This document provides an overview of routing protocols in ad hoc networks. It begins with an abstract describing the objectives of surveying and comparing different classes of ad hoc routing protocols. The document then outlines the topics to be covered, including the characteristics, applications, and types of ad hoc routing protocols. Several representative routing protocols are described in detail, including table-driven, hybrid, source-initiated, location-aware, multipath, hierarchical, multicast, and power-aware protocols. The document concludes by discussing future work related to improving reusability and security of ad hoc routing protocols.
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Topics covered in this presentation:
1. RF spectrum and GSM specifications
2. FDMA and TDMA
3. Digital Voice Transmission
4. Channel coding, Interleaving and Burst formatting
5. GMSK
6. Frame structure of GSM
7. Corrective actions against multipath fading
Wireless Sensor Network (WSN) consists of sensor nodes which interact with each other through physical parameters like sunlight, wind, vibration, humidity etc. Routing protocols provide an optimal data transmission route from sensor nodes to sink node to save energy of nodes. From Base Station (BS) Sensor node sends and receives data to or from wireless stations. Clustering mechanism is one of the popular routing mechanisms used in WSN for optimizing the problem in sensor nodes. There are two types of clustering schemes known as homogeneous schemes and heterogeneous schemes. In Homogeneous scheme initial energy is same for each node but in heterogeneous scheme initial energy is different for each node and also used to determine the efficiency of sensor networks. Enhanced Modified LEACH (EMODLEACH) is a reactive protocol which is implemented for homogeneous network model. We have implemented the concept of Efficient Cluster head Replacement scheme and Dual transmitting power level scheme of MODLEACH along with the concept of Efficient Intra Cluster transmission Scheme of TEEN in LEACH. We analyze the PEGASIS protocol and modified the exiting protocol called improved energy balanced routing protocol (IEBRP).This IEBRP is based on cluster formation, cluster routing and other aspects of LEACH protocol.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Wireless Sensor Network (WSN) consists of sensor nodes which interact with each other through physical parameters like sunlight, wind, vibration, humidity etc. Routing protocols provide an optimal data transmission route from sensor nodes to sink node to save energy of nodes. From Base Station (BS) Sensor node sends and receives data to or from wireless stations. Clustering mechanism is one of the popular routing mechanisms used in WSN for optimizing the problem in sensor nodes. There are two types of clustering schemes known as homogeneous schemes and heterogeneous schemes. In Homogeneous scheme initial energy is same for each node but in heterogeneous scheme initial energy is different for each node and also used to determine the efficiency of sensor networks. Enhanced Modified LEACH (EMODLEACH) is a reactive protocol which is implemented for homogeneous network model. We have implemented the concept of Efficient Cluster head Replacement scheme and Dual transmitting power level scheme of MODLEACH along with the concept of Efficient Intra Cluster transmission Scheme of TEEN in LEACH. We analyze the PEGASIS protocol and modified the exiting protocol called improved energy balanced routing protocol (IEBRP).This IEBRP is based on cluster formation, cluster routing and other aspects of LEACH protocol.
How to put these nodes together to form a meaningful network.
How a network should function at high-level application scenarios .
On the basis of these scenarios and optimization goals, the design of networking protocols in wireless sensor networks are derived
A proper service interface is required and integration of WSNs into larger network contexts.
UNIT III ROUTING PROTOCOLS AND TRANSPORT LAYER IN AD HOC WIRELESS NETWORKS -Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer solutions-TCP over Ad hoc wireless Networks.
Proactive routing protocol
Each node maintain a routing table.
Sequence number is used to update the topology information
Update can be done based on event driven or periodic
Observations
May be energy expensive due to high mobility of the nodes
Delay can be minimized, as path to destination is already known to all nodes.
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
Wireless mesh networks (WMNs) are attractive as a new communication paradigm. Ad hoc routing protocols for WMNs are classified into: (1) proactive, (2) reactive, and (3) hybrid approaches. In general, proactive routing is more suitable for a stationary network, while reactive routing is better for a mobile network with a high mobility. In many applications, a node in WMN is mobile but it can fluctuate between being mobile. Wireless mesh networks is an emergent research area, which is becoming important due to the growing amount of nodes in a network.
