SlideShare une entreprise Scribd logo
1  sur  35
DSR: The Dynamic Source Routing
Protocol for Multi-Hop Wireless Ad Hoc
Networks
                         Presenter
                 Ashraf Uddin
                  Sujit Singh
           South Asian University
      (Master of Computer Applications)
        http://ashrafsau.blogspot.in/


          http://ashrafsau.blogspot.in/
Routing Overview

 Network with nodes, edges
 Goal: Devise scheme for
 transferring message from one
                                              msg
 node to another
   Destination routing
   Source routing




              http://ashrafsau.blogspot.in/
Source (“path”) routing


 Source specifies entire route: places complete path to

  destination in message header: A – D – F – G

 Intermediate nodes just forward to specified next hop:

  D would look at path in header, forward to F

 Like airline travel – get complete set of tickets to final

  destination before departing…


              http://ashrafsau.blogspot.in/
Destination (“hop-by-hop”) routing


 Source specifies only destination in message header: G

 Intermediate nodes look at destination in

 header, consult internal tables to determine appropriate
 next hop

 Like postal service – specify only the final destination on

 an envelope, and intermediate post offices select where
 to forward next…

             http://ashrafsau.blogspot.in/
Ad Hoc Routing
 Every node participates in routing: no distinction
 between “routers” and “end nodes”

 No external network setup: “self-configuring”

 Especially useful when network topology is dynamic
 (frequent network changes – links break, nodes come
 and go)

               http://ashrafsau.blogspot.in/
Common application
 Mobile wireless hosts
    Only subset within range at

     given time

    Want to communicate with

     any other node




                  http://ashrafsau.blogspot.in/
DSR Protocol Activities
 Route discovery

   Undertaken when source needs a route to a destination

 Route maintenance

   Used when link breaks, rendering specified path

    unusable




                http://ashrafsau.blogspot.in/
Route Discovery
• The source sends a broadcast packet which contains
 source address, destination address, request id and
 path.
• If a host saw the packet before, discards it.
• Otherwise, the route looks up its route caches to
 look for a route to destination, If not find, appends its
 address into the packet, rebroadcast,
• If finds a route in its route cache, sends a route reply
 packet, which is sent to the source by route cache or
 the route discovery.

               http://ashrafsau.blogspot.in/
source broadcasts a packet containing address of source and
destination
  source                        (1,4)
       1
                                               4

                 The destination sends a reply packet to source.
                                                                   8
                     (1,3)                                             destination
                     3
                                                               7
                                                       (1,4,7)
             2
                 The node discards the packets having been seen
     (1,2)
                                                     6
                                    5
                                (1,3,5)            (1,3,5,6)

 The route looks up its route caches to look for a route to destination
 If not find, appends its address into the packet
                   http://ashrafsau.blogspot.in/
How to send a reply packet
 If the destination has a route to the source in its route
  cache, use it

 Else if symmetric links are supported, use the reverse
  of route record

 Else if symmetric links are not supported, the
  destination initiates route discovery to source


                  http://ashrafsau.blogspot.in/
Route Maintenance
 Whenever a node transmits a data packet, a route
  reply, or a route error, it must verify that the next
  hop correctly receives the packet.
 If not, the node must send a route error to the
  node responsible for generating this route header
   Intermediate nodes “eavesdrop”, adjust cached routes
 Source deletes route; tries another if one cached, or
  The source restart the route discovery



               http://ashrafsau.blogspot.in/
Route Maintenance……



A             B                   C     D   E


    Route error message: C-D
            is broken




        http://ashrafsau.blogspot.in/
DSR Optimization: Route Caching
 Each node caches a new route it learns by any means
 When node S finds route [S,E,F,J,D] to node D, node S
    also learns route [S,E,F] to node F
   When node K receives Route Request [S,C,G] destined
    for node, node K learns route [K,G,C,S] to node S
   When node F forwards Route Reply RREP
    [S,E,F,J,D], node F learns route [F,J,D] to node D
   When node E forwards Data [S,E,F,J,D] it learns route
    [E,F,J,D] to node D
   A node may also learn a route when it overhears Data
                http://ashrafsau.blogspot.in/
Additional Route Discovery features




