SlideShare a Scribd company logo
Mobile Computing
MANET
Mayank Pandey, MNNIT, Allahabad, India
MANET
• Formed by wireless hosts which may be mobile
• Without (necessarily) using a pre-existing
infrastructure
• Routes between nodes may potentially contain
multiple hops
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 2
MANET
• May need to traverse multiple links to reach a
destination
Mayank Pandey, MNNIT, Allahabad, India
07/11/2025 3
MANET (Route Changes: Mobility)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 4
Why Ad-hoc Networks
• Ease of deployment
• Speed of deployment
• Decreased dependence on infrastructure
Mayank Pandey, MNNIT, Allahabad, India
07/11/2025 5
Many Applications
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 6
7
Mayank Pandey, MNNIT, Allahabad, India
Many Variations
• Fully Symmetric Environment
– all nodes have identical capabilities and responsibilities
• Asymmetric Capabilities
– transmission ranges and radios may differ
– battery life at different nodes may differ
– processing capacity may be different at different nodes
– speed of movement
• Asymmetric Responsibilities
– only some nodes may route packets
– some nodes may act as leaders of nearby nodes (e.g.
cluster head)
8
Mayank Pandey, MNNIT, Allahabad, India
Many Variations
• Traffic characteristics may differ in different ad hoc
networks
– bit rate
– timeliness constraints
– reliability requirements
– unicast / multicast / geocast
– host-based addressing / content-based addressing
/capability-based addressing
• May co-exist (and co-operate) with an infrastructure
based network
9
Mayank Pandey, MNNIT, Allahabad, India
Many Variations
• Mobility patterns may be different
– people sitting at an airport lounge
– taxi cabs
– kids playing
– military movements
– personal area network
• Mobility characteristics
– speed
– Predictability
• direction of movement
• pattern of movement
• uniformity (or lack) of mobility characteristics among
different nodes
10
Mayank Pandey, MNNIT, Allahabad, India
Challenges
• Limited wireless transmission range
• Broadcast nature of the wireless medium
• Hidden terminal problem
• Packet losses due to transmission errors
• Mobility-induced route changes
• Mobility-induced packet losses
• Battery constraints
• Potentially frequent network partitions
• Ease of snooping on wireless transmissions (security hazard)
11
Mayank Pandey, MNNIT, Allahabad, India
General Assumption
• Unless stated otherwise, fully symmetric
environment is assumed implicitly
– All nodes have identical capabilities and
responsibilities
12
Mayank Pandey, MNNIT, Allahabad, India
Why Routing in MANET different ?
• Host mobility
– link failure/repair due to mobility may have
different characteristics than those due to other
causes
• Rate of link failure/repair may be high when
nodes move fast
• New performance criteria may be used
– route stability despite mobility
– energy consumption
13
Mayank Pandey, MNNIT, Allahabad, India
Unicast Routing Protocols
• Many protocols have been proposed
• Some have been invented specifically for
MANET
• Others are adapted from previously proposed
protocols for wired networks
• No single protocol works well in all
environments
– some attempts made to develop adaptive
protocols
14
Mayank Pandey, MNNIT, Allahabad, India
Routing Protocols
• Proactive protocols
– Determine routes independent of traffic pattern
– Traditional link-state and distance-vector routing
protocols are proactive
• Reactive protocols
– Maintain routes only if needed
• Hybrid protocols
15
Mayank Pandey, MNNIT, Allahabad, India
Trade-Off
• Latency of route discovery
– Proactive protocols may have lower latency since routes are
maintained at all times
– Reactive protocols may have higher latency because a route from
X to Y will be found only when X attempts to send to Y
• Overhead of route discovery/maintenance
– Reactive protocols may have lower overhead since routes are
determined only if needed
– Proactive protocols can (but not necessarily) result in higher
overhead due to continuous route updating
• Which approach achieves a better trade-off depends on
the traffic and mobility patterns
16
Mayank Pandey, MNNIT, Allahabad, India
Flooding
• Sender S broadcasts data packet P to all its
neighbors
• Each node receiving P forwards P to its neighbors
• Sequence numbers used to avoid the possibility
of forwarding the same packet more than once
