SlideShare uma empresa Scribd logo
1 de 22
CONTENTS
 Introduction
 What are MANETs?
 MANET protocols
 Reactive vs. Proactive Ad Hoc routing protocols
 Reactive Routing Protocol
 Proactive Routing Protocol
 Comparision simulation
 Conclusion
 References
 An autonomous system of mobile routers connected by wireless
links.
 The routers are free to move randomly and organize
themselves arbitrarily.
 A MANET is a wireless mobile network that is self-forming, self
maintained, and self-healing.
 Nodes stay connected even as the network topology changes.
 Each node needs to act as a router to relay packets to nodes
out of direct communication range.
Introduction
Mobile Ad-Hoc Networks
 A Collections of mobile nodes
dynamically forming a
temporary network.
 Nodes are arbitrarely located.
 Each node in a network
acts as a router.
 Goal: Correct
and efficient route
establishment to facilitate
communication.
Characteristic
s Dynamic topology.
 Variable capacity links.
 Energy-constrained mobile nodes.
 Weakened physical security.
Why traditional protocols are not suitable for
MANETs?
No pre-existing infrastructure.
Variable capacity links.
Dynamic topologies.
Limited physical security.
MANETs Use
 For military and rescue use.
 Internet / intranet hot spots in public transportation.
 Information distribution for meetings, seminars etc.
 New mobile devices are invented constantly and used
various ways.
MANET
Protocols
Ad-Hoc Routing Protocols
Reactive Proactive
TBRPF DSDVAODV DSR
DSR
 Designed for multihop wireless
ad-hoc networks.
 Two major phases:
 Route discovery :
used to discover new source
routes across multiple
network hops destinations
in an ad-hoc network
 Route Maintainance:
 When a node receives a Route-Request, it first searches its route
cache for the target node.
 If route is found, the node can send a Route-Reply to the initiator.
 Preventing Route-Reply storms:
To avoid storms, the DSR uses a random delay before a node
can send a Route-Reply.
d = H * (h – 1 + r)
• H, small const. Delay
• h, number of hops is source route
• r, 0 or 1
AODV
 An embedded MANET protocol
 works dynamically to establish and maintain routes
 AODV algorithm enables dynamic, self-starting, multihop routing
between participating mobile nodes
 AODV allows mobile nodes
 obtain routes quickly for new destinations.
 respond to link breakages
 changes in network topology in a timely manner.
Messages for route discovery
 Message types defined by AODV are
 RREQs
 RREPs
 RERRs
 Route Creation:
 When a source node does not have a route for a required destination.
 AODV initiates a route request/route reply cycle by broadcasting a
route request (RREQ) packet across the wireless network.
 Route Deletion:
 A route will remain active as long as data continues to travel across
the route
 If a route becomes inactive for a period of time, the route will be
deleted.
 Sequence Numbers:
 To avoid routing loops and to measure the “freshness” of route
information
DSDV
 Developed at the IBM, in 1996.
 Uses the modified Bellman-Ford algorithm.
 This is a Proactive Routing protocol, where the route is always
available.
 Operation:
 Mobile nodes maintain routes to all possible destinations.
 Hop counts are used as routing metrics.
 The node assigns sequence numbers to distance vector updates.
which updates contain information about the neighbors.
TBRPF
 Provides hop-by-hop routing
along shortest paths to each
destination.
 Using a modification of
Dijkstra's algorithm,each
node computes a source
tree.
 Two main modules:
 neighbor discovery module
 routing module.
 Neighbor Discovery:
 TND protocol allows each node i to quickly detect the neighbor nodes
j such that ij and ji exists.
 Nodes with multiple interfaces run TND separately on each interface
 Routing Module:
 Each node reports only part of its source tree to neighbors.
 Each node reports RT to neighbors in periodic topology updates
and reports changes to RT in more frequent differential updates
 Periodic updates inform new neighbors of RT
 Differential updates ensure the fast propagation of each topology
update to all nodes that are affected by the update.
Comparison Simulations
 Features of protocols:
AODV DSR TBRPF
Loop-freedom Yes Yes No
Multiple routes No Yes Possible
Unidirectional link
support
Possible Yes No
Multicast Possible No No
Periodic Broadcast Possible No Yes
Maximum No. of nodes <100 200 <200
Expiration of routing info. Yes No Yes
Category Reactive Reactive Proactive
Summarizing the results
a) Low mobility, low traffic
AODV
DSR TBRPF
Packet
delivery ratio
High High High
End to end
delay
Middle Middle Middle
Routing
overhead
Low Low Middle
Path
optimality
Middle Middle Very
good
b) High mobility, High traffic
AODV
DSR TBRPF
Packet
delivery ratio
Middle Middle High
End to end
delay
Middle Middle Middle
Routing
overhead
Very
High
Middle Middle
Path
optimality
Middle Low Good
Problems of the particular
protocols AODV
 uses more, but smaller routing control packets
 worse for a higher load.
 DSR has some problems concerning the cache usage:
 multiple routing
 the source-routing principle
 TBRPF
 packet loss, waste of bandwidth and causes other
problems.
Conclusion
 protocol max throughput
 DSDV small sized
 DSR medium sized
 AODV large sized
 fundamental questions to answer
 Scalability?
 Energy efficiency?
 Security?
 Combination of physical, data-link and network layer?
References
Websites:
 http://www.ietf.org/rfc/rfc3561.txt
 http://www.isi.edu/
 http://www.cs.technion.ac.il/
Books:
 Bertsekas, D. and R. Gallager, "Data
Networks, Prentice-Hall", 1
Ad hoc
Ad hoc

