SlideShare a Scribd company logo
EC8702 AD HOC AND
WIRELESS SENSOR
NETWORKS
Dr.Arun Chokkalingam
Professor
Department of Electronics and Communication
RMK College of Engineering and Technology
Chennai.
UNIT-1- MANET Routing Protocols
Content
1. Introduction about routing
2. Issues in designing a routing protocol
3. Characteristics of an ideal routing protocol
4. Classifications of routing protocols
MANET Protocol Stack
Three important functions of Network
layer :
1.Path determination: identifying path
between source to destination.
2.Switching: move packets from
router’s input to appropriate router
output
3. Addressing: Addressing is
necessary to identify each device on
the network uniquely.
Introduction
• The neighbors can communicate
directly and no routing is required.
But. If A and C want to communicate
with each other, they must seek help
from node B
• Nodes A knows about B and C knows
about B , so both A and C can use B as
an intermediate node for their
communications.
• Simple neighbor information could be
used here
Cont.
• With the addition of node D, we have several options to
exchange data from A can take the path, A-B-C or A-D-C
or A-D-B-C or A-B-D-C. this is where we need to employ
efficient mechanism or logic for routing the packet in
the best possible way.
• The whole scenario gets
even more complicated
with the increase of the
number of nodes in the network.
ROUTING PROTOCOLS FOR AD HOC
WIRELESS NETWORKS
• Traditional wired networks routing protocols are suitable
for ad hoc wireless networks.
Major Challenges or Issues in Designing a
Routing Protocol
1. Mobility of nodes,
2. Bandwidth Constraint
3. Error-prone channel state,
4. Hidden and Exposed terminal
problems.
5. Resource Constraints
Cont..
1.Mobility
• highly dynamic due to the movement of nodes
• Frequent path breaks.
• Must be able to perform efficient and effective mobility
management .
2.Bandwidth Constraint
• The radio band is limited
• Routing protocols use the bandwidth optimally by keeping the
overhead as low as possible.
• Due to the frequent changes in topology, results in more bandwidth
wastage
Cont.
3.Error-Prone Shared Broadcast Radio Channel
• The wireless links have time-varying
characteristics in terms of link capacity and link-
error probability.
• Ad hoc wireless networks result in collisions of
data and control packets.
• It is required that ad hoc wireless network routing
protocols find paths with less congestion.
4. Hidden and Exposed Terminal
Problems
• The hidden terminal problem refers to the collision of
packets at a receiving node due to the simultaneous
transmission of those nodes that are not within the
direct transmission range of the sender, but are within
the transmission range of the receiver.
• Collision occurs when both nodes transmit packets at
the same time without knowing about the transmission
of each other.
Exposed Terminal Problems
• The exposed terminal problem refers to the inability of a
node which is blocked due to transmission by a nearby
transmitting node to transmit to another node.
Solution for Hidden and Exposed
Terminal Problems
• Medium access collision avoidance
for wireless (MACAW)
• A two-way handshake control
protocol called the (request to send
/ clear to send) protocol exchange.
• RTS/CTS is the optional mechanism
used by the 802.11 wireless
networking protocol to reduce
frame collisions introduced by the
hidden node problem
5.Resource Constraints
• Two essential and limited resources that form the major
constraint for the nodes in an ad hoc wireless network
are battery life and processing power.
• Routing protocols must optimally manage these
resources.
Characteristics of an Ideal Routing
Protocol
1. Must be fully distributed, no central coordination.
2. Must be adaptive to frequent topology changes caused by the
mobility of nodes.
3. Route computation and maintenance must involve a minimum
number of nodes; that is, minimum connection setup time is desired.
4. Must be localized, as global state maintenance involves a huge
state propagation control overhead.
