SlideShare a Scribd company logo
Routing in MANET
Agenda Ad-Hoc Introduction What MANET it is Proactive protocol DSDV Reactive protocol AODV DSR  Hybrid Protocol  ZRP Conclusion
Ad-Hoc Introduction Broadband Wireless Access Infrastructure Network  – Base Station/ Access Point Ad-Hoc Network  – Mobile device(ex:  MANET ) Infrastr-ucture Ad-Hoc Infrastructure  Ad-Hoc Need connect to Ethernet Not need Base station single -hop multi -hop Central Control Distributed routing Cost  high Cost  low Construct  slow Construct  fast Time synchronization  easy Time synchronization  tough
Ad-Hoc Development
MANET(Mobile Ad-Hoc Network) Features
MANET Application
MANET Issue
MANET Routing Protocol(1/2)
MANET Routing Protocol(2/2) Table-driven/Proactive more similar to conventional routing Update table information with a period On-demand-driven/Reactive only obtain route information when needed Hybrid both proactive and reactive in nature
Destination-Sequenced Distance Vector Protocol(DSDV) Highly Dynamic Destination-Sequenced Distance Vector Routing for Mobile Computer Charles E. Perkins,  IBM, T.J. Waston Research Center  Hawthrone, NY 10562 Pravin Bhagwat,  Computer Science Department University of Maryland College Park, MD 20742 Speaker :許景涵
Destination-Sequenced Distance Vector Protocol By using  routing tables  stored at  each  station of the network. Each node maintains routing information for all known destinations Advertise to each neighbor own routing information To maintain the consistency of routing tables  in a dynamically varying topology Periodically transmits updates Immediately transmits updates as needed
Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
The Forwarding Routing Table All available destinations Next hop for each destination Number of hops to each available destination A sequence number for each route table entry, originated by the destination station Example : MH4 Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH2 2 S406_MH1 T001MH4 Ptr1_MH1 MH2 MH2 1 S128_MH2 T001MH4 Ptr1_MH2 MH3 MH2 2 S564_MH3 T001MH4 Ptr1_MH3 MH4 MH4 0 S710_MH4 T001MH4 Ptr1_MH4 Etc.
Route Selection Update information is compared to own routing table Select route with  higher destination sequence number  – to ensure using  newest  information from destination Select the route with  better metric  when sequence numbers are equal. The Receiver adds an increment to the metric.
Rules to set sequence number Information On each advertisement increase  own  destination sequence number  use only even numbers If a node is no more reachable (timeout)  increase sequence number of this node by 1  set metric =   .  Destination Next   Hop Metric Seq. No Install Time Stable Data MH1 MH1 1 S406_MH1 T001MH2 Ptr1_MH1 MH2 MH2 0 S128_MH2 T001MH2 Ptr1_MH2 MH3 MH3  S561_MH3 T001MH2 Ptr1_MH3 MH4 MH4 1 S710_MH4 T001MH2 Ptr1_MH4 Etc.
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4  Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 1 Update triggered by MH 1  , broadcasted to MH 7  and MH 8 On detection of broken link: Immediate incremental update triggered by MH 2  with odd sequence number and infinite metric Updates are propagated through the network
Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4  advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
Adjustment in carried information Reduce the amount of information carried in these packets Full dump will carry  all  the available routing information. Incremental packets: all information that has  changed  since the last full dump Full dump if incremental dump exceeds  one  NPDU (network protocol data unit) Full dumps can be transmitted relatively  infrequently , when  no  movement of Mobile Hosts is occurring.
Receiving Fluctuating Routes What might happen: MH 9  broadcasts update information to MH Collections I and II MH 2  transmits new routing information to MH 4 MH 4 : new sequence number    routing table update    broadcast update MH 6  transmits new routing information to MH 4 , same sequence number, better metric MH 4 : same seq.no., better metric    update routing table    broadcast update
Damping Fluctuation Causes for Fluctuation: Many hosts with irregular updates Different propagation speed Different transmission intervals Broadcasts are asynchronous events Solution: Keep a route settling time table in each node with  a time to wait  for a route with a  better metric  before advertising the update message.
