SlideShare uma empresa Scribd logo
1 de 40
Presentation
Mobile Ad-Hoc Networks
LRA & TORA
Presentation
Mobile Ad-Hoc networks
LRA & TORA
Members
• Usman Mukhtar
• Shahbaz khan
Submitted to:
11031556-o46
11031556-030
Sir Waqas Mehmood
Link Reversal Algorithm
4
A FB
C E G
D
Maintain a directed acyclic
graph (DAG) for each
destination, with the destination
being the only sink
This DAG is for destination
node D
Links are bi-directional
But algorithm imposes
logical directions on them
Link Reversal Algorithm
Link (G,D) broke
A FB
C E G
D
Any node, other than the destination, that has no outgoing links
reverses all its incoming links.
Node G has no outgoing links
Link Reversal Algorithm
A FB
C E G
D
Now nodes E and F have no outgoing links
Represents a
link that was
reversed recently
Link Reversal Algorithm
A FB
C E G
D
Now nodes B and G have no outgoing links
Represents a
link that was
reversed recently
Link Reversal Algorithm
A FB
C E G
D
Now nodes A and F have no outgoing links
Represents a
link that was
reversed recently
Link Reversal Algorithm
A FB
C E G
D
Now all nodes (other than destination D) have an outgoing link
Represents a
link that was
reversed recently
Link Reversal Algorithm
10
A FB
C E G
D
DAG has been restored with only the destination as a sink
Link Reversal Algorithm
• Attempts to keep link reversals local to
where the failure occurred
– But this is not guaranteed
• When the first packet is sent to a
destination, the destination oriented DAG
is constructed
• The initial construction does result in
flooding of control packets
Link Reversal Algorithm
• The previous algorithm is called a full reversal
method since when a node reverses links, it
reverses all its incoming links
• Partial reversal method : A node reverses
incoming links from only those neighbors who
have not themselves reversed links “previously”
– If all neighbors have reversed links, then the node
reverses all its incoming links
– “Previously” at node X means since the last link
reversal done by node X
12
Partial Reversal Method
Link (G,D) broke
A FB
C E G
D
Node G has no outgoing links
Partial Reversal Method
A FB
C E G
D
Now nodes E and F have no outgoing links
Represents a
link that was
reversed recently
Represents a
node that has
reversed links
Partial Reversal Method
A FB
C E G
D
Nodes E and F do not reverse links from node G
Now node B has no outgoing links
Represents a
link that was
reversed recently
Partial Reversal Method
A FB
C E G
D
Now node A has no outgoing links
Represents a
link that was
reversed recently
Partial Reversal Method
A FB
C E G
D
Now all nodes (except destination D) have outgoing links
Represents a
link that was
reversed recently
Partial Reversal Method
A FB
C E G
D
DAG has been restored with only the destination as a sink
Link Reversal Methods:
Advantages
• Each node may potentially have multiple
routes to a destination
• Routing
• Leader election
• Scheduling
• Source allocation
Link Reversal Methods:
Disadvantage
• Need a mechanism to detect link failure
– hello messages may be used
– but hello messages can add to contention
• If network is partitioned, link reversals
continue indefinitely
Link Reversal in a Partitioned
Network
A FB
C E G
D
This DAG is for destination node D
Full Reversal in a Partitioned
Network
A FB
C E G
D
A and G do not have outgoing links
Full Reversal in a Partitioned
Network
A FB
C E G
D
E and F do not have outgoing links
Full Reversal in a Partitioned
Network
A FB
C E G
D
B and G do not have outgoing links
Full Reversal in a Partitioned
Network
A FB
C E G
D
E and F do not have outgoing links
Full Reversal in a Partitioned
Network
A FB
C E G
D
In the partition
disconnected from
destination D, link
reversals continue, until
the partitions merge
Need a mechanism to
minimize this wasteful
activity
Similar scenario can
occur with partial
reversal method too
Temporally-Ordered Routing
Algorithm(TORA)
• TORA modifies the partial link reversal
method to be able to detect partitions
• When a partition is detected, all nodes in
the partition are informed, and link
reversals in that partition cease
Partition Detection in TORA
A
B
E
D
F
C
DAG for
destination D
Partition Detection in TORA
A
B
E
D
F
C
TORA uses a
modified partial
reversal method
Node A has no outgoing links
Partition Detection in TORA
A
B
E
D
F
C
TORA uses a
modified partial
reversal method
Node B has no outgoing links
Partition Detection in TORA
A
B
E
D
F
C
Node B has no outgoing links
Partition Detection in TORA
A
B
E
D
F
C
Node C has no outgoing links -- all its neighbor have
reversed links previously.
Partition Detection in TORA
A
B
E
D
F
C
Nodes A and B receive the reflection from node C
Node B now has no outgoing link
Partition Detection in TORA
A
B
E
D
F
C
Node A has received the reflection from all its neighbors.
Node A determines that it is partitioned from destination D.
Node B propagates
the reflection to node A
Partition Detection in TORA
A
B
E
D
F
C
On detecting a partition,
node A sends a clear (CLR)
message that purges all
directed links in that
partition
TORA
• Improves on the partial link reversal
method in [Gafni81] by detecting partitions
and stopping non-productive link reversals
• Paths may not be shortest
• The DAG provides many hosts the ability
to send packets to a given destination
– Beneficial when many hosts want to
communicate with a single destination
TORA Design Decision
• TORA performs link reversals as dictated by
[Gafni81]
• However, when a link breaks, it looses its
direction
• When a link is repaired, it may not be
assigned a direction, unless some node has
performed a route discovery after the link
broke
TORA Design Decision…
– if no one wants to send packets to D anymore,
eventually, the DAG for destination D may disappear
• TORA makes effort to maintain the DAG for D
only if someone needs route to D
– Reactive behavior
TORA Design Decision
• One proposal for modifying TORA optionally
allowed a more proactive behavior, such that
a DAG would be maintained even if no node
is attempting to transmit to the destination
• Moral of the story: The link reversal algorithm
in [Gafni81] does not dictate a proactive or
reactive response to link failure/repair
• Decision on reactive/proactive behavior
should be made based on environment under
consideration
LRA and TORA in MANETS

