SlideShare uma empresa Scribd logo
1 de 104
Outline  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cellular Wireless ,[object Object],[object Object],[object Object],[object Object],[object Object]
Multi-Hop Wireless ,[object Object],[object Object]
Mobile Ad Hoc Networks (MANET) ,[object Object],[object Object],[object Object],[object Object],A B A B
Why Ad Hoc Networks ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Many Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges in Mobile Environments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Effect of mobility on the protocol stack  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Medium Access Control in MANET
Motivation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Hidden and Exposed Terminals B A C
Multiple Access with Collision Avoidance (MACA)  [Karn90] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MACA Solutions  [Karn90] A B C RTS CTS CTS A B C RTS CTS RTS
MAC: Reliability ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.11 DCF  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],A B C
MAC: Collision Avoidance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC: Congestion Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
MAC: Energy Conservation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC Protocols: Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing Protocols
Traditional Routing ,[object Object],[object Object]
Distance-vector & Link-state Routing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Distance Vector Routing: Example   2 
Link State Routing: Example
Routing and Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mobile IP  Router 1 Router 3 Router 2 S MH Home  agent
Mobile IP Router 1 Router 3 Router 2 S MH Home agent Foreign agent move Packets are tunneled using  IP in IP
Routing in MANET
Unicast Routing Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Trade-offs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reactive Routing Protocols
Dynamic Source Routing (DSR)  [Johnson96] ,[object Object],[object Object],[object Object]
Route Discovery in DSR B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L
Route Discovery in DSR B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y]  Represents list of identifiers appended to RREQ
Route Discovery in DSR B A S E F H J D C G I K ,[object Object],[object Object],Z Y M N L [S,E] [S,C]
Route Discovery in DSR B A S E F H J D C G I K ,[object Object],[object Object],Z Y M N L [S,C,G] [S,E,F]
Route Discovery in DSR B A S E F H J D C G I K Z Y M ,[object Object],[object Object],[object Object],N L [S,C,G,K] [S,E,F,J]
Route Discovery in DSR B A S E F H J D C G I K Z Y ,[object Object],[object Object],M N L [S,E,F,J,M]
Route Discovery in DSR ,[object Object],[object Object],[object Object]
Route Reply in DSR B A S E F H J D C G I K Z Y M N L RREP [S,E,F,J,D] Represents RREP control message
Dynamic Source Routing (DSR) ,[object Object],[object Object],[object Object],[object Object]
Data Delivery in DSR B A S E F H J D C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length
DSR Optimization:  Route Caching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Source Routing: Advantages ,[object Object],[object Object],[object Object],[object Object]
Dynamic Source Routing: Disadvantages ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Location-Aided Routing (LAR)  [Ko98Mobicom] ,[object Object],[object Object],[object Object],[object Object],[object Object]
Request Zone ,[object Object],[object Object],[object Object],S Request Zone D Expected Zone x Y
Location Aided Routing (LAR) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ad Hoc On-Demand Distance Vector Routing (AODV)  [Perkins99Wmcsa] ,[object Object],[object Object],[object Object],[object Object],[object Object]
AODV ,[object Object],[object Object],[object Object],[object Object],[object Object]
Route Requests in AODV B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L
Route Requests in AODV B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L
Route Requests in AODV B A S E F H J D C G I K Represents links on Reverse Path Z Y M N L
Reverse Path Setup in AODV B A S E F H J D C G I K ,[object Object],[object Object],Z Y M N L
Reverse Path Setup in AODV B A S E F H J D C G I K Z Y M N L
Reverse Path Setup in AODV B A S E F H J D C G I K Z Y ,[object Object],[object Object],M N L
Forward Path Setup in AODV B A S E F H J D C G I K Z Y M N L Forward links are setup when RREP travels along the reverse path Represents a link on the forward path
Route Request and Route Reply ,[object Object],[object Object],[object Object],[object Object],[object Object]
Link Failure  ,[object Object],[object Object],[object Object],[object Object]
Route Error ,[object Object],[object Object],[object Object],[object Object],[object Object]
AODV: Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Other Protocols ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Signal Stability Routing (SSA)
Signal Stability Routing (SSA)
Link Reversal Algorithm  [Gafni81] A F B C E G D
Link Reversal Algorithm A F B C E G D Maintain a directed acyclic  graph (DAG)  for each  destination, with the destination being the  only   sink This DAG is for   destination  node D Links are bi-directional But algorithm imposes logical directions on them
Link Reversal Algorithm Link (G,D) broke A F B C E G D Any node,  other than the destination , that has no outgoing links reverses all its incoming links. Node G  has no outgoing links
Link Reversal Algorithm A F B C E G D Now nodes E and F have no outgoing links Represents a link that was reversed recently
Link Reversal Algorithm A F B C E G D Now nodes B and G have no outgoing links Represents a link that was reversed recently
Link Reversal Algorithm A F B C E G D Now nodes A and F have no outgoing links Represents a link that was reversed recently
Link Reversal Algorithm A F B C E G D Now all nodes (other than destination D) have an outgoing link Represents a link that was reversed recently
Link Reversal Algorithm A F B C E G D DAG has been restored with only the destination as a sink
Link Reversal Algorithm ,[object Object],[object Object],[object Object],[object Object]
Link Reversal Algorithm ,[object Object],[object Object],[object Object],[object Object]
Link Reversal Methods ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Temporally-Ordered Routing Algorithm (TORA)  [Park97Infocom] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Asymmetric Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CGSR
CEDAR B A C E J S K D F H G A core node Node E is the dominator  for nodes D, F and K
Proactive Routing Protocols
Destination-Sequenced Distance-Vector (DSDV)  [Perkins94Sigcomm] ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Destination-Sequenced Distance-Vector (DSDV) ,[object Object],[object Object],[object Object],[object Object],[object Object],X Y Z
Optimized Link State Routing (OLSR)  [Jacquet00ietf] ,[object Object],[object Object],[object Object],A B F C D E H G K J Node that has broadcast state information from A
Optimized Link State Routing (OLSR) ,[object Object],[object Object],[object Object],A B F C D E H G K J Node that has broadcast state information from A
Hybrid Routing Protocols
Zone Routing Protocol (ZRP)  [Haas98] ,[object Object],[object Object],[object Object],[object Object],[object Object]
Zone Routing Protocol (ZRP) Radius of routing zone  = 2
Routing Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transport in MANET
User Datagram Protocol (UDP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transmission Control Protocol (TCP) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Detection of packet loss in TCP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP in MANET ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Impact of Multi-hop Wireless Paths ,[object Object],[object Object],[object Object],[object Object],[object Object]
Impact of Node Mobility TCP throughput degrades with increase in mobility but  not always Larger route repair delays are especially  harmful mobility causes link breakage, resulting in route failure TCP data and acks en route discarded TCP sender times out. Starts sending packets again Route is repaired No throughput No throughput despite route repair
Improved Throughput with Increased Mobility ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],C B D A C B D A C B D A
Impact of Route Caching ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],timeout due to route failure timeout, cached route is broken timeout, second cached route also broken
Caching and TCP performance ,[object Object],[object Object],[object Object],[object Object],[object Object]
Impact of Acknowledgements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP Parameters after Route Repair ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Improving TCP Throughput ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
In Conclusion ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Senthil Kanth
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDr Praveen Jain
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 

