Conference PaperPDF Available

A Survey on Zone Routing Protocol

Authors:

Abstract and Figures

Zone Routing Protocol (ZRP) is surveyed for the nature of its parametric performance. ZRP is hybrid routing protocol works on various routing phenomenon such as Intra-Zone Routing Protocol (IARP) which routes within its routing zone, Inter-Zone Routing Protocol (IERP) which routes outside the routing zone, Bordercast Resolution Protocol (BRP), Query Control Mechanisms includes Query Detection (QD1/QD2), Early Termination (ET), Random Query Processing Delay (RQPD). Multicast Zone Routing Protocol, Two-Zone Routing Protocol along with security of Zone Routing protocol in considered. The analyzed performance of the variety of parameters such as PDR (Packet Delivery Ratio), Average Jitter, Average Throughput, Average End-to-End Delay, Route Acquisition Latency, Control Traffic, Overhead of Zone Routing Protocol in different simulating environment under the normal and with blackhole attack circumstances is compared.
Content may be subject to copyright.
International Journal of Computer Applications (0975 8887)
International Conference on Advancements in Engineering and Technology (ICAET 2015)
5
A Survey on Zone Routing Protocol
Nafiza Mann
PG Student
CSE dept.
RIMT- Institute of Engineering
and Technology,
Mandi-Gobindgarh
Abhilash Sharma
Assistant Professor
CSE dept.
RIMT- Institute of Engineering
and Technology,
Mandi-Gobindgarh
Anuj Kumar Gupta
Associate Professor
CSE dept.
Bhai Gurdas Institute of
Engineering and Technology,
Sangrur
ABSTRACT
In this paper, the Zone Routing Protocol (ZRP) is surveyed
for the nature of its parametric performance. ZRP is hybrid
routing protocol works on various routing phenomenon such
as Intra-Zone Routing Protocol (IARP) which routes within its
routing zone, Inter-Zone Routing Protocol (IERP) which
routes outside the routing zone, Bordercast Resolution
Protocol (BRP), Query Control Mechanisms includes Query
Detection (QD1/QD2), Early Termination (ET), Random
Query Processing Delay (RQPD). Multicast Zone Routing
Protocol, Two-Zone Routing Protocol along with security of
Zone Routing protocol in considered. The analyzed
performance of the variety of parameters such as PDR (Packet
Delivery Ratio), Average Jitter, Average Throughput,
Average End-to-End Delay, Route Acquisition Latency,
Control Traffic, Overhead of Zone Routing Protocol in
different simulating environment under the normal and with
blackhole attack circumstances is compared.
Keywords
Hybrid Routing, Proactive Routing, Reactive Routing,
Routing zone, Black hole Attack, Performance parameters.
1. INTRODUCTION
ZRP is among most popular hybrid routing protocols. Zone
Routing Protocol is a prominent protocol combining both
proactive and reactive nature of routing. It is the ad hoc
protocol in which proactive procedure is being followed
within a scope of local neighborhood or routing zone only.
ZRP composed of Intra-Zone Routing Protocol (IARP), Inter-
Zone Routing Protocol (IERP), Bordercast Resolution
Protocol (BRP) along with various Query Control
mechanisms. IARP has limited scope which is defined by
zone radius. Within this routing zone radius, IARP very well
maintains the topology information of its local zone. IERP
acts as a global routing component for ZRP. Whenever a node
needs to send information outside the routing zone or the
route needed by a node is not available in local neighborhood,
IERP is used to send the data. As the traditional nature of
reactive routing protocols, route discovery and route
maintenance is also performed by IERP. For the reduction of
routing overhead Bordercast Resolution Protocol is used. By
using the information provided by IARP, it directs the route
requests outward. The outward request sent is multicast in
nature sent to certain set of peripheral nodes (surrounded). If
in case there is no reply after BRP, these set of nodes again
perform bordercasting to their peripheral nodes.Two main
approaches may be followed for bordercasting, root directed
bordercast and distributed bordercast. The query control
mechanism in ZRP includes: Query Detection (QD1/QD2),
Early Termination (ET), and Random Query Processing Delay
(RQPD). In bordercast tree all nodes can detect the QD1 and
can avoid the redundancy of queries in node‟s routing zone.
