Mobile Ad Hoc Network Routing Protocols CHAPTER 1 INTRODUCTION Wireless communication is an emerging and upcoming technology that will allow users to access information and services electronically, irrespective of their geographic location. There are solutions to these demands, one being wireless local area network (based on IEEE 802.11 standard). However, there is increasing demand for connectivity in situations/places where there is no base station / infrastructure available. This is where ad hoc network came into existence. Wireless networks can be classified into infrastructure networks and infrastructure less networks or mobile ad hoc networks (MANETs). MANETs are autonomously self-organized and self- configuring networks without infrastructure support. In such networks, since node mobility is very high the network may experiences frequent and unpredictable topology changes. Mobility and the absence of any fixed infrastructure make MANETs very attractive for time-critical applications. Ad hoc network applications include students using laptop to participate in an interactive lecture, business associates sharing in Recently, Mobile Ad Hoc networks became a hot research topic among researchers due to theirflexibility and independence of network infrastructures such as base stations. The infrastructure less and the dynamic nature of these networks demand new set of networking strategies to be implemented in order to provide efficient end-to-end communication. MANETs can be deployed quickly at a very low 1 Dept of ECE,SJBIT,Bangalore
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Mobile Ad Hoc Network Routing Protocols
CHAPTER 1
INTRODUCTION
Wireless communication is an emerging and upcoming technology that will allow users to
access information and services electronically, irrespective of their geographic location.
There are solutions to these demands, one being wireless local area network (based on IEEE
802.11 standard). However, there is increasing demand for connectivity in situations/places
where there is no base station / infrastructure available. This is where ad hoc network came
into existence. Wireless networks can be classified into infrastructure networks and
infrastructure less networks or mobile ad hoc networks (MANETs). MANETs are
autonomously self-organized and self-configuring networks without infrastructure support. In
such networks, since node mobility is very high the network may experiences frequent and
unpredictable topology changes. Mobility and the absence of any fixed infrastructure make
MANETs very attractive for time-critical applications. Ad hoc network applications include
students using laptop to participate in an interactive lecture, business associates sharing in
Recently, Mobile Ad Hoc networks became a hot research topic among researchers due to
theirflexibility and independence of network infrastructures such as base stations. The
infrastructure less and the dynamic nature of these networks demand new set of networking
strategies to be implemented in order to provide efficient end-to-end communication.
MANETs can be deployed quickly at a very low cost and can be easily managed. In the
future, there is no doubt that we will have more and more ad-hoc networks, in which routing
is one of the critical issue. Need of a routing algorithm arises whenever a packet needs to be
transmitted to a node via number of different nodes. Several routing protocols exist for wired
networks, which can be classified as using either the distance vector or the link-state
algorithm. These algorithms were designed for use in wired networks where topology
changes are infrequent. They are also computation intensive, making them difficult to use
with limited resources. Due to these problems, new routing algorithms are designed keeping
in mind the characteristics of MANETs. An ad-hoc routing protocol must be able to decide
the best path between the nodes having unidirectional links, minimize the routing overhead to
enable proper routing, minimize the time required to converge after the topology changes and
maximize the bandwidth utilization. Therefore, developing support for routing is one of the
key research areas in MANETs.Until now, many researchers performed valuable research
with reference to routing in MANETs. This article is the first to present a qualitative
1Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
comparison between the three typical representatives of routing protocols designed for
MANETs- DSDV, DSR & AODV. The rest of the article discusses the related work with a
focus on comparative study of the routing protocols and presents the classification of existing
routing protocols. Working of some of these protocols is described with a glimpse of their
advantages and limitations. It presents a comparative study of these protocols.
In Link State routing algorithm, each node periodically notifies its current status of links to
all routers in the network. Whenever a link state change occurs, the respective notifications
will be flooded throughout the whole network. After receiving the notifications, all routers re-
compute their routes according to the fresh topology information. In this way, a router gets to
know at least a partial picture of the whole network. In Link State routing, different metrics
can be chosen, such like number of hops, link speed and traffic congestion. Shortest (or
lowest cost) paths are calculated using Dijkstra’s algorithm. Routing Information Protocol
(RIP) is an Internet routing protocol based on Link State routing algorithm.
In wired networks, Distance Vector and Link State routing algorithms perform well because
of the predictable network properties, such as static link quality and network topology.
However, the dynamic features of mobile ad hoc networks deteriorate their effectiveness. In
mobile ad hoc networks, when using a Distance Vector routing or Link State based routing
protocol designed for wired networks, frequent topology changes will greatly increase the
control overhead. Without remedy, the overhead may overuse scarce bandwidth of mobile ad
hoc networks. Additionally, Distance Vector and Link State routing algorithms will cause
routing information inconsistency and route loops when used for dynamic networks.
