SlideShare a Scribd company logo
MOBILE AD-HOC NETWORKS
(MANET)
 There may be several situations where users of a network cannot rely on an infrastructure, it is too
expensive, or there is none at all.
 In these situations mobile ad-hoc networks are the only choice.
 These networks should be mobile and use wireless communications.
Mobile ad-hoc networks
 Instant infrastructure
 Disaster relief
 Remote areas
 Effectiveness
Fig. MANETs and mobile IP
Routing
 At a certain time t1 the network topology might look as illustrated on the left side of the figure.
 Five nodes, N1 to N5, are connected depending on the current transmission characteristics between them.
 In this snapshot of the network, N4 can receive N1 over a good link, but N1 receives N4 only via a weak
link.
 Links do not necessarily have the same characteristics in both directions.
 The reasons for this are ,e.g., different antenna characteristics or transmit power.
 N1 cannot receive N2 at all, N2 receives a signal from N1.
Fig. ad-hoc network
Difference between wired networks and ad-hoc network
(a) Asymmetric links:
 Node A receives a signal from node B.
 But this does not tell us anything about the quality of the connection in reverse.
 However, many routing algorithms for wired networks rely on a symmetric scenario
(b) Redundant links:
 Wired networks, too, have redundant links to survive link failures.
 However, there is only some redundancy in wired networks, which, additionally, are controlled by a
network administrator.
 A high redundancy can cause a large computational overhead for routing table updates
(c) Interference
 Interference creates new problems by ‘unplanned’ links between nodes: if two close-by nodes forward
two transmissions, they might interfere and destroy each other.
(d) Dynamic topology:
 The greatest problem for routing arises from the highly dynamic topology.
 This results in frequent changes in topology, so snapshots are valid only for a very short period of time.
 Routing table updates in fixed networks, for example, take place every 30 seconds.
 This updating frequency might be too low to be useful for ad-hoc networks.
 Ad-hoc networks using mobile nodes face additional problems due to hardware limitations.
 Using the standard routing protocols with periodic updates wastes battery power without sending any
user data and disables sleep modes.
 Periodic updates waste bandwidth and these resources are already scarce for wireless links.
An additional problem is interference between two or more transmissions that do not use the same nodes
for forwarding.
If, for example, a second transmission from node N4 to N5 takes place at the same time as the
transmission from N1 to N3, they could interfere.
Additional difficulties in comparison to wired networks
 Traditional routing algorithms known from wired networks will not work efficiently
 Centralized approaches will not really work, because it takes too long to collect the current status and
disseminate it again.
 Many nodes need routing capabilities. While there might be some without, at least one router has to
be within the range of each node.
 Algorithms have to consider the limited battery power of these nodes.
 Nodes have to make local decisions for forwarding and send packets roughly toward the final
destination.
 A last alternative to forward a packet across an unknown topology is flooding.
The maximum number of hops, should be known.
Destination sequence distance vector
 Destination sequence distance vector (DSDV) routing is an enhancement to distance vector routing
for ad-hoc networks.
 Distance vector routing is used as routing information protocol (RIP) in wired networks.
 It performs extremely poorly with certain network changes due to the count-to-infinity problem.
 The strategies used in fixed networks do not help in the case of wireless ad-hoc networks, due to the
rapidly changing topology.
DSDV now adds two things to the distance vector algorithm:
 Sequence numbers:
 Each routing advertisement comes with a sequence number.
 Within ad-hoc networks, advertisements may propagate along many paths.
 Sequence numbers help to apply the advertisements in correct order.
 Damping:
 Transient changes in topology that are of short duration should not destabilize the routing mechanisms.