• Packet P reaches destination D provided that D is
reachable from sender S
• Node D does not forward the packet
17
Mayank Pandey, MNNIT, Allahabad, India
Flooding
18
Mayank Pandey, MNNIT, Allahabad, India
Flooding
19
Mayank Pandey, MNNIT, Allahabad, India
Flooding
20
Mayank Pandey, MNNIT, Allahabad, India
Flooding
• Node C receives packet P from G and H, but does not
forward it again, because node C has already
forwarded packet P once
21
Mayank Pandey, MNNIT, Allahabad, India
Flooding
• Nodes J and K both broadcast packet P to node D
– Since nodes J and K are hidden from each other, their transmissions may
collide
• Packet P may not be delivered to node D at all, despite the use of flooding
22
Mayank Pandey, MNNIT, Allahabad, India
Flooding
• Node D does not forward packet P, because node D is
the intended destination of packet P
23
Mayank Pandey, MNNIT, Allahabad, India
Flooding
• Flooding completed
• Nodes unreachable from S do not receive packet P (e.g., node Z)
• Nodes for which all paths from S go through the destination D also do not
receive packet P (example: node N)
24
Mayank Pandey, MNNIT, Allahabad, India
Flooding
• Flooding may deliver packets to too many nodes (in the worst
case, all nodes reachable from sender may receive the packet)
25
Mayank Pandey, MNNIT, Allahabad, India
Flooding (Advantages)
• Simplicity
– May be more efficient than other protocols when rate of
information transmission is low enough that the overhead
of explicit route discovery/maintenance incurred by other
protocols is relatively higher
• this scenario may occur, for instance, when nodes transmit small
data packets relatively infrequently, and many topology changes
occur between consecutive packet transmissions
• Potentially higher reliability of data delivery
– Because packets may be delivered to the destination on
multiple paths
26
Mayank Pandey, MNNIT, Allahabad, India
Flooding (Disadvantages)
• Potentially, very high overhead
– Data packets may be delivered to too many nodes who do not
need to receive them
• Potentially lower reliability of data delivery
– Flooding uses broadcasting -- hard to implement reliable
broadcast delivery without significantly increasing overhead
• Broadcasting in IEEE 802.11 MAC is unreliable
• In our example, nodes J and K may transmit to node D
simultaneously, resulting in loss of the packet
– in this case, destination would not receive the packet at all
27
Mayank Pandey, MNNIT, Allahabad, India
Flooding of Control Packets
• Many protocols perform (potentially limited) flooding
of control packets, instead of data packets
• The control packets are used to discover routes
• Discovered routes are subsequently used to send
data packet(s)
• Overhead of control packet flooding is amortized
over data packets transmitted between consecutive
control packet floods
28
Mayank Pandey, MNNIT, Allahabad, India
Dynamic Source Routing (DSR)
• When node S wants to send a packet to node D,
but does not know a route to D, node S initiates
a route discovery
• Source node S floods Route Request (RREQ)
• Each node appends own identifier when
forwarding RREQ
29
Mayank Pandey, MNNIT, Allahabad, India
Route Discovery (DSR)
30
Mayank Pandey, MNNIT, Allahabad, India
Route Discovery (DSR)
31
Mayank Pandey, MNNIT, Allahabad, India
Route Discovery (DSR)
32
Mayank Pandey, MNNIT, Allahabad, India
Route Discovery (DSR)
Mayank Pandey, MNNIT, Allahabad, India 33
Route Discovery (DSR)
34
Mayank Pandey, MNNIT, Allahabad, India
Route Discovery (DSR)
35
Mayank Pandey, MNNIT, Allahabad, India
Route Discovery (DSR)
• Destination D on receiving the first RREQ,
sends a Route Reply (RREP)
• RREP is sent on a route obtained by reversing
the route appended to received RREQ
• RREP includes the route from S to D on which
RREQ was received by node D
36
Mayank Pandey, MNNIT, Allahabad, India
Route Reply (DSR)
37
Mayank Pandey, MNNIT, Allahabad, India
Route Reply (DSR)
• Route Reply can be sent by reversing the route in Route
Request (RREQ) only if links are guaranteed to be bi-
directional
– To ensure this, RREQ should be forwarded only if it received on a link
that is known to be bi-directional
• If unidirectional (asymmetric) links are allowed, then RREP
may need a route discovery for S from node D
– Unless node D already knows a route to node S
– If a route discovery is initiated by D for a route to S, then the Route
Reply is piggybacked on the Route Request from D.
