0% found this document useful (0 votes)
76 views48 pages

Ad-Hoc Routing Protocol How Does It Work

This document provides an outline for a presentation on the classification of ad hoc routing protocols. It begins with an introduction to ad hoc networks and their characteristics. It then presents a taxonomy that divides ad hoc routing protocols into three main categories: table-driven (proactive), source-initiated (on-demand/reactive), and hybrid protocols. Several examples of protocols are described within each category.

Uploaded by

Abe Marera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views48 pages

Ad-Hoc Routing Protocol How Does It Work

This document provides an outline for a presentation on the classification of ad hoc routing protocols. It begins with an introduction to ad hoc networks and their characteristics. It then presents a taxonomy that divides ad hoc routing protocols into three main categories: table-driven (proactive), source-initiated (on-demand/reactive), and hybrid protocols. Several examples of protocols are described within each category.

Uploaded by

Abe Marera
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 48

Ambo University

Institute of Technology

Department of Computer Science


(MSc program)

Advanced Computer Networks

Title:-Classification of Ad Hoc Routing Protocols

Presented By: Abebe W.

1
Outline
Introduction
Taxonomy
Overview of selected protocols.
Conclusion
Introduction
Ad-hoc Networks Problem

Dynamic topology Avoid high power


Self organizing consumption
High bandwidth
Limited memory
absence of fixed

infrastructure
Cont…

Ad hoc network is a multi-hop wireless network consist


number of mobile node.

Where? :-
 Military
 Emergency
 Conferencing…….etc…
Architectures
Infrastructured
Fixed access points
Mobile units only
communicate with AP
Handoff between APs as
mobile unit moves
Typical applications
include office wireless
networks
Cont…
Infrastructureless
Ad-hoc network
No fixed routers
Every node responsible for
routing
Taxonomy Ad Hoc Routing Protocols

Ad hoc Routing Protocols

Table Driven Hybrid Source-Initiated


(Proactive) On-demand Driven
(Reactive)
ZRP

CGSR DSDV WRP


AODV DSR TORA ABR SSR
This taxonomy is based on to divide protocols according to
.

following criteria, reflecting fundamental design and


implementation choices:- .
A. Communication model. C. State Information.
What is the wireless Is network-scale topology
communication model? Multi- information obtained at each
or single channel? node?
B. Structure. D. Scheduling.
Are all nodes treated uniformly? Is route information continually
How are distinguished nodes maintained for each
selected? Is the addressing destination?
hierarchical or flat?
.

Proactive
Reactive Routing
Nodes continuously evaluate Nodes evaluates and updates
and updates route. route only when they needed.
Periodically Updates. Data sent using valid route.
Triggered updates:- when When node has send packet
link changes. it checks to see if it has a valid
route.
WSN Routing protocols
Proactive
 DSDV: Destination Sequenced Distance Vector
 WRP: Wireless Routing Protocol
 CGSR: Cluster Switch Gateway Routing
Reactive
 ABR: Associability Based Routing
 DSR: Dynamic Source Routing
 TORA: Temporally Ordered Routing Algorithm
 AODV: Ad Hoc On-Demand Distance Vector Routing
 DYMO: Dynamic MANET On-demand – DYMO-low
 RDMAR: Relative Distance Microdiversity Routing
 SSR: Signal Stability Routing
 LAR: Location-Aided Routing
 PAR: Power-Aware Routing
Hybrid
 ZRP: Zone Routing Protocol

10
Table-driven routing protocols
Based on:-
 Periodically exchanging of routing information.
 Each node build its own routing table which it can use the
path to a destination.
 Network nodes maintain one or many tables for routing
information.
 Learn the networks topology before forwarding.
Source-initiated on-demand protocols
The nodes do not exchange any routing information.
A source node obtains a path to a specific destination only
when it needs to send some data to it.
Create routes only when these routes are needed.
The need is initiated by the source, as the name suggests.
Type of Cast

Uni-cast protocols Multicast routing protocols

 Are one source transmits Try to construct a desirable


messages or data packets to routing tree or a mesh from
one destination. one source to several
 That is the most normal destinations.
operation in any network. Geocast.
Deliver packet from group of
( single channel and nodes.
multichannel )
Routing Algorithm