 A node waits with dissemination if these changes are probably unstable.
 Waiting time depends on the time between the first and the best announcement of a path to a certain
destination.
Dynamic source routing
 In an ad-hoc network where nodes exchange packets from time to time.
 These algorithms maintain routes between all nodes, although there may currently be no data exchange
at all.
 This causes unnecessary traffic and prevents nodes from saving battery power.
Dynamic source routing (DSR), therefore, divides the task of routing into two separate problems
 Route discovery:
A node only tries to discover a route to a destination if it has to send something to this destination and there
is currently no known route.
 Route maintenance:
If a node is continuously sending packets via a route, it has to make sure that the route is held upright.
As soon as a node detects problems with the current route, it has to find an alternative.
 Dynamic source routing eliminates all periodic routing updates and works as follows.
 If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination
address as parameters.
 Any node that receives a route request does the following.
Case 1 : If the node has already received the request (which is identified using the unique identifier), it
drops the request packet.
Case 2 : If the node recognizes its own address as the destination, the request has reached its target.
Case 3 : Otherwise, the node appends its own address to a list of traversed hops in the packet and
broadcasts this updated route request.
 Using this approach, the route request collects a list of addresses representing a possible path on its way
towards the destination.
 As soon as the request reaches the destination, it can return the request packet containing the list to
 the receiver using this list in reverse order.
 One condition for this is that the links work bi-directionally.
 If this is not the case, and the destination node does not currently maintain a route back to the initiator
of the request, it has to start a route discovery by itself.
Applying route discovery to the example in for a route from N1 to N3 at time t1 results in the following
 N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive this request.
 N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4), id = 42, target = N3).
N3 and N5 receive N2’s broadcast, N1, N2, and N5 receive N4’s broadcast.
 N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target = N3).
N3 and N4 receive N5’s broadcast.
N1, N2, and N5 drop N4’s broadcast packet, because they all recognize an already received route
request (and N2’s broadcast reached N5 before N4’s did).
 N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but longer route.
 N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming symmetric links working in
both directions. N3 can forward the information using the list in reverse order.
 If links are not bi-directional, the scenario gets more complicated.
 The algorithm has to be applied again, in the reverse direction if the target does not maintain a current path
to the source of the route request.
 N3 has to broadcast a route request ((N3), id = 17, target = N1).
 Only N5 receives this request.
 N5 now broadcasts ((N3, N5), id = 17, target = N1), N3 and N4 receive the broadcast.
 N3 drops the request because it recognizes an already known id. N4 broadcasts ((N3, N5, N4), id = 17,
target = N1), N5, N2, and N1 receive the broadcast.
 N5 drops the request packet, N1 recognizes itself as target, and N2 broadcasts ((N3, N5, N4, N2), id = 17,
target = N1).
 N3 and N5 receive N2’s broadcast.
 N3 and N5 drop the request packet.
The basic algorithm for route discovery can be optimized in many ways.
 To avoid too many broadcasts, each route request could contain a counter.
 Every node rebroadcasting the request increments the counter by one.
 Knowing the maximum network diameter (take the number of nodes if nothing else is known),
nodes can drop a request if the counter reaches this number.
Drawback:
Although dynamic source routing offers benefits compared to other algorithms by being much more
bandwidth efficient, problems arise if the topology is highly dynamic and links are asymmetrical.

