Research ProposalPDF Available

Mobile Ad-hoc Network Routing Protocols: Comparative Study

Authors:
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463
Vol. 2 Issue 12, December -2013, pp: (57-62), Available online at: www.erpublications.com
Page | 57
Mobile Ad-hoc Network Routing Protocols:
Comparative Study
Anil Saini1, Vinod Kumar2
1,2Dept. of Computer Science & Applications
Kurukshetra University, Kurukshetra, Haryana, India
Abstract: A Mobile Ad-Hoc Network has not possessed any fixed infrastructure. Due to mobility of nodes, and
frequent link breakage carry out, no central administrator is required. Hence, in MANET’s routing is
challenging job and it generating multiple types of routing protocols. In this paper, the author describe on
routing techniques that have the major challenges in ad hoc networks due to the dynamic topology. Therefore,
to determine the actual suitability of the routing protocol for MANET is very difficult for different network
conditions. At this point, the author suggests about the routing protocols with comparative opinions for reactive,
proactive and hybrid routing protocols.
Keywords: MANETs, Routing Protocols, Reactive, Proactive, Hybrid.
1 INTRODUCTION
Ad hoc wireless networking is a new approach to wireless communication with potential applications in very
unpredictable and dynamic environments. In contrast to cellular and wired networks, an ad hoc wireless network does
not depend on any established infrastructure or centralised administration such as a base station. It is a set of
autonomous system of mobile nodes that move freely and randomly. Therefore, its network topology is dynamic in
nature and may change speedily and unpredictably. Hence, the intercommunications among nodes will change
continuously. Such networks have no infrastructure for achieving end-to-end routing of packets. The nodes
communicate with each other without the intervention of a centralized administration; thus each acts both as a router
and as a host.
Mobile Ad Hoc network [1, 13] is a collection of wireless mobile hosts forming a temporary network without the aid of
any centralized administration; in which each node cooperate by forwarding packets to each other to allow nodes to
communicate beyond direct wireless transmission range. Routing is a process of sharing information from one station
to other stations of the network. Routing protocols of mobile ad-hoc network tend to need different approaches from
existing Internet protocols because of mobile host, dynamic topology, and distributed environment, less battery power
and less bandwidth. Mobile Ad Hoc routing protocols can be categorized into two parts: table-driven (proactive
schemes) and on-demand routing (reactive scheme) based on when and how the routes are discovered. In Proactive
routing protocols [15] each node maintains one or more tables containing routing information about nodes in the
network whereas in on-demand routing the routes are created as and when required. The security of ad hoc wireless
networks is becoming an increasingly complex issue. Many applications today, especially emergency and military
ones, are based upon mobile ad hoc wireless networks, where security requirements are harder to achieve than in
traditional networks. Securing routing creates particular difficulties, since these networks have neither centrally
administrated secure routers nor strict policies of use. The network topology is rapidly changing due to nodes in the
networks being highly mobile, thus creating the presence or absence of links. Therefore, routing is especially harder to
accomplish robustly, securely and efficiently at the same time. Security requirements such as non-repudiation, data
integrity, confidentiality and authentication which would otherwise be provided by a central machine must be enabled
and provided by all nodes.
1.1 Main characteristics of MANET are [2, 13] :-
1.1.1 Dynamic Topologies nodes are free to move arbitrarily, the network topology may change rapidly and
randomly at unpredictable times. The links may be unidirectional and bidirectional.
1.1.2 Bandwidth constrained, variable capacity links: Wireless links have significantly lower capacity than their
hardwired counterparts. Also, due to multiple access interference conditions, fading, and noise etc. the
wireless links have low throughput.
1.1.3 Energy constrained operation: All or Some of the nodes in a MANET may rely on batteries. In this scenario,
the most important system design criteria for optimization may be energy conservation.
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463
Vol. 2 Issue 11, November -2013, pp: (97-105), Available online at: www.erpublications.com
Page | 58
1.1.4 Limited physical security: Mobile wireless networks are generally more prone to physical security threats than
are fixed- cable nets. The increased possibility of denial-of-service, spoofing and eavesdropping attacks should
be carefully considered. Existing link security techniques are often applied within wireless networks to reduce
security threats. As a benefit, the decentralized nature of network control in MANET provides additional
robustness against the single points of failure of more centralized approaches.
