manets routing by vikash maianwal

Post on 09-Jun-2015

233 Views

Category:

Engineering

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

ROUTING FUNDAMENTAL STEPS IN ROUTING MANET VS TRADITIONAL ROUTING ROUTING PROTOCOLS/TYPES OF MANETS ROUTING REACTIVE PROTOCOL PROACTIVE PROTOCOL HYBRID PROTOCOL SECURITY IN MANET’S

TRANSCRIPT

A Presentation of Mobile computing Mobile Ad Hoc Network

Submitted to: - Submitted by:-Mr. RAJDEEP SINGH VIKASH MAINANWAL

Department of Computer Science & EngineeringPunjab Institute of Technology, Kapurthala

(PTU Main Campus)

CONTENTS:

• ROUTING• FUNDAMENTAL STEPS IN ROUTING• MANET VS TRADITIONAL ROUTING• ROUTING PROTOCOLS/TYPES OF

MANETS ROUTING REACTIVE PROTOCOL PROACTIVE PROTOCOL HYBRID PROTOCOL• SECURITY IN MANET’S• BIBLOGRAPHY

ROUTING

Routing is to find correct path between the source and destination for forwarding packets.

Routing is complex task in MANET’s because• The Traditional algorithm will not be suitable.• Centralized approaches will not be appropriate.• “Flooding” can be applied in ad-hoc network but is not efficient method.• For removing that we use hop counter.

Start

Node send the signal to find the no. of other nodes within range.

Synchronization b/w nodes

Sender node send msg. to receiver node

Isreceiving

node Ready

Receiving node send

back Ready signal

Wait for sometime

Comm.begins

Term. process

Stop

YES NO

FUNDAMENTAL STEPS IN ROUTING• Forwarding the packets to next hop. Is it like input interface

to an output interface in a traditional network.• While forwarding packet sender much check the parameters:a) Packet reaching the destination.b) Minimize the number of hops/path length.c) Minimize the delay.d) Minimize the packet loss.e) Minimize the cost involved.

MANET VS TRADITIONAL ROUTINGThere is limited physical security in a MANET compared to a traditional routing

Increased possibility of eavesdropping, spoofing, and denial-of-security attacks

Traditional routing protocols for wired networks do not work well in most MANETs

MANETs are too dynamic

Wireless links present problems of interference, limited capacity, etc.

The MANETs consider the layer 2 and 3 information whereas in traditional routing must consider on layer 3 information. Main Issue to be addressed by routing protocol in MANET are:-

1) Routing discovery

2) Data forwarding.

3) Route maintenance

TYPES OF MANETS ROUTING PROTOCOLS

Mobile ad hoc network’s routing protocols are characteristically subdivided into three main categories. These are proactive routing protocols, reactive routing protocols and hybrid routing protocols.

REACTIVE ROUTING PROTOCOLS

AD HOC ON DEMAND DISTANCE VESTOR(AODV)

DYNAMIC SOURCE ROUTING(DSR)

ADMISSION CONTROL ENABLED ON DEMAND ROUTING(ACOR)

ASSOCIATIVITY BASED ROUTING(ABR)

Re-active routing protocols

Does not take initiative for finding routes Establishes routes “on demand” by flooding a query Pros and cons: Does not use bandwidth except when needed (when

finding a route) Much network overhead in the flooding process when

querying for routes Initial delay in traffic

Re-active routing

Re-active routing

Re-active routing

PROACTIVE ROUTING PROTOCOLS

DESTINATION SEQUENCED DISTANCE VECTOR(DSDV)

OPTIMISED LINK STATE ROUTING(OLSR)

WIRELESS ROUTING PROTOCOL(WRP)

CLUSTER HEAD GATE WAY SWITCH ROUTING(CGSR)

Pro-active routing protocols

Routes are set up based on continuous control traffic All routes are maintained all the time

1. Neighbor/link sensing

2. Optimized flooding/forwarding(Multi point relaying)

3. Link-State messaging and route calculation Pros and cons: Constant overhead created by control traffic Routes are always available

MULTI POINT RELAYING

MULTI POINT RELAYING..

MULTI POINT RELAYING..

MULTI POINT RELAYING..

MULTI POINT RELAYING..

HYBRID ROUTING PROTOCOLS

TEMPORARY ORDERED ROUTING ALOGORITHM(TORA)

ZONE ROUTING PROTOCOL(ZRP)

ORDERONE ROUTING PROTOCOL(OORP)

HYBRID ROUTING PROTOCOLS

A mix of both proactive and reactive routing protocols• Basic idea behind hybrid routing protocols is to use

SECUIRITY ATTRIBUTES OF MANET Availability Integrity Confidentiality Authenticity Anonymity

BIBILOGRAPHY• http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html• http://www.computingunplugged.com/issues/issue200407/00001326002• http://wiki.uni.lu/secan-lab/AdHoc+Protocols+

%28$28%29Classification% 28$29%29.html• http://www1.cse.wustl.edu/~jain/cis788-99/adhoc_routing/index.html• Andrew Tanenbaum. Computer Networks. Prentice Hall Professional

Tech-nical Reference, 2002.• Charles E. Perkins. Ad hoc networking. Addison-Wesley Publishing

Com-pany, 2001.• David B Johnson and David A Maltz. Dynamic source routing in ad hoc• wireless networks. In Imielinski and Korth, editors, Mobile Computing,• volume 353. Kluwer Academic Publishers, 1996.• http://as.wiley.com/WileyCDA/WileyTitle/productCd-0471373133.html• http://www.ietf.org/rfc/rfc2501.txt

Thanks

For Your Support

And Understanding

top related