Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol



Similar documents
LIST OF FIGURES. Figure No. Caption Page No.

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Security in Ad Hoc Network

Location-Aided Routing (LAR) in mobile ad hoc networks

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

PERFORMANCE ANALYSIS OF AD-HOC ON DEMAND DISTANCE VECTOR FOR MOBILE AD- HOC NETWORK

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols

Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs

Step by Step Procedural Comparison of DSR, AODV and DSDV Routing protocol

Study of Network Characteristics Incorporating Different Routing Protocols

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CS335 Sample Questions for Exam #2

Security for Ad Hoc Networks. Hang Zhao

Achieving Energy Efficiency in MANETs by Using Load Balancing Approach

Routing in packet-switching networks

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

Performance Analysis of Load Balancing in MANET using On-demand Multipath Routing Protocol

SIMULATION STUDY OF BLACKHOLE ATTACK IN THE MOBILE AD HOC NETWORKS

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Energy-Aware Performance Metric for AODV and DSDV Routing Protocols in Mobile Ad-Hoc Networks

TORA : Temporally Ordered Routing Algorithm

Security and Scalability of MANET Routing Protocols in Homogeneous & Heterogeneous Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Comprehensive Evaluation of AODV, DSR, GRP, OLSR and TORA Routing Protocols with varying number of nodes and traffic applications over MANETs

Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol

An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *

Customer Specific Wireless Network Solutions Based on Standard IEEE

Fast and Secure Data Transmission by Using Hybrid Protocols in Mobile Ad Hoc Network

ISSUES AND CHALLENGES OF QUALITY OF SERVICE IN MOBILE ADHOC NETWORK

Scalable Source Routing

Comparative Study of Performance Evaluation for Mobile Ad hoc networks using a proxy node

10CS64: COMPUTER NETWORKS - II

Keywords- manet, routing protocols, aodv, olsr, grp,data drop parameter.

NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks

Keywords: DSDV and AODV Protocol

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Routing with Load Balancing in Wireless Ad hoc Networks

Security Threats in Mobile Ad Hoc Networks

A Study of Internet Connectivity for Mobile Ad Hoc Networks in NS 2

Ad hoc On Demand Distance Vector (AODV) Routing Protocol

INTELLIGENT LOAD BALANCING IN MOBILE AD HOC NETWORKS. A Thesis by. Varun Khanna. Bachelor of Technology, Kurukshetra University, India, 2004

Performance Evaluation of Aodv and Dsr Routing Protocols for Vbr Traffic for 150 Nodes in Manets

IJMIE Volume 2, Issue 7 ISSN:

A Survey of Mobile Ad Hoc network Routing Protocols*

International Journal of Advanced Research in Computer Science and Software Engineering

Quality of Service Support in Mobile ad-hoc IP Networks *

Location-Aided Routing (LAR) in mobile ad hoc networks

Delay aware Reactive Routing Protocols for QoS in MANETs: a Review

Congestion control in Mobile Ad-Hoc Networks (MANETs)

MASTER'S THESIS. Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Tony Larsson, Nicklas Hedman. Civilingenjörsprogrammet

Load-balancing Approach for AOMDV in Ad-hoc Networks R. Vinod Kumar, Dr.R.S.D.Wahida Banu

Position and Velocity Aided Routing Protocol in Mobile Ad Hoc Networks

Investigating the Performance of Routing Protocols Using Quantitative Metrics in Mobile Ad Hoc Networks

`PERFORMANCE COMPARISON OF ENERGY EFFICIENT AODV PROTOCOLS

POWER AWARE QOS MULTIPATH ROUTING PROTOCOL FOR DISASTER RECOVERY NETWORKS

UNIT 8:- Mobile Ad-Hoc Networks, Wireless Sensor Networks

Optimized Load Balancing Mechanism Using Carry Forward Distance

Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks

Wireless Mesh Networks under FreeBSD

Introduction to LAN/WAN. Network Layer

Saleh Ali K.Al-Omari 1, Putra Sumari 2

A Link-state QoS Routing Protocol for Ad Hoc Networks

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

ISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Research Article Ant Colony and Load Balancing Optimizations for AODV Routing Protocol

ADAPTIVE LINK TIMEOUT WITH ENERGY AWARE MECHANISM FOR ON-DEMAND ROUTING IN MANETS

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

A Survey: High Speed TCP Variants in Wireless Networks

Internet Control Message Protocol (ICMP)

EFS: Enhanced FACES Protocol for Secure Routing In MANET

An Efficient AODV-Based Algorithm for Small Area MANETS

VoIP over MANET (VoMAN): QoS & Performance Analysis of Routing Protocols for Different Audio Codecs

Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET

MASTER THESIS REPORT MSc IN ELECTRICAL ENGINEERING WITH EMPHASIS ON TELECOMMUNICATION

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Routing in Mobile Ad Hoc Networks

Remote Home Security System Based on Wireless Sensor Network Using NS2

Comparison of WCA with AODV and WCA with ACO using clustering algorithm

TOPOLOGIES NETWORK SECURITY SERVICES

A Review Paper on Preventing DDOS Attack and Black Hole Attack with MANETs Protocols

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

Graph Theory Algorithms for Mobile Ad Hoc Networks

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks

A Review of Secure Ad-hoc Routing

Transcription:

Lecture 2 : The DSDV Protocol Lecture 2.1 : The Distributed Bellman-Ford Algorithm Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

The Routing Problem S S D D The routing problem is to find a route from S to D when some or all of the nodes are mobile.

