SlideShare une entreprise Scribd logo
1  sur  35
DSR: The Dynamic Source Routing
Protocol for Multi-Hop Wireless Ad Hoc
Networks
                         Presenter
                 Ashraf Uddin
                  Sujit Singh
           South Asian University
      (Master of Computer Applications)
        http://ashrafsau.blogspot.in/


          http://ashrafsau.blogspot.in/
Routing Overview

 Network with nodes, edges
 Goal: Devise scheme for
 transferring message from one
                                              msg
 node to another
   Destination routing
   Source routing




              http://ashrafsau.blogspot.in/
Source (“path”) routing


 Source specifies entire route: places complete path to

  destination in message header: A – D – F – G

 Intermediate nodes just forward to specified next hop:

  D would look at path in header, forward to F

 Like airline travel – get complete set of tickets to final

  destination before departing…


              http://ashrafsau.blogspot.in/
Destination (“hop-by-hop”) routing


 Source specifies only destination in message header: G

 Intermediate nodes look at destination in

 header, consult internal tables to determine appropriate
 next hop

 Like postal service – specify only the final destination on

 an envelope, and intermediate post offices select where
 to forward next…

             http://ashrafsau.blogspot.in/
Ad Hoc Routing
 Every node participates in routing: no distinction
 between “routers” and “end nodes”

 No external network setup: “self-configuring”

 Especially useful when network topology is dynamic
 (frequent network changes – links break, nodes come
 and go)

               http://ashrafsau.blogspot.in/
Common application
 Mobile wireless hosts
    Only subset within range at

     given time

    Want to communicate with

     any other node




                  http://ashrafsau.blogspot.in/
DSR Protocol Activities
 Route discovery

   Undertaken when source needs a route to a destination

 Route maintenance

   Used when link breaks, rendering specified path

    unusable




                http://ashrafsau.blogspot.in/
Route Discovery
• The source sends a broadcast packet which contains
 source address, destination address, request id and
 path.
• If a host saw the packet before, discards it.
• Otherwise, the route looks up its route caches to
 look for a route to destination, If not find, appends its
 address into the packet, rebroadcast,
• If finds a route in its route cache, sends a route reply
 packet, which is sent to the source by route cache or
 the route discovery.

               http://ashrafsau.blogspot.in/
source broadcasts a packet containing address of source and
destination
  source                        (1,4)
       1
                                               4

                 The destination sends a reply packet to source.
                                                                   8
                     (1,3)                                             destination
                     3
                                                               7
                                                       (1,4,7)
             2
                 The node discards the packets having been seen
     (1,2)
                                                     6
                                    5
                                (1,3,5)            (1,3,5,6)

 The route looks up its route caches to look for a route to destination
 If not find, appends its address into the packet
                   http://ashrafsau.blogspot.in/
How to send a reply packet
 If the destination has a route to the source in its route
  cache, use it

 Else if symmetric links are supported, use the reverse
  of route record

 Else if symmetric links are not supported, the
  destination initiates route discovery to source


                  http://ashrafsau.blogspot.in/
Route Maintenance
 Whenever a node transmits a data packet, a route
  reply, or a route error, it must verify that the next
  hop correctly receives the packet.
 If not, the node must send a route error to the
  node responsible for generating this route header
   Intermediate nodes “eavesdrop”, adjust cached routes
 Source deletes route; tries another if one cached, or
  The source restart the route discovery



               http://ashrafsau.blogspot.in/
Route Maintenance……



A             B                   C     D   E


    Route error message: C-D
            is broken




        http://ashrafsau.blogspot.in/
DSR Optimization: Route Caching
 Each node caches a new route it learns by any means
 When node S finds route [S,E,F,J,D] to node D, node S
    also learns route [S,E,F] to node F
   When node K receives Route Request [S,C,G] destined
    for node, node K learns route [K,G,C,S] to node S
   When node F forwards Route Reply RREP
    [S,E,F,J,D], node F learns route [F,J,D] to node D
   When node E forwards Data [S,E,F,J,D] it learns route
    [E,F,J,D] to node D
   A node may also learn a route when it overhears Data
                http://ashrafsau.blogspot.in/
Additional Route Discovery features




  DSR route discovery does not allow nodes like F to
  reply to RREQ

            http://ashrafsau.blogspot.in/
Additional Route Discovery features




      http://ashrafsau.blogspot.in/
Additional Route Discovery features




      http://ashrafsau.blogspot.in/
Additional Route Discovery features

                                               Node C may infer
 Preventing Route Reply                      that the initiator has
                                               already received a          h=2
 storms
                                               Route Reply giving
   Many Route Reply message                                               C
                                                  a better route
    could be send to A from the                because the data
    A’s neighbors                                packet received
   To avoid a possible local                  from B contains a
    congestion, each nodes must                  value of “h” less
    wait a variable period before               than its h’s value
                                                                       A         B     G
    sending the reply.
   Delay period d = H(h - 1 + r)                                                h=1
   Each node network interfaces
    works into “promiscuous”                        E
    receive mode.
                                                  h=3
                  http://ashrafsau.blogspot.in/
Additional Route Discovery features