• If IEEE 802.11 MAC is used to send data, then links have to be
bi-directional (since Ack is used)
38
Mayank Pandey, MNNIT, Allahabad, India
Dynamic Source Routing (DSR)
• Node S on receiving RREP, caches the route
included in the RREP
• When node S sends a data packet to D, the
entire route is included in the packet header
– hence the name source routing
• Intermediate nodes use the source route
included in a packet to determine to whom a
packet should be forwarded
39
Mayank Pandey, MNNIT, Allahabad, India
Data Delivery (DSR)
• Packet header size grows with route length
• When to Perform a Route Discovery
– When node S wants to send data to node D, but does not know a valid
route node D
40
Mayank Pandey, MNNIT, Allahabad, India
DSR Optimization (Route Caching)
• Each node caches a new route it learns by any means
• When node S finds route [S,E,F,J,D] to node D,
– node S also learns route [S,E,F] to node F
• When node K receives Route Request [S,C,G] destined for node,
– node K learns route [K,G,C,S] to node S
• When node F forwards Route Reply RREP [S,E,F,J,D],
– node F learns route [F,J,D] to node D
• When node E forwards Data [S,E,F,J,D]
– it learns route [E,F,J,D] to node D
• A node may also learn a route when it overhears Data packets
41
Mayank Pandey, MNNIT, Allahabad, India
Use of Route Caching
• When node S learns that a route to node D is broken,
it uses another route from its local cache, if such a
route to D exists in its cache. Otherwise, node S
initiates route discovery by sending a route request
• Node X on receiving a Route Request for some node
D can send a Route Reply if node X knows a route to
node D
• Use of route cache
– can speed up route discovery
– can reduce propagation of route requests
42
Mayank Pandey, MNNIT, Allahabad, India
Use of Route Caching
Use of Route Caching
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 43
Can Speed up Route Discovery
Use of Route Caching
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 44
Can Reduce Propagation of Route Requests
Route Error (RERR)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 45
Route caching: Cautions
• Stale caches can adversely affect performance
• With passage of time and host mobility,
cached routes may become invalid
• A sender host may try several stale routes
(obtained from local cache, or replied from
cache by other nodes), before finding a good
route
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 46
DSR (Advantages)
• Routes maintained only between nodes who
need to communicate
– reduces overhead of route maintenance
• Route caching can further reduce route
discovery overhead
• A single route discovery may yield many
routes to the destination, due to intermediate
nodes replying from local caches
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 47
DSR (Disadvantages)
• Packet header size grows with route length due
to source routing
• Flood of route requests may potentially reach all
nodes in the network
• Care must be taken to avoid collisions between
route requests propagated by neighboring
nodes
– insertion of random delays before forwarding RREQ
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 48
DSR (Disadvantages)
• Increased contention if too many route replies come
back due to nodes replying using their local cache
– Route Reply Storm problem
– Reply storm may be eased by preventing a node from
sending RREP if it hears another RREP with a shorter route
• An intermediate node may send Route Reply using a
stale cached route, thus polluting other caches
– This problem can be eased if some mechanism to purge
(potentially) invalid cached routes is incorporated.
• Static timeouts
• Adaptive timeouts based on link stability
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 49
Ad Hoc On-Demand Distance Vector Routing (AODV)
• DSR includes source routes in packet headers
– Resulting large headers can sometimes degrade
performance
• particularly when data contents of a packet are small
• AODV attempts to improve on DSR by maintaining
routing tables at the nodes, so that data packets do
not have to contain routes
• AODV retains the desirable feature of DSR that routes
are maintained only between nodes which need to
communicate
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 50
AODV
• Route Requests (RREQ) are forwarded in a manner
similar to DSR
• When a node re-broadcasts a Route Request, it sets
up a reverse path pointing towards the source
– AODV assumes symmetric (bi-directional) links
• When the intended destination receives a Route
Request, it replies by sending a Route Reply
• Route Reply travels along the reverse path set-up
when Route Request is forwarded
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 51
AODV (Properties)
• Route discovery cycle used for route finding
– Maintenance of active routes
– Sequence numbers used for loop prevention and as route
freshness criteria
• Whenever routes are not used, get expired they are
discarded
– Reduces stale routes
– Reduces need for route maintenance
– Minimizes number of active routes between an active
source and destination
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 52
AODV (Properties)
• AODV discovers routes as and when necessary
– Does not maintain routes from every node to
every other
– Routes are maintained just as long as necessary
• Every node maintains its monotonically
increasing sequence number -> increases
every time the node notices change in the
neighborhood topology
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 53
AODV (Properties)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 54
AODV (Route Discovery)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 55
AODV (Route Discovery)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 56
AODV (Route Discovery)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 57
AODV (Route Discovery)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 58
Example
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 59
Example
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 60
Example
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 61
Example
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 62
Example
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 63
Route Reply AODV (Comments)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 64
Route Discovery Contd.
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 65
Route Discovery Contd.
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 66
Route Discovery Contd.