As in wired networks, multicast is also appealing for mobile ad hoc networks. Multicast is an
appropriate communication scheme for many mobile applications and can save bandwidth
resource of wireless channels. Additionally, the inherent broadcast property of wireless
channels can be exploited to improve multicast performance in mobile ad hoc networks.
Compared to unicast routing schemes, designing multicast routing protocols for mobile ad
hoc networks is more difficult. The node mobility makes keeping track of the multicast group
membership more complicated and expensive than in wired networks. Also, a distribution
tree suffers from frequent reconstruction because of node movements. Therefore, multicast
routing schemes for mobile ad hoc networks must include mechanisms to cope with the
difficulties incurred by node mobility and topology changes.
2Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
FIG 1.1-WIRELESS COMMUNICATION
Ad Hoc Networks are useful in areas that have no fixed infrastructure and hence need
alternative ways to deliver services. Ad Hoc Networks work by having mobile devices
connect to each other in the transmission range through automatic configuration, i.e., setting
up an ad hoc network that is very flexible. In other words there is no intervention of any
controller that goes ahead and gathers data from all nodes and organizes it. All data gathering
and cross-node data transfer is taken care of by the nodes themselves.
Ad Hoc Networks are a major goal towards the evolution of 4G (Fourth generation) devices.
In the nodes of the Ad Hoc Networks, computing power and network connectivity are
embedded in virtually every device to bring computation to users, no matter where they are,
or under what circumstances they work. These devices personalize themselves to find the
information or software they need. The strife is to make use of alltechnologies available
without making any major change to the user’s behaviour. There is also work going on to
make the seamless integration of various networks possible, i.e., integration of LAN, WAN,
PAN and Ad Hoc Networks. But there is still a lot of work to be done to make this
completely possible. Node mobility in an ad hoc network causes frequent changes of the
network topology.
3Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
CHAPTER 2
LITERATURE SURVEY
2.1 ADVANTAGES OF AD HOC NETWORKS
The major advantage of the Ad Hoc Networks is that it does not need any base station
as is required in regular mobile networks. They can form a network in any place as required
immediately which make them indispensable in battlefield and disaster relief situations. They
are useful in areas that have no fixed network for internet coverage. Here they can be used to
provide coverage. They can be used in areas where the available network has been destroyed.
2.2 ISSUES FACED BY AD HOC NETWORKS
Security is a very major concern in the development of Ad Hoc Networks. The
boundaries of the network are not well defined and hence it is possible for any node to go out
of the network. It is also possible for an Ad Hoc Network having a large number of nodes to
split into two networks. It is less reliable than wired media due to the inherent problem faced
by any wireless network.
Due to the formation of Ad Hoc Networks by various devices that need not be having the
same capacity it is possible that each device may have different capacity, functionality and
protocols. Hence it is necessary to find a solution where all there varied devices can operate
together. They also have asymmetric propagation metrics. Capacity constraints faced by these
networks in the form of transmission range, wireless bandwidth is another concern.
This is taken care of to an extent by the use of Spread Spectrum techniques. Errors and
breakdown could also happen in these networks and it is imperative to have a solution or a
backup plan for these exigencies. Ad Hoc Networks also face a problem called the Hidden-
terminal and exposed-terminal phenomena.
In Hidden terminal situation as shown in figure 2.1, A and C are outside the transmission
range of each other and cannot detect each other’s transmissions, but B is in the transmission
range of both. As shown below a collision may occur, for example, when the station A and
station C start transmitting towards the same receiver, station B. This should be avoided.
4Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
Fig 2.1: Hidden Terminal Situation
In Exposed terminal situation as shown in figure 2.2, A transmission range covers B and C.
Hence when A transmits to B, C thinks that it cannot transmit when actually it could transmit
to D. This is a waste of resource which should also be avoided.
Fig 2.2: Exposed station Problem
Route changes will occur due to router mobility, i.e., as the node themselves act as routers
and certain nodes can leave the network in between.
Energy consumption and saving is a major are of interest. Advances in battery technology
have not been at par with the development of Ad Hoc technology. Most existing solutions for
saving energy in ad hoc networks revolve around the reduction of power used by the device.
At the MAC level and above, this is often done by selectively sending the device into a sleep
mode, or by using a transmitter with variable output power (and proportionate input power
draw) and selecting routes that require many short hops, instead of a few longer hops.