Mais conteúdo relacionado

Mais procurados

Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
Sohebuzzaman Khan
 

Mais procurados (20)

proactive and reactive routing comparisons
proactive and reactive routing comparisonsproactive and reactive routing comparisons
proactive and reactive routing comparisons
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
survey of manet protocols
survey of manet protocolssurvey of manet protocols
survey of manet protocols
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Energy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANETEnergy Efficient Multipath Routing Protocol For MANET
Energy Efficient Multipath Routing Protocol For MANET
 
Manet
ManetManet
Manet
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Energy Efficient Routing Approaches in Ad-hoc Networks
                Energy Efficient Routing Approaches in Ad-hoc Networks                Energy Efficient Routing Approaches in Ad-hoc Networks
Energy Efficient Routing Approaches in Ad-hoc Networks
 
Adhoc and routing protocols
Adhoc and routing protocolsAdhoc and routing protocols
Adhoc and routing protocols
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Mobile adhoc network
Mobile adhoc networkMobile adhoc network
Mobile adhoc network
 
MANETS Routing By Vikash Maianwal
MANETS Routing By Vikash MaianwalMANETS Routing By Vikash Maianwal
MANETS Routing By Vikash Maianwal
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP)
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)Introduction to mobile ad hoc network (m.a.net)
Introduction to mobile ad hoc network (m.a.net)
 

Destaque

Dynamics of Behavior in Organizations
Dynamics of Behavior in OrganizationsDynamics of Behavior in Organizations
Dynamics of Behavior in Organizations
mandalina landy
 
Proactive Selling Presentation
Proactive Selling PresentationProactive Selling Presentation
Proactive Selling Presentation
Brent Hillyer
 
Organizational Change and Development
Organizational Change and DevelopmentOrganizational Change and Development
Organizational Change and Development
Rajat Gupta
 

Destaque (10)

Habit #1 - Be Proactive
Habit #1 - Be ProactiveHabit #1 - Be Proactive
Habit #1 - Be Proactive
 
Dynamics of Behavior in Organizations
Dynamics of Behavior in OrganizationsDynamics of Behavior in Organizations
Dynamics of Behavior in Organizations
 
Proactive Selling Presentation
Proactive Selling PresentationProactive Selling Presentation
Proactive Selling Presentation
 
Chapter 1 the dynamics of people and organizations
Chapter 1 the dynamics of people and organizations Chapter 1 the dynamics of people and organizations
Chapter 1 the dynamics of people and organizations
 
