SlideShare a Scribd company logo
© Tetcos 2014
Mobile Adhoc Networks
NetSim v9NetSim v9
Network Simulation/Emulation
Platform
© Tetcos 2014
Outline
Introduction
Reactive Routing Protocol
DSR
AODV
Advantages and Disadvantages
Summary
www.tetcos.com
© Tetcos 2014
Wireless Network
Wireless LAN
Infrared or radio links
very flexible within the reception area
low bandwidth compared to wired networks.
Adhoc Networks
useful when infrastructure not available, impractical or expensive
military applications, rescue, home networking
www.tetcos.com
© Tetcos 2014
Infrastructure-based Network
AP
Wired Backbone
www.tetcos.com
© Tetcos 2014
STA
STA
STA
STA
Ad-hoc Network
peer-peer connections
www.tetcos.com
© Tetcos 2014
Mobile Adhoc Networks
Frequent Host movement
Frequent Topology change
No infrastructure
Data must be routed via intermediate nodes
A
B
D
C A
D
B
C
www.tetcos.com
© Tetcos 2014
Why Adhoc Network ?
Setting up of fixed Access point and backbone
infrastructure is not always viable
Infrastructure may not be present in the disaster
area or war zone
Infrastructure may not be practical for short range
radios
Adhoc Networks
Do not need backbone infrastructure support
Are easy to deploy
Useful when infrastructure is absent, destroyed or
impractical
www.tetcos.com
© Tetcos 2014
Many Applications
 Personal area networking
 Cell phone, laptop, ear phone, wrist watch
 Military environments
 Soldiers, tanks, planes
 Civilian environments
 Taxi cab networks
 Meeting rooms
 Sports stadiums
 Boats, small aircraft
 Emergency operations
 Search and rescue
 Policing and fire fighting
© Tetcos 2014
MANET protocol stack
Application layer
Transport layer
UDP
Network layer
DSR/AODV
Data Link layer
802.11 b MAC
Physical layer
802.11 b PHY
© Tetcos 2014
Routing in MANET
www.tetcos.com
© Tetcos 2014
Routing Protocols
Proactive protocols
Traditional distributed shortest-path protocols
Maintain routes between every host pair at all times
Based on periodic updates; High routing overhead
Example: DSDV (destination sequenced distance vector)
Reactive protocols
Determine route if and when needed
Source initiates route discovery
Example: DSR (dynamic source routing)
Hybrid protocols
Adaptive; Combination of proactive and reactive
Example : ZRP (zone routing protocol)
www.tetcos.com
© Tetcos 2014
Protocol Trade-offs
Proactive protocols
Always maintain routes
Little or no delay for route determination
Consume bandwidth to keep routes up-to-date
Maintain routes which may never be used
Reactive protocols
Lower overhead since routes are determined on demand
Significant delay in route determination
Employ flooding (global search)
Control traffic may be bursty
Which approach achieves a better trade-off depends on the traffic
and mobility patterns
www.tetcos.com
© Tetcos 2014
Reactive Routing Protocols
www.tetcos.com
© Tetcos 2014
Two basic mechanisms
Route Discovery
•Route Request (RREQ)
•Route Reply (RREP)
Route Maintenance
•Route Error (RERR)
•Acknowledgement.
Dynamic source Routing protocol
(DSR)
www.tetcos.com
© Tetcos 2014
DSR
Basic Processes
Route Discovery
Route message creation (RREQ, RREP)
Route message processing at each node
Check route table for destination address route entry
Reverse route entry for originator and precursors
Route Discovery- Node Actions
© Tetcos 2014
DSR
When node A wants to send a packet to node G,
but does not know a route to G, node A initiates
a route discovery
Source node A floods Route Request (RREQ)
Each node appends own identifier when
forwarding RREQ
www.tetcos.com
© Tetcos 2014
Route Discovery in DSR
A
B
C
E
D
G
H
F
A
A
A-B
A-C
A-C-E
A-C-E
A-C-E
A-B-D
A has
Data
Destinatio
n
www.tetcos.com
© Tetcos 2014
Route Discovery in DSR
Destination G on receiving the first RREQ,
sends a Route Reply (RREP)
RREP is sent on a route obtained by reversing
the route appended to received RREQ
RREP includes the route from A to G on which
RREQ was received by node G
www.tetcos.com
© Tetcos 2014
Route Discovery in DSR
A
B
C
E
D
G
H
F
A
A
A-B
A-C
A-C-E
A-C-E
A-C-E
A-B-D
A-B-D-G
A-B-D-G
A-B-D-G
Route
reply
www.tetcos.com
© Tetcos 2014
DSR
Node A on receiving RREP, caches the route
included in the RREP
When node A sends a data packet to G, the
entire route is included in the packet header
hence the name source routing
Intermediate nodes use the source route
included in a packet to determine to whom a
packet should be forwarded
www.tetcos.com
© Tetcos 2014
Route Maintenance in DSR
A
B
C
E
D
G
H
F
G
RERR
RERR
Route Cache (A)
G: A, B, D, G
G: A, C, E, H, G
F: B, C,E, F
Route Cache (A)
G: A, C, E, H, G
F: A, C,E, F
www.tetcos.com
© Tetcos 2014
Advantages
Routes are discovered only they are needed
Reduces overhead of route maintenance
Route caching reduce the cost of route discovery
A single route discovery may yield many routes to the
destination due to intermediate nodes may reply route request
from local caches.
Disadvantages
Packet header size grows with route length due to source
routing inefficiency
Route request packet may reach all nodes in the network.
REQ flooding
Increased contention if too many route replies come back
Route Reply Storm
DSR: Advantages/ Disadvantages
www.tetcos.com
© Tetcos 2014
Summary
In this lecture we discussed the Dynamic Source
Routing Protocol (DSR)
❍ Route Discovery
• Source Routing (Accumulation of routes in the packet header)
• Role of route cache in speeding up the route discovery and
reducing the propagation of RREQs/RREPs
❍ Route Maintenance
• Route cache and the role it plays in route maintenance
www.tetcos.com
© Tetcos 2014
Thank You
www.tetcos.com