1.1.5 Autonomous and infrastructure less: Network is self-organizing and is independent of any fixed infrastructure
or centralized control. The operation mode of each node is distributed peer-to-peer capable of acting as an
independent router as well as generating independent data.
1.1.6 Multi hops Routing: There is no dedicated router and every node acts as a router to pass packets to other
nodes.
1.1.7 Security Threats: There are higher chances of physical security threats like spoofing, eavesdropping and denial
of service (DoS) in wireless networks as compared to wired networks.
2. DESIGN ISSUES AND IT’S CHALLENGES
Ad hoc wireless networks inherit the traditional problems of wireless communications, such as bandwidth optimization,
power control and transmission quality enhancement, while, in addition, their mobility, multi-hop nature and the lack of
fixed infrastructure create a number of complexities and design constraints that are new to mobile ad hoc networks.
2.1 Bandwidth Efficiency and Overhead: Since the radio spectrum is limited, the bandwidth available for
communication is very limited. The MAC protocol must be designed in such a way that the scarce bandwidth is utilized
in an efficient manner .The control overhead involved must keep as minimum as possible.
2.2 Quality of Support (Qos): The nodes are mobile most of the time, providing QoS support to data sessions in
such networks is very difficult. Bandwidth reservation made at one point time may become invalid once the node
moves out of the region where the reservation was made. QoS support is essential for supporting time critical traffic
sessions.
2.3 Synchronization: A MAC protocol must take into consideration the synchronization between nodes in the
network and bandwidth reservation by nodes. The exchange of control packets may be required for achieving time
synchronization among nodes .The control packets must not consume too much of work band width.
2.4 Hidden and Exposed Terminal Problems: The hidden terminal problem refers to the collision of packets at a
receiving node due to simultaneous transmission of those nodes that are not within the direct transmission range of the
sender, but are within the transmission range of receiver. Collision occurs when both nodes transmit packets at the
same time. The hidden and exposed terminal problems significantly reduce the throughput of a network when the
traffic load is high. It is therefore desirable that the MAC protocol be free from the hidden and exposed terminal
problems.
Figure 1: Hidden Terminal Problem
Figure 2: Exposed Terminal Problem
2.5 Error Prone Shared Broadcast Channel: Because of broadcasting nature of transmission, collisions may occur.
A MAC protocol should grant channel access to nodes in such a manner that collisions are minimized. Also, the
protocol should that all nodes are treated fairly with respect to bandwidth allocation.
2.6 Distributed Nature/ Lack of Central Coordination: In MANET nodes move continuously, therefore nodes must
be scheduled in a distributed fashion for gaining access to the channel. This may require exchange of control
information. The MAC protocol must make sure that the additional overhead, in terms of bandwidth consumption,
incurred due to this control information exchange is not very high.
2.7 Mobility of Nodes: Nodes are mobile most of the time in wireless network. The bandwidth reservation made
or control information exchange may end up being of no use if node mobility is very high. The MAC protocol has no
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463
Vol. 2 Issue 11, November -2013, pp: (97-105), Available online at: www.erpublications.com
Page | 59
role to play in influencing the mobility. The MAC protocol design must take this mobility factor into consideration
such that the performance of the system is not significantly affected due to node mobility.
3. APPLICATIONS OF MANET
Because of their flexibility, MANETS are seen as important components in 4G architecture and ad hoc networking
capabilities are believed to form a significant part of overall functionalities of next generation. The application of
MANET has become wide and varied from email to ftp to web services. Some common MANET applications are:
Figure 3: Application of MANET
3.1 Military Environments: Since it is not possible to install base station in the enemy territories or inhospitable
terrain MANET provides communication services where soldiers act like nodes. The required coordination among the
soldiers and in military objects can be seen as another application of MANET in military services.
3.2 Civilian Environments: MANET finds its use in many civilian activities like meeting room, boats, taxi cab
network, small aircraft, sport stadium etc
3.3 Emergency Operations: Because of its easy deployment, the use of MANET in situations like crowd control,
search and rescue, disaster recovery and commando operations, the use of mobile ad hoc networks is very much
suitable. MANET can also be established when conventional infrastructure based communication is damaged due to
any calamities.