Mobile ad hoc network is a reconfigurable network of mobile nodes connected by multi-hop wireless links and capable of operating without any fixed infrastructure support. In order to facilitate communication within such self-creating, self-organizing and self administrating network, a dynamic routing protocol is needed. The primary goal of such an ad hoc network routing protocol is to discover and establish a correct and efficient route between a pair of nodes so that messages may be delivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper examines two routing protocols, both on-demand source routing, for mobile ad hoc networks– the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based and evaluates both routing protocols in terms of packet delivery fraction, normalized routing load, average end to end delay, throughput by varying number of nodes per sq. km, traffic sources and mobility. Simulation results show that in high
mobility (pause time 0s) scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Comparing: Routing Protocols on Basis of sleep modeIJMER
The architecture of ad hoc wireless network consists of mobile nodes for communication
without the use of fixed-position routers. The communication between them takes place without
centralized control. Routing is a very crucial issue, so to deal with this routing algorithms must deliver
the packet in significant delay. There are different protocols for handling the mobile environment like
AODV, DSR and OLSR. But this paper will focus on performance of AODV and OLSR routing protocols.
The performance of these protocols is analyzed on two metrics: time and throughput
Issues in designing a routing and Transport Layer protocol for Ad hoc networks- proactive
routing, reactive routing (on-demand), hybrid routing- Classification of Transport Layer
solutions-TCP over Ad hoc wireless Networks
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
UNIT IV MOBILE AD-HOC NETWORKS
Ad-Hoc Basic Concepts – Characteristics – Applications – Design Issues – Routing – Essential of Traditional Routing Protocols –Popular Routing Protocols – Vehicular Ad Hoc networks ( VANET) – MANET Vs VANET – Security
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Survey of Enhanced Routing Protocols for Manetspijans
Mobile Ad Hoc Networks (MANETs) form a class of dynamic multi-hop networks consisting of a set of
mobile nodes that intercommunicate on shared wireless channels. MANETs are self-organizing and selfconfiguring multi-hop wireless networks, where the network structure changes dynamically due to the node
mobility. There exists no fixed topology due to the mobility of nodes, interference, multipath propagation
and path loss. Hence efficient dynamic routing protocols are required for these networks to function
properly. Many routing protocols have been developed to accomplish this task. In this paper we survey
various new routing protocols that have been developed as extensions or advanced versions of previously
existing routing protocols for MANETs such as DSR, AODV, OLSR etc.
Performance study of adhoc routing protocols for cbr trafficeSAT Journals
Abstract Mobile ad hoc network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. The nodes are free to move about and organize themselves into a network. These nodes change position frequently. A Reactive (on-demand) routing strategy is a popular routing category for wireless adhoc routing. The primary objective of this paper is to do comparative study of the performance of routing protocols Destination-Sequenced Distance-Vector (DSDV), Dynamic Source Routing (DSR) and Ad-hoc on demand Distance Vector (AODV) for wireless ad hoc networks in a simulated environment against varying network parameters. The evaluations are done by means of simulations using NS-2 network simulator. The study was done on the basis of performance metrics: throughput, packet delivery function, end-to-end delay, routing overhead and packet lost. Simulation results show that despite in most simulations reactive routing protocols DSR and AODV performed significantly better than proactive routing protocol DSDV for the CBR based traffic. Keywords- component; Mobile Adhoc Network, Routing protocol, DSR, AODV, DSDV
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
1. Routing protocols in ad hoc
networks: A survey
Presented By:
Mr. JOGESWAR TRIPATHY
M.Tech In Dept. Of CSIT
From S’O’A University, Bhubaneswar6/23/19
1
2. Abstract
The main objective of this paper is to create a taxonomy of the ad hoc
routing protocols.
It also survey and compare the representative examples for each class
of protocols.
Here authors wants to uncover the requirements considered by the
different protocols , the resource limitations under which they operate
and the design decisions made by the authors.
Here authors also provides the sweet spot deployment scenarios and
performance metric combinations of the protocols where they out
perform their competitors for which it make easy to choose the routing
protocols.
6/23/19
2
3. Outline
Introduction
Characteristics of ad hoc networks
Applications of ad hoc networks
Types of routing
Protocols in details
Conclusion
Future work
References
6/23/19
3
4. Introduction
The principle behind ad hoc networking is multi-hop relaying in which
messages are sent from the source to the destination by relaying through
the intermediate hops (nodes).
In multi-hop wireless networks, communication between two end nodes is
carried out through a number of intermediate nodes whose function is to
relay information from one point to another. A static string topology is an
example of such network:
It is useful when infrastructure not available, impractical, or expensive
Here Information is transmitted in a store-and forward manner using
multi hop routing.
