SlideShare a Scribd company logo
Presented By:-
Ashok Panwar
Technical Officer in ECIL(NPCIL)
Tarapur, Mumbai
Routing Protocols
in MANETs
1
What is a MANET
Mobile nodes, wireless links
Infrastructure-less: by the nodes, …
Multi-hop routing: …, and for the nodes
Minimal administration: no hassles
2
Ashok Panwar
Technical Officer in ECIL
What’s unique about a MANET ?
Moving nodes  ever changing topology
Wireless links
  various and volatile link quality
Pervasive (cheap) devices
 Power constraints
Security
 Confidentiality, other attacks
3
Ashok Panwar
Technical Officer in ECIL
Challenges in MANET Routing
Need dynamic routing
Frequent topological changes possible.
Very different from dynamic routing in the Internet.
Potential of network partitions.
Routing overhead must be kept minimal
Wireless  low bandwidth
Mobile  low power
Minimize # of routing control messages
Minimize routing state at each node
4
Ashok Panwar
Technical Officer in ECIL
Other Challenges
Auto configuration issues
Address assignment
Service discovery
Security issues
Ease of denial-of-service attack
Misbehaving nodes difficult to identify
Nodes can be easily compromised
New Applications/services
Location based: Distribute some information to all nodes in a
geographic area (geocast).
Content based: Query all sensors that sensed something particular in
the past hour.
5
Ashok Panwar
Technical Officer in ECIL
MANET Protocol Zoo
Topology based routing
 Proactive approach, e.g., DSDV.
 Reactive approach, e.g., DSR, AODV, TORA.
 Hybrid approach, e.g., Cluster, ZRP.
 Position based routing
 Location Services:
DREAM, Quorum-based, GLS, Home zone etc.
 Forwarding Strategy:
Greedy, GPSR, RDF, Hierarchical, etc.
6
Ashok Panwar
Technical Officer in ECIL
Routing Protocols
Reactive (On-demand) protocols
Discover routes when needed
Source-initiated route discovery
Proactive protocols
Traditional distributed shortest-path protocols
Based on periodic updates. High routing overhead
Tradeoff
State maintenance traffic vs. route discovery traffic
Route via maintained route vs. delay for route discovery
7
Ashok Panwar
Technical Officer in ECIL
Reactive Routing
Key Goal: Reduction in routing overhead
Useful when number of traffic sessions is much lower
than the number of nodes.
No routing structure created a priori. Let the
structure emerge in response to a need
Two key methods for route discovery
source routing
backward learning (similar to intra-AS routing)
Introduces delay
8
Ashok Panwar
Technical Officer in ECIL
Reactive (on-demand) routing:
Routing only when needed
0
5
1
2
4
3
query(0)
query(0)
query(0)
query(0)
query(0)
query(0)
query(0)
reply(0)
reply(0)
reply(0)
Advantages:
 eliminate periodic updates
 adaptive to network dynamics
Disadvantages:
 high flood-search overhead with
mobility, distributed traffic
 high route acquisition latency
9
Ashok Panwar
Technical Officer in ECIL
Reactive Routing – Source initiated
Source floods the network with a route request packet
when a route is required to a destination
Flood is propagated outwards from the source
Pure flooding = every node transmits the request only once
Destination replies to request
Reply uses reversed path of route request
sets up the forward path
Two key protocols: DSR and AODV
10
Ashok Panwar
Technical Officer in ECIL
Dynamic Source Routing (DSR)
Cooperative nodes
Relatively small network diameter (5-10 hops)
Detectable packet error
Unidirectional or bidirectional link
Promiscuous mode (optional)
11
Ashok Panwar
Technical Officer in ECIL
A
B
C
E
D
G
H
F
A
A
A-B
A-C
A-C-E
A-C-E
A-C-E
A-B-D
A-B-D-G
A-B-D-G
A-B-D-G
Route Discovery
A-B-C
A-B-C
Route Request (RREQ)
Route Reply (RREP)
Route Discovery is issued with exponential back-off intervals.Route Discovery is issued with exponential back-off intervals.
Initiator ID
Initiator seq#
Target ID
Partial route
RREQ FORMATRREQ FORMAT
12
Ashok Panwar
Technical Officer in ECIL
Route Discovery: at source A
A need to send to G
Lookup Cache for route A to G
Route
found?
Start Route
Discovery
Protocol
Continue
normal
processing
Route Discovery
finished
Packet in
buffer?
