CSE 6007 Mobile Ad Hoc Wireless Networks

Slides:



Advertisements
Similar presentations
EcoTherm Plus WGB-K 20 E 4,5 – 20 kW.
Advertisements

Números.
1 A B C
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Trend for Precision Soil Testing % Zone or Grid Samples Tested compared to Total Samples.
PDAs Accept Context-Free Languages
AP STUDY SESSION 2.
Reflection nurulquran.com.
1
EuroCondens SGB E.
Worksheets.
Slide 1Fig 26-CO, p.795. Slide 2Fig 26-1, p.796 Slide 3Fig 26-2, p.797.
Slide 1Fig 25-CO, p.762. Slide 2Fig 25-1, p.765 Slide 3Fig 25-2, p.765.
& dding ubtracting ractions.
Sequential Logic Design
Copyright © 2013 Elsevier Inc. All rights reserved.
Addition and Subtraction Equations
David Burdett May 11, 2004 Package Binding for WS CDL.
Western Public Lands Grazing: The Real Costs Explore, enjoy and protect the planet Forest Guardians Jonathan Proctor.
Create an Application Title 1Y - Youth Chapter 5.
Add Governors Discretionary (1G) Grants Chapter 6.
CALENDAR.
CHAPTER 18 The Ankle and Lower Leg
The 5S numbers game..
突破信息检索壁垒 -SciFinder Scholar 介绍
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
Numerical Analysis 1 EE, NCKU Tien-Hao Chang (Darby Chang)
Break Time Remaining 10:00.
The basics for simulations
PP Test Review Sections 6-1 to 6-6
MM4A6c: Apply the law of sines and the law of cosines.
2013 Fox Park Adopt-A-Hydrant Fund Raising & Beautification Campaign Now is your chance to take part in an effort to beautify our neighborhood by painting.
Regression with Panel Data
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
TCCI Barometer March “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Progressive Aerobic Cardiovascular Endurance Run
Biology 2 Plant Kingdom Identification Test Review.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
Facebook Pages 101: Your Organization’s Foothold on the Social Web A Volunteer Leader Webinar Sponsored by CACO December 1, 2010 Andrew Gossen, Senior.
TCCI Barometer September “Establishing a reliable tool for monitoring the financial, business and social activity in the Prefecture of Thessaloniki”
When you see… Find the zeros You think….
Midterm Review Part II Midterm Review Part II 40.
2011 WINNISQUAM COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=1021.
Before Between After.
2011 FRANKLIN COMMUNITY SURVEY YOUTH RISK BEHAVIOR GRADES 9-12 STUDENTS=332.
2.10% more children born Die 0.2 years sooner Spend 95.53% less money on health care No class divide 60.84% less electricity 84.40% less oil.
Subtraction: Adding UP
Numeracy Resources for KS2
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Static Equilibrium; Elasticity and Fracture
Converting a Fraction to %
Resistência dos Materiais, 5ª ed.
Clock will move after 1 minute
& dding ubtracting ractions.
Select a time to count down from the clock above
1.step PMIT start + initial project data input Concept Concept.
WARNING This CD is protected by Copyright Laws. FOR HOME USE ONLY. Unauthorised copying, adaptation, rental, lending, distribution, extraction, charging.
A Data Warehouse Mining Tool Stephen Turner Chris Frala
1 Dr. Scott Schaefer Least Squares Curves, Rational Representations, Splines and Continuity.
1 Non Deterministic Automata. 2 Alphabet = Nondeterministic Finite Accepter (NFA)
Introduction Embedded Universal Tools and Online Features 2.
úkol = A 77 B 72 C 67 D = A 77 B 72 C 67 D 79.
Schutzvermerk nach DIN 34 beachten 05/04/15 Seite 1 Training EPAM and CANopen Basic Solution: Password * * Level 1 Level 2 * Level 3 Password2 IP-Adr.
Presentation transcript:

CSE 6007 Mobile Ad Hoc Wireless Networks Unit II Topic 8-15 Routing Protocols for Ad Hoc Wireless Networks Department of Computer Science and Engineering Kalasalingam University

Outline Introduction Topic 8 : Issues in Designing A Routing Protocol for Ad Hoc Wireless Networks Topic 9 : Classification of Routing Protocols Topic 10 : Table Driven Routing Protocols Topic 11 : On-Demand Routing Protocols Topic 12 : Hybrid Routing Protocols Topic 13 : Routing Protocols with Efficient Flooding Mechnisms Topic 14 : Hierarchical Routing Protocol Topic 15 : Power Aware Routing Protocol