More Related Content

What's hot (20)

PDF
Wireless Broadband Networks
T Deepa
 
PPTX
Multiplexing
Noreen Aamir
 
PPTX
Dynamic interconnection networks
Prasenjit Dey
 
PPTX
Routing Protocols in WSN
Darpan Dekivadiya
 
PPTX
ASYNCHRONOUS TRANSFER MODE (ATM)
ZillayHuma Mehmood
 
PPTX
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
 
PPTX
4G wireless Network
Masuma Akhatar
 
PPTX
Wireless Sensor Networks
Johnsaida Noorbasha
 
PPTX
Gprs architecture
DeekshithaReddy23
 
PPT
Umts system architecture
Midhun S
 
PPT
Hebbian Learning
ESCOM
 
PPTX
WIRELESS ATM BY SAIKIRAN PANJALA
Saikiran Panjala
 
PPTX
Multidimensional schema of data warehouse
kunjan shah
 
PPTX
neural network
STUDENT
 
PPTX
Ultra wideband technology (UWB)
Mustafa Khaleel
 
PDF
Network function virtualization
Satish Chavan
 
PPTX
Energy consumption of wsn
DeepaDasarathan
 
PDF
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
PPTX
Wireless Sensor Networks
Karthik
 
Wireless Broadband Networks
T Deepa
 
Multiplexing
Noreen Aamir
 
Dynamic interconnection networks
Prasenjit Dey
 
Routing Protocols in WSN
Darpan Dekivadiya
 
ASYNCHRONOUS TRANSFER MODE (ATM)
ZillayHuma Mehmood
 
Introduction to Mobile Ad hoc Networks
Sayed Chhattan Shah
 
4G wireless Network
Masuma Akhatar
 
Wireless Sensor Networks
Johnsaida Noorbasha
 
Gprs architecture
DeekshithaReddy23
 
Umts system architecture
Midhun S
 
Hebbian Learning
ESCOM
 
WIRELESS ATM BY SAIKIRAN PANJALA
Saikiran Panjala
 
Multidimensional schema of data warehouse
kunjan shah
 
neural network
STUDENT
 
Ultra wideband technology (UWB)
Mustafa Khaleel
 
Network function virtualization
Satish Chavan
 
Energy consumption of wsn
DeepaDasarathan
 
IEEE 802.11 and Bluetooth
Hitesh Mohapatra
 
Wireless Sensor Networks
Karthik
 

Viewers also liked (20)