Basic Assumptions We will assume that each node is capable of running fairly complicated algorithms locally. Each node has the necessary networks layers implemented. In particular, the MAC layer has all the facilities for implementing our protocols. Our protocols can be implemented using any underlying medium access scheme like TDMA or CSMA.

Nature of Protocols We will discuss routing protocols for mobile ad hoc networks (MANET). Routing protocols for MANETs can be classified as either reactive or proactive. This classification is based on the way a protocol tries to find a route to a destination.

Proactive Protocols Proactive protocols are based on periodic exchange of control messages and maintaining routing tables. Each node maintains complete information about the network topology locally. This information is collected through proactive exchange of partial routing tables stored at each node.

Proactive Protocols Since each node knows the complete topology, a node can immediately find the best route to a destination. However, a proactive protocol generates large volume of control messages and this may take up a large part of the available bandwidth. The control messages may consume almost the entire bandwidth with a large number of nodes and increased mobility.

Reactive Protocols In a reactive protocol, a route is discovered only when it is necessary. In other words, the protocol tries to discover a route only on-demand, when it is necessary. These protocols generate much less control traffic at the cost of latency, i.e., it usually takes more time to find a route compared to a proactive protocol.

Some example protocols Some examples of proactive protocols are : Destination Sequenced Distance Vector (DSDV) STAR Some examples of reactive protcols are : Dynamic Source Routing (DSR) Ad hoc On-demand Distance Vector (AODV) Temporally Ordered Routing Algorithm (TORA)

Destination Sequenced Distance Vector Protocol DSDV is a proactive protocol. Each node maintains its own routing table for the entire network. Consider a node S. Suppose, S needs to send a message to node D. S can look up the best route to D from its routing table and forward the message to the neighbour along the best route.

DSDV Protocol The neighbour in turn checks the best route from its own table and forwards the message to its appropriate neighbour. The routing progresses this way. There are two issues in this protocol : How to maintain the local routing tables How to collect enough information for maintaining the local routing tables

Maintaining Local Routing Table We will first assume that each node has all the necessary information for maintaining its own routing table. This means that each node knows the complete network as a graph. The information needed is the list of nodes, the edges between the nodes and the cost of each edge.

Maintaining Local Routing Table Edge costs may involve : distance (number of hops), data rate, price, congestion or delay. We will assume that the edge cost is 1 if two nodes are within the transmission range of each other. The DSDV protocol can be modified for other edge costs.

How the Local Routing Table is Used Each node maintains its local routing table by running the distributed Bellman-Ford algorithm. i Each node maintains, for each destination, a set of distances (x) dij for each neighbour j i Node treats neighbour k as the next hop for a packet destined for x if dik(x) equals minimum of all dij(x) x

How the local Routing Table is Used k 13 i l 8 x m 23 The message will be sent from i to l as the cost of the path to x is minimum through l

Collecting Information for Building Local Table Mobile and Wireless Computing Each node exchanges information with its neighbors to keep its local routing table updated. Whenever a node receives some new information about other nodes, it sends this information to its neighbours. Neighbours update their routing tables with this new information.

Distributed Bellman-Ford Algorithm 1 2 4 Suppose node 1 wants to send a message to node 4. 3 5 We consider only the number of hops as the cost for sending a message from a source to a destination. Since the shortest path between 1 and 4 passes through 2, 1 will send the message to 2.

Problems with Distributed Bellman-Ford Algorithm All routing decisions are taken in a completely distributed fashion. Each node uses its local information for routing messages. However, the local information may be old and invalid. Local information may not be updated promptly. This gives rise to loops. A message may loop around a cycle for a long time.

Formation of Loops n1 Suppose n5 is the destination of a message from n1. The links between n1,n5 n5 n4 n2 and n3,n5 have failed. A loop (n1,n4,n3,n2,n1) forms. n3

Counting to Infinity (i) 100 n1 1 n2 1 n3 The preferred neighbour for n2 is n3 and preferred neighbour for n3 is n2. Suppose the link n1-n3 fails.

Counting to Infinity (ii) 100 n1 1 n2 1 n3 Suppose n2 wants to send a message to n1. The only way to do this is to use link n2-n1. However, n2 chooses n3 as its preferred neighbour.

Counting to Infinity (iii) 100 n1 1 n2 1 n3 Also, n2 knows (from old routing table) that its distance to n1 is 2. This information is received by n3 and n3 updates its distance to n1 as 3, i.e, 2+1.

Counting to Infinity (iv) 100 n1 1 n2 1 n3 Next, n2 updates its distance to n1 as 3+1=4 and so on. This process continues until the cost of the link n2-n1 is less than the cost of n2-n3.

New Versus Old Information The formation of loops and the problem of counting to infinity are due to the use of old information about the network. Another problem is the use of indirect information. If node i is trying to send a message to node x,it is better to consider the view of node x.

How to Use New Information (i) 100 n1 1 n2 1 n3 Suppose each node broadcasts its routing table stamped with an increasing sequence number. Initially, n2 will receive updates from n1 and knows that the distance of n1 is 2.

How to Use New Information (ii) 100 n1 1 n2 1 n3 However, when the link n1-n3 is broken, this will be noted by n1 in its routing table. In future, n2 will receive broadcasts from n1 with this information and avoid the path through n3.

Time Stamps Each time a node like n1 broadcasts its routing table, it adds an increasing sequence number (time stamp) to the broadcast. Any node receiving the broadcast rejects old routing information and takes the new information for updating its routing table. This avoids looping and counting to infinity.

How to maintain routing tables? Routing tables are maintained by periodically broadcasting the tables stored in each node. We will assume that each node executes an algorithm like Dijkstra s shortest path algorithm to update its table. The broadcasts are done through a flooding scheme.