Subject Name: Computer Networks - II Subject Code: 10CS64

Slides:



Advertisements
Similar presentations
Routing protocols in Mobile Ad Hoc Network
Advertisements

1 A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks By Lei Chen.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Network Layer Routing Issues (I). Infrastructure vs. multi-hop Infrastructure networks: Infrastructure networks: ◦ One or several Access-Points (AP) connected.
Overview of Ad Hoc Routing Protocols. Overview 1.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Multicasting in Mobile Ad-Hoc Networks (MANET)
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Mobile Ad-hoc Networks (manets)
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Routing Security in Ad Hoc Networks
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
A Review of Current Routing Potocols for Ad-Hoc Mobile Wireless Networks Yibo Sun
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad-hoc On-Demand Distance Vector Routing (AODV) Sirisha R. Medidi.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Ad Hoc Wireless Routing COS 461: Computer Networks
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
Mobile Ad-Hoc Networking By Jared Roberts. Overview What is a MANET? What is a MANET? Problems with routing in a MANET Problems with routing in a MANET.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Scalable Routing Protocols for Mobile Ad Hoc Networks Xiaoyan Hong, Kaixin Xu, and Mario Gerla at UCLA.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
Mobile Adhoc Network: Routing Protocol:AODV
Routing in Ad Hoc Networks Audun Søberg Henriksen Truls Becken.
Ad hoc On-demand Distance Vector (AODV) Routing Protocol ECE 695 Spring 2006.
Ad-hoc On-Demand Distance Vector Routing (AODV) and simulation in network simulator.
PERFORMANCE ANALYSIS OF AODV, OLSR, DSR AND GRP ROUTING PROTOCOL OF MOBILE ADHOC NETWORK – A REVIEW IJCSMC, Vol. 2, Issue. 6, June 2013, pg.359 – 362 Suchita.
ROUTING ALGORITHMS IN AD HOC NETWORKS
Routing Protocols of On- Demand Dynamic Source Routing (DSR) Ad-Hoc On-Demand Distance Vector (AODV)
Routing Protocols for Mobile Ad-Hoc Networks By : Neha Durwas For: Professor U.T. Nguyen COSC 6590.
1 Ad Hoc On-Demand Distance Vector Routing (AODV) Dr. R. B. Patel.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
#1 EETS 8316/NTU CC725-N/TC/ Routing - Circuit Switching  Telephone switching was hierarchical with only one route possible —Added redundant routes.
Doc.: IEEE /1047r0 Submission Month 2000August 2004 Avinash Joshi, Vann Hasty, Michael Bahr.Slide 1 Routing Protocols for MANET Avinash Joshi,
Intro DSR AODV OLSR TRBPF Comp Concl 4/12/03 Jon KolstadAndreas Lundin CS Ad-Hoc Routing in Wireless Mobile Networks DSR AODV OLSR TBRPF.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Fundamentals of Computer Networks ECE 478/578
Doc.: IEEE /0174r1 Submission Hang Liu, et al. March 2005 Slide 1 A Routing Protocol for WLAN Mesh Hang Liu, Jun Li, Saurabh Mathur {hang.liu,
Energy Efficiency Energy consumption is the most important factor to determine the life of sensor network. since sensors networks has low power resources,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Mobile Ad Hoc Networks. What is a MANET (Mobile Ad Hoc Networks)? Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between.
Author:Zarei.M.;Faez.K. ;Nya.J.M.
Mobile Ad Hoc Networks: Introduction
Mobile and wireless networking
Lecture 28 Mobile Ad hoc Network Dr. Ghalib A. Shah
Kyle Fitzpatrick Konstantin Zak
Ad-hoc Networks.
Routing design goals, challenges,
Internet Networking recitation #4
A comparison of Ad-Hoc Routing Protocols
Routing Protocols in MANETs
Sensor Network Routing
CSE 4340/5349 Mobile Systems Engineering
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Mobile and Wireless Networking
Mobile Computing CSE 40814/60814 Spring 2018.
by Saltanat Mashirova & Afshin Mahini
Proactive vs. Reactive Routing
Routing.
Routing in Mobile Ad-hoc Networks
Vinay Singh Graduate school of Software Dongseo University
A Routing Protocol for WLAN Mesh
DSDV Destination-Sequenced Distance-Vector Routing Protocol
Routing protocols in Mobile Ad Hoc Network
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
A Talk on Mobile Ad hoc Networks (Manets)
Presentation transcript:

Subject Name: Computer Networks - II Subject Code: 10CS64 Prepared By: Madhuleena Das, Santhiya M Department: Computer Science & Engineering Date : 16.5.15 11/21/2018