Mais procurados (18)

Mac
MacMac
Mac
 
Manet
ManetManet
Manet
 
Manet
ManetManet
Manet
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 

Semelhante a UnIT VIII manet

Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxkapss043
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesJason Hando
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxmsohail37
 
Circuit Packet
Circuit PacketCircuit Packet
Circuit PacketWaqas !!!!
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layerstmavroidis
 
Wmcn ch.3
Wmcn ch.3Wmcn ch.3
Wmcn ch.3Alaa2
 
Routing Protocols for Adhoc wireless Network Dated 07-05-2023.pptx
Routing Protocols for Adhoc wireless Network Dated 07-05-2023.pptxRouting Protocols for Adhoc wireless Network Dated 07-05-2023.pptx
Routing Protocols for Adhoc wireless Network Dated 07-05-2023.pptxVanshikaAgarwal499417
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
 

Semelhante a UnIT VIII manet (20)

Manet
ManetManet
Manet
 
manet.ppt
manet.pptmanet.ppt
manet.ppt
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
networking
networkingnetworking
networking
 
11 circuit-packet
11 circuit-packet11 circuit-packet
11 circuit-packet
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
WLAN.pptx
WLAN.pptxWLAN.pptx
WLAN.pptx
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Chapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptxChapter_03_Data Link Layer and its protocols.pptx
Chapter_03_Data Link Layer and its protocols.pptx
 
Circuit Packet
Circuit PacketCircuit Packet
Circuit Packet
 
MANET.ppt
MANET.pptMANET.ppt
MANET.ppt
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Physical And Data Link Layers
Physical And Data Link LayersPhysical And Data Link Layers
Physical And Data Link Layers
 
Wmcn ch.3
Wmcn ch.3Wmcn ch.3
Wmcn ch.3
 
Routing Protocols for Adhoc wireless Network Dated 07-05-2023.pptx
Routing Protocols for Adhoc wireless Network Dated 07-05-2023.pptxRouting Protocols for Adhoc wireless Network Dated 07-05-2023.pptx
Routing Protocols for Adhoc wireless Network Dated 07-05-2023.pptx
 
A Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of ServiceA Survey on Cross Layer Routing Protocol with Quality of Service
A Survey on Cross Layer Routing Protocol with Quality of Service
 

Mais de sangusajjan

Unit iv atm networks
Unit iv atm networksUnit iv atm networks
Unit iv atm networkssangusajjan
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networkingsangusajjan
 
