SlideShare a Scribd company logo
1 of 60
Unit – II
Mobile Network Layer
Dr.T.V.Padmavathy
Professor
Department of ECE
RMKEC
Wireless Networks
Introduction - Which Technology
1/3/2017 Unit - II Mobile Network Layer 2
Introduction - Which Technology ?
 Cellular Technologies
 Wireless LAN Technology
 Short range Technologies
 Long Range Technologies
1/3/2017 Unit - II Mobile Network Layer 3
 Packet Radio NETwork (PRNET) by DARPA -1972
 Survivable Packet Radio Networks (SURAN) – 1980s
 MANET- IETF -1990’s
 IEEE released 802.11 PHY and MAC standard – 1995
1/3/2017 Unit - II Mobile Network Layer 4
History
Introduction
 In this protocols and mechanisms to support mobility.
 Allows transparent routing of IP datagrams to mobile nodes
 Mobile IP – Adds mobility support to the internet
1/3/2017 Unit - II Mobile Network Layer 5
 Setting up of fixed access points and backbone infrastructure is not
always viable
 Infrastructure may not be present in a disaster area or war zone
 Infrastructure may not be practical for short-range radios;
Bluetooth (range ~ 10m)
 Ad hoc networks:
 Does not depend on pre-existing infrastructure
 Easy to deploy
 Useful when infrastructure is absent
1/3/2017 6Unit - II Mobile Network Layer
Why an Ad Hoc Networks ?
Problems in Infrastructure based & Ad Hoc
Infrastructure based Network
 Access Point placement depends on wired network availability
 Obstructions make it difficult to provide total coverage of an area
 Each Access Point has limited range
Ad Hoc Network
 Communication is only possible between nodes which are directly in
range of each other
1/3/2017 Unit - II Mobile Network Layer 7
Problems in Infrastructure based & Ad Hoc
 If nodes move out of range of the access point (Infrastructure Mode)
 OR nodes are not in direct range of each other (Ad Hoc Mode)
Then communication is not possible!!
1/3/2017 Unit - II Mobile Network Layer 8
A B C
Mobile Ad hoc Network Example
1/3/2017 Unit - II Mobile Network Layer 9
Communication between nodes may be in single/multi-hop
 Each of the nodes acts as a host as well as a router
Challenges in Mobile Environments
Limitations of the Wireless Network
 packet loss due to transmission errors - transport problem
 frequent disconnections/partitions
 limited communication bandwidth
Limitations Imposed by Mobility
 dynamically changing topologies/routes - routing problem
 short battery lifetime - energy efficiency problem
 limited capacities
1/3/2017 10Unit - II Mobile Network Layer
Typical Applications
 Military environments
• soldiers, tanks, planes
 Emergency operations
• search-and-rescue
 Personal area networking
• cell phone, laptop, etc.
 Civilian environments
• meeting rooms, sports stadiums,
hospitals
 Education
• virtual classrooms, conferences
 Sensor networks
• homes, environmental applications
1/3/2017 Unit - II Mobile Network Layer 11
1/3/2017 Unit - II Mobile Network Layer 12
Classes of Wireless Ad Hoc Networks
Three distinct classes
 Mobile Ad Hoc Networks (MANET)
 possibly highly mobile nodes
 power constrained
 Wireless Ad Hoc Sensor/Device Networks
 relatively immobile
 severely power constrained nodes
 Wireless Ad Hoc Backbone Networks
 rapidly deployable wireless infrastructure
 largely immobile nodes
Characteristics of an Ad-hoc Network
 Collection of mobile nodes forming a temporary network
 Network topology changes frequently and unpredictably
 No centralized administration or standard support services
 Host is also function as router
1/3/2017 Unit - II Mobile Network Layer 13
1/3/2017 Unit - II Mobile Network Layer 14
Ad hoc Network Architecture
physical
Data link
network
transport
application
physical
Data link
network
transport
application
physical
Data link
network
transport
application
S
wireless link
Source DestinationIntermediate node
wireless link
I D
Common objective:
Route packets along the optimal path
 Routing protocols adapt to changing network conditions and by
definition offers multi-hop paths
 Routing protocols differ in route table
• construction
• maintenance
• update
 Next-hop routing protocols can be categorized as:
• Link-state
• Distance-vector
1/3/2017 15Unit - II Mobile Network Layer
Why Routing?
Routing Classification
1/3/2017 16Unit - II Mobile Network Layer
Ad hoc Routing
Protocols
Topology Based Position Based
Table Driven Hybrid Source Initiated On-Demand
Driven
Location
Services
Forwarding
Strategy
1/3/2017 Unit - II Mobile Network Layer 17
CGSR DSDV WRP AODV DSR TORA SSRABRZRP
Ad hoc Routing
Protocols
Topology Based Position Based
Table Driven Hybrid Source Initiated On-Demand
Driven
Location
Services
Forwarding
Strategy
Ad Hoc Routing Protocols Overview
Why traditional routing protocols are not suitable for
MANET networks ?
 Hidden Terminal Problem
 Exposed node problem
1/3/2017 Unit - II Mobile Network Layer 18
Routing Protocols
Proactive Protocols
 Determine routes independent of traffic pattern
Traditional (link-state, distance-vector) routing protocols are proactive
Reactive Protocols
 Determine a route only if needed
Hybrid protocols
 Adaptive; Combination of proactive and reactive
1/3/2017 19Unit - II Mobile Network Layer
Protocol Trade-offs
Proactive protocols
• Always maintain routes
• Little or no delay for route determination
• Consume bandwidth to keep routes up-to-date
• Maintain routes which may never be used
Reactive protocols
• Lower overhead since routes are determined on demand
• Significant delay in route determination
• Employ flooding (global search)
1/3/2017 20Unit - II Mobile Network Layer
Reactive Routing Protocols
1/3/2017 21Unit - II Mobile Network Layer
Characteristics of Reactive Routing Protocols