Mais conteúdo relacionado

Mais procurados

Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer ModeNishant Munjal
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)Netwax Lab
 
Wireless networks
Wireless networksWireless networks
Wireless networksprabhuasb
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layersambhenilesh
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
Routing Presentation
Routing PresentationRouting Presentation
Routing PresentationMohsin Ali
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Hamidreza Bolhasani
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to routerFarhan Galib
 
Improving tcp performance over mobile ad hoc networks
Improving tcp performance over mobile ad hoc networksImproving tcp performance over mobile ad hoc networks
Improving tcp performance over mobile ad hoc networksArpita Naskar
 
Delays in packet switch network
Delays in packet switch networkDelays in packet switch network
Delays in packet switch networkShanza Sohail
 
6lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp016lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp01mrmr2010i
 
Topic : ISDN(integrated services digital network) part 2
Topic : ISDN(integrated services digital network) part 2Topic : ISDN(integrated services digital network) part 2
Topic : ISDN(integrated services digital network) part 2Dr Rajiv Srivastava
 
5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspectiveSridhar Bhaskaran
 
Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation Frikha Nour
 

Mais procurados (20)

Asynchronous Transfer Mode
Asynchronous Transfer ModeAsynchronous Transfer Mode
Asynchronous Transfer Mode
 
RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)RSTP (rapid spanning tree protocol)
RSTP (rapid spanning tree protocol)
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Routing algorithm network layer
Routing algorithm  network layerRouting algorithm  network layer
Routing algorithm network layer
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
Network software
Network softwareNetwork software
Network software
 
Routing Presentation
Routing PresentationRouting Presentation
Routing Presentation
 
Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)Transport Layer in Computer Networks (TCP / UDP / SCTP)
Transport Layer in Computer Networks (TCP / UDP / SCTP)
 
Introduction to router
Introduction to routerIntroduction to router
Introduction to router
 
Improving tcp performance over mobile ad hoc networks
Improving tcp performance over mobile ad hoc networksImproving tcp performance over mobile ad hoc networks
Improving tcp performance over mobile ad hoc networks
 
Delay telerant network
Delay telerant networkDelay telerant network
Delay telerant network
 
Mikrotik advanced
Mikrotik advancedMikrotik advanced
Mikrotik advanced
 
Delays in packet switch network
Delays in packet switch networkDelays in packet switch network
Delays in packet switch network
 
Vlan
Vlan Vlan
Vlan
 
6lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp016lowpan 110828234426-phpapp01
6lowpan 110828234426-phpapp01
 
How BGP Works
How BGP WorksHow BGP Works
How BGP Works
 
Topic : ISDN(integrated services digital network) part 2
Topic : ISDN(integrated services digital network) part 2Topic : ISDN(integrated services digital network) part 2
Topic : ISDN(integrated services digital network) part 2
 
5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective5 g core network and the cloud - A standards perspective
5 g core network and the cloud - A standards perspective
 
Sdn presentation
Sdn presentation Sdn presentation
Sdn presentation
 

Destaque

SISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIAN
SISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIANSISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIAN
SISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIANrusdiman1
 