The main routing problems for MANETs 8 10 9 7 4 6 Node mobility  Routing path broken frequently 2 3 5 1

Traditional ad-hoc routing protocols

Table-driven routing protocol – DSDV (cont.) Example: Routing table for Node 1 15 Dest NextNode Dist seqNo 2 1 22 3 26 4 5 32 134 6 144 7 162 8 170 9 186 10 142 11 176 12 190 13 198 14 214 15 256 14 13 11 12 10 9 8 6 4 7 5 3 1 2

Table-driven routing protocol – DSDV (cont.) Routing table for Node 1 15 Dest NextNode Dist seqNo 2 1 22 3 26 4 5 32 134 6 144 7 162 8 170 9 186 10 142 11 180 12 190 13 198 14 214 15 256 14 13 11 12 10 8 9 6 4 7 5 3 1 2

Route Discovery in DSR Y Z S E F B C M L J A G H D K I N Represents a node that has received RREQ for D from S

Route Discovery in DSR Y Broadcast Z [S] S E F B C M L J A G H D K I N Represents transmission of RREQ [X,Y] Represents route record stored in RREQ

Route Discovery in DSR Y Z S [S,E] E F [S,B] B C M L J A G [S,C] H D K Node H receives packet RREQ from two neighbors: potential for collision

Route Discovery in DSR Y Z S E F B [S,E,F] C M L [S,B,A] J A G [S,B,H] K [S,C,G] I N C receives RREQ from G and H, but does not forward it again, because C has already forwarded RREQ once

Route Discovery in DSR Y Z S E F [S,E,F,J] B C M L J A G H [S,B,H,I] D K I N [S,C,G,K] J and K both broadcast RREQ to D Their transmissions may collide at D

Route Discovery in DSR Y Z S E [S,E,F,J,M] F B C M L J A G H D K I N D does not forward RREQ, because D is the intended target

Route Reply in DSR Y Z S RREP [S,E,F,J,D] E F B C M L J A G H D K I N Represents RREP control message

An Example of Route Maintenance B A S E F H J D C G I K Z Y M N L RERR [J-D] Route Error Packet : RERR J sends a route error to S along route J-F-E-S when it finds link [J-D] broken Nodes hearing RERR update their route cache to remove all invalid routes related with link J-D

Use of Route Caching Can Speed up Route Discovery B A S E F H J D C G I K Z M N L [S,E,F,J,D] [E,F,J,D] [C,S] [G,C,S] [F,J,D],[F,E,S] [J,F,E,S] RREQ [K,G,C,S] RREP When node Z sends a route request for node C, node K sends back a route reply [Z,K,G,C] to node Z using a locally cached route

Use of Route Caching Can Reduce Propagation of Route Requests B A S E F H J D C G I K Z M N L [S,E,F,J,D] [E,F,J,D] [C,S] [G,C,S] [F,J,D],[F,E,S] [J,F,E,S] RREQ [K,G,C,S] RREP [D,K,G,,C] Route Replies (RREP) from node K and D limit flooding of RREQ.

Route Requests in AODV Y Z S E F B C M L J A G H D K I N Represents a node that has received RREQ for D from S

Broadcast transmission Route Requests in AODV Y Broadcast transmission Z S E F B C M L J A G H D K I N Represents transmission of RREQ

Route Requests in AODV Y Z S E F B C M L J A G H D K I N Represents links on Reverse Path

Reverse Path Setup in AODV Y Z S E F B C M L J A G H D K I N Node C receives RREQ from G and H, but does not forward it again, because node C has already forwarded RREQ once

Reverse Path Setup in AODV Y Z S E F B C M L J A G H D K I N

Reverse Path Setup in AODV Y Z S E F B C M L J A G H D K I N Node D does not forward RREQ, because node D is the intended target of the RREQ

Forward Path Setup in AODV Y Z S E F B C M L J A G H D K I N Forward links are setup when RREP travels along the reverse path Represents a link on the forward path

Route Maintenance 1 2 3 S D RERR 3´ The link from node 3 to D is broken as 3 has moved away to a position 3´. Node 2 sends a RERR message to 1 and 1 sends the message in turn to S. S initiates a route discovery if it still needs the route to D.