0 1 2 3 4 5 6 7
6/23/19
4
5. Introduction (Contd.)
Mobility and traffic are two significant factors affecting protocol
performance. In current simulation,
Mobility Pattern: usually, uniformly and randomly chosen
destinations (random waypoint model)
Traffic Pattern: usually, uniformly and randomly chosen
communicating nodes
Impact of mobility on ad hoc routing protocols is expected to be
significant
The following figure represents different wireless networks.
Infrastructure: cellular wireless networks
Ad hoc: wireless sensor networks
Hybrid: mesh networks
Cellular Wireless
Networks Wireless Mesh
Networks
Hybrid
Wireless
Network
s
Wireless Sensor
Networks
6/23/19
5
6. Characteristics of ad hoc networks
Dynamic topologies: Network topology may change dynamically as the
nodes are free to move.
Bandwidth-constrained, variable capacity links: Realized throughput of
wireless communication is less than the radio’s maximum transmission
rate. Collision occurs frequently.
Energy-constrained operation: Some nodes in the ad hoc network may
rely on batteries or other exhaustible means for their energy.
Limited physical security: More prone to physical security threats than
fixed cable networks.
6/23/19
6
7. Applications of ad hoc networks
Network Extension: In this application area , the networking infrastructure exists, but with
insufficient coverage. Hence ad hoc network is used to extend the internet connectivity
beyond the reach of the access points.
Local interconnection networks: This applications include point to point messaging and
audio and video conferencing.
Ubiquitous computing: This is strongly influenced by the physical location and proximity
devices which are close to each other are more likely to communicate the remote devices . As
ad hoc network are good match for proximity based communication .E.g. – TV set-top box is
controlled from a smartphone.
Urban Sensing: This application area exploits the sensing and computation capabilities of
smartphones, together with the wide range of their deployment in urban areas
Vehicular Networking: This area covers the applications where one of the communication
partner is a vehicle. t is used for emerging intelligent transport systems.
Personal area networks: It is a most popular technology formed by Bluetooth devices which
needs to establish a short range communication with infrastructure elements.
6/23/19
7
8. Types of routing
Table-driven (proactive)
Up-to-date routing information maintained
Routing overhead independent of route usage
Source-initiated (demand-driven / reactive)
Routes maintained only for routes in use
Explicit route discovery mechanism
Hybrid Protocols
Combination of proactive and reactive
6/23/19
8
9. Types of routing(Contd.)
Ad Hoc Routing Protocols
Table driven Source-initiated
on-demand
DSDV
WRP
AODV
DSR
TORA
ABR
SSR
Reactive
Proactive
Hybrid
ZRP
Hybrid
OLSR
CGSR
Power-
aware
Geographical
Multicast
Multicast
Hierarchical
Multi path
Location aware
GPSR
DRM
LAR
SMR HSR
CEDAR
DGR
GAMER
DEAR
MHEDSR
NTBR
DCMP
6/23/19
9
10. Protocols in details
Table Driven Routing Protocols:
In table-driven protocols, each node maintain up-to-
date routing information to all the nodes in the network
These routing protocols differ in the method by which the topology
change information is distributed across the network and the number
of necessary routing-related tables.
some of the existing table-driven ad hoc routing protocols are :
DSDV(Dynamic Destination-Sequenced Distance-Vector Routing
Protocol)
WRP (The Wireless Routing Protocol)
6/23/19
10
11. Protocols in details(Contd.)
Hybrid Routing Protocols:
Proactive mechanism of node discovery within a node’s immediate
neighborhood while inter-zone communication is carried out by using
reactive approaches .
Each node individually creates its own neighborhood which it calls a
routing zone.
The zone is defined as a collection of nodes whose minimum distance in
hops from the node in question is no greater than a value that is called
the “zone radius” .
Note that routing zones of nodes might overlap heavily .
E.g.- ZRP(Zone Routing Protocol)
6/23/19
11
12. Protocols in details(Contd.)
Source Initiated Protocol:
Route is created only when the source requests a route to a destination
Route discovery process
Route maintenance
Reactive Protocols acquire routing information only when it is actually needed. The
Advantage is that due to the high uncertainty in the position of the nodes,
however, the reactive protocols are much suited and perform better for ad-hoc
networks.
