Download File - Computer Networks & Information Security
Download File - Computer Networks & Information Security Download File - Computer Networks & Information Security
Dynamic Source Routing (DSR) [Johnson96] When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery Source node S floods Route Request (RREQ) Each node appends own identifier when forwarding RREQ 38
A B Route Discovery in DSR H S E C I G Represents a node that has received RREQ for D from S F K J D M Z Y N L 39
- Page 1 and 2: Mobile Ad Hoc Networks: Routing, MA
- Page 3 and 4: Introduction Unicast routing Mult
- Page 5 and 6: Coverage Not intended to be exhaus
- Page 7 and 8: Mobile Ad Hoc Networks Formed by w
- Page 9 and 10: Mobile Ad Hoc Networks (MANET) Mob
- Page 11 and 12: Many Applications Personal area ne
- Page 13 and 14: Many Variations Traffic characteri
- Page 15 and 16: Challenges Limited wireless transm
- Page 17 and 18: Research on Mobile Ad Hoc Networks
- Page 19 and 20: Assumption Unless stated otherwise
- Page 21 and 22: Why is Routing in MANET different ?
- Page 23 and 24: Proactive protocols Routing Protoco
- Page 25 and 26: Overview of Unicast Routing Protoco
- Page 27 and 28: A Flooding for Data Delivery B H S
- Page 29 and 30: A Flooding for Data Delivery B H S
- Page 31 and 32: A Flooding for Data Delivery B H S
- Page 33 and 34: A Flooding for Data Delivery B H
- Page 35 and 36: Flooding for Data Delivery: Advanta
- Page 37: Flooding of Control Packets Many p
- Page 41 and 42: A B Route Discovery in DSR H S E C
- Page 43 and 44: A B Route Discovery in DSR H S E C
- Page 45 and 46: Route Discovery in DSR Destination
- Page 47 and 48: Route Reply in DSR Route Reply can
- Page 49 and 50: A B Data Delivery in DSR H DATA [S,
- Page 51 and 52: DSR Optimization: Route Caching Ea
- Page 53 and 54: A B Use of Route Caching [S,E,F,J,D
- Page 55 and 56: Use of Route Caching: Can Reduce Pr
- Page 57 and 58: Route Caching: Beware! Stale cache
- Page 59 and 60: Dynamic Source Routing: Disadvantag
- Page 61 and 62: Flooding of Control Packets How to
- Page 63 and 64: X = last known location of node D,
- Page 65 and 66: LAR Only nodes within the request
- Page 67 and 68: LAR Variations: Adaptive Request Zo
- Page 69 and 70: Location-Aided Routing The basic p
- Page 71 and 72: Detour Routing Using Location Infor
- Page 73 and 74: Distance Routing Effect Algorithm f
- Page 75 and 76: Relative Distance Micro-Discovery R
- Page 77 and 78: Geographic Distance Routing (GEDIR)
- Page 79 and 80: Grid Location Service (GLS) [Li00Mo
- Page 81 and 82: Query Localization [Castaneda99Mobi
- Page 83 and 84: G F E B A S C D Query Localization:
- Page 85 and 86: Broadcast Storm Problem [Ni99Mobico
- Page 87 and 88: Solutions for Broadcast Storm Prob
Dynamic Source Routing (DSR) [Johnson96]<br />
When node S wants to send a packet to node D, but<br />
does not know a route to D, node S initiates a route<br />
discovery<br />
Source node S floods Route Request (RREQ)<br />
Each node appends own identifier when forwarding<br />
RREQ<br />
38