SlideShare a Scribd company logo
ROUTING PROTOCOLS IN WIRELESS NETWORK PRESENTED BY :- PANKAJ BARODIA ROLL NO. :- 09112019 M.TECH (CSE) Deenbandhu Chhotu Ram University of Science and Technology Murthal, Sonipat (Haryana), June 2011
What is routing ? Routing is the process of selecting paths in a  network along which to send network traffic. It is of two types – Static Routing Dynamic Routing What is protocol ? A specific set of communication rules by which computers communicate with each other.
What is routing protocols ? A routing protocol is a protocol that specifies how  routers communicate with each other. Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric   is a standard of measurement, such as   - Path bandwidth  - Reliability  - Delay  - Current load on that path
Types of Wireless Network There are basically four different types of wireless networks. - WPAN (Wireless Personal Area Network)  - WLAN (Wireless Local Area Network)  WMAN (Wireless Metropolitan Area Network) WWAN (Wireless Wide Area Network)
Wireless Networks Division
Ad-Hoc Routing protocols Ad-Hoc Routing Protocols Table Driven On-demand Driven WRP DSDV CGSR AODV  DSR   LMR   ABR TORA LSR Direct Descendants Logical   Descendants Proactive Reactive
Table Driven Routing Protocols Destination Sequenced Distance – Vector Routing Protocol (DSDV) The Wireless Routing Protocol (WRP) Global State Routing (GSR) Fisheye State Routing (FSR) Hierarchical State Routing (HSR) Zone-based Hierarchical Link State Routing Protocol (ZHLS) Clusterhead Gateway Switch Routing Protocol (CGSR)
On-Demand Routing Protocols  Cluster based Routing Protocol (CBRP) Ad hoc On-demand Distance Vector Routing (AODV) Dynamic Source Routing Protocol (DSRP) Temporally Ordered Routing Algorithm (TORA) Associativity Based Routing (ABR) Signal Stability Routing (SSR)
Destination Sequenced Distance Vector (DSDV)   Each Node Maintains Tables for: Next Hop on Path Distance (in hops) to destination Sequence Number ( keep current route) Nodes Exchange Updates With Neighbors If the two nodes have the same sequence number then route with the best metric is used
Routing table of Node A in this network is A B C Destination Next Hop Number of Hops Sequence Number Install Time A A 0 A 46 001000 B B 1 B 36 001200 C B 2 C 28 001500
Advantages of DSDV It is quite suitable for creating ad-hoc networks with small number of nodes Solve the Routing Loop problem Count to infinity problem is reduced DSDV maintains only the best path instead of maintaining multiple paths to every destination
Disadvantages of DSDV DSDV requires a regular update of its routing tables, which uses up battery power and a small amount of bandwidth even when the network is idle Whenever the topology of the network changes, a new sequence number is necessary DSDV is not suitable for highly dynamic networks
Wireless Routing Protocols Each Node maintains four tables   - Distance table - Routing table - Link-cost table - Message retransmission list (MRL) table MRL contains the sequence number of the update message, a retransmission counter and a list of updates sent in the update message Nodes inform each other of link changes using update messages
Nodes send update messages after processing updates from their neighbors or after detecting a change in the link If a node is not sending messages, it must send a HELLO message within a specified time to ensure connectivity If the node receives a HELLO message from a new node, that node is added to the table It avoids the “count to infinity” problem
Disadvantages of WRP Four tables requires a large amount of memory Periodic hello message consumes power and bandwidth Advantages of WRP A problem of the Bellman-Ford protocol is the count-to-infinity problem. This is a problem that is solved by WRP
CGSR uses DSDV routing scheme Based on concept of clusters and cluster heads Routing is done via the cluster heads and gateways A packet sent by a node is first routed to its cluster head and then the packet is routed from the cluster head to gateway to another cluster head and so on until the cluster head of the destination node is reached Clusterhead Gateway Switch Routing (CGSR)
CGSR Example Cluster head : - Forwards packets to gateways on behalf of source nodes - Dynamically elected Gateway : - nodes within the communication range of two or more cluster head 1 2 3 5 4 6 7 8 Gateway Cluster head Node Cluster 1 Cluster 2 Cluster 3
Advantages of CGSR Better bandwidth utilization Reduce the size of distance vector table because the routing is performed only over cluster head
Disadvantages of CGSR More time is spend in selection of cluster heads and gateways If the mobile node uses CDMA/TDMA then it can take some time to get permission to send packets Changes in the cluster-head, may result in multiple path breaks
Ad Hoc On-demand Distance Vector Routing  (AODV)  Route Discovery Process : Source Node initiates path discovery process by broadcasting RREQ RREQ is forwarded until it reaches an intermediate node that has a recent route information about the destination or till it reaches the destination   The RREQ uses sequence numbers to ensure that the routes are loop free and reply contains latest information only