Link-State algorithm:
Each
node maintains a view of the network
topology
Distance-Vector algorithm:
Every node maintains the distance of each

destination
Link State Routing
 Each node maintains a view of
the network topology
with a cost for each link
 Periodically broadcast link costs
to its outgoing links to
all other nodes such as flooding
 Each node re-broadcasts link state
information received from its neighbour
 Each node keeps track of link state
information received from other nodes Retransmission node

15
Routing algorithm cont…..
Distance-Vector
 known also as Distributed DV not suited for ad-hoc
Bellman-Ford or RIP (Routing networks!
Information Protocol)  Loops
 Every node maintains a routing  Count to Infinity
table
 all available destinations
New Solution -> DSDV
 the next node to reach to
destination Protocol
 the number of hops to reach the
destination
 Periodically send table to all
neighbors to maintain topology
Topology Based Protocols
Global State Routing (GSR)
 Base on link state routing
Difference between link state and
GSR?

In LS routing:-
 Send link state packet to every
node network.
 Every node have complete
knowledge of topology.
 Huge amount of control packet
transmission.
GSR cont…..
In GS routing
 Send LS packet to its
neighbor.
 Node periodically broadcasts
its entire topology table to its
immediate neighbors.
 Node send LS to its neighbor.
 Every node maintain three
tables.
 Initially list and tables are
empty for every node.
GSR cont….
B. Destination Based Protocols
WRP the Wireless Routing Protocol (WRP)
 its a proactive.
 WRP belong to the class of path finding algorithms.
Path-finding algorithms eliminate the counting-to-infinity
problem of distributed Bellman-Ford-algorithms by using
that predecessor information, which can be used to infer
an implicit path to a destination and thus detect routing
loops.
In WRP there is a quite complicated table structure. Each
node maintains four different tables as in many other
table-driven protocols only two tables are needed. These
four tables are:-
1) distance table,
2) routing table,
3) Link cost table and
4) message retransmission list (MRL)table.
C. Neighbor selection protocols
OLSR
Optimized Link State Routing (OLSR) is a topology based,
neighbor selection protocol, in which each node only
maintains a subset of network topology information.
OLRS is a proactive protocol, because it exchanges the
topology information with other nodes regularly to
maintain information required for routing.
Contd…
OLRS reduces the cost of distributing network-scale link-
state information by two ways. First, it uses multipoint
relays (MRP) to reduce redundant rebroadcasting during
flooding operation. That is the key concept of the
protocol. MRPs are selected nodes, which forward
broadcast messages during the flooding process.
In figures 3 (a) and 3 (b) there is an illustrative example
what is the cost difference between broadcast by flooding
and by multipoint relays.
FSR

Fisheye Source Routing (FSR) is based on a method to


divide each node’s neighborhood to blurred zones so that
the information details and accuracy is better for nodes to
be near. The name’s basis is on the phenomenon of fish
eye’s ability to see objects the better the nearer they are. In
FSR zones are classified according to the distance,
measured by hops, from the node. In figure 4 there can be
seen three differed zones.
The drawbacks of GSR are the large size update messages
and the latency of the link state change propagation. FSR
is applied to alleviate that situation by reducing the size of
update messages without seriously affecting routing
accuracy.
Multi-Level Scope (FSR)
• Central node (red dot) has the
most accurate information about
nodes in white area and so on.
•Parameters: Scope level/radius
size
AODV
By Perkins and royer
Sender try to find the destinatation
How?
By broad casting the route request(RREQ)
When route fails?
Sender repeats the route discovery.
If in case of broken links……????
Route error packet(RRER) notify the other node. Then
nodes remove the corresponding route entry after
hearing RRER.
Partitioning Protocol