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 67
Forward Path Setup
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 68
Forward Path Setup
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 69
Forward Path Setup
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 70
Receipt of Multiple RREP
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 71
AODV Data Delivery
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 72
Route Requests in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 73
Route Requests in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 74
Route Requests in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 75
Reverse Path Setup in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 76
Reverse Path Setup in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 77
Reverse Path Setup in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 78
Route Reply in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 79
Route Reply in AODV
• An intermediate node (not the destination) may also
send a Route Reply (RREP) provided that it knows a more
recent path than the one previously known to sender S
• To determine whether the path known to an
intermediate node is more recent, destination sequence
numbers are used
• The likelihood that an intermediate node will send a
Route Reply when using AODV not as high as DSR
– A new Route Request by node S for a destination is assigned
a higher destination sequence number. An intermediate node
which knows a route, but with a smaller sequence number,
cannot send Route Reply
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 80
Forward Path Setup in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 81
Data Delivery in AODV
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 82
Timeouts
• A routing table entry maintaining a reverse
path is purged after a timeout interval
– timeout should be long enough to allow RREP to
come back
• A routing table entry maintaining a forward path is
purged if not used for active_route_timeout interval
– if no data is being sent using a particular routing
table entry, that entry will be deleted from the
routing table (even if the route may actually still
be valid)
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 83
Link Failure Reporting
• A neighbor of node X is considered active for a
routing table entry if the neighbor sent a
packet within active_route_timeout interval
which was forwarded using that entry
• When the next hop link in a routing table
entry breaks, all active neighbors are informed
• Link failures are propagated by means of
Route Error messages, which also update
destination sequence numbers
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 84
Route Error
• When node X is unable to forward packet P (from
node S to node D) on link (X,Y), it generates a RERR
message
• Node X increments the destination sequence number
for D cached at node X
• The incremented sequence number N is included in
the RERR
• When node S receives the RERR, it initiates a new
route discovery for D using destination sequence
number at least as large as N
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 85
Destination Sequence Number
• Continuing from the previous slide …
– When node D receives the route request with
destination sequence number N, node D will set
its sequence number to N, unless it is already
larger than N
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 86
Link Failure Detection
• Hello messages: Neighboring nodes
periodically exchange hello message
• Absence of hello message is used as an
indication of link failure
• Alternatively, failure to receive several MAC-
level acknowledgement may be used as an
indication of link failure
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 87
Why Sequence Numbers in AODV
• To avoid using old/broken routes
– To determine which route is newer
• To prevent formation of loops
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 88
• Assume that A does not know about failure of link C-D
because RERR sent by C is lost
• Now C performs a route discovery for D. Node A receives the
RREQ (say, via path C-E-A)
• Node A will reply since A knows a route to D via node B
Results in a loop (for instance, C-E-A-B-C )
Optimization: Expanding Ring Search
• Route Requests are initially sent with small
Time-to-Live (TTL) field, to limit their
propagation
– DSR also includes a similar optimization
• If no Route Reply is received, then larger TTL
tried
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 89
AODV: Summary
• Routes need not be included in packet headers
• Nodes maintain routing tables containing entries only
for routes that are in active use
• At most one next-hop per destination maintained at
each node
– Multi-path extensions can be designed
– DSR may maintain several routes for a single destination
• Unused routes expire even if topology does not change
07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 90

More Related Content

PPTX
MobileAdHocRoutingProtocols.pptx
PPTX
PPTX
Routing Presentation
PPTX
PPTX
Reactive or on-demand routing protocolss
PPTX
implementation of sinkhole attack on DSR protocol
PDF
DSDV VS AODV
PPT
Manet By Vikas mainanwal
MobileAdHocRoutingProtocols.pptx
Routing Presentation
Reactive or on-demand routing protocolss
implementation of sinkhole attack on DSR protocol
DSDV VS AODV
Manet By Vikas mainanwal

Similar to MobileComputingMANET2023 MobileComputingMANET2023.pptx (20)

PPTX
Introduction to mobile ad hoc network (m.a.net)
PPTX
MOBILE COMPUTING Unit 4.pptx
PPTX
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
PDF
EEEM048_Lecture4_Network.pdf
PDF
EEEM048_Lecture4_Network.pdf
PPT
Network layer
PDF
Routing in Mobile Ad hoc Networks
PPTX
Module-4 Short notes.pptx
PPTX
Routing in Ad hoc networks
PPTX
Computer networks for cse Unit-3 (1).pptx
PPTX
Routing algorithm
PPTX
Module 3 Part B - computer networks module 2 ppt
PPTX
Classification of routing protocols
PDF
17 21 jan17 9dec16 13655 27902-1-ed(edit)
PDF
new-Modified
PPT
Unit-3-Part-1 [Autosaved].ppt
PPTX
Energy Efficient Routing Approaches in Ad-hoc Networks
Introduction to mobile ad hoc network (m.a.net)
MOBILE COMPUTING Unit 4.pptx
DSDV Protocols by Mr.Darwin Nesakumar A, AP/ECE, R.M.K.Engineering College
EEEM048_Lecture4_Network.pdf
EEEM048_Lecture4_Network.pdf
Network layer
Routing in Mobile Ad hoc Networks
Module-4 Short notes.pptx
Routing in Ad hoc networks
Computer networks for cse Unit-3 (1).pptx
Routing algorithm
Module 3 Part B - computer networks module 2 ppt
Classification of routing protocols
17 21 jan17 9dec16 13655 27902-1-ed(edit)
new-Modified
Unit-3-Part-1 [Autosaved].ppt
Energy Efficient Routing Approaches in Ad-hoc Networks
Ad

Recently uploaded (20)

PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Sustainable Sites - Green Building Construction
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Digital Logic Computer Design lecture notes
PDF
Well-logging-methods_new................
