Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
14 views79 pages

Lecture 5

Uploaded by

aizazalikhan817
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views79 pages

Lecture 5

Uploaded by

aizazalikhan817
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 79

Advanced Computer Networks

Unicast routing-– MANETs

Dr. Zulfiqar Ali

Comsats University,
Islamabad Fall, 2024
Material with thanks to the University of California, Santa,
Cruz, USA
1
Announcements
• Project proposals.
– Feedback

• Note: Adhere to formatting and layout


instructions provided.

2
Today

3
4
Why MANET routing is challenging?

5
Mobility

6
Discrete Mobility
Example: In a battlefield MANET, a group of soldiers moves from one tactical
position to another, and during each movement, nodes establish new routes
after reaching the next point.

Stepwise movement:,
Nodes move in a sequence of defined steps with pauses between movements.

Handover and Routing:


After each movement, the network may need to update routing tables or
reassess communication links, which can lead to interruptions in data
transmission.

Impact on Routing: Because movements are not continuous, routing protocols


may need to reestablish routes after every movement, potentially causing route
discovery delays or packet drops.

Energy Consumption: Energy usage can vary because nodes might pause for
longer periods and only use power when they move or need to re-establish
connections.
Continuous Mobility
In continuous mobility, nodes in the MANET are constantly moving without significant
pauses or steps. The movement is smooth and fluid, and nodes maintain network
connectivity as they move.

Seamless movement: Nodes move fluidly, and their positions are


continuously updated.

Dynamic Routing: Routing protocols need to handle frequent changes in


node positions in real-time, adjusting routes continuously to ensure that the
communication paths are optimal.

Impact on Routing: Continuous mobility requires routing algorithms that can


quickly adapt to changing topology, such as reactive protocols like AODV (Ad
hoc On-Demand Distance Vector) or proactive ones like OLSR (Optimized Link
State Routing).

Energy Consumption: More energy may be consumed as the nodes are


constantly moving, requiring frequent route updates and communication
overhead.
Structured mobility
Structured Mobility refers to the organized movement of entities within a network,
often seen in mobile ad hoc networks (MANETs) or vehicular ad hoc networks (VANETs).

Movements of nodes are based on defined patterns or routes, making it easier to


anticipate their locations over time.

The network topology can be managed more effectively due to the predictable
movements, allowing for better routing protocols.

Resources (e.g., bandwidth, energy) can be allocated more efficiently, as the expected
movement patterns can inform decisions on data transmission and relay strategies.

For Example, Urban Transportation Systems.


Un-Structured mobility
Unstructured Mobility refers to a scenario where the movement of entities (such as
nodes in a network) is random and unpredictable.

This can significantly impact communication protocols, routing strategies, and overall
network performance.

Random Movement, Dynamic Topology, etc.


Security Issues in MANET

Manet is mobile in nature so this causes many problems.

- Identifying and fixing the problem is too difficult when compared to


traditional networks.
- Due to dynamic topology the several security attacks can be done in
physical layers itself an intruder can cause,

- Jamming
- Overloading
- Paralyzing
Snooping

Snooping in MANETs (Mobile Ad Hoc Networks) refers to the act of


intercepting and analyzing network traffic by unauthorized entities within the
network.

Since MANETs are typically decentralized and operate without fixed


infrastructure, they are particularly vulnerable to various security threats,
including snooping.
Spoofing
Eavesdropping
Eavesdropping is the act of listening to someone else’s
private conversation.
Eavesdroppers can intercept a phone call, video call, instant
message and even fax transmissions to acquire sensitive or
desirable information and data.
Wormhole Attacks
A wants to send packets to E.
Attacker 1 receives the Packt, and tunnels it to Attacker 2.
By this way packet, didn’t received by E.
This tunnel between attackers is known as wormhole.
Black Hole Attack
A wants to send packets to E. A broadcast the pckt.
E told A, that I have a hop count of 4.
But M told, that I can help you to reach E with a hop count of 2.
Byzantine Attack

A & C are Attacker nodes.


C can create loop with A.
C can send packet to non-optimal path, with more number of hops.
Information Disclosure

B is compromised node.
D is un-authorized node.
B can give information of A & C to D.
Resource Consumption Attacks

Malicious node B consumes a lot of resources of A & C.


Periodically send update messages to A & C to consume its resources.
MANET Routing Requirements

23
MANET Unicast Routing

24
25
DV or LS?

26
Distributed Computation

Local Information: Each router maintains only local information about its directly
connected neighbors.
This means that each node cannot see the entire network topology, leading to
decisions based only on partial information.

Periodic Updates: Distance Vector algorithms typically rely on periodic updates


where each node sends its distance vector (the cost to reach every other node) to
its neighbors.

This distributed approach can lead to delays and inconsistencies, as updates may
not be synchronized across the network.

Asynchronous Communication: Routers operate independently and communicate


asynchronously.
If one router updates its distance vector and another router hasn’t received this
update yet, inconsistencies can arise in the routing tables.
28
MANET Unicast Routing Taxonomy

29
Trade-offs?

30
Trade-offs?

31
32
Flooding for Data Delivery

33
Flooding

39
Flooding

40
Flooding for the Control Plane

41
Dynamic Source Routing (DSR) [Johnson96]

42
Route Discovery in DSR

43
Route Discovery in DSR

44
Route Discovery in DSR

45
Route Discovery in DSR

46
Route Discovery in DSR

47
Route Discovery in DSR

48
Route Discovery in DSR

49
Route Reply in DSR

50
Route Reply in DSR

51
Processing RREP

52
53
DSR Optimization: Route Caching

54
Use of Route Caching

55
Use of Route Caching

56
57
58
Route Caching: Beware!

59
DSR: Advantages

60
DSR: Disadvantages

61
DSR: Disadvantages

62
DSR: Disadvantages

63
(Ad hoc On-Demand Distance Vector Routing)

64
AODV

65
Route Requests in AODV

66
Route Requests in AODV

67
Route Requests in AODV

68
AODV Route Discovery: Observations

69
Destination Sequence Number

70
71
72
73
Route Reply in AODV

74
Route Reply Example

75
76
Data Delivery in AODV

77
Timeouts

78
• Note:
Reading of the related papers is
compulsory to these handouts please.
1.Dynamic source routing in ad hoc
wireless networks, David B. Johnson,
David A. Maltz, in Mobile Computing,
editor T. Imielinski and Hank Korth,
Kluwer, 1996.
2. Charles E Perkins, Elizabeth M Royer,
Ad hoc On Demand Distance Vector
Routing, 2003. 79

You might also like