Send packet to
next-hop
done
Buffer
packet
no
Write route in
packet header
yes
yes
no
wait
13
Ashok Panwar
Technical Officer in ECIL
Route Discovery: At an intermediate node
Accept route
request packet
<src,id> in
recently seen
requests list?
Discard
route
request
yes
no
Host’s address
already in patrial
route
Discard
route
request
yes
Store <src,id> in list
Broadcast packet
Send route reply
packet
done
myAddr=t
arget
no
Append myAddr to
partial route no
yes
14
Ashok Panwar
Technical Officer in ECIL
DSR - Route Discovery
Route ReplyRoute Reply message containing path information is sent
back to the source either by
the destination, or
intermediate nodes that have a route to the destination
Reverse the order of the route record, and include it in Route
Reply.
Unicast, source routing
Each node maintains a Route CacheRoute Cache which records routes it
has learned and overheard over time
15
Ashok Panwar
Technical Officer in ECIL
Route Maintenance
Route maintenance performed only while route is in use
Error detection:
Monitors the validity of existing routes by passively listening to
data packets transmitted at neighboring nodes
Lower level acknowledgements
When problem detected, send Route ErrorRoute Error packet to
original sender to perform new route discovery
Host detects the error and the host it was attempting;
Route ErrorRoute Error is sent back to the sender the packet – original srcis sent back to the sender the packet – original src
16
Ashok Panwar
Technical Officer in ECIL
A
B
C
E
D
G
H
F
G
RERR
RERR
Route Cache (A)
G: A, B, D, G G: A,
C, E, H, G
F: B, C, F
Route Maintenance
17
Ashok Panwar
Technical Officer in ECIL
A Summary of DSRA Summary of DSR
Entirely on-demand, potentially zero control message overhead
Trivially loop-free with source routing
Conceptually supports unidirectional links as well as
bidirectional links
High packet delays/jitters associated with on-demand routing
Space overhead in packets and route caches
Promiscuous mode operations consume excessive amount of
power
18
Ashok Panwar
Technical Officer in ECIL
Break…
Then AODV
19
Ashok Panwar
Technical Officer in ECIL
AODV Routing Protocol
AODV = Ad Hoc On-demand Distance Vector
Source floods route request in the network.
Reverse paths are formed when a node hears a route request.
Each node forwards the request only once (pure flooding).
A
S E
F
B
C
G D
20
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Source floods route request in the network.
Each node forwards the request only once (pure flooding).
A
S E
F
B
C
G D
21
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Uses hop-by-hop routing.
Each node forwards the request only once (pure flooding).
Reverse paths are formed when a node hears a route request.
A
S E
F
B
C
G D
22
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Route reply forwarded via the reverse path.
A
S E
F
B
C
G D
23
Ashok Panwar
Technical Officer in ECIL
AODV Route Discovery
Route reply is forwarded via the reverse path …
thus forming the forward path.
The forward path is used to route data packets.
A
S E
F
B
C
G D
24
Ashok Panwar
Technical Officer in ECIL
Route Expiry
Unused paths expire based on a timer.
A
S E
F
B
C
G D
25
Ashok Panwar
Technical Officer in ECIL
AODV – Optimization
Useful optimization: An intermediate node with a
route to D can reply to route request.
Faster operation.
Quenches route request flood.
Above optimization can cause loops in presence of
link failures
26
Ashok Panwar
Technical Officer in ECIL
AODV: Routing Loops
Assume, link C-D fails, and node A does not know about it
(route error packet from C is lost).
C performs a route discovery for D.
Node A receives the route request (via path C-E-A)
Node A replies, since A knows a route to D via node B
Results in a loop: C-E-A-B-C
A B C D
E
27
Ashok Panwar
Technical Officer in ECIL
AODV: Routing Loops
A B C D
E
• Assume, the link C-D fails, and node A does not know about
it (route error packet from C is lost).
• C performs a route discovery for D.
• Node A receives the route request (via path C-E-A)
• Node A replies, since A knows a route to D via node B
• Results in a loop: C-E-A-B-C
28
Ashok Panwar
Technical Officer in ECIL
AODV: Use Sequence Numbers
Each node X maintains a sequence number
acts as a time stamp
incremented every time X sends any message)
Each route to X (at any node Y) also has X’s
sequence number associated with it, which is Y’s
latest knowledge of X’s sequence number.
Sequence number signifies ‘freshness’ of the route
– higher the number, more up to date is the route.
