SlideShare a Scribd company logo
1 of 32
S
LK
G
H
I
J
A
B
C
D
E
Each node S in the network has a routing zone. This is
the proactive zone for S as S collects information
about its routing zone in the manner of the DSDV
protocol.
 The routing in ZRP is divided into two
parts
› Intrazone routing : First, the packet is sent
within the routing zone of the source node to
reach the peripheral nodes.
› Interzone routing : Then the packet is sent
from the peripheral nodes towards the
destination node.
S
D
intrazone
interzone
5#
Intrazone Routing
• Each node collects information about all
the nodes in its routing zone proactively.
This strategy is similar to a proactive
protocol like DSDV.
• Each node maintains a routing table for
its routing zone, so that it can find a route
to any node in the routing zone from this
table.
• Each node periodically broadcasts a
message similar to a hello message
known as a zone notification message.
6#
• A hello message dies after one hop, i.e.,
after reaching a node´s neighbours.
• A zone notification mesage dies after k
hops, i.e., after reaching the node´s
neighbours at a distance of k hops.
• Each node receiving this message
decreases the hop count of the message
by 1 and forwards the message to its
neighbours.
7#
S
CA
E
F
B
D
S performs route
discovery for D
Denotes route request
8#
S
CA
E
F
B
D
S performs route
discovery for D
Denotes route reply
E knows route from E to D,
so route request need not be
forwarded to D from E
9#
S
CA
E
F
B
D
S performs route
discovery for D
Denotes route taken by Data
10#
• The interzone routing discovers routes
to the destination reactively.
• Consider a source (S) and a
destination (D). If D is within the routing
zone of S, the routing is completed in
the intrazone routing phase.
• Otherwise, S sends the packet to the
peripheral nodes of its zone through
bordercasting.
11#
• S sends a route request (RREQ) message
to the peripheral nodes of its zone
through bordercasting.
• Each peripheral node P executes the
same algorithm.
– First, P checks whether the destination D is
within its routing zone and if so, sends the
packet to D.
– Otherwise, P sends the packet to the
peripheral nodes of its routing zone through
bordercasting.
12#
• The bordercasting to peripheral nodes
can be done mainly in two ways :
– By maintaining a multicast tree for the
peripheral nodes. S is the root of this tree.
– Otherwise, S maintains complete routing
table for its zone and routes the packet to
the peripheral nodes by consulting this
routing table.
13#
S
D
B
H
A
C
 If a node P finds that the destination D is
within its routing zone, P can initiate a route
reply.
 Each node appends its address to the RREQ
message during the route request phase.
This is similar to route request phase in DSR.
 This accumulated address can be used to
send the route reply (RREP) back to the
source node S.
14#
 An alternative strategy is to keep forward
and backward links at every node´s routing
table similar to the AODV protocol. This
helps in keeping the packet size constant.
 A RREQ usually results in more than one
RREP and ZRP keeps track of more than one
path between S and D. An alternative path
is chosen in case one path is broken.
15#
 When there is a broken link along an
active path between S and D, a local
path repair procedure is initiated.
 A broken link is always within the routing
zone of some node.
16#
S
D
 Hence, repairing a broken link requires
establishing a new path between two
nodes within a routing zone.
 The repair is done by the starting node of
the link (node A in the previous diagram)
by sending a route repair message to
node B within its routing zone.
 This is like a RREQ message from A with B
as the destination.
17#
 Interzone routing may generate many
copies of the same RREQ message if not
directed correctly.
 The RREQ should be steered towards the
destination or towards previously
unexplored regions of the network.
 Otherwise, the same RREQ message may
reach the same nodes many
times, causing the flooding of the