Route Settling Time Table Decide how long to wait before advertising. Calculated by maintaining a running  weighted average  over the  most recent  updates of the routes for each destination. The settling time data is store in a table with following fields Destination address Last setting time Average settling time-use for this determination
DSDV Disadvantages and Improvement Disadvantages Periodically  updates : No sleeping nodes Bi-directional links required Overhead: most routing information never used Scalability is a major problem Many improved protocols based on DSDV have been developed Example: AODV: Ad-hoc On-Demand Distance Vector Routing
Unidirectional and Bi-directional links A B C D
DSDV Disadvantages and Improvement Disadvantages Periodically  updates : No sleeping nodes Bi-directional links required Overhead: most routing information never used Scalability is a major problem Many improved protocols based on DSDV have been developed Example: AODV: Ad-hoc On-Demand Distance Vector Routing
Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) Speaker :方祥軒 Ad-hoc On-Demand Distance Vector Routing ECE697A Advanced Computer Networks Presented by Qifeng Lu Scalable AODV with Efficient Flooding based on On-Demand (Passive) Clustering Yunjung Yi and Mario Gerla University of California, Los Angeles
Outline Introduction AODV  Features AODV Algorithm
Introduction An  improved algorithm of DSDV A Source Initiated ( reactive ) routing protocol Main goals:   Quick adaptation  under dynamic link conditions Lower transmission latency Low network utilization  ( less broadcast ) Loop-free   property (How: using destination sequence #)
AODV  Features V.S. DSDV Routes   are created  only when required Each node  doesn’t maintain all routes  to other nodes (only active routes) Use of  sequence numbers  at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses  symmetric links  (if a link is not symmetric it is not up) Works both on wired media and wireless media
AODV Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Maintenance
Path Discovery Route Discovery Route Requests( RREQ) Route Replies (RREPs) Route Maintenance Route Errors (RERRs)
Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
Route Discovery(2/2) Route Reply (RREP) RREP RREP source_addr hop_cnt dest_addr source_sequence_# lifetime (expiration time for reverse path route entry)
Reverse Path Setup Initiated when no route to reach destination node S D RREP (Route Reply) RREQ (Route Request) Drop ClusterHead Gateway Ordinary Node
Forward Path Setup RREQ arrives at a node that has current route to the destination ( larger/same  sequence number ) sequence number = 99 sequence number = 101 REEQ  sequence number = 100 A C B D T^T  Send  RREQ =V=  Send  RREP Unicast
Route Table Management Route request expiration time:  to purge reverse path routing entries from nodes are not on the path from source to destination Route caching timeout:  when the route is considered to be invalid A B C D RERR
AODV with Efficient Flooding Clustering Scheme Cluster heads and gateways are dominant nodes Advantage Reduce AODV routing overhead Improves AODV scalability S D ClusterHead Gateway Ordinary Node
Dynamic Source Routing  (DSR) Routing in Ad-Hoc Networks   And the DSR Protocol Computer Network  Dr. Jorge A. Cobb Upgrading Performance of DSR Routing  Protocol in Mobile Ad Hoc Networks Mehdi Alilou , Mehdi Dehghan.t TPBDSR: A New DSR-based Energy Saving Routing in MANET XU Li WU Zi-wen & ZHENG Bao-yu Speaker :呂璇
Dynamic Source Routing (DSR) On demand : No periodic router advertisements  Source routing : to send a packet to another host, the sender constructs a source route in the packet’s header Caching : each mobile host participating in the ad hoc network maintains a route cache in which it caches source routes
Two Main Components Route Discovery the mechanism by which a sending node S  obtains a route  to destination D Route Maintenance the mechanism by which a sending node S   detects that the network topology has changed   and its route to D is  no longer valid
Route Discovery(1/13) When  two nodes  which are not in wireless rang of each other, want to  communicated  with each other. process.
Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
Route Discovery(3/13) When two nodes which are not in wireless rang of each other, want to communicated with each other. If the  source node  has the related  route to  destination in  its  cache memory -> Insert the route in data packet headers and the packets will be sent from that  specified route . If it doest have the related route to destination -> Begin the  route discovery  process.
Route Discovery(4/13) Step 1 : Source( S )  broadcasts  RREQ message for specified destination( D ). R oute  Req uest packet (RREQ) Destination Address Source Address Request ID Route Record
Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y]  Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
Route Discovery(6/13) Step 2 :  When  intermediate node  receive RREQ message. Adds itself to path in message Forwards (broadcasts) message toward  D  until…… A node that has a route to D is found  -> Early Route-Replies.
Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
Route Discovery(8/13) Step 2 :  When  intermediate node  receive RREQ message. Adds itself to path in message Forwards (broadcasts) message toward  D  until…… A node that has a route to D is found  -> Early Route-Replies. A node has already received the same RREQ message -> Discard  the packet. Source Address Request ID
Route Discovery(9/13) C  receives RREQ from  G  and  H , but does not forward it again, because  C  has  already forwarded RREQ  once [S,C,G] [S,E,F] [S,B,A] [S,B,H] B A S E F H J D C G I K Z Y M N L
Route Discovery(10/13) J  and  K  both broadcast RREQ to  D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
Route Discovery(11/13) D   does not forward  RREQ, because  D  is the  intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
Route Discovery(12/13) Step 3 :  When  D  receive RREQ message,  it copies route into a RREP packet and sends it back to  S. R oute  Rep ly packet (RREP) If MAC protocol is  bidirectiona l , use reverse path as data. With  unidirectional links , Destination may need to  discover route  to source to deliver Route Reply If a route exists in its cache, use it O.W.  piggyback  Route Reply onto new Route Request
Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
Route Maintenance(1/6) Used when  link breakage  occurs. Step 1 :   Intermediate nodes using   Acknowledge   to detect  link status/breakage. link-layer ACKs (MACAW) passive ACKs DSR ACK request
Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
Route Maintenance(3/6) Step 2 :  The intermediate node  sent  RERR   message to  S  when break detected. R oute  Err or (RERR) Bidirectional  ->  Reverse path Unidirectional  ->  Cache or Piggyback
Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
Route Maintenance(5/6) Step 3 :  Source  deletes rout e . Step 4 : Source try  another path if one cached, or issues new RREQ (new route discovery).
Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
DSR vs. AODV AODV DSR Path  Information Limited  information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of  route path New We don’t know Delete invalid path when RRER Delete all  Only delete some node
Hybrid Protocol  Zone Routing Protocol (ZRP)  combines Proactive protocol/ Table-Driven  :  Intra-Zone Routing Reactive protocol/ On-Demand  :  Inter-Zone Routing   Routing Zone Inter-Zone Routing Intra-Zone Routing On-Demand Table-Driven
Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined  when needed Depend on  the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used  inside each zone , or between gateways Handling effects of mobility Usually  updates  occur at fixed  intervals. AODV,DSR uses local  route discovery  Usually  more than one path  maybe available. Single point of failures are reduced by working as a group
Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required.  Usually lower than proactive protocols  Usually  depends on the size of each cluster or zone  may become as large as proactive protocols if clusters are big Delay level Small  routes are predetermined  Higher  than proactive For local destinations small.  Inter-zone maybe  as large as  reactive protocols  Scalability level Usually up to  100  nodes.  Source routing protocols up to  few hundred  nodes. Designed for up to  1000 or more  nodes
References A review of routing protocols for mobile ad hoc networks Mehran Abolhasan , Tadeusz Wysocki , Eryk Dutkiewicz  以路徑為基礎的 MANET  網路群播路由協定之研究 研究生: 蘇平嘉 指導教授: 陳彥文 無線 Ad Hoc 行動隨意網路架構之技術發展評析  惠汝生
Q&A Thanks for your attention!

More Related Content

PPTX
Classification of routing protocols
PDF
Lecture 11 14. Adhoc routing protocols cont..