3.4 Local Level: Ad hoc networks can autonomously link an instant and temporary multimedia network using
notebook computers or palmtop computers to spread and share information among participants at e.g. conference a
classroom. Another appropriate local level application might be in home networks where devices can communicate
directly to exchange information.
4. ROUTING PROTOCOLS IN MANET
The highly dynamic natures of the mobile nodes create frequent and unpredictable network topology changes. This
topology change increases the routing complexity among the mobile nodes within the network. There for traditional
routing algorithms are not sufficient to the successful routing in MANET. Routing in a MANET [15] depends on many
other factors including topology, selection of routers, and location of request initiator and specific underlying
characteristics that could serve as a heuristic in finding the path quickly and efficiently. This makes the routing area
perhaps the most active research area within the MANET domain. Especially over the last few years, numerous routing
protocols and algorithms have been proposed and their performance under various network environments and traffic
conditions closely studied and compared.
Figure 4: Classification of Routing Protocol in MANET
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463
Vol. 2 Issue 11, November -2013, pp: (97-105), Available online at: www.erpublications.com
Page | 60
4. 1 Proactive or Table-Driven Routing Protocol
Proactive routing protocols [1, 2] attempt to maintain consistent, up-to-date routing information between every pair of
nodes in the network by propagating, proactively, route updates at fixed time intervals. These protocols are sometimes
referred to as table-driven protocols since the routing information is maintained in tables. The proactive routing
approaches designed for ad hoc networks are derived from the traditional routing protocols. The primary characteristic
of proactive approaches is that each node in the network maintains a route to every other node in the network at all
times. Route creation and maintenance is accomplished through some combination of periodic and event-triggered
routing updates. Periodic updates consist of routing information exchanges between nodes at set time intervals. The
updates occur at specific intervals, regardless of the mobility and traffic characteristics of the network. Event-triggered
updates, on the other hand, are transmitted whenever some event, such as a link addition or removal, occurs. The
mobility rate directly impacts the frequency of event-triggered updates because link changes are more likely to occur as
mobility increases. Proactive approaches have the advantage that routes are available the moment they are needed.
Because each node consistently maintains an up-to-date route to every other node in the network, a source can simply
check its routing table when it has data packets to send to some destination and begin packet transmission. However,
the primary disadvantage of these protocols is that the control overhead can be significant in large networks or in
networks with rapidly moving nodes. Further, the amount of routing state maintained at each node scales as O(n),
where n is the number of nodes in the network. Proactive protocols tend to perform well in networks where there is a
significant number of data sessions within the network. In these networks, the overhead of maintaining each of the
paths is justified because many of these paths are utilized. Different Types of Proactive Routing Protocol are:
Destination-Sequenced Distance-Vector (DSDV) protocol, Wireless Routing Protocol (WRP), Optimized Link State
Routing Protocol (OLSR), Fisheye State Routing (FSR), Cluster Head Gateway Routing (CGSR).
In DSDV every node in the network maintains a routing table in which all the possible destinations within the
network as well as the number of hops to reach each destination are recorded. Each route entry is marked with a
sequence number. Nodes periodically transmit routing table updates throughout the network in order to maintain table
consistency. Route updates contains the address of some node, the number of hops to reach the destination, the
destination sequence number as well as a sequence number that uniquely identifies the update.
In OLSR is an optimization over the classical link state protocol. The key idea is to reduce duplicate broadcast
packets in the same region. This is achieved with the use of the so called multipoint relay nodes. Each node selects a
minimal set of multipoint relay nodes from among its one-hop neighbours. The goal behind the MPR principle is to
achieve efficient flooding. When a node want to flood a message it sends the message only to the nodes in MPR, which
in turn send the message to their MRP nodes and so on. A node retransmits a message if it has not received the message
before, and the node is selected as multipoint relay by the node from which the message is received.
WRP is another loop-free proactive protocol whereby four tables are used to maintain distance, link cost,
routes, and message retransmission information. General route updates are sent among neighbouring nodes with
distance and second-to-last hop information for each destination, resulting in faster convergence. In FSR protocol is
also an optimization over Link State algorithm using the fisheye technique. In essence, FSR will propagate link state
information to other nodes in the network based on how far away the nodes are. The protocol will propagate link state
information more frequently with nodes that are in a closer scope as opposed to ones that are further away. This means
that a route will be less accurate the further away the node is, but once the message gets closer to the destination, the
accuracy increases.