Beaconing is used by the nodes to let the other nodes know of its presence. The beaconing
interval has to be short enough to let the other nodes know that the node is in the network yet
long enough so as to save power.
5Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
CHAPTER 3
3.1 DESIGN AND IMPLEMENTATION
A number of routing protocols have been proposed and implemented for MANETs in
order to enhance the bandwidth utilization, minimum energy consumption, higher
throughputs, less overheads per packet, and others. Different routing protocols have used
different metrics to determine an optimal path between the sender and the recipient. All these
protocols have theirown advantages and disadvantages.
Any MANET routing protocol exhibits two types of properties:
• Qualitative such as loop freedom, security, demand based routing, distributed
operation,multi-path routing etc.
• Quantitative such as throughput, delay, route discovery time, packets delivery ratio,
jitter etc.
3.2 CLASSIFICATION OF ROUTING PROTOCOLS
The inadequate and limited resources in MANETs have made designing of an
efficient and reliable routing strategy a very challenging task. An intelligent routing
algorithm is required toefficiently use these limited resources while at the same time being
adaptable to the changing network conditions such as network size, traffic density, nodes
mobility, network topology and broken routes. Numerous routing protocols have been
proposed and developed for ad hoc networks. Such protocols must deal with the limited
resources available with these networks, which include high power consumption, low
bandwidth and high mobility. Existing routing protocols can be classified in many ways, but
most of these are done depending on routing strategy and network structure. According to the
routing strategy, routing protocols can be categorized as Table-driven, On-demand driven and
Hybrid while depending on the network structure they are classified as flat routing,
hierarchical routing andgeographic position assisted routing.
6Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
3.1 MANET ROUTING PROTOCOL
3.2.1 Table-driven Routing Protocols (Proactive)
Proactive protocols are also known as “table-driven” routing protocols. In this
protocol, each and every node maintains complete information about the network topology by
continuouslyevaluating routes to all the nodes. Hence, they maintain consistent and up-to-
date routing information. These protocols are known as proactive since they maintain the
routing before it is needed. Each and every node in the network maintains routing
information about how to reach every other node in the network. The route information in
proactive routing is maintained in the routing tables and is updated as and when the network
topology changes. This causes more overhead in the routing table leading to consumption of
more bandwidth. There are various existing proactive routing protocols. The areas in which
they differ are the number of necessary routing tables and the methods by which changes in
the network topology are broadcast. Some of the existing proactive protocols are Destination-
Sequenced Distance Vector (DSDV), Global State Routing (GSR), and Fisheye State Routing
(FSR).
3.2.2 On-demand Routing Protocols (Reactive)
A different approach from table-driven routing is on-demand routing.In this protocol
route is discovered whenever it is needed Nodes initiate route discovery on demand basis.
Source node sees its route cache for the available route from source to destination if the route
is not available then it initiates route discovery process. The on- demand routing protocols
have two major components.
7Dept of ECE,SJBIT,Bangalore
Mobile Ad Hoc Network Routing Protocols
Route discovery: In this phase source node initiates route discovery on demand basis.
Source nodes consults its route cache for the available route from source to destination
otherwise if the route is not present it initiates route discovery. The source node, in the
packet, includes the destination address of the node as well address of the intermediate nodes
to the destination.
Route maintenance: Due to dynamic topology of the network cases of the route failure
between the nodes arises due to link breakage etc., so route maintenance is done. Reactive
protocols have acknowledgement mechanism due to which route maintenance is possible
Reactive protocols add latency to the network due to the route discovery mechanism. Each
intermediate node involved in the route discovery process adds latency. These protocols
decrease the routing overhead but at the cost of increased latency in the network. Hence these
protocols are suitable in the situations where low routing overhead is required. There are
various well known reactive routing protocols present in MANET for example DSR, AODV,
TORA and LMR.
In this approach, a routing path is discovered only when the need arises. These are
called reactive since it is not necessary to maintain routing information at the nodes if there is
no communication. When needed, a route discovery operation in turn invokes a route-
determination procedure. The discovery procedure terminates either when a route has been
found or no route available after examination of all the route permutations. The primary
advantage of reactive routing is that the wireless medium is not subject to the routing
overhead for the routes that may never be used. Although reactive protocols do not have the
fixed overhead (required in maintaining continuous updated routing tables), they may have
significant route discovery delay. Some of the existing reactive protocols are Ad hoc On-
Demand Distance Vector (AODV), Dynamic Source Routing (DSR), Associativity Based
Routing (ABR), Signal stability based adaptive Routing (SSR).