PPTX
Dynamic source routing
Ashraf Uddin
 
PDF
Adhoc routing protocols
Pradeep Kumar TS
 
PDF
AODV protocol
Shanka Mahakumbura
 
PPTX
AODV Protocol
Darshan Rathi
 
PDF
Lecture 5 6 .ad hoc network
Chandra Meena
 
PPTX
Ad-Hoc Networks
Mshari Alabdulkarim
 
PPSX
Adhoc and routing protocols
shashi712
 
PPTX
Aravindsikharam
sikharam99
 
PPT
Philadelphia City
Mahmood AL-Abri
 
PPTX
Show29
spiritled
 
PPT
Philly
RAISSA RO
 
PPT
A Re-interpretation of Pennsylvanian "Filled-sinks" in Missouri
William W. Little
 
PPTX
Filterbased addressing protocol for effective node auto configuration in ad h...
varun priyan
 
PPT
Sinkhole presentation
Brandon Trate
 
PPS
Underground City of Derinkuyu
James Furlo
 
PPT
Study and analysis vurnerability of aodv protocol
Mehedi
 
PDF
issues in desigining routing protocols
Pradeep Kumar TS
 
PPT
Performance Evaluation of Routing Protocols
Ankush Mehta
 
PPT
Performance analysis of aodv protocol on blackhole attack
Mehedi
 
PDF
Issues in routing protocol
Pradeep Kumar TS
 
Dynamic source routing
Ashraf Uddin
 
Adhoc routing protocols
Pradeep Kumar TS
 
AODV protocol
Shanka Mahakumbura
 
AODV Protocol
Darshan Rathi
 
Lecture 5 6 .ad hoc network
Chandra Meena
 
Ad-Hoc Networks
Mshari Alabdulkarim
 
Adhoc and routing protocols
shashi712
 
Aravindsikharam
sikharam99
 
Philadelphia City
Mahmood AL-Abri
 
Show29
spiritled
 
Philly
RAISSA RO
 
A Re-interpretation of Pennsylvanian "Filled-sinks" in Missouri
William W. Little
 
Filterbased addressing protocol for effective node auto configuration in ad h...
varun priyan
 
Sinkhole presentation
Brandon Trate
 
Underground City of Derinkuyu
James Furlo
 
Study and analysis vurnerability of aodv protocol
Mehedi
 
issues in desigining routing protocols
Pradeep Kumar TS
 
Performance Evaluation of Routing Protocols
Ankush Mehta
 
Performance analysis of aodv protocol on blackhole attack
Mehedi
 
Issues in routing protocol
Pradeep Kumar TS
 
Ad

Similar to Dynamic Source Routing Sink hole attack (20)

PDF
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
PPT
Manet By Vikas mainanwal
VIKASH MAINANWAL
 
PPTX
a-seminar-on-manet.pptx
Sujit833143
 
PDF
Hd3312521256
IJERA Editor
 
PPT
RoutingProtocols.ppt
ImXaib
 
PPTX
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
PPTX
Routing protocols in mobile ad hoc
Meenal Naranje
 
PPT
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
PPT
introAdhocRoutingRoutingRoutingRouting-new.ppt
DEEPAK948083
 
PDF
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
PDF
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
PDF
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
PPTX
Adhoc routing protocols
DharunMagil
 
PPT
Routing ad hoc network
Prof. Dr. Noman Islam
 
PPTX
W09-L01.pptx
HirazNor
 
PDF
En33838844
IJERA Editor
 
PDF
En33838844
IJERA Editor
 
PDF
Fo35991995
IJERA Editor
 
PPT
adhoc-and-sensor-networks-chapter-02.ppt [Autosaved].ppt
pratimadepa
 
PPTX
MobileAdHocRoutingProtocols.pptx
HirazNor
 
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Manet By Vikas mainanwal
VIKASH MAINANWAL
 
a-seminar-on-manet.pptx
Sujit833143
 
Hd3312521256
IJERA Editor
 
RoutingProtocols.ppt
ImXaib
 
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
Routing protocols in mobile ad hoc
Meenal Naranje
 