In CGSR is a routing protocol that has a hierarchical-based design. CGSR organized nodes into cluster
entrusted to a special node named cluster-head. This cluster-head is elected dynamically by employing a least cluster
change (LLC) algorithm [3]. According to this algorithm, a node ceases to be a cluster-head only if it comes under the
range of another cluster-head where the tie is broken either using the lowest id or highest connectivity algorithm.
Clustering provides a mechanism to allocate bandwidth, which is a limited resource, among different clusters, thereby
improving reuse. All member nodes of a cluster can be reached by a cluster-head to provide improved coordination
among nodes that fall under its cluster. A token based scheduling [4] is used within a cluster for sharing the bandwidth
among the member of the cluster. CGSR assume that all communication passes through the cluster-head.
Communication between two clusters takes place through the common member nodes that are member of both the
clusters. These nodes which are members of more than one cluster are called gateways.
4.2 Reactive Routing or On-Demand Routing Protocol
Reactive routing [13, 14] techniques, also called on-demand routing, take a very different approach to routing than
proactive protocols. A large percentage of the overhead from proactive protocols stems from the need for every node to
maintain a route to every other node at all times. In a wired network, where connectivity patterns change relatively
infrequently and resources are abundant, maintaining full connectivity graphs is a worthwhile expense. The benefit is
that when a route is needed, it is immediately available. In an ad hoc network, however, link connectivity can change
frequently and control overhead is costly. Because of these reasons, reactive routing approaches take a departure from
traditional Internet routing approaches by not continuously maintaining a route between all pairs of network nodes.
Instead, routes are only discovered when they are actually needed. When a source node needs to send data packets to
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463
Vol. 2 Issue 11, November -2013, pp: (97-105), Available online at: www.erpublications.com
Page | 61
some destination, it checks its route table to determine whether it has a route. If no route exists, it performs a route
discovery procedure to find a path to the destination. Hence, route discovery becomes on-demand. If two nodes never
need to talk to each other, then they do not need to utilize their resources maintaining a path between each other. The
route discovery typically consists of the network- wide flooding of a request message. To reduce overhead, the search
area may be reduced by a number of optimizations. Different Types of Proactive Routing Protocol are: Dynamic
Source Routing (DSR) protocol, Ad hoc On-demand Distance Vector (AODV) protocol, Temporally Ordered Routing
Algorithm (TORA).
DSR is based on the concept of source routing. In source routing each packet carries the complete ordered list
of nodes in which the packet should pass through the network. This is done by maintaining a cache with route from
source to destination. It includes two phases: Route discovery and Route maintenance. Route discovery is based on
flooding the network with a RREQ packet. A RREQ message includes the senders address, the target address, a unique
number to identify the request and a route record listing the addresses of each intermediate node through which the
RREQ is forwarded. On receiving RREQ packet, the destination replies to the originator with a RREP packet.
AODV is an improvement on the DSDV protocol. AODV minimizes the number of route broadcasts by
creating routes on an on-demand basis, as opposed to maintaining a complete list of routes as in the DSDV algorithm.
Like DSR, route discovery is initiated on an on-demand basis, the route request is then forward to the neighbours, and
so on, until either the destination or an intermediate node with a fresh route to the destination are located.
TORA is another source-initiated on-demand routing protocol, built on the concept of link reversal of Directed
Acyclic Graph (ACG). In addition to being loop-free and bandwidth-efficient, TORA has the property of being highly
adaptive and quick in route repair during link failure, while providing multiple routes for any desired source/destination
pair. These features make it especially suitable for large highly dynamic mobile ad hoc environments with dense
populations of nodes. The limitation in TORA’s applicability comes from its reliance on synchronized clocks. If a node
does not have a GPS positioning system or some other external time source, or if the time source fails, the algorithm
cannot be used.
4.3 Hybrid Routing Protocols
Hybrid protocols [1, 2] combine the features of reactive and proactive protocols. These protocols have the advantage of
both proactive and reactive routing protocols to balance the delay which was the disadvantage of Table driven
protocols and control overhead (in terms of control packages). Main feature of Hybrid Routing protocol is that the
routing is proactive for short distances and reactive for long distances. The common disadvantage of hybrid routing
protocols is that the nodes have to maintain high level topological information which leads to more memory and power
consumption. Different Types of Hybrid Routing Protocol are: ZRP (Zone Routing Protocol), CEDAR (Core
Extraction Distributed Ad Hoc Routing).
