Professional Documents
Culture Documents
WirelessNetworks
Networks
Unit
UnitIIII
Mobile
MobileNetwork
NetworkLayer
Layer
Dr.T.V.Padmavathy
Dr.T.V.Padmavathy
Professor
Professor
Department
of ECE
Department
RMKEC of ECE
RMKEC
1/3/17
1/3/17
History
History
Packet Radio NETwork (PRNET) by DARPA -1972
Survivable Packet Radio Networks (SURAN) 1980s
MANET- IETF -1990s
IEEE released 802.11 PHY and MAC standard 1995
1/3/17
Introduction
Introduction
In this protocols and mechanisms to support mobility.
Allows transparent routing of IP datagrams to mobile nodes
Mobile IP Adds mobility support to the internet
1/3/17
1/3/17
1/3/17
1/3/17
10
Typical Applications
Typical Applications
Military environments
soldiers, tanks, planes
Emergency operations
search-and-rescue
Personal area
networking
cell phone, laptop, etc.
Civilian environments
meeting rooms, sports
stadiums, hospitals
Education
virtual classrooms,
conferences
Sensor networks
Unit - II Mobile Network Layer
1/3/17
11
1/3/17
12
1/3/17
13
application
application
transport
transport
transport
network
network
network
Data link
Data link
Data link
physical
physical
physical
S wireless link
Source
1/3/17
wireless link
Intermediate node
Destination
14
Why Routing?
Why Routing?
Common objective:
Route packets along the optimal path
Routing protocols adapt to changing network conditions and by
definition offers multi-hop paths
Routing protocols differ in route table
construction
maintenance
update
Next-hop routing protocols can be categorized as:
Link-state
Distance-vector
1/3/17
15
Routing Classification
Routing Classification
Ad hoc Routing
Ad
hoc Routing
Protocols
Protocols
Topology Based
Topology Based
Table Driven
Table Driven
1/3/17
Hybrid
Hybrid
Position Based
Position Based
Location
Location
Services
Services
16
Forwarding
Forwarding
Strategy
Strategy
Topology Based
Topology Based
Table Driven
Table Driven
1/3/17
Hybrid
Hybrid
Position Based
Position Based
ZRP AODV
DSR
TORA
ABR
Location
Location
Services
Services
SSR
17
Forwarding
Forwarding
Strategy
Strategy
1/3/17
18
Routing Protocols
Routing Protocols
Proactive Protocols
1/3/17
19
Protocol Trade-offs
Protocol Trade-offs
Proactive protocols
Always maintain routes
Little or no delay for route determination
Consume bandwidth to keep routes up-to-date
Maintain routes which may never be used
Reactive protocols
Lower overhead since routes are determined on demand
Significant delay in route determination
Employ flooding (global search)
1/3/17
20
1/3/17
21
22
1/3/17
23
S
B
A
B
C
A
H
E
F
J
G
G
H
I
M
M
J
D
D
N
1/3/17
24
[S]
B
A
A
H
F
J
G
G
H
I
M
M
J
D
D
N
[X,Y]
1/3/17
25
S
[S,B]
[S,E]
B
[S,B]
[S,C]
[S,C]
H
I
M
M
J
D
D
N
26
E
F
M
M
A
I
[S,C,G]
D
N
Node C receives RREQ from G and H, but does not forward it again,
because node C has already forwarded RREQ
1/3/17
G
H
[S,E,F]
27
E
[S,E,F,J]
G
H
K
I
[S,C,G,K]
28
[S,E,F,J,M]
G
H
K
I
Node D does not forward RREQ, because node D is the intended target of the
route discovery
1/3/17
29
1/3/17
30
RREP [S,E,F,J,D]
F
G
H
K
I
31
32
1/3/17
33
DATA [S,E,F,J,D]
S
E
F
G
H
K
I
34
node
receives
Route
DATA [S,E,F,J,D]
S
E
F
B
C
J
G
H
K
I
35
D
N
When
node
forwards
Data
B
A
DATA [S,E,F,J,D]
C
G
1/3/17
M
D
N
36
L
N
1/3/17
37
1/3/17
38
collisions
between
route
requests
propagated
by
neighboring nodes
insertion of random delays before forwarding RREQ
Increased contention if too many route replies come back due to
nodes replying using their local cache
Route Reply Storm problem
1/3/17
39
1/3/17
40
1/3/17
41
42
D
E
1/3/17
43
Routing Tables
Routing Tables
information, routing table at A
is -->
B
C
D
E
1/3/17
Cost
Next Hop
44
Next Hop
B
C
D
E
45
B
C
D
E
1/3/17
46
Distance-Vector (Disadvantages)
Distance-Vector (Disadvantages)
A
A
Link 2
Link 4
C
C
Link 1
B
B
D
D
Destination
Link
Hop
Link 4
Link 4
Link 4
Local
Link 6
Link 6
Link 3
Link 5
47
Distance-Vector (Disadvantages)
Distance-Vector (Disadvantages)
Link 2 is broken, Node A routes
packets to C, D, and E through
Node B.
Link 2
Link 1
broken.
Broken
C
Broken
Link 5
Link 3
A.
1/3/17
48
Link 6
and E to be infinity.
Link 4
Distance-Vector (Disadvantages)
Distance-Vector (Disadvantages)
Node A thinks it can route packets to C, D, and E, via Node B.
A routing loop is formed Counting to Infinity problem.
New Solution -> DSDV Protocol
1/3/17
49
1/3/17
50
1/3/17
51
Protocol Overview
Protocol Overview
Each Routing Table List all destinations and number of hops to each
node
Each Route is tagged with a sequence number originated by
destination
Updates are transmitted periodically and when there is any
significant topology change
Routing information is transmitted by broadcast
1/3/17
52
number
originated
from
destination.
Ensures
loop freeness.
Install Time when entry was made (used to delete stale entries from
table)
1/3/17
53
54
1/3/17
55
MH3
MH4
MH2
MH5
MH8
MH6
MH7
MH1
1/3/17
Destination
Next Hop
MH4
Metric
0
MH4
S406_MH4
MH1
MH2
S128_MH1
MH2
MH2
S564_MH2
MH3
MH2
S710_MH3
MH5
MH6
S392_MH5
MH6
MH6
S076_MH6
MH7
MH6
S128_MH7
MH8
MH6
S050_MH8
56
Seq. No
DSDV (Disadvantages)
DSDV (Disadvantages)
Link 2
Broken
Broken
Looping avoided
Link 3
Link 5
E
Network partitions into two
isolated islands
1/3/17
Link 4
57
1/3/17
58
Disadvantages
Overhead: most routing information never used
1/3/17
59
Thank
You
Thank You
1/3/17
60