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
DEEPAK948083
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
ijasuc
 
Adhoc routing protocols
DharunMagil
 
Routing ad hoc network
Prof. Dr. Noman Islam
 
W09-L01.pptx
HirazNor
 
En33838844
IJERA Editor
 
En33838844
IJERA Editor
 
Fo35991995
IJERA Editor
 
adhoc-and-sensor-networks-chapter-02.ppt [Autosaved].ppt
pratimadepa
 
MobileAdHocRoutingProtocols.pptx
HirazNor
 
Ad

More from Dr Praveen Jain (8)

PDF
NetSim User Manual
Dr Praveen Jain
 
PDF
NetSim Experiment Manual
Dr Praveen Jain
 
PDF
Anna University Netsim Experiment Manual
Dr Praveen Jain
 
PDF
Maharastra CCN NetSim Experiment Manual
Dr Praveen Jain
 
PDF
Maharastra EXTC NetSim Experiment Manual
Dr Praveen Jain
 
PPTX
Wireless Sensor network
Dr Praveen Jain
 
PPT
Wireless Sensor Network
Dr Praveen Jain
 
PPT
Cognitive Radio Network
Dr Praveen Jain
 
NetSim User Manual
Dr Praveen Jain
 
NetSim Experiment Manual
Dr Praveen Jain
 
Anna University Netsim Experiment Manual
Dr Praveen Jain
 
Maharastra CCN NetSim Experiment Manual
Dr Praveen Jain
 
Maharastra EXTC NetSim Experiment Manual
Dr Praveen Jain
 
Wireless Sensor network
Dr Praveen Jain
 
Wireless Sensor Network
Dr Praveen Jain
 
Cognitive Radio Network
Dr Praveen Jain
 

Recently uploaded (20)

PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
PDF
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
PDF
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
PDF
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
July Patch Tuesday
Ivanti
 
Empowering Cloud Providers with Apache CloudStack and Stackbill
ShapeBlue
 
NewMind AI Journal - Weekly Chronicles - July'25 Week II
NewMind AI
 
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Wojciech Ciemski for Top Cyber News MAGAZINE. June 2025
Dr. Ludmila Morozova-Buss
 
