AODV Route Requests (RREQ) are forwarded in a manner similar to DSR
|
|
- Jacob Cook
- 6 years ago
- Views:
Transcription
1 d oc On-emand istance Vector (OV) R includes source routes in packet headers Resulting large headers can sometimes degrade performance particularly when data contents of a packet are small OV attempts to improve on R by maintaining routing tables at the nodes, so that data packets do not have to contain routes OV retains the desirable feature of R that routes are maintained only between nodes which need to communicate OV Route Requests (RRQ) are forwarded in a manner similar to R When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source OV assumes symmetric (bi-directional) links When the intended destination receives a Route Request, it replies by sending a Route Reply Route Reply travels along the reverse path set-up when Route Request is forwarded ar /598: omputer etworks 1 ar /598: omputer etworks 2 Route Requests in OV Route Requests in OV roadcast transmission Represents a node that has received RRQ for from Represents transmission of RRQ ar /598: omputer etworks 3 ar /598: omputer etworks 4 Route Requests in OV Reverse Path etup in OV Represents links on Reverse Path ode receives RRQ from and, but does not forward it again, because node has already forwarded RRQ once ar /598: omputer etworks 5 ar /598: omputer etworks 6 1
2 Reverse Path etup in OV Reverse Path etup in OV ode does not forward RRQ, because node is the intended target of the RRQ 7 Route Reply in OV 4/598: omputer etworks ar ar /598: omputer etworks 8 Route Reply in OV n intermediate node (not the destination) may also send a Route Reply (RRP) provided that it knows a more recent path than the one previously known to sender To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used The likelihood that an intermediate node will send a Route Reply when using OV not as high as R new Route Request by node for a destination is assigned a higher destination sequence number. n intermediate node which knows a route, but with a smaller sequence number, cannot send Route Reply Represents links on path taken by RRP ar /598: omputer etworks 9 ar /598: omputer etworks orward Path etup in OV ata elivery in OV orward links are setup when RRP travels along the reverse path Routing table entries used to forward data packet. Represents a link on the forward path 4/598: omputer etworks 11 ar ar Route is not included in packet header. T 10 4/598: omputer etworks 12 2
3 Timeouts routing table entry maintaining a reverse path is purged after a timeout interval timeout should be long enough to allow RRP to come back routing table entry maintaining a forward path is purged if not used for a active_route_timeout interval if no is data being sent using a particular routing table entry, that entry will be deleted from the routing table (even if the route may actually still be valid) ink ailure Reporting neighbor of node X is considered active for a routing table entry if the neighbor sent a packet within active_route_timeout interval which was forwarded using that entry When the next hop link in a routing table entry breaks, all active neighbors are informed ink failures are propagated by means of Route rror messages, which also update destination sequence numbers ar /598: omputer etworks 13 ar /598: omputer etworks 14 Route rror When node X is unable to forward packet P (from node to node ) on link (X,), it generates a RRR message ode X increments the destination sequence number for cached at node X The incremented sequence number is included in the RRR When node receives the RRR, it initiates a new route discovery for using destination sequence number at least as large as estination equence umber ontinuing from the previous slide When node receives the route request with destination sequence number, node will set its sequence number to, unless it is already larger than ar /598: omputer etworks 15 ar /598: omputer etworks 16 ink ailure etection ello messages: eighboring nodes periodically exchange hello message bsence of hello message is used as an indication of link failure lternatively, failure to receive several -level acknowledgement may be used as an indication of link failure Why equence umbers in OV To avoid using old/broken routes To determine which route is newer To prevent formation of loops ssume that does not know about failure of link - because RRR sent by is lost ow performs a route discovery for. ode receives the RRQ (say, via path --) ode will reply since knows a route to via node Results in a loop (for instance, ---- ) ar /598: omputer etworks 17 ar /598: omputer etworks 18 3