Macro diagrams and definitions
Macro diagrams and definitionsMacro diagrams and definitions
Macro diagrams and definitions12jostma
 
Leicester Research Archive (LRA): the work of a repository administrator
Leicester Research Archive (LRA): the work of a repository administratorLeicester Research Archive (LRA): the work of a repository administrator
Leicester Research Archive (LRA): the work of a repository administratorGaz Johnson
 
3.3 Macro Economic Models
3.3   Macro Economic Models3.3   Macro Economic Models
3.3 Macro Economic ModelsAndrew McCarthy
 
Nuove norme sul segreto di stato e sulle informazioni classificate
Nuove norme sul segreto di stato e sulle informazioni classificateNuove norme sul segreto di stato e sulle informazioni classificate
Nuove norme sul segreto di stato e sulle informazioni classificateDirectio
 
Delray Presentation Microsoft
Delray Presentation MicrosoftDelray Presentation Microsoft
Delray Presentation MicrosoftSerein
 
Diagnosis evaluation in strabismus
Diagnosis evaluation in strabismusDiagnosis evaluation in strabismus
Diagnosis evaluation in strabismusJayarajini
 
Section 3 student version
Section 3 student version Section 3 student version
Section 3 student version Raymond Lin
 
The Stars My Destination
The Stars My DestinationThe Stars My Destination
The Stars My DestinationGaz Johnson
 
3.4 Demand And Supply Side Policies
3.4   Demand And Supply Side Policies3.4   Demand And Supply Side Policies
3.4 Demand And Supply Side PoliciesAndrew McCarthy
 
E commerce
E commerceE commerce
E commerceGBC
 
Usability Ergebnisse Umfrage
Usability  Ergebnisse UmfrageUsability  Ergebnisse Umfrage
Usability Ergebnisse UmfrageNina Rebele
 
Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...
Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...
Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...Axel Bruns
 
Comment déterminer le critère de jugement et le nombre de sujets nécessaires
Comment déterminer le critère de jugement et le nombre de sujets nécessairesComment déterminer le critère de jugement et le nombre de sujets nécessaires
Comment déterminer le critère de jugement et le nombre de sujets nécessairesHubert Maisonneuve
 

Destaque (20)

SISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIAN
SISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIANSISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIAN
SISTEM AKUNTANSI DAERAH - LAPORAN KONSOLIDASIAN
 
Macro diagrams and definitions
Macro diagrams and definitionsMacro diagrams and definitions
Macro diagrams and definitions
 
Leicester Research Archive (LRA): the work of a repository administrator
Leicester Research Archive (LRA): the work of a repository administratorLeicester Research Archive (LRA): the work of a repository administrator
Leicester Research Archive (LRA): the work of a repository administrator
 
3.3 Macro Economic Models
3.3   Macro Economic Models3.3   Macro Economic Models
3.3 Macro Economic Models
 
Nuove norme sul segreto di stato e sulle informazioni classificate
Nuove norme sul segreto di stato e sulle informazioni classificateNuove norme sul segreto di stato e sulle informazioni classificate
Nuove norme sul segreto di stato e sulle informazioni classificate
 
ALGA
ALGAALGA
ALGA
 
2014 ncae nvb presentation
2014 ncae  nvb presentation2014 ncae  nvb presentation
2014 ncae nvb presentation
 
3e jaars
3e jaars3e jaars
3e jaars
 
Advertising Quiz
Advertising QuizAdvertising Quiz
Advertising Quiz
 
Delray Presentation Microsoft
Delray Presentation MicrosoftDelray Presentation Microsoft
Delray Presentation Microsoft
 
Diagnosis evaluation in strabismus
Diagnosis evaluation in strabismusDiagnosis evaluation in strabismus
Diagnosis evaluation in strabismus
 
Section 3 student version
Section 3 student version Section 3 student version
Section 3 student version
 
The Stars My Destination
The Stars My DestinationThe Stars My Destination
The Stars My Destination
 
Missles flight control systems
Missles flight control systemsMissles flight control systems
Missles flight control systems
 
3.4 Demand And Supply Side Policies
3.4   Demand And Supply Side Policies3.4   Demand And Supply Side Policies
3.4 Demand And Supply Side Policies
 
E commerce
E commerceE commerce
E commerce
 
09 IBH E Assessment
09 IBH E Assessment09 IBH E Assessment
09 IBH E Assessment
 
Usability Ergebnisse Umfrage
Usability  Ergebnisse UmfrageUsability  Ergebnisse Umfrage
Usability Ergebnisse Umfrage
 
Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...
Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...
Anatomie eines Trending Topics: Retweet-Ketten als Verbreitungsmechanismus fü...
 
