Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
Introduction
Routing protocols used in wired networks cannot be directly applied to ad hoc wireless networks Highly dynamic topology No infrastructure for centralized administration Bandwidth constrained Bandwidth constrained Energy constrained For the above reasons, we need to design new routing protocols for ad hoc networks
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
10
11
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
12
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
13
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
14
15
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
16
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
17
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
18
19
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
20
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
21
22
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
23
24
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
25
Introduction
Multicast routing
Communication among a given set of nodes Better than multiple unicast
26
Constraints in Ad Hoc
Dynamically changing topology Low bandwidth Less reliable links
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
27
Issues
Challenges
Limited bandwidth Error-prone shared broadcast channel Mobility of nodes Limited energy Hidden terminal problem Limited security
Targets
Robustness Efficiency QoS
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
28
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
29
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
30
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
31
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
32
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
33
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
34
35
Broadcast-multicast scheme
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
36
Broadcast-multicast scheme
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
37
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
38
Disadvantages
Long distance between source and receiver High probability of path breaks High delay
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
39
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
40
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
41
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
42
Border node unicasts a TREECREATE-ACK to the multicast source to create a link between the border node and the source This sequence continues until every node in the network receives a TREE-CREATE message Routes in MZR are updated through the use of TREEREFRESH packets If a node on the multicast tree fails to receive a TREEREFRESH message after a certain time, it deletes its multicast entry TREE-REFRESH packets could be piggybacked on multicast data whenever possible
MZR creates a source specific, on-demand multicast tree with a minimal amount of routing overhead Hierarchical approach of MZR does not conserve bandwidth during the initial TREE-CREATE flood
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
43
44
Disadvantages
Long wait for the far node because of the TreePropagate message
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
45
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
46
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
47
48
Join protocol
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
49
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
50
Disadvantages
Complex Increasing control overhead
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
51
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
52
53
54
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
55
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
56
Control packet overhead is less due to fewer link failure. Increase hop count between sender and receiver.
Results in congestion Increase in delay Low Packet delivery ration Not scalable for scalability load balancing is needed
57
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
58
59
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
60
Centralized admission policy security is assured. Automatic rerouting is possible if the node changes the location. Scalability is not assured for large networks. DDM involves in periodic control packets
Results in consuming more bandwidth
61
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
62
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
63
64
Cntd
The Replay packet initially contains the distance of the node I1 from the source S. Upon the reply packet receipt at node R5 will have the hop distance of the node R5 from node I1 and the hop distance of node I from the source S.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
65
Cntd.
The best replay minimizes the following quantity:
+
joinWeight* (*(hop distance of R5 from I1 + hop distance of I1 from S)
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
66
67
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
68
Cntd
In this scheme, each node maintains a Neighbor Multicast Tree table(NMT). A node refreshes the NMTExistence timer when it receives data packets from tree node.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
69
Cntd
When the downstream tree node receives data packets from its parent node, the node can predict the time duration for which the parent node would remain within its transmission range. After receiving the data packets if the link life period is less than the TriggerHandoff time period , then the downstream node transmits the data packet after setting InitiateHandoff bit.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
70
Cntd
When a neighbor node promiscuously receives a data packet with InitateHandoff bit set,it sends Handoff control packet if the following two conditions are satisfied. 1.the neighbor node has tree node inforation for that particular multicast group in NMT table. 2.the NodeDistance value of the corresponding tree node entry in NMT be less than the distance of the node which requests for handoff procedure.
