Route discovery in AODV:
As discussed already if in a network if a node wants communication with any other node with in that network, some attributes and parameters are configured by that node. The process of this communication is done in step by step procedure and as the first step the source node verifies the routing table of its own for identifying the entry that possess the IP address of the destination and if the same address is identified then ends the communication procedure by just using the information of routing that is obtained from the table.
If such an entry is not identified by the source node in its routing table then the following order of steps is followed by the source node to continue the communication procedure.
- The source node uses some attributes such as the number of hops to the destination node, IP address of destination node, broadcast ID that is unique, IP address of the source node and sequence numbers of destination and source nodes for creating the RREQ message.
- The RREQ message is broadcasted by the source node and then waits some time by using a timer to count the time to wait.
- The RREQ message is received by all the nodes in the route and then they will verify the ID of the message and then checks for the matching message ID if that is matched then the message is processed and if not the message is discarded simply.
- If the message is identified as unprocessed by any of the receiver then the IP address of destination node is verified with the information of routing that is obtained from their own routing tables. If the destination node is that particular receiver then the message is processed and if the receiver is not the destination is passes the message to the destination in the route that is available for that node as it was directed by the information of routing obtained from the routing table.
- When the RREQ message is forwarded by any of the receiver, a unicast message RREP is sent by that receiver as a reply to the source node. The IP addresses of the nodes those which processes the message is are maintained by the source node to use it in future.
This paper is written and submitted by Sujana Priya V.