SlideShare a Scribd company logo
1 of 23
Guided By :
Ms. Nibedita Jagadev
Assistant Professor
Dept. of CSE
Introduction
• What are MANETs ?
• Features of MANETs
Routing Protocols
Cluster Based Routing Protocol
• Concept of Clustering
• Cluster Formation
Mechanisms in CBRP
• Routing Process
• Route Discovery
• Route Reply
• Route Error Detection
• Local Route Repair
Features Of CBRP
Conclusion
References
Routing
Protocols in
MANETs
Proactive
Routing
Reactive
Routing
Hybrid
Routing
 Presence of
Updated Routes in
the Routing Table.
 Ex : DSDV
 On-demand
Discovery of
Routes.
 Ex : AODV
 Uses the features
of both proactive
& reactive routing
 Ex : ZRP
 Clustering is a process that divides the network into
interconnected sub-structures called clusters.
 Each cluster has a cluster-head as a coordinator within the
sub-structure, which acts as a medium for data transfer
between the nodes.
 Cluster heads communicate with each other by using
gateway nodes.
 The Gateway node has two or more cluster heads as its
neighbors or— when the clusters are disjoint—at least one
cluster head and another gateway node.
Cluster Based Routing Protocol
Figure 1 : Different States in which a Node can Exist
• A node elects itself as the cluster head if
it has the lowest/highest ID in its
neighborhood. (Lowest-Id Heuristic)
Identifier-
based
Clustering
• The node, which has the most neighbor
nodes, is elected as the cluster head.
(Highest Degree Heuristic)
Connectivity
-based
Clustering
Cluster formation takes place using two mechanisms :
 CBRP uses two data structures to support the routing
process:
1) The Cluster Adjacency Table (CAT) - The CAT stores
information about neighboring clusters, i.e. whether the
links are bi-directional or unidirectional.
2) The Two-Hop Topology Database - The two-hop
topology database contains all nodes that are at most two
hops away.
 The routing process works in two steps:
1) Discovery of a route from a source node ‘S’ to a
destination node ‘D’.
2) Actual transmission of the data packets.
• In CBRP only cluster heads are flooded with route request
package (RREQ). Gateway nodes receive the RREQs and
forward them to the next cluster head.
• Initially, the source node ‘S’ broadcasts a RREQ with unique
ID containing the address of the destination node ‘D’.
• When a node ‘N’ receives a RREQ it does the following:
a) If ‘N’ is Gateway Node -> Forwards the RREQ to the
next Cluster head ‘C’.
b) If ‘N’ is Cluster Head -> Checks whether ‘D’ is a
neighbor or is two-hops away from it. It then sends the
RREQ to ‘D’. Else broadcasts it to the neighboring
Cluster head.
[3]
[3,1,8,11]
1
2
4
5
6 7
8
9
10
11
3 (S)
11 (D)
[3,1]
[3,1,6]
[3,1,8]
Example :
Source Node-[3]
Destination Node-[11]
Route Discovered- [3,1,8,11]
C. Route Reply
If the RREQ reaches the destination node ‘D’, it contains
the path called as “loose source route”, [S,C1,C2,...,Ck,D].
‘D’ sends a Route Reply message (RREP) back to S using
the reversed loose source route [D, Ck,...,C1,S], i.e. RREP
is sent back to source along reversed loose source route of
cluster heads.
Every time a cluster head receives this RREP it computes
a strict source route, which then consists only of nodes that
form the shortest path within each cluster.
Example :
Source Node-[3]
Destination Node-[11]
Loose Source Route of
RREP- [11,8,1,3]
Strict Source Route of
RREP- [11,9,4,3]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
[11][11,9]
[11,9,4]
[11,9,4,3]
Example :
Source Node-[3]
Destination Node-[11]
Loose Source Route of
RREP- [11,8,1,3]
Strict Source Route of
RREP- [11,9,4,3]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
D. Route Error Detection
After determining the route, source routing is used for actual
packet transmission.
A forwarding node sends a Route Error Message (ERR) to
packet source if the next hop in source route is unreachable.
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example:
Source route header of data
packet: [3,4,9,11]
Route error (ERR)
down link: [9->11]
E. Local Route Repair
 Objective
 Increase Packet Delivery Ratio.
 Save Route Rediscovery flooding traffic.
 Reduce overall route acquisition delay.
 A forwarding node repairs a broken route using its 2-
hop-topology information and then modifies the source
route header accordingly.
 Destination node sends a Gratuitous Route Reply to
inform source of the modified route.
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example :
Source route header of Data
Packet : [3,4,9,11]
Route error (ERR)
down link : [9->11]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example :
Source route header of Data
Packet : [3,4,9,11]
Modified source route:
[3,4,9,8,11]
1
2
4
5 6
7
8
9
10
3
11
3 (S)
11 (D)
Example :
Source route header of Data
Packet : [3,4,9,11]
Gratuitous route reply :
[3,4,9,8,11]
Cluster based routing protocol 1
Cluster based routing protocol 1
Cluster based routing protocol 1
Cluster based routing protocol 1