29
Ashok Panwar
Technical Officer in ECIL
Use of Sequence Numbers in AODV
Loop freedom: Intermediate node replies with a route
(instead of forwarding request) only if it has a route
with a higher associated sequence number.
S Y D?
Dest seq. no. = 10 Has a route to D
with seq. no = 7 Seq. no. = 15
RREQ carries 10 Y does not reply, but
forwards the RREQ
30
Ashok Panwar
Technical Officer in ECIL
Avoidance of Loop
Link failure increments the DSN at C (now is 10).
If C needs route to D, RREQ carries the DSN (10).
A does not reply as its own DSN is less than 10.
A B C D
E
109
9
7
5
All DNS’s are for D
DSN = Destination Sequence Number.
31
Ashok Panwar
Technical Officer in ECIL
Path Maintenance
Movement not along active path triggers no action
If source moves, reinitiate route discovery
When destination or intermediate node moves
 upstream node of break broadcasts Route Error (RERR)
 RERR contains list of all destinations no longer reachable due to link
break
 RERR propagated until node with no precursors for destination is
reached
Source
Destination
1
2
3
4
3’
Source
Destination
1
2
4
3’
32
Ashok Panwar
Technical Officer in ECIL
Summary: AODV
At most one route per destination maintained at
each node
After link break, all routes using the failed link are erased.
Expiration based on timeouts.
Use of sequence numbers to prevent loops.
Optimizations
 Routing tables instead of storing full routes.
 Control flooding (incrementally increase ‘region’)
33
Ashok Panwar
Technical Officer in ECIL
Other notes
34
Ashok Panwar
Technical Officer in ECIL
Proposed Routing Approaches
Conventional wired-type schemes (global routing,
proactive):
Distance Vector; Link State
Hierarchical (global routing) schemes:
Fisheye, Hierarchical State Routing, Landmark Routing
On- Demand, reactive routing:
Source routing; backward learning
Location Assisted routing (Geo-routing):
DREAM, LAR etc
35
Ashok Panwar
Technical Officer in ECIL
Conventional wired routing limitations
Distance Vector (eg, Bellman-Ford, DSDV):
routing control O/H linearly increasing with net size
convergence problems (count to infinity); potential loops
Link State (eg, OSPF):
link update flooding O/H caused by frequent topology
changes
CONVENTIONAL ROUTING DOES NOT SCALE TO SIZE AND
MOBILITY
36
Ashok Panwar
Technical Officer in ECIL
Distance Vector
0
5
1
2
4
3
Destination Next Hop Distance
0 2 3
1 2 2
… … …
Routing table at node 5 :
Tables grow linearly with # nodes
Control O/H grows with
mobility and size
37
Ashok Panwar
Technical Officer in ECIL
Link State Routing
 At node 5, based on the link
state packets, topology table is
constructed:
 Dijkstra’s Algorithm can then
be used for the shortest path
0
5
1
2
4
3
{1}
{0,2,3}
{1,4}
{2,4}
{2,3,5}
{1,4,5}
0 1 2 3 4 5
0 1 1 0 0 0 0
1 1 1 1 1 0 0
2 0 1 1 0 1 1
3 0 1 0 1 1 0
4 0 0 1 1 1 1
5 0 0 1 0 1 1
38
Ashok Panwar
Technical Officer in ECIL
Existing On-Demand Protocols
Dynamic Source Routing (DSR)
Associativity - Based Routing (ABR)
Ad-hoc On-demand Distance Vector (AODV)
Temporarily Ordered Routing Algorithm (TORA)
Zone Routing Protocol (ZRP)
Signal Stability Based Adaptive Routing (SSA)
On Demand Multicast Routing Protocol (ODMRP)
…
39
Ashok Panwar
Technical Officer in ECIL
Questions???
Thank You!!!