CEDAR
Core Extraction Distributed Ad hoc Routing (CEDAR) is
a partitioning protocol, emphasizing QoS support. Each
partition includes a core node. The core nodes use a
reactive source routing protocol to outline a route from a
source to a destination.
CEDAR has three key components:
1) the establishments and maintenance of self-organizing
routing infrastructure (core) for performing route
computations,
2) the propagation of the link-states of high-bandwidth and
stable links in the core through increase/ decrease waves
3) a QoS route computation algorithm that is executed at the
core nodes using only locally available state.
Multichannel Protocols
The main distinct feature for multichannel protocols is the
ability to support different communications channels.
Some nodes may have access to more than one physical
medium or a node may be allowed to change the channel
during routing operation.
The two protocols appearing here is CGSR (Cluster head
Gateway Switch Routing) protocol and quite an
exceptional protocol called Epidemic. CGSR is a non-
uniform hierarchical protocol, which is based to forming
clusters among nodes and selecting a cluster head to
control routing to outside the cluster area.
CGSR
Cluster head Gateway Switch Routing protocol is a
multichannel operation capable protocol. It enables code
separation among clusters. The clusters are formed by
cluster head election procedure, which is quite intensive
process. On that reason the protocol uses so called Least
Cluster Change (LCC) algorithm for that election. By
using LCC can cluster heads only changed when two
cluster heads come into contact with each other or when a
node moves out of contact of all other cluster heads.
CGSR is not an autonomous protocol. It uses DSDV as
the underlying routing scheme. The DSDV approach is
modified to use a hierarchical cluster head-to-gateway
routing. A packet sent by a node is first routed to its
cluster head, and then the packet is routed from the cluster
head to a gateway to another cluster head, until the
destination node’s cluster head is reached.
That destination cluster head then transmits the packet to
the destination node.
Epidemic
Epidemic is a routing protocol which is aimed for separated
networks never having a connected path form source to a
destination node. The goals of epidemic routing are to
maximize message delivery rate, minimize message
latency and minimize the total resources consumed in
message delivery rate.
Other than Unicast Protocols

Multicast Protocols
There is a need for multicast traffic also in ad hoc networks.
The value of multicast features with routing protocols is
even more relevant in ad hoc networks, because of limited
bandwidth in radio channels. Some multicast protocols are
based to form and maintain a routing tree among group of
nodes. Some other are based on to use routing meshes that
have more connectivity than trees.
This approach is justified by the reason that maintaining a
routing tree can have remarkable control traffic. The
problem with a mesh is a tendency to form long-term or
permanent routing loops.
The multicast routing protocols can be classified into the following categories:

Figure : Taxonomy of Multicast Protocols


Geocast Protocols
The goal of geocast protocols is to deliver data packets to a
group of nodes that are inside a specified geographical
area. Geocast could be understood to a some kind of
enlargement of multicast operations. In multicasting nodes
may join or leave multicast group as desired. In geo
casting nodes join or leave the group by entering or
leaving the defined geocast region.
Protocols by Cost Function
The classification of protocols according to cost function is
based on the idea that there is some variable in network to
be minimized or maximized.
For example that variable can be the energy consumed by
nodes, available bandwidth for a connection or latency.
In ad hoc environment battery energy constrains has gain
much attention.
Protocols to minimize energy used will have the
following advantages:
- Minimizing emitted power will allow spatial reuse of
frequencies. That will increase the total throughput of
network
- Multiuser interference will be minimized. That will
improve the quality of communications channels
- The battery driven terminals will have longer operation
time
- In military applications low probability of
intercept and low probability of detection could be attained.
Applicability of different Protocols
The critical features for ad hoc networks can be
classified :-quantitative and qualitative features.
Quantitative features are:
• Network settling time.
• Network join time.
• Network depart time.
• Network recovery time.
• Frequency of updates.
• Memory required.
• which is the storage space
• Network scalability number.
quantitative metrics for network routing protocol
performance are:
- End-to-end data throughput and delay.
- Route acquisition time , which is a particular concern
for on-demand protocols
- Percentage out-of-order delivery, which can affect how
efficiently transport layer protocols can perform it’s own
task
- Efficiency, which is an internal measure of protocols
effectiveness.
Small Scale Static Networks
When choosing a routing protocol for a small-scale static
network there is not so many constrains to take into
account. Because of small size and minor node movements,
proactive protocols have no problems to keep up with their
tables. Non-uniform protocols would surely be overkill.
The question to be important may be closely associated to
energy constrain issues, when dealing with e.g. sensor
networks or with laptop computers. Also questions related
to real time voice or video services may be relevant.
Large Scale Networks
Scalability is a problem to suddenly pop-up. Normally
engineers are able to forecast the use of their inventions,
but there are too many opposite examples. In military and
also in civil defense areas there is an evitable need to scale
networks up to several hundreds or even thousands nodes.
Dynamic Networks
Dynamic networks are the main challenge, because we are
able to manage with many large different networks, as is
the case with the Internet. But when we have same
problems in dynamic environments, there is vast number
of trade-offs to consider. If we want the route acquisition
time to be modest we should prefer table-based
i.e. proactive protocols, but when using proactive protocols
with dynamic networks, there is a burden of too many and
too frequent update messages.
The end!!!!
Thank You All For Your attention!

…………..question well
come!!!!!....

You might also like