing algorithms mehodology materials doc1
Routing algorithms mehodology materials doc1
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
 
Dynamic routing
Dynamic routingDynamic routing
Dynamic routing
 
ip routing and troubleshooting algorithms
ip routing and troubleshooting algorithmsip routing and troubleshooting algorithms
ip routing and troubleshooting algorithms
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
 
Golu
GoluGolu
Golu
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Lecture number 5 Theory.pdf(machine learning)
Lecture  number  5 Theory.pdf(machine learning)Lecture  number  5 Theory.pdf(machine learning)
Lecture number 5 Theory.pdf(machine learning)
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNETMobile Ad Hoc Network of Simulation Framework Based on OPNET
Mobile Ad Hoc Network of Simulation Framework Based on OPNET
 
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx06.CS2005-NetworkLayer-2021_22(1) (1).pptx
06.CS2005-NetworkLayer-2021_22(1) (1).pptx
 
computer communications
computer communicationscomputer communications
computer communications
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 

More from Meghaj Mallick

24 partial-orderings
24 partial-orderings24 partial-orderings
24 partial-orderings
Meghaj Mallick
 
PORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSSPORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSS
Meghaj Mallick
 
Introduction to Software Testing
Introduction to Software TestingIntroduction to Software Testing
Introduction to Software Testing
Meghaj Mallick
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System Programming
Meghaj Mallick
 
MACRO ASSEBLER
MACRO ASSEBLERMACRO ASSEBLER
MACRO ASSEBLER
Meghaj Mallick
 
Icons, Image & Multimedia
Icons, Image & MultimediaIcons, Image & Multimedia
Icons, Image & Multimedia
Meghaj Mallick
 
Project Tracking & SPC
Project Tracking & SPCProject Tracking & SPC
Project Tracking & SPC
Meghaj Mallick
 
Peephole Optimization
Peephole OptimizationPeephole Optimization
Peephole Optimization
Meghaj Mallick
 
Macro assembler
 Macro assembler Macro assembler
Macro assembler
Meghaj Mallick
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
Meghaj Mallick
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
Meghaj Mallick
 
Text Mining of Twitter in Data Mining
Text Mining of Twitter in Data MiningText Mining of Twitter in Data Mining
Text Mining of Twitter in Data Mining
Meghaj Mallick
 
DFS & BFS in Computer Algorithm
DFS & BFS in Computer AlgorithmDFS & BFS in Computer Algorithm
DFS & BFS in Computer Algorithm
Meghaj Mallick
 
Software Development Method
Software Development MethodSoftware Development Method
Software Development Method
Meghaj Mallick
 
Secant method in Numerical & Statistical Method
Secant method in Numerical & Statistical MethodSecant method in Numerical & Statistical Method
Secant method in Numerical & Statistical Method
Meghaj Mallick
 
Motivation in Organization
Motivation in OrganizationMotivation in Organization
Motivation in Organization
Meghaj Mallick
 
Communication Skill
Communication SkillCommunication Skill
Communication Skill
Meghaj Mallick
 
Partial-Orderings in Discrete Mathematics
 Partial-Orderings in Discrete Mathematics Partial-Orderings in Discrete Mathematics
Partial-Orderings in Discrete Mathematics
Meghaj Mallick
 
Hashing In Data Structure
Hashing In Data Structure Hashing In Data Structure
Hashing In Data Structure
Meghaj Mallick
 
Complexity Analysis of Recursive Function
Complexity Analysis of Recursive FunctionComplexity Analysis of Recursive Function
Complexity Analysis of Recursive Function
Meghaj Mallick
 

More from Meghaj Mallick (20)

24 partial-orderings
24 partial-orderings24 partial-orderings
24 partial-orderings
 
PORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSSPORTFOLIO BY USING HTML & CSS
PORTFOLIO BY USING HTML & CSS
 
Introduction to Software Testing
Introduction to Software TestingIntroduction to Software Testing
Introduction to Software Testing
 
Introduction to System Programming
Introduction to System ProgrammingIntroduction to System Programming
Introduction to System Programming
 
MACRO ASSEBLER
MACRO ASSEBLERMACRO ASSEBLER
MACRO ASSEBLER
 
Icons, Image & Multimedia
Icons, Image & MultimediaIcons, Image & Multimedia
Icons, Image & Multimedia
 