When a node forwards a route request packet to its neighbors, it also records in its tables the node from which the first copy of the request came This table is used to construct the reverse path for the RREQ As the RREP traverses back to the source, the nodes along the path enter the forward route into their tables   Route reply process :
If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source  Route Error Packets (RERR) are used to erase broken links
1 2 3 5 7 8 4 6 1 2 3 5 7 8 4 Propagation of Route Request (RREQ) packet 6 Path taken by the Route Reply (RREP) packet Route Discovery in AODV :
Protocol Messaging S 1 2 D Hello RREQ RREP Data RERR
Advantages of AODV The main advantage of this protocol is that routes are established on demand and destination sequence numbers are used to find the latest route to the destination  The connection setup delay is lower
Disadvantages of AODV Intermediate nodes can lead to inconsistent routes if the source sequence number is very old  The periodic beaconing leads to unnecessary bandwidth consumption
Dynamic Source Routing   (DSR)   The two major phases of the protocol are : 1. Route discovery  2. Route maintenance
DSR - Route Discovery The sender : broadcast a route request packet The receiver : I t looks up its route cache to determine if it already  contains a route to the destination If   host's address is already listed in the route record   -  Discard If  host is the target - Send a route reply Else - Append this host's address to the route record, and    re-broadcast
Route reply is generated when the route request reaches either destination itself or intermediate node  When destination is reached then destination returns RouteReply with full path  Source node caches all paths that it receives and choose Shortest Path among all the path that it receives
DSR – Route Request S A G C F D B E S S-B S-B-E S-A S S-A-G S-A-G-F S-B S-B-C S-B-C RouteRequest Dropped
DSR – Route Reply S A G C F D B E S-B-E-D S-B-E-D S-B-E-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-B-E-D S-A-G-F-D
DSR - Route Maintenance Triggered when a link breaks between two nodes along the path from the Source to the destination Node who discover the break send a RouteError to inform the source node about the broken link Source Node - Erase the route from the cache, and - Use another cached routes, Or  - Request a new Route
DSR - Route Maintenance S A G C F D B E RouteError RouteError S-B-E-D S-A-G-F-D
Advantages of DSR A route is established only when it is required and hence the need to find routes to all other nodes is eliminated The intermediate nodes utilize the route cache information to reduce the control overhead
Disadvantages of DSR The route maintenance mechanism does not locally repair a broken link The connection setup delay is higher than in table-driven protocols This routing overhead is directly proportional to the path length
Temporally Ordered Routing Algorithm   (TORA)  It is based on Link Reversal Algorithms  It is a source-initiated on-demand routing protocol and it finds multiple routes from a source node to a destination node It has three basic functions - Route creation - Route maintenance - Route erasure
TORA – Route Discovery Route Creation is done using QRY and UPD packets QRY packet  : contains the destination-ID (did) for    which the algorithm is running UPD packet  : contains the (did) and the Height of the    node i (Hi) that is broadcasting the packet The height of destination set to 0 and all other node's height set to NULL  The source broadcasts a QRY packet with the destination node's ID in it
A node with not NULL height responds with a UPD packet that has its height in it  A node receiving a UPD packet sets its height to one more than that of the node that generated the UPD   A node with higher height is considered upstream and a node with lower height considered downstream  In this way a directed acyclic graph is constructed from source to the destination
Route Erasure : - A clear packet (CLR) is flooded through network to erase invalid routes
Illustration of TORA height metric Source Destination H = 0 H = 1 H = 2 H = 3
Route  Creation  of TORA 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 s s d d Propagation of QRY (reference level, height) Height of each node  updated by UPD (-,-) (-,-) (-,-) (-,-) (-,-) (-,-) (0,0) (-,-) (0,3) (0,3) (0,3) (0,2) (0,1) (0,0) (0,1) (0,2)
C A B E G (DEST) F H D QRY Route Creation of TORA QRY QRY UPD QRY QRY UPD UPD UPD UPD UPD UPD
Route maintenance C A B E F D UPD X UPD G (DEST) H
Advantages of TORA An on-demand routing protocol create a DAG only when necessary  Multiple paths created Good in dense networks
Disadvantages of TORA Not much used since DSR and AODV outperform TORA Performance degrades with increasing mobility
References : Jochen Schiller. Mobile Communications. Addison-Wesley Andrew S. Tanenbaum. Computer Networks, 4th Edition. PRENTICE HALL David B. Johnson, Davis A. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, T. Imielinski and H. Korth, Eds., Kulwer http://www.fesb.hr/~mcagalj/publications/ZurkindenCH03.pdf  http://wiki.uni.lu/secan-lab/Dynamic+Source+Routing.html http://www.ietf.org/html.charters/manet-charter.html http://compnetworking.about.com/cs/wireless80211/a/aa80211standard.htm (802.11)
http://cst.mi.fu-berlin.de/teaching/ss06/19554-s-ti/georgy%20sklyrenko%20-%20aodv%20routing%20protocol.pdf (AODV) http://moment.cs.ucsb.edu/AODV/aodv.html http://wiki.uni.lu/secan-lab/Signal+Stability-based+Adaptive+Routing+Protocol.html (SSR)