If the above two conditions are satisfied , then the neighbor node sends Handoff control packet to the interested tree node.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
71
Cntd
When the tree node receives many Handoff control packets,it chooses the Handoff control packet with least NodeDistance value and immediately sends back a HandoffConf control packet to the neighbor node. After receiving the HandoffConf control packet,the neighbor node forwards it to the tree node to rejoin the multicast tree. There may be more than one neighbor which satisfy the above two conditions. They are also eligible to send Handoff control packets to the interested tree node to reconfigure the multicast tree. Due to this reason, there is a chance that these Handoff packets collide and not reach the destination node.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
72
Cntd
Sending Handoff control packets by many neighbor nodes may lead to increased control overhead. If any neighbor node hears a HandoffConf control packet,just before sending the Handoff control packet,then it discards its Handoff control packet. There is no neighbor node satisfying the two conditions. Hence the downstream node in this case does not get any Handoff control packet from any neighbor nod,resulting in a link break. When such a situation arises, the downstream node of the broken link has to take measures to rejoin the multicast group.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
73
Cntd
To find the new route to any forwarding node in the multicast tree, the downstream node floods JoinReq with certain TTL value.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
74
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
75
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
76
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
77
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
78
Cntd
Every node send a beacon periodically. On receiving of beacon the information is updated in NNT. If new node need to connect
it will check for the NNT list If so node sends joinconfirm packet. If not node sends joinQuery packet.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
79
Cntd
The first K eligible nodes from the NNT care called preferred nodes. Only these nodes are eligible for further processing of the received joinQuery packets. The JoinQuery packets then send as a unicast packets to the preferred nodes.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
80
Cntd
On receiving
Check its eligibility for forwarding packets If not it discards packet. If yes node is connected to multicast tree
Sends back joinreply(JR) packets to the node that originated the joinQuery(JQ) packets. Otherwise it forwards JQ using the same procedure as above. JR packet follows the route by JQ packet in reverse order. Any proceeded JR identified through the multicast group ID , multicast source ID, and sequence number fields on the packet is discarded. The unprocessed JR packets are forwarded.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
81
Cntd
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
82
83
Disadvantages
Uses periodic beacons
Significant control overhead.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
84
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
85
MAODV Advantages
Discovers Multicast routes on demand and purposely used by mobile nodes in an ad hoc network. It offers quick adaptation to dynamic link conditions, low processing and memory overhead and low network utilization. Moreover, MAODV creates bi-directional shared multicast trees connecting multicast sources and receivers.
Can move forward or backward or duplex communication system where a system composed of two connected parties or devices that can communicate with one another in both directions.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
86
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
87
Sending a RREQ
o Consult its Group Leader Table, based on entry o Set J if node wishes to join the multicast group o If nodes not know leader, Dest. address = Address of Multicast Group & broadcast RREQ without MGLEx o If nodes knows leader, place group leaders address in MGLEx & unicast to next hop to the destination
MGLEx = Multicast Group Leader Extension
= Node issuing request to join
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
88
Receiving a RREQ
o Node checks J flag, if set o Node can only respond if it is a member of Multicast tree of MG or nodes MGSN > MGSN in RREQ o If J flag not set o Node can only respond if it has unexpired route to MG and nodes MGSN > MGSN in RREQ
MGL = Multicast Group Leader Node issuing request to join
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
89
o Node waits for RREP o May resend RREQ up to RREQ_RETRIES additional times o If no RREP within RREP_WAIT_TIME of unicast RREQ to leader, node broadcast subsequent RREQs for MG. o If RREP not received after RREQ_RETRIES, assume no other members in group , so it then becomes MGL (if wanting to join group) or drop packet and abort session.
MGL = Multicast Group Leader Node issuing request to join
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
90
91
The core of the MAODV protocol is about how to form the tree, repair the tree when a link is broken, and how to merge two previously disconnected tree into a new tree. All members of a multicast group are formed into a tree The root of the tree is the group leader. Multicast data packets are propagated among the tree. There are four types of packets in MAODV: RREQ, RREP, MACT and GRPH.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
92
o A node broadcasts a RREQ when o it is a member node and want to join the tree o it is a non-member node and has a data packet targeted to the group. o When a node in the tree received RREQ, it responses with RREP using unicast. o Since RREQ is broadcasted, there may be multiple RREPs received by the originating node. o The originating node should select one RREP that has the shortest distance to the tree and unicast a MCAT along the path to set up a new branch to the tree. o GRPH is the group hello packet, it is periodically broadcasted by group leader to let the nodes in the tree to update its distance to the group leader.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
93
Parameter Metrics
1. Packet Delivery Ratio: The fraction of packets sent by the multicast application that are received by the multicast receivers. 2. Control Packet Overhead: The total number of control packets originated and forwarded by the protocol. 3. Normalized Packet Overhead: The number of control and data
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
94
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
95
AMRIS
AMRIS is an on-demand protocol which constructs a shared delivery tree to support multiple senders and receivers within a multicast session. The key idea that differentiates AMRIS from other multicast routing protocols is that each participant in the multicast session has a session-specific multicast session member id (herein known as msm-id).
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
96
Information derived from the NEWSESSION message is kept in the Neighbour-Status table for up to T1 seconds.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
97
Cntd
A random jitter is introduced between the receipt of a NEW-SESSION message and its subsequent rebroadcast to prevent broadcast storms. A node may receive multiple NEW-SESSION messages from different nodes. If it has not rebroadcast any messages yet, it will keep the message that has the best routing metrics and calculate its msm-id based on the values from that message. Otherwise the messages received are dropped
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
98
99
AMRIS is Simple when compare to other multicast protocols. Disadvantages Wastage of bandwidth
Due to beacons Collision with beacons
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
100
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
101
102
Cntd
Unicast sender mode
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
103
Cntd
Sender doesn't know all the receiver address It only knows the RP address. Send the packet to the group by encapsulating it and unicast to RP. The RP will forward to all the receive members.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
104
105
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
106
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
107
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
108
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
109
Disadvantages Similar to other shared tree based protocols, this scheme also carries with it the risk of single point failure of the RP.