4 Why equence umbers in OV Optimization: xpanding Ring earch oop ---- Route Requests are initially sent with small Time-to- ive (TT) field, to limit their propagation R also includes a similar optimization f no Route Reply is received, then larger TT tried ar /598: omputer etworks 19 ar /598: omputer etworks 20 ummary: OV Routes need not be included in packet headers odes maintain routing tables containing entries only for routes that are in active use t most one next-hop per destination maintained at each node R may maintain several routes for a single destination Unused routes expire even if topology does not change estination-equenced istance-vector (V) ach node maintains a routing table which stores next hop towards each destination a cost metric for the path to each destination a destination sequence number that is created by the destination itself equence numbers used to avoid formation of loops ach node periodically forwards the routing table to its neighbors ach node increments and appends its sequence number when sending its local routing table This sequence number will be attached to route entries created for this node ar /598: omputer etworks 21 ar /598: omputer etworks 22 estination-equenced istance-vector (V) ssume that node X receives routing information from about a route to node estination-equenced istance-vector (V) ode X takes the following steps: X et (X) and () denote the destination sequence number for node as stored at node X, and as sent by node with its routing table to node X, respectively X f (X) > (), then X ignores the routing information received from f (X) = (), and cost of going through is smaller than the route known to X, then X sets as the next hop to f (X) < (), then X sets as the next hop to, and (X) is updated to equal () ar /598: omputer etworks 23 ar /598: omputer etworks 24 4
5 Temporally-Ordered Routing lgorithm (TOR) TOR modifies the partial link reversal method to be able to detect partitions When a partition is detected, all nodes in the partition are informed, and link reversals in that partition cease Partition etection in TOR for destination ar /598: omputer etworks 25 ar /598: omputer etworks 26 Partition etection in TOR Partition etection in TOR TOR uses a modified partial reversal method TOR uses a modified partial reversal method ode has no outgoing links ode has no outgoing links ar /598: omputer etworks 27 ar /598: omputer etworks 28 Partition etection in TOR Partition etection in TOR ode has no outgoing links ode has no outgoing links -- all its neighbor have reversed links previously. ar /598: omputer etworks 29 ar /598: omputer etworks 30 5
6 Partition etection in TOR Partition etection in TOR ode propagates the reflection to node odes and receive the reflection from node ode now has no outgoing link ar /598: omputer etworks 31 ode has received the reflection from all its neighbors. ode determines that it is partitioned from destination. ar /598: omputer etworks 32 Partition etection in TOR TOR mproves on the partial link reversal method by detecting partitions and stopping non-productive link reversals On detecting a partition, node sends a clear (R) message that purges all directed links in that partition Paths may not be shortest The provides many hosts the ability to send packets to a given destination eneficial when many hosts want to communicate with a single destination ar /598: omputer etworks 33 ar /598: omputer etworks 34 TOR esign ecision TOR performs link reversals as dictated by [afni81] owever, when a link breaks, it looses its direction When a link is repaired, it may not be assigned a direction, unless some node has performed a route discovery after the link broke if no one wants to send packets to anymore, eventually, the for destination may disappear TOR makes effort to maintain the for only if someone needs route to Reactive behavior TOR esign ecision One proposal for modifying TOR optionally allowed a more proactive behavior, such that a would be maintained even if no node is attempting to transmit to the destination oral of the story: The link reversal algorithm in [afni81] does not dictate a proactive or reactive response to link failure/repair ecision on reactive/proactive behavior should be made based on environment under consideration ar /598: omputer etworks 35 ar /598: omputer etworks 36 6
Ad hoc On-demand Distance Vector Routing (AODV) [Perkins99] CSE 6811 : Lecture 7
d hoc On-demand istance Vector Routing (OV) [Perkins99] 6811 : Lecture 7 d Hoc On-emand istance Vector Routing (OV) R includes source routes in packet headers G ata. Header Large headers can sometimes
More informationPage 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)
173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)
More informationDynamic Source Routing (DSR) [Johnson96]
ynamic Source Routing (SR) [ohnson96] S 6811 : ecture 5 d oc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation oop freedom
More informationWireless Internet Routing
Wireless nternet Routing Wireless Routing in the eginning 1 Wireless nternet Routing This course: routing in T/ad hoc networks and mesh networks o nternet? = ateway(s) wireless/wired 2 1 Outline Review
More informationDynamic Source Routing (DSR) [Johnson96] CSE 6811 : Lecture 5
ynamic Source Routing (SR) [Johnson96] S 6811 : Lecture 5 d Hoc Wireless Routing ifferent from routing in the wired world esirable properties of a wireless routing protocol istributed operation Loop freedom
More informationPage 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)
173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure
More informationRouting In Ad Hoc Networks
Routing n d oc Networks ontents 1. ntroduction to ad-hoc networks 2. Proactive routing protocols OLR 3. Reactive routing protocols R, OV 4. Non-uniform routing protocols ZRP, R 5. Other approaches eographical
More informationAd Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols
d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More information4/11/2012. Outline. Routing Protocols for Ad Hoc Networks. Classification of Unicast Ad-Hoc Routing Protocols. Ad Hoc Networks.