More Related Content

What's hot (20)

PPTX
Routing Protocols in WSN
Darpan Dekivadiya
 
PDF
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
PPTX
Computer network switching
Shivani Godha
 
PDF
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
PDF
Location Aided Routing (LAR)
Pradeep Kumar TS
 
PPTX
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
PPT
6lowpan
Dwarakanath Tulasi
 
PPTX
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
PPTX
Traffic-adaptive Medium Access Protocol
Gaurav Chauhan
 
PPTX
Multiple Access Protocal
tes31
 
PPTX
WCDMA
Harshal Tiwari
 
PDF
Design Issues In Adhoc Wireless MAC Protocol
Dushhyant Kumar
 
PDF
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
PPTX
switching techniques in data communication and networking
Harshita Yadav
 
PPTX
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
PPTX
Geographic Routing in WSN
Mahbubur Rahman
 
PPSX
Mac protocols of adhoc network
shashi712
 
PPTX
Localization & calling
RUpaliLohar
 
PDF
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
PPTX
Mobile IP
Mukesh Chinta
 
Routing Protocols in WSN
Darpan Dekivadiya
 
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Computer network switching
Shivani Godha
 
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Location Aided Routing (LAR)
Pradeep Kumar TS
 
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Point to-point protocol (ppp)
Kongu Engineering College, Perundurai, Erode
 
Traffic-adaptive Medium Access Protocol
Gaurav Chauhan
 
Multiple Access Protocal
tes31
 
Design Issues In Adhoc Wireless MAC Protocol
Dushhyant Kumar
 
Lecture 19 22. transport protocol for ad-hoc
Chandra Meena
 
switching techniques in data communication and networking
Harshita Yadav
 
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Geographic Routing in WSN
Mahbubur Rahman
 
Mac protocols of adhoc network
shashi712
 
Localization & calling
RUpaliLohar
 
Mobile computing (Wireless) Medium Access Control (MAC)
Jyothishmathi Institute of Technology and Science Karimnagar
 
Mobile IP
Mukesh Chinta
 

Viewers also liked (7)

PPTX
Ppt of routing protocols
Bhagyashri Dhoke
 
PPTX
Ad-Hoc Networks
Mshari Alabdulkarim
 
DOCX
Dsdv
prakash06
 
PPT
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
PPTX
Dynamic source routing
Ashraf Uddin
 
PPTX
Zone Routing Protocol
nitss007
 
POT
Localization with mobile anchor points in wireless sensor networks
Habibur Rahman
 
Ppt of routing protocols
Bhagyashri Dhoke
 
Ad-Hoc Networks
Mshari Alabdulkarim
 
Dsdv
prakash06
 
Fisheye State Routing (FSR) - Protocol Overview
Yoav Francis
 
Dynamic source routing
Ashraf Uddin
 
Zone Routing Protocol
nitss007
 
Localization with mobile anchor points in wireless sensor networks
Habibur Rahman
 
Ad

Similar to Wireless routing protocols (20)