  DSR route discovery does not allow nodes like F to
  reply to RREQ

            http://ashrafsau.blogspot.in/
Additional Route Discovery features




      http://ashrafsau.blogspot.in/
Additional Route Discovery features




      http://ashrafsau.blogspot.in/
Additional Route Discovery features

                                               Node C may infer
 Preventing Route Reply                      that the initiator has
                                               already received a          h=2
 storms
                                               Route Reply giving
   Many Route Reply message                                               C
                                                  a better route
    could be send to A from the                because the data
    A’s neighbors                                packet received
   To avoid a possible local                  from B contains a
    congestion, each nodes must                  value of “h” less
    wait a variable period before               than its h’s value
                                                                       A         B     G
    sending the reply.
   Delay period d = H(h - 1 + r)                                                h=1
   Each node network interfaces
    works into “promiscuous”                        E
    receive mode.
                                                  h=3
                  http://ashrafsau.blogspot.in/
Additional Route Discovery features

 Route request Hop limits
   “Nonpropagating” Route Request(hop lim 0)
       To determine if the target is
                                                   2 Hop limit
        neighbour or a neighbour has a route
                                                   1 Hop limit
        to the target cached.
   “Propagating” Route Request( no hop lim)           Non
                                                   Propagating
     If no route reply is recived after a            Route
                                                     Request     The expanding ring search
                                                                 approach can carry to the
      short timeout.                                             average latency increasing

   “Expanding ring”
     Increase hop value stepwise if no
      route reply is recieved.




                   http://ashrafsau.blogspot.in/
Additional Route Maintenance features




         http://ashrafsau.blogspot.in/
Additional Route Maintenance features




          http://ashrafsau.blogspot.in/
Additional Route Maintenance features




        http://ashrafsau.blogspot.in/
Additional Route Maintenance features




        http://ashrafsau.blogspot.in/
Support for Heterogeneous networks & mobile IP

 Heteregenous network :
         Different kind of devices with different interfaces.
         Possibly , multiple interfaces( short range & long range)




                http://ashrafsau.blogspot.in/
DSR evaluation
 Simulation
    To analyse the behavior and performance of DSR.
    To Compare with other routing protocols
 Set Up:
    Ad hoc of 50 mobiles nodes
    15 minutes ( 900 seconds) simulation time.
    CBR data traffic
    20 mobile nodes traffic sources; 4 packets/sec.
    Random waypoint mobility model ( pause time)



                http://ashrafsau.blogspot.in/
Packet Delivery Ratio(with movement speed 1m/s)




           http://ashrafsau.blogspot.in/
Routing Overhead(with movement speed 1m/s)




          http://ashrafsau.blogspot.in/
Packet Delivery Ratio(with movement speed 20m/s)




            http://ashrafsau.blogspot.in/
Routing Overhead(with movement speed 20m/s)




           http://ashrafsau.blogspot.in/
RESULT
 At both movement speeds, DSR delivers almost all
  data packets, regardless of pause time.
 100% delivery ratio at pause time 900 sec, a stationary
  network.
 At 1 m/s delivery ratio> 99.5%
 At 20 m/s delivery ratio> 98%




               http://ashrafsau.blogspot.in/
Advantages
 Routes maintain only between nodes who need to
  communicate. Reduces overhead of routing
  maintenance.
 route caching reduces route discovery overhead.
 A single route may yield many routes to the
  destination.




              http://ashrafsau.blogspot.in/
Disadvantages

 Packet header size grows with route length due to
  source routing.
 Flood route request may potentially reach all nodes in
  the network.
 Route reply storm problem.




               http://ashrafsau.blogspot.in/
Conclusion

 Excellent performance for routing in multi-hop ad hoc.
 Very low routing overhead.
 Able to deliver almost all originated data packets, even
  with rapid motion of all nodes.




                http://ashrafsau.blogspot.in/
THANKS



http://ashrafsau.blogspot.in/
Reference
[1]. David B. Johnson, David A. Maltz, and Josh
 Broch, "DSR: The Dynamic Source Routing Protocol
 for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc
 Networking, edited by Charles
 E. Perkins, Chapter 5, pp. 139-172, Addison-
 Wesley, 2001. Invited paper.


               http://ashrafsau.blogspot.in/
??????
     QUESTION


??????
http://ashrafsau.blogspot.in/

Contenu connexe

Tendances

Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networkingHarshita Yadav
 
Packet switching
Packet switchingPacket switching
Packet switchingasimnawaz54
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR) Pradeep Kumar TS
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmissionRajapriya82
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 

Tendances (20)

Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
switching techniques in data communication and networking
switching techniques in data communication and networkingswitching techniques in data communication and networking
switching techniques in data communication and networking
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Ch 20 UNICAST ROUTING SECTION 2
Ch 20   UNICAST ROUTING  SECTION  2Ch 20   UNICAST ROUTING  SECTION  2
Ch 20 UNICAST ROUTING SECTION 2
 
Location Aided Routing (LAR)
Location Aided Routing (LAR) Location Aided Routing (LAR)
Location Aided Routing (LAR)
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
IPV6 ADDRESS
IPV6 ADDRESSIPV6 ADDRESS
IPV6 ADDRESS
 
Wireless transmission
Wireless transmissionWireless transmission
Wireless transmission
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 

Similaire à Dynamic source routing

Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksSonali Parab
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networkshuda2018
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.pptImXaib
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAyush Chhangani
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Mumbai Academisc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 

Similaire à Dynamic source routing (20)

Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networks
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Routing
RoutingRouting
Routing
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
Mona
MonaMona
Mona
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 

Plus de Ashraf Uddin

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on rAshraf Uddin
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesAshraf Uddin
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersAshraf Uddin
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in RAshraf Uddin
 

Plus de Ashraf Uddin (7)

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on r
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large Clusters
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
Freenet
FreenetFreenet
Freenet
 

Dernier

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Dernier (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 

Dynamic source routing

  • 1. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks Presenter Ashraf Uddin Sujit Singh South Asian University (Master of Computer Applications) http://ashrafsau.blogspot.in/ http://ashrafsau.blogspot.in/
  • 2. Routing Overview  Network with nodes, edges  Goal: Devise scheme for transferring message from one msg node to another  Destination routing  Source routing http://ashrafsau.blogspot.in/
  • 3. Source (“path”) routing  Source specifies entire route: places complete path to destination in message header: A – D – F – G  Intermediate nodes just forward to specified next hop: D would look at path in header, forward to F  Like airline travel – get complete set of tickets to final destination before departing… http://ashrafsau.blogspot.in/
  • 4. Destination (“hop-by-hop”) routing  Source specifies only destination in message header: G  Intermediate nodes look at destination in header, consult internal tables to determine appropriate next hop  Like postal service – specify only the final destination on an envelope, and intermediate post offices select where to forward next… http://ashrafsau.blogspot.in/
  • 5. Ad Hoc Routing  Every node participates in routing: no distinction between “routers” and “end nodes”  No external network setup: “self-configuring”  Especially useful when network topology is dynamic (frequent network changes – links break, nodes come and go) http://ashrafsau.blogspot.in/
  • 6. Common application  Mobile wireless hosts  Only subset within range at given time  Want to communicate with any other node http://ashrafsau.blogspot.in/
  • 7. DSR Protocol Activities  Route discovery  Undertaken when source needs a route to a destination  Route maintenance  Used when link breaks, rendering specified path unusable http://ashrafsau.blogspot.in/
  • 8. Route Discovery • The source sends a broadcast packet which contains source address, destination address, request id and path. • If a host saw the packet before, discards it. • Otherwise, the route looks up its route caches to look for a route to destination, If not find, appends its address into the packet, rebroadcast, • If finds a route in its route cache, sends a route reply packet, which is sent to the source by route cache or the route discovery. http://ashrafsau.blogspot.in/
  • 9. source broadcasts a packet containing address of source and destination source (1,4) 1 4 The destination sends a reply packet to source. 8 (1,3) destination 3 7 (1,4,7) 2 The node discards the packets having been seen (1,2) 6 5 (1,3,5) (1,3,5,6) The route looks up its route caches to look for a route to destination If not find, appends its address into the packet http://ashrafsau.blogspot.in/
  • 10. How to send a reply packet  If the destination has a route to the source in its route cache, use it  Else if symmetric links are supported, use the reverse of route record  Else if symmetric links are not supported, the destination initiates route discovery to source http://ashrafsau.blogspot.in/
  • 11. Route Maintenance  Whenever a node transmits a data packet, a route reply, or a route error, it must verify that the next hop correctly receives the packet.  If not, the node must send a route error to the node responsible for generating this route header  Intermediate nodes “eavesdrop”, adjust cached routes  Source deletes route; tries another if one cached, or The source restart the route discovery http://ashrafsau.blogspot.in/
  • 12. Route Maintenance…… A B C D E Route error message: C-D is broken http://ashrafsau.blogspot.in/
  • 13. DSR Optimization: Route Caching  Each node caches a new route it learns by any means  When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F  When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S  When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D  When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D  A node may also learn a route when it overhears Data http://ashrafsau.blogspot.in/
  • 14. Additional Route Discovery features DSR route discovery does not allow nodes like F to reply to RREQ http://ashrafsau.blogspot.in/
  • 15. Additional Route Discovery features http://ashrafsau.blogspot.in/
  • 16. Additional Route Discovery features http://ashrafsau.blogspot.in/
  • 17. Additional Route Discovery features Node C may infer  Preventing Route Reply that the initiator has already received a h=2 storms Route Reply giving  Many Route Reply message C a better route could be send to A from the because the data A’s neighbors packet received  To avoid a possible local from B contains a congestion, each nodes must value of “h” less wait a variable period before than its h’s value A B G sending the reply.  Delay period d = H(h - 1 + r) h=1  Each node network interfaces works into “promiscuous” E receive mode. h=3 http://ashrafsau.blogspot.in/
  • 18. Additional Route Discovery features  Route request Hop limits  “Nonpropagating” Route Request(hop lim 0)  To determine if the target is 2 Hop limit neighbour or a neighbour has a route 1 Hop limit to the target cached.  “Propagating” Route Request( no hop lim) Non Propagating  If no route reply is recived after a Route Request The expanding ring search approach can carry to the short timeout. average latency increasing  “Expanding ring”  Increase hop value stepwise if no route reply is recieved. http://ashrafsau.blogspot.in/
  • 19. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 20. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 21. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 22. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 23. Support for Heterogeneous networks & mobile IP  Heteregenous network : Different kind of devices with different interfaces. Possibly , multiple interfaces( short range & long range) http://ashrafsau.blogspot.in/
  • 24. DSR evaluation  Simulation  To analyse the behavior and performance of DSR.  To Compare with other routing protocols  Set Up:  Ad hoc of 50 mobiles nodes  15 minutes ( 900 seconds) simulation time.  CBR data traffic  20 mobile nodes traffic sources; 4 packets/sec.  Random waypoint mobility model ( pause time) http://ashrafsau.blogspot.in/
  • 25. Packet Delivery Ratio(with movement speed 1m/s) http://ashrafsau.blogspot.in/
  • 26. Routing Overhead(with movement speed 1m/s) http://ashrafsau.blogspot.in/
  • 27. Packet Delivery Ratio(with movement speed 20m/s) http://ashrafsau.blogspot.in/
  • 28. Routing Overhead(with movement speed 20m/s) http://ashrafsau.blogspot.in/
  • 29. RESULT  At both movement speeds, DSR delivers almost all data packets, regardless of pause time.  100% delivery ratio at pause time 900 sec, a stationary network.  At 1 m/s delivery ratio> 99.5%  At 20 m/s delivery ratio> 98% http://ashrafsau.blogspot.in/
  • 30. Advantages  Routes maintain only between nodes who need to communicate. Reduces overhead of routing maintenance.  route caching reduces route discovery overhead.  A single route may yield many routes to the destination. http://ashrafsau.blogspot.in/
  • 31. Disadvantages  Packet header size grows with route length due to source routing.  Flood route request may potentially reach all nodes in the network.  Route reply storm problem. http://ashrafsau.blogspot.in/
  • 32. Conclusion  Excellent performance for routing in multi-hop ad hoc.  Very low routing overhead.  Able to deliver almost all originated data packets, even with rapid motion of all nodes. http://ashrafsau.blogspot.in/
  • 34. Reference [1]. David B. Johnson, David A. Maltz, and Josh Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139-172, Addison- Wesley, 2001. Invited paper. http://ashrafsau.blogspot.in/
  • 35. ?????? QUESTION ?????? http://ashrafsau.blogspot.in/