PPT
Project quality management in manufacturing
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Lecture Notes Electrical Wiring System Components
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
UNIT 4 Total Quality Management .pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Internet of Things (IOT) - A guide to understanding
Sustainable Sites - Green Building Construction
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Operating System & Kernel Study Guide-1 - converted.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Foundation to blockchain - A guide to Blockchain Tech
Digital Logic Computer Design lecture notes
Well-logging-methods_new................
Project quality management in manufacturing
Model Code of Practice - Construction Work - 21102022 .pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Lecture Notes Electrical Wiring System Components
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
R24 SURVEYING LAB MANUAL for civil enggi
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
UNIT 4 Total Quality Management .pptx
Ad

MobileComputingMANET2023 MobileComputingMANET2023.pptx

  • 1. Mobile Computing MANET Mayank Pandey, MNNIT, Allahabad, India
  • 2. MANET • Formed by wireless hosts which may be mobile • Without (necessarily) using a pre-existing infrastructure • Routes between nodes may potentially contain multiple hops 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 2
  • 3. MANET • May need to traverse multiple links to reach a destination Mayank Pandey, MNNIT, Allahabad, India 07/11/2025 3
  • 4. MANET (Route Changes: Mobility) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 4
  • 5. Why Ad-hoc Networks • Ease of deployment • Speed of deployment • Decreased dependence on infrastructure Mayank Pandey, MNNIT, Allahabad, India 07/11/2025 5
  • 6. Many Applications 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 6
  • 7. 7 Mayank Pandey, MNNIT, Allahabad, India Many Variations • Fully Symmetric Environment – all nodes have identical capabilities and responsibilities • Asymmetric Capabilities – transmission ranges and radios may differ – battery life at different nodes may differ – processing capacity may be different at different nodes – speed of movement • Asymmetric Responsibilities – only some nodes may route packets – some nodes may act as leaders of nearby nodes (e.g. cluster head)
  • 8. 8 Mayank Pandey, MNNIT, Allahabad, India Many Variations • Traffic characteristics may differ in different ad hoc networks – bit rate – timeliness constraints – reliability requirements – unicast / multicast / geocast – host-based addressing / content-based addressing /capability-based addressing • May co-exist (and co-operate) with an infrastructure based network
  • 9. 9 Mayank Pandey, MNNIT, Allahabad, India Many Variations • Mobility patterns may be different – people sitting at an airport lounge – taxi cabs – kids playing – military movements – personal area network • Mobility characteristics – speed – Predictability • direction of movement • pattern of movement • uniformity (or lack) of mobility characteristics among different nodes
  • 10. 10 Mayank Pandey, MNNIT, Allahabad, India Challenges • Limited wireless transmission range • Broadcast nature of the wireless medium • Hidden terminal problem • Packet losses due to transmission errors • Mobility-induced route changes • Mobility-induced packet losses • Battery constraints • Potentially frequent network partitions • Ease of snooping on wireless transmissions (security hazard)
  • 11. 11 Mayank Pandey, MNNIT, Allahabad, India General Assumption • Unless stated otherwise, fully symmetric environment is assumed implicitly – All nodes have identical capabilities and responsibilities
  • 12. 12 Mayank Pandey, MNNIT, Allahabad, India Why Routing in MANET different ? • Host mobility – link failure/repair due to mobility may have different characteristics than those due to other causes • Rate of link failure/repair may be high when nodes move fast • New performance criteria may be used – route stability despite mobility – energy consumption
  • 13. 13 Mayank Pandey, MNNIT, Allahabad, India Unicast Routing Protocols • Many protocols have been proposed • Some have been invented specifically for MANET • Others are adapted from previously proposed protocols for wired networks • No single protocol works well in all environments – some attempts made to develop adaptive protocols
  • 14. 14 Mayank Pandey, MNNIT, Allahabad, India Routing Protocols • Proactive protocols – Determine routes independent of traffic pattern – Traditional link-state and distance-vector routing protocols are proactive • Reactive protocols – Maintain routes only if needed • Hybrid protocols
  • 15. 15 Mayank Pandey, MNNIT, Allahabad, India Trade-Off • Latency of route discovery – Proactive protocols may have lower latency since routes are maintained at all times – Reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y • Overhead of route discovery/maintenance – Reactive protocols may have lower overhead since routes are determined only if needed – Proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating • Which approach achieves a better trade-off depends on the traffic and mobility patterns
