DSR is a reactive protocol and therefore doesn’t use periodic updates of routing information. It computes the routes whenever needed and then maintains them. The distinguishing feature of Dynamic Source Routing (DSR) is the use of source routing technique in which the sender of a packet determines the complete sequence of nodes through which the packet has to pass. The sender lists this route in the packet’s header, to identify each forwarding “hop” by the address of the next node to which to transmit the packet on its way to the destination node There are two basic steps of DSR protocol: (i) Route discovery and (ii) Route maintenance. Every node in the network maintains a cache to store latest discovered paths. Before a node sends a packet, it first checks the cache whether there is an entry for …show more content…
Also the node keeps the freshness information of the entry to recognize whether the cache is fresh or not. If any intermediate node receives a data packet, it first checks whether the packet is sent to itself. If it is the destination, it accepts the packet else it forwards the packet using the route attached on the packet.
B. Merits and Demerits of DSR
Advantages of DSR are that routes are maintained only between nodes who wants to communicate and overhead of route maintenance is reduced. Route caching further reduces route discovery overhead. Many routes to the destination are yielded by a single route discovery due to intermediate nodes reply from local caches.
The disadvantage is that the packet header size grows with route length as the route is cached .Flooding of route requests casuses it to reach all nodes in the network. Hence collisions may occur between route requests propagated by neighboring nodes. Nodes replying using their local cache increases contention.
C. AODV
the routing protocol is simply flooding, S will broadest the data packets and then these data packets are rebroadcasted by every neighbor of S, and
Now consider node S that needs to determine a route to node D. The proposed LAR algorithms use flooding with one modification. Node S defines (implicitly or explicitly) a request zone for the route request A node forwards a route request only if it belongs to tie request zone. To increase the probability that the route request Will reach node D, the request zone should include the expected zone (described above). Additional, the request zone may also include other regions around the request zone. There are two reasons for this:-
Its advantages are that its implementation is simple due to the fact that the intermediate nodes only respond to requests and never initiate communication themselves, that it can easily monitor if a node is responsive or not and that it locates data in an efficient way since each node in the network only maintains information for about logN nodes, where N is the number of nodes. Its disadvantages are that it sends queries repeatedly over long distances under certain circumstances because it uses the iterative scheme and that it does not learn useful routing information from received queries like the Kademlia protocol
Though aggregations, CIDR scheme can decrease forwarding tables. The practice of aggregation can still be inhibited by few components. For example a network 208.12.21/24 needs to use the IP address allocated in the same network and the same IP prefix to be used when it needs to modify its service provider. Therefore from the same service provider all networks from 208.12.16/24 to 208.12.31/24 can still be reached, except 208.12.21/24 breaking process of aggregation.
| Given a network topology of two or more routers and an IPv4 addressing scheme, implement static routing and confirm layer 3 connectivity.
4. Exchange state – In this state DBD (Database Descriptor) packets are exchanged. DBDs contain LSAs (Link State Advertisement) headers. The Routers will use this information to see what LSAs need to be exchanged.
The benefit of virtually indexed physically tagged cache is that the translation of virtual address and cache lookup can happen in parallel:
The attacker correlates the packet transmission times of each node and traces the packets hop-by-hop from its source to its destination. The intuition here is that under normal scenarios, each intermediate forwarder will forward a packet towards its destination without adding additional delay or packet mixing. Privacy can be enhanced when each forwarder node adds a random delay before transmitting the packet ~\cite{zhang2012, shao2008} or route the packets to fake destinations~\cite{deng2005}.
In this example, here node A wants to send data packets to node D and starts to find the shortest path for its destination, so if node D is a malicious node then it will show that it has active route to the specified destination. It will then send the response In the example, data packets transfer in a hierarchic data center network. The link capacity is 1000 kb/s. The number on each is the traffic load. The distribution of traffic is based on equal cost multi-path (ECMP). In figure 8, we can see that the 3). Congestions
This protocol use Dijkstra algorithm. It maintains a complex data base, also called as link state database, which contains full information about the remote routers and the exact network topology. The goal from this protocol is to provide similar information about network connection to each router, so each router can calculate the best route to each network this is happen when each router generates information about itself and pass these information to other routers in the network so each router make a copy of this information without changing it.
Increasing the router memory to infinite cannot control the congestion. Agree or disagree? Elaborate briefly (60-100 words)
(b) Redirection with modified hop count: This type of attack is targeted against the AODV protocol in which a malicious node can increase the chances that they are included on a newly created route by resetting the hop count field of a RREQ packet to zero. [17]
Being proactive, AODV doesn’t need all its nodes in a network to maintain the routes to destinations rather request a route only when needed i.e., only the nodes which are communicating would require to maintain the route. Also AODV uses sequence numbers to avoid routing loops like in DSDV. Whenever a node needs to communicate with another node, a route has to be found and for that purpose Route Request (RREQ) message is broadcasted to all its neighbors till it reaches the destination node or route to destination. A temporary route table entry in initiated by the RREQ messages throughout the network. Once the destination or a route is found, Route Reply (RREP) message is sent back to source by unicasting along the temporary reverse path of the received RREQ message. RREP message initiates in creating a routing table entries for the destination in intermediate nodes on its way back to source. After certain amount of time these routing table entries expire. Neighbors are detected by periodic HELLO messages (a special RREP message). If a node A does not receive HELLO messages from a neighbor B through which it sends traffic, it assumes that a link is broken and the failure indication is forwarded to its active neighbors. When this message reaches the sources, then either they request a new route by sending new RREQ messages or stop sending data. HELLO messages and the
In simulated network the source node designated as1 initiates the routing procedure by sending RREQ or Route Request message to its surrounding nodes. The RREQ message sent by the source node is denoted in the color green. The other RREQ messages are shown in cyan, yellow, black etc. The source node 1 is sending the RREQ message to its neighbour nodes 5, 6, 9, 11 and 13 and the links are formed shown by the green line. Every time node 5,6,9,11,13 is sending the RREQ message to its neighbour and the links are formed.
Advantages , Internet: Real-time agility, use of different languages ,visuals, text and sound, ease of searching for information.