18759 Wireless Networks (2012-pring) urvey Routing Protocols for d Hoc Networks Jiun-RenLin and Yi-hun hou lectrical and omputer ngineering arnegie Mellon University Outline d-hoc networks Unicast d-hoc
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationUnicast Routing in Mobile Ad Hoc Networks
Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain
More informationMulti-hop Technology: Ad-hoc Networks
MNT and VNT routing Multi-hop Technology d-hoc Networks ll hops are wireless ll nodes are mobile Military pplications rmy leet of warships pace pplications group of pathfinders group of satellites ommercial
More informationPage 1 EEC173B/ECS152C. Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols
173/S152 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV ybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and link state
More informationPolitecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone
Politecnico di Milano Facoltà di Ingegneria dell Informazione WI-7 Ad hoc networks Wireless Internet Prof. Antonio Capone Acknowlegments o This class notes are mostly based on the teaching material of:
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationIP Forwarding Computer Networking. Routes from Node A. Graph Model. Lecture 10: Intra-Domain Routing
IP orwarding - omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSP (Open Shortest Path irst) The Story So ar IP addresses are structure to reflect Internet structure
More informationMobile Ad Hoc Networks: Routing, MAC and Transport Issues
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc.edu http://www.crhc.uiuc.edu/~nhv 2004 Nitin Vaidya 1 Notes Names in brackets,
More informationDSDV: Proactive. Distance Vector (Basic idea) Distance Vector. Distance Vector Algorithm: Tables 12/13/2016
estination Sequenced istance Vector (SV) Routing [Perkins94] SV: Proactive SV is a proactive protocol means it maintains up-to-date routing information for all available nodes in the network. No extra
More informationECS-087: Mobile Computing
ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing
More informationBridges. Bridge Functions. Example of No-frills Bridge. No-frills Bridges. Example of Learning Bridge. Learning Bridges
ridge Functions To extend size of LNs either geographically or in terms number of users. Protocols that include collisions can be performed in a collision domain of limited size. In ring networks the number
More informationThird Generation Routers
IP orwarding 5-5- omputer Networking 5- Lecture : Routing Peter Steenkiste all www.cs.cmu.edu/~prs/5-- The Story So ar IP addresses are structured to reflect Internet structure IP packet headers carry
More informationOutline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand
More informationPage 1. EEC173B/ECS152C, Winter Link State Routing [Huitema95] Optimized Link State Routing (OLSR) MANET Unicast Routing. Proactive Protocols
173/S152, Winter 2006 Proactive Protocols MNT Unicast Routing Proactive Protocols OLSR SV Hybrid Protocols Most of the schemes discussed so far are reactive Proactive schemes based on distance vector and
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationMobile Ad-Hoc Networks & Routing Algorithms
Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE
More informationDestination Sequenced Distance. [Perkins94] CSE 6811 : Lecture 6
estination Sequenced istance Vector (SV) Routing [Perkins94] SE 6811 : Lecture 6 SV: Proactive SV is a proactive protocol means it maintains up to date routing information for all available nodes in the
More informationThe Basics of Wireless Communication Octav Chipara
The asics of Wireless ommunication Octav hipara genda hannel model: the protocol model High-level media access TM, SM hidden/exposed terminal problems WLN Fundamentals of routing proactive on-demand 2
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationRedes Inalámbricas Tema 4. Mobile Ad Hoc Networks
Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks A. Specific properties B. Flooding as a basic mechanism C. Basic routing protocols DSR AODV y DYMO OLSR y OLSRv2 D. Advanced protocols and techniques Acknowledgments
More informationIP Forwarding Computer Networking. Graph Model. Routes from Node A. Lecture 11: Intra-Domain Routing
IP Forwarding 5-44 omputer Networking Lecture : Intra-omain Routing RIP (Routing Information Protocol) & OSPF (Open Shortest Path First) The Story So Far IP addresses are structured to reflect Internet