  • 16. 16 Mayank Pandey, MNNIT, Allahabad, India Flooding • Sender S broadcasts data packet P to all its neighbors • Each node receiving P forwards P to its neighbors • Sequence numbers used to avoid the possibility of forwarding the same packet more than once • Packet P reaches destination D provided that D is reachable from sender S • Node D does not forward the packet
  • 17. 17 Mayank Pandey, MNNIT, Allahabad, India Flooding
  • 18. 18 Mayank Pandey, MNNIT, Allahabad, India Flooding
  • 19. 19 Mayank Pandey, MNNIT, Allahabad, India Flooding
  • 20. 20 Mayank Pandey, MNNIT, Allahabad, India Flooding • Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P once
  • 21. 21 Mayank Pandey, MNNIT, Allahabad, India Flooding • Nodes J and K both broadcast packet P to node D – Since nodes J and K are hidden from each other, their transmissions may collide • Packet P may not be delivered to node D at all, despite the use of flooding
  • 22. 22 Mayank Pandey, MNNIT, Allahabad, India Flooding • Node D does not forward packet P, because node D is the intended destination of packet P
  • 23. 23 Mayank Pandey, MNNIT, Allahabad, India Flooding • Flooding completed • Nodes unreachable from S do not receive packet P (e.g., node Z) • Nodes for which all paths from S go through the destination D also do not receive packet P (example: node N)
  • 24. 24 Mayank Pandey, MNNIT, Allahabad, India Flooding • Flooding may deliver packets to too many nodes (in the worst case, all nodes reachable from sender may receive the packet)
  • 25. 25 Mayank Pandey, MNNIT, Allahabad, India Flooding (Advantages) • Simplicity – May be more efficient than other protocols when rate of information transmission is low enough that the overhead of explicit route discovery/maintenance incurred by other protocols is relatively higher • this scenario may occur, for instance, when nodes transmit small data packets relatively infrequently, and many topology changes occur between consecutive packet transmissions • Potentially higher reliability of data delivery – Because packets may be delivered to the destination on multiple paths
  • 26. 26 Mayank Pandey, MNNIT, Allahabad, India Flooding (Disadvantages) • Potentially, very high overhead – Data packets may be delivered to too many nodes who do not need to receive them • Potentially lower reliability of data delivery – Flooding uses broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead • Broadcasting in IEEE 802.11 MAC is unreliable • In our example, nodes J and K may transmit to node D simultaneously, resulting in loss of the packet – in this case, destination would not receive the packet at all
  • 27. 27 Mayank Pandey, MNNIT, Allahabad, India Flooding of Control Packets • Many protocols perform (potentially limited) flooding of control packets, instead of data packets • The control packets are used to discover routes • Discovered routes are subsequently used to send data packet(s) • Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods
  • 28. 28 Mayank Pandey, MNNIT, Allahabad, India Dynamic Source Routing (DSR) • When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery • Source node S floods Route Request (RREQ) • Each node appends own identifier when forwarding RREQ
  • 29. 29 Mayank Pandey, MNNIT, Allahabad, India Route Discovery (DSR)
  • 30. 30 Mayank Pandey, MNNIT, Allahabad, India Route Discovery (DSR)
  • 31. 31 Mayank Pandey, MNNIT, Allahabad, India Route Discovery (DSR)
  • 32. 32 Mayank Pandey, MNNIT, Allahabad, India Route Discovery (DSR)
  • 33. Mayank Pandey, MNNIT, Allahabad, India 33 Route Discovery (DSR)
  • 34. 34 Mayank Pandey, MNNIT, Allahabad, India Route Discovery (DSR)
  • 35. 35 Mayank Pandey, MNNIT, Allahabad, India Route Discovery (DSR) • Destination D on receiving the first RREQ, sends a Route Reply (RREP) • RREP is sent on a route obtained by reversing the route appended to received RREQ • RREP includes the route from S to D on which RREQ was received by node D
  • 36. 36 Mayank Pandey, MNNIT, Allahabad, India Route Reply (DSR)
  • 37. 37 Mayank Pandey, MNNIT, Allahabad, India Route Reply (DSR) • Route Reply can be sent by reversing the route in Route Request (RREQ) only if links are guaranteed to be bi- directional – To ensure this, RREQ should be forwarded only if it received on a link that is known to be bi-directional • If unidirectional (asymmetric) links are allowed, then RREP may need a route discovery for S from node D – Unless node D already knows a route to node S – If a route discovery is initiated by D for a route to S, then the Route Reply is piggybacked on the Route Request from D. • If IEEE 802.11 MAC is used to send data, then links have to be bi-directional (since Ack is used)
  • 38. 38 Mayank Pandey, MNNIT, Allahabad, India Dynamic Source Routing (DSR) • Node S on receiving RREP, caches the route included in the RREP • When node S sends a data packet to D, the entire route is included in the packet header – hence the name source routing • Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded
  • 39. 39 Mayank Pandey, MNNIT, Allahabad, India Data Delivery (DSR) • Packet header size grows with route length • When to Perform a Route Discovery – When node S wants to send data to node D, but does not know a valid route node D