PDF
Routing protocols in ad hoc network
PDF
Lecture 19 22. transport protocol for ad-hoc
PPT
Wireless routing protocols
PDF
Location Aided Routing (LAR)
PPTX
Destination Sequenced Distance Vector Routing (DSDV)
Classification of routing protocols
Lecture 11 14. Adhoc routing protocols cont..
Routing protocols in ad hoc network
Lecture 19 22. transport protocol for ad-hoc
Wireless routing protocols
Location Aided Routing (LAR)
Destination Sequenced Distance Vector Routing (DSDV)

What's hot (20)

PDF
Lecture 9 10 .mobile ad-hoc routing protocols
PPTX
Handover in Mobile Computing
PPTX
AODV routing protocol
PPT
Fading Seminar
PPTX
Classifications of wireless adhoc networks
PPT
Mac adhoc (1)
PDF
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
PPTX
FDMA-TDMA-CDMA
PPTX
Wireless communication and its standards
PPT
PPT
MIMO in 15 minutes
PPTX
Routing protocols for ad hoc wireless networks
PPT
Introduction & Wireless Transmission
PPTX
Handoff in Mobile Communication
PPT
Directed diffusion for wireless sensor networking
PPTX
Infrared and radio transmission
PPT
Small scale fading
PPTX
DSR Protocol
PPTX
SPINS: Security Protocols for Sensor Networks
PDF
AODV protocol
Lecture 9 10 .mobile ad-hoc routing protocols
Handover in Mobile Computing
AODV routing protocol
Fading Seminar
Classifications of wireless adhoc networks
Mac adhoc (1)
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
FDMA-TDMA-CDMA
Wireless communication and its standards
MIMO in 15 minutes
Routing protocols for ad hoc wireless networks
Introduction & Wireless Transmission
Handoff in Mobile Communication
Directed diffusion for wireless sensor networking
Infrared and radio transmission
Small scale fading
DSR Protocol
SPINS: Security Protocols for Sensor Networks
AODV protocol
Ad

Viewers also liked (20)

PPTX
Mobile Ad hoc Networks
PPTX
Ad-Hoc Networks
PPTX
Dynamic source routing
PPTX
Mobile ad-hoc network [autosaved]
PPT
Attacks in MANET
PDF
Lecture 5 6 .ad hoc network
PPTX
Manet ppt
PPTX
Mobile ad hoc network
PPSX
Adhoc and routing protocols
PPTX
Simulation & comparison of aodv & dsr protocol
PPT
Manet ns2
PPTX
DYNAMIC SOURCE ROUTING (DSR)
PDF
Lecture 7 8 ad hoc wireless media access protocols
PDF
AODV protocol
PPTX
PPTX
AODV Protocol
PPT
PPT
PPT
Multicast Routing Protocols
DOCX
Dsdv
Mobile Ad hoc Networks
Ad-Hoc Networks
Dynamic source routing
Mobile ad-hoc network [autosaved]
Attacks in MANET
Lecture 5 6 .ad hoc network
Manet ppt
Mobile ad hoc network
Adhoc and routing protocols
Simulation & comparison of aodv & dsr protocol
Manet ns2
DYNAMIC SOURCE ROUTING (DSR)
Lecture 7 8 ad hoc wireless media access protocols
AODV protocol
AODV Protocol
Multicast Routing Protocols
Dsdv
Ad

Similar to Routing in Manet (20)

PPT
Unit VIII wireless sensor networks
PDF
A41040105
PPTX
Routing protocol
PPTX
Adhoc routing protocols
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
PDF
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
PPT
introAdhocRoutingRoutingRoutingRouting-new.ppt
PPTX
Adhoc Sensor Networks1.pptx
PDF
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
PDF
Research Inventy : International Journal of Engineering and Science
PDF
Research Inventy : International Journal of Engineering and Science
PPTX
networking
PPT
Routing
PPTX
a-seminar-on-manet.pptx
PDF
F41023946
PPTX
BASICS OF ROUTING IN NETWORKS
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
PPT
RoutingProtocols.ppt
PDF
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
PDF
CS6003 AD HOC AND SENSOR NETWORKS
Unit VIII wireless sensor networks
A41040105
Routing protocol
Adhoc routing protocols
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
introAdhocRoutingRoutingRoutingRouting-new.ppt
Adhoc Sensor Networks1.pptx
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
networking
Routing
a-seminar-on-manet.pptx
F41023946
BASICS OF ROUTING IN NETWORKS
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
RoutingProtocols.ppt
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
CS6003 AD HOC AND SENSOR NETWORKS

Recently uploaded (20)

PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
project resource management chapter-09.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
Zenith AI: Advanced Artificial Intelligence
NewMind AI Weekly Chronicles - August'25-Week II
Enhancing emotion recognition model for a student engagement use case through...
