...1.11 ROUTING PROTOCOLS USED IN MANET PROACTIVE ROUTING (TABLE- DRIVEN) PROTOCOLS: In this protocol, all the nodes continuously search for routing related information within a network. Each node maintains one or more routing tables which represents the entire topology of the network. These tables are updated regularly so that when a route is needed, these tables will be checked to find out whether the routing information is already available or not. If any node already knows the path for sending information, then the latency will be low. However, when the nodes are mobile then the cost of maintaining all topology information will be very high. REACTIVE ROUTING (ON-DEMAND) PROTOCOLS: Routing information is collected only when there is a need....
Words: 454 - Pages: 2
...mobile nodes and has dynamic topology. MANET is self configured and self organizing network. In the ad hoc network nodes are free to move anywhere and any pair of nodes can communicate directly if they are in the transmission range of each other otherwise the communicating nodes depend upon the other nodes present in the network for the communication. So, MANET follows the multi-hop pattern for the communication. In the ad hoc network, the nodes can act as the router as well as host. The nodes in the network dynamically exchange the data without their dependency on any wired backbone network. The nodes in the network are differentiated by their processing, energy consumed, memory resources and most important by their high degree of mobility. Routing protocols play an important role in order to transmit the data from one node to another. The goal of the ad hoc network routing protocols is to establish the valid and efficient routes between the nodes so that the messages are delivered within time. The routing protocols must be able to deal with high degree of mobility....
Words: 519 - Pages: 3
...1. What is a routing table? Routing tables consist of being used to route data to a specific path and also keeps track of the routes for where the data can travel to. 2. What is the most common static route used in a host computer? The most common static route used in a host computer is the default gateway. 3. What command is used to view a PC computers routing table? The command to used to view a pc computer routing table is netstat –r. 4. What is meant by a 0.0.0.0 network address entry with a subnet mask of 0.0.0.0 in a PC’s routing table? It’s the default routing table path for data. 5. What is the 127.0.0.1 IP address and what is it used for? It is known as a loopback to the host computer. This mean the data is routed directly back to the source which is known as the network interface card. 7. What is the difference between a routers running configuration and startup configuration? The difference between running configuration and startup is that in config doesn’t show what is currently saved in the routers nonvolatile memory whereas startup shows the saved configuration in the nonvolatile memory. 8. What is the router command used to view the routes entered into the router’s routing table? The command to use in order to see the routes entered into the routers routing table is show ip route. 9. What is the router command used to configure a static route for a router? The command you would use is ip route in order to configure the router. 14. What...
Words: 2495 - Pages: 10
...1. What is a routing table? Routing tables consist of being used to route data to a specific path and also keeps track of the routes for where the data can travel to. 2. What is the most common static route used in a host computer? The most common static route used in a host computer is the default gateway. 3. What command is used to view a PC computers routing table? The command to used to view a pc computer routing table is netstat –r. 4. What is meant by a 0.0.0.0 network address entry with a subnet mask of 0.0.0.0 in a PC’s routing table? It’s the default routing table path for data. 5. What is the 127.0.0.1 IP address and what is it used for? It is known as a loopback to the host computer. This mean the data is routed directly back to the source which is known as the network interface card. 7. What is the difference between a routers running configuration and startup configuration? The difference between running configuration and startup is that in config doesn’t show what is currently saved in the routers nonvolatile memory whereas startup shows the saved configuration in the nonvolatile memory. 8. What is the router command used to view the routes entered into the router’s routing table? The command to use in order to see the routes entered into the routers routing table is show ip route. 9. What is the router command used to configure a static route for a router? The command you would use is ip route in order to configure the router. 14....