Network management
Network managementNetwork management
Network managementsangusajjan
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and videosangusajjan
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plansangusajjan
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introductionsangusajjan
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission controlsangusajjan
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlayssangusajjan
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and securitysangusajjan
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDPsangusajjan
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networkssangusajjan
 

Mais de sangusajjan (18)

Unit iv atm networks
Unit iv atm networksUnit iv atm networks
Unit iv atm networks
 
VoIP and multimedia networking
VoIP and multimedia networkingVoIP and multimedia networking
VoIP and multimedia networking
 
TCPIP
TCPIPTCPIP
TCPIP
 
Network management
Network managementNetwork management
Network management
 
Vp ns
Vp nsVp ns
Vp ns
 
Compression of digital voice and video
Compression of digital voice and videoCompression of digital voice and video
Compression of digital voice and video
 
ATM Network
ATM NetworkATM Network
ATM Network
 
Computer network lesson plan
Computer network lesson planComputer network lesson plan
Computer network lesson plan
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Profile
ProfileProfile
Profile
 
VII VoIP
VII VoIPVII VoIP
VII VoIP
 
VII Compression Introduction
VII Compression IntroductionVII Compression Introduction
VII Compression Introduction
 
UNIT II tramission control
UNIT II tramission controlUNIT II tramission control
UNIT II tramission control
 
Unit VI Overlays
Unit VI OverlaysUnit VI Overlays
Unit VI Overlays
 
Unit V network management and security
Unit V network management and securityUnit V network management and security
Unit V network management and security
 
Unit III IPV6 UDP
Unit III IPV6 UDPUnit III IPV6 UDP
Unit III IPV6 UDP
 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
Unit i packet switching networks
Unit i  packet switching networksUnit i  packet switching networks
Unit i packet switching networks
 

Último

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Último (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

UnIT VIII manet

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23.
  • 24. Distance Vector Routing: Example   2 
  • 26.
  • 27. Mobile IP Router 1 Router 3 Router 2 S MH Home agent
  • 28. Mobile IP Router 1 Router 3 Router 2 S MH Home agent Foreign agent move Packets are tunneled using IP in IP
  • 30.
  • 31.
  • 32.
  • 34.
  • 35. Route Discovery in DSR B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L
  • 36. Route Discovery in DSR B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L [S] [X,Y] Represents list of identifiers appended to RREQ
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. Route Reply in DSR B A S E F H J D C G I K Z Y M N L RREP [S,E,F,J,D] Represents RREP control message
  • 43.
  • 44. Data Delivery in DSR B A S E F H J D C G I K Z Y M N L DATA [S,E,F,J,D] Packet header size grows with route length
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Route Requests in AODV B A S E F H J D C G I K Z Y Represents a node that has received RREQ for D from S M N L
  • 54. Route Requests in AODV B A S E F H J D C G I K Represents transmission of RREQ Z Y Broadcast transmission M N L
  • 55. Route Requests in AODV B A S E F H J D C G I K Represents links on Reverse Path Z Y M N L
  • 56.
  • 57. Reverse Path Setup in AODV B A S E F H J D C G I K Z Y M N L
  • 58.
  • 59. Forward Path Setup in AODV B A S E F H J D C G I K Z Y M N L Forward links are setup when RREP travels along the reverse path Represents a link on the forward path
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 67. Link Reversal Algorithm [Gafni81] A F B C E G D
  • 68. Link Reversal Algorithm A F B C E G D Maintain a directed acyclic graph (DAG) for each destination, with the destination being the only sink This DAG is for destination node D Links are bi-directional But algorithm imposes logical directions on them
  • 69. Link Reversal Algorithm Link (G,D) broke A F B C E G D Any node, other than the destination , that has no outgoing links reverses all its incoming links. Node G has no outgoing links
  • 70. Link Reversal Algorithm A F B C E G D Now nodes E and F have no outgoing links Represents a link that was reversed recently
  • 71. Link Reversal Algorithm A F B C E G D Now nodes B and G have no outgoing links Represents a link that was reversed recently
  • 72. Link Reversal Algorithm A F B C E G D Now nodes A and F have no outgoing links Represents a link that was reversed recently
  • 73. Link Reversal Algorithm A F B C E G D Now all nodes (other than destination D) have an outgoing link Represents a link that was reversed recently
  • 74. Link Reversal Algorithm A F B C E G D DAG has been restored with only the destination as a sink
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80. CGSR
  • 81. CEDAR B A C E J S K D F H G A core node Node E is the dominator for nodes D, F and K
  • 83.
  • 84.
  • 85.
  • 86.
  • 88.
  • 89. Zone Routing Protocol (ZRP) Radius of routing zone = 2
  • 90.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 97. Impact of Node Mobility TCP throughput degrades with increase in mobility but not always Larger route repair delays are especially harmful mobility causes link breakage, resulting in route failure TCP data and acks en route discarded TCP sender times out. Starts sending packets again Route is repaired No throughput No throughput despite route repair
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.