40

More Related Content

PPSX
VLSI Design Flow
PDF
Vlsi lab viva question with answers
PDF
Verilog lab mauual
PDF
ADS Workshop on PCI Express(r)
PPTX
Vlsi design flow
DOC
VLSI Experiments I
PDF
Power Analysis of Embedded Low Latency Network on Chip
PPTX
Fabric Path PPT by NETWORKERS HOME
VLSI Design Flow
Vlsi lab viva question with answers
Verilog lab mauual
ADS Workshop on PCI Express(r)
Vlsi design flow
VLSI Experiments I
Power Analysis of Embedded Low Latency Network on Chip
Fabric Path PPT by NETWORKERS HOME

What's hot (19)

PPTX
Otv notes
PPT
Madge Smart Ringswitch - Version 3 Software
PDF
RISC-V Zce Extension
PDF
Session 2,3 FPGAs
PDF
Getting started with RISC-V verification what's next after compliance testing
PPTX
Evolving Data Center switching with TRILL
PDF
Lab9500
PDF
Devdutt Pawaskar Resume
PDF
Zynq architecture
PPTX
Xilinx 4000 series
PPTX
Flip Chip technology
PPT
Expl sw chapter_02_switches_part_1
PDF
MIPI DevCon 2016: MIPI C-PHY - Introduction From Basic Theory to Practical Im...
PDF
lecciones ccna3
PPT
My Project
PPTX
PLC training
PPT
Fpga(field programmable gate array)
Otv notes
Madge Smart Ringswitch - Version 3 Software
RISC-V Zce Extension
Session 2,3 FPGAs
Getting started with RISC-V verification what's next after compliance testing
Evolving Data Center switching with TRILL
Lab9500
Devdutt Pawaskar Resume
Zynq architecture
Xilinx 4000 series
Flip Chip technology
Expl sw chapter_02_switches_part_1
MIPI DevCon 2016: MIPI C-PHY - Introduction From Basic Theory to Practical Im...
lecciones ccna3
My Project
PLC training
Fpga(field programmable gate array)
Ad

Similar to Routing Protocols in MANET's by Ashok Panwar (20)

PPTX
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
PPTX
Ad-hoc Networks by Ashok Panwar
PPT
Secure Routing with AODV Protocol for MANET by Ashok Panwar
PPTX
Ad-hoc networking with AODV
PPT
RoutingProtocols.ppt
PDF
Ad hoc network-performance_analysis and simulation
PDF
Lecture 11 14. Adhoc routing protocols cont..
PPTX
AODV routing protocol
PPT
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
PPTX
Introduction to mobile ad hoc network (m.a.net)
PPTX
Routing protocol
PPTX
MobileComputingMANET2023 MobileComputingMANET2023 .pptx
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
PPTX
Classification of routing protocols
PPTX
WirelessSensorNetworks_Network Layer_4-5.pptx
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
PPT
Default and On demand routing - Advance Computer Networks
PPTX
MobileAdHocRoutingProtocols.pptx
PDF
Routing in Mobile Ad hoc Networks
PPT
adhoc-and-sensor-networks-chapter-02.ppt [Autosaved].ppt
Ad hoc On-demand Distance Vector (AODV) Routing Protocol by Ashok Panwar
Ad-hoc Networks by Ashok Panwar
Secure Routing with AODV Protocol for MANET by Ashok Panwar
Ad-hoc networking with AODV
RoutingProtocols.ppt
Ad hoc network-performance_analysis and simulation
Lecture 11 14. Adhoc routing protocols cont..
AODV routing protocol
Simulation and Performance Analysis of AODV using NS 2.34 by Ashok Panwar
Introduction to mobile ad hoc network (m.a.net)
Routing protocol
MobileComputingMANET2023 MobileComputingMANET2023 .pptx
MobileComputingMANET2023 MobileComputingMANET2023.pptx
Classification of routing protocols
WirelessSensorNetworks_Network Layer_4-5.pptx
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Default and On demand routing - Advance Computer Networks
MobileAdHocRoutingProtocols.pptx
Routing in Mobile Ad hoc Networks
adhoc-and-sensor-networks-chapter-02.ppt [Autosaved].ppt
Ad

More from Ashok Panwar (6)

PPT
Secure Mail Application's by Ashok Panwar
PPTX
Quality of Information and Malware by Ashok Panwar
PPT
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
PPTX
Network Management by Ashok Panwar
PPTX
Introduction to Security Management by Ashok Panwar
PPT
Firewalls & Trusted Systems by Ashok Panwar
Secure Mail Application's by Ashok Panwar
Quality of Information and Malware by Ashok Panwar
Performance Analysis of AODV Protocol on Black-Hole Attack by Ashok Panwar
Network Management by Ashok Panwar
Introduction to Security Management by Ashok Panwar
Firewalls & Trusted Systems by Ashok Panwar

Recently uploaded (20)

PPT
tcp ip networks nd ip layering assotred slides
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
artificial intelligence overview of it and more
DOCX
Unit-3 cyber security network security of internet system
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Funds Management Learning Material for Beg
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
QR Codes Qr codecodecodecodecocodedecodecode
PDF
Sims 4 Historia para lo sims 4 para jugar
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
tcp ip networks nd ip layering assotred slides
The New Creative Director: How AI Tools for Social Media Content Creation Are...