Words: 359 - Pages: 2
...1. Describe the process of network routing. Routing is the process of moving packets across a network from one host to another. It is usually performed by dedicated devices called routers. Packets are the fundamental unit of information transport in all modern computer networks, and increasingly in other communications networks as well. They are transmitted over packet switched networks, which are networks on which each message (i.e., data that is transmitted) is cut up into a set of small segments prior to transmission. Each packet is then transmitted individually and can follow the same path or a different path to the common destination. Once all of the packets have arrived at the destination, they are automatically reassembled to recreate the original message. What OSI layer does a router work on? 3 or network. What type of address does a router use? IP address 2. What is a router hop? In computer networking, a hop is one portion of the path between source and destination. Data packets pass through bridges, routers and gateways on the way. Each time packets are passed to the next device, a hop occurs. Which protocol uses router hops? Routing Information Protocol (RIP). What is the maximum number of hops allowed? This limits the number of hops allowed in a path from source to destination. The maximum is 15, and 16 is deemed unreachable. The hop-count limit prevents routing loops from continuing indefinitely. Although, IGRP will route IP, IPX, Decnet and AppleTalk which...
Words: 739 - Pages: 3
...Project Paper 1. Routing tables and how the router will perform a route lookup: a. Routing Table Format- A routing table is used by TCP/IP network routers to calculate the destinations of messages it is responsible for forwarding. The table is a small in-memory database managed by the router's built-in hardware and software. Each IP address identifies a remote router (or other network gateway) that the local router is configured to recognize. For each IP address, the routing table additionally stores a network mask and other data that specifies the destination IP address ranges that remote device will accept. Home network routers utilize a very small routing table because they simply forward all outbound traffic to the Internet Service Provider (ISP) gateway which takes care of all other routing steps. Home router tables typically contain ten or fewer entries. By comparison, the largest routers at the core of the Internet backbone must maintain the full Internet routing table that exceeds 100,000 entries and growing as the Internet expands. b. Routing Lookup Mechanism- c. Classful vs. Classless Routing- Classful Routing, which is sometimes called a classful network. If you are using a classful routing protocol then all of your networks are in different classes and are separated by a router. Remember that the useable IPv4 address ranges are divided into classes. Class A 1-126, Class B 128-191, and Class C 192-223. So when we talk about a classful routing protocol, it will...
Words: 3788 - Pages: 16
...when there is a need for a path to a destination, such path information is accessible immediately. Different protocols keep track of different routing state information[4]. These protocols need each node to maintain one or more tables to store up to date routing information and to propagate updates throughout the network. As such, these protocols are often referred to as table-driven. Some examples of table driven ad hoc routing protocols include Dynamic Destination Sequenced Distance-Vector Routing Protocol (DSDV) [7],Optimized Link State Routing Protocol (OLSR) [8] and Wireless Routing Protocol (WRP) [6]. 1....
Words: 514 - Pages: 3
...WIRE LESS MESS NETWORK WITH HRPU ABSTRACT A Wireless mesh network is a mesh network created through the connection of wireless access points installed at each network user’s locale. Each user is also a provider, forwarding data at next node. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. Wireless mesh networking could allow people living in the remote areas and small businesses operating in rural neighborhoods to connect their networks together for affordable Internet connections. Here we discuss a hybrid routing algorithm for wireless mesh networks. In HRPU, the mesh portal periodically broadcasts a mesh update message, which allows all nodes to have a route towards the mesh portal stored semi permanently in their routing table. Whenever a node has data to be sent to backbone network, it sends the data without any route establishment delay using the route to the mesh portal. In HRPU the mesh portals and mesh points are intelligent which further improves the performance. INTRODUCTION The Beginning: Wireless Mesh Networking (WMN) was developed as a quick way to set-up wireless networks during military operations. Since then it has grown considerably in popularity based on its advantages in both metropolitan and rural applications. WMNs are being applied as Hot Zones, which cover a broad area, such as a downtown city district. By 2010, municipal Wi-Fi networks will cover over 325...