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationSetup Ad Hoc Routing Protocol over On-Demand Backup Node
etup d oc Routing Protocol over On-emand ackup ode Ying-ong Wang, hi ing hung, hih-hieh huang epartment of omputer cience and nformation ngineering, Tamang University 151 Ying-chuan Road, Tamsui 25137,
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More information6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)
103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA
More informationWAN Technology and Routing
PS 60 - Network Programming WN Technology and Routing Michele Weigle epartment of omputer Science lemson University mweigle@cs.clemson.edu March, 00 http://www.cs.clemson.edu/~mweigle/courses/cpsc60 WN
More informationCS5984 Mobile Computing
CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector
More information2/16/2008. Outline Computer Networking Lecture 11 Routing. Sending Link States by Flooding. Link State Protocol Concept
//8 Outline - omputer Networking Lecture Routing Link tate OP Peter teenkiste epartments of omputer cience and Electrical and omputer Engineering IP Multicast ervice asics - Networking, pring 8 http://www.cs.cmu.edu/~dga/-/8
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationWhite Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0
White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5
More informationDistance-Vector Routing: Distributed B-F (cont.)
istance-vector Routing: istributed - (cont.) xample [ istributed ellman-ord lgorithm ] ssume each node i maintains an entry (R(i,x), L(i,x)), where R(i,x) is the next node along the current shortest path
More informationMobile Ad Hoc Networks
Mobile Ad Hoc Networks Tutorial at CIT 2000 Bhubaneshwar, Dec 20 23 Sridhar Iyer IIT Bombay http://www.it.iitb.ernet.in.in/~sri sri@it.iitb.ernet.in Acknowledgements Many figures, slides and reference
More informationUCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.
Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationMANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.
MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology
More informationThe Performance of MANET Routing Protocols for Scalable Video Communication
Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication
More informationWireless Networking & Mobile Computing
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless
More informationWhat is Routing? EE 122: Shortest Path Routing. Example. Internet Routing. Ion Stoica TAs: Junda Liu, DK Moon, David Zats
What is Routing? Routing implements the core function of a network: : Shortest Path Routing Ion Stoica Ts: Junda Liu, K Moon, avid Zats http://inst.eecs.berkeley.edu/~ee/fa9 (Materials with thanks to Vern
More informationA Hybrid QoS Routing Strategy for Suburban Ad-Hoc Networks
A ybrid Qo Routing trategy for uburban Ad-oc etworks Muhammad Mahmudul Islam, Ronald Pose, arlo Kopp chool of omputer cience and oftware ngineering, Monash University, Australia {sislam,rdp,carlo}@csse.monash.edu.au
More informationMitigating Superfluous Flooding of Control Packets MANET
Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:
More informationNomadic Communications. Copyright. Ad-Hoc and WMN. Wireless Mesh Networks. Quest operaèprotettadallalicenza:
Nomadic ommunications Wireless Mesh Networks Renato Lo igno Loigno@disi.unitn.it - Tel: 2026 Home Page: http://isi.unitn.it/locigno/index.php/teaching-duties/nomadic-communications opyright Quest operaèprotettadallalicenza:
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions
More informationQuiz 5 Answers. CS 441 Spring 2017
Quiz 5 Answers CS 441 Spring 2017 1. How does Flooding differ from the route discovery phase used in other reactive routing protocols such as DSR and AODV? [2] Flooding involves broadcasting of data packet
More informationA Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver
1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so
More informationRouting in Variable Topology Networks
Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationRouting protocols in Mobile Ad Hoc Network
Routing protocols in Mobile Ad Hoc Network Presented By :- Nitesh Jain Date:-26/10/2005 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR KHARAGPUR Types of Wireless Networks Infrastructure
More informationLet s focus on clarifying questions. More Routing. Logic Refresher. Warning. Short Summary of Course. 10 Years from Now.