Wireless Ad-hoc & sensor network Engineered for Tomorrow Date 16-05-15 By, Madhuleena Das, Assistant Professor Dept of CSE MVJCE, B’Lore

Overview of Wireless Ad-Hoc Networks Wireless mobile ad-hoc network (MANET) technology is designed for the establishment of a network anywhere and anytime, without any fixed infrastructure to support the mobility of the users in the network. In other words, a wireless ad-hoc network is a collection of mobile nodes with a dynamic network infrastructure forming a temporary network. No central server or base station for providing connectivity

Ad-hoc networks have several types of applications Rescue operations. In an emergency public disaster, such as an earthquake, ad-hoc networks can be set up at a location where no infrastructure is present. Military. Ad-hoc networks can be used in a battle zone, for a military command and mobile units. Law enforcement and security operations. An ad-hoc network can be used in a temporary security operation, acting as a mobile surveillance network. Home networks. An ad-hoc network can be used to support seamless connectivity among various devices. Conferencing. Ad-hoc networks can be set up for a presentation.

Classification of Routing Protocols Ad-hoc routing protocols can be classified into two broad categories: Centralized versus distributed. In centralized routing protocols, the routing decision is made at a central node. In distributed routing protocols, the routing decision is made by all the network nodes. Static versus adaptive. In static routing protocols, a route of a source/destination pair does not change because of any traffic condition or link failure. In adaptive routing protocols, routes may change because of any congestion.

Table-Driven Routing Protocols Table-driven, or proactive, routing protocols find routes to all possible destinations ahead of time. are needed. The routes are recorded in the nodes' routing tables and are updated within the predefined intervals. Proactive protocols are faster in decision making but need more time to converge to a steady state, causing problems if the topology of the network continually changes.

Source-Initiated Routing Protocols Source-initiated, or reactive, routing protocols, are on-demand procedures and create routes only when requested to do so by source nodes. A route request initiates a route-discovery process in the network and is completed once a route is discovered.

Routing Protocols for Ad-Hoc Networks Table-driven protocols are Destination-Sequenced Distance Vector (DSDV) protocol, Cluster-Head Gateway Switch Routing (CGSR) protocol, and Wireless Routing Protocol (WRP). Source-initiated, or reactive, routing protocols are Dynamic source Routing (DSR) protocol Temporally Ordered Routing Algorithm (TORA) Associative Based Routing (ABR) protocol Ad Hoc On Demand Distance Vector (AODV) protocol

Destination-Sequenced Distance Vector (DSDV) Protocol The DSDV is table driven based routing algorithm. DSDV is improved version of Bellman Ford routing algorithm. Each DSDV node maintain two routing tables: - table for forwarding packets, and table for advertising incremental updates. The nodes will maintain a routing table that consists of a sequence number. The routing table periodically exchanged so that every node will have latest information. DSDV is suitable for small networks.

The algorithm works as follows A node or a mobile device will make an update in its routing table and send the information to its neighbor upon receiving the updated information and make an update in its own routing table. The update is made by comparing the sequence number received is greater than present sequence number than the new one will be used. If there is a link failure in one of the node will change the metric value to infinity and broadcast the message.

Cluster-Head Gateway Switch Routing Protocol (CGSR) CGSR is also a table driven routing protocol. In this algorithm the mobile devices will be grouped to form a cluster the grouping is based on the range and each cluster is controlled by cluster head. All the mobile devices will maintain 2 tables cluster member table and routing table. The cluster member table will have the information about the cluster head for each destination the routing table will have routing information. In this protocol the packet cannot be directly sent to the destination instead cluster heads are used for routing. CGSR routing involves cluster routing, where a node finds the best route over cluster heads from the cluster member table.

Wireless Routing Protocol (WRP) The Wireless Routing Protocol (WRP) is a table-based protocol maintaining routing information among all nodes in the network. This protocol is based on the distributed Bellman-Ford algorithm. The main advantage of WRP is that it reduces the number of routing loops. With this protocol, each node in a network maintains four tables, as follows:

Distance table, which holds the destination, next hop, distance, and predecessors of each destination and each neighbor. Routing table, which saves the destination address, next hop, distance, predecessor, and a marker for each destination, specifying whether that entry corresponds to a simple path. Link-cost table, which provides the link cost to each neighbor and also the number of periodic update periods elapsed since the node received any error-freemessage from it. Message transmission-list table, which records which updates in an update message are to be retransmitted and which neighbors need to acknowledge the retransmission. The table provides the sequence number of the update message, a retransmission counter, acknowledgments, and a list of updates sent in the update message.