Overhearing in transmission range by any node is possible,
extending the QD2. During relaying of query, it can prune
covered nodes or already relayed nodes resulting ET. With
RQPD a relaying node can have another chance to prune
downstream nodes.
2. ZRP ARCHITECTURE
ZRP acts as a framework for other protocols. The local and
global neighborhood in ZRP are separated in such a way so as
to gain advantages of each routing technique. Local
neighborhood, named as „Zone‟, have number of nodes which
may be overlapped within different zones (may have different
sizes). Size of the zone in ZRP is defined as the count of
number of hops it takes to reach to its peripheral nodes called
„Zone Radius‟ [1]. This hybrid behavior suggest and decide to
follow the technique among both. This initiates route-
determination procedure on demand but at limit search cost
[2]. The proactive nature of this protocol minimizes the waste
count associated to this technique. The Zone Routing Protocol
consists of several components, which only together provide
the full routing benefit to ZRP [3].
Fig 1: ZRP Architecture
Each component works independently of the other and they
may use different technologies in order to maximize
efficiency in their particular area. Components of ZRP are
IARP, IERP and BRP. The relationship between components
is illustrated in Figure 1. IARP is responsible for proactive
maintenance while IERP for the reactive one. Bordercasting
leverages IARP‟s up-to-date view of local topology to
efficiently guide route queries away from the query source
[4].
2.1 Intra-Zone Routing Protocol (IARP)
This protocol communicates with interior nodes of the zone.
Zone radius limits the zone size. In IARP, the change in
topology results in change in local neighborhood. IARP
signifies the use of indoor routing zone. It always desires to
International Journal of Computer Applications (0975 8887)
International Conference on Advancements in Engineering and Technology (ICAET 2015)
6
update the routing information [5]. IARP helps in removal of
node redundancy along with tacking to link-failures. Figure 2.
Shows the routing zone concept with radius 2 hops. Here S is
considered as a source node having zone radius of 2 hops. So
in this case, the node A, B are considered as interior nodes
having hop count less than zone radius. The nodes C, D and G
are considered to be peripheral nodes having hop count less
than or equal to the zone radius. While Nodes E, F have the
hop count greater than the zone radius, i.e. Outwards the
specified zone.
Fig 2: A routing zone of radius 2 Hops
However, it should be kept in mind that zone is not a
description of physical distance [4]. Media Access Control
(MAC) protocol and Neighbor Discovery Protocol (NDP) can
be use to provide identification of neighbors. Operation of
IARP is done by broadcasting “hello” beacons. The reception
of these beacons indicates the connection establishment.
2.1.1 When to send
Source node send new routing information if:
there is change in topology or there is a link failure,
there is change in routing zone of node,
if the node has not send the packet in its previous
time slot.
2.2 Inter-Zone Routing Protocol (IERP)
It is the global reactive routing component of ZRP. IERP is
responsible for acquiring route to destination that are located
beyond the routing zone. With the help of knowledge gained
about local topology, IERP perform the on-demand routing
mechanism [6]. In presence of route, it issues route queries.
Bordercasting helps to minimize the delay caused by route
discovery. Redundancy of nodes (already covered) is avoided.
An example is illustrated in Figure 3.
Fig 3: IERP operation
S prepares to send data to destination D. S checks if D exists
in its local neighborhood. If so, route is already known by S.
Otherwise, a query is sent to its peripheral nodes by S i.e. (C,
G, H). These peripheral nodes further checks for D in their
routing zone. Like in here, when H send query to B, B
recognized D as the node in its routing zone and respond back
to query. The path then established is S-H-B-D [4].
2.3 Bordercast Resolution Protocol (BRP)
Whenever route is requested with the global reactive
technique, BRP is used to nonstop it and maximizes its
effectiveness. IARP routing information is used by BRP. This
information is constructed by IARP from its map provided by
local proactive technique. It maintains the redundancy
removal phenomenon by pruning the nodes it has already
covered (received the query) i.e. When a node receives a
query packet for a node that does not lie within its local
routing zone, a bordercast tree is constructed so that it packet
can be forwarded its neighbors. Upon reception of the packet,
bordercast tree is reconstructed by these nodes so they can
determine whether or not it belongs to the tree of the sending
node. If it does not belongs to the bordercast tree of the
sending node, it continues to process the request and
determines if the destination lies within it‟s routing zone and
takes the appropriate action, so that the nodes within the zone
are marked covered [1]. The two approaches of BRP are
2.3.1 Root Directed Bodercast
In this source nodes and peripheral nodes construct their
multicast trees to which the forwarding instructions to routing
query packet are appended, resulting additional route
overhead which increase with increase in zone radius.