Words: 4177 - Pages: 17
...router must find the physical address mapped to ______________________. the IP address of the next hop router found in the routing table _______ is a dynamic mapping protocol in which a physical address is found for a given logical address. ARP An ARP request is normally _______. broadcast An ICMP packet is carried in an __________ . IP packet The destination MAC address in an Ethernet frame that carries an ARP request is _______. 0xFFFFFFFFFFFF The value of the target hardware address field in an ARP request message sent on an Ethernet is _______. 0x000000000000 A _______ is an ARP that acts on behalf of a set of hosts. proxy ARP ICMP is a _________ layer protocol. network ICMP messages are divided into two broad categories: _____________. query and error reporting messages Which of the following is true about ICMP messages? An ICMP error message may be generated only for the first fragment. In _______ delivery, the destination of an IP packet is on the same network as the source or deliverer of the packet. a direct In _______ forwarding, the mask and destination addresses are both 0.0.0.0 in the routing table. default In _______ forwarding, the destination of a forwarded IP packet is a network address in the routing table. network-specific In _______ forwarding, the routing table holds the address of just the next...
Words: 2858 - Pages: 12
...Useful when number of traffic session is much lower than the number of nodes. . No routing structure created a priori. Two key methods for route discovery: . Source routing . Backward routing . Introduce delay. Examples: AODV Ad hoc on demand distance vector routing Route Discovery Process . Source node initiates path discoverer process by broadcasting RREQ. . RREQ is forwarded until it reaches an intermediate node that has recent route information about the destination or till it reaches the destination. . The RREQ uses sequence numbers to ensure that the routes are loop free and reply contains latest information only. 15 Route Reply Process . When a node forwards a route request packet to its neighbor; it also records in the table the node from which the first copy of the request came. . This table is used to construct the reverse path for the RREQ. . As the RREQ traverses back to the source, the nodes along the path enter the forward route into their tables. . If one of the intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link failure notification to its upstream neighbors and so on till it reaches the source. . Route Error Packets are used to erase broken...
Words: 4647 - Pages: 19
...(RSU) supported by DSRC standard [2] acts as gateways or fixed access points to vehicles in mobility and provides interim connectivity to vehicles. One of the major advantages of VANETs over MANETs is the unlimited battery power generated on the fly. VANET plays a major role in defining safety measures by streaming communication between vehicles, infotainment and telematics. In any generic network phenomena the concept of routing and its characteristics are highly linked with Quality of Service (QoS). The United Nations Consultative Committee for International Telephony and Telegraphy (CCITT) Recommendation E.800 has defined QoS as: “The collective effect of service performance which determines the degree of satisfaction of a user of the service”. The major concern of VANET routing is that whether the performance can satisfy the throughput and delay requirements of such media streaming applications. Unavailability of efficient routing algorithms for the VANET scenario, force the researchers to use the MANET routing algorithms. An analysis of VANET routing protocols shows that its performance is not acceptable due to the feature of very high mobility in terms of speed[3]. Its adverse effect leads to broken links, with high packet drop and overhead due to missing route repairs or failure. This phenomenon...
Words: 1550 - Pages: 7
...Networking Final Study Guide 1. What is a up-link port? Allows the connection of hub to hub or switch without having to use a special cable 2. What is the max cable length for Cat 5E/6? 100 meters 3. Link lights on hub or switch represent. Indicates that the transmit and receive pairs are properly aligned 4. Link lights on NIC. Same as above 5. Echo request. Part of the ICMP protocol that request a reply from a computer 6. How do you display MAC address/find out MAC address? Ip/config/all 7. Max length of horizontal cable that you can use? 90 meters 8. How does Network Admin check for connectivity? Ping 9. What is campus area network? A collection of two or more interconnected LAN's in a limited geographic area 10. Difference between fast Ethernet and gigabit Ethernet? 100Mbps and 1000Mbps 11. What is bottlenecking? Another term for network congestion 12. CIDR notation. IP address is represented as A.B.C.D /n, where "/n" is called the IP prefix or network prefix. The IP prefix identifies the number of significant bits used to identify a network 13. 3 packet handshake deal for TCP? SYN, SYN ACK, ACK 14. Who assigns IP address? Network Admin 15. What is the connection called from router to pc? 16. What is help command for Cisco IOS? ? 17. What does AUI stand for? Attachment unit interface, the port is a routers 10 Mbps Ethernet port 18. What is interface called to connect...