 Determine route if and when needed
 Less control packet overhead
 Source initiates route discovery process
 More route discovery delay
 Example:
• Dynamic Source Routing (DSR)
• Ad hoc On-Demand Distance Vector Routing (AODV)
1/3/2017 Unit - II Mobile Network Layer 22
Dynamic Source Routing (DSR) [Johnson’96]
 Two major phases:
• Route Discovery,
• Route Maintenance.
 Node S initiates a route discovery
 Source node S floods Route Request (RREQ)
 Each node appends own identifier when forwarding RREQ
1/3/2017 23Unit - II Mobile Network Layer
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Represents a node that has received RREQ for D from S
M
N
L
1/3/2017 Unit - II Mobile Network Layer 24
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Represents transmission of RREQ
Broadcast transmission
M
N
L
[S]
[X,Y] Represents list of identifiers appended to RREQ
[S]
[S]
1/3/2017 Unit - II Mobile Network Layer 25
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Node H receives packet RREQ from two neighbors: Potential Collision
M
N
L
[S,E]
[S,C][S,B]
[S,B]
[S,C]
1/3/2017 Unit - II Mobile Network Layer 26
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
• Node C receives RREQ from G and H, but does not forward it again,
because node C has already forwarded RREQ
M
N
L
[S,C,G]
[S,E,F]
1/3/2017 Unit - II Mobile Network Layer 27
Route Discovery in DSR
• Nodes J and K both broadcast RREQ to node D
• Since nodes J and K are hidden from each other, their transmissions may
collide
B
A
S E
F
H
J
D
C
G
I
K
M
N
L
[S,C,G,K]
[S,E,F,J]
Unit - II Mobile Network Layer1/3/2017 28
Route Discovery in DSR
B
A
S E
F
H
J
D
C
G
I
K
Node D does not forward RREQ, because node D is the intended target of the
route discovery
M
N
L
[S,E,F,J,M]
Unit - II Mobile Network Layer1/3/2017 29
Route Discovery in DSR
 Destination D on receiving the first RREQ, sends a Route Reply
(RREP)
 RREP is sent on a route obtained by reversing the route appended
to received RREQ
 RREP includes the route from S to D on which RREQ was received
by node D
1/3/2017 Unit - II Mobile Network Layer 30
Route Reply in DSR
B
A
S E
F
H
J
D
C
G
I
K
M
N
L
RREP [S,E,F,J,D]
Represents RREP control message
1/3/2017 Unit - II Mobile Network Layer 31
Route Reply in DSR
Route Reply can be sent by reversing the route in Route Request
(RREQ) only if links are guaranteed to be bi-directional
• To ensure this, RREQ should be forwarded only if it received on a
link that is known to be bi-directional
 If unidirectional (asymmetric) links are allowed, then RREP may
need a route discovery for S from node D
• Unless node D already knows a route to node S
• If a route discovery is initiated by D for a route to S, then the Route
Reply is piggybacked on the Route Request from D.
1/3/2017 Unit - II Mobile Network Layer 32
Dynamic Source Routing (DSR)
 Node S on receiving RREP, caches the route included in the RREP
 When node S sends a data packet to D, the entire route is included
in the packet header
• hence the name source routing
 Intermediate nodes use the source route included in a packet to
determine to whom a packet should be forwarded
1/3/2017 Unit - II Mobile Network Layer 33
Data Delivery in DSR
B
A
S E
F
H
J
D
C
G
I
K
M
N
L
DATA [S,E,F,J,D]
Packet header size grows with route length
1/3/2017 Unit - II Mobile Network Layer 34
DSR Optimization: Route Caching
 Each node caches a new route
 When node S finds route [S,E,F,J,D]
to node D, node S also learns route
[S,E,F] to node F
 When node K receives Route
Request [S,C,G] destined for node,
node K learns route [K,G,C,S] to node
S
 When node F forwards Route Reply
RREP [S,E,F,J,D], node F learns
route [F,J,D] to node D
1/3/2017 Unit - II Mobile Network Layer 35
B
A
S E
F
H
J
D
C
G
I
K
M
N
L
DATA [S,E,F,J,D]
DSR Optimization: Route Caching
 When node E forwards Data
[S,E,F,J,D] it learns route [E,F,J,D]
to node D
 A node may also learn a route
when it overhears Data packets
1/3/2017 Unit - II Mobile Network Layer 36
B
A
S E
F
H
J
D
C
G
I
K
M
N
L
DATA [S,E,F,J,D]
Use of Route Caching
 When node S learns that a route to node D is broken, it uses another
route from its local cache
 Use of route cache
• can speed up route discovery
• can reduce propagation of route requests
1/3/2017 Unit - II Mobile Network Layer 37
Dynamic Source Routing: Advantages
 Routes maintained only between nodes who need to communicate
• reduces overhead of route maintenance
 Route caching can further reduce route discovery overhead
 A single route discovery may yield many routes to the destination,
due to intermediate nodes replying from local caches
1/3/2017 38Unit - II Mobile Network Layer
Dynamic Source Routing: Disadvantages
 Packet header size grows
 Flood of route requests may potentially reach all nodes in the
network
 Potential collisions between route requests propagated by
neighboring nodes
• insertion of random delays before forwarding RREQ
 Increased contention if too many route replies come back due to
nodes replying using their local cache
• Route Reply Storm problem
1/3/2017 39Unit - II Mobile Network Layer
1/3/2017 Unit - II Mobile Network Layer 40
Proactive Routing Protocols
Characteristics of Proactive Routing Protocols
 Distributed, shortest-path protocols
 Maintain routes between every host pair at all times
 Based on Periodic updates of routing table
 High routing overhead and consumes more bandwidth
 Example: Destination Sequence Distance Vector (DSDV)
1/3/2017 Unit - II Mobile Network Layer 41
Distance-Vector [Ford+ 1962]
 known also as Distributed Bellman-Ford or RIP (Routing Information
Protocol)
The Meaning of Distance Vector:
 A router using distance vector routing protocols knows 2 things:
• Distance to final destination
• Vector, or direction, traffic should be directed
 Every node maintains a routing table
• all available destinations
• the next node to reach to destination
• the number of hops to reach the destination
 Periodically send table to all neighbors to maintain topology
1/3/2017 42Unit - II Mobile Network Layer
Distance Vector (Tables)
1/3/2017 Unit - II Mobile Network Layer 43
D
G
A
F
E
B
C
A B C D E F G
A 0 1 1 ∞ 1 1 ∞
B 1 0 1 ∞ ∞ ∞ ∞
C 1 1 0 1 ∞ ∞ ∞
D ∞ ∞ 1 0 ∞ ∞ 1
E 1 ∞ ∞ ∞ 0 ∞ ∞
F 1 ∞ ∞ ∞ ∞ 0 1
G ∞ ∞ ∞ 1 ∞ 1 0
Routing Tables
• information, routing table at A
is -->
1/3/2017 Unit - II Mobile Network Layer 44
D
G
A
F
E
B
C
Cost Next Hop
B 1 B
C 1 C
D ∞ -
E 1 E
F 1 F
G ∞ -
Evolution of the Table
1/3/2017 Unit - II Mobile Network Layer 45
Cost Next Hop
B 1 B
C 1 C
D 2 C
E 1 E
F 1 F
G 2 F
D
G
A
F
E
B
C
Each node sends a message to neighbors with a list of distances.
F --> A with G is at a distance 1
C --> A with D at distance 1.
Final Distance Matrix
1/3/2017 Unit - II Mobile Network Layer 46
A B C D E F G
A 0 1 1 2 1 1 2
B 1 0 1 2 2 2 3
C 1 1 0 1 2 2 2
D 2 2 1 0 3 2 1
E 1 2 2 3 0 2 3
F 1 2 2 2 2 0 1
G 2 3 2 1 3 1 0
D
G
A
F
E
B
C
Distance-Vector (Disadvantages)
1/3/2017 Unit - II Mobile Network Layer 47
A
E
B
C
D
Link 1 Link 6
Link 2
Link 4
Link 3
Link 5
Destination Link Hop
A Link 4 2
B Link 4 2
C Link 4 1
D Local 0
E Link 6 1
Initially nothing in routing table.
 When it receives an update from C and E, it notes that these nodes
are one hop away.
 Subsequent route updates allow D to form its routing table.
Distance-Vector (Disadvantages)
 Link 2 is broken, Node A routes
packets to C, D, and E through
Node B.
 Node B detects that Link 3 is
broken.
 It sets the distance to nodes C, D
and E to be infinity.
 Node B thinks it can route
packets to C, D, and E via Node
A.
1/3/2017
Unit - II Mobile Network Layer
48
Link 6
A
E
B
C
D
Link 1
Link 2 Link 4
Link 3 Link 5
Broken
Broken
Network partitions into two
isolated islands
Distance-Vector (Disadvantages)
 Node A thinks it can route packets to C, D, and E, via Node B.
 A routing loop is formed – Counting to Infinity problem.
 New Solution -> DSDV Protocol
1/3/2017 Unit - II Mobile Network Layer 49
Destination Sequenced Distance Vector Routing (DSDV)
[Perkins+ 1994]
 Basic Routing Protocol
 Based on Bellman ford routing algorithm with some improvement
 Each node maintains a list of all destinations and number of hops
to each destination.
 Each entry is marked with a sequence number.
 Periodically send table to all neighbors to maintain topology
1/3/2017 50Unit - II Mobile Network Layer
Destination Sequenced Distance Vector Routing (DSDV)
 Protocol Overview
 Route Advertisements
 Routing Table Entry Structure
1/3/2017 51Unit - II Mobile Network Layer
Protocol Overview
 Each Routing Table List all destinations and number of hops to each
node
 Each Route is tagged with a sequence number originated by
destination
 Updates are transmitted periodically and when there is any
significant topology change
 Routing information is transmitted by broadcast
1/3/2017 52Unit - II Mobile Network Layer
Route Table Entry Structure
 Destination’s Address
 Number of hops required to reach the destination
 Destination Sequence Number
 Sequence number originated from destination. Ensures
loop freeness.
 Install Time when entry was made (used to delete stale entries from
table)
1/3/2017 53Unit - II Mobile Network Layer
DSDV (Route Advertisements)
Advertise to each neighbor own routing information
 Destination Address
 Metric = Number of Hops to Destination
 Destination Sequence Number
Rules to set sequence number information
 On each advertisement increase own destination sequence
number (use only even numbers)
 If a node is no more reachable (timeout) increase sequence
number of this node by 1 (odd sequence number) and set metric
= 
1/3/2017 54Unit - II Mobile Network Layer
DSDV (Route Selection)
Update information is compared to own routing table
 Select route with higher destination sequence number (This
ensure to use always newest information from destination)
 Select the route with better metric when sequence numbers are
equal.
1/3/2017 Unit - II Mobile Network Layer 55
Example of DSDV in operation
1/3/2017 Unit - II Mobile Network Layer 56
MH3
MH6
MH2
MH1
MH7
MH4
MH8
MH5
Destination Next Hop Metric Seq. No
MH4 MH4
0 S406_MH4
MH1 MH2
2 S128_MH1
MH2 MH2
1 S564_MH2
MH3 MH2
2 S710_MH3
MH5 MH6
2 S392_MH5
MH6 MH6
1 S076_MH6
MH7 MH6
2 S128_MH7
MH8 MH6
3 S050_MH8
DSDV (Disadvantages)
1/3/2017 57Unit - II Mobile Network Layer
A
E
B
C
D
Link 1
Link 2 Link 4
Link 3 Link 5
Broken
Broken
Network partitions into two
isolated islands
Node A’s update is state
 Sequence number indicated for nodes
C,D, and E is lower than the sequence
number maintained at B.
Looping avoided
Responding to Topology Changes
 Broken links indicated by 
 Any route through a hop with a broken link is also assigned 
  routes are immediately broadcast
 Sequence number of Destination is incremented and information is
broadcast
 Nodes with same or higher sequence number broadcast their metric
information
 Data broadcast by “full dump” and “incremental”
1/3/2017 58Unit - II Mobile Network Layer
Destination Sequenced Distance Vector Routing (DSDV)
Advantages
 Simple (almost like Distance Vector)
 Loop free through destination seq. numbers
 No latency caused by route discovery
Disadvantages
 Overhead: most routing information never used
1/3/2017 59Unit - II Mobile Network Layer
Thank You
1/3/2017 60Unit - II Mobile Network Layer