2.3.2 Distributed Bordercast
In this, an extended routing zone is established and
maintained by each node which increases the local routing
information exchanges, resulting in reduction of route
discovery requirement.
2.4 Query Control Mechanism
As per ZRP strategy, querying performing is more efficient
than directly flooding the route requests but due to heavy
overlapping, multiple forwarded route requests can result into
more control traffic than flooding. This happens because
whenever a query is bordercasted, it efficiently covers the
node‟s complete routing zone and excess route query traffic is
the result of redundant query messages. Thus a collection of
query control mechanism is introduced by ZRP.
2.4.1 QD1/QD2
With the help of BRP, the relaying nodes in the tree becomes
able to detect the query which is redundant (QD1). BRP use
bordercast tree hop by hop for this process. It is possible for
queries to be detected within the transmission range of
relaying node, extending query detection capability (QD2).
Bordercast relay QD2
Fig 4: Query Detection (QD1/QD2)
International Journal of Computer Applications (0975 8887)
International Conference on Advancements in Engineering and Technology (ICAET 2015)
7
In example, as when node A bordercast to its peripheral nodes
(B-F), The intermediate nodes (relaying) (G, H, I, J) are able
to detect query by QD1. Using QD2, node K able to detect
node G‟s transmission even if node K does not belong to node
A‟s bordercast tree. Even with the high level query detection,
QD2 does not guarantee of the whole routing zone being
informed. Like in here, node L does not overhear and is thus
unaware that L‟s routing is covered by query or not. The
relationship between components is illustrated in Figure 1.
IARP is responsible for proactive maintenance while IERP for
the reactive one. Bordercasting leverages IARP‟s up-to-date
view of local topology to efficiently guide route queries away
from the query source [4].
2.4.2 Early Termination (ET)
In general, it may not be possible to understand that whether
query has perfectly outward to the uncovered zones but the
information obtained from QD1 and QD2 can very well
support Early Termination.
2.4.3 Random Query Processing Delay (RQPD)
During bordercast, node‟s routing zone is covered instantly
but even the query take some infinite amount of time to make
a way along the bordercast tree, it can be detected by QD
mechanism. Within this time, it is possible that any
neighboring node may re-bordercast the message
simultaneously. This problem can be addressed by
bordercasting RQPD. During scheduling of random delay by
waiting node, it can benefit to detect the previous bordercast
tree for already covered areas. This is how RQPD can
significally improve performance up to a point [4].
In Multicast Zone Routing Protocol, a multica--st tree
membership information is maintained proactively. Multicast
ZRP makes on-demand route requests by Multicast Inter zone
routing protocol with an efficient query mechanism [7].
For MANETs, there exist an extension of ZRP named as
Two-Zone Routing Protocol (TZRP). In this two zones may
having different topologies and route updation mechanisms
are used to attain the decoupling of protocol‟s ability to adapt
to traffic characteristics which are gained from the ability to
adapt the mobility. TZRP provides a framework to balance
tradeoff between pure proactive and reactive routing
techniques more effectively than ZRP [7].
The security of any protocol is a big issue. Security of ZRP
aims to tackle the problem of excess bandwidth and long route
requests delay etc. There may be certain mechanisms for
security such as identity based key management. In this,
identifier with the strong cryptographic binding is chosen.
Another can be mechanism which may provide a secure
neighbor discovery. To secure the routing packets can be a
way out. A mechanism for certain alarm messages in presence
of any malicious node (s) can also be adapted [8].
