ROUTING
FUNDAMENTAL STEPS IN ROUTING
MANET VS TRADITIONAL ROUTING
ROUTING PROTOCOLS/TYPES OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
SECURITY IN MANET’S
1. A Presentation of Mobile computing
Mobile Ad Hoc Network
Submitted to: - Submitted by:-
Mr. RAJDEEP SINGH VIKASH MAINANWAL
Department of Computer Science & Engineering
Punjab Institute of Technology, Kapurthala
(PTU Main Campus)
2. CONTENTS:
• ROUTING
• FUNDAMENTAL STEPS IN
ROUTING
• MANET VS TRADITIONAL
ROUTING
• ROUTING PROTOCOLS/TYPES
OF MANETS ROUTING
REACTIVE PROTOCOL
PROACTIVE PROTOCOL
HYBRID PROTOCOL
• SECURITY IN MANET’S
• BIBLOGRAPHY
3. ROUTING
Routing is to find correct path between the source and destination for
forwarding packets.
Routing is complex task in MANET’s because
• The Traditional algorithm will not be suitable.
• Centralized approaches will not be appropriate.
• “Flooding” can be applied in ad-hoc network but is not efficient method.
• For removing that we use hop counter.
4. Start
Node send the signal to find the no. of other nodes
within range.
Synchronization b/w nodes
Sender node send msg. to receiver node
Is
receiving
node
Ready
Receiving
node send
back
Ready signal
Wait for
sometime
Comm.begins
Term. process
Stop
YES
NO
5. FUNDAMENTAL STEPS IN ROUTING
• Forwarding the packets to next hop. Is it like input interface
to an output interface in a traditional network.
• While forwarding packet sender much check the parameters:
a) Packet reaching the destination.
b) Minimize the number of hops/path length.
c) Minimize the delay.
d) Minimize the packet loss.
e) Minimize the cost involved.
6. MANET VS TRADITIONAL ROUTING
There is limited physical security in a MANET compared to a traditional
routing
Increased possibility of eavesdropping, spoofing, and denial-of-security attacks
Traditional routing protocols for wired networks do not work well in most
MANETs
MANETs are too dynamic
Wireless links present problems of interference, limited capacity, etc.
The MANETs consider the layer 2 and 3 information whereas in traditional
routing must consider on layer 3 information.
Main Issue to be addressed by routing protocol in MANET are:-
1) Routing discovery
2) Data forwarding.
3) Route maintenance
7. TYPES OF MANETS ROUTING PROTOCOLS
Mobile ad hoc network’s routing protocols are characteristically subdivided
into three main categories. These are proactive routing protocols, reactive
routing protocols and hybrid routing protocols.
8. REACTIVE ROUTING PROTOCOLS
AD HOC ON DEMAND DISTANCE VESTOR(AODV)
DYNAMIC SOURCE ROUTING(DSR)
ADMISSION CONTROL ENABLED ON DEMAND
ROUTING(ACOR)
ASSOCIATIVITY BASED ROUTING(ABR)
9. Re-active routing protocols
Does not take initiative for finding routes
Establishes routes “on demand” by flooding a query
Pros and cons:
Does not use bandwidth except when needed (when
finding a route)
Much network overhead in the flooding process when
querying for routes
Initial delay in traffic
13. PROACTIVE ROUTING PROTOCOLS
DESTINATION SEQUENCED DISTANCE
VECTOR(DSDV)
OPTIMISED LINK STATE ROUTING(OLSR)
WIRELESS ROUTING PROTOCOL(WRP)
CLUSTER HEAD GATE WAY SWITCH
ROUTING(CGSR)
14. Pro-active routing protocols
Routes are set up based on continuous control traffic
All routes are maintained all the time
1. Neighbor/link sensing
2. Optimized flooding/forwarding(Multi point relaying)
3. Link-State messaging and route calculation
Pros and cons:
Constant overhead created by control traffic
Routes are always available
23. BIBILOGRAPHY
• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html
• http://www.computingunplugged.com/issues/issue200407/00001326002
• http://wiki.uni.lu/secan-lab/AdHoc+Protocols+%28$28%29Classification%
28$29%29.html
• http://www1.cse.wustl.edu/~jain/cis788-99/adhoc_routing/index.html
• Andrew Tanenbaum. Computer Networks. Prentice Hall Professional Tech-
nical Reference, 2002.
• Charles E. Perkins. Ad hoc networking. Addison-Wesley Publishing Com-
pany, 2001.
• David B Johnson and David A Maltz. Dynamic source routing in ad hoc
• wireless networks. In Imielinski and Korth, editors, Mobile Computing,
• volume 353. Kluwer Academic Publishers, 1996.
• http://as.wiley.com/WileyCDA/WileyTitle/productCd-0471373133.html
• http://www.ietf.org/rfc/rfc2501.txt