Project Tracking & SPC
Project Tracking & SPCProject Tracking & SPC
Project Tracking & SPC
 
Peephole Optimization
Peephole OptimizationPeephole Optimization
Peephole Optimization
 
Macro assembler
 Macro assembler Macro assembler
Macro assembler
 
Architecture and security in Vanet PPT
Architecture and security in Vanet PPTArchitecture and security in Vanet PPT
Architecture and security in Vanet PPT
 
Design Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software EngineeringDesign Model & User Interface Design in Software Engineering
Design Model & User Interface Design in Software Engineering
 
Text Mining of Twitter in Data Mining
Text Mining of Twitter in Data MiningText Mining of Twitter in Data Mining
Text Mining of Twitter in Data Mining
 
DFS & BFS in Computer Algorithm
DFS & BFS in Computer AlgorithmDFS & BFS in Computer Algorithm
DFS & BFS in Computer Algorithm
 
Software Development Method
Software Development MethodSoftware Development Method
Software Development Method
 
Secant method in Numerical & Statistical Method
Secant method in Numerical & Statistical MethodSecant method in Numerical & Statistical Method
Secant method in Numerical & Statistical Method
 
Motivation in Organization
Motivation in OrganizationMotivation in Organization
Motivation in Organization
 
Communication Skill
Communication SkillCommunication Skill
Communication Skill
 
Partial-Orderings in Discrete Mathematics
 Partial-Orderings in Discrete Mathematics Partial-Orderings in Discrete Mathematics
Partial-Orderings in Discrete Mathematics
 
Hashing In Data Structure
Hashing In Data Structure Hashing In Data Structure
Hashing In Data Structure
 
Complexity Analysis of Recursive Function
Complexity Analysis of Recursive FunctionComplexity Analysis of Recursive Function
Complexity Analysis of Recursive Function
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