A comparative study of natural language inference in Swahili using monolingua...
Assigned Numbers - 2025 - Bluetooth® Document
1 - Historical Antecedents, Social Consideration.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Hindi spoken digit analysis for native and non-native speakers
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A novel scalable deep ensemble learning framework for big data classification...
OMC Textile Division Presentation 2021.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
project resource management chapter-09.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Routing in Manet

  • 2. Agenda Ad-Hoc Introduction What MANET it is Proactive protocol DSDV Reactive protocol AODV DSR Hybrid Protocol ZRP Conclusion
  • 3. Ad-Hoc Introduction Broadband Wireless Access Infrastructure Network – Base Station/ Access Point Ad-Hoc Network – Mobile device(ex: MANET ) Infrastr-ucture Ad-Hoc Infrastructure Ad-Hoc Need connect to Ethernet Not need Base station single -hop multi -hop Central Control Distributed routing Cost high Cost low Construct slow Construct fast Time synchronization easy Time synchronization tough
  • 9. MANET Routing Protocol(2/2) Table-driven/Proactive more similar to conventional routing Update table information with a period On-demand-driven/Reactive only obtain route information when needed Hybrid both proactive and reactive in nature
  • 10. Destination-Sequenced Distance Vector Protocol(DSDV) Highly Dynamic Destination-Sequenced Distance Vector Routing for Mobile Computer Charles E. Perkins, IBM, T.J. Waston Research Center Hawthrone, NY 10562 Pravin Bhagwat, Computer Science Department University of Maryland College Park, MD 20742 Speaker :許景涵
  • 11. Destination-Sequenced Distance Vector Protocol By using routing tables stored at each station of the network. Each node maintains routing information for all known destinations Advertise to each neighbor own routing information To maintain the consistency of routing tables in a dynamically varying topology Periodically transmits updates Immediately transmits updates as needed
  • 12. Distance-Vector MH3 MH2 MH4 MH6 MH5 MH8 MH7 MH1
  • 13. The Forwarding Routing Table All available destinations Next hop for each destination Number of hops to each available destination A sequence number for each route table entry, originated by the destination station Example : MH4 Destination Next Hop Metric Seq. No Install Time Stable Data MH1 MH2 2 S406_MH1 T001MH4 Ptr1_MH1 MH2 MH2 1 S128_MH2 T001MH4 Ptr1_MH2 MH3 MH2 2 S564_MH3 T001MH4 Ptr1_MH3 MH4 MH4 0 S710_MH4 T001MH4 Ptr1_MH4 Etc.
  • 14. Route Selection Update information is compared to own routing table Select route with higher destination sequence number – to ensure using newest information from destination Select the route with better metric when sequence numbers are equal. The Receiver adds an increment to the metric.
  • 15. Rules to set sequence number Information On each advertisement increase own destination sequence number use only even numbers If a node is no more reachable (timeout) increase sequence number of this node by 1 set metric =  . Destination Next Hop Metric Seq. No Install Time Stable Data MH1 MH1 1 S406_MH1 T001MH2 Ptr1_MH1 MH2 MH2 0 S128_MH2 T001MH2 Ptr1_MH2 MH3 MH3  S561_MH3 T001MH2 Ptr1_MH3 MH4 MH4 1 S710_MH4 T001MH2 Ptr1_MH4 Etc.