The Internet -By the Numbers, Sri Lanka Edition
artificial intelligence overview of it and more
Unit-3 cyber security network security of internet system
Slides PPTX World Game (s) Eco Economic Epochs.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
SAP Ariba Sourcing PPT for learning material
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
Triggering QUIC, presented by Geoff Huston at IETF 123
Funds Management Learning Material for Beg
Slides PDF The World Game (s) Eco Economic Epochs.pdf
QR Codes Qr codecodecodecodecocodedecodecode
Sims 4 Historia para lo sims 4 para jugar
Design_with_Watersergyerge45hrbgre4top (1).ppt
Unit-1 introduction to cyber security discuss about how to secure a system
introduction about ICD -10 & ICD-11 ppt.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline

Routing Protocols in MANET's by Ashok Panwar

  • 1. Presented By:- Ashok Panwar Technical Officer in ECIL(NPCIL) Tarapur, Mumbai Routing Protocols in MANETs 1
  • 2. What is a MANET Mobile nodes, wireless links Infrastructure-less: by the nodes, … Multi-hop routing: …, and for the nodes Minimal administration: no hassles 2 Ashok Panwar Technical Officer in ECIL
  • 3. What’s unique about a MANET ? Moving nodes  ever changing topology Wireless links   various and volatile link quality Pervasive (cheap) devices  Power constraints Security  Confidentiality, other attacks 3 Ashok Panwar Technical Officer in ECIL
  • 4. Challenges in MANET Routing Need dynamic routing Frequent topological changes possible. Very different from dynamic routing in the Internet. Potential of network partitions. Routing overhead must be kept minimal Wireless  low bandwidth Mobile  low power Minimize # of routing control messages Minimize routing state at each node 4 Ashok Panwar Technical Officer in ECIL
  • 5. Other Challenges Auto configuration issues Address assignment Service discovery Security issues Ease of denial-of-service attack Misbehaving nodes difficult to identify Nodes can be easily compromised New Applications/services Location based: Distribute some information to all nodes in a geographic area (geocast). Content based: Query all sensors that sensed something particular in the past hour. 5 Ashok Panwar Technical Officer in ECIL
  • 6. MANET Protocol Zoo Topology based routing  Proactive approach, e.g., DSDV.  Reactive approach, e.g., DSR, AODV, TORA.  Hybrid approach, e.g., Cluster, ZRP.  Position based routing  Location Services: DREAM, Quorum-based, GLS, Home zone etc.  Forwarding Strategy: Greedy, GPSR, RDF, Hierarchical, etc. 6 Ashok Panwar Technical Officer in ECIL
  • 7. Routing Protocols Reactive (On-demand) protocols Discover routes when needed Source-initiated route discovery Proactive protocols Traditional distributed shortest-path protocols Based on periodic updates. High routing overhead Tradeoff State maintenance traffic vs. route discovery traffic Route via maintained route vs. delay for route discovery 7 Ashok Panwar Technical Officer in ECIL
  • 8. Reactive Routing Key Goal: Reduction in routing overhead Useful when number of traffic sessions is much lower than the number of nodes. No routing structure created a priori. Let the structure emerge in response to a need Two key methods for route discovery source routing backward learning (similar to intra-AS routing) Introduces delay 8 Ashok Panwar Technical Officer in ECIL
  • 9. Reactive (on-demand) routing: Routing only when needed 0 5 1 2 4 3 query(0) query(0) query(0) query(0) query(0) query(0) query(0) reply(0) reply(0) reply(0) Advantages:  eliminate periodic updates  adaptive to network dynamics Disadvantages:  high flood-search overhead with mobility, distributed traffic  high route acquisition latency 9 Ashok Panwar Technical Officer in ECIL
  • 10. Reactive Routing – Source initiated Source floods the network with a route request packet when a route is required to a destination Flood is propagated outwards from the source Pure flooding = every node transmits the request only once Destination replies to request Reply uses reversed path of route request sets up the forward path Two key protocols: DSR and AODV 10 Ashok Panwar Technical Officer in ECIL