  • 40. 40 Mayank Pandey, MNNIT, Allahabad, India DSR Optimization (Route Caching) • Each node caches a new route it learns by any means • When node S finds route [S,E,F,J,D] to node D, – node S also learns route [S,E,F] to node F • When node K receives Route Request [S,C,G] destined for node, – node K learns route [K,G,C,S] to node S • When node F forwards Route Reply RREP [S,E,F,J,D], – node F learns route [F,J,D] to node D • When node E forwards Data [S,E,F,J,D] – it learns route [E,F,J,D] to node D • A node may also learn a route when it overhears Data packets
  • 41. 41 Mayank Pandey, MNNIT, Allahabad, India Use of Route Caching • When node S learns that a route to node D is broken, it uses another route from its local cache, if such a route to D exists in its cache. Otherwise, node S initiates route discovery by sending a route request • Node X on receiving a Route Request for some node D can send a Route Reply if node X knows a route to node D • Use of route cache – can speed up route discovery – can reduce propagation of route requests
  • 42. 42 Mayank Pandey, MNNIT, Allahabad, India Use of Route Caching
  • 43. Use of Route Caching 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 43 Can Speed up Route Discovery
  • 44. Use of Route Caching 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 44 Can Reduce Propagation of Route Requests
  • 45. Route Error (RERR) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 45
  • 46. Route caching: Cautions • Stale caches can adversely affect performance • With passage of time and host mobility, cached routes may become invalid • A sender host may try several stale routes (obtained from local cache, or replied from cache by other nodes), before finding a good route 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 46
  • 47. DSR (Advantages) • Routes maintained only between nodes who need to communicate – reduces overhead of route maintenance • Route caching can further reduce route discovery overhead • A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 47
  • 48. DSR (Disadvantages) • Packet header size grows with route length due to source routing • Flood of route requests may potentially reach all nodes in the network • Care must be taken to avoid collisions between route requests propagated by neighboring nodes – insertion of random delays before forwarding RREQ 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 48
  • 49. DSR (Disadvantages) • Increased contention if too many route replies come back due to nodes replying using their local cache – Route Reply Storm problem – Reply storm may be eased by preventing a node from sending RREP if it hears another RREP with a shorter route • An intermediate node may send Route Reply using a stale cached route, thus polluting other caches – This problem can be eased if some mechanism to purge (potentially) invalid cached routes is incorporated. • Static timeouts • Adaptive timeouts based on link stability 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 49
  • 50. Ad Hoc On-Demand Distance Vector Routing (AODV) • DSR includes source routes in packet headers – Resulting large headers can sometimes degrade performance • particularly when data contents of a packet are small • AODV attempts to improve on DSR by maintaining routing tables at the nodes, so that data packets do not have to contain routes • AODV retains the desirable feature of DSR that routes are maintained only between nodes which need to communicate 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 50
  • 51. AODV • Route Requests (RREQ) are forwarded in a manner similar to DSR • When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source – AODV assumes symmetric (bi-directional) links • When the intended destination receives a Route Request, it replies by sending a Route Reply • Route Reply travels along the reverse path set-up when Route Request is forwarded 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 51
  • 52. AODV (Properties) • Route discovery cycle used for route finding – Maintenance of active routes – Sequence numbers used for loop prevention and as route freshness criteria • Whenever routes are not used, get expired they are discarded – Reduces stale routes – Reduces need for route maintenance – Minimizes number of active routes between an active source and destination 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 52
  • 53. AODV (Properties) • AODV discovers routes as and when necessary – Does not maintain routes from every node to every other – Routes are maintained just as long as necessary • Every node maintains its monotonically increasing sequence number -> increases every time the node notices change in the neighborhood topology 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 53
  • 54. AODV (Properties) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 54
  • 55. AODV (Route Discovery) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 55
  • 56. AODV (Route Discovery) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 56
  • 57. AODV (Route Discovery) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 57
  • 58. AODV (Route Discovery) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 58
  • 59. Example 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 59
  • 60. Example 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 60
  • 61. Example 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 61
