SlideShare una empresa de Scribd logo
1 de 32
S
LK
G
H
I
J
A
B
C
D
E
Each node S in the network has a routing zone. This is
the proactive zone for S as S collects information
about its routing zone in the manner of the DSDV
protocol.
 The routing in ZRP is divided into two
parts
› Intrazone routing : First, the packet is sent
within the routing zone of the source node to
reach the peripheral nodes.
› Interzone routing : Then the packet is sent
from the peripheral nodes towards the
destination node.
S
D
intrazone
interzone
5#
Intrazone Routing
• Each node collects information about all
the nodes in its routing zone proactively.
This strategy is similar to a proactive
protocol like DSDV.
• Each node maintains a routing table for
its routing zone, so that it can find a route
to any node in the routing zone from this
table.
• Each node periodically broadcasts a
message similar to a hello message
known as a zone notification message.
6#
• A hello message dies after one hop, i.e.,
after reaching a node´s neighbours.
• A zone notification mesage dies after k
hops, i.e., after reaching the node´s
neighbours at a distance of k hops.
• Each node receiving this message
decreases the hop count of the message
by 1 and forwards the message to its
neighbours.
7#
S
CA
E
F
B
D
S performs route
discovery for D
Denotes route request
8#
S
CA
E
F
B
D
S performs route
discovery for D
Denotes route reply
E knows route from E to D,
so route request need not be
forwarded to D from E
9#
S
CA
E
F
B
D
S performs route
discovery for D
Denotes route taken by Data
10#
• The interzone routing discovers routes
to the destination reactively.
• Consider a source (S) and a
destination (D). If D is within the routing
zone of S, the routing is completed in
the intrazone routing phase.
• Otherwise, S sends the packet to the
peripheral nodes of its zone through
bordercasting.
11#
• S sends a route request (RREQ) message
to the peripheral nodes of its zone
through bordercasting.
• Each peripheral node P executes the
same algorithm.
– First, P checks whether the destination D is
within its routing zone and if so, sends the
packet to D.
– Otherwise, P sends the packet to the
peripheral nodes of its routing zone through
bordercasting.
12#
• The bordercasting to peripheral nodes
can be done mainly in two ways :
– By maintaining a multicast tree for the
peripheral nodes. S is the root of this tree.
– Otherwise, S maintains complete routing
table for its zone and routes the packet to
the peripheral nodes by consulting this
routing table.
13#
S
D
B
H
A
C
 If a node P finds that the destination D is
within its routing zone, P can initiate a route
reply.
 Each node appends its address to the RREQ
message during the route request phase.
This is similar to route request phase in DSR.
 This accumulated address can be used to
send the route reply (RREP) back to the
source node S.
14#
 An alternative strategy is to keep forward
and backward links at every node´s routing
table similar to the AODV protocol. This
helps in keeping the packet size constant.
 A RREQ usually results in more than one
RREP and ZRP keeps track of more than one
path between S and D. An alternative path
is chosen in case one path is broken.
15#
 When there is a broken link along an
active path between S and D, a local
path repair procedure is initiated.
 A broken link is always within the routing
zone of some node.
16#
S
D
 Hence, repairing a broken link requires
establishing a new path between two
nodes within a routing zone.
 The repair is done by the starting node of
the link (node A in the previous diagram)
by sending a route repair message to
node B within its routing zone.
 This is like a RREQ message from A with B
as the destination.
17#
 Interzone routing may generate many
copies of the same RREQ message if not
directed correctly.
 The RREQ should be steered towards the
destination or towards previously
unexplored regions of the network.
 Otherwise, the same RREQ message may
reach the same nodes many
times, causing the flooding of the
network. 18#
 Since each node has its own routing
zone, the routing zones of neighbouring
nodes overlap heavily.
 Since each peripheral node of a zone
forwards the RREQ message, the
message can reach the same node
multiple times without proper control.
 Each node may forward the same RREQ
multiple times.
19#
20#
The search explores new regions of the network.
 When a node P receives a RREQ
message, P records the message in its list
of RREQ messages that it has received.
 If P receives the same RREQ more than
once, it does not forward the RREQ the
second time onwards.
 Also P can keep track of passing RREQ
messages in several different ways.
21#
 In the promiscuous mode of operation
according to IEEE 802.11 standards, a node
can overhear passing traffic.
 Also, a node may act as a routing node
during bordercasting in the intrazone
routing phase.
 Whenever P receives a RREQ message
through any of these means, it remembers
which routing zone the message is meant
for.
22#
23#
P receives a RREQ from Q since P is a peripheral node for the routing
zone of Q.
P
QA
B
C
N
X
P does not bordercast the RREQ to A,B,...,N but only to X which is not in
its list.
 Suppose P has a list of nodes A, B,C,...,N
such that the RREQ message has already
arrived in the routing zones of the nodes
A, B, C, ...,N.
 Now P receives a request to forward a
RREQ message from another node Q.
 This may happen when P is a peripheral
node for the routing zone of Q.
24#
 The optimal zone radius depends on node
mobility and route query rates.
 When the radius of the routing zone is 1, the
behaviour of ZRP is like a pure reactive
protocol, for example, like DSR.
 When the radius of the routing zone is
infinity (or the diameter of the network), ZRP
behaves like a pure proactive protocol, for
example, like DSDV.
25#
 In the intrazone routing, each node needs
to construct the bordercast tree for its zone.
 With a zone radius of r, this requires
complete exchange of information over a
distance of 2r-1 hops.
 For unbounded networks with a uniform
distribution of nodes, this results in O( )
intrazone control traffic.
26#
2
r
 However, for a bounded network, the
dependence is lower than .
 There is no intrazone control traffic when
r=1.
 The intrazone control traffic grows fast in
practice with increase in zone radius. So,
it is important to keep the zone radius
small.
27#
2
r
 When the zone radius is 1, the control traffic
is maximum since ZRP degenerates into
flood search.
 In other words, every RREQ message
potentially floods the entire network. This is
due to the fact that all the neighbours of a
node n are its peripheral nodes.
 However, control traffic drops considerably
even if the zone radius is just 2.
28#
 The control traffic can be reduced
drastically with early query termination,
when a RREQ message is prevented from
going to the same region of the network
multiple times.
 However, the amount of control traffic
depends both on node mobility and query
rate.
 The performance of ZRP is measured by
compairing control traffic with call-to-
mobility (CMR) ratio.
29#
 The call-to-mobility ratio (CMR) is the ratio
of route query rate to node speed.
 As CMR increases, the number of control
messages is reduced by increasing the
radius of the routing zones.
 This is because, it is easier to maintain larger
routing zones if mobility is low. Hence, route
discovery traffic also reduces.
30#
 On the other hand, CMR is low if mobility is
high.
 In such a case, the routing zone
maintenance becomes very costly and
smaller routing zones are better for
reducing control traffic.
 An optimally configured ZRP for a CMR of
500 [query/km] produces 70% less traffic
than flood searching.
31#
 For a fixed CMR, the route query
response time decreases initially with
increased zone radius.
 However, after a certain radius, the
response time increases with zone radius.
 This is due to the fact that the network
takes longer time to settle even with
small changes in large routing zones.
32#