network. 18#
 Since each node has its own routing
zone, the routing zones of neighbouring
nodes overlap heavily.
 Since each peripheral node of a zone
forwards the RREQ message, the
message can reach the same node
multiple times without proper control.
 Each node may forward the same RREQ
multiple times.
19#
20#
The search explores new regions of the network.
 When a node P receives a RREQ
message, P records the message in its list
of RREQ messages that it has received.
 If P receives the same RREQ more than
once, it does not forward the RREQ the
second time onwards.
 Also P can keep track of passing RREQ
messages in several different ways.
21#
 In the promiscuous mode of operation
according to IEEE 802.11 standards, a node
can overhear passing traffic.
 Also, a node may act as a routing node
during bordercasting in the intrazone
routing phase.
 Whenever P receives a RREQ message
through any of these means, it remembers
which routing zone the message is meant
for.
22#
23#
P receives a RREQ from Q since P is a peripheral node for the routing
zone of Q.
P
QA
B
C
N
X
P does not bordercast the RREQ to A,B,...,N but only to X which is not in
its list.
 Suppose P has a list of nodes A, B,C,...,N
such that the RREQ message has already
arrived in the routing zones of the nodes
A, B, C, ...,N.
 Now P receives a request to forward a
RREQ message from another node Q.
 This may happen when P is a peripheral
node for the routing zone of Q.
24#
 The optimal zone radius depends on node
mobility and route query rates.
 When the radius of the routing zone is 1, the
behaviour of ZRP is like a pure reactive
protocol, for example, like DSR.
 When the radius of the routing zone is
infinity (or the diameter of the network), ZRP
behaves like a pure proactive protocol, for
example, like DSDV.
25#
 In the intrazone routing, each node needs
to construct the bordercast tree for its zone.
 With a zone radius of r, this requires
complete exchange of information over a
distance of 2r-1 hops.
 For unbounded networks with a uniform
distribution of nodes, this results in O( )
intrazone control traffic.
26#
2
r
 However, for a bounded network, the
dependence is lower than .
 There is no intrazone control traffic when
r=1.
 The intrazone control traffic grows fast in
practice with increase in zone radius. So,
it is important to keep the zone radius
small.
27#
2
r
 When the zone radius is 1, the control traffic
is maximum since ZRP degenerates into
flood search.
 In other words, every RREQ message
potentially floods the entire network. This is
due to the fact that all the neighbours of a
node n are its peripheral nodes.
 However, control traffic drops considerably
even if the zone radius is just 2.
28#
 The control traffic can be reduced
drastically with early query termination,
when a RREQ message is prevented from
going to the same region of the network
multiple times.
 However, the amount of control traffic
depends both on node mobility and query
rate.
 The performance of ZRP is measured by
compairing control traffic with call-to-
mobility (CMR) ratio.
29#
 The call-to-mobility ratio (CMR) is the ratio
of route query rate to node speed.
 As CMR increases, the number of control
messages is reduced by increasing the
radius of the routing zones.
 This is because, it is easier to maintain larger
routing zones if mobility is low. Hence, route
discovery traffic also reduces.
30#
 On the other hand, CMR is low if mobility is
high.
 In such a case, the routing zone
maintenance becomes very costly and
smaller routing zones are better for
reducing control traffic.
 An optimally configured ZRP for a CMR of
500 [query/km] produces 70% less traffic
than flood searching.
31#
 For a fixed CMR, the route query
response time decreases initially with
increased zone radius.
 However, after a certain radius, the
response time increases with zone radius.
 This is due to the fact that the network
takes longer time to settle even with
small changes in large routing zones.
32#