3. ANALYSIS OF ZRP
ZRP has been analyzed on number of platforms with different
kind of methods. As per simulation in [9], the proactive
protocol shows the slightly constant number of flooded
packets with increase in the transmission radius while ZRP as
compare to this protocol, shows a drastic increase in the
number of flooded packets. As concluded in [2], the amount
of intrazone control traffic required to maintain the zone
radius increases along with the size of routing zone. ZRP
configuration can provide good reduction (25%) in control
traffic compared to traditional flood search. The reactive
nature of ZRP is observed more suitable for networks which
exhibits smaller network spans, larger transmission radii. For
highly volatile networks, it is conclude that ZRP provide 20%
less delay then reactive routing only. In real-time scenarios,
ZRP (mobile nodes) may attain good performance as done on
real-time network and traffic configuration as per
experimentation performed in [10][11].
The simulations performed in [12], shows that the proactive
part is able to communicate a large amount of routing
information at very low overhead as shown in Figure 5.and
high value of MAXHOPS results in small route acquisition
latencies, but there exist higher routing overhead and higher
information storing cost. If the networks that are largely idle,
the proactive part may cause unnecessary overhead.
Fig 5: Proactive routing overhead when time is 200sec
Fig 6: Reactive routing overhead when time is 200sec
International Journal of Computer Applications (0975 8887)
International Conference on Advancements in Engineering and Technology (ICAET 2015)
8
Fig 7: Route Acquisition latency when time is 200sec
Fig 5 and Fig 6 shows the proactive and reactive routing
overhead in the network size of 150 with 200sec of simulation
time span. The MAXHOPS of 8 showed highest value in
proactive and lowest value in reactive nature one.
In Fig 7, the MAXHOPS of 8 showed lowest value for Route
Acquisition Latency as the needed routes were already present
for the connection establishment.
In simulations performed in [4], with query control
mechanism, it is observed that traffic (number of packets)
increases with increase in zone radius during proactive
technique while in reactive technique, there is a fall in number
of traffic (number of packets) with increase in zone radius.
It is observed that, ZRP‟s response time is comparable to that
of flood searching, but with less routing control traffic. The
improvements in route response time are even greater when
we consider that a node can immediately provide routes for all
of its routing zone nodes.
Fig 8: Average Throughput with 10 Connections
Fig 9: Normalized Routing Load with 10 Connections
As observed in simulations performed in [13], average
throughput of ZRP, initially showed moderate performance
with respect to DSR (reactive) and OLSR (proactive). As the
network size increases, the great fall in the performance of
ZRP is observed. While the Normalized Routing Load of ZRP
is overall high in comparison to DSR and OLSR, resulting
lack of performance.
While increase in traffic also increase the optimal zone radius
value. In case of jitter evaluation of ZRP [14], it shows bad
performance as the number of nodes and packets increases. As
observed in [5] simulation, ZRP is not considered so good in
the presence of black hole attack. In Black Hole attack any
fake or malicious node sends information of having a shortest
route to the destination resulting data discard or data misuse. I
can be a attack by any single node or by group of nodes.
Further Performance of ZRP protocol can be enhanced as per
done in [15], where various parameters are taken into
consideration and observed that radius value low (2 here) is
considered to be optimal for small and medium loads while
medium value (3 here) is optimal for important and high
density loads.
4. COMPARISON OF PARAMETERS
In this survey, we have compared the following parameters of
ZRP with the zone radius as shown in Table 1.
Table 1. Comparison of parameters with the zone radius
Zone Radius
Parameters
Low
High
Control Traffic
(Proactive)
Low
High
Control Traffic
(Reactive)
High
Low
Overhead
Low
High
Mobility
Increase
Decrease
International Journal of Computer Applications (0975 8887)
International Conference on Advancements in Engineering and Technology (ICAET 2015)
9
Route Acquisition Delay
Low
Packet Delivery Ratio
Moderate
Moderate
Packet Delivery Ratio
(with blackhole attack)
Moderate
Deteriorates
Av. Jitter
Low
High
Av. Jitter
(with blackhole attack)
High
High
Av. End-to-End Delay
Moderate
High
Av. End-to-End Delay
(with blackhole attack)
High
High
Av. Throughput
Moderate
Moderate
Av. Throughput
(with blackhole attack)
Low
Low
5. CONCLUSION
In this survey of Zone Routing Protocol, it is concluded that in
comparison with only proactive protocols and only reactive
protocols, this hybrid routing protocol is more efficient but if
restricted to small area networks only. For the larger network
routing, ZRP is unable to show such a good performance with
various parameters such as control traffic, Packet delivery
ratio, End to End delay, Jitter, Throughput, Overhead etc. as it
shows in small routing networks. These parameters are
examined and compared on the basis of concluded simulation
results. The efficiency of these parameters also depends on the
proactive or reactive nature of the routing. The whole nature
of ZRP depends on its zone radius. With increase and
decrease in routing zone radius, the performance of ZRP
increases or falls considerably. The lower value of zone radius
has proved better for ZRP processing than the greater one.