Comment déterminer le critère de jugement et le nombre de sujets nécessaires
Comment déterminer le critère de jugement et le nombre de sujets nécessairesComment déterminer le critère de jugement et le nombre de sujets nécessaires
Comment déterminer le critère de jugement et le nombre de sujets nécessaires
 

Mais de Usman Mukhtar

Software reliability
Software reliability Software reliability
Software reliability Usman Mukhtar
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCIUsman Mukhtar
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
information system of NBP
information system of NBPinformation system of NBP
information system of NBPUsman Mukhtar
 

Mais de Usman Mukhtar (6)

Software reliability
Software reliability Software reliability
Software reliability
 
Risk management
Risk managementRisk management
Risk management
 
Ethics in research
Ethics in researchEthics in research
Ethics in research
 
user support system in HCI
user support system in HCIuser support system in HCI
user support system in HCI
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
information system of NBP
information system of NBPinformation system of NBP
information system of NBP
 

Último

2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesRashidFaridChishti
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1T.D. Shashikala
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Lovely Professional University
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdfKamal Acharya
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...MohammadAliNayeem
 
ChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfqasastareekh
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...ShivamTiwari995432
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxalijaker017
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AISheetal Jain
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor banktawat puangthong
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsMathias Magdowski
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.MdManikurRahman
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxRashidFaridChishti
 
E-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are presentE-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are presentjatinraor66
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdftawat puangthong
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsSheetal Jain
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdfKamal Acharya
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfKamal Acharya
 

Último (20)

2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message QueuesLinux Systems Programming: Semaphores, Shared Memory, and Message Queues
Linux Systems Programming: Semaphores, Shared Memory, and Message Queues
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
Activity Planning: Objectives, Project Schedule, Network Planning Model. Time...
 
Dairy management system project report..pdf
Dairy management system project report..pdfDairy management system project report..pdf
Dairy management system project report..pdf
 
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
Complex plane, Modulus, Argument, Graphical representation of a complex numbe...
 
ChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdfChatGPT Prompt Engineering for project managers.pdf
ChatGPT Prompt Engineering for project managers.pdf
 
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
Fabrication Of Automatic Star Delta Starter Using Relay And GSM Module By Utk...
 
Multivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptxMultivibrator and its types defination and usges.pptx
Multivibrator and its types defination and usges.pptx
 
Introduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AIIntroduction to Artificial Intelligence and History of AI
Introduction to Artificial Intelligence and History of AI
 
Theory for How to calculation capacitor bank
Theory for How to calculation capacitor bankTheory for How to calculation capacitor bank
Theory for How to calculation capacitor bank
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
Lab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docxLab Manual Arduino UNO Microcontrollar.docx
Lab Manual Arduino UNO Microcontrollar.docx
 
E-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are presentE-Commerce Shopping using MERN Stack where different modules are present
E-Commerce Shopping using MERN Stack where different modules are present
 
How to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdfHow to Design and spec harmonic filter.pdf
How to Design and spec harmonic filter.pdf
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Intelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent ActsIntelligent Agents, A discovery on How A Rational Agent Acts
Intelligent Agents, A discovery on How A Rational Agent Acts
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdfBURGER ORDERING SYSYTEM PROJECT REPORT..pdf
BURGER ORDERING SYSYTEM PROJECT REPORT..pdf
 