More Related Content

What's hot

VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Simulation of LTE-TDD in the HAPS channel
Simulation of LTE-TDD in the HAPS channel Simulation of LTE-TDD in the HAPS channel
Simulation of LTE-TDD in the HAPS channel IJECEIAES
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkIJSRED
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layerKashyap Davariya
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelIJMER
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...Ann Joseph
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network drboon
 

What's hot (20)

VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Simulation of LTE-TDD in the HAPS channel
Simulation of LTE-TDD in the HAPS channel Simulation of LTE-TDD in the HAPS channel
Simulation of LTE-TDD in the HAPS channel
 
E1073644
E1073644E1073644
E1073644
 
Global state routing
Global state routingGlobal state routing
Global state routing
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Mona
MonaMona
Mona
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
 
Final several design issues at network layer
Final several design issues at network layerFinal several design issues at network layer
Final several design issues at network layer
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Manet
ManetManet
Manet
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Noise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc ModelNoise Tolerant and Faster On Chip Communication Using Binoc Model
Noise Tolerant and Faster On Chip Communication Using Binoc Model
 
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
AODV (Ad hoc On-demand Distance Vector) VS AOMDV (Ad hoc On-demand Multipath ...
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 

Similar to Wn ppt (1)

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Use of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systemsUse of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systemseSAT Journals
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indooreSAT Publishing House
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocolsijeei-iaes
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122IJRAT
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking01 Overview of Data Communication and Networking
01 Overview of Data Communication and NetworkingMeenakshi Paul
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...eSAT Publishing House
 

Similar to Wn ppt (1) (20)

implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Use of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systemsUse of location aided algorithm using wi fi in indoor ad-hoc systems
Use of location aided algorithm using wi fi in indoor ad-hoc systems
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoor
 
A Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing ProtocolsA Study on IP Network Recovery through Routing Protocols
A Study on IP Network Recovery through Routing Protocols
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
MANET.ppt
MANET.pptMANET.ppt
MANET.ppt
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Paper id 252014122
Paper id 252014122Paper id 252014122
Paper id 252014122
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking
 
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
Dvr based hybrid routing protocols in mobile ad-hoc network application and c...
 
