Professional Documents
Culture Documents
Ad Hoc On Demand Distance Vector Routing AODV
Ad Hoc On Demand Distance Vector Routing AODV
Routing Protocols
Reactive (On-demand) protocols
Discover routes when needed
Source-initiated route discovery
Examples of On-demand routing protocols includes,
Dynamic Source Routing Protocol(DSR)
Ad Hoc On-demand Distance Vector Routing
Protocol (AODV)
Temporally Ordered Routing Protocol(TORA)
Introduction
The Ad hoc On-Demand Distance Vector protocol is
both an on-demand and a table-driven protocol.
Each route has a lifetime after which the route
expires if it is not used.
A route is maintained only when it is used and
hence old and expired routes are never used.
AODV allows mobile nodes to respond quickly to
link breakages and changes in network topology.
The Aim of AODV is to find the optimized path
from source to destination.
It uses hop-by-hop routing by maintaining routing
table entries at intermediate nodes
AODV establishes a loop free routing mechanism
Introduction
Every node maintains two separate counters
Sequence number
Broadcast-id (increments whenever the
source issues a new RREQ)
Every node maintains its respective routing table
S.n
o
S.n
o
AODV mechanisms
The 2 mechanisms of AODV
Route Discovery
Route Maintenance
Types of packets
RREQ- Route request , to discover the path
RREP- Route reply, to acknowledge the source
RERR- Route error, generated when there is no
path or any link breakage
RREQ Packet
RREP Packet
Route Discovery
Initiated when the source needs a route to
destination and it does not have a route in its
routing table
To initiate route discovery, the source floods RREQ
packet in the network specifying the destination.
Each node forwards the request only once (pure
flooding).
S
E
F
C
G
B
Route Discovery
When a node receives a RREQ packet,
it checks to see whether it is the destination
(or)
Whether it has a route to the destination
If either case is true , the node generates an
RREP packet, which is sent back to the source
along the reverse path
If the node is not the destination , and does not
have a route to the
, it broadcasts the
S destination
E
RREQ packet.
F
A
C
G
B
Route Discovery
At intermediate nodes, duplicate RREQ packets are
discarded
Each entry in the node routing table and all RREQ
and RREP packets are tagged with a destination
sequence number
A larger destination number indicates a more
recent route
A node updates its routing information if the route
contained in the RREQ or RREP packet is more
current than its own route.
Route Maintenance
An intermediate node may also send a RREP
provided that it knows a more recent path than
the one previously known to the sender S
When a node detects a broken link attempting to
forward a packet to the next hop, it generates a
RERR packet that is sent to all sources using the
broken link
RERR packet is generated when there is no path
or any link breakage
If a source receives a RERR packet and a route to
a destination is still required , it initiates a new
discovery process.
E
F
G
H
K
I
D
N
Broadcast transmission
Z
S
E
F
G
H
K
I
D
N
E
F
G
H
E
F
G
H
K
I
D
N
E
F
G
H
K
I
D
N
16
E
F
G
H
E
F
G
H
18
E
F
G
H
19
E
F
G
H
K
I
D
N
E
A
Avoidance of Loop
DSN = Destination Sequence Number.
A
D
9
7
E
10
Route Error
In the first scenario the real problem is not that
the Node does not have a route; the problem is
that some other node thinks that the correct
Route to the Destination is through that Node.
In the second scenario the Node receives a RERR
that cause at least one of its Route to become
invalidated. If it happens, the Node would then
send out a RERR with all the new Nodes which are
now unreachable
Route Error
Optimization
To reduce congestion in a network, repeated attempts by a
source node at route discovery for a single destination
MUST utilize a binary exponential back off
mechanism.
The first time a source node broadcasts a RREQ, it waits
NET_TRAVERSAL_TIME milliseconds for the reception of a
RREP.
If a RREP is not received within that time, the source node
sends new RREQ.
When calculating the time to wait for the RREP after
sending the second RREQ, the source node MUST use a
binary exponential backoff.
Applications
Tactical networks
Military communication, automated battlefields
Emergency Services
Search and rescue operations
Disaster recovery Earthquakes, hurricanes .
Educational
Virtual classrooms or conference rooms.
Set up ad hoc communication during conferences,
meeting, or lectures
Home and Entertainment
Home/office wireless networking.
Personal Area network
Multiuser games
Outdoor internet access.
Challenges
Infrastructure less
Brings new network designing challenges.
Dynamically changing topologies
Cause route changes, frequent network partitions and
packet loss.
Physical layer limitations
Limited Wireless range.
Packet loss during transmission.
Broadcast nature of the communication.
Limitations of Mobile Nodes
Short battery life
Limited capacities.
Network security.
Energy-constrained
Limited Physical security
Scalability
Advantage
The main advantage of this protocol
is having routes established on
demand
Destination sequence numbers are
applied to find the latest route to the
destination
The connection setup delay is lower
Disadvantage
Multiple Route reply packets in
response to a single route request
packet can lead to heavy control
overhead
High amount of bandwidth is
consumed because of the periodic
beaconing.
Summary
Thank you