For future perspective, the analysis of ZRP can be performed
with various platforms. Further, the performance of ZRP can
be observed for large network sizes such as, with respect to
mobile criteria. Performance of ZRP can be enhanced with
new improvements in its routing mechanisms.
6. REFERENCES
[1] Shaily Mittal, Prabhjot Kaur, “Performance Comparison
of AODV, DSR and ZRP routing protocols in
MANET‟s”, 978-0-7695-3915-7/09 IEEE 2009.
[2] Zygmunt J. Haas, Marc R. Pearlman, “The Performance
Of A New Routing Protocol For The Reconfigurable
Wireless Networks”, School of Electrical Engineering,
Cornell University, Ithaca, NY, 14853, IEEE 1998.
[3] Anuj k. Gupta, Harsh Sadawarti, Anil k.Verma, “A
Review of Routing Protocols for Mobile Ad Hoc
Networks”, WSEAS Transactions on Communications,
ISSN: 1109-2742, 11(10):331-340, November 2011.
[4] Zygmunt J. Haas, Marc R. Pearlman, “The Performance
of Query Control Schemes for the Zone Routing
Protocol”, Senior Member, IEEE, IEEE/ACM
TRANSACTIONS ON NETWORKING, VOL. 9, NO.
4, AUGUST 2001.
[5] Harjeet Kaur, Manju Bala, Varsha Sahni, “Performance
Evaluation of AODV, OLSR and ZRP routing protocol
under the Black Hole attack in MANET”, Vol. 2, Issue 6,
June 2013.
[6] Anuj k. Gupta, Harsh Sadawarti, Anil k.Verma,
“Performance analysis of AODV, DSR and TORA
routing protocols”, International Journal of Engineering
and Technology (IJET),Article No. 125, 2(2): 226-231,
April 2010.
[7] Xiaofeng Zhang, Lillykutty Jacob, Multicast Zone
Routing Protocol in Mobile Ad HocWireless Networks”,
Proceedings of the 28th Annual IEEE International
Conference on Local Computer Networks (LCN‟03)
0742-1303/03 IEEE 2003.
[8] Ibrahim S. I. Abuhaiba, Hanan M. M. Abu-Thuraia,
Securing Zone Routing Protocol in Ad-Hoc Networks”,
I. J. Computer Network and Information Security, 2012,
10, 24-36.
[9] Zygmunt J. Haas, “A New Routing Protocol for
Reconfigurable Wireless Networks”, 0-7803-3777-8/97
IEEE 1997.
[10] Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive
Bagrodia, Michael J. Acriche, “Performance of Mobile
Ad Hoc Networking Routing Protocols in Realistic
Scenarios”, IEEE 2003.
[11] Anuj k. Gupta, Harsh Sadawarti, Anil k.Verma,
“Performance Analysis of MANET Routing Protocols in
Different Mobility Models”, International Journal of
Information Technology and Computer Science
(IJITCS), ISSN: 2074-9015, 5(6): 73-82, May 2013.
[12] Rohit Kapoor, Mario Gerla, A Zone Routing Protocol
for Bluetooth Scatternets”, 0-7803-7700-1/03 IEEE
2003.
[13] Savita Gandhi, Nirbhay Chaubey, Pathik Shah, Madhvi
Sadhwani, Performance Evaluation of DSR, OLSR and
ZRP Protocols in MANETs ”, 978-1-4577-1583-9/ 12,
IEEE 2012.
[14] Swati Bhasin, Puneet Mehta, Ankur Gupta,
Comparison of AODV, OLSR and ZRP in Mobile Ad-
hoc Network on the basis of Jitter”, ECE Department,
Punjab College of Engineering & Technology, Lalru,
ECE Department, Geeta Institute of Management &
Technology, Kurukshetra, ISSN 22779140 July 2012.
