Download File - Computer Networks & Information Security
Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security
Unicast Routing Protocols Many protocols have been proposed Some have been invented specifically for MANET Others are adapted from previously proposed protocols for wired networks No single protocol works well in all environments some attempts made to develop adaptive protocols 22
Proactive protocols Routing Protocols Determine routes independent of traffic pattern Traditional link-state and distance-vector routing protocols are proactive Reactive protocols Maintain routes only if needed Hybrid protocols 23
- Page 1 and 2: Mobile Ad Hoc Networks: Routing, MA
- Page 3 and 4: Introduction Unicast routing Mult
- Page 5 and 6: Coverage Not intended to be exhaus
- Page 7 and 8: Mobile Ad Hoc Networks Formed by w
- Page 9 and 10: Mobile Ad Hoc Networks (MANET) Mob
- Page 11 and 12: Many Applications Personal area ne
- Page 13 and 14: Many Variations Traffic characteri
- Page 15 and 16: Challenges Limited wireless transm
- Page 17 and 18: Research on Mobile Ad Hoc Networks
- Page 19 and 20: Assumption Unless stated otherwise
- Page 21: Why is Routing in MANET different ?
- Page 25 and 26: Overview of Unicast Routing Protoco
- Page 27 and 28: A Flooding for Data Delivery B H S
- Page 29 and 30: A Flooding for Data Delivery B H S
- Page 31 and 32: A Flooding for Data Delivery B H S
- Page 33 and 34: A Flooding for Data Delivery B H
- Page 35 and 36: Flooding for Data Delivery: Advanta
- Page 37 and 38: Flooding of Control Packets Many p
- Page 39 and 40: A B Route Discovery in DSR H S E C
- Page 41 and 42: A B Route Discovery in DSR H S E C
- Page 43 and 44: A B Route Discovery in DSR H S E C
- Page 45 and 46: Route Discovery in DSR Destination
- Page 47 and 48: Route Reply in DSR Route Reply can
- Page 49 and 50: A B Data Delivery in DSR H DATA [S,
- Page 51 and 52: DSR Optimization: Route Caching Ea
- Page 53 and 54: A B Use of Route Caching [S,E,F,J,D
- Page 55 and 56: Use of Route Caching: Can Reduce Pr
- Page 57 and 58: Route Caching: Beware! Stale cache
- Page 59 and 60: Dynamic Source Routing: Disadvantag
- Page 61 and 62: Flooding of Control Packets How to
- Page 63 and 64: X = last known location of node D,
- Page 65 and 66: LAR Only nodes within the request
- Page 67 and 68: LAR Variations: Adaptive Request Zo
- Page 69 and 70: Location-Aided Routing The basic p
- Page 71 and 72: Detour Routing Using Location Infor
Proactive protocols<br />
Routing Protocols<br />
Determine routes independent of traffic pattern<br />
Traditional link-state and distance-vector routing protocols<br />
are proactive<br />
Reactive protocols<br />
Maintain routes only if needed<br />
Hybrid protocols<br />
23