manets routing by vikash maianwal
Post on 09-Jun-2015
230 Views
Preview:
DESCRIPTION
TRANSCRIPT
A Presentation of Mobile computing Mobile Ad Hoc Network
Submitted to: - Submitted by:-Mr. RAJDEEP SINGH VIKASH MAINANWAL
Department of Computer Science & EngineeringPunjab Institute of Technology, Kapurthala
(PTU Main Campus)
CONTENTS:
• ROUTING• FUNDAMENTAL STEPS IN ROUTING• MANET VS TRADITIONAL ROUTING• ROUTING PROTOCOLS/TYPES OF
MANETS ROUTING REACTIVE PROTOCOL PROACTIVE PROTOCOL HYBRID PROTOCOL• SECURITY IN MANET’S• BIBLOGRAPHY
ROUTING
Routing is to find correct path between the source and destination for forwarding packets.
Routing is complex task in MANET’s because• The Traditional algorithm will not be suitable.• Centralized approaches will not be appropriate.• “Flooding” can be applied in ad-hoc network but is not efficient method.• For removing that we use hop counter.
Start
Node send the signal to find the no. of other nodes within range.
Synchronization b/w nodes
Sender node send msg. to receiver node
Isreceiving
node Ready
Receiving node send
back Ready signal
Wait for sometime
Comm.begins
Term. process
Stop
YES NO
FUNDAMENTAL STEPS IN ROUTING• Forwarding the packets to next hop. Is it like input interface
to an output interface in a traditional network.• While forwarding packet sender much check the parameters:a) Packet reaching the destination.b) Minimize the number of hops/path length.c) Minimize the delay.d) Minimize the packet loss.e) Minimize the cost involved.
MANET VS TRADITIONAL ROUTINGThere is limited physical security in a MANET compared to a traditional routing
Increased possibility of eavesdropping, spoofing, and denial-of-security attacks
Traditional routing protocols for wired networks do not work well in most MANETs
MANETs are too dynamic
Wireless links present problems of interference, limited capacity, etc.
The MANETs consider the layer 2 and 3 information whereas in traditional routing must consider on layer 3 information. Main Issue to be addressed by routing protocol in MANET are:-
1) Routing discovery
2) Data forwarding.
3) Route maintenance
TYPES OF MANETS ROUTING PROTOCOLS
Mobile ad hoc network’s routing protocols are characteristically subdivided into three main categories. These are proactive routing protocols, reactive routing protocols and hybrid routing protocols.
REACTIVE ROUTING PROTOCOLS
AD HOC ON DEMAND DISTANCE VESTOR(AODV)
DYNAMIC SOURCE ROUTING(DSR)
ADMISSION CONTROL ENABLED ON DEMAND ROUTING(ACOR)
ASSOCIATIVITY BASED ROUTING(ABR)
Re-active routing protocols
Does not take initiative for finding routes Establishes routes “on demand” by flooding a query Pros and cons: Does not use bandwidth except when needed (when
finding a route) Much network overhead in the flooding process when
querying for routes Initial delay in traffic
Re-active routing
Re-active routing
Re-active routing
PROACTIVE ROUTING PROTOCOLS
DESTINATION SEQUENCED DISTANCE VECTOR(DSDV)
OPTIMISED LINK STATE ROUTING(OLSR)
WIRELESS ROUTING PROTOCOL(WRP)
CLUSTER HEAD GATE WAY SWITCH ROUTING(CGSR)
Pro-active routing protocols
Routes are set up based on continuous control traffic All routes are maintained all the time
1. Neighbor/link sensing
2. Optimized flooding/forwarding(Multi point relaying)
3. Link-State messaging and route calculation Pros and cons: Constant overhead created by control traffic Routes are always available
MULTI POINT RELAYING
MULTI POINT RELAYING..
MULTI POINT RELAYING..
MULTI POINT RELAYING..
MULTI POINT RELAYING..
HYBRID ROUTING PROTOCOLS
TEMPORARY ORDERED ROUTING ALOGORITHM(TORA)
ZONE ROUTING PROTOCOL(ZRP)
ORDERONE ROUTING PROTOCOL(OORP)
HYBRID ROUTING PROTOCOLS
A mix of both proactive and reactive routing protocols• Basic idea behind hybrid routing protocols is to use
SECUIRITY ATTRIBUTES OF MANET Availability Integrity Confidentiality Authenticity Anonymity
BIBILOGRAPHY• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html• http://www.computingunplugged.com/issues/issue200407/00001326002• http://wiki.uni.lu/secan-lab/AdHoc+Protocols+
%28$28%29Classification% 28$29%29.html• http://www1.cse.wustl.edu/~jain/cis788-99/adhoc_routing/index.html• Andrew Tanenbaum. Computer Networks. Prentice Hall Professional
Tech-nical Reference, 2002.• Charles E. Perkins. Ad hoc networking. Addison-Wesley Publishing
Com-pany, 2001.• David B Johnson and David A Maltz. Dynamic source routing in ad hoc• wireless networks. In Imielinski and Korth, editors, Mobile Computing,• volume 353. Kluwer Academic Publishers, 1996.• http://as.wiley.com/WileyCDA/WileyTitle/productCd-0471373133.html• http://www.ietf.org/rfc/rfc2501.txt
Thanks
For Your Support
And Understanding
…
top related