Más contenido relacionado

La actualidad más candente

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manetflowerjaan
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemDHIVYADEVAKI
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksSayed Chhattan Shah
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc NetworksJagdeep Singh
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-pptSwathi Ch
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc networkshashi712
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 

La actualidad más candente (20)

MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Types of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed SystemTypes of Load distributing algorithm in Distributed System
Types of Load distributing algorithm in Distributed System
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Mobile Ad hoc Networks
Mobile Ad hoc NetworksMobile Ad hoc Networks
Mobile Ad hoc Networks
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Mac protocols of adhoc network
Mac protocols of adhoc networkMac protocols of adhoc network
Mac protocols of adhoc network
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 

Similar a Zone Routing Protocol

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocolsSenthil Kanth
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPSreedhar Chowdam
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdfJayaprasanna4
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolAtul Atalkar
 
Routing protocol
Routing protocolRouting protocol
Routing protocolAmzadKhn
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...IOSR Journals
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSRMitesh Thakore
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Eswar Publications
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...IJERA Editor
 

Similar a Zone Routing Protocol (20)

AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
AODV protocol
AODV protocolAODV protocol
AODV protocol
 
Adhoc routing protocols
Adhoc routing protocolsAdhoc routing protocols
Adhoc routing protocols
 
Notes
NotesNotes
Notes
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
DCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCPDCCN Network Layer congestion control TCP
DCCN Network Layer congestion control TCP
 
ex11-routing-performance.pdf
ex11-routing-performance.pdfex11-routing-performance.pdf
ex11-routing-performance.pdf
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
implementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocolimplementation of sinkhole attack on DSR protocol
implementation of sinkhole attack on DSR protocol
 
Routing protocol
Routing protocolRouting protocol
Routing protocol
 
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc ...
 