More Related Content

What's hot

Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Congestion control
Congestion controlCongestion control
Congestion controlAman Jaiswal
 
Unit 4 -2 energy management in adhoc wireless network
Unit 4 -2 energy management in adhoc wireless networkUnit 4 -2 energy management in adhoc wireless network
Unit 4 -2 energy management in adhoc wireless networkdevika g
 
Mobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple WordsMobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple WordsAssim Mubder
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network ArchitecturePawandeep Singh
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...Pallepati Vasavi
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 

What's hot (20)

IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Manet
ManetManet
Manet
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Congestion control
Congestion controlCongestion control
Congestion control
 
Congestion control in TCP
Congestion control in TCPCongestion control in TCP
Congestion control in TCP
 
Unit 4 -2 energy management in adhoc wireless network
Unit 4 -2 energy management in adhoc wireless networkUnit 4 -2 energy management in adhoc wireless network
Unit 4 -2 energy management in adhoc wireless network
 
Mobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple WordsMobile Originated Call Process in Simple Words
Mobile Originated Call Process in Simple Words
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Wireless Network Architecture
Wireless Network ArchitectureWireless Network Architecture
Wireless Network Architecture
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 

Viewers also liked

Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 

Viewers also liked (6)

Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Similar to Zone Routing Protocol

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsSenthil Kanth
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSRMitesh Thakore
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVHemalathaR31
 

Similar to Zone Routing Protocol (20)

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Notes
NotesNotes
Notes
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Grayhole
GrayholeGrayhole
Grayhole
 
analysins aodv
analysins aodvanalysins aodv
analysins aodv
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSR
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDVUNIT 2 WIRELESS NETWORKS - MANET and DSDV
UNIT 2 WIRELESS NETWORKS - MANET and DSDV
 

More from nitss007

Practical ethics
Practical ethicsPractical ethics
Practical ethicsnitss007
 
Political violence
Political violencePolitical violence
Political violencenitss007
 
Incentives
IncentivesIncentives
Incentivesnitss007
 
Freakonomics
FreakonomicsFreakonomics
Freakonomicsnitss007
 
Personality Development
Personality DevelopmentPersonality Development
Personality Developmentnitss007
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 

More from nitss007 (6)

Practical ethics
Practical ethicsPractical ethics
Practical ethics
 
Political violence
Political violencePolitical violence
Political violence
 
Incentives
IncentivesIncentives
Incentives
 
Freakonomics
FreakonomicsFreakonomics
Freakonomics
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Zone Routing Protocol