  • 16. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5
  • 17. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 4 Forwarding table: Destination Next Hop Metric Seq. No MH 1 MH 2 2 S406_MH 4 MH 2 MH 2 1 S128_MH 1 MH 3 MH 2 2 S564_MH 2 MH 4 MH 4 0 S710_MH 3 MH 5 MH 6 2 S392_MH 5 MH 6 MH 6 1 S076_MH 6 MH 7 MH 6 2 S128_MH 7 MH 8 MH 6 3 S050_MH 8
  • 18. Example of DSDV in operation MH 3 MH 6 MH 2 MH 1 MH 7 MH 4 MH 8 MH 5 MH 1 Update triggered by MH 1 , broadcasted to MH 7 and MH 8 On detection of broken link: Immediate incremental update triggered by MH 2 with odd sequence number and infinite metric Updates are propagated through the network
  • 19. Example of DSDV in operation MH 3 MH 6 MH 2 MH 7 MH 4 MH 8 MH 5 MH 1 MH 4 advertised table (updated): Destination Next Hop Metric Seq. No MH 1 MH 6 3 S516_MH 4 MH 2 MH 2 1 S238_MH 1 MH 3 MH 2 2 S674_MH 2 MH 4 MH 4 0 S820_MH 3 MH 5 MH 6 2 S502_MH 5 MH 6 MH 6 1 S186_MH 6 MH 7 MH 6 2 S238_MH 7 MH 8 MH 6 3 S160_MH 8
  • 20. Adjustment in carried information Reduce the amount of information carried in these packets Full dump will carry all the available routing information. Incremental packets: all information that has changed since the last full dump Full dump if incremental dump exceeds one NPDU (network protocol data unit) Full dumps can be transmitted relatively infrequently , when no movement of Mobile Hosts is occurring.
  • 21. Receiving Fluctuating Routes What might happen: MH 9 broadcasts update information to MH Collections I and II MH 2 transmits new routing information to MH 4 MH 4 : new sequence number  routing table update  broadcast update MH 6 transmits new routing information to MH 4 , same sequence number, better metric MH 4 : same seq.no., better metric  update routing table  broadcast update
  • 22. Damping Fluctuation Causes for Fluctuation: Many hosts with irregular updates Different propagation speed Different transmission intervals Broadcasts are asynchronous events Solution: Keep a route settling time table in each node with a time to wait for a route with a better metric before advertising the update message.
  • 23. Route Settling Time Table Decide how long to wait before advertising. Calculated by maintaining a running weighted average over the most recent updates of the routes for each destination. The settling time data is store in a table with following fields Destination address Last setting time Average settling time-use for this determination
  • 24. DSDV Disadvantages and Improvement Disadvantages Periodically updates : No sleeping nodes Bi-directional links required Overhead: most routing information never used Scalability is a major problem Many improved protocols based on DSDV have been developed Example: AODV: Ad-hoc On-Demand Distance Vector Routing
  • 26. DSDV Disadvantages and Improvement Disadvantages Periodically updates : No sleeping nodes Bi-directional links required Overhead: most routing information never used Scalability is a major problem Many improved protocols based on DSDV have been developed Example: AODV: Ad-hoc On-Demand Distance Vector Routing
  • 27. Ad Hoc On-Demand Distance Vector Routing Protocol (AODV) Speaker :方祥軒 Ad-hoc On-Demand Distance Vector Routing ECE697A Advanced Computer Networks Presented by Qifeng Lu Scalable AODV with Efficient Flooding based on On-Demand (Passive) Clustering Yunjung Yi and Mario Gerla University of California, Los Angeles
  • 28. Outline Introduction AODV Features AODV Algorithm
  • 29. Introduction An improved algorithm of DSDV A Source Initiated ( reactive ) routing protocol Main goals: Quick adaptation under dynamic link conditions Lower transmission latency Low network utilization ( less broadcast ) Loop-free property (How: using destination sequence #)