  • 11. Dynamic Source Routing (DSR) Cooperative nodes Relatively small network diameter (5-10 hops) Detectable packet error Unidirectional or bidirectional link Promiscuous mode (optional) 11 Ashok Panwar Technical Officer in ECIL
  • 12. A B C E D G H F A A A-B A-C A-C-E A-C-E A-C-E A-B-D A-B-D-G A-B-D-G A-B-D-G Route Discovery A-B-C A-B-C Route Request (RREQ) Route Reply (RREP) Route Discovery is issued with exponential back-off intervals.Route Discovery is issued with exponential back-off intervals. Initiator ID Initiator seq# Target ID Partial route RREQ FORMATRREQ FORMAT 12 Ashok Panwar Technical Officer in ECIL
  • 13. Route Discovery: at source A A need to send to G Lookup Cache for route A to G Route found? Start Route Discovery Protocol Continue normal processing Route Discovery finished Packet in buffer? Send packet to next-hop done Buffer packet no Write route in packet header yes yes no wait 13 Ashok Panwar Technical Officer in ECIL
  • 14. Route Discovery: At an intermediate node Accept route request packet <src,id> in recently seen requests list? Discard route request yes no Host’s address already in patrial route Discard route request yes Store <src,id> in list Broadcast packet Send route reply packet done myAddr=t arget no Append myAddr to partial route no yes 14 Ashok Panwar Technical Officer in ECIL
  • 15. DSR - Route Discovery Route ReplyRoute Reply message containing path information is sent back to the source either by the destination, or intermediate nodes that have a route to the destination Reverse the order of the route record, and include it in Route Reply. Unicast, source routing Each node maintains a Route CacheRoute Cache which records routes it has learned and overheard over time 15 Ashok Panwar Technical Officer in ECIL
  • 16. Route Maintenance Route maintenance performed only while route is in use Error detection: Monitors the validity of existing routes by passively listening to data packets transmitted at neighboring nodes Lower level acknowledgements When problem detected, send Route ErrorRoute Error packet to original sender to perform new route discovery Host detects the error and the host it was attempting; Route ErrorRoute Error is sent back to the sender the packet – original srcis sent back to the sender the packet – original src 16 Ashok Panwar Technical Officer in ECIL
  • 17. A B C E D G H F G RERR RERR Route Cache (A) G: A, B, D, G G: A, C, E, H, G F: B, C, F Route Maintenance 17 Ashok Panwar Technical Officer in ECIL
  • 18. A Summary of DSRA Summary of DSR Entirely on-demand, potentially zero control message overhead Trivially loop-free with source routing Conceptually supports unidirectional links as well as bidirectional links High packet delays/jitters associated with on-demand routing Space overhead in packets and route caches Promiscuous mode operations consume excessive amount of power 18 Ashok Panwar Technical Officer in ECIL
  • 20. AODV Routing Protocol AODV = Ad Hoc On-demand Distance Vector Source floods route request in the network. Reverse paths are formed when a node hears a route request. Each node forwards the request only once (pure flooding). A S E F B C G D 20 Ashok Panwar Technical Officer in ECIL
  • 21. AODV Route Discovery Source floods route request in the network. Each node forwards the request only once (pure flooding). A S E F B C G D 21 Ashok Panwar Technical Officer in ECIL
  • 22. AODV Route Discovery Uses hop-by-hop routing. Each node forwards the request only once (pure flooding). Reverse paths are formed when a node hears a route request. A S E F B C G D 22 Ashok Panwar Technical Officer in ECIL
  • 23. AODV Route Discovery Route reply forwarded via the reverse path. A S E F B C G D 23 Ashok Panwar Technical Officer in ECIL
  • 24. AODV Route Discovery Route reply is forwarded via the reverse path … thus forming the forward path. The forward path is used to route data packets. A S E F B C G D 24 Ashok Panwar Technical Officer in ECIL
  • 25. Route Expiry Unused paths expire based on a timer. A S E F B C G D 25 Ashok Panwar Technical Officer in ECIL
  • 26. AODV – Optimization Useful optimization: An intermediate node with a route to D can reply to route request. Faster operation. Quenches route request flood. Above optimization can cause loops in presence of link failures 26 Ashok Panwar Technical Officer in ECIL
