Professional Documents
Culture Documents
DSR AODV
Introduction
What is Ad-hoc?
A collection of wireless hosts forming a temporary network No aid of any established infrastructure or centralized administration No aid of any wired architecture
Pro-active Routing
Configure the routes toward any node before packet transmission Traditional mothod for Wired Network DSDV, etc..
On-Demand Routing
Find the route just before packet transmission Due to the high cost of wireless bandwidth DSR, AODV, etc...
On-Demand Method
Route Discovery
Route Reply
by the goal node or an intermediate node which knows the route from itself to the goal node Loop-free Short and efficient
Route Maintenance
DSR
Properties
DSR
A host initiating a route discovery broadcasts a Route Request packet. Then it waits for a Route Reply packet If a host receives a Route Request packet, it conducts as below
1.
2.
2.
3.
4.
If the packet have been received already, just drop and do nothing O/w, if the address of itself is listed in the Route Record, just drop and do nothing O/w, if the target of the packet is itself, send a Route Reply packet with a route of Route Record O/w, append its address to the Route Record in the Route Request packet and re-breadcast the request
3.
When the original sender receives a Route Reply packet, it updates its Route Cache
DSR
<initiator address, request id> pair Destination address Route Record some more?
Recent <initiator address, request id> pairs Request id Route Cache some more?
DSR
E <A,1 E ABCD
>
<A,1 E A >
<A,1 E AF >
DSR
Route Maintenance
Without periodic messages, Route informations must become outof-time If a host on the route detect a transmission problem for which it cannot recover, it send a Route Error packet to the original sender
Data link level error reporting Passive acknowledgement Transport / Application level Ack
Route Error packet contains the addresses of the hosts at both ends of the hop in error When a Route Error packet is received, the hop in error is removed from the original senders route cache and resend the Route Request packet
Resource Usage
SCALABILITY
DSR does not appear to be very scalable protocol because each host must keep the full knowledge of the paths to communicate with. In case of densely connected network, there can be lot of problems. This will grow linearly per host and over the network in the worst case.
AODV
Similar to DSR, but AODV uses Routing Table instead of Source routing The node receiving a packet knows who sent it While the Route Request packet propagates, reverse path is made Route Reply packet returns along the reverse path, setting up the routing table of the intermediate nodes
AODV
Destination Next Hop Number of Hop (metric) Sequence number for the destination Active neighbors for this route Expiration time for the route table entry
ASPECTS OF AODV
Path Discovery Path discovery is used when there is no available route to the destination node in the source node. There are two types of path setup: 1)Reverse path setup 2)Forward path setup
REVERSE PATH
As each node receives and forwards a new path discovery request it stores the node that it received the request from before it re-broadcasts the path discovery. Reverse path setup is based on route request and not on route reply.
AODV
C
D
E
FORWARD PATH
If a node forwards a path discovery request it must listen for the path discovery response. A valid response means that it has reached to the right destination. It is also possible that more than one response are there at the source node.
AODV
E A E A E C A B
D B
E C D
AODV
Path Maintenance
If a node detect its next hop-link is broken, it propagates an unsolicited RREP with a fresh seq-num and infinite hop-cnt to all active upstream neighbors When the original sender receives the RREP from the broken link, it may restart the discovery process
It send a RREQ with dest_seq_num +1 Even if the intermediate node still regard the previous route valid, the new RREQ has greater dest_seq_num so that new discovery process will begin
AODV ANALYSIS
PROPERTIES
Wireless links Low Bandwidth High Power Consumption Frequent Topology Changes
Hosts move freely Bidirectional communication is not guaranteed Resourcus are much more expansive
Every
SECURITY
Security is an important issue for ad hoc networks, especially for those security sensitive applications. To secure ad hoc network, we have to consider following attributes: 1)Availability 2)Confidentiality 3)Integrity 4)Authentication 5)Non-repudiation
RESOURCES