Results in significant packet loss
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
110
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
111
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks
Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols
112 Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
Security in Ad Hoc Wireless Networks Network Security Requirements Issues and challenges in security Network security attacks Key Management Secure Routing
112
Introduction
The objectives of a transport layer protocol include setting up of:
End-to-end connection End-to-end delivery of data packets Flow control Congestion control
These traditional wired transport layer protocols are not suitable for ad hoc wireless networks.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
113
Issues
Issues while designing a transport layer protocol for ad hoc wireless networks:
Induced traffic refers to the traffic at any given link due to the relay traffic through neighboring links. Induced throughput unfairness refers to the throughput unfairness at the transport layer due to the throughput/delay unfairness existing at the lower layers such as the network and MAC layers. Separation of congestion control, reliability, and flow control could improve the performance of the transport layer. Power and bandwidth constraints affects the performance of a transport layer protocol. Misinterpretation of congestion occurs in ad hoc wireless networks. Completely decoupled transport layer needs to adapt to the changing network environment. Dynamic topology affects the performance of a transport layer.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
114
Design Goal
The protocol should maximize the throughput per connection. It should provide throughout fairness across contending flows. It should minimize connection setup and connection maintenance overheads. The protocol should have mechanisms for congestion control and flow control in the network. It should be able to provide both reliable and unreliable connections. The protocol should be able to adapt to the dynamics of the network. One of the important resources must be used efficiently. The protocol should be aware of resource constraints. The protocol should make use of information from the lower layer. It should have a well-defined cross-layer interaction framework. The protocol should maintain end-to-end semantics.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
115
Split-TCP
116
117
Misinterpretation of packet loss Frequent path breaks Effect of path length Misinterpretation of congestion window Asymmetric link behavior Uni-directional path: TCP ACK requires RTS-CTSData-ACK exchange Multipath routing Network partitioning and remerging The use of sliding-window-based transmission
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
118
119
Disadvantages
When the network is partitioned, the path failure may last longer The congestion window after a new route is obtained may not reflect the achievable transmission rate acceptable to the network and TCP receiver.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
120
Increased dependency on the routing protocol and the buffering at the intermediate nodes The failure of intermediate nodes may lead to loss of packets. The dependency of TCP-BuS on the routing protocol many degrade its performance.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
121
The dependency on the network layer protocol to detect the route changes and partitions The addition of a thin ATCP layer to the TCP/IP protocol changes the interface functions currently being used.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
122
Disadvantages
It requires modifications to TCP protocol. The end-to-end connection handling of traditional TCP is violated. The failure of proxy nodes can lead to throughput degradation.
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
123
Table-Driven Routing Protocols On-Demand Routing Protocols Hybrid Routing Protocols Routing Protocol With Efficient Flooding Mechanisms Hierarchical Routing Protocols Power-Aware Routing Protocols
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
124
125
126
DSDV (Cont.)
Exchange table between neighbors at regular time interval Two types of table updates Incremental update Takes a single network data packet unit (NDPU) When no significant change in the local topology Full dumps update Takes multiple NDPUs: When local topology changes significantly Or incremental updates require more than a NDPU
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
127
DSDV (Cont.)
Table updates are initiated by the destination with the new sequence number which is always greater than the previous one Single link break cause propagation of table update information to the whole network With odd sequence The changed node informs neighbors about new shortest path while receiving the table update message With even sequence
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
128
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
129
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
130
DSDV (Cont.)
Advantages: Route setup process is very fast Make the existing wired network protocol apply to ad hoc network with fewer modifications Disadvantages: Excessive control overhead during high mobility Node must wait for a table update message initiated by the destination node Cause stale routing information at nodes
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
131
132
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
133
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
134
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
135
136
137
138
139
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
140
141
Table-Driven Routing Protocols On-Demand Routing Protocols Hybrid Routing Protocols Routing Protocol With Efficient Flooding Mechanisms Hierarchical Routing Protocols Power-Aware Routing Protocols Summery
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
142
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
143
144
145
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
146
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
147
Ref: C.Siva Ram Murthy and B.Smanoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson Education, 2004.
148