ZRP divides the topology into zones and seek to utilize different routing protocols within and between the
zones based on the weaknesses and strengths of these protocols. ZRP is totally modular, meaning that any routing
protocol can be used within and between zones. The size of the zones is defined by a parameter r describing the radius
in hops. Intra-zone routing is done by a proactive protocol since these protocols keep an up to date view of the zone
topology, which results in no initial delay when communicating with nodes within the zone. Inter-zone routing is done
by a reactive protocol. This eliminates the need for nodes to keep a proactive fresh state of the entire network.
5. COMPARATIVE STUDY
After a deep study about Mobile Adhoc Network, the author observed that there is many differences among all the
routing protocols and explain these differences in the following tables: Table 1, Table 2 and Table 3.
Parameters
DSDV
CGSR
WRP
Routing philosophy
Flat
Hierarchical
Flat
Storage Space
Low
Low
High as each node stores
4tables
Critical Node
No, all the node have same
capability
Yes, the cluster head is
critical node
No, all nodes have same
capability
Hello Message
Yes, hello message is used
No, hello message is not
used
Yes, hello message is used
Update frequency
Periodic and where is a
change
Periodic
Periodic
Update transmitted to
Neighbor
Neighbor and to cluster
head
Neighbor
Table 1: Comparisons of various Proactive Routing Protocols
International Journal of Enhanced Research in Science Technology & Engineering, ISSN: 2319-7463
Vol. 2 Issue 11, November -2013, pp: (97-105), Available online at: www.erpublications.com
Page | 62
Parameters
AODV
TORA
Routing Type
Distance Vector
Link Traversal
Loop Freedom
Yes
No
Multiple Routes
There are multiple routes
Multiple routes are not
there
Destination update
Procedure
Source
Neighbor
Route Stored
In routing table
In routing table
Table 2: Comparisons of various Reactive Routing Protocols
Parameters
Reactive
Proactive
Hybrid
Routing Philosophy
Flat
Flat/Hierarchical
hierarchical
Routing Technique
On demand
Table Driven
Combination of both
Overhead in Routing
Low
High
Medium
Route availability
Set up when needed
Always available
Depends upon destination’s
location
Latency
High
Low
Zone dependent
Periodic updates
No
Yes
Required inside Zone
Storage need
Depends upon number of
routes kept
Low
Depends upon size of the
zone
Scalability
Not scalable, suited to small
network
Not scalable
Scalable to large network
Table 3: Comparisons of Proactive, Reactive and Hybrid Routing Protocols
CONCLUSION
The author concludes here that there are various routing protocols in MANETs with different network behaviour.
Reactive protocols have less overhead as their dynamic routing technology. It set up route when it needed and it needs
high latency and more memory for storage. Proactive routing protocols on the other hand have more routing overhead
due to static routing technology and they require less memory for storage and low latency. Hybrid protocols combine
the features of both protocols and they perform well and are designed for larger network. The author define on the
previous paragraph that the area of mobile Adhoc networks is very huge. In the future, the networks are going to be
widespread for its usefulness relating to power control, its stability and network security. This will make Mobile ad hoc
networks more secure, scalable and power efficient.
REFERENCES
[1]. Anuj K. Gupta, Harsh Sadawarti, & Anil k. Verma, “Review of various Routing Protocols for MANETs”, International
Journal of Information and Electrical Engineering, 2000, ISSN: 1109-2742, Vol. 1 No. 3, pp. 251-259.
[2]. Anuj K. Gupta, Harsh Sadawarti, and Anil K. Verma, “A Review of Routing Protocols for Mobile Ad Hoc Networks”,
WSEAS Transactions on Communications, ISSN: 1109-2742, Volume 10 Issue11.
[3]. M.J. Handy, M. Haase & D. Timmermann, “Low energy adaptive clustering hierarchy with Deterministic cluster-head
selection” in proc. 4th International workshop on Mobile and Wireless Communications Network, Sept. 2002, pp.368 -372.