  • 27. AODV: Routing Loops Assume, link C-D fails, and node A does not know about it (route error packet from C is lost). C performs a route discovery for D. Node A receives the route request (via path C-E-A) Node A replies, since A knows a route to D via node B Results in a loop: C-E-A-B-C A B C D E 27 Ashok Panwar Technical Officer in ECIL
  • 28. AODV: Routing Loops A B C D E • Assume, the link C-D fails, and node A does not know about it (route error packet from C is lost). • C performs a route discovery for D. • Node A receives the route request (via path C-E-A) • Node A replies, since A knows a route to D via node B • Results in a loop: C-E-A-B-C 28 Ashok Panwar Technical Officer in ECIL
  • 29. AODV: Use Sequence Numbers Each node X maintains a sequence number acts as a time stamp incremented every time X sends any message) Each route to X (at any node Y) also has X’s sequence number associated with it, which is Y’s latest knowledge of X’s sequence number. Sequence number signifies ‘freshness’ of the route – higher the number, more up to date is the route. 29 Ashok Panwar Technical Officer in ECIL
  • 30. Use of Sequence Numbers in AODV Loop freedom: Intermediate node replies with a route (instead of forwarding request) only if it has a route with a higher associated sequence number. S Y D? Dest seq. no. = 10 Has a route to D with seq. no = 7 Seq. no. = 15 RREQ carries 10 Y does not reply, but forwards the RREQ 30 Ashok Panwar Technical Officer in ECIL
  • 31. Avoidance of Loop Link failure increments the DSN at C (now is 10). If C needs route to D, RREQ carries the DSN (10). A does not reply as its own DSN is less than 10. A B C D E 109 9 7 5 All DNS’s are for D DSN = Destination Sequence Number. 31 Ashok Panwar Technical Officer in ECIL
  • 32. Path Maintenance Movement not along active path triggers no action If source moves, reinitiate route discovery When destination or intermediate node moves  upstream node of break broadcasts Route Error (RERR)  RERR contains list of all destinations no longer reachable due to link break  RERR propagated until node with no precursors for destination is reached Source Destination 1 2 3 4 3’ Source Destination 1 2 4 3’ 32 Ashok Panwar Technical Officer in ECIL
  • 33. Summary: AODV At most one route per destination maintained at each node After link break, all routes using the failed link are erased. Expiration based on timeouts. Use of sequence numbers to prevent loops. Optimizations  Routing tables instead of storing full routes.  Control flooding (incrementally increase ‘region’) 33 Ashok Panwar Technical Officer in ECIL
  • 35. Proposed Routing Approaches Conventional wired-type schemes (global routing, proactive): Distance Vector; Link State Hierarchical (global routing) schemes: Fisheye, Hierarchical State Routing, Landmark Routing On- Demand, reactive routing: Source routing; backward learning Location Assisted routing (Geo-routing): DREAM, LAR etc 35 Ashok Panwar Technical Officer in ECIL
  • 36. Conventional wired routing limitations Distance Vector (eg, Bellman-Ford, DSDV): routing control O/H linearly increasing with net size convergence problems (count to infinity); potential loops Link State (eg, OSPF): link update flooding O/H caused by frequent topology changes CONVENTIONAL ROUTING DOES NOT SCALE TO SIZE AND MOBILITY 36 Ashok Panwar Technical Officer in ECIL
  • 37. Distance Vector 0 5 1 2 4 3 Destination Next Hop Distance 0 2 3 1 2 2 … … … Routing table at node 5 : Tables grow linearly with # nodes Control O/H grows with mobility and size 37 Ashok Panwar Technical Officer in ECIL
  • 38. Link State Routing  At node 5, based on the link state packets, topology table is constructed:  Dijkstra’s Algorithm can then be used for the shortest path 0 5 1 2 4 3 {1} {0,2,3} {1,4} {2,4} {2,3,5} {1,4,5} 0 1 2 3 4 5 0 1 1 0 0 0 0 1 1 1 1 1 0 0 2 0 1 1 0 1 1 3 0 1 0 1 1 0 4 0 0 1 1 1 1 5 0 0 1 0 1 1 38 Ashok Panwar Technical Officer in ECIL
  • 39. Existing On-Demand Protocols Dynamic Source Routing (DSR) Associativity - Based Routing (ABR) Ad-hoc On-demand Distance Vector (AODV) Temporarily Ordered Routing Algorithm (TORA) Zone Routing Protocol (ZRP) Signal Stability Based Adaptive Routing (SSA) On Demand Multicast Routing Protocol (ODMRP) … 39 Ashok Panwar Technical Officer in ECIL