Comparative Analysis of Various Protocols in Topology Based Routing in Mobile Adhoc Networks
Comparative Analysis of Various Protocols in Topology Based Routing in Mobile Adhoc Networks
I. INTRODUCTION
10
MATRIX Academic International Online Journal Of Engineering And Technology Copyright © MAIOJET
In packet switching networks, routing directs packet forwarding, periodically exchange it with their local neighbors. For large
the transit of logically addressed packets from their source toward networks in order to reduce the size of the routing update
their ultimate destination through intermediate nodes decide which messages the FSR technique uses different exchange periods
way to route packets between computing devices in a mobile ad- for different entries in the routing table.
hoc network. In ad hoc networks, nodes do not start out familiar
with the topology of their networks; instead, they have to discover Relative to each node the network is divided in different
it. The basic idea is that a new node may announce its presence and scopes
should listen for announcements broadcast by its neighbours. Each
node learns about nodes nearby and how to reach them, and may Pros
announce that it, too, can reach them. Wireless ad-hoc networks - Scales well to large network sizes
have gained a lot of importance in wireless communications.
Several MANET routing protocols have used topology based Control traffic overhead is manageable Changing in the
routing approach. Topology based routing protocols use links routing table will not occur even if there is any link failure
information within the network to send the data packets from because it doesn’t trigger any control message for link failure
source to destination . Topology based routing approach can be Cons
further categorized in to three groups: - Route table size still grows linearly with network size
Proactive Routing - As mobility increases routes to remote destinations
become less accurate
Reactive Routing - What happens if the target node is out of the scope of
all nodes in the source nodes scope
2.1.2 OLSR
2. MERITS & DEMERITS OF TOPOLOGY BASED ROUTING
PROTOCOLS Optimized link state routing (OLSR) [2] maintains routing
information by sending link state information. After each
Topology based routing protocols use link’s change in the topology every node sends updates to selective
information within the network to send the data packets from nodes. By doing so, every node in the network receive updates
source to destination. Topology based routing approach can be only once. Unselected packets cannot retransmit updates; they
further categorized into proactive (table-driven) and reactive can only read updated information.
(on-demand) routing 2.1.3 STAR
2.1 Proactive (table-driven) Source-Tree Adaptive Routing (STAR) [4] is another link
State protocol. In STAR, preferred routes to every destination
Proactive routing protocols are mostly based on are saved in each router. It reduces overhead on the network
shortest path algorithms. They keep information of all by eliminating periodic updates. There is no need of sending
connected nodes in form of tables because these protocols are updates unless any event occurs. This protocol can be suitable
table based. Furthermore, these tables are also shared with their for large scale networks but it needs large memory and
neighbors. Whenever any change occurs in network topology, processing because it has to maintain large trees for whole
every node updates its routing table. network. For STAR, there are mainly two alternative
mechanisms to discover neighbours:
MERITSs 1. Hello Messages: Hello messages are sent by each node
- No Route Discovery is required. periodically to inform neighbours of its existence. Such
- Low Latency for real time applications. messages can be small packets, not needing to contain any
DEMERITS
routing information. When a node receives a hello message
- Unused paths occupy a significant part of the available from another node that it does not know previously, it
bandwidth.
discovers a new neighbour. If a node does not receive any
2.1.1 Fisheye State Routing message (update or hello) from a neighbour for a certain
period of time, it determines that this neighbour is broken or
FSR [3] is a proactive or table driven routing protocol where the out of its range.2. Neighbour Protocol: A neighbour protocol
information of every node collects from the neighboring nodes. can be implemented at the link layer. It notifies STAR of the
Then calculate the routing table. It is based on the link state existence of new neighbours or the loss of connectivity to an
routing & an improvement of Global State Routing. For routing
existing neighbour. With the support of a neighbour protocol,
this approach translates into an accurate information in the
no hello messages are needed.
immediate neighborhood of a node and less detail as the
distance increases.FSR is similar to link state (LS) routing in
that each node maintains a view of the network topology with a 2.2.1 DSDV
cost for each link. In LS routing link state packets are flooded Destination Sequence Distance Vector Routing (DSDV) [2]
into the network whenever a node detects a topology change. In use Distance Vector shortest path routing algorithm, it
FSR nodes maintain a topology table (TT) based on the up-to- provides loop free single path to the destination. DSDV sends
date information received from neighboring nodes and two types of packets “full dump” and “incremental”. In full
11
MATRIX Academic International Online Journal Of Engineering And Technology Copyright © MAIOJET
dump packets, all the routing information is send while in proposed for highly dynamic mobile, multi-hop wireless
incremental only updates are send. It decreases bandwidth networks. It is a source-initiated on-demand routing protocol.