[15] A. Loutfi, M. Elkoutbi, “Evaluation and enhancement of
ZRP performances”, IEEE 2010.
[16] Brijesh Patel, Sanjay Srivastava, “Performance Analysis
of Zone Routing Protocols in Mobile Ad Hoc Networks”,
978−1−4244−6385−5/10IEEE2010.
IJCATM : www.ijcaonline.org

Supplementary resource (1)

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
This paper presents a detailed simulation study of Dynamic Source Routing (DSR), Optimized Link State Routing Protocol (OLSR) and Zone Routing Protocol (ZRP) in different mobile scenarios generated by Random Waypoint model for Mobile Ad hoc networks. The impact of these routing protocols is evaluated with respect to Average End-to-End Delay, Average Jitter, Average Throughput, Normalized Routing Load (NRL) and Packet Delivery Fraction (PDF). The major goal of this study is to analyze the performance of popular MANETs routing protocol in high mobility scenarios.
Article
Full-text available
A mobile ad-hoc network (MANET) is basically called as a network without any central administration or fixed infrastructure. It consists of a number of mobile nodes that use to send data packets through a wireless medium. There is always a need of a good routing protocol in order to establish the connection between mobile nodes since they possess the property of dynamic changing topology. Further, in all the existing routing protocols, mobility of a node has always been one of the important characteristics in determining the overall performance of the ad hoc network. Thus, it is essential to know about various mobility models and their effect on the routing protocols. In this paper, we have made an attempt to compare different mobility models and provide an overview of their current research status. The main focus is on Random Mobility Models and Group Mobility Models. Firstly, we present a survey of the characteristics, drawbacks and research challenges of mobility modeling. At the last we present simulation results that illustrate the importance of choosing a mobility model in the simulation of an ad hoc network protocol. Also, we illustrate how the performance results of an ad hoc network protocol drastically change as a result of changing the mobility model simulated.
Article
Full-text available
This paper aims to compare performance of some routing protocols for Mobile Ad-Hoc networks (MANET’s). A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. Data transmission between two nodes in MANET’s , requires multiple hops as nodes transmission range is limited. Mobility of the different nodes makes the situation even more complicated. Multiple routing protocols especially for these conditions have been developed during the last years, to find optimized routes from a source to some destination. This paper presents performance evaluation of three different routing Protocols (AODV, DSR and ZRP) in variable pause times . We have used QualNet Simulator [1] from Scalable Networks to perform the simulations. Performance evaluation of AODV, DSR and ZRP is evaluated based on Average end to end delay, TTL based hop count and Packet delivery ratio.
Article
Full-text available
In this paper, we study the performance of route query control mechanisms for the Zone Routing Protocol (ZRP) for ad hoc networks. ZRP proactively maintains routing information for a local neighborhood (routing zone), while reactively acquiring routes to destinations beyond the routing zone. This hybrid routing approach can be more efficient than traditional routing schemes. However, without proper query control techniques, ZRP cannot provide the expected reduction in the control traffic. Our proposed query control schemes exploit the structure of the routing zone to provide enhanced detection and prevention of overlapping queries. These techniques can be applied to single-channel or multiple-channel ad hoc networks to improve both the delay and control traffic performance of ZRP. Our query control mechanisms allow ZRP to provide routes to all accessible network nodes, with less control traffic than purely proactive link state or purely reactive route discovery, and with less delay than conventional flood searching. Index Terms- ad-hoc network, routing protocol, routing zone, ZRP, zone routing protocol, proactive routing, reactive routing, hybrid routing, bordercast, query control I.
Article
Full-text available
A number of routing protocols has been proposed in recent years for possible use of Mobile Ad Hoc Networks in various application areas such as military, govt. etc. In this paper we have presented a comprehensive review of these protocols with a particular focus on their security aspects. Further we have presented a comparison of some of the existing Routing Protocols of MANETs. The base criteria for comparison is routing methodologies and the information used to make routing decisions. All the protocols have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability, with respect to which the analyses of secure versions of proposed protocols are discussed.