Routing in MANET

  • 1. BIRLA INSTITUTE OF TECHNOLOGY,MESRA JAIPUR CAMPUS TOPIC: ROUTING IN MANET BY: MEGHAJ KUMAR MALLICK (MCA/25017/18) 2ND YEAR, 4TH SEMESTER
  • 2. INTRODUCTION • Routing is the process of selecting paths in a network along which to send data packets. An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad-hoc network. • A mobile ad hoc network (MANET), sometimes called a mobile mesh network, is a self- configuring network of mobile devices connected by wireless links. • Ad hoc networks can be built around any wireless technology, including infrared, radio frequency (RF), global positioning system (GPS), and so on
  • 3. ROUTING ● Routing consists of two fundamental steps ■ ■ Forwarding packets to the next hop (from an input interface to an output interface in a traditional wired network) Determining how to forward packets (building a routing table or specifying a route) ● Forwarding packets is easy, but knowing where to forward packets (especially efficiently) is hard ■ ■ ■ ■ ■ Reach the destination Minimize the number of hops (path length) Minimize delay Minimize packet loss Minimize cost
  • 4. AD-HOC NETWORKS • Two types of wireless network: – Infrastructured • the mobile node can move while communicating • the base stations are fixed • as the node goes out of the range of a base station, it gets into the range of another base station – Infrastructureless or ad-hoc • the mobile node can move while communicating • there are no fixed base stations • all the nodes in the network need to act as routers – In Latin “ad-hoc” literally means “for this purpose only”. Then an ad-hoc network can be regarded as “spontaneous network”
  • 5. • Infrastruct ured network PDA Pen computer Radio tower Laptop computer Infrastructure (Wired line) Radio tower Desktop computer Laptop computer AD-HOC NETWORKS
  • 6. • Infrastructurless (ad-hoc) network or MANET (Mobile Ad-hoc NETwork) AD-HOC NETWORKS PDA Laptop computer Laptop computer Pen computer PDA
  • 7. – Single hop – nodes are in their reach area and can communicate directly ● Multi hop – some nodes are far and cannot communicate directly. The traffic has to be forwarded by other intermediate nodes. CLASSIFICATION OF AD-HOC NETWORKS
  • 8. • Characteristics of an ad-hoc network – Collection of mobile nodes forming a temporary network – Network topology changes frequently and unpredictably – No centralized administration or standard support services – Each host is an independent router – Hosts use wireless RF transceivers as network interface – Number of nodes 10 to 100 or at most 1000 CHARACTERISTICS
  • 9. • Why we need ad-hoc networks? ● Setting up of fixed access points and backbone infrastructure is not always viable ● Infrastructure may not be present in a disaster area or war zone Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m) ● ● Do not need backbone infrastructure support ● Are easy to deploy Useful when infrastructure is absent, destroyed or impractical ● NEED OF AD-HOC NETWORK
  • 10. EXAMPLE Example of applications of ad hoc networks: ● Emergency search-and-rescue operations. Meetings or conventions in which persons wish to quickly share information. Data acquisition operations in inhospitable terrain. Local area networks in the future. ● ●
  • 11. ROUTING DECISION POINT ● Source routing ■ ■ Sender determines a route and specifies it in the packet header Supported in IP, although not the typical routing scheme ● Hop-by-hop (datagram) routing ■ ■ A routing decision is made at each forwarding point (at each router) Standard routing scheme for IP ● Virtual circuit routing ■ ■ Determine and configure a path prior to sending first packet Used in ATM (and analogous to voice telephone system)
  • 12. ROUTING TABLE ● A routing table contains information to determine how to forward packets ■ ■ ■ Source routing: Routing table is used to determine route to the destination to be specified in the packet Hop-by-hop routing: Routing table is used to determine the next hop for a given destination Virtual circuit routing: Routing table used to determine path to configure through the network ● A distributed algorithm is required to build the routing table ■ ■ Distance vector algorithms Link state algorithms
  • 13. DISTANCE VECTOR ALGORITHMS ● “Distance” of each link in the network is a metric that is to be minimized ■ ■ Each link may have “distance” 1 to minimize hop count Algorithm attempts to minimize distance ● The routing table at each node… ■ ■ Specifies the next hop for each destination Specifies the distance to that destination ● Neighbors can exchange routing table information to find a route (or a better route) to a destination
  • 14. LINK-STATE ALGORITHMS ● ● Each node shares its link information so that all nodes can build a map of the full network topology Link information is updated when a link changes state (goes up or down) ■ Link state determined by sending small “hello” packets to neighbors ● Given full topology information, a node can determine the next best hop or a route from the source
  • 15. MANET ROUTING ● Nodes must determine how to forward packets ■ ■ Source routing: Routing decision is made at the sender Hop-by-hop routing: Routing decision is made at each intermediate node ● Difficult to achieve good performance ■ ■ ■ ■ Routes change over time due to node mobility Best to avoid long delays when first sending packets Best to reduce overhead of route discovery and maintenance Want to involve as many nodes as possible – to find better paths and reduce likelihood of partitions
  • 16. MANET ROUTING APPROACHES ● Decision time ■ ■ Proactive or table-driven – maintain routing tables Reactive or on-demand – determine routing on an as-needed basis ● Network structure ■ ■ Hierarchical – impose a hierarchy on a collection of nodes and reflect this hierarchy in the routing algorithm ○ May use a proactive protocol for routing within a cluster or zone ○ May use a reactive protocol for routing between distinguished “cluster heads” Non-hierarchical – make decisions among all nodes
  • 17. TYPES OF MANET ROUTING MANET Routing Protocols Hybrid Proactive Reactive Example: OLSR Example: AODV
  • 18. COMMON FEATURES ● MANET routing protocols must… ■ ■ Discover a path from source to destination Maintain that path (e.g., if an intermediate node moves and breaks the path) ■ Define mechanisms to exchange routing information ● Reactive protocols ■ ■ Discover a path when a packet needs to be transmitted and no known path exists Attempt to alter the path when a routing failure occurs ● Proactive protocols ■ ■ Find paths, in advance, for all source-pair destinations Periodically exchange routing information to maintain paths
  • 19. • Is it possible to use standard routing protocols? ● Distance-vector protocols ● ● Slow convergence due to “Count to Infinity” Problem Creates loops during node failure, network partition or congestion ● Link state protocols ● ● Use flooding technique and create excessive traffic and control overhead Require a lot of processor power and therefore high power consumption PROBLEMS WITH ROUTING
  • 20. PROBLEMS WITH ROUTING • Limitations of the Wireless Network ● packet loss due to transmission errors variable capacity links frequent disconnections/partitions limited communication bandwidth Broadcast nature of the communications ● ● ● ● • Limitations Imposed by Mobility ● dynamically changing topologies/routes lack of mobility awareness by system/applications ● • Limitations of the Mobile Computer ● short battery lifetime