  • 1.
  • 2.
  • 3. S LK G H I J A B C D E Each node S in the network has a routing zone. This is the proactive zone for S as S collects information about its routing zone in the manner of the DSDV protocol.
  • 4.  The routing in ZRP is divided into two parts › Intrazone routing : First, the packet is sent within the routing zone of the source node to reach the peripheral nodes. › Interzone routing : Then the packet is sent from the peripheral nodes towards the destination node. S D intrazone interzone
  • 5. 5# Intrazone Routing • Each node collects information about all the nodes in its routing zone proactively. This strategy is similar to a proactive protocol like DSDV. • Each node maintains a routing table for its routing zone, so that it can find a route to any node in the routing zone from this table. • Each node periodically broadcasts a message similar to a hello message known as a zone notification message.
  • 6. 6# • A hello message dies after one hop, i.e., after reaching a node´s neighbours. • A zone notification mesage dies after k hops, i.e., after reaching the node´s neighbours at a distance of k hops. • Each node receiving this message decreases the hop count of the message by 1 and forwards the message to its neighbours.
  • 7. 7# S CA E F B D S performs route discovery for D Denotes route request
  • 8. 8# S CA E F B D S performs route discovery for D Denotes route reply E knows route from E to D, so route request need not be forwarded to D from E
  • 9. 9# S CA E F B D S performs route discovery for D Denotes route taken by Data
  • 10. 10# • The interzone routing discovers routes to the destination reactively. • Consider a source (S) and a destination (D). If D is within the routing zone of S, the routing is completed in the intrazone routing phase. • Otherwise, S sends the packet to the peripheral nodes of its zone through bordercasting.
  • 11. 11# • S sends a route request (RREQ) message to the peripheral nodes of its zone through bordercasting. • Each peripheral node P executes the same algorithm. – First, P checks whether the destination D is within its routing zone and if so, sends the packet to D. – Otherwise, P sends the packet to the peripheral nodes of its routing zone through bordercasting.
  • 12. 12# • The bordercasting to peripheral nodes can be done mainly in two ways : – By maintaining a multicast tree for the peripheral nodes. S is the root of this tree. – Otherwise, S maintains complete routing table for its zone and routes the packet to the peripheral nodes by consulting this routing table.
  • 14.  If a node P finds that the destination D is within its routing zone, P can initiate a route reply.  Each node appends its address to the RREQ message during the route request phase. This is similar to route request phase in DSR.  This accumulated address can be used to send the route reply (RREP) back to the source node S. 14#
  • 15.  An alternative strategy is to keep forward and backward links at every node´s routing table similar to the AODV protocol. This helps in keeping the packet size constant.  A RREQ usually results in more than one RREP and ZRP keeps track of more than one path between S and D. An alternative path is chosen in case one path is broken. 15#
  • 16.  When there is a broken link along an active path between S and D, a local path repair procedure is initiated.  A broken link is always within the routing zone of some node. 16# S D
  • 17.  Hence, repairing a broken link requires establishing a new path between two nodes within a routing zone.  The repair is done by the starting node of the link (node A in the previous diagram) by sending a route repair message to node B within its routing zone.  This is like a RREQ message from A with B as the destination. 17#
  • 18.  Interzone routing may generate many copies of the same RREQ message if not directed correctly.  The RREQ should be steered towards the destination or towards previously unexplored regions of the network.  Otherwise, the same RREQ message may reach the same nodes many times, causing the flooding of the network. 18#
  • 19.  Since each node has its own routing zone, the routing zones of neighbouring nodes overlap heavily.  Since each peripheral node of a zone forwards the RREQ message, the message can reach the same node multiple times without proper control.  Each node may forward the same RREQ multiple times. 19#
  • 20. 20# The search explores new regions of the network.
  • 21.  When a node P receives a RREQ message, P records the message in its list of RREQ messages that it has received.  If P receives the same RREQ more than once, it does not forward the RREQ the second time onwards.  Also P can keep track of passing RREQ messages in several different ways. 21#
  • 22.  In the promiscuous mode of operation according to IEEE 802.11 standards, a node can overhear passing traffic.  Also, a node may act as a routing node during bordercasting in the intrazone routing phase.  Whenever P receives a RREQ message through any of these means, it remembers which routing zone the message is meant for. 22#
  • 23. 23# P receives a RREQ from Q since P is a peripheral node for the routing zone of Q. P QA B C N X P does not bordercast the RREQ to A,B,...,N but only to X which is not in its list.
  • 24.  Suppose P has a list of nodes A, B,C,...,N such that the RREQ message has already arrived in the routing zones of the nodes A, B, C, ...,N.  Now P receives a request to forward a RREQ message from another node Q.  This may happen when P is a peripheral node for the routing zone of Q. 24#
  • 25.  The optimal zone radius depends on node mobility and route query rates.  When the radius of the routing zone is 1, the behaviour of ZRP is like a pure reactive protocol, for example, like DSR.  When the radius of the routing zone is infinity (or the diameter of the network), ZRP behaves like a pure proactive protocol, for example, like DSDV. 25#
  • 26.  In the intrazone routing, each node needs to construct the bordercast tree for its zone.  With a zone radius of r, this requires complete exchange of information over a distance of 2r-1 hops.  For unbounded networks with a uniform distribution of nodes, this results in O( ) intrazone control traffic. 26# 2 r
  • 27.  However, for a bounded network, the dependence is lower than .  There is no intrazone control traffic when r=1.  The intrazone control traffic grows fast in practice with increase in zone radius. So, it is important to keep the zone radius small. 27# 2 r
  • 28.  When the zone radius is 1, the control traffic is maximum since ZRP degenerates into flood search.  In other words, every RREQ message potentially floods the entire network. This is due to the fact that all the neighbours of a node n are its peripheral nodes.  However, control traffic drops considerably even if the zone radius is just 2. 28#
  • 29.  The control traffic can be reduced drastically with early query termination, when a RREQ message is prevented from going to the same region of the network multiple times.  However, the amount of control traffic depends both on node mobility and query rate.  The performance of ZRP is measured by compairing control traffic with call-to- mobility (CMR) ratio. 29#
  • 30.  The call-to-mobility ratio (CMR) is the ratio of route query rate to node speed.  As CMR increases, the number of control messages is reduced by increasing the radius of the routing zones.  This is because, it is easier to maintain larger routing zones if mobility is low. Hence, route discovery traffic also reduces. 30#
  • 31.  On the other hand, CMR is low if mobility is high.  In such a case, the routing zone maintenance becomes very costly and smaller routing zones are better for reducing control traffic.  An optimally configured ZRP for a CMR of 500 [query/km] produces 70% less traffic than flood searching. 31#
  • 32.  For a fixed CMR, the route query response time decreases initially with increased zone radius.  However, after a certain radius, the response time increases with zone radius.  This is due to the fact that the network takes longer time to settle even with small changes in large routing zones. 32#