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 

Dynamic Source Routing Sink hole attack

  • 1. © Tetcos 2014 Mobile Adhoc Networks NetSim v9NetSim v9 Network Simulation/Emulation Platform
  • 2. © Tetcos 2014 Outline Introduction Reactive Routing Protocol DSR AODV Advantages and Disadvantages Summary www.tetcos.com
  • 3. © Tetcos 2014 Wireless Network Wireless LAN Infrared or radio links very flexible within the reception area low bandwidth compared to wired networks. Adhoc Networks useful when infrastructure not available, impractical or expensive military applications, rescue, home networking www.tetcos.com
  • 4. © Tetcos 2014 Infrastructure-based Network AP Wired Backbone www.tetcos.com
  • 5. © Tetcos 2014 STA STA STA STA Ad-hoc Network peer-peer connections www.tetcos.com
  • 6. © Tetcos 2014 Mobile Adhoc Networks Frequent Host movement Frequent Topology change No infrastructure Data must be routed via intermediate nodes A B D C A D B C www.tetcos.com
  • 7. © Tetcos 2014 Why Adhoc Network ? Setting up of fixed Access point and backbone infrastructure is not always viable Infrastructure may not be present in the disaster area or war zone Infrastructure may not be practical for short range radios Adhoc Networks Do not need backbone infrastructure support Are easy to deploy Useful when infrastructure is absent, destroyed or impractical www.tetcos.com
  • 8. © Tetcos 2014 Many Applications  Personal area networking  Cell phone, laptop, ear phone, wrist watch  Military environments  Soldiers, tanks, planes  Civilian environments  Taxi cab networks  Meeting rooms  Sports stadiums  Boats, small aircraft  Emergency operations  Search and rescue  Policing and fire fighting
  • 9. © Tetcos 2014 MANET protocol stack Application layer Transport layer UDP Network layer DSR/AODV Data Link layer 802.11 b MAC Physical layer 802.11 b PHY
  • 10. © Tetcos 2014 Routing in MANET www.tetcos.com
  • 11. © Tetcos 2014 Routing Protocols Proactive protocols Traditional distributed shortest-path protocols Maintain routes between every host pair at all times Based on periodic updates; High routing overhead Example: DSDV (destination sequenced distance vector) Reactive protocols Determine route if and when needed Source initiates route discovery Example: DSR (dynamic source routing) Hybrid protocols Adaptive; Combination of proactive and reactive Example : ZRP (zone routing protocol) www.tetcos.com
  • 12. © Tetcos 2014 Protocol Trade-offs Proactive protocols Always maintain routes Little or no delay for route determination Consume bandwidth to keep routes up-to-date Maintain routes which may never be used Reactive protocols Lower overhead since routes are determined on demand Significant delay in route determination Employ flooding (global search) Control traffic may be bursty Which approach achieves a better trade-off depends on the traffic and mobility patterns www.tetcos.com
  • 13. © Tetcos 2014 Reactive Routing Protocols www.tetcos.com
  • 14. © Tetcos 2014 Two basic mechanisms Route Discovery •Route Request (RREQ) •Route Reply (RREP) Route Maintenance •Route Error (RERR) •Acknowledgement. Dynamic source Routing protocol (DSR) www.tetcos.com
  • 15. © Tetcos 2014 DSR Basic Processes Route Discovery Route message creation (RREQ, RREP) Route message processing at each node Check route table for destination address route entry Reverse route entry for originator and precursors Route Discovery- Node Actions
  • 16. © Tetcos 2014 DSR When node A wants to send a packet to node G, but does not know a route to G, node A initiates a route discovery Source node A floods Route Request (RREQ) Each node appends own identifier when forwarding RREQ www.tetcos.com
  • 17. © Tetcos 2014 Route Discovery in DSR A B C E D G H F A A A-B A-C A-C-E A-C-E A-C-E A-B-D A has Data Destinatio n www.tetcos.com
  • 18. © Tetcos 2014 Route Discovery in DSR Destination G on receiving the first RREQ, sends a Route Reply (RREP) RREP is sent on a route obtained by reversing the route appended to received RREQ RREP includes the route from A to G on which RREQ was received by node G www.tetcos.com
  • 19. © Tetcos 2014 Route Discovery in DSR A B C E D G H F A A A-B A-C A-C-E A-C-E A-C-E A-B-D A-B-D-G A-B-D-G A-B-D-G Route reply www.tetcos.com
  • 20. © Tetcos 2014 DSR Node A on receiving RREP, caches the route included in the RREP When node A sends a data packet to G, the entire route is included in the packet header hence the name source routing Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded www.tetcos.com
  • 21. © Tetcos 2014 Route Maintenance in DSR A B C E D G H F G RERR RERR Route Cache (A) G: A, B, D, G G: A, C, E, H, G F: B, C,E, F Route Cache (A) G: A, C, E, H, G F: A, C,E, F www.tetcos.com
  • 22. © Tetcos 2014 Advantages Routes are discovered only they are needed Reduces overhead of route maintenance Route caching reduce the cost of route discovery A single route discovery may yield many routes to the destination due to intermediate nodes may reply route request from local caches. Disadvantages Packet header size grows with route length due to source routing inefficiency Route request packet may reach all nodes in the network. REQ flooding Increased contention if too many route replies come back Route Reply Storm DSR: Advantages/ Disadvantages www.tetcos.com
  • 23. © Tetcos 2014 Summary In this lecture we discussed the Dynamic Source Routing Protocol (DSR) ❍ Route Discovery • Source Routing (Accumulation of routes in the packet header) • Role of route cache in speeding up the route discovery and reducing the propagation of RREQs/RREPs ❍ Route Maintenance • Route cache and the role it plays in route maintenance www.tetcos.com
  • 24. © Tetcos 2014 Thank You www.tetcos.com

Editor's Notes

  • #6: Ad-Hoc Network
  • #18: Route request has the destination Shortest path calculation is done at the nodes. Eg: Node D
  • #20: Route request has the destination Shortest path calculation is done at the nodes. Eg: Node D