SlideShare uma empresa Scribd logo
1 de 47
ROUTING PROTOCOLS IN WIRELESS NETWORK PRESENTED BY :- PANKAJ BARODIA ROLL NO. :- 09112019 M.TECH (CSE) Deenbandhu Chhotu Ram University of Science and Technology Murthal, Sonipat (Haryana), June 2011
What is routing ? ,[object Object],[object Object],[object Object],[object Object],What is protocol ? A specific set of communication rules by which computers communicate with each other.
What is routing protocols ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Wireless Network ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Networks Division
Ad-Hoc Routing protocols Ad-Hoc Routing Protocols Table Driven On-demand Driven WRP DSDV CGSR AODV  DSR   LMR   ABR TORA LSR Direct Descendants Logical   Descendants Proactive Reactive
Table Driven Routing Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
On-Demand Routing Protocols  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination Sequenced Distance Vector (DSDV)   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing table of Node A in this network is A B C Destination Next Hop Number of Hops Sequence Number Install Time A A 0 A 46 001000 B B 1 B 36 001200 C B 2 C 28 001500
Advantages of DSDV ,[object Object],[object Object],[object Object],[object Object]
Disadvantages of DSDV ,[object Object],[object Object],[object Object]
Wireless Routing Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Disadvantages of WRP ,[object Object],[object Object],Advantages of WRP ,[object Object]
[object Object],[object Object],[object Object],[object Object],Clusterhead Gateway Switch Routing (CGSR)
CGSR Example ,[object Object],[object Object],[object Object],[object Object],[object Object],1 2 3 5 4 6 7 8 Gateway Cluster head Node Cluster 1 Cluster 2 Cluster 3
Advantages of CGSR ,[object Object],[object Object]
Disadvantages of CGSR ,[object Object],[object Object],[object Object]
Ad Hoc On-demand Distance Vector Routing  (AODV)  ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Route reply process :
[object Object],[object Object]
1 2 3 5 7 8 4 6 1 2 3 5 7 8 4 Propagation of Route Request (RREQ) packet 6 Path taken by the Route Reply (RREP) packet Route Discovery in AODV :
Protocol Messaging S 1 2 D Hello RREQ RREP Data RERR
Advantages of AODV ,[object Object],[object Object]
Disadvantages of AODV ,[object Object],[object Object]
Dynamic Source Routing   (DSR)   The two major phases of the protocol are : 1. Route discovery  2. Route maintenance
DSR - Route Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]
DSR – Route Request S A G C F D B E S S-B S-B-E S-A S S-A-G S-A-G-F S-B S-B-C S-B-C RouteRequest Dropped
DSR – Route Reply S A G C F D B E S-B-E-D S-B-E-D S-B-E-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-B-E-D S-A-G-F-D
DSR - Route Maintenance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
DSR - Route Maintenance S A G C F D B E RouteError RouteError S-B-E-D S-A-G-F-D
Advantages of DSR ,[object Object],[object Object]
Disadvantages of DSR ,[object Object],[object Object],[object Object]
Temporally Ordered Routing Algorithm   (TORA)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TORA – Route Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object]
Illustration of TORA height metric Source Destination H = 0 H = 1 H = 2 H = 3
Route  Creation  of TORA 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 s s d d Propagation of QRY (reference level, height) Height of each node  updated by UPD (-,-) (-,-) (-,-) (-,-) (-,-) (-,-) (0,0) (-,-) (0,3) (0,3) (0,3) (0,2) (0,1) (0,0) (0,1) (0,2)
C A B E G (DEST) F H D QRY Route Creation of TORA QRY QRY UPD QRY QRY UPD UPD UPD UPD UPD UPD
Route maintenance C A B E F D UPD X UPD G (DEST) H
Advantages of TORA ,[object Object],[object Object],[object Object]
Disadvantages of TORA ,[object Object],[object Object]
References : ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 

Mais procurados (20)

Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
WCDMA
WCDMAWCDMA
WCDMA
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 

Semelhante a Wireless routing protocols

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.pptImXaib
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Narendra Singh Yadav
 
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET Journal
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsDharunMagil
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAyush Chhangani
 

Semelhante a Wireless routing protocols (20)

Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
Routing
RoutingRouting
Routing
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
 
IRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERPIRJET - A Review of Routing Protocols for Manets and AEERP
IRJET - A Review of Routing Protocols for Manets and AEERP
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
 

Último

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Wireless routing protocols

  • 1. ROUTING PROTOCOLS IN WIRELESS NETWORK PRESENTED BY :- PANKAJ BARODIA ROLL NO. :- 09112019 M.TECH (CSE) Deenbandhu Chhotu Ram University of Science and Technology Murthal, Sonipat (Haryana), June 2011
  • 2.
  • 3.
  • 4.
  • 6. Ad-Hoc Routing protocols Ad-Hoc Routing Protocols Table Driven On-demand Driven WRP DSDV CGSR AODV DSR LMR ABR TORA LSR Direct Descendants Logical Descendants Proactive Reactive
  • 7.
  • 8.
  • 9.
  • 10. Routing table of Node A in this network is A B C Destination Next Hop Number of Hops Sequence Number Install Time A A 0 A 46 001000 B B 1 B 36 001200 C B 2 C 28 001500
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. 1 2 3 5 7 8 4 6 1 2 3 5 7 8 4 Propagation of Route Request (RREQ) packet 6 Path taken by the Route Reply (RREP) packet Route Discovery in AODV :
  • 24. Protocol Messaging S 1 2 D Hello RREQ RREP Data RERR
  • 25.
  • 26.
  • 27. Dynamic Source Routing (DSR) The two major phases of the protocol are : 1. Route discovery 2. Route maintenance
  • 28.
  • 29.
  • 30. DSR – Route Request S A G C F D B E S S-B S-B-E S-A S S-A-G S-A-G-F S-B S-B-C S-B-C RouteRequest Dropped
  • 31. DSR – Route Reply S A G C F D B E S-B-E-D S-B-E-D S-B-E-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-B-E-D S-A-G-F-D
  • 32.
  • 33. DSR - Route Maintenance S A G C F D B E RouteError RouteError S-B-E-D S-A-G-F-D
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40. Illustration of TORA height metric Source Destination H = 0 H = 1 H = 2 H = 3
  • 41. Route Creation of TORA 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 s s d d Propagation of QRY (reference level, height) Height of each node updated by UPD (-,-) (-,-) (-,-) (-,-) (-,-) (-,-) (0,0) (-,-) (0,3) (0,3) (0,3) (0,2) (0,1) (0,0) (0,1) (0,2)
  • 42. C A B E G (DEST) F H D QRY Route Creation of TORA QRY QRY UPD QRY QRY UPD UPD UPD UPD UPD UPD
  • 43. Route maintenance C A B E F D UPD X UPD G (DEST) H
  • 44.
  • 45.
  • 46.
  • 47.