Let s focus on clarifying questions I love the degree of interaction in this year s class More Routing all Scott Shenker http://inst.eecs.berkeley.edu/~ee/ Materials with thanks to Jennifer Rexford, Ion
More informationRouting in Ad-hoc Networks
0/3/ COMP 635: WIRELESS & MOILE COMMUNICTIONS Routing in d-hoc Networks Jasleen Kaur Fall 0 Infrastructure-less Wireless Networks Standard Mobile IP needs an infrastructure Ø Home gent/foreign gent in
More informationCHAPTER 2 LITERATURE REVIEW
39 CHAPTER 2 LITERATURE REVIEW This chapter gives a brief summary of the MANET routing protocol types and their details. 2.1 ROUTING IN AD-HOC NETWORKS Routing is the act of moving information from source
More informationAODV Multipath Extension using Source Route Lists with Optimized Route Establishment
INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationUnit 2. Signaling and Single Area OSPF
nit ignaling and ingle rea PF elecommunications ignaling ignaling g sed to provide all of the set up, tare down and call processing information such as: ff hook notification alling party number alled party
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationDistance Vector Routing Protocols
Distance Vector Routing Protocols Routing Protocols and Concepts Chapter 4 Version 4.0 1 Objectives Identify the characteristics of distance vector routing protocols. Describe the network discovery process
More information10/29/08. Mobile ad hoc networks. Solution: Wireless ad-hoc networks. MANET: Mobile Ad-hoc Networking A B C
obile ad hoc networks Standard obile needs an infrastructure ome gent/oreign gent in the fixed network S, routing, etc., are not designed for mobility Sometimes there is no infrastructure! remote areas,
More informationCSE/EE 461 Lecture 7 Bridging LANs. Last Two Times. This Time -- Switching (a.k.a. Bridging)
S/ 461 Lecture 7 ridging LNs Last Two Times Medium ccess ontrol (M) protocols Part of the Link Layer t the heart of Local rea Networks (LNs) ow do multiple parties share a wire or the air? Random access
More informationMobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2
Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive
More informationNetWare Link-Services Protocol
44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell
More informationOn-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density
On-Demand Routing in Wireless Ad-Hoc Networks with Wide Levels of Network Density Presented by Wei-Cheng Xiao Advisor: David B. Johnson 2015/03/30 Wireless Network Infrastructure Mode Internet access point
More informationInformation Brokerage
Information Brokerage Sensing Networking Leonidas Guibas Stanford University Computation CS321 Information Brokerage Services in Dynamic Environments Information Brokerage Information providers (sources,
More informationPrevious Lecture. Link Layer & Network Layer. Link Layer. This Lecture. Framing. Sending bits. Chapter 7.C and 7.D
hapter 7. and 7. Previous Lecture Layer & Network Layer The network is organized into layers Prof. ina Katabi Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari alakrishnan,
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationIP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia
IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob
More informationExpanding Ring Search for Route Discovery in LOADng Routing Protocol
Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,
More informationAdvanced Network Approaches for Wireless Environment
Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk
More informationToken Ring VLANs and Related Protocols
CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might
More informationWireless Sensor Networks
Wireless Sensor Networks Routing M. Schölzel Network in computer science Network is a graph G = (V,E) V set of all nodes E set of all edges: (v 1,v 2 ) E V 2 V = { A, B, C,... } E = { (A,B), (B,C), (C,F),...