More Related Content

PPS
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
PDF
[IJCT-V3I2P22] Authors: Shraddha Dabhade, Shilpa Verma
PDF
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
PDF
G0544650
PPT
Chapter 8
PDF
New strategy to optimize the performance of spray and wait routing protocol
PDF
Distributed Spatial Modulation based Cooperative Diversity Scheme
PDF
Destination Aware APU Strategy for Geographic Routing in MANET
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
[IJCT-V3I2P22] Authors: Shraddha Dabhade, Shilpa Verma
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
G0544650
Chapter 8
New strategy to optimize the performance of spray and wait routing protocol
Distributed Spatial Modulation based Cooperative Diversity Scheme
Destination Aware APU Strategy for Geographic Routing in MANET

What's hot (20)

PDF
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
PDF
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
PPTX
Unit 3 - Data Link Layer - Part B
PDF
NS2 Projects 2014 in HCL velachery
PDF
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
PDF
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
PDF
Physical layer network coding
PDF
Wireless sensor networks routing protocols
PDF
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
PDF
Automatic cluster formation and assigning address for wireless sensor net
PPTX
Cluster based routing protocol
PPTX
Energy efficient communication techniques for wireless micro sensor networks
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
PDF
D04622933
PDF
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
PDF
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
PDF
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
PDF
Opportunistic Data Forwarding in Manet
PDF
Performance Comparison and Analysis of Preemptive-DSR and TORA
PDF
An Enhanced DSR Protocol for Improving QoS in MANET
A_Fair_Multiple-Slot_Assignment_Protocol_for_Sched
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Unit 3 - Data Link Layer - Part B
NS2 Projects 2014 in HCL velachery
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Physical layer network coding
Wireless sensor networks routing protocols
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
Automatic cluster formation and assigning address for wireless sensor net
Cluster based routing protocol
Energy efficient communication techniques for wireless micro sensor networks
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
D04622933
Flbra fuzzy logic based routing algorithm for indoor wireless sensor networks
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Performance Analysis and Development of an Efficient Routing Scheme for IEEE ...
Opportunistic Data Forwarding in Manet
Performance Comparison and Analysis of Preemptive-DSR and TORA
An Enhanced DSR Protocol for Improving QoS in MANET
Ad

Similar to UNIT 2 WIRELESS NETWORKS - MANET and DSDV (20)

PPTX
Introduction to mobile ad hoc network (m.a.net)
PDF
Improved aodv based on energy strength and dropping ratio
PDF
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
PDF
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
PDF
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
PDF
A Survey of Using Directional Antennas in Ad Hoc Networks
PDF
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
PDF
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
PPT
Unit VIII wireless sensor networks
PDF
CS6003 AD HOC AND SENSOR NETWORKS
PDF
Hu3114871491
PDF
ex11-routing-performance.pdf
PPT
Wireless routing protocols
PDF
IT6601 MOBILE COMPUTING
PPTX
Routing protocol
PPT
Mobile Ad hoc network
PDF
Unit8 tgb
PDF
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PDF
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
Introduction to mobile ad hoc network (m.a.net)
Improved aodv based on energy strength and dropping ratio
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
A Survey of Using Directional Antennas in Ad Hoc Networks
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
Unit VIII wireless sensor networks
CS6003 AD HOC AND SENSOR NETWORKS
Hu3114871491
ex11-routing-performance.pdf
Wireless routing protocols
IT6601 MOBILE COMPUTING
Routing protocol
Mobile Ad hoc network
Unit8 tgb
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...
Ad

More from HemalathaR31 (18)

PPTX
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
PPTX
EC8004 WIRELESS NETWORKS UNIT 5 - LTE
PPTX
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
PPTX
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
PPTX
EC8004 WIRELESS NETWORK UNIT 5 - 4G
PPTX
EC8002 Unit 4 Interworking objectives and requirements
PPTX
EC8004 WIRELESS NETWORKS UNIT 3 CORE NETWORK
PPTX
EC8004 wireless networks unit 3 UTRAN
PPTX
EC8004 wireless networks unit 1
PPTX
Ec8004 wireless networks unit 1 bluetooth
PPTX
Ec8004 wireless networks unit 1 hiperlan 2
PPTX
Ec8004 wireless networks unit 1 hiperlan1
PPTX
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
PPTX
Ec8004 wireless networks unit 1 watm
PPTX
Ec8004 wireless networks unit 2 agent discovery
PPTX
Ec8004 wireless networks unit 2 mobile ip
PPTX
EC8004 wireless networks unit 1 IEEE802.11
PPTX
Ec8004 wireless networks unit 1 introduction
EC8004 WIRELESS NETWORKS UNIT 5 - IMS
EC8004 WIRELESS NETWORKS UNIT 5 - LTE
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORKS UNIT 5 - 4G TECHNOLOGIES
EC8004 WIRELESS NETWORK UNIT 5 - 4G
EC8002 Unit 4 Interworking objectives and requirements
EC8004 WIRELESS NETWORKS UNIT 3 CORE NETWORK
EC8004 wireless networks unit 3 UTRAN
EC8004 wireless networks unit 1
Ec8004 wireless networks unit 1 bluetooth
Ec8004 wireless networks unit 1 hiperlan 2
Ec8004 wireless networks unit 1 hiperlan1
Ec8004 wireless networks unit 1 ieee 802.11a and ieee 802.11b
Ec8004 wireless networks unit 1 watm
Ec8004 wireless networks unit 2 agent discovery
Ec8004 wireless networks unit 2 mobile ip
EC8004 wireless networks unit 1 IEEE802.11
Ec8004 wireless networks unit 1 introduction

