Hybrid (both proactive and reactive) routing
This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are:
1. Advantage depends on number of other nodes activated.
2. Reaction to traffic demand depends on gradient of traffic volume.
Examples of hybrid algorithms are:
• ZRP (Zone Routing Protocol) ZRP uses IARP as pro-active and IERP as reactive component.
• ZHLS (Zone-based Hierarchical Link State Routing Protocol)
Hierarchical routing
…show more content…
Routes are established on-demand, as they are needed. However, once established a route is maintained as long as it is needed. Reactive (or on-demand) routing protocols find a path between the source and the destination only when the path is needed (i.e., if there are data to be exchanged between the source and the destination). An advantage of this approach is that the routing overhead is greatly reduced. A disadvantage is a possible large delay from the moment the route is needed (a packet is ready to be sent) until the time the route is actually acquired. In AODV, the network is silent until a connection is needed. At that point the network node that needs a connection broadcasts a request for connection. Other AODV nodes forward this message, and record the node that they heard it from, creating an explosion of temporary routes back to the needy node. When a node receives such a message and already has a route to the desired node, it sends a message backwards through a temporary route to the requesting node. The needy node then begins using the route that has the least number of hops through other nodes. Unused entries in the routing tables are recycled after a
the routing protocol is simply flooding, S will broadest the data packets and then these data packets are rebroadcasted by every neighbor of S, and
Now consider node S that needs to determine a route to node D. The proposed LAR algorithms use flooding with one modification. Node S defines (implicitly or explicitly) a request zone for the route request A node forwards a route request only if it belongs to tie request zone. To increase the probability that the route request Will reach node D, the request zone should include the expected zone (described above). Additional, the request zone may also include other regions around the request zone. There are two reasons for this:-
In this example, here node A wants to send data packets to node D and starts to find the shortest path for its destination, so if node D is a malicious node then it will show that it has active route to the specified destination. It will then send the response In the example, data packets transfer in a hierarchic data center network. The link capacity is 1000 kb/s. The number on each is the traffic load. The distribution of traffic is based on equal cost multi-path (ECMP). In figure 8, we can see that the 3). Congestions
This protocol use Dijkstra algorithm. It maintains a complex data base, also called as link state database, which contains full information about the remote routers and the exact network topology. The goal from this protocol is to provide similar information about network connection to each router, so each router can calculate the best route to each network this is happen when each router generates information about itself and pass these information to other routers in the network so each router make a copy of this information without changing it.
(b) Redirection with modified hop count: This type of attack is targeted against the AODV protocol in which a malicious node can increase the chances that they are included on a newly created route by resetting the hop count field of a RREQ packet to zero. [17]
DSDV is a proactive, hop-by-hop distance vector routing protocol where the routing table is maintained by each and every network node. The routing table consists of all the nodes required to reach destination also including the nodes to which packets are not sent. The routing table is kept updated at every time after each entry. In order to avoid the routing loops, DSDV uses the concept of sequence numbers to maintain the originality of route at all times. For the network in figure. 1 below, the routing table for node A can be seen in table. 1 which contains information about all possible paths reachable by node A, along with the next hop, number of hops and sequence number.
In simulated network the source node designated as1 initiates the routing procedure by sending RREQ or Route Request message to its surrounding nodes. The RREQ message sent by the source node is denoted in the color green. The other RREQ messages are shown in cyan, yellow, black etc. The source node 1 is sending the RREQ message to its neighbour nodes 5, 6, 9, 11 and 13 and the links are formed shown by the green line. Every time node 5,6,9,11,13 is sending the RREQ message to its neighbour and the links are formed.
In order to evaluate the performance of the proposed DCHS algorithm, we compare MILP with the energy consumption and delay constrained routing protocol.
A group of wireless sensor nodes (devices) dynamically constructs a temporary network without the exercise of any pre-existing network infrastructure or centralized administration. The main goal of ad-hoc networking is multihop broadcasting in which packets are transferred from source node to destination node through the intermediate nodes (hops). The main function of multi hop WSN is to enable communication between two terminal devices through a bit of middle nodes, which are transferring information from one level to another level. On the foundation of network connectivity, it dynamically gets to determine that which nodes should get included in routing, each node involved in routing transmit the data to further
routing. In this chapter, we introduce some popular routing protocols in each of the three
The article ‘How teachers address cases of bullying in schools: a comparison of five reactive approaches,’ describes a study done to show the various ways that bullying is handled in countries throughout the world. The five approaches used to handle bullying are Methods of Intervention, Restorative Practice, Mediation, Support Group Method, and Method of Shared Concern. The article describes each approach and evaluates the pros and cons of each method. The article also shares data on how well each approach has worked in various countries around the world.
Traffic engineering: MPLS avoid the situations in which some parts of the network are congested while other parts of the network are less utilized. Goal here is to efficiently use bandwidth and other available resources, share the load of traffic across paths with unequal cost, enable flexible forwarding policies, route primary paths away from known blockages or points of congestion, control the path of traffic to destinations outside the domain, combining routing determined by MPLS based routing with routing determined by plain IP.
The broadcast tree construction of the routing protocol is having of two stages. In the first stage, the sink node broadcast an advertisement message ADV1. Upon receipt ofADV1 message, each node of the WSN executes the algorithm given in the procedureBTC-phase1, and set its first parent field so that the path to the sink node through it has least cost. Upon completion of the first stage, the sink broadcast a second advertisement message ADV2. Upon receipt of ADV2 message, each node of the WSN executes the algorithm given in the procedure BTC-phase2, and set its second parent field so that the path to the sink node through it has the
The Ad hoc On Demand Distance Vector (AODV) routing algorithm is a routing protocol designed for ad hoc mobile networks. AODV is capable of both unicast and multicast routing. It is an on demand algorithm, meaning that it builds routes between nodes only as desired by source nodes. It maintains these routes as long as they are needed by the sources. Additionally, AODV forms trees which connect multicast group members. The trees are composed of the group members and the nodes needed to connect the members. AODV uses sequence numbers to ensure the freshness of routes. It is loop-free, self-starting, and scales to large numbers of mobile nodes.
Choice in which the routing is done along multiple paths because its provides the number of routing protocols .