More informationEE122 MIDTERM EXAM: Scott Shenker, Ion Stoica
EE MITERM EXM: 00-0- Scott Shenker, Ion Stoica Last name Student I First name Login: ee- Please circle the last two letters of your login. a b c d e f g h i j k l m n o p q r s t u v w x y z a b c d e
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationRouting protocols in WSN
Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can
More informationUsing Labeled Paths for Loop-free On-Demand Routing in Ad Hoc Networks
Using Labeled Paths for Loop-free On-emand Routing in Ad Hoc Networks Hari Rangarajan Computer Engineering epartment University of California Santa Cruz, CA 95064 hari@soe.ucsc.edu J.J. Garcia-Luna-Aceves
More information16.682: Communication Systems Engineering. Lecture 17. ARQ Protocols
16.682: Communication Systems Engineering Lecture 17 ARQ Protocols Eytan Modiano Automatic repeat request (ARQ) Break large files into packets FILE PKT H PKT H PKT H Check received packets for errors Use
More informationCEN445 Network Protocols and Algorithms. Chapter 2. Routing Algorithms. Dr. Ridha Ouni
3/4/04 EN44 Network Protocols and lgorithms hapter Routing lgorithms Dr. Ridha Ouni Department of omputer Engineering ollege of omputer and Information Sciences King Saud University References Some slides
More informationAdaptive routing for mobile ad hoc networks
RSRH Open ccess daptive routing for mobile ad hoc networks Jeroen Hoebeke *, Ingrid Moerman and Piet emeester bstract eveloping efficient routing protocols for mobile ad hoc networks remains a challenging
More informationAODV- An Efficient MANET Routing Protocol
International Journal of urrent Engineering and Technology E-IN 2277 4106, P-IN 2347-5161 2014 INPREO, ll Rights Reserved vailable at http://inpressco.com/category/ijcet Research rticle OV- n Efficient
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationA New Framework for Loop-Free On-Demand Routing Using Destination Sequence Numbers
New Framework for Loop-Free On-emand Routing Using estination Sequence Numbers J.J. Garcia-Luna-ceves Hari Rangarajan epartment of omputer ngineering University of alifornia Santa ruz, 95064, U.S.. mail:
More informationToken Ring VLANs and Related Protocols
Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE! 1. Link state flooding topology information finding the shortest paths (Dijkstra)
ontents ÉOL POLYTHNIQU ÉÉRL LUSNN! 1. Link state flooding topology information finding the shortest paths (ijkstra)! 2. Hierarchical routing with areas! 3. OSP Link State Routing database modelling neighbor
More information4/25/12. The Problem: Distributed Methods for Finding Paths in Networks Spring 2012 Lecture #20. Forwarding. Shortest Path Routing
//1 The Problem: istributed Methods for Finding Paths in Networks L 1.0 Spring 01 Lecture #0 addressing, forwarding, routing liveness, advertisements, integration distance-vector routing link-state routing
More informationA Quick Guide to AODV Routing
Luke Klein-Berndt Wireless Communications Technologies Group National Institute of Standards and Technology AODV is a method of routing messages between mobile computers. It allows these mobile computers,
More informationThe Problem: Finding Paths Spring 2011 Lecture #19. Forwarding. Shortest Path Routing
The Problem: Finding Paths 1 6.02 Spring 20 Lecture # addressing, forwarding, routing liveness, advertisements, integration distance-vector routing routing loops, counting to infinity 6.02 Spring 20 Lecture,
More informationComparative Study of Routing Protocols in MANET
Comparative Study of Routing Protocols in MANET First Author-PrernaYadav 1 Student,Second Author-ShubhraSaxena 2 Professor Abstract-An ad hoc network is basically a collection of wireless nodes not having
More informationRouters & Routing : Computer Networking. Binary Search on Ranges. Speeding up Prefix Match - Alternatives
Routers & Routing -44: omputer Networking High-speed router architecture Intro to routing protocols ssigned reading [McK9] Fast Switched ackplane for a Gigabit Switched Router Know RIP/OSPF L-4 Intra-omain
More information