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Lesson notes of climatology university.
PDF
Classroom Observation Tools for Teachers
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Complications of Minimal Access Surgery at WLH
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharma ospi slides which help in ospi learning
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Cell Structure & Organelles in detailed.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
RMMM.pdf make it easy to upload and study
Final Presentation General Medicine 03-08-2024.pptx
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Lesson notes of climatology university.
Classroom Observation Tools for Teachers
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Complications of Minimal Access Surgery at WLH
01-Introduction-to-Information-Management.pdf
Pharma ospi slides which help in ospi learning
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Module 4: Burden of Disease Tutorial Slides S2 2025
Cell Structure & Organelles in detailed.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

UNIT 2 WIRELESS NETWORKS - MANET and DSDV

  • 2.  There may be several situations where users of a network cannot rely on an infrastructure, it is too expensive, or there is none at all.  In these situations mobile ad-hoc networks are the only choice.  These networks should be mobile and use wireless communications. Mobile ad-hoc networks  Instant infrastructure  Disaster relief  Remote areas  Effectiveness Fig. MANETs and mobile IP
  • 3. Routing  At a certain time t1 the network topology might look as illustrated on the left side of the figure.  Five nodes, N1 to N5, are connected depending on the current transmission characteristics between them.  In this snapshot of the network, N4 can receive N1 over a good link, but N1 receives N4 only via a weak link.  Links do not necessarily have the same characteristics in both directions.  The reasons for this are ,e.g., different antenna characteristics or transmit power.  N1 cannot receive N2 at all, N2 receives a signal from N1. Fig. ad-hoc network
  • 4. Difference between wired networks and ad-hoc network (a) Asymmetric links:  Node A receives a signal from node B.  But this does not tell us anything about the quality of the connection in reverse.  However, many routing algorithms for wired networks rely on a symmetric scenario (b) Redundant links:  Wired networks, too, have redundant links to survive link failures.  However, there is only some redundancy in wired networks, which, additionally, are controlled by a network administrator.  A high redundancy can cause a large computational overhead for routing table updates (c) Interference  Interference creates new problems by ‘unplanned’ links between nodes: if two close-by nodes forward two transmissions, they might interfere and destroy each other.
  • 5. (d) Dynamic topology:  The greatest problem for routing arises from the highly dynamic topology.  This results in frequent changes in topology, so snapshots are valid only for a very short period of time.  Routing table updates in fixed networks, for example, take place every 30 seconds.  This updating frequency might be too low to be useful for ad-hoc networks.  Ad-hoc networks using mobile nodes face additional problems due to hardware limitations.  Using the standard routing protocols with periodic updates wastes battery power without sending any user data and disables sleep modes.  Periodic updates waste bandwidth and these resources are already scarce for wireless links. An additional problem is interference between two or more transmissions that do not use the same nodes for forwarding. If, for example, a second transmission from node N4 to N5 takes place at the same time as the transmission from N1 to N3, they could interfere.
  • 6. Additional difficulties in comparison to wired networks  Traditional routing algorithms known from wired networks will not work efficiently  Centralized approaches will not really work, because it takes too long to collect the current status and disseminate it again.  Many nodes need routing capabilities. While there might be some without, at least one router has to be within the range of each node.  Algorithms have to consider the limited battery power of these nodes.  Nodes have to make local decisions for forwarding and send packets roughly toward the final destination.  A last alternative to forward a packet across an unknown topology is flooding. The maximum number of hops, should be known.