PPT
Unit VIII wireless sensor networks
sangusajjan
 
PDF
En33838844
IJERA Editor
 
PDF
En33838844
IJERA Editor
 
PPT
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
PPT
Routing in Manet
shiujinghan
 
PPT
Routing ad hoc network
Prof. Dr. Noman Islam
 
PPTX
UNIT-3 Adhoc.pptx
ShivamSolanki48
 
PPT
Adhoc (1)
Muthukrishnan008
 
PDF
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
PDF
Ad hoc network-performance_analysis and simulation
Ayush Chhangani
 
PPTX
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
ODP
Adhoc routing protocols
Senthil Kanth
 
PDF
ENERGY EFFICIENT SHORTEST PATH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
AM Publications
 
PDF
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
PPT
RoutingProtocols.ppt
ImXaib
 
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
PDF
ex11-routing-performance.pdf
Jayaprasanna4
 
PPTX
Classification of routing protocols
Menaga Selvaraj
 
PDF
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
PPTX
Routing protocol
AmzadKhn
 
Unit VIII wireless sensor networks
sangusajjan
 
En33838844
IJERA Editor
 
En33838844
IJERA Editor
 
Mobile ad hoc networks (manets)
Chakravarthy Chittala
 
Routing in Manet
shiujinghan
 
Routing ad hoc network
Prof. Dr. Noman Islam
 
UNIT-3 Adhoc.pptx
ShivamSolanki48
 
Adhoc (1)
Muthukrishnan008
 
Routing protocols in Ad-hoc Networks- A Simulation Study
IOSR Journals
 
Ad hoc network-performance_analysis and simulation
Ayush Chhangani
 
BASICS OF ROUTING IN NETWORKS
KABILESH RAMAR
 
Adhoc routing protocols
Senthil Kanth
 
ENERGY EFFICIENT SHORTEST PATH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
AM Publications
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
pijans
 
RoutingProtocols.ppt
ImXaib
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
ex11-routing-performance.pdf
Jayaprasanna4
 
Classification of routing protocols
Menaga Selvaraj
 
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Routing protocol
AmzadKhn
 
Ad

Recently uploaded (20)

PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
PDF
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Complete Network Protection with Real-Time Security
L4RGINDIA
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
SFWelly Summer 25 Release Highlights July 2025
Anna Loughnan Colquhoun
 
Windsurf Meetup Ottawa 2025-07-12 - Planning Mode at Reliza.pdf
Pavel Shukhman
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
Complete JavaScript Notes: From Basics to Advanced Concepts.pdf
haydendavispro
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Using FME to Develop Self-Service CAD Applications for a Major UK Police Force
Safe Software
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Smart Trailers 2025 Update with History and Overview
Paul Menig
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Complete Network Protection with Real-Time Security
L4RGINDIA
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 