  • 30. AODV Features V.S. DSDV Routes are created only when required Each node doesn’t maintain all routes to other nodes (only active routes) Use of sequence numbers at each destination to maintain freshness of routing information( solve loop problem ) Reduces periodic broadcast Paths generated are loop-free Uses symmetric links (if a link is not symmetric it is not up) Works both on wired media and wireless media
  • 31. AODV Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Maintenance
  • 32. Path Discovery Route Discovery Route Requests( RREQ) Route Replies (RREPs) Route Maintenance Route Errors (RERRs)
  • 33. Route Discovery(1/2) Unique Unique RREQ freshness Reverse freshness RREQ RREQ source_addr source_sequence_# broadcast_id dest_addr dest_Sequence_# hop_cnt
  • 34. Route Discovery(2/2) Route Reply (RREP) RREP RREP source_addr hop_cnt dest_addr source_sequence_# lifetime (expiration time for reverse path route entry)
  • 35. Reverse Path Setup Initiated when no route to reach destination node S D RREP (Route Reply) RREQ (Route Request) Drop ClusterHead Gateway Ordinary Node
  • 36. Forward Path Setup RREQ arrives at a node that has current route to the destination ( larger/same sequence number ) sequence number = 99 sequence number = 101 REEQ sequence number = 100 A C B D T^T Send RREQ =V= Send RREP Unicast
  • 37. Route Table Management Route request expiration time: to purge reverse path routing entries from nodes are not on the path from source to destination Route caching timeout: when the route is considered to be invalid A B C D RERR
  • 38. AODV with Efficient Flooding Clustering Scheme Cluster heads and gateways are dominant nodes Advantage Reduce AODV routing overhead Improves AODV scalability S D ClusterHead Gateway Ordinary Node
  • 39. Dynamic Source Routing (DSR) Routing in Ad-Hoc Networks And the DSR Protocol Computer Network Dr. Jorge A. Cobb Upgrading Performance of DSR Routing Protocol in Mobile Ad Hoc Networks Mehdi Alilou , Mehdi Dehghan.t TPBDSR: A New DSR-based Energy Saving Routing in MANET XU Li WU Zi-wen & ZHENG Bao-yu Speaker :呂璇
  • 40. Dynamic Source Routing (DSR) On demand : No periodic router advertisements Source routing : to send a packet to another host, the sender constructs a source route in the packet’s header Caching : each mobile host participating in the ad hoc network maintains a route cache in which it caches source routes
  • 41. Two Main Components Route Discovery the mechanism by which a sending node S obtains a route to destination D Route Maintenance the mechanism by which a sending node S detects that the network topology has changed and its route to D is no longer valid
  • 42. Route Discovery(1/13) When two nodes which are not in wireless rang of each other, want to communicated with each other. process.
  • 43. Route Discovery(2/13) Represents a node that has received RREQ for D from S B A S E F H J D C G I K Z Y M N L
  • 44. Route Discovery(3/13) When two nodes which are not in wireless rang of each other, want to communicated with each other. If the source node has the related route to destination in its cache memory -> Insert the route in data packet headers and the packets will be sent from that specified route . If it doest have the related route to destination -> Begin the route discovery process.
  • 45. Route Discovery(4/13) Step 1 : Source( S ) broadcasts RREQ message for specified destination( D ). R oute Req uest packet (RREQ) Destination Address Source Address Request ID Route Record
  • 46. Route Discovery(5/13) Represents transmission of RREQ Broadcast [S] [X,Y] Represents route record stored in RREQ B A S E F H J D C G I K Z Y M N L
  • 47. Route Discovery(6/13) Step 2 : When intermediate node receive RREQ message. Adds itself to path in message Forwards (broadcasts) message toward D until…… A node that has a route to D is found -> Early Route-Replies.