  • 7. Destination sequence distance vector  Destination sequence distance vector (DSDV) routing is an enhancement to distance vector routing for ad-hoc networks.  Distance vector routing is used as routing information protocol (RIP) in wired networks.  It performs extremely poorly with certain network changes due to the count-to-infinity problem.  The strategies used in fixed networks do not help in the case of wireless ad-hoc networks, due to the rapidly changing topology. DSDV now adds two things to the distance vector algorithm:  Sequence numbers:  Each routing advertisement comes with a sequence number.  Within ad-hoc networks, advertisements may propagate along many paths.  Sequence numbers help to apply the advertisements in correct order.
  • 8.  Damping:  Transient changes in topology that are of short duration should not destabilize the routing mechanisms.  A node waits with dissemination if these changes are probably unstable.  Waiting time depends on the time between the first and the best announcement of a path to a certain destination. Dynamic source routing  In an ad-hoc network where nodes exchange packets from time to time.  These algorithms maintain routes between all nodes, although there may currently be no data exchange at all.  This causes unnecessary traffic and prevents nodes from saving battery power. Dynamic source routing (DSR), therefore, divides the task of routing into two separate problems
  • 9.  Route discovery: A node only tries to discover a route to a destination if it has to send something to this destination and there is currently no known route.  Route maintenance: If a node is continuously sending packets via a route, it has to make sure that the route is held upright. As soon as a node detects problems with the current route, it has to find an alternative.  Dynamic source routing eliminates all periodic routing updates and works as follows.  If a node needs to discover a route, it broadcasts a route request with a unique identifier and the destination address as parameters.  Any node that receives a route request does the following.
  • 10. Case 1 : If the node has already received the request (which is identified using the unique identifier), it drops the request packet. Case 2 : If the node recognizes its own address as the destination, the request has reached its target. Case 3 : Otherwise, the node appends its own address to a list of traversed hops in the packet and broadcasts this updated route request.  Using this approach, the route request collects a list of addresses representing a possible path on its way towards the destination.  As soon as the request reaches the destination, it can return the request packet containing the list to  the receiver using this list in reverse order.  One condition for this is that the links work bi-directionally.  If this is not the case, and the destination node does not currently maintain a route back to the initiator of the request, it has to start a route discovery by itself.
  • 11. Applying route discovery to the example in for a route from N1 to N3 at time t1 results in the following  N1 broadcasts the request ((N1), id = 42, target = N3), N2 and N4 receive this request.  N2 then broadcasts ((N1, N2), id = 42, target = N3), N4 broadcasts ((N1, N4), id = 42, target = N3). N3 and N5 receive N2’s broadcast, N1, N2, and N5 receive N4’s broadcast.  N3 recognizes itself as target, N5 broadcasts ((N1, N2, N5), id = 42, target = N3). N3 and N4 receive N5’s broadcast. N1, N2, and N5 drop N4’s broadcast packet, because they all recognize an already received route request (and N2’s broadcast reached N5 before N4’s did).  N4 drops N5’s broadcast, N3 recognizes (N1, N2, N5) as an alternate, but longer route.  N3 now has to return the path (N1, N2, N3) to N1. This is simple assuming symmetric links working in both directions. N3 can forward the information using the list in reverse order.
  • 12.  If links are not bi-directional, the scenario gets more complicated.  The algorithm has to be applied again, in the reverse direction if the target does not maintain a current path to the source of the route request.  N3 has to broadcast a route request ((N3), id = 17, target = N1).  Only N5 receives this request.  N5 now broadcasts ((N3, N5), id = 17, target = N1), N3 and N4 receive the broadcast.  N3 drops the request because it recognizes an already known id. N4 broadcasts ((N3, N5, N4), id = 17, target = N1), N5, N2, and N1 receive the broadcast.  N5 drops the request packet, N1 recognizes itself as target, and N2 broadcasts ((N3, N5, N4, N2), id = 17, target = N1).  N3 and N5 receive N2’s broadcast.  N3 and N5 drop the request packet.
  • 13. The basic algorithm for route discovery can be optimized in many ways.  To avoid too many broadcasts, each route request could contain a counter.  Every node rebroadcasting the request increments the counter by one.  Knowing the maximum network diameter (take the number of nodes if nothing else is known), nodes can drop a request if the counter reaches this number. Drawback: Although dynamic source routing offers benefits compared to other algorithms by being much more bandwidth efficient, problems arise if the topology is highly dynamic and links are asymmetrical.