[4]. X. Lu, G. Fan & R. Hao. “A dynamic token passing MAC protocol for mobile ad hoc networks” ,Proc. ACM IWCMC\’06,
2006, pp.743-748.
[5]. Forman G., Zahorjan J, “The challenges of mobile computing”, IEEE Computer, 1994, vol. 27 no. 4, pp-:38-47.
[6]. C. Siva Ram Murthy et al., “Ad Hoc Wireless Networks, Architectures and Protocols” published by Prentice Hall, 2004.
[7]. K Natrajan, “A succinct comparative analysis and performance evaluation of MANET routing protocols” IEEE ICCCI, 2013,
pp. 1-6.
[8]. V. Vasanthil et al., “A Perspective Analysis of routing protocols in wireless sensor network”, International Journal on
Computer Science and Engineering, November 2010, Vol. 2, No. 8.
[9]. Tony Larsson, Nisklas Hedman, “Routing Protocols in Wireess Ad Hoc Networks: A Simulation Study”.
[10]. S. K. Dhurandher, G. V. Singh, “Stable clustering with efficient routing in wireless ad-hoc networks” In Proceedings of the
COMSWARE 2nd International Conference, January 2007, pp. 1-12.
[11]. Umang Singh “Secure Routing Protocols in Mobile Adhoc Network-A Survey and Taxonomy” International Journal of
Reviews in Computing 30th September 2011. Vol. 7.
[12]. Sunil Taneja and Ashwani Kush “A survey of Routing Protocols in Mobile Ad Hoc Networks” , International Journal of
Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: 2010-0248.
[13]. Robinpreet Kaur & Mritunjay Kumar Rai “A Novel Review on Routing Protocols in MANETs”, Undergraduate Academic
Research Journal (UARJ), ISSN : 2278 1129, Volume-1, Issue-1, 2012.
[14]. Dr.D.Siva Kumar “Review: Swarm Intelligent based routing Protocols for Mobile Adhoc Networks” International Journal of
Engineering Science and Technology Vol. 2 (12), 2010, 7225-7233.
[15]. Dr. Shuchita Uphadhyaya & Anil Saini “Improving the Quality of CGSR Routing Protocol by Electing Suitable Cluster-
Head Using Fuzzy Logic System in MANET” International Journal of Advanced Research in Computer Science and
Software Engineering , ISSN: 2277 128X Vol. 6, Issue-3, June 2013.
... Most of the proposals to mitigate the unfair consumption of energy rely on energy aware routing mechanisms [3]. Similarly to our proposal, [4] proposes to control the energy consumption in each discovered route, and then monitor their state in the following manteinance process. ...
Conference Paper
Full-text available
Unfairness in wireless ad hoc networks is often due to the different ways the single nodes decide to participate in relay operations. We propose to introduce a dedicated ad hoc routing protocol based on results of game theory to force the cooperation of less operative nodes and mitigate the effort of overwhelmed ones. Simulations on an experimental testbed show a better distribution of the energy consumption and an increased fairness in the average delivery ratio achieved by nodes, as well as a prolonged network lifetime. © 2015, Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, All rights Reserved.
Article
Full-text available
In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources. Also the algorithms designed for traditional wired networks such as link-state or distance vector, does not scale well in wireless environment. Routing in MANETs is a challenging task and has received a tremendous amount of attention from researchers around the world. To overcome this problem a number of routing protocols have been developed and the number is still increasing day by day. It is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.
Article
Full-text available
A number of routing protocols has been proposed in recent years for possible use of Mobile Ad Hoc Networks in various application areas such as military, govt. etc. In this paper we have presented a comprehensive review of these protocols with a particular focus on their security aspects. Further we have presented a comparison of some of the existing Routing Protocols of MANETs. The base criteria for comparison is routing methodologies and the information used to make routing decisions. All the protocols have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability, with respect to which the analyses of secure versions of proposed protocols are discussed.
Article
Full-text available
An ad hoc mobile network is a collection of mobile nodes that are dynamically and arbitrarily located in such a manner that the interconnections between nodes are capable of changing on a continual basis. In order to facilitate communication within the network, a routing protocol is used to discover routes between nodes. Routing is a challenging issue in ad hoc network since nodes are mobile and the topology of the networks is ever changing. Besides, all nodes need to communicate via wireless infrastructure. The primary goal of such an ad hoc network routing protocol is correct and efficient route establishment between a pair of nodes so that messages may bedelivered in a timely manner. Route construction should be done with a minimum of overhead and bandwidth consumption. This paper presents a review of swarm Intelligent based routing protocols used for mobile ad hoc network (MANET). The paper provides an overview of eight different protocols by presenting their characteristics and functionality, and then provides a comparison and discussion of their respective merits and drawbacks.