Proactive vs reactive
Proactive vs reactiveProactive vs reactive
Proactive vs reactive
 
Proactive vs reactive
Proactive vs reactiveProactive vs reactive
Proactive vs reactive
 
Habit 1 Be Proactive Stephen Covey
Habit 1   Be Proactive Stephen CoveyHabit 1   Be Proactive Stephen Covey
Habit 1 Be Proactive Stephen Covey
 
Proactivity and How to be Proactive
Proactivity and How to be ProactiveProactivity and How to be Proactive
Proactivity and How to be Proactive
 
Organizational Change and Development
Organizational Change and DevelopmentOrganizational Change and Development
Organizational Change and Development
 
ORGANIZATIONAL CHANGE
ORGANIZATIONAL CHANGEORGANIZATIONAL CHANGE
ORGANIZATIONAL CHANGE
 

Semelhante a Ad hoc

Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
Sujit833143
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
researchinventy
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 

Semelhante a Ad hoc (20)

Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
 
Presentation MANETs.pptx
Presentation MANETs.pptxPresentation MANETs.pptx
Presentation MANETs.pptx
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.
 
Adhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptxAdhoc Sensor Networks1.pptx
Adhoc Sensor Networks1.pptx
 
Mane ts
Mane tsMane ts
Mane ts
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Q01821111115
Q01821111115Q01821111115
Q01821111115
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
H01115155
H01115155H01115155
H01115155
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Manet ppt
Manet pptManet ppt
Manet ppt
 

Mais de Shiva Krishna Chandra Shekar (20)

Airtel final
Airtel finalAirtel final
Airtel final
 
Airtel COMPNAY
Airtel COMPNAYAirtel COMPNAY
Airtel COMPNAY
 
Microsoft data access components
Microsoft data access componentsMicrosoft data access components
Microsoft data access components
 
Ldap
LdapLdap
Ldap
 
L2tp1
L2tp1L2tp1
L2tp1
 
Ivrs
IvrsIvrs
Ivrs
 
Ip sec
Ip secIp sec
Ip sec
 
I pod
I podI pod
I pod
 
Internet
InternetInternet
Internet
 
Image compression
Image compressionImage compression
Image compression
 
Hyper thread technology
Hyper thread technologyHyper thread technology
Hyper thread technology
 
Raju html
Raju htmlRaju html
Raju html
 
Raju
RajuRaju
Raju
 
Dba
DbaDba
Dba
 
Di splay systems
Di splay systemsDi splay systems
Di splay systems
 
Ananth3
Ananth3Ananth3
Ananth3
 
Ppt
PptPpt
Ppt
 
Honeypots
HoneypotsHoneypots
Honeypots
 
Ananth1
Ananth1Ananth1
Ananth1
 
Virtual instrumentation
Virtual instrumentationVirtual instrumentation
Virtual instrumentation
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Ad hoc