Wireless routing protocols

  • 1. ROUTING PROTOCOLS IN WIRELESS NETWORK PRESENTED BY :- PANKAJ BARODIA ROLL NO. :- 09112019 M.TECH (CSE) Deenbandhu Chhotu Ram University of Science and Technology Murthal, Sonipat (Haryana), June 2011
  • 2. What is routing ? Routing is the process of selecting paths in a network along which to send network traffic. It is of two types – Static Routing Dynamic Routing What is protocol ? A specific set of communication rules by which computers communicate with each other.
  • 3. What is routing protocols ? A routing protocol is a protocol that specifies how routers communicate with each other. Routing protocols use metrics to evaluate what path will be the best for a packet to travel. A metric is a standard of measurement, such as - Path bandwidth - Reliability - Delay - Current load on that path
  • 4. Types of Wireless Network There are basically four different types of wireless networks. - WPAN (Wireless Personal Area Network) - WLAN (Wireless Local Area Network) WMAN (Wireless Metropolitan Area Network) WWAN (Wireless Wide Area Network)
  • 6. Ad-Hoc Routing protocols Ad-Hoc Routing Protocols Table Driven On-demand Driven WRP DSDV CGSR AODV DSR LMR ABR TORA LSR Direct Descendants Logical Descendants Proactive Reactive
  • 7. Table Driven Routing Protocols Destination Sequenced Distance – Vector Routing Protocol (DSDV) The Wireless Routing Protocol (WRP) Global State Routing (GSR) Fisheye State Routing (FSR) Hierarchical State Routing (HSR) Zone-based Hierarchical Link State Routing Protocol (ZHLS) Clusterhead Gateway Switch Routing Protocol (CGSR)
  • 8. On-Demand Routing Protocols Cluster based Routing Protocol (CBRP) Ad hoc On-demand Distance Vector Routing (AODV) Dynamic Source Routing Protocol (DSRP) Temporally Ordered Routing Algorithm (TORA) Associativity Based Routing (ABR) Signal Stability Routing (SSR)
  • 9. Destination Sequenced Distance Vector (DSDV) Each Node Maintains Tables for: Next Hop on Path Distance (in hops) to destination Sequence Number ( keep current route) Nodes Exchange Updates With Neighbors If the two nodes have the same sequence number then route with the best metric is used
  • 10. Routing table of Node A in this network is A B C Destination Next Hop Number of Hops Sequence Number Install Time A A 0 A 46 001000 B B 1 B 36 001200 C B 2 C 28 001500
  • 11. Advantages of DSDV It is quite suitable for creating ad-hoc networks with small number of nodes Solve the Routing Loop problem Count to infinity problem is reduced DSDV maintains only the best path instead of maintaining multiple paths to every destination
  • 12. Disadvantages of DSDV DSDV requires a regular update of its routing tables, which uses up battery power and a small amount of bandwidth even when the network is idle Whenever the topology of the network changes, a new sequence number is necessary DSDV is not suitable for highly dynamic networks
  • 13. Wireless Routing Protocols Each Node maintains four tables - Distance table - Routing table - Link-cost table - Message retransmission list (MRL) table MRL contains the sequence number of the update message, a retransmission counter and a list of updates sent in the update message Nodes inform each other of link changes using update messages
  • 14. Nodes send update messages after processing updates from their neighbors or after detecting a change in the link If a node is not sending messages, it must send a HELLO message within a specified time to ensure connectivity If the node receives a HELLO message from a new node, that node is added to the table It avoids the “count to infinity” problem
  • 15. Disadvantages of WRP Four tables requires a large amount of memory Periodic hello message consumes power and bandwidth Advantages of WRP A problem of the Bellman-Ford protocol is the count-to-infinity problem. This is a problem that is solved by WRP
  • 16. CGSR uses DSDV routing scheme Based on concept of clusters and cluster heads Routing is done via the cluster heads and gateways A packet sent by a node is first routed to its cluster head and then the packet is routed from the cluster head to gateway to another cluster head and so on until the cluster head of the destination node is reached Clusterhead Gateway Switch Routing (CGSR)
  • 17. CGSR Example Cluster head : - Forwards packets to gateways on behalf of source nodes - Dynamically elected Gateway : - nodes within the communication range of two or more cluster head 1 2 3 5 4 6 7 8 Gateway Cluster head Node Cluster 1 Cluster 2 Cluster 3
  • 18. Advantages of CGSR Better bandwidth utilization Reduce the size of distance vector table because the routing is performed only over cluster head
  • 19. Disadvantages of CGSR More time is spend in selection of cluster heads and gateways If the mobile node uses CDMA/TDMA then it can take some time to get permission to send packets Changes in the cluster-head, may result in multiple path breaks
  • 20. Ad Hoc On-demand Distance Vector Routing (AODV) Route Discovery Process : Source Node initiates path discovery process by broadcasting RREQ RREQ is forwarded until it reaches an intermediate node that has a recent route information about the destination or till it reaches the destination The RREQ uses sequence numbers to ensure that the routes are loop free and reply contains latest information only