More Related Content

What's hot

Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Gyanmanjari Institute Of Technology
 
Cocomo model
Cocomo modelCocomo model
Cocomo modelMZ5512
 
Synchronization of telecom network
Synchronization of telecom networkSynchronization of telecom network
Synchronization of telecom networkDeepak Kumar
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot LayerMaulik Patel
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Sri Prasanna
 
Query-porcessing-& Query optimization
Query-porcessing-& Query optimizationQuery-porcessing-& Query optimization
Query-porcessing-& Query optimizationSaranya Natarajan
 
Case Study - SUN NFS
Case Study - SUN NFSCase Study - SUN NFS
Case Study - SUN NFSAshish KC
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMSkoolkampus
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed databaseSonia Panesar
 
14. Query Optimization in DBMS
14. Query Optimization in DBMS14. Query Optimization in DBMS
14. Query Optimization in DBMSkoolkampus
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2Tech_MX
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and CorrectionTarjMehta1
 

What's hot (20)

Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
Distributed DBMS - Unit 8 - Distributed Transaction Management & Concurrency ...
 
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS ArchitectureDistributed DBMS - Unit 3 - Distributed DBMS Architecture
Distributed DBMS - Unit 3 - Distributed DBMS Architecture
 
Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Cocomo model
Cocomo modelCocomo model
Cocomo model
 
Synchronization of telecom network
Synchronization of telecom networkSynchronization of telecom network
Synchronization of telecom network
 
Computer Networks : WWW , TELNET and SSH
Computer Networks  : WWW , TELNET and SSHComputer Networks  : WWW , TELNET and SSH
Computer Networks : WWW , TELNET and SSH
 
Mobile Transpot Layer
Mobile Transpot LayerMobile Transpot Layer
Mobile Transpot Layer
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
chapter 2 architecture
chapter 2 architecturechapter 2 architecture
chapter 2 architecture
 
Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)Naming And Binding (Distributed computing)
Naming And Binding (Distributed computing)
 
Query-porcessing-& Query optimization
Query-porcessing-& Query optimizationQuery-porcessing-& Query optimization
Query-porcessing-& Query optimization
 
Case Study - SUN NFS
Case Study - SUN NFSCase Study - SUN NFS
Case Study - SUN NFS
 
13. Query Processing in DBMS
13. Query Processing in DBMS13. Query Processing in DBMS
13. Query Processing in DBMS
 
Introduction to distributed database
Introduction to distributed databaseIntroduction to distributed database
Introduction to distributed database
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 
Stream oriented communication
Stream oriented communicationStream oriented communication
Stream oriented communication
 
14. Query Optimization in DBMS
14. Query Optimization in DBMS14. Query Optimization in DBMS
14. Query Optimization in DBMS
 
Set data structure 2
Set data structure 2Set data structure 2
Set data structure 2
 
Error detection and Correction
Error detection and CorrectionError detection and Correction
Error detection and Correction
 

Similar to Cluster based routing protocol 1

Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocolSudhansu Dash
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptDEEPAK948083
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETIJCNCJournal
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSKABILESH RAMAR
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptxSujit833143
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksSonali Parab
 

Similar to Cluster based routing protocol 1 (20)

Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
introAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.pptintroAdhocRoutingRoutingRoutingRouting-new.ppt
introAdhocRoutingRoutingRoutingRouting-new.ppt
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
BASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKSBASICS OF ROUTING IN NETWORKS
BASICS OF ROUTING IN NETWORKS
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
a-seminar-on-manet.pptx
a-seminar-on-manet.pptxa-seminar-on-manet.pptx
a-seminar-on-manet.pptx
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
CBRP
CBRPCBRP
CBRP
 
Default and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer NetworksDefault and On demand routing - Advance Computer Networks
Default and On demand routing - Advance Computer Networks
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Cluster based routing protocol 1