  • 48. Route Discovery(7/13) [S,E] [S,C] [S,B] B A S E F H J D C G I K Z Y M N L
  • 49. Route Discovery(8/13) Step 2 : When intermediate node receive RREQ message. Adds itself to path in message Forwards (broadcasts) message toward D until…… A node that has a route to D is found -> Early Route-Replies. A node has already received the same RREQ message -> Discard the packet. Source Address Request ID
  • 50. Route Discovery(9/13) C receives RREQ from G and H , but does not forward it again, because C has already forwarded RREQ once [S,C,G] [S,E,F] [S,B,A] [S,B,H] B A S E F H J D C G I K Z Y M N L
  • 51. Route Discovery(10/13) J and K both broadcast RREQ to D [S,C,G,K] [S,E,F,J] [S,B,H,I] [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 52. Route Discovery(11/13) D does not forward RREQ, because D is the intended target [S,E,F,J,M] B A S E F H J D C G I K Z Y M N L
  • 53. Route Discovery(12/13) Step 3 : When D receive RREQ message, it copies route into a RREP packet and sends it back to S. R oute Rep ly packet (RREP) If MAC protocol is bidirectiona l , use reverse path as data. With unidirectional links , Destination may need to discover route to source to deliver Route Reply If a route exists in its cache, use it O.W. piggyback Route Reply onto new Route Request
  • 54. Route Discovery(13/13) RREP [S,E,F,J,D] Represents RREP control message B A S E F H J D C G I K Z Y M N L
  • 55. Route Maintenance(1/6) Used when link breakage occurs. Step 1 : Intermediate nodes using Acknowledge to detect link status/breakage. link-layer ACKs (MACAW) passive ACKs DSR ACK request
  • 56. Route Maintenance(2/6) B A S E F H J D C G I K Z Y M N L
  • 57. Route Maintenance(3/6) Step 2 : The intermediate node sent RERR message to S when break detected. R oute Err or (RERR) Bidirectional -> Reverse path Unidirectional -> Cache or Piggyback
  • 58. Route Maintenance(4/6) Represents RERR message [S,E,F] B A S E F H J D C G I K Z Y M N L
  • 59. Route Maintenance(5/6) Step 3 : Source deletes rout e . Step 4 : Source try another path if one cached, or issues new RREQ (new route discovery).
  • 60. Route Maintenance(6/6) [S,E,F,J,D] [S,C,G,K,D] B A S E F H J D C G I K Z Y M N L
  • 61. DSR vs. AODV AODV DSR Path Information Limited information More detail Times of Route Discovery Many Few Traffic when RREP Low High Live time of route path New We don’t know Delete invalid path when RRER Delete all Only delete some node
  • 62. Hybrid Protocol Zone Routing Protocol (ZRP) combines Proactive protocol/ Table-Driven : Intra-Zone Routing Reactive protocol/ On-Demand : Inter-Zone Routing Routing Zone Inter-Zone Routing Intra-Zone Routing On-Demand Table-Driven
  • 63. Conclusion(1/2) Routing class Proactive Reactive Hybrid Routing structure Both Mostly flat Mostly hierarchical Availability of route Always available Determined when needed Depend on the location of the destination Control traffic volume High medium low Periodic updates Yes No Usually used inside each zone , or between gateways Handling effects of mobility Usually updates occur at fixed intervals. AODV,DSR uses local route discovery Usually more than one path maybe available. Single point of failures are reduced by working as a group
  • 64. Conclusion(2/2) Routing class Proactive Reactive Hybrid Storage requirements High Depends on the number of routes kept or required. Usually lower than proactive protocols Usually depends on the size of each cluster or zone may become as large as proactive protocols if clusters are big Delay level Small routes are predetermined Higher than proactive For local destinations small. Inter-zone maybe as large as reactive protocols Scalability level Usually up to 100 nodes. Source routing protocols up to few hundred nodes. Designed for up to 1000 or more nodes
  • 65. References A review of routing protocols for mobile ad hoc networks Mehran Abolhasan , Tadeusz Wysocki , Eryk Dutkiewicz 以路徑為基礎的 MANET 網路群播路由協定之研究 研究生: 蘇平嘉 指導教授: 陳彥文 無線 Ad Hoc 行動隨意網路架構之技術發展評析  惠汝生
  • 66. Q&A Thanks for your attention!