IJET-V3I1P19
IJET-V3I1P19IJET-V3I1P19
IJET-V3I1P19
 
G343741
G343741G343741
G343741
 
G343741
G343741G343741
G343741
 
LTE_D2D
LTE_D2DLTE_D2D
LTE_D2D
 

Recently uploaded

Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Studentskannan348865
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Christo Ananth
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisDr.Costas Sachpazis
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalSwarnaSLcse
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书c3384a92eb32
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Toolssoginsider
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfEr.Sonali Nasikkar
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligencemahaffeycheryld
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...josephjonse
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailingAshishSingh1301
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxProfASKolap
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...AshwaniAnuragi1
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/FootingEr. Suman Jyoti
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...mikehavy0
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptjigup7320
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationEmaan Sharma
 

Recently uploaded (20)

Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
一比一原版(Griffith毕业证书)格里菲斯大学毕业证成绩单学位证书
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Artificial Intelligence in due diligence
Artificial Intelligence in due diligenceArtificial Intelligence in due diligence
Artificial Intelligence in due diligence
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
handbook on reinforce concrete and detailing
handbook on reinforce concrete and detailinghandbook on reinforce concrete and detailing
handbook on reinforce concrete and detailing
 
Introduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptxIntroduction-to- Metrology and Quality.pptx
Introduction-to- Metrology and Quality.pptx
 
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
01-vogelsanger-stanag-4178-ed-2-the-new-nato-standard-for-nitrocellulose-test...
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Presentation on Slab, Beam, Column, and Foundation/Footing
Presentation on Slab,  Beam, Column, and Foundation/FootingPresentation on Slab,  Beam, Column, and Foundation/Footing
Presentation on Slab, Beam, Column, and Foundation/Footing
 
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
☎️Looking for Abortion Pills? Contact +27791653574.. 💊💊Available in Gaborone ...
 
Adsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) pptAdsorption (mass transfer operations 2) ppt
Adsorption (mass transfer operations 2) ppt
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 

Wn ppt (1)

  • 1. Unit – II Mobile Network Layer Dr.T.V.Padmavathy Professor Department of ECE RMKEC Wireless Networks
  • 2. Introduction - Which Technology 1/3/2017 Unit - II Mobile Network Layer 2
  • 3. Introduction - Which Technology ?  Cellular Technologies  Wireless LAN Technology  Short range Technologies  Long Range Technologies 1/3/2017 Unit - II Mobile Network Layer 3
  • 4.  Packet Radio NETwork (PRNET) by DARPA -1972  Survivable Packet Radio Networks (SURAN) – 1980s  MANET- IETF -1990’s  IEEE released 802.11 PHY and MAC standard – 1995 1/3/2017 Unit - II Mobile Network Layer 4 History
  • 5. Introduction  In this protocols and mechanisms to support mobility.  Allows transparent routing of IP datagrams to mobile nodes  Mobile IP – Adds mobility support to the internet 1/3/2017 Unit - II Mobile Network Layer 5
  • 6.  Setting up of fixed access points and backbone infrastructure is not always viable  Infrastructure may not be present in a disaster area or war zone  Infrastructure may not be practical for short-range radios; Bluetooth (range ~ 10m)  Ad hoc networks:  Does not depend on pre-existing infrastructure  Easy to deploy  Useful when infrastructure is absent 1/3/2017 6Unit - II Mobile Network Layer Why an Ad Hoc Networks ?
  • 7. Problems in Infrastructure based & Ad Hoc Infrastructure based Network  Access Point placement depends on wired network availability  Obstructions make it difficult to provide total coverage of an area  Each Access Point has limited range Ad Hoc Network  Communication is only possible between nodes which are directly in range of each other 1/3/2017 Unit - II Mobile Network Layer 7
  • 8. Problems in Infrastructure based & Ad Hoc  If nodes move out of range of the access point (Infrastructure Mode)  OR nodes are not in direct range of each other (Ad Hoc Mode) Then communication is not possible!! 1/3/2017 Unit - II Mobile Network Layer 8 A B C
  • 9. Mobile Ad hoc Network Example 1/3/2017 Unit - II Mobile Network Layer 9 Communication between nodes may be in single/multi-hop  Each of the nodes acts as a host as well as a router
  • 10. Challenges in Mobile Environments Limitations of the Wireless Network  packet loss due to transmission errors - transport problem  frequent disconnections/partitions  limited communication bandwidth Limitations Imposed by Mobility  dynamically changing topologies/routes - routing problem  short battery lifetime - energy efficiency problem  limited capacities 1/3/2017 10Unit - II Mobile Network Layer
  • 11. Typical Applications  Military environments • soldiers, tanks, planes  Emergency operations • search-and-rescue  Personal area networking • cell phone, laptop, etc.  Civilian environments • meeting rooms, sports stadiums, hospitals  Education • virtual classrooms, conferences  Sensor networks • homes, environmental applications 1/3/2017 Unit - II Mobile Network Layer 11
  • 12. 1/3/2017 Unit - II Mobile Network Layer 12 Classes of Wireless Ad Hoc Networks Three distinct classes  Mobile Ad Hoc Networks (MANET)  possibly highly mobile nodes  power constrained  Wireless Ad Hoc Sensor/Device Networks  relatively immobile  severely power constrained nodes  Wireless Ad Hoc Backbone Networks  rapidly deployable wireless infrastructure  largely immobile nodes
  • 13. Characteristics of an Ad-hoc Network  Collection of mobile nodes forming a temporary network  Network topology changes frequently and unpredictably  No centralized administration or standard support services  Host is also function as router 1/3/2017 Unit - II Mobile Network Layer 13
  • 14. 1/3/2017 Unit - II Mobile Network Layer 14 Ad hoc Network Architecture physical Data link network transport application physical Data link network transport application physical Data link network transport application S wireless link Source DestinationIntermediate node wireless link I D
  • 15. Common objective: Route packets along the optimal path  Routing protocols adapt to changing network conditions and by definition offers multi-hop paths  Routing protocols differ in route table • construction • maintenance • update  Next-hop routing protocols can be categorized as: • Link-state • Distance-vector 1/3/2017 15Unit - II Mobile Network Layer Why Routing?
  • 16. Routing Classification 1/3/2017 16Unit - II Mobile Network Layer Ad hoc Routing Protocols Topology Based Position Based Table Driven Hybrid Source Initiated On-Demand Driven Location Services Forwarding Strategy
  • 17. 1/3/2017 Unit - II Mobile Network Layer 17 CGSR DSDV WRP AODV DSR TORA SSRABRZRP Ad hoc Routing Protocols Topology Based Position Based Table Driven Hybrid Source Initiated On-Demand Driven Location Services Forwarding Strategy Ad Hoc Routing Protocols Overview
  • 18. Why traditional routing protocols are not suitable for MANET networks ?  Hidden Terminal Problem  Exposed node problem 1/3/2017 Unit - II Mobile Network Layer 18
  • 19. Routing Protocols Proactive Protocols  Determine routes independent of traffic pattern Traditional (link-state, distance-vector) routing protocols are proactive Reactive Protocols  Determine a route only if needed Hybrid protocols  Adaptive; Combination of proactive and reactive 1/3/2017 19Unit - II Mobile Network Layer
  • 20. Protocol Trade-offs Proactive protocols • Always maintain routes • Little or no delay for route determination • Consume bandwidth to keep routes up-to-date • Maintain routes which may never be used Reactive protocols • Lower overhead since routes are determined on demand • Significant delay in route determination • Employ flooding (global search) 1/3/2017 20Unit - II Mobile Network Layer
  • 21. Reactive Routing Protocols 1/3/2017 21Unit - II Mobile Network Layer
  • 22. Characteristics of Reactive Routing Protocols  Determine route if and when needed  Less control packet overhead  Source initiates route discovery process  More route discovery delay  Example: • Dynamic Source Routing (DSR) • Ad hoc On-Demand Distance Vector Routing (AODV) 1/3/2017 Unit - II Mobile Network Layer 22
  • 23. Dynamic Source Routing (DSR) [Johnson’96]  Two major phases: • Route Discovery, • Route Maintenance.  Node S initiates a route discovery  Source node S floods Route Request (RREQ)  Each node appends own identifier when forwarding RREQ 1/3/2017 23Unit - II Mobile Network Layer
  • 24. Route Discovery in DSR B A S E F H J D C G I K Represents a node that has received RREQ for D from S M N L 1/3/2017 Unit - II Mobile Network Layer 24
  • 25. Route Discovery in DSR B A S E F H J D C G I K Represents transmission of RREQ Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ [S] [S] 1/3/2017 Unit - II Mobile Network Layer 25
  • 26. Route Discovery in DSR B A S E F H J D C G I K Node H receives packet RREQ from two neighbors: Potential Collision M N L [S,E] [S,C][S,B] [S,B] [S,C] 1/3/2017 Unit - II Mobile Network Layer 26
  • 27. Route Discovery in DSR B A S E F H J D C G I K • Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ M N L [S,C,G] [S,E,F] 1/3/2017 Unit - II Mobile Network Layer 27
  • 28. Route Discovery in DSR • Nodes J and K both broadcast RREQ to node D • Since nodes J and K are hidden from each other, their transmissions may collide B A S E F H J D C G I K M N L [S,C,G,K] [S,E,F,J] Unit - II Mobile Network Layer1/3/2017 28
  • 29. Route Discovery in DSR B A S E F H J D C G I K Node D does not forward RREQ, because node D is the intended target of the route discovery M N L [S,E,F,J,M] Unit - II Mobile Network Layer1/3/2017 29
  • 30. Route Discovery in DSR  Destination D on receiving the first RREQ, sends a Route Reply (RREP)  RREP is sent on a route obtained by reversing the route appended to received RREQ  RREP includes the route from S to D on which RREQ was received by node D 1/3/2017 Unit - II Mobile Network Layer 30
  • 31. Route Reply in DSR B A S E F H J D C G I K M N L RREP [S,E,F,J,D] Represents RREP control message 1/3/2017 Unit - II Mobile Network Layer 31
  • 32. Route Reply in DSR Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are guaranteed to be bi-directional • To ensure this, RREQ should be forwarded only if it received on a link that is known to be bi-directional  If unidirectional (asymmetric) links are allowed, then RREP may need a route discovery for S from node D • Unless node D already knows a route to node S • If a route discovery is initiated by D for a route to S, then the Route Reply is piggybacked on the Route Request from D. 1/3/2017 Unit - II Mobile Network Layer 32
  • 33. Dynamic Source Routing (DSR)  Node S on receiving RREP, caches the route included in the RREP  When node S sends a data packet to D, the entire route is included in the packet header • hence the name source routing  Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded 1/3/2017 Unit - II Mobile Network Layer 33
  • 34. Data Delivery in DSR B A S E F H J D C G I K M N L DATA [S,E,F,J,D] Packet header size grows with route length 1/3/2017 Unit - II Mobile Network Layer 34
  • 35. DSR Optimization: Route Caching  Each node caches a new route  When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F  When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S  When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D 1/3/2017 Unit - II Mobile Network Layer 35 B A S E F H J D C G I K M N L DATA [S,E,F,J,D]
  • 36. DSR Optimization: Route Caching  When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D  A node may also learn a route when it overhears Data packets 1/3/2017 Unit - II Mobile Network Layer 36 B A S E F H J D C G I K M N L DATA [S,E,F,J,D]
  • 37. Use of Route Caching  When node S learns that a route to node D is broken, it uses another route from its local cache  Use of route cache • can speed up route discovery • can reduce propagation of route requests 1/3/2017 Unit - II Mobile Network Layer 37
  • 38. Dynamic Source Routing: Advantages  Routes maintained only between nodes who need to communicate • reduces overhead of route maintenance  Route caching can further reduce route discovery overhead  A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches 1/3/2017 38Unit - II Mobile Network Layer
  • 39. Dynamic Source Routing: Disadvantages  Packet header size grows  Flood of route requests may potentially reach all nodes in the network  Potential collisions between route requests propagated by neighboring nodes • insertion of random delays before forwarding RREQ  Increased contention if too many route replies come back due to nodes replying using their local cache • Route Reply Storm problem 1/3/2017 39Unit - II Mobile Network Layer
  • 40. 1/3/2017 Unit - II Mobile Network Layer 40 Proactive Routing Protocols
  • 41. Characteristics of Proactive Routing Protocols  Distributed, shortest-path protocols  Maintain routes between every host pair at all times  Based on Periodic updates of routing table  High routing overhead and consumes more bandwidth  Example: Destination Sequence Distance Vector (DSDV) 1/3/2017 Unit - II Mobile Network Layer 41