  • 1. Guided By : Ms. Nibedita Jagadev Assistant Professor Dept. of CSE
  • 2. Introduction • What are MANETs ? • Features of MANETs Routing Protocols Cluster Based Routing Protocol • Concept of Clustering • Cluster Formation Mechanisms in CBRP • Routing Process • Route Discovery • Route Reply • Route Error Detection • Local Route Repair Features Of CBRP Conclusion References
  • 3.
  • 4. Routing Protocols in MANETs Proactive Routing Reactive Routing Hybrid Routing  Presence of Updated Routes in the Routing Table.  Ex : DSDV  On-demand Discovery of Routes.  Ex : AODV  Uses the features of both proactive & reactive routing  Ex : ZRP
  • 5.  Clustering is a process that divides the network into interconnected sub-structures called clusters.  Each cluster has a cluster-head as a coordinator within the sub-structure, which acts as a medium for data transfer between the nodes.  Cluster heads communicate with each other by using gateway nodes.  The Gateway node has two or more cluster heads as its neighbors or— when the clusters are disjoint—at least one cluster head and another gateway node. Cluster Based Routing Protocol
  • 6. Figure 1 : Different States in which a Node can Exist
  • 7. • A node elects itself as the cluster head if it has the lowest/highest ID in its neighborhood. (Lowest-Id Heuristic) Identifier- based Clustering • The node, which has the most neighbor nodes, is elected as the cluster head. (Highest Degree Heuristic) Connectivity -based Clustering Cluster formation takes place using two mechanisms :
  • 8.
  • 9.  CBRP uses two data structures to support the routing process: 1) The Cluster Adjacency Table (CAT) - The CAT stores information about neighboring clusters, i.e. whether the links are bi-directional or unidirectional. 2) The Two-Hop Topology Database - The two-hop topology database contains all nodes that are at most two hops away.  The routing process works in two steps: 1) Discovery of a route from a source node ‘S’ to a destination node ‘D’. 2) Actual transmission of the data packets.
  • 10. • In CBRP only cluster heads are flooded with route request package (RREQ). Gateway nodes receive the RREQs and forward them to the next cluster head. • Initially, the source node ‘S’ broadcasts a RREQ with unique ID containing the address of the destination node ‘D’. • When a node ‘N’ receives a RREQ it does the following: a) If ‘N’ is Gateway Node -> Forwards the RREQ to the next Cluster head ‘C’. b) If ‘N’ is Cluster Head -> Checks whether ‘D’ is a neighbor or is two-hops away from it. It then sends the RREQ to ‘D’. Else broadcasts it to the neighboring Cluster head.
  • 11. [3] [3,1,8,11] 1 2 4 5 6 7 8 9 10 11 3 (S) 11 (D) [3,1] [3,1,6] [3,1,8] Example : Source Node-[3] Destination Node-[11] Route Discovered- [3,1,8,11]
  • 12. C. Route Reply If the RREQ reaches the destination node ‘D’, it contains the path called as “loose source route”, [S,C1,C2,...,Ck,D]. ‘D’ sends a Route Reply message (RREP) back to S using the reversed loose source route [D, Ck,...,C1,S], i.e. RREP is sent back to source along reversed loose source route of cluster heads. Every time a cluster head receives this RREP it computes a strict source route, which then consists only of nodes that form the shortest path within each cluster.
  • 13. Example : Source Node-[3] Destination Node-[11] Loose Source Route of RREP- [11,8,1,3] Strict Source Route of RREP- [11,9,4,3] 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) [11][11,9] [11,9,4] [11,9,4,3]
  • 14. Example : Source Node-[3] Destination Node-[11] Loose Source Route of RREP- [11,8,1,3] Strict Source Route of RREP- [11,9,4,3] 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D)
  • 15. D. Route Error Detection After determining the route, source routing is used for actual packet transmission. A forwarding node sends a Route Error Message (ERR) to packet source if the next hop in source route is unreachable. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example: Source route header of data packet: [3,4,9,11] Route error (ERR) down link: [9->11]
  • 16. E. Local Route Repair  Objective  Increase Packet Delivery Ratio.  Save Route Rediscovery flooding traffic.  Reduce overall route acquisition delay.  A forwarding node repairs a broken route using its 2- hop-topology information and then modifies the source route header accordingly.  Destination node sends a Gratuitous Route Reply to inform source of the modified route.
  • 17. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example : Source route header of Data Packet : [3,4,9,11] Route error (ERR) down link : [9->11]
  • 18. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example : Source route header of Data Packet : [3,4,9,11] Modified source route: [3,4,9,8,11]
  • 19. 1 2 4 5 6 7 8 9 10 3 11 3 (S) 11 (D) Example : Source route header of Data Packet : [3,4,9,11] Gratuitous route reply : [3,4,9,8,11]