Grayhole
GrayholeGrayhole
Grayhole
 
analysins aodv
analysins aodvanalysins aodv
analysins aodv
 
Performance analysis of AODV And OLSR
Performance analysis of AODV And OLSRPerformance analysis of AODV And OLSR
Performance analysis of AODV And OLSR
 
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
Cost Effective Routing Protocols Based on Two Hop Neighborhood Information (2...
 
Manet By Vikas mainanwal
Manet By Vikas mainanwalManet By Vikas mainanwal
Manet By Vikas mainanwal
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 

Más de nitss007

Practical ethics
Practical ethicsPractical ethics
Practical ethicsnitss007
 
Political violence
Political violencePolitical violence
Political violencenitss007
 
Incentives
IncentivesIncentives
Incentivesnitss007
 
Freakonomics
FreakonomicsFreakonomics
Freakonomicsnitss007
 
Personality Development
Personality DevelopmentPersonality Development
Personality Developmentnitss007
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber spacenitss007
 

Más de nitss007 (6)

Practical ethics
Practical ethicsPractical ethics
Practical ethics
 
Political violence
Political violencePolitical violence
Political violence
 
Incentives
IncentivesIncentives
Incentives
 
Freakonomics
FreakonomicsFreakonomics
Freakonomics
 
Personality Development
Personality DevelopmentPersonality Development
Personality Development
 
Ethics in cyber space
Ethics in cyber spaceEthics in cyber space
Ethics in cyber space
 

Último

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxAnupam32727
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 

Último (20)

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptxCLASSIFICATION OF ANTI - CANCER DRUGS.pptx
CLASSIFICATION OF ANTI - CANCER DRUGS.pptx
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 

Zone Routing Protocol

  • 1.
  • 2.
  • 3. S LK G H I J A B C D E Each node S in the network has a routing zone. This is the proactive zone for S as S collects information about its routing zone in the manner of the DSDV protocol.
  • 4.  The routing in ZRP is divided into two parts › Intrazone routing : First, the packet is sent within the routing zone of the source node to reach the peripheral nodes. › Interzone routing : Then the packet is sent from the peripheral nodes towards the destination node. S D intrazone interzone
  • 5. 5# Intrazone Routing • Each node collects information about all the nodes in its routing zone proactively. This strategy is similar to a proactive protocol like DSDV. • Each node maintains a routing table for its routing zone, so that it can find a route to any node in the routing zone from this table. • Each node periodically broadcasts a message similar to a hello message known as a zone notification message.
  • 6. 6# • A hello message dies after one hop, i.e., after reaching a node´s neighbours. • A zone notification mesage dies after k hops, i.e., after reaching the node´s neighbours at a distance of k hops. • Each node receiving this message decreases the hop count of the message by 1 and forwards the message to its neighbours.
  • 7. 7# S CA E F B D S performs route discovery for D Denotes route request
  • 8. 8# S CA E F B D S performs route discovery for D Denotes route reply E knows route from E to D, so route request need not be forwarded to D from E
  • 9. 9# S CA E F B D S performs route discovery for D Denotes route taken by Data
  • 10. 10# • The interzone routing discovers routes to the destination reactively. • Consider a source (S) and a destination (D). If D is within the routing zone of S, the routing is completed in the intrazone routing phase. • Otherwise, S sends the packet to the peripheral nodes of its zone through bordercasting.
  • 11. 11# • S sends a route request (RREQ) message to the peripheral nodes of its zone through bordercasting. • Each peripheral node P executes the same algorithm. – First, P checks whether the destination D is within its routing zone and if so, sends the packet to D. – Otherwise, P sends the packet to the peripheral nodes of its routing zone through bordercasting.
  • 12. 12# • The bordercasting to peripheral nodes can be done mainly in two ways : – By maintaining a multicast tree for the peripheral nodes. S is the root of this tree. – Otherwise, S maintains complete routing table for its zone and routes the packet to the peripheral nodes by consulting this routing table.
  • 14.  If a node P finds that the destination D is within its routing zone, P can initiate a route reply.  Each node appends its address to the RREQ message during the route request phase. This is similar to route request phase in DSR.  This accumulated address can be used to send the route reply (RREP) back to the source node S. 14#
  • 15.  An alternative strategy is to keep forward and backward links at every node´s routing table similar to the AODV protocol. This helps in keeping the packet size constant.  A RREQ usually results in more than one RREP and ZRP keeps track of more than one path between S and D. An alternative path is chosen in case one path is broken. 15#
  • 16.  When there is a broken link along an active path between S and D, a local path repair procedure is initiated.  A broken link is always within the routing zone of some node. 16# S D
  • 17.  Hence, repairing a broken link requires establishing a new path between two nodes within a routing zone.  The repair is done by the starting node of the link (node A in the previous diagram) by sending a route repair message to node B within its routing zone.  This is like a RREQ message from A with B as the destination. 17#
  • 18.  Interzone routing may generate many copies of the same RREQ message if not directed correctly.  The RREQ should be steered towards the destination or towards previously unexplored regions of the network.  Otherwise, the same RREQ message may reach the same nodes many times, causing the flooding of the network. 18#
  • 19.  Since each node has its own routing zone, the routing zones of neighbouring nodes overlap heavily.  Since each peripheral node of a zone forwards the RREQ message, the message can reach the same node multiple times without proper control.  Each node may forward the same RREQ multiple times. 19#
  • 20. 20# The search explores new regions of the network.
  • 21.  When a node P receives a RREQ message, P records the message in its list of RREQ messages that it has received.  If P receives the same RREQ more than once, it does not forward the RREQ the second time onwards.  Also P can keep track of passing RREQ messages in several different ways. 21#
  • 22.  In the promiscuous mode of operation according to IEEE 802.11 standards, a node can overhear passing traffic.  Also, a node may act as a routing node during bordercasting in the intrazone routing phase.  Whenever P receives a RREQ message through any of these means, it remembers which routing zone the message is meant for. 22#
  • 23. 23# P receives a RREQ from Q since P is a peripheral node for the routing zone of Q. P QA B C N X P does not bordercast the RREQ to A,B,...,N but only to X which is not in its list.
  • 24.  Suppose P has a list of nodes A, B,C,...,N such that the RREQ message has already arrived in the routing zones of the nodes A, B, C, ...,N.  Now P receives a request to forward a RREQ message from another node Q.  This may happen when P is a peripheral node for the routing zone of Q. 24#
  • 25.  The optimal zone radius depends on node mobility and route query rates.  When the radius of the routing zone is 1, the behaviour of ZRP is like a pure reactive protocol, for example, like DSR.  When the radius of the routing zone is infinity (or the diameter of the network), ZRP behaves like a pure proactive protocol, for example, like DSDV. 25#
  • 26.  In the intrazone routing, each node needs to construct the bordercast tree for its zone.  With a zone radius of r, this requires complete exchange of information over a distance of 2r-1 hops.  For unbounded networks with a uniform distribution of nodes, this results in O( ) intrazone control traffic. 26# 2 r
  • 27.  However, for a bounded network, the dependence is lower than .  There is no intrazone control traffic when r=1.  The intrazone control traffic grows fast in practice with increase in zone radius. So, it is important to keep the zone radius small. 27# 2 r
  • 28.  When the zone radius is 1, the control traffic is maximum since ZRP degenerates into flood search.  In other words, every RREQ message potentially floods the entire network. This is due to the fact that all the neighbours of a node n are its peripheral nodes.  However, control traffic drops considerably even if the zone radius is just 2. 28#
  • 29.  The control traffic can be reduced drastically with early query termination, when a RREQ message is prevented from going to the same region of the network multiple times.  However, the amount of control traffic depends both on node mobility and query rate.  The performance of ZRP is measured by compairing control traffic with call-to- mobility (CMR) ratio. 29#
  • 30.  The call-to-mobility ratio (CMR) is the ratio of route query rate to node speed.  As CMR increases, the number of control messages is reduced by increasing the radius of the routing zones.  This is because, it is easier to maintain larger routing zones if mobility is low. Hence, route discovery traffic also reduces. 30#
  • 31.  On the other hand, CMR is low if mobility is high.  In such a case, the routing zone maintenance becomes very costly and smaller routing zones are better for reducing control traffic.  An optimally configured ZRP for a CMR of 500 [query/km] produces 70% less traffic than flood searching. 31#
  • 32.  For a fixed CMR, the route query response time decreases initially with increased zone radius.  However, after a certain radius, the response time increases with zone radius.  This is due to the fact that the network takes longer time to settle even with small changes in large routing zones. 32#