Article
Full-text available
The Recent Advances in Wireless Sensor Networks which have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. It is necessary to identify the performance challenges of WSN and analyze their impact on the performance of routing protocols. It surveys recent routingprotocols for sensor networks and presents a classification for the various approaches pursued. Due to the limited processing power, finite power available to each sensor node, regular ad hoc routing techniques cannot be directly applied to sensor networks domain. These energy-efficient routing algorithms suitable to the inherent characteristics of these types of networks are needed. Routing algorithms must also be robust to failures, and provide low latency. This paper makes a performance comparison of three sensor network routing protocols, namely, Rumor routing, Stream Enable Routing (SER) and SPIN (Sensor Protocols for Information Via Negotiation). These protocols are classified on the based on data-centric, hierarchical and location-based. The performance of these protocols are compared by Simulation Parameters like Agents per Events, Agent TTL, Query Delivery, Cycle rate.
Conference Paper
In mobile ad hoc networks(MANET), the limited wireless spectrum, distributed multiple access control, low complexity, and high mobility together impose significant challenges for MAC protocol design to provide reliable wireless communications with high data rates. In contention based MAC protocols, such as 802.11 MAC, each multi-hop data flow encounters contentions not only from the transmissions of itself, but also from other flows that bypassing the neighborhood. This paper presents a Dynamic Token Ring based MAC protocol(DRP) for mobile ad hoc networks, which aims to solve the intra-flow and inter-flow contention problems in MAC layer. It is called dynamic, since the token ring in a cluster can be a low-priority ring or a high priority ring. The node can join high priority ring dynamically according to transmission status. Our simulation results show that DRP protocol has superior performance in improving data delivery efficiency and avoiding collisions. It is a good solution for inter-flow/intra-flow contention problems as well as hidden/exposed terminal problems.
Conference Paper
In ad hoc networks the association and disassociation of mobile nodes to and from the clusters perturb the stability of the network and thus reconfiguration of clusterheads is unavoidable. This is an important issue since the frequent clusterhead changes adversely affect the performance of other protocols. This paper proposes a weight based adaptive clustering algorithm (WBACA) that leads to a high degree of stability in the network. The proposed WBACA takes into account the transmission power, transmission rate, mobility, battery power and the degree of a node for forming clusters. Through simulations we have compared the performance of WBACA with that of the lowest-ID algorithm and the weighted clustering algorithm (WCA) in terms of the number of clusters formed, number of clusterhead changes, and the number of reaffiliations. We also study the operation and performance of the proposed scheme through detailed simulations, evaluating the control overheads, throughput, and average packet transfer delay in the network.
Conference Paper
This paper focuses on reducing the power consumption of wireless microsensor networks. Therefore, a communication protocol named LEACH (low-energy adaptive clustering hierarchy) is modified. We extend LEACH's stochastic cluster-head selection algorithm by a deterministic component. Depending on the network configuration an increase of network lifetime by about 30% can be accomplished. Furthermore, we present a new approach to define lifetime of microsensor networks using three new metrics FND (First Node Dies), HNA (Half of the Nodes Alive), and LND (Last Node Dies).
Article
The technical challenges that mobile computing must surmount to achieve its potential are hardly trivial. Some of the challenges in designing software for mobile computing systems are quite different from those involved in the design of software for today's stationary networked systems. The authors focus on the issues pertinent to software designers without delving into the lower level details of the hardware realization of mobile computers. They look at some promising approaches under investigation and also consider their limitations. The many issues to be dealt with stem from three essential properties of mobile computing: communication, mobility, and portability. Of course, special-purpose systems may avoid some design pressures by doing without certain desirable properties. For instance portability would be less of a concern for mobile computers installed in the dashboards of cars than with hand-held mobile computers. However, the authors concentrate on the goal of large-scale, hand-held mobile computing as a way to reveal a wide assortment of issues