LRA and TORA in MANETS

  • 3. Members • Usman Mukhtar • Shahbaz khan Submitted to: 11031556-o46 11031556-030 Sir Waqas Mehmood
  • 4. Link Reversal Algorithm 4 A FB C E G D Maintain a directed acyclic graph (DAG) for each destination, with the destination being the only sink This DAG is for destination node D Links are bi-directional But algorithm imposes logical directions on them
  • 5. Link Reversal Algorithm Link (G,D) broke A FB C E G D Any node, other than the destination, that has no outgoing links reverses all its incoming links. Node G has no outgoing links
  • 6. Link Reversal Algorithm A FB C E G D Now nodes E and F have no outgoing links Represents a link that was reversed recently
  • 7. Link Reversal Algorithm A FB C E G D Now nodes B and G have no outgoing links Represents a link that was reversed recently
  • 8. Link Reversal Algorithm A FB C E G D Now nodes A and F have no outgoing links Represents a link that was reversed recently
  • 9. Link Reversal Algorithm A FB C E G D Now all nodes (other than destination D) have an outgoing link Represents a link that was reversed recently
  • 10. Link Reversal Algorithm 10 A FB C E G D DAG has been restored with only the destination as a sink
  • 11. Link Reversal Algorithm • Attempts to keep link reversals local to where the failure occurred – But this is not guaranteed • When the first packet is sent to a destination, the destination oriented DAG is constructed • The initial construction does result in flooding of control packets
  • 12. Link Reversal Algorithm • The previous algorithm is called a full reversal method since when a node reverses links, it reverses all its incoming links • Partial reversal method : A node reverses incoming links from only those neighbors who have not themselves reversed links “previously” – If all neighbors have reversed links, then the node reverses all its incoming links – “Previously” at node X means since the last link reversal done by node X 12
  • 13. Partial Reversal Method Link (G,D) broke A FB C E G D Node G has no outgoing links
  • 14. Partial Reversal Method A FB C E G D Now nodes E and F have no outgoing links Represents a link that was reversed recently Represents a node that has reversed links
  • 15. Partial Reversal Method A FB C E G D Nodes E and F do not reverse links from node G Now node B has no outgoing links Represents a link that was reversed recently
  • 16. Partial Reversal Method A FB C E G D Now node A has no outgoing links Represents a link that was reversed recently
  • 17. Partial Reversal Method A FB C E G D Now all nodes (except destination D) have outgoing links Represents a link that was reversed recently
  • 18. Partial Reversal Method A FB C E G D DAG has been restored with only the destination as a sink
  • 19. Link Reversal Methods: Advantages • Each node may potentially have multiple routes to a destination • Routing • Leader election • Scheduling • Source allocation
  • 20. Link Reversal Methods: Disadvantage • Need a mechanism to detect link failure – hello messages may be used – but hello messages can add to contention • If network is partitioned, link reversals continue indefinitely
  • 21. Link Reversal in a Partitioned Network A FB C E G D This DAG is for destination node D
  • 22. Full Reversal in a Partitioned Network A FB C E G D A and G do not have outgoing links
  • 23. Full Reversal in a Partitioned Network A FB C E G D E and F do not have outgoing links
  • 24. Full Reversal in a Partitioned Network A FB C E G D B and G do not have outgoing links
  • 25. Full Reversal in a Partitioned Network A FB C E G D E and F do not have outgoing links
  • 26. Full Reversal in a Partitioned Network A FB C E G D In the partition disconnected from destination D, link reversals continue, until the partitions merge Need a mechanism to minimize this wasteful activity Similar scenario can occur with partial reversal method too
  • 27. Temporally-Ordered Routing Algorithm(TORA) • TORA modifies the partial link reversal method to be able to detect partitions • When a partition is detected, all nodes in the partition are informed, and link reversals in that partition cease
  • 28. Partition Detection in TORA A B E D F C DAG for destination D
  • 29. Partition Detection in TORA A B E D F C TORA uses a modified partial reversal method Node A has no outgoing links
  • 30. Partition Detection in TORA A B E D F C TORA uses a modified partial reversal method Node B has no outgoing links
  • 31. Partition Detection in TORA A B E D F C Node B has no outgoing links
  • 32. Partition Detection in TORA A B E D F C Node C has no outgoing links -- all its neighbor have reversed links previously.
  • 33. Partition Detection in TORA A B E D F C Nodes A and B receive the reflection from node C Node B now has no outgoing link
  • 34. Partition Detection in TORA A B E D F C Node A has received the reflection from all its neighbors. Node A determines that it is partitioned from destination D. Node B propagates the reflection to node A
  • 35. Partition Detection in TORA A B E D F C On detecting a partition, node A sends a clear (CLR) message that purges all directed links in that partition
  • 36. TORA • Improves on the partial link reversal method in [Gafni81] by detecting partitions and stopping non-productive link reversals • Paths may not be shortest • The DAG provides many hosts the ability to send packets to a given destination – Beneficial when many hosts want to communicate with a single destination
  • 37. TORA Design Decision • TORA performs link reversals as dictated by [Gafni81] • However, when a link breaks, it looses its direction • When a link is repaired, it may not be assigned a direction, unless some node has performed a route discovery after the link broke
  • 38. TORA Design Decision… – if no one wants to send packets to D anymore, eventually, the DAG for destination D may disappear • TORA makes effort to maintain the DAG for D only if someone needs route to D – Reactive behavior
  • 39. TORA Design Decision • One proposal for modifying TORA optionally allowed a more proactive behavior, such that a DAG would be maintained even if no node is attempting to transmit to the destination • Moral of the story: The link reversal algorithm in [Gafni81] does not dictate a proactive or reactive response to link failure/repair • Decision on reactive/proactive behavior should be made based on environment under consideration