Words: 823 - Pages: 4
...Impact of MAC Layer on the Performance of ODMRP, Fisheye, AODV and DSR, Routing Protocols in Mobile Ad hoc Networks A. Sravani, G. Srinu, and A.Venkataramana Abstract— Mobile Ad hoc Network is an emerging area. Its standards are defined by IETF. MANET is a self generated, self organized and self handled network consisting of collection of independent nodes. MANETs Presents several desirable properties like dynamic topology, Easy of deployment and robustness, which are qualify them as an attractive topic for the research community. Providing QoS routing is a major issue in MANETs. Media Access Control layer plays crucial role in Ad hoc networks. Several routing protocols have already been proposed for MANETs. This paper describes the impact of MAC layer protocols like 802.11 and CSMA on the various routing protocols like AODV, DSR, ODMRP and Fisheye. Numbers of simulation scenarios were carried out by using Glomosim-2.03. The QoS parameters used are Throughput, Delay and PDR. Simulation results found that AODV performs better in 802.11 and CSMA, DSR and ODMRP performs better in only under 802.11. Keywords— MANET, AODV, DSR, FSR, GloMoSim, ODMRP I. INTRODUCTION Wireless communication networks are basically two types as shown in Fig.1. One is infrastructure based and other one is infrastructure less. Infrastructure based is cellular communications whereas infrastructure less is ad hoc networks. Fig.1 Classification of wireless communication networks A. Cellular...
Words: 2917 - Pages: 12
...nodes are computing or networking is a distributed application that partitions watchdog’s task between source and target nodes. These nodes are connected and communicate by using IP address and host name. Often Inheritor nodes operate over a network on separate functionalities. A server machine is a high performance host that is running one or more tasks which share its resources with nodes. B. Target Nodes Choose the target node from the intermediate nodes. Then the number of connections to establish between each pair of target node and established between each and every nodes for network communication. From the source node to the destination node and intermediates node must have connection between source nodes after communicate between combinations of multi node each and every node must be link to each other. After to choose the neighbour nodes and communicate with each other and also set the priority queue in the network communications. In multipath data transmission, send the data from source node that means which type of file size and file extension. C. Watchdog Optimization Techniques...
Words: 554 - Pages: 3
...old telephone system (POTS) (j) Internet (k) infra-red (l) docking (serial, parallel, LAN) and (m) disk swapping. These diverse communications technologies make available a continuum of connectivity that provides communications capabilities ranging from manual-assisted batch transfers to high-speed continuous communication. Related work: Dynamic Source Routing (DSR) is a routing protocol for wireless mesh networks. It is similar to AODV in that it forms a route on-demand when a transmitting node requests one. However, it uses source routing instead of relying on the routing table at each intermediate device. Dynamic source routing protocol (DSR) is an on-demand protocol designed to restrict the bandwidth consumed by control packets in ad hoc wireless networks by eliminating the periodic table-update messages required in the table-driven approach. The basic approach of this protocol (and all other on-demand routing protocols) during the route construction phase is to establish a route by flooding RouteRequest packets in the network. The destination node, on receiving a RouteRequest packet, responds by sending a RouteReply packet back to the source, which carries the route traversed by the RouteRequest packet received. Black hole attacks drop all data packets & cheat the previous node. Gray hole attack drop part of the data & cheat the previous node. As soon as it receive the packet from neighbor the attacker drop the packet. Type of active attack. In some other gray hole attacks...
Words: 1491 - Pages: 6