  • 21. When a node forwards a route request packet to its neighbors, it also records in its tables the node from which the first copy of the request came This table is used to construct the reverse path for the RREQ As the RREP traverses back to the source, the nodes along the path enter the forward route into their tables Route reply process :
  • 22. If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source Route Error Packets (RERR) are used to erase broken links
  • 23. 1 2 3 5 7 8 4 6 1 2 3 5 7 8 4 Propagation of Route Request (RREQ) packet 6 Path taken by the Route Reply (RREP) packet Route Discovery in AODV :
  • 24. Protocol Messaging S 1 2 D Hello RREQ RREP Data RERR
  • 25. Advantages of AODV The main advantage of this protocol is that routes are established on demand and destination sequence numbers are used to find the latest route to the destination The connection setup delay is lower
  • 26. Disadvantages of AODV Intermediate nodes can lead to inconsistent routes if the source sequence number is very old The periodic beaconing leads to unnecessary bandwidth consumption
  • 27. Dynamic Source Routing (DSR) The two major phases of the protocol are : 1. Route discovery 2. Route maintenance
  • 28. DSR - Route Discovery The sender : broadcast a route request packet The receiver : I t looks up its route cache to determine if it already contains a route to the destination If host's address is already listed in the route record - Discard If host is the target - Send a route reply Else - Append this host's address to the route record, and re-broadcast
  • 29. Route reply is generated when the route request reaches either destination itself or intermediate node When destination is reached then destination returns RouteReply with full path Source node caches all paths that it receives and choose Shortest Path among all the path that it receives
  • 30. DSR – Route Request S A G C F D B E S S-B S-B-E S-A S S-A-G S-A-G-F S-B S-B-C S-B-C RouteRequest Dropped
  • 31. DSR – Route Reply S A G C F D B E S-B-E-D S-B-E-D S-B-E-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-A-G-F-D S-B-E-D S-A-G-F-D
  • 32. DSR - Route Maintenance Triggered when a link breaks between two nodes along the path from the Source to the destination Node who discover the break send a RouteError to inform the source node about the broken link Source Node - Erase the route from the cache, and - Use another cached routes, Or - Request a new Route
  • 33. DSR - Route Maintenance S A G C F D B E RouteError RouteError S-B-E-D S-A-G-F-D
  • 34. Advantages of DSR A route is established only when it is required and hence the need to find routes to all other nodes is eliminated The intermediate nodes utilize the route cache information to reduce the control overhead
  • 35. Disadvantages of DSR The route maintenance mechanism does not locally repair a broken link The connection setup delay is higher than in table-driven protocols This routing overhead is directly proportional to the path length
  • 36. Temporally Ordered Routing Algorithm (TORA) It is based on Link Reversal Algorithms It is a source-initiated on-demand routing protocol and it finds multiple routes from a source node to a destination node It has three basic functions - Route creation - Route maintenance - Route erasure
  • 37. TORA – Route Discovery Route Creation is done using QRY and UPD packets QRY packet : contains the destination-ID (did) for which the algorithm is running UPD packet : contains the (did) and the Height of the node i (Hi) that is broadcasting the packet The height of destination set to 0 and all other node's height set to NULL The source broadcasts a QRY packet with the destination node's ID in it
  • 38. A node with not NULL height responds with a UPD packet that has its height in it A node receiving a UPD packet sets its height to one more than that of the node that generated the UPD A node with higher height is considered upstream and a node with lower height considered downstream In this way a directed acyclic graph is constructed from source to the destination
  • 39. Route Erasure : - A clear packet (CLR) is flooded through network to erase invalid routes
  • 40. Illustration of TORA height metric Source Destination H = 0 H = 1 H = 2 H = 3
  • 41. Route Creation of TORA 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 s s d d Propagation of QRY (reference level, height) Height of each node updated by UPD (-,-) (-,-) (-,-) (-,-) (-,-) (-,-) (0,0) (-,-) (0,3) (0,3) (0,3) (0,2) (0,1) (0,0) (0,1) (0,2)
  • 42. C A B E G (DEST) F H D QRY Route Creation of TORA QRY QRY UPD QRY QRY UPD UPD UPD UPD UPD UPD
  • 43. Route maintenance C A B E F D UPD X UPD G (DEST) H
  • 44. Advantages of TORA An on-demand routing protocol create a DAG only when necessary Multiple paths created Good in dense networks
  • 45. Disadvantages of TORA Not much used since DSR and AODV outperform TORA Performance degrades with increasing mobility
  • 46. References : Jochen Schiller. Mobile Communications. Addison-Wesley Andrew S. Tanenbaum. Computer Networks, 4th Edition. PRENTICE HALL David B. Johnson, Davis A. Maltz, "Dynamic Source Routing in Ad Hoc Networks", Mobile Computing, T. Imielinski and H. Korth, Eds., Kulwer http://www.fesb.hr/~mcagalj/publications/ZurkindenCH03.pdf http://wiki.uni.lu/secan-lab/Dynamic+Source+Routing.html http://www.ietf.org/html.charters/manet-charter.html http://compnetworking.about.com/cs/wireless80211/a/aa80211standard.htm (802.11)