Article
Full-text available
The field of Mobile Ad hoc Networks (MANETs) has gained an important part of the interest of researchers and become very popular in last few years. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. They can be studied formally as graphs in which the set of edges varies in time. The main method for evaluating the performance of MANETs is simulation. This paper is subjected to the on-demand routing protocols with identical loads and environment conditions and evaluates their relative performance with respect to the two performance metrics: average End-to-End delay and packet delivery ratio. We investigated various simulation scenarios with varying pause times. From the detailed simulation results and analysis, a suitable routing protocol can be chosen for a specified network and goal.
Article
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change rapidly and unpredictably over time. Each device in a Mobile Adhoc Network is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Its routing protocol has to be able to cope with the new challenges that a MANET creates such as nodes mobility, security maintenance, and quality of service, limited bandwidth and limited power supply. These challenges set new demands on MANET routing protocols. With the increasing interest in MANETs, there has been a greater focus on the subject of improving the quality of service as per the requirement of the user according to the various conditions such as cell size, weather, traffic, mobility of users etc. The main objective of this paper is to compare the performance based on jitter present in transmission of packet in a MANET by using different types of protocols viz: Proactive, Reactive, Hybrid. This system is developed for IEEE 802.11b based Wireless network and simulated through Qualnet 5.0. Packet size and No. of users are the two parameters in this paper which helps to find out the suitable type of traffic that can be use in a MANET.
Article
This paper is a contribution in the field of security analysis on mobile ad-hoc networks, and security requirements of applications. Limitations of the mobile nodes have been studied in order to design a secure routing protocol that thwarts different kinds of attacks. Our approach is based on the Zone Routing Protocol (ZRP); the most popular hybrid routing protocol. The importance of the proposed solution lies in the fact that it ensures security as needed by providing a comprehensive architecture of Secure Zone Routing Protocol (SZRP) based on efficient key management, secure neighbor discovery, secure routing packets, detection of malicious nodes, and preventing these nodes from destroying the network. In order to fulfill these objectives, both efficient key management and secure neighbor mechanisms have been designed to be performed prior to the functioning of the protocol. To validate the proposed solution, we use the network simulator NS-2 to test the performance of secure protocol and compare it with the conventional zone routing protocol over different number of factors that affect the network. Our results evidently show that our secure version paragons the conventional protocol in the packet delivery ratio while it has a tolerable increase in the routing overhead and average delay. Also, security analysis proves in details that the proposed protocol is robust enough to thwart all classes of ad-hoc attacks.
Conference Paper
In Mobile Ad Hoc Networks (MANETs), routing is a challenging task due to node mobility, traffic and network size. It is very important to analyze the scalability characteristics of the routing protocols with respect to these parameters. Zone Routing Protocol (ZRP) is considered to be one of the most scalable routing protocols due to its multi-scoping and hybridization features. We propose a general, parameterized model for analyzing control overhead of ZRP. A generic probabilistic model for data traffic is also proposed which can be replaced by different traffic models. Our analytical model is validated by comparisons with simulations performed under different network scenarios. In our simulation results, we have observed that the optimal zone radius lies at a point where proactive and reactive overhead components of ZRP are approximately equal as observed in. Further, as the mobility increases the optimal zone radius value decreases, and as the traffic increases the value of optimal zone radius increases. If a node operates away from the optimal zone radius setting then it has to bear additional routing overhead. We show that the additional overhead is around 35% higher under a wide range of mobility scenarios.
Article
ZRP (Zone Routing Protocol) is a hybrid routing protocol that combines proactive and reactive techniques. It distinguishes between two areas: proactive (or intra-zone) corresponding to the N- neighborhood in which it applies a proactive technique and reactive (or inter-zone) corresponding to the rest of the network (excluding the N- neighborhood), in which the reactive approach is applied. This hybrid protocol relates on of the fact that distant nodes communicate with each other less often than the neighboring nodes. Therefore it is more obvious to keep in the local topology only nodes at a reduced number of hops. A global knowledge of the entire network is generally expensive and less useful. We study in this paper the impact of the network size, the traffic load and the zone radius on ZRP performances. The obtained results show that a radius zone of 3 is a preferred and optimal value compared to radius 2 when the traffic load is important.