  • 62. Example 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 62
  • 63. Example 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 63
  • 64. Route Reply AODV (Comments) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 64
  • 65. Route Discovery Contd. 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 65
  • 66. Route Discovery Contd. 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 66
  • 67. Route Discovery Contd. 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 67
  • 68. Forward Path Setup 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 68
  • 69. Forward Path Setup 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 69
  • 70. Forward Path Setup 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 70
  • 71. Receipt of Multiple RREP 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 71
  • 72. AODV Data Delivery 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 72
  • 73. Route Requests in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 73
  • 74. Route Requests in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 74
  • 75. Route Requests in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 75
  • 76. Reverse Path Setup in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 76
  • 77. Reverse Path Setup in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 77
  • 78. Reverse Path Setup in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 78
  • 79. Route Reply in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 79
  • 80. Route Reply in AODV • An intermediate node (not the destination) may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender S • To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used • The likelihood that an intermediate node will send a Route Reply when using AODV not as high as DSR – A new Route Request by node S for a destination is assigned a higher destination sequence number. An intermediate node which knows a route, but with a smaller sequence number, cannot send Route Reply 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 80
  • 81. Forward Path Setup in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 81
  • 82. Data Delivery in AODV 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 82
  • 83. Timeouts • A routing table entry maintaining a reverse path is purged after a timeout interval – timeout should be long enough to allow RREP to come back • A routing table entry maintaining a forward path is purged if not used for active_route_timeout interval – if no data is being sent using a particular routing table entry, that entry will be deleted from the routing table (even if the route may actually still be valid) 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 83
  • 84. Link Failure Reporting • A neighbor of node X is considered active for a routing table entry if the neighbor sent a packet within active_route_timeout interval which was forwarded using that entry • When the next hop link in a routing table entry breaks, all active neighbors are informed • Link failures are propagated by means of Route Error messages, which also update destination sequence numbers 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 84
  • 85. Route Error • When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a RERR message • Node X increments the destination sequence number for D cached at node X • The incremented sequence number N is included in the RERR • When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 85
  • 86. Destination Sequence Number • Continuing from the previous slide … – When node D receives the route request with destination sequence number N, node D will set its sequence number to N, unless it is already larger than N 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 86
  • 87. Link Failure Detection • Hello messages: Neighboring nodes periodically exchange hello message • Absence of hello message is used as an indication of link failure • Alternatively, failure to receive several MAC- level acknowledgement may be used as an indication of link failure 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 87
  • 88. Why Sequence Numbers in AODV • To avoid using old/broken routes – To determine which route is newer • To prevent formation of loops 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 88 • Assume that A does not know about failure of link C-D because RERR sent by C is lost • Now C performs a route discovery for D. Node A receives the RREQ (say, via path C-E-A) • Node A will reply since A knows a route to D via node B Results in a loop (for instance, C-E-A-B-C )
  • 89. Optimization: Expanding Ring Search • Route Requests are initially sent with small Time-to-Live (TTL) field, to limit their propagation – DSR also includes a similar optimization • If no Route Reply is received, then larger TTL tried 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 89
  • 90. AODV: Summary • Routes need not be included in packet headers • Nodes maintain routing tables containing entries only for routes that are in active use • At most one next-hop per destination maintained at each node – Multi-path extensions can be designed – DSR may maintain several routes for a single destination • Unused routes expire even if topology does not change 07/11/2025 Mayank Pandey, MNNIT, Allahabad, India 90