utilization by sending only updates instead of complete routing It finds multiple routes from a source node to a destination
information. The incremental still increases the overhead in the node. The main feature of TORA is that the control messages
network, because these incremental packets are so frequent that are localized to a very small set of nodes near the occurrence
makes it unsuitable for large scale networks. of a topological change. To achieve this, the nodes maintain
2.2.2AODV routing information about adjacent nodes. The protocol has
Ad Hoc On Demand Distance Vector routing protocol [5] is a three basic functions: Route creation, Route maintenance and
reactive routing protocol which establish a route when a node Route erasure. TORA can suffer from unbounded worst-case
requires to send data packets. It has the ability of unicast & convergence time for very stressful scenarios [8,9]. TORA has
multicast routing. It uses a destination sequence number a unique feature of maintaining multiple routes to the
(DestSeqNum) which makes it different from other on demand destination so that topological changes do not require any
routing protocols. reaction at all. The protocol reacts only when all routes to the
Pros destination are lost. In the event of network partitions the
- An up-to-date path to the destination because of using protocol is able to detect the partition and erase all invalid
destination sequence number. routes
- It reduces excessive memory requirements and the route 2.2.5 AODV +PGB
redundancy. To improve AODV in VANET, [10] proposed AODV-PGB,
- AODV responses to the link failure in the network. which aims to reduce control message overhead and obtain
- It can be applied to large scale adhoc network.
stable routes by modifying RREQ broadcasting mechanisms.
Cons This protocol uses the location and power of received signal
information when intermediate nodes rebroadcast RREQ to
-More time is needed for connection setup & initial
communication to establish a route compared to other establish a routing path. Intermediate nodes of the zone
approaches. defined by signal power and location information rebroadcast
-If intermediate nodes contain old entries it can lead the RREQ packet with delay, thus avoiding collision. That
inconsistency in the route. quickly establishes a routing path and reduces the hop count
-For a single route reply packet if there has multiple route reply between source and destination. Another disadvantage of
packets this will lead to heavy control overhead. AODV is that the node informs the end nodes of the path loss
- Because of periodic beaconing it consumes extra bandwidth. by sending an unsolicited Route-Error (RERR) packet until
the end nodes acknowledge the notification when a path break
2.2.3 Dynamic Source Routing (DSR)
is detected at an intermediate node [11]. AODV incorporates
The Dynamic Source Routing (DSR) [6] is one of the purest
two types of routing repair methods: local repair and
examples of an on-demand routing protocol that is based on the
concept of source routing. It is designed specially for use in reconfiguration. A local repair protocol operates when the hop
multihop ad hoc networks of mobile nodes. It allows the count between the intermediate node and the destination node
network to be completely selforganizing and self-configuring is less than MAX_REPAIR_ TTL. The intermediate node
and does not need any existing network infrastructure or broadcasts a RREQ after increasing the sequence number.
administration. DSR uses no periodic routing messages like However, if the hop count is greater than
AODV, thereby reduces network bandwidth overhead, MAX_REPAIR_TTL or the intermediate node does not
conserves battery power and avoids large routing updates.
Instead DSR needs support from the MAC layer to identify link receive a RREP during the discovery period, the intermediate
failure. DSR is composed of the two mechanisms of Route node transmits a RERR to the source node to reconfigure the
Discovery and Route Maintenance, which work together to routing path. AODV therefore incurs overhead and delay
allow nodes to discover and maintain source routes to arbitrary when reconfiguring or locally repairing a new route, because
destinations in the network. DSR has a unique advantage by the AODV protocol requires additional overhead such as
virtue of source routing. As the route is part of the packet itself, RERR, RREQ, and RREP on a global network. This is more
routing loops, either short – lived or long – lived, cannot be
serious in VANET because it has frequency routing path loss.
formed as they can be immediately detected and eliminated.
This property opens up the protocol to a variety of useful AODV(-PGB) waits for the construction of new routes when
optimizations the existing route is broken. The frequent route failures result
in a significant amount of time needed to repair existing routes
2.2.4 Temporary Ordered Routing Algorithm (TORA) or reconstruct new routes [12]. In VANET, path loss
The Temporally Ordered Routing Algorithm (TORA) is a frequently occurs due to the high speed of vehicles. Therefore,
highly adaptive, efficient and scalable distributed routing maintenance and repair of established routing paths is
algorithm based on the concept of link reversal [7]. TORA is
12
MATRIX Academic International Online Journal Of Engineering And Technology Copyright © MAIOJET
REFERENCES
parameters AODV DSR TORA LAR
[1] Integration of mobile ad-hoc networks, EU project DAIDALOS,
Susana Sargento, Institute of Telecommunications
Source No Yes No Yes [2] M. Abolhasan, T. Wysocki and E. Dutkiewicz, “A review of
routing protocols for mobile ad hoc networks”, Ad Hoc Networks 2 ,
routing 2004 , pp. 1–22.
Topology Full Full Reduced Reduced [3] G. Pei, M. Gerla, Tsu-Wei Chen, "Fisheye State Routing: A Routing
Scheme for Ad Hoc Wireless Networks," IEEE ICC 2000, vol. 1, pp.
Broadcast Full Full Local Full 70 -74.
Update Route Route Node’s Route [4] J. J. Garcia-Luna-Aceves and M. Spohn, “Source-Tree Routing in
Wireless Networks,” Proceedings of 7th International Conference on
Information Error Error height Error Network Protocols, 1999.
[5] Perkins, C.; Belding-Royer, E.; Das, S. (July 2003) “Ad hoc On-
Demand Distance Vector (AODV) Routing”.
Update Source Source Neighbour’s Destination [6] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad-Hoc
Ad hoc Networks," Mobile Computing, ed. T. Imielinski and H.
Destination Korth, Kluwer Academic Publishers, 1996, pp. 153- 181.
13
MATRIX Academic International Online Journal Of Engineering And Technology Copyright © MAIOJET
14