  • 1.
  • 2. CONTENTS  Introduction  What are MANETs?  MANET protocols  Reactive vs. Proactive Ad Hoc routing protocols  Reactive Routing Protocol  Proactive Routing Protocol  Comparision simulation  Conclusion  References
  • 3.  An autonomous system of mobile routers connected by wireless links.  The routers are free to move randomly and organize themselves arbitrarily.  A MANET is a wireless mobile network that is self-forming, self maintained, and self-healing.  Nodes stay connected even as the network topology changes.  Each node needs to act as a router to relay packets to nodes out of direct communication range. Introduction
  • 4. Mobile Ad-Hoc Networks  A Collections of mobile nodes dynamically forming a temporary network.  Nodes are arbitrarely located.  Each node in a network acts as a router.  Goal: Correct and efficient route establishment to facilitate communication.
  • 5. Characteristic s Dynamic topology.  Variable capacity links.  Energy-constrained mobile nodes.  Weakened physical security. Why traditional protocols are not suitable for MANETs? No pre-existing infrastructure. Variable capacity links. Dynamic topologies. Limited physical security.
  • 6. MANETs Use  For military and rescue use.  Internet / intranet hot spots in public transportation.  Information distribution for meetings, seminars etc.  New mobile devices are invented constantly and used various ways.
  • 8. DSR  Designed for multihop wireless ad-hoc networks.  Two major phases:  Route discovery : used to discover new source routes across multiple network hops destinations in an ad-hoc network
  • 9.  Route Maintainance:  When a node receives a Route-Request, it first searches its route cache for the target node.  If route is found, the node can send a Route-Reply to the initiator.  Preventing Route-Reply storms: To avoid storms, the DSR uses a random delay before a node can send a Route-Reply. d = H * (h – 1 + r) • H, small const. Delay • h, number of hops is source route • r, 0 or 1
  • 10. AODV  An embedded MANET protocol  works dynamically to establish and maintain routes  AODV algorithm enables dynamic, self-starting, multihop routing between participating mobile nodes  AODV allows mobile nodes  obtain routes quickly for new destinations.  respond to link breakages  changes in network topology in a timely manner.
  • 11. Messages for route discovery  Message types defined by AODV are  RREQs  RREPs  RERRs
  • 12.  Route Creation:  When a source node does not have a route for a required destination.  AODV initiates a route request/route reply cycle by broadcasting a route request (RREQ) packet across the wireless network.  Route Deletion:  A route will remain active as long as data continues to travel across the route  If a route becomes inactive for a period of time, the route will be deleted.  Sequence Numbers:  To avoid routing loops and to measure the “freshness” of route information
  • 13. DSDV  Developed at the IBM, in 1996.  Uses the modified Bellman-Ford algorithm.  This is a Proactive Routing protocol, where the route is always available.  Operation:  Mobile nodes maintain routes to all possible destinations.  Hop counts are used as routing metrics.  The node assigns sequence numbers to distance vector updates. which updates contain information about the neighbors.
  • 14. TBRPF  Provides hop-by-hop routing along shortest paths to each destination.  Using a modification of Dijkstra's algorithm,each node computes a source tree.  Two main modules:  neighbor discovery module  routing module.
  • 15.  Neighbor Discovery:  TND protocol allows each node i to quickly detect the neighbor nodes j such that ij and ji exists.  Nodes with multiple interfaces run TND separately on each interface  Routing Module:  Each node reports only part of its source tree to neighbors.  Each node reports RT to neighbors in periodic topology updates and reports changes to RT in more frequent differential updates  Periodic updates inform new neighbors of RT  Differential updates ensure the fast propagation of each topology update to all nodes that are affected by the update.
  • 16. Comparison Simulations  Features of protocols: AODV DSR TBRPF Loop-freedom Yes Yes No Multiple routes No Yes Possible Unidirectional link support Possible Yes No Multicast Possible No No Periodic Broadcast Possible No Yes Maximum No. of nodes <100 200 <200 Expiration of routing info. Yes No Yes Category Reactive Reactive Proactive
  • 17. Summarizing the results a) Low mobility, low traffic AODV DSR TBRPF Packet delivery ratio High High High End to end delay Middle Middle Middle Routing overhead Low Low Middle Path optimality Middle Middle Very good b) High mobility, High traffic AODV DSR TBRPF Packet delivery ratio Middle Middle High End to end delay Middle Middle Middle Routing overhead Very High Middle Middle Path optimality Middle Low Good
  • 18. Problems of the particular protocols AODV  uses more, but smaller routing control packets  worse for a higher load.  DSR has some problems concerning the cache usage:  multiple routing  the source-routing principle  TBRPF  packet loss, waste of bandwidth and causes other problems.
  • 19. Conclusion  protocol max throughput  DSDV small sized  DSR medium sized  AODV large sized  fundamental questions to answer  Scalability?  Energy efficiency?  Security?  Combination of physical, data-link and network layer?
  • 20. References Websites:  http://www.ietf.org/rfc/rfc3561.txt  http://www.isi.edu/  http://www.cs.technion.ac.il/ Books:  Bertsekas, D. and R. Gallager, "Data Networks, Prentice-Hall", 1