Dynamic Source Routing (DSR) Protocol DSR is a source initiated or on demand routing protocol in which source finds unexpired route to the destination to send the packet. It is used in the network where mobile nodes move with moderate speed. Overhead is significantly reduced, since nodes do not exchange routing table information.it has 2 phases. Route discovery Route maintenance

Route discovery and maintenance The source which wants to send the information to the destination will create a route request message by adding its own identification number and broadcasts them in the network. The intermediate nodes will continue the broadcast but adding their own identification number. When the destination is reached a route reply message is generated which will be sent back to the source. The source can receive multiple route replies indicating the presence of multiple paths. The source will pick up one of the path and will use for transmission. If there is a link failure one of the node will detect and will create a route error message which will be sent back to the source in this case the path has to be re-established for further transmission.

Temporally Ordered Routing Algorithm (TORA) The Temporally Ordered Routing Algorithm (TORA) is a source-initiated routing algorithm and, thus, creates multiple routes for any source/destination pair. The advantage of multiple routes to a destination is that route discovery is not required for every alteration in the network topology. This feature conserves bandwidth usage and increases adaptability to topological changes by reducing communication overhead. TORA is based on the following three rules: 1. Route creation/discovery 2. Route maintenance 3. Route erasure

A receiving node processes a query packet as follows TORA uses three types of packets: Query Packets for route creation, Update Packets for both creation and maintenance, Clear Packets for route erasure A receiving node processes a query packet as follows If the receiving node realizes that there is no further downstream links, the query packet is again broadcaster. Otherwise the node discards the packet If the receiving node realizes that there is at least one downstream link, the node updates its routing table to the new value and broadcasts an update packet It performs efficient routing in large networks and in mildly congested networks

Associative-Based Routing (ABR) Protocol ABR is an efficient on-demand or source initiated routing protocol. In ABR, the destination node decides the best route, using node associativity. ABR is suitable for small networks, as it provides fast route discovery and creates shortest paths through associativity. Each node keeps track of associativity information by sending messages periodically. If the associativity value is more means nodes mobility is less. If the associativity value is less means nodes mobility is more.

The broadcast continues as long as destination is reached In ABR the source which wants to send the packet to the destination will create a query packet and broadcast in the network. Query packet generation is required for discovering the route. The broadcast continues as long as destination is reached Once the destination is reached it creates the reply packet and sends back to the source. The query packet will have the following information. Source id Destination id All intermediate node id Sequence number CRC and Time to live [TTL]

Ad-Hoc On-Demand Distance Vector (AODV) Protocol The Ad-Hoc On-Demand Distance Vector (AODV) routing protocol is an improvement over DSDV and is a source-initiated routing scheme capable of both unicast and multicast routing. AODV establishes a required route only when it is needed as opposed to maintaining a complete list of routes, with DSDV.

The algorithm consist of 2 phases 1. Route discovery phase 2. Route maintenance phase In route discovery phase the path from source to destination is identified by broadcasting route request packet [RREQ]. When the intermediate node receive RREQ they will create a backward pointer and continue the broadcast when the route request packet reaches the destination a route reply would be generated [RREP]. The route reply will have information about the path that can be chosen for the packet transmission.

The route request packet can have following information. 1. Source id 2. Destination id 3. Sequence number 4. Backward pointer information 5. CRC and 6. Time to live[TTL]

Security in adhoc networks The following are the security threat in adhoc network. Limited computational capabilities : the nodes in the mobile adhoc network are modular, independent and will have limited computational capability. It becomes a source of vulnerability when they handle public key cryptography. Limited power supply : since nodes have limited power supply attacker can exhaust batteries by giving excessive computations to be carried out. Challenging key management : the key management becomes extremely difficult as the mobile devices will be under movement.

Types of attack in adhoc network The attack can be classified into 2 types 1. Passive 2. Active In passive attack, the normal operation of routing protocol is not interrupted. The attacker just tries to gather the information In active attack, the attacker can insert some arbitrary packets and therefore might affect the normal operation of network Attack can also be one of the following types

Pin attack : with the pin attack, an unauthorized node pretends to have shortest path to the destination. The attacker can listen to path setup phase and become the part of network. Location disclosure attack : by knowing the locations of intermediate nodes, the attacker can find out the location of target node Routing table overflow : the attacker can create some routes whose destination do not exist. It will have major impact on proactive based routing Energy exhaustion attack : the attacker tries to forward unwanted packets or send unwanted requests which can conserve the battery of the nodes