 Route request Hop limits
   “Nonpropagating” Route Request(hop lim 0)
       To determine if the target is
                                                   2 Hop limit
        neighbour or a neighbour has a route
                                                   1 Hop limit
        to the target cached.
   “Propagating” Route Request( no hop lim)           Non
                                                   Propagating
     If no route reply is recived after a            Route
                                                     Request     The expanding ring search
                                                                 approach can carry to the
      short timeout.                                             average latency increasing

   “Expanding ring”
     Increase hop value stepwise if no
      route reply is recieved.




                   http://ashrafsau.blogspot.in/
Additional Route Maintenance features




         http://ashrafsau.blogspot.in/
Additional Route Maintenance features




          http://ashrafsau.blogspot.in/
Additional Route Maintenance features




        http://ashrafsau.blogspot.in/
Additional Route Maintenance features




        http://ashrafsau.blogspot.in/
Support for Heterogeneous networks & mobile IP

 Heteregenous network :
         Different kind of devices with different interfaces.
         Possibly , multiple interfaces( short range & long range)




                http://ashrafsau.blogspot.in/
DSR evaluation
 Simulation
    To analyse the behavior and performance of DSR.
    To Compare with other routing protocols
 Set Up:
    Ad hoc of 50 mobiles nodes
    15 minutes ( 900 seconds) simulation time.
    CBR data traffic
    20 mobile nodes traffic sources; 4 packets/sec.
    Random waypoint mobility model ( pause time)



                http://ashrafsau.blogspot.in/
Packet Delivery Ratio(with movement speed 1m/s)




           http://ashrafsau.blogspot.in/
Routing Overhead(with movement speed 1m/s)




          http://ashrafsau.blogspot.in/
Packet Delivery Ratio(with movement speed 20m/s)




            http://ashrafsau.blogspot.in/
Routing Overhead(with movement speed 20m/s)




           http://ashrafsau.blogspot.in/
RESULT
 At both movement speeds, DSR delivers almost all
  data packets, regardless of pause time.
 100% delivery ratio at pause time 900 sec, a stationary
  network.
 At 1 m/s delivery ratio> 99.5%
 At 20 m/s delivery ratio> 98%




               http://ashrafsau.blogspot.in/
Advantages
 Routes maintain only between nodes who need to
  communicate. Reduces overhead of routing
  maintenance.
 route caching reduces route discovery overhead.
 A single route may yield many routes to the
  destination.




              http://ashrafsau.blogspot.in/
Disadvantages

 Packet header size grows with route length due to
  source routing.
 Flood route request may potentially reach all nodes in
  the network.
 Route reply storm problem.




               http://ashrafsau.blogspot.in/
Conclusion

 Excellent performance for routing in multi-hop ad hoc.
 Very low routing overhead.
 Able to deliver almost all originated data packets, even
  with rapid motion of all nodes.




                http://ashrafsau.blogspot.in/
THANKS



http://ashrafsau.blogspot.in/
Reference
[1]. David B. Johnson, David A. Maltz, and Josh
 Broch, "DSR: The Dynamic Source Routing Protocol
 for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc
 Networking, edited by Charles
 E. Perkins, Chapter 5, pp. 139-172, Addison-
 Wesley, 2001. Invited paper.


               http://ashrafsau.blogspot.in/
??????
     QUESTION


??????
http://ashrafsau.blogspot.in/

Contenu connexe

Tendances

WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSIONjunnubabu
 
Mobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerMobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerSonali Chauhan
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocolPradeep Kumar TS
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithmBasit Hussain
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayerRahul Hada
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATIONjunnubabu
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGMohammad Adil
 

Tendances (20)

WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
 
Mobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerMobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen Schiller
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Routing algorithms
Routing algorithmsRouting algorithms
Routing algorithms
 
Mobile IP
Mobile IPMobile IP
Mobile IP
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Distance vector routing
Distance vector routingDistance vector routing
Distance vector routing
 
Mobile transportlayer
Mobile transportlayerMobile transportlayer
Mobile transportlayer
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Routing
RoutingRouting
Routing
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
ENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELINGENCAPSULATION AND TUNNELING
ENCAPSULATION AND TUNNELING
 

En vedette

Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocolnitss007
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksHabibur Rahman
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 

En vedette (6)

Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 
Localization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networksLocalization with mobile anchor points in wireless sensor networks
Localization with mobile anchor points in wireless sensor networks
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 

Similaire à Dynamic source routing

Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksSonali Parab
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networkshuda2018
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.pptImXaib
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAyush Chhangani
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Mumbai Academisc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...ijasuc
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkAcel-Omeran
 

Similaire à Dynamic source routing (20)

Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 
Adhoc (1)
Adhoc (1)Adhoc (1)
Adhoc (1)
 
Dynamic source routing in ad hoc wireless networks
Dynamic source routing  in ad hoc wireless networksDynamic source routing  in ad hoc wireless networks
Dynamic source routing in ad hoc wireless networks
 
RoutingProtocols.ppt
RoutingProtocols.pptRoutingProtocols.ppt
RoutingProtocols.ppt
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Routing
RoutingRouting
Routing
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Ad hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulationAd hoc network-performance_analysis and simulation
Ad hoc network-performance_analysis and simulation
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
Mona
MonaMona
Mona
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)Distributed cache updating for the dynamic source routing protocol(synopsis)
Distributed cache updating for the dynamic source routing protocol(synopsis)
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive...
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
Caching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc networkCaching strategies for on demand routing protocols for wireless ad hoc network
Caching strategies for on demand routing protocols for wireless ad hoc network
 

Plus de Ashraf Uddin

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on rAshraf Uddin
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesAshraf Uddin
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersAshraf Uddin
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in RAshraf Uddin
 

Plus de Ashraf Uddin (7)

A short tutorial on r
A short tutorial on rA short tutorial on r
A short tutorial on r
 
Big Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture CapabilitiesBig Data: Its Characteristics And Architecture Capabilities
Big Data: Its Characteristics And Architecture Capabilities
 
MapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large ClustersMapReduce: Simplified Data Processing on Large Clusters
MapReduce: Simplified Data Processing on Large Clusters
 
Text Mining Infrastructure in R
Text Mining Infrastructure in RText Mining Infrastructure in R
Text Mining Infrastructure in R
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Naive bayes
Naive bayesNaive bayes
Naive bayes
 
Freenet
FreenetFreenet
Freenet
 

Dernier

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Dernier (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Dynamic source routing

  • 1. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks Presenter Ashraf Uddin Sujit Singh South Asian University (Master of Computer Applications) http://ashrafsau.blogspot.in/ http://ashrafsau.blogspot.in/
  • 2. Routing Overview  Network with nodes, edges  Goal: Devise scheme for transferring message from one msg node to another  Destination routing  Source routing http://ashrafsau.blogspot.in/
  • 3. Source (“path”) routing  Source specifies entire route: places complete path to destination in message header: A – D – F – G  Intermediate nodes just forward to specified next hop: D would look at path in header, forward to F  Like airline travel – get complete set of tickets to final destination before departing… http://ashrafsau.blogspot.in/
  • 4. Destination (“hop-by-hop”) routing  Source specifies only destination in message header: G  Intermediate nodes look at destination in header, consult internal tables to determine appropriate next hop  Like postal service – specify only the final destination on an envelope, and intermediate post offices select where to forward next… http://ashrafsau.blogspot.in/
  • 5. Ad Hoc Routing  Every node participates in routing: no distinction between “routers” and “end nodes”  No external network setup: “self-configuring”  Especially useful when network topology is dynamic (frequent network changes – links break, nodes come and go) http://ashrafsau.blogspot.in/
  • 6. Common application  Mobile wireless hosts  Only subset within range at given time  Want to communicate with any other node http://ashrafsau.blogspot.in/
  • 7. DSR Protocol Activities  Route discovery  Undertaken when source needs a route to a destination  Route maintenance  Used when link breaks, rendering specified path unusable http://ashrafsau.blogspot.in/
  • 8. Route Discovery • The source sends a broadcast packet which contains source address, destination address, request id and path. • If a host saw the packet before, discards it. • Otherwise, the route looks up its route caches to look for a route to destination, If not find, appends its address into the packet, rebroadcast, • If finds a route in its route cache, sends a route reply packet, which is sent to the source by route cache or the route discovery. http://ashrafsau.blogspot.in/
  • 9. source broadcasts a packet containing address of source and destination source (1,4) 1 4 The destination sends a reply packet to source. 8 (1,3) destination 3 7 (1,4,7) 2 The node discards the packets having been seen (1,2) 6 5 (1,3,5) (1,3,5,6) The route looks up its route caches to look for a route to destination If not find, appends its address into the packet http://ashrafsau.blogspot.in/
  • 10. How to send a reply packet  If the destination has a route to the source in its route cache, use it  Else if symmetric links are supported, use the reverse of route record  Else if symmetric links are not supported, the destination initiates route discovery to source http://ashrafsau.blogspot.in/
  • 11. Route Maintenance  Whenever a node transmits a data packet, a route reply, or a route error, it must verify that the next hop correctly receives the packet.  If not, the node must send a route error to the node responsible for generating this route header  Intermediate nodes “eavesdrop”, adjust cached routes  Source deletes route; tries another if one cached, or The source restart the route discovery http://ashrafsau.blogspot.in/
  • 12. Route Maintenance…… A B C D E Route error message: C-D is broken http://ashrafsau.blogspot.in/
  • 13. DSR Optimization: Route Caching  Each node caches a new route it learns by any means  When node S finds route [S,E,F,J,D] to node D, node S also learns route [S,E,F] to node F  When node K receives Route Request [S,C,G] destined for node, node K learns route [K,G,C,S] to node S  When node F forwards Route Reply RREP [S,E,F,J,D], node F learns route [F,J,D] to node D  When node E forwards Data [S,E,F,J,D] it learns route [E,F,J,D] to node D  A node may also learn a route when it overhears Data http://ashrafsau.blogspot.in/
  • 14. Additional Route Discovery features DSR route discovery does not allow nodes like F to reply to RREQ http://ashrafsau.blogspot.in/
  • 15. Additional Route Discovery features http://ashrafsau.blogspot.in/
  • 16. Additional Route Discovery features http://ashrafsau.blogspot.in/
  • 17. Additional Route Discovery features Node C may infer  Preventing Route Reply that the initiator has already received a h=2 storms Route Reply giving  Many Route Reply message C a better route could be send to A from the because the data A’s neighbors packet received  To avoid a possible local from B contains a congestion, each nodes must value of “h” less wait a variable period before than its h’s value A B G sending the reply.  Delay period d = H(h - 1 + r) h=1  Each node network interfaces works into “promiscuous” E receive mode. h=3 http://ashrafsau.blogspot.in/
  • 18. Additional Route Discovery features  Route request Hop limits  “Nonpropagating” Route Request(hop lim 0)  To determine if the target is 2 Hop limit neighbour or a neighbour has a route 1 Hop limit to the target cached.  “Propagating” Route Request( no hop lim) Non Propagating  If no route reply is recived after a Route Request The expanding ring search approach can carry to the short timeout. average latency increasing  “Expanding ring”  Increase hop value stepwise if no route reply is recieved. http://ashrafsau.blogspot.in/
  • 19. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 20. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 21. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 22. Additional Route Maintenance features http://ashrafsau.blogspot.in/
  • 23. Support for Heterogeneous networks & mobile IP  Heteregenous network : Different kind of devices with different interfaces. Possibly , multiple interfaces( short range & long range) http://ashrafsau.blogspot.in/
  • 24. DSR evaluation  Simulation  To analyse the behavior and performance of DSR.  To Compare with other routing protocols  Set Up:  Ad hoc of 50 mobiles nodes  15 minutes ( 900 seconds) simulation time.  CBR data traffic  20 mobile nodes traffic sources; 4 packets/sec.  Random waypoint mobility model ( pause time) http://ashrafsau.blogspot.in/
  • 25. Packet Delivery Ratio(with movement speed 1m/s) http://ashrafsau.blogspot.in/
  • 26. Routing Overhead(with movement speed 1m/s) http://ashrafsau.blogspot.in/
  • 27. Packet Delivery Ratio(with movement speed 20m/s) http://ashrafsau.blogspot.in/
  • 28. Routing Overhead(with movement speed 20m/s) http://ashrafsau.blogspot.in/
  • 29. RESULT  At both movement speeds, DSR delivers almost all data packets, regardless of pause time.  100% delivery ratio at pause time 900 sec, a stationary network.  At 1 m/s delivery ratio> 99.5%  At 20 m/s delivery ratio> 98% http://ashrafsau.blogspot.in/
  • 30. Advantages  Routes maintain only between nodes who need to communicate. Reduces overhead of routing maintenance.  route caching reduces route discovery overhead.  A single route may yield many routes to the destination. http://ashrafsau.blogspot.in/
  • 31. Disadvantages  Packet header size grows with route length due to source routing.  Flood route request may potentially reach all nodes in the network.  Route reply storm problem. http://ashrafsau.blogspot.in/
  • 32. Conclusion  Excellent performance for routing in multi-hop ad hoc.  Very low routing overhead.  Able to deliver almost all originated data packets, even with rapid motion of all nodes. http://ashrafsau.blogspot.in/
  • 34. Reference [1]. David B. Johnson, David A. Maltz, and Josh Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks", in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139-172, Addison- Wesley, 2001. Invited paper. http://ashrafsau.blogspot.in/
  • 35. ?????? QUESTION ?????? http://ashrafsau.blogspot.in/