  • 42. Distance-Vector [Ford+ 1962]  known also as Distributed Bellman-Ford or RIP (Routing Information Protocol) The Meaning of Distance Vector:  A router using distance vector routing protocols knows 2 things: • Distance to final destination • Vector, or direction, traffic should be directed  Every node maintains a routing table • all available destinations • the next node to reach to destination • the number of hops to reach the destination  Periodically send table to all neighbors to maintain topology 1/3/2017 42Unit - II Mobile Network Layer
  • 43. Distance Vector (Tables) 1/3/2017 Unit - II Mobile Network Layer 43 D G A F E B C A B C D E F G A 0 1 1 ∞ 1 1 ∞ B 1 0 1 ∞ ∞ ∞ ∞ C 1 1 0 1 ∞ ∞ ∞ D ∞ ∞ 1 0 ∞ ∞ 1 E 1 ∞ ∞ ∞ 0 ∞ ∞ F 1 ∞ ∞ ∞ ∞ 0 1 G ∞ ∞ ∞ 1 ∞ 1 0
  • 44. Routing Tables • information, routing table at A is --> 1/3/2017 Unit - II Mobile Network Layer 44 D G A F E B C Cost Next Hop B 1 B C 1 C D ∞ - E 1 E F 1 F G ∞ -
  • 45. Evolution of the Table 1/3/2017 Unit - II Mobile Network Layer 45 Cost Next Hop B 1 B C 1 C D 2 C E 1 E F 1 F G 2 F D G A F E B C Each node sends a message to neighbors with a list of distances. F --> A with G is at a distance 1 C --> A with D at distance 1.
  • 46. Final Distance Matrix 1/3/2017 Unit - II Mobile Network Layer 46 A B C D E F G A 0 1 1 2 1 1 2 B 1 0 1 2 2 2 3 C 1 1 0 1 2 2 2 D 2 2 1 0 3 2 1 E 1 2 2 3 0 2 3 F 1 2 2 2 2 0 1 G 2 3 2 1 3 1 0 D G A F E B C
  • 47. Distance-Vector (Disadvantages) 1/3/2017 Unit - II Mobile Network Layer 47 A E B C D Link 1 Link 6 Link 2 Link 4 Link 3 Link 5 Destination Link Hop A Link 4 2 B Link 4 2 C Link 4 1 D Local 0 E Link 6 1 Initially nothing in routing table.  When it receives an update from C and E, it notes that these nodes are one hop away.  Subsequent route updates allow D to form its routing table.
  • 48. Distance-Vector (Disadvantages)  Link 2 is broken, Node A routes packets to C, D, and E through Node B.  Node B detects that Link 3 is broken.  It sets the distance to nodes C, D and E to be infinity.  Node B thinks it can route packets to C, D, and E via Node A. 1/3/2017 Unit - II Mobile Network Layer 48 Link 6 A E B C D Link 1 Link 2 Link 4 Link 3 Link 5 Broken Broken Network partitions into two isolated islands
  • 49. Distance-Vector (Disadvantages)  Node A thinks it can route packets to C, D, and E, via Node B.  A routing loop is formed – Counting to Infinity problem.  New Solution -> DSDV Protocol 1/3/2017 Unit - II Mobile Network Layer 49
  • 50. Destination Sequenced Distance Vector Routing (DSDV) [Perkins+ 1994]  Basic Routing Protocol  Based on Bellman ford routing algorithm with some improvement  Each node maintains a list of all destinations and number of hops to each destination.  Each entry is marked with a sequence number.  Periodically send table to all neighbors to maintain topology 1/3/2017 50Unit - II Mobile Network Layer
  • 51. Destination Sequenced Distance Vector Routing (DSDV)  Protocol Overview  Route Advertisements  Routing Table Entry Structure 1/3/2017 51Unit - II Mobile Network Layer
  • 52. Protocol Overview  Each Routing Table List all destinations and number of hops to each node  Each Route is tagged with a sequence number originated by destination  Updates are transmitted periodically and when there is any significant topology change  Routing information is transmitted by broadcast 1/3/2017 52Unit - II Mobile Network Layer
  • 53. Route Table Entry Structure  Destination’s Address  Number of hops required to reach the destination  Destination Sequence Number  Sequence number originated from destination. Ensures loop freeness.  Install Time when entry was made (used to delete stale entries from table) 1/3/2017 53Unit - II Mobile Network Layer
  • 54. DSDV (Route Advertisements) Advertise to each neighbor own routing information  Destination Address  Metric = Number of Hops to Destination  Destination Sequence Number Rules to set sequence number information  On each advertisement increase own destination sequence number (use only even numbers)  If a node is no more reachable (timeout) increase sequence number of this node by 1 (odd sequence number) and set metric =  1/3/2017 54Unit - II Mobile Network Layer
  • 55. DSDV (Route Selection) Update information is compared to own routing table  Select route with higher destination sequence number (This ensure to use always newest information from destination)  Select the route with better metric when sequence numbers are equal. 1/3/2017 Unit - II Mobile Network Layer 55
  • 56. Example of DSDV in operation 1/3/2017 Unit - II Mobile Network Layer 56 MH3 MH6 MH2 MH1 MH7 MH4 MH8 MH5 Destination Next Hop Metric Seq. No MH4 MH4 0 S406_MH4 MH1 MH2 2 S128_MH1 MH2 MH2 1 S564_MH2 MH3 MH2 2 S710_MH3 MH5 MH6 2 S392_MH5 MH6 MH6 1 S076_MH6 MH7 MH6 2 S128_MH7 MH8 MH6 3 S050_MH8
  • 57. DSDV (Disadvantages) 1/3/2017 57Unit - II Mobile Network Layer A E B C D Link 1 Link 2 Link 4 Link 3 Link 5 Broken Broken Network partitions into two isolated islands Node A’s update is state  Sequence number indicated for nodes C,D, and E is lower than the sequence number maintained at B. Looping avoided
  • 58. Responding to Topology Changes  Broken links indicated by   Any route through a hop with a broken link is also assigned    routes are immediately broadcast  Sequence number of Destination is incremented and information is broadcast  Nodes with same or higher sequence number broadcast their metric information  Data broadcast by “full dump” and “incremental” 1/3/2017 58Unit - II Mobile Network Layer
  • 59. Destination Sequenced Distance Vector Routing (DSDV) Advantages  Simple (almost like Distance Vector)  Loop free through destination seq. numbers  No latency caused by route discovery Disadvantages  Overhead: most routing information never used 1/3/2017 59Unit - II Mobile Network Layer
  • 60. Thank You 1/3/2017 60Unit - II Mobile Network Layer