5. It must be loop-free and free from out dated routes.
Cont..
6. The number of packet collisions must be a minimum and the transmissions
should be reliable
7. It must converge to optimal routes once the network topology becomes
stable. The convergence must be quick.
8. It must optimally use resources such as bandwidth, computing power,
memory, and battery power.
9. Every node in the network should try to store information regarding the
stable local topology only. Changes in remote parts of the network must not
cause updates in the topology information maintained by the node.
10. It should provide QoS guarantees to support time-sensitive traffic
CLASSIFICATIONS OF ROUTING
PROTOCOLS
1. Based on routing information update mechanism
• Proactive (table-driven) routing protocols;
• Reactive (on-demand) routing protocols;
• Hybrid protocols.
2. Based on usage of temporal information
• Past temporal information;
• Future temporal information.
3. Based on the routing topology
• Flat topology routing protocols:
• Hierarchical topology routing protocols:
4. Routing based on utilization of specific resources:
• Power-aware routing;
• Geographical information assisted routing.
CLASSIFICATIONS OF ROUTING
PROTOCOLS
Cont..
1.Based on routing information update
mechanism
Proactive routing protocols
• In table-driven routing protocols, every node maintains
the network topology information in the form of routing
tables by periodically exchanging routing information.
• Sometimes called as table driven routing protocols
• Periodic update is required
Reactive routing protocols
• Protocols that fall under this category do not maintain
the network topology information.
• They obtain the necessary path when it is required, by
using a connection establishment process.
• Hence these protocols do not exchange routing
information periodically.
• Reactive protocols are also known as on demand routing
protocols.
Hybrid routing protocols
• Often reactive or proactive feature of a particular
routing protocol might not be enough.
• Instead a mixture might yield better solution, hence, in
the recent days, several hybrid protocols are also
proposed
• The hybrid protocols include some of the characteristics
of proactive protocols and some of the characteristics
of reactive protocols .
2.Based on usage of temporal information
Routing protocols using past temporal information:
• These routing protocols use information about the past status
of the links at the time of routing to make routing decisions
Routing protocols that use future temporal information:
• Protocols belonging to this category use information about the
expected future status of the wireless links to make
approximate routing decisions
• which is based on the remaining battery charge and discharge
rate, prediction of location, and prediction of link availability
3.Based on the Routing Topology
• Ad hoc wireless networks, due to their relatively smaller number of nodes, can make
use of either a flat topology or a hierarchical topology for routing.
1. Flat topology routing protocols:
• Protocols that fall under this category make use of a flat addressing scheme
similar to IEEE 802.3 Ethernet LANs.
• Flat routing protocol distributes routing information to routers that are connected
to each other without any organization or segmentation structure between them.
2. Hierarchical topology routing protocols:
• Protocols belonging to this category make use of a logical hierarchy in the
network and an associated addressing scheme.
• The hierarchy could be based on geographical information or it could be based on
hop distance.
4.Based on the Utilization of Specific
Resources
1. Power-aware routing:
• The routing decisions are based on minimizing the
power consumption either locally or globally in the
network.
2. Geographical information assisted routing:
• Protocols belonging to this category improve the
performance of routing and reduce the control overhead
by effectively utilizing the geographical information
available.
Thank you
Ad