The Disadvantages of reactive protocols include high latency time in route finding
and excessive flooding leading to network clogging. Some of the Reactive Routing
Protocols are:
ABR (Associativity Based Routing)
AODV (Ad hoc on-demand Distance Vector)
DSR (Dynamic Source Routing)
6/23/19
12
13. Protocols in details(Contd.)
Location Aware Routing Protocol:
Location-aware routing schemes in mobile ad hoc networks assume that the
individual nodes are aware of the locations of all the nodes within the
network.
It utilizes location information to minimize the search space for route
discovery towards the destination node.
Here, there are two flooding region in LAR protocol, i.e. the expected zone
and request zone.
When source node wants to send packet to destination node, first source
node should get the position of destination node by using location services
which is used to get position of node.
If the source node has no information about the speed and the direction of
the destination node, the entire network is considered as the expected zone.
6/23/19
13
14. Protocols in details(Contd.)
Multi path Routing Protocol:
Instead of only a single path, it can be useful to compute multiple
paths between a given source/destination pair.
Multiple paths can be disjoint or braided.
It can be Used simultaneously, alternatively or randomly.
Multipath routing protocols create multiple routes from source to
destination
6/23/19
14
15. Protocols in details(Contd.)
Hierarchical Routing Protocol:
Hierarchical ad hoc routing protocols build a hierarchy of
nodes, typically through clustering techniques .
Nodes at the higher levels of the hierarchy provide special
services, improving the scalability and the efficiency of
routing .
Creation of cluster
Election of cluster head
6/23/19
15
16. Protocols in details(Contd.)
Multicast Routing Protocol:
Distribute a packet to all reachable nodes (broadcast) or to a somehow
(explicitly) denoted subgroup (multicast)
Basic options:
Source-based tree: Construct a tree (one for each source) to reach all
addressees
Minimize total cost (= sum of link weights) of the tree
Minimize maximum cost to each destination
Shared, core-based trees
Use only a single tree for all sources
Every source sends packets to the tree where they are distributed
Mesh
Trees are only 1-connected ! use meshes to provide higher redundancy and
thus robustness in mobile environments
6/23/19
16
17. Protocols in details(Contd.)
Geographical Multicast Routing Protocol:
It construct virtual coordinates that preserve enough
neighborhood information to be useful in geographic routing but do
not require actual position determination.
Use polar coordinates from a center point.
Assign “virtual angle range” to neighbors of a node, bigger radius .
Angles are recursively redistributed to children nodes.
6/23/19
17
18. Protocols in details(Contd.)
Power-aware Routing Protocols:
Create a efficient route between source node and destination node
Active :
- Transmission power control
- Load distribution
Inactive period
- Sleep mode or simply turns it off when there is no data to
transmit or receive
6/23/19
18
19. Conclusion and Future work
In this paper several representative protocols are reviewed and compared ,
while different classes of protocols operate under different scenarios, but
they usually share the common goal to reduce control packet overhead,
maximized throughput and minimize end-to-end delay.
The main differentiating factor between the protocols is the ways of finding
and/or maintaining the routes between source and destination pairs.
It will be more helpful for choosing the appropriate routing protocol .
It can be make more reusable and deployable by using security issues in
future.
6/23/19
19
21. References
[1] J.-D. Abdulai, M. Ould-Khaoua, L. Mackenzie, Adjusted probabilistic route
discovery in mobile ad hoc networks, Computers and Electrical Engineering
35 (1) (2009) 168–182.
[2] P. Papadimitratos and Z.J. Haas, “Secure Link State Routing for Mobile Ad
Hoc Networks,” Proc. IEEE Workshop on Security and Assurance in Ad Hoc
Networks, IEEE Press, 2003, pp. 27–31.
[3] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts,” Proc. IEEE
Workshop on Mobile Computing Systems and Applications (WMCSA’94),
IEEE Press, 1994, pp. 158–163.
[4] Suraj Sharma, Deepak Puthal, Sabah Tazeen, Mukesh Prasad, Albert Y.
Zomaya, "MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol
for Wireless Sensor Networks", Access IEEE, vol. 5, pp. 19864-19875, 2017.
[5] Sobinder Singh, Abhishek Swaroop, Ajay Kumar, Anamika, "A survey on
techniques to achive energy efficiency in cloud computing", Computing
Communication and Automation (ICCCA) 2016 International Conference on,
pp. 1281-1285, 2016.
6/23/19
21