More Related Content

What's hot (20)

Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
Dushhyant Kumar
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Wlan architecture
Wlan architectureWlan architecture
Wlan architecture
Vishal Verma
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
@zenafaris91
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Satellite link design
Satellite link designSatellite link design
Satellite link design
RAVIKIRAN ANANDE
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
Suneel Varma
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysis
CKSunith1
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
AJAL A J
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
Dushhyant Kumar
 
WIRELESS TRANSMISSION
WIRELESS TRANSMISSIONWIRELESS TRANSMISSION
WIRELESS TRANSMISSION
junnubabu
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Network architecture
Network architectureNetwork architecture
Network architecture
Online
 
Multiple Access in wireless communication
Multiple Access in wireless communicationMultiple Access in wireless communication
Multiple Access in wireless communication
Maulik Togadiya
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
Dr Rajiv Srivastava
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
anushkashastri
 
Chapter10 switching
Chapter10 switchingChapter10 switching
Chapter10 switching
Suneel Varma
 
Link power and rise time budget analysis
Link power and rise time budget analysisLink power and rise time budget analysis
Link power and rise time budget analysis
CKSunith1
 

Similar to MANET routing protocols Issues and Classifications (20)

Routing in Ad hoc networks
Routing in Ad hoc networksRouting in Ad hoc networks
Routing in Ad hoc networks
Tran Thang
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
BinyamBekeleMoges
 
manet.pdf
manet.pdfmanet.pdf
manet.pdf
JJospinJeya
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
MohitKumarSingh71
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
anushaj46
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
Anushiya Ram
 
8. MANET 9. WSN1.pdf____________________
8. MANET   9. WSN1.pdf____________________8. MANET   9. WSN1.pdf____________________
8. MANET 9. WSN1.pdf____________________
tesfayeamare534
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
Rama Raman
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
OscarKelvinNsitu
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
AjayTiwari301041
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
karthiksmart21
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale1
 
Chapter 1 ppt by dmb
Chapter 1 ppt by dmbChapter 1 ppt by dmb
Chapter 1 ppt by dmb
dhanashrisabale1
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
21viveksingh
 
Unit_1.pptx
Unit_1.pptxUnit_1.pptx
Unit_1.pptx
Mayura shelke
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
ushabarad142
 
Routing in Ad hoc networks
Routing in Ad hoc networksRouting in Ad hoc networks
Routing in Ad hoc networks
Tran Thang
 
MC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptxMC Lecture 8 67875667767777775677887.pptx
MC Lecture 8 67875667767777775677887.pptx
BinyamBekeleMoges
 
Module 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 pptModule 3 Part B - computer networks module 2 ppt
Module 3 Part B - computer networks module 2 ppt
anushaj46
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
Anushiya Ram
 
8. MANET 9. WSN1.pdf____________________
8. MANET   9. WSN1.pdf____________________8. MANET   9. WSN1.pdf____________________
8. MANET 9. WSN1.pdf____________________
tesfayeamare534
 
MobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptxMobileAdHocRoutingProtocols.pptx
MobileAdHocRoutingProtocols.pptx
HirazNor
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
Ad-hoc routing protocols
Ad-hoc routing protocolsAd-hoc routing protocols
Ad-hoc routing protocols
Rama Raman
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
 
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdfDCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
DCN-321-Chiwaya_Lesson7_DataElements_Switching.pdf
OscarKelvinNsitu
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
AjayTiwari301041
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
karthiksmart21
 
Chapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMBChapter 1 Introduction to computer networks ppt by DMB
Chapter 1 Introduction to computer networks ppt by DMB
dhanashrisabale1
 
Networking and Internetworking Devices
Networking and Internetworking DevicesNetworking and Internetworking Devices
Networking and Internetworking Devices
21viveksingh
 
Ad

More from ArunChokkalingam (15)

FM - Ratio Detector.pptx
FM - Ratio Detector.pptxFM - Ratio Detector.pptx
FM - Ratio Detector.pptx
ArunChokkalingam
 
FM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptxFM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptx
ArunChokkalingam
 
FM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptxFM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptx
ArunChokkalingam
 
FM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptxFM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptx
ArunChokkalingam
 
Introduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptxIntroduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptx
ArunChokkalingam
 
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptxGeneration of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
ArunChokkalingam
 
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptxGeneration of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
ArunChokkalingam
 
Comparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptxComparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptx
ArunChokkalingam
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
ArunChokkalingam
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
ArunChokkalingam
 
Multimedia Components
Multimedia Components Multimedia Components
Multimedia Components
ArunChokkalingam
 
FM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptxFM-Foster - Seeley Discriminator.pptx
FM-Foster - Seeley Discriminator.pptx
ArunChokkalingam
 
FM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptxFM-Balanced Slope Detector.pptx
FM-Balanced Slope Detector.pptx
ArunChokkalingam
 
FM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptxFM Demodulator Slope Detector.pptx
FM Demodulator Slope Detector.pptx
ArunChokkalingam
 
Introduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptxIntroduction about Angle Modulation (FM&PM).pptx
Introduction about Angle Modulation (FM&PM).pptx
ArunChokkalingam
 
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptxGeneration of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
Generation of DSB-SC using Diode Ring Modulator or chopper Modulator.pptx
ArunChokkalingam
 
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptxGeneration of AM-DSB-SC using Balanced FET Modulator.pptx
Generation of AM-DSB-SC using Balanced FET Modulator.pptx
ArunChokkalingam
 
Comparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptxComparison of Amplitude Modulation Techniques.pptx
Comparison of Amplitude Modulation Techniques.pptx
ArunChokkalingam
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
ArunChokkalingam
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Classifications of wireless adhoc networks
Classifications of wireless adhoc networksClassifications of wireless adhoc networks
Classifications of wireless adhoc networks
ArunChokkalingam
 
Ad

Recently uploaded (20)

Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Using the Artificial Neural Network to Predict the Axial Strength and Strain ...
Journal of Soft Computing in Civil Engineering
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Uses of drones in civil construction.pdf
Uses of drones in civil construction.pdfUses of drones in civil construction.pdf
Uses of drones in civil construction.pdf
surajsen1729
 
Autodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User InterfaceAutodesk Fusion 2025 Tutorial: User Interface
Autodesk Fusion 2025 Tutorial: User Interface
Atif Razi
 
Automatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and BeyondAutomatic Quality Assessment for Speech and Beyond
Automatic Quality Assessment for Speech and Beyond
NU_I_TODALAB
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
acid base ppt and their specific application in food
acid base ppt and their specific application in foodacid base ppt and their specific application in food
acid base ppt and their specific application in food
Fatehatun Noor
 
hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .hypermedia_system_revisit_roy_fielding .
hypermedia_system_revisit_roy_fielding .
NABLAS株式会社
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink DisplayHow to Build a Desktop Weather Station Using ESP32 and E-ink Display
How to Build a Desktop Weather Station Using ESP32 and E-ink Display
CircuitDigest
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 

MANET routing protocols Issues and Classifications

  • 1. EC8702 AD HOC AND WIRELESS SENSOR NETWORKS Dr.Arun Chokkalingam Professor Department of Electronics and Communication RMK College of Engineering and Technology Chennai. UNIT-1- MANET Routing Protocols
  • 2. Content 1. Introduction about routing 2. Issues in designing a routing protocol 3. Characteristics of an ideal routing protocol 4. Classifications of routing protocols
  • 3. MANET Protocol Stack Three important functions of Network layer : 1.Path determination: identifying path between source to destination. 2.Switching: move packets from router’s input to appropriate router output 3. Addressing: Addressing is necessary to identify each device on the network uniquely.
  • 4. Introduction • The neighbors can communicate directly and no routing is required. But. If A and C want to communicate with each other, they must seek help from node B • Nodes A knows about B and C knows about B , so both A and C can use B as an intermediate node for their communications. • Simple neighbor information could be used here
  • 5. Cont. • With the addition of node D, we have several options to exchange data from A can take the path, A-B-C or A-D-C or A-D-B-C or A-B-D-C. this is where we need to employ efficient mechanism or logic for routing the packet in the best possible way. • The whole scenario gets even more complicated with the increase of the number of nodes in the network.
  • 6. ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORKS • Traditional wired networks routing protocols are suitable for ad hoc wireless networks.
  • 7. Major Challenges or Issues in Designing a Routing Protocol 1. Mobility of nodes, 2. Bandwidth Constraint 3. Error-prone channel state, 4. Hidden and Exposed terminal problems. 5. Resource Constraints
  • 8. Cont.. 1.Mobility • highly dynamic due to the movement of nodes • Frequent path breaks. • Must be able to perform efficient and effective mobility management . 2.Bandwidth Constraint • The radio band is limited • Routing protocols use the bandwidth optimally by keeping the overhead as low as possible. • Due to the frequent changes in topology, results in more bandwidth wastage
  • 9. Cont. 3.Error-Prone Shared Broadcast Radio Channel • The wireless links have time-varying characteristics in terms of link capacity and link- error probability. • Ad hoc wireless networks result in collisions of data and control packets. • It is required that ad hoc wireless network routing protocols find paths with less congestion.
  • 10. 4. Hidden and Exposed Terminal Problems • The hidden terminal problem refers to the collision of packets at a receiving node due to the simultaneous transmission of those nodes that are not within the direct transmission range of the sender, but are within the transmission range of the receiver. • Collision occurs when both nodes transmit packets at the same time without knowing about the transmission of each other.
  • 11. Exposed Terminal Problems • The exposed terminal problem refers to the inability of a node which is blocked due to transmission by a nearby transmitting node to transmit to another node.
  • 12. Solution for Hidden and Exposed Terminal Problems • Medium access collision avoidance for wireless (MACAW) • A two-way handshake control protocol called the (request to send / clear to send) protocol exchange. • RTS/CTS is the optional mechanism used by the 802.11 wireless networking protocol to reduce frame collisions introduced by the hidden node problem
  • 13. 5.Resource Constraints • Two essential and limited resources that form the major constraint for the nodes in an ad hoc wireless network are battery life and processing power. • Routing protocols must optimally manage these resources.
  • 14. Characteristics of an Ideal Routing Protocol 1. Must be fully distributed, no central coordination. 2. Must be adaptive to frequent topology changes caused by the mobility of nodes. 3. Route computation and maintenance must involve a minimum number of nodes; that is, minimum connection setup time is desired. 4. Must be localized, as global state maintenance involves a huge state propagation control overhead. 5. It must be loop-free and free from out dated routes.
  • 15. Cont.. 6. The number of packet collisions must be a minimum and the transmissions should be reliable 7. It must converge to optimal routes once the network topology becomes stable. The convergence must be quick. 8. It must optimally use resources such as bandwidth, computing power, memory, and battery power. 9. Every node in the network should try to store information regarding the stable local topology only. Changes in remote parts of the network must not cause updates in the topology information maintained by the node. 10. It should provide QoS guarantees to support time-sensitive traffic
  • 16. CLASSIFICATIONS OF ROUTING PROTOCOLS 1. Based on routing information update mechanism • Proactive (table-driven) routing protocols; • Reactive (on-demand) routing protocols; • Hybrid protocols. 2. Based on usage of temporal information • Past temporal information; • Future temporal information. 3. Based on the routing topology • Flat topology routing protocols: • Hierarchical topology routing protocols: 4. Routing based on utilization of specific resources: • Power-aware routing; • Geographical information assisted routing.
  • 19. 1.Based on routing information update mechanism Proactive routing protocols • In table-driven routing protocols, every node maintains the network topology information in the form of routing tables by periodically exchanging routing information. • Sometimes called as table driven routing protocols • Periodic update is required
  • 20. Reactive routing protocols • Protocols that fall under this category do not maintain the network topology information. • They obtain the necessary path when it is required, by using a connection establishment process. • Hence these protocols do not exchange routing information periodically. • Reactive protocols are also known as on demand routing protocols.
  • 21. Hybrid routing protocols • Often reactive or proactive feature of a particular routing protocol might not be enough. • Instead a mixture might yield better solution, hence, in the recent days, several hybrid protocols are also proposed • The hybrid protocols include some of the characteristics of proactive protocols and some of the characteristics of reactive protocols .
  • 22. 2.Based on usage of temporal information Routing protocols using past temporal information: • These routing protocols use information about the past status of the links at the time of routing to make routing decisions Routing protocols that use future temporal information: • Protocols belonging to this category use information about the expected future status of the wireless links to make approximate routing decisions • which is based on the remaining battery charge and discharge rate, prediction of location, and prediction of link availability
  • 23. 3.Based on the Routing Topology • Ad hoc wireless networks, due to their relatively smaller number of nodes, can make use of either a flat topology or a hierarchical topology for routing. 1. Flat topology routing protocols: • Protocols that fall under this category make use of a flat addressing scheme similar to IEEE 802.3 Ethernet LANs. • Flat routing protocol distributes routing information to routers that are connected to each other without any organization or segmentation structure between them. 2. Hierarchical topology routing protocols: • Protocols belonging to this category make use of a logical hierarchy in the network and an associated addressing scheme. • The hierarchy could be based on geographical information or it could be based on hop distance.
  • 24. 4.Based on the Utilization of Specific Resources 1. Power-aware routing: • The routing decisions are based on minimizing the power consumption either locally or globally in the network. 2. Geographical information assisted routing: • Protocols belonging to this category improve the performance of routing and reduce the control overhead by effectively utilizing the geographical information available.
  翻译: