File 9
File 9
-------------------------------------------------------------------ABSTRACT----------------------------------------------------
Mobile ad hoc network (MANET) is a continuously self – configuring, infrastructure – less network of mobile
devices connected without wires. Ad Hoc is a Latin word and it means “for this purpose”. Mobile ad hoc networking
is a means of communication which does not rely on any existing infrastructure such as dedicated routers,
transceiver base stations or even cables. MANETs have been a challenging subject for research scientists and
internet pioneers. A MANET is a type of ad hoc network that can change locations and configure itself on the fly.
Because MANETs are mobile nodes, they use wireless connections to connect to various networks. This can be a
standard Wi-Fi connection or another medium, such as cellular or satellite transmission. Some MANETs are
restricted to a local area of wireless devices, while others may be connected to the internet. MANETs are not very
secure because of its dynamic nature. This paper concentrates on routing techniques which is the most challenging
issue due to the dynamic nature of ad hoc networks. There are different routing protocols proposed for MANET,
which make it quite difficult to determine the suitable protocol for different network conditions. This paper provides
an overview of different routing protocols proposed.
Keywords - Ad hoc network, MANET, routing protocol, satellite transmission, wireless connection.
----------------------------------------------------------------------------------------------------------------------- ----------------
MANET consists of peer – to – peer, self – forming, self –
1.INTRODUCTION healing network in contrast to a mesh network that has a
central controller.
A Mobile ad hoc network is an autonomous system of MANETs are a kind of wireless ad hoc network that usually
mobile routers connected by wireless links. The routers are has a routable networking environment on the top of the
free to move randomly and organize themselves arbitrarily, link layer. Figure 1 shows the MANET routing to its
thus, the network’s wireless topology may change rapidly destination.
and unpredictably. Such a network may operate in a stand –
alone fashion or may be connected to the larger internet. 2.CHARACTERISTICS OF MANET
Each device in a MANET is free to move independently in In MANET, each node has an autonomous
any direction, and will therefore change its links to other behaviour (i.e) they act as both host and router.
devices frequently. Each device must forward traffic Multi-hop radio relaying – MANETs are capable
unrelated to its own use, and therefore be a router. The of multi-hop routing when the source node and
primary challenge in building a MANET is equipping each destination node are out of radio range for a
device to continuously maintain the information required to message.
properly route traffic. Such networks may operate by Centralized firewall is not present because of its
themselves or may be connected to internet. They may distributed nature of operation.
contain one or multiple and different transceivers between The nodes can join or leave the network anytime,
nodes. This results in a highly dynamic, autonomous making the network topology dynamic in nature.
topology. Mobile nodes are characterized with less memory,
power and light weight features.
The reliability, efficiency, stability and capacity of
wireless links are often inferior when compared
with wired links. This shows the fluctuating
bandwidth of wireless links.
The spontaneous behaviour of the nodes, demand
minimum human intervention to configure the
network.
All nodes have identical features with similar
responsibilities and capabilities and hence it forms
a completely symmetric environment.
High user density and large level of user mobility.
Nodal connectivity is intermittent.
Fig 1: MANET routing to destination
Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 44
Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications,
27th March 2015
Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 45
Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications,
27th March 2015
it. Having the routes available within the standard routing clusters, this protocol achieves a distributed processing
table can be useful for some systems and network mechanism in the network. The drawback of this protocol is
applications as there is no route discovery delay associated the frequent change or selection of cluster heads might be
with finding a new route. Being a link state protocol, OLSR resource hungry and it might affect the routing performance.
requires reasonably large amount of bandwidth and CPU CGSR uses DSDV protocol as the underlying routing
power to compute optimal paths inside the network. scheme and hence has the same overhead as DSDV.
However, it modifies DSDV by using a hierarchical cluster-
OLSR uses two kinds of control messages: Hello and head-to-gateway routing approach to route traffic from
Topology control (TC). Hello messages are used for finding source to destination. Gateway nodes are nodes within the
the information about the link status and the host’s communication range of two or more cluster heads. A
neighbours. OLSR makes use of “Hello” messages to find packet sent by a node is first sent to its cluster head and then
its one hop neighbours and its two hop neighbours through the packet is sent from the cluster head to a gateway to
their resources. The Multi Point Relay (MPR) selector set is another cluster head and so on until the cluster head of the
constructed by the Hello message, which describes the destination node is reached. The packet is then transmitted
neighbours having preferred this host to work as MPR and to the destination from its own cluster head.
as of this information the host be able to evaluate its
individual rest of the MPRs. The Hello messages are sent
3.2 Reactive Routing Protocols/ Demand Routing
simply single hop away, but the TC messages are
Protocol
broadcasted throughout the whole network. TC messages
are used for distributing information about personal
advertised neighbours, which includes atleast the MPR In reactive routing protocol, route is discovered whenever it
selector list. The TC messages will be broadcasted is needed. Nodes initiate the route discovery on demand
occasionally and only the MPR hosts can forward the TC basis. Source node sees its route cache for the available
messages. Figure 4 shows an example of OLSR multi point route from source to destination, if the route is not available
relay. then it initiates the route discovery process. The on-demand
routing protocols have two major components:
3.1.3 Wireless Routing Protocol (WRP) Route Discovery: In this phase, the source node
initiates the route discovery on demand basis.
WRP belongs to a general class of shortest path calculating Source nodes consults its route cache for the
algorithms, that calculate the shortest path using available route from source to destination,
information regarding the length and second – to – last hop otherwise if the route is not present it initiates route
of the shortest path to each destination. WRP minimises the discovery. The source node in the packet includes
number of cases where a temporary routing loop can occur. the destination address of the node as well as the
Each node requires four things for the purpose of routing: address of the intermediate nodes to the
A distance table. destination.
A routing table. Route Maintenance: Due to dynamic topology of
A link – cost table. the network cases of the route failure between the
A Message Retransmission List (MRL). nodes arises due to link breakage etc, so route
maintenance is done.
WRP uses periodic update message transmissions to the
neighbours of a node. The nodes in the response list should Reactive protocols have acknowledgement mechanism due
send acknowledgements. If there is no change from the last to which route maintenance is possible. Reactive protocols
update, the nodes send an idle Hello message in the add latency to the network due to the route discovery
response list to ensure connectivity. A node can decide mechanism. Each intermediate node involved in the route
whether to update its routing table after receiving an update discovery process adds latency. These protocols decrease
message from a neighbour and always it looks for a better the routing overhead, but at the cost of increased latency in
path using the new information. If a node gets a better path, the network. Hence, these protocols are suitable in the
it relays back that information to the original nodes so that situations where low routing overhead is required. There are
they can update their tables. After receiving the various well known reactive routing protocols present in
acknowledgement, the original node updates its MRL. Thus, MANET. For example: DSR, AODV, TORA and LMR.
each time the consistency of the routing information is
checked by each node in this protocol, which helps to 3.2.1 Dynamic Source Routing Protocol(DSR)
eliminate routing loops and to find out the best solution for
routing in the network. Dynamic source routing (DSR) is based on the source route
approach. In DSR, shown in Figure 5, the protocol is based
3.1.4 Cluster Gateway Switch Routing Protocol on the link state algorithm, in which the source initiates
(CGSR) route discovery on demand basis. The sender determines the
route from source to destination and it includes the address
CGSR considers a clustered mobile wireless network of intermediate nodes to the route record in the packet. DSR
instead of a flat network. For structuring the network into was designed for multi hop networks for small diameters. It
separate but interrelated groups, cluster heads are elected is a beaconless protocol in which no HELLO messages are
using cluster head selection algorithm. By forming several exchanged between nodes to notify them of their neighbours
in the network.
Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 46
Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications,
27th March 2015
Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 47
Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications,
27th March 2015
source indicating which channel has failed. The source in covered routing zones. A covered node is a node which
turn sends an erase message to inform all nodes about the belongs to the routing zone of a node that has received a
broken link and initiates a new route-search process to find route query. During the forwarding of the query packet, a
a new path to the destination. node identifies whether it is coming from its neighbour or
not. If yes, then it marks all of its known neighbouring
3.2.5 Temporarily Ordered Routing Algorithm nodes in its same zone as covered. The query is thus relayed
Protocol (TORA) till it reaches the destination. The destination in turn sends
back a reply message via the reverse path and creates the
TORA is a reactive routing protocol with some proactive route. Figure 8 shows an example of ZRP.
enhancements where a link between nodes is established
creating a Directed Acyclic Graph (DAG) of the route from
the source node to the destination. This protocol uses a link
reversal model in route discovery. A route discovery query
is broadcasted and propagated throughout the network until
it reaches the destination or a node that has information
about how to reach the destination. TORA defines a
parameter, termed height. Height is a measure of the
distance from the responding node to the required
destination node. In the route discovery phase, this
parameter is returned to the querying node.
As the query response propagates back, each intermediate
node updates its TORA table with the route and height to
the destination node. The source node then uses the height
to select the best route toward the destination. This protocol
has an interesting property that it frequently chooses the
most convenient route, rather than the shortest route. For all
these attempts, TORA tries to minimize the routing
management traffic overhead. Fig 8: Zone Routing Protocol
3.3 Hybrid Routing Protocol 3.3.2 Sharp Hybrid Adaptive Routing Protocol
There is a trade-off between proactive and reactive (SHARP)
protocols. Proactive protocols have large overhead and less
latency while reactive protocols have less overhead and SHARP adapts between reactive and proactive routing by
more latency. So a Hybrid protocol is presented to dynamically varying the amount of routing information
overcome the shortcomings of both proactive and reactive shared proactively. This protocol defines proactive zones
routing protocols. Hybrid routing protocol is combination of around some nodes. The number of nodes in a particular
both proactive and reactive routing protocol. It uses the proactive zone is determined by the node-specific zone
route discovery mechanism of reactive protocol and the radius. All nodes within the zone radius of a particular node
table maintenance mechanism of proactive protocol so as to become members of that particular proactive zone for that
avoid latency and overhead problems in the network. node. If for a given destination, a node is not present within
Hybrid protocol is suitable for large networks where large a proactive zone, reactive routing mechanism is used to
numbers of nodes are present. This large network is divided establish the route to that node. Proactive routing
into set of zones, where routing inside the zone is performed mechanism is used within the proactive zone. Nodes within
by using proactive approach and outside the zone routing is the proactive zone maintain routes proactively only with
done using reactive approach. There are various popular respect to the central node. In this protocol, proactive zones
hybrid routing protocols for MANET like ZRP, SHARP. are created automatically for frequently addressed
destinations sought within the network. The proactive zones
3.3.1 Zone Routing Protocol (ZRP) act as collectors of packets, which forward the packets
efficiently to the destination, once the packets reach any
ZRP is suitable for wide variety of MANETs, especially for node at the zone vicinity.
the networks with large span and diverse mobility patterns.
In this protocol, each node proactively maintains routes 4.CHALLENGES FOR MANET
within a local region, which is termed as routing zone.
Route creation is done using a query-reply mechanism. For A MANET environment has to overcome certain issues of
creating different zones in the network, a node first has to inefficiency. It includes:
know who its neighbours are. A neighbour is defined as a The wireless link characteristics are time-varying
node with whom direct communication can be established, in nature - There are transmission impediments like
and that is within one hop transmission range of a node. fading, path loss, blockage and interference that
Neighbour discovery information is used as a basis for add to the susceptible behaviour of wireless
Intra-Zone Routing Protocol (IARP). channels. The reliability of wireless transmission is
Rather than blind broadcasting, ZRP uses a query control resisted by different factors.
mechanism to reduce route query traffic by directing query Limited range of wireless transmission – The
messages outward from the query source and away from limited radio band results in reduced data rates
Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 48
Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications,
27th March 2015
compared to the wireless networks. Hence optimal [6]. Kleinrock, Leonard (1975). "Packet Switching in
usage of bandwidth is necessary by keeping low Radio Channels: Part I--Carrier Sense Multiple-
overhead as possible. Access Modes and Their Throughput-Delay
Packet losses due to errors in transmission - Characteristics".
MANETs experience higher packet loss due to [7]. Shi, Zhefu; Beard, Cory; Mitchell, Ken
factors such as hidden terminals that results in (2008). "Tunable traffic control for multihop
collisions, wireless channel issues (high bit error CSMA networks".
rate (BER)), interference, and frequent breakage in [8]. C K Toh, Ad Hoc Mobile Wireless Networks,
paths caused by mobility of nodes, increased Prentice Hall Publishers, 2002. [2] Robinpreet
collisions due to the presence of hidden terminals Kaur & Mritunjay Kumar Rai, A Novel Review on
and uni-directional links. Routing Protocols in MANETs, Undergraduate
Route changes due to mobility - The dynamic Academic Research Journal (UARJ), ISSN : 2278
nature of network topology results in frequent path – 1129, Volume-1, Issue-1, 2012
breaks. [9]. Ammar Odeh, Eman AbdelFattah and Muneer
Frequent network partitions – The random Alshowkan, Performance Evaluation Of AODV
movement of nodes often leads to partition of the And DSR Routing Protocols In Manet Networks,
network. This mostly affects the intermediate International Journal of Distributed and Parallel
nodes. Systems (IJDPS) Vol.3, No.4, July 2012.
5.CONCLUSION
ACKNOWLEDGEMENTS
First of all, I am glad to thank THE LORD ALMIGHTY for
giving me the fortitude in finishing this paper. I would like
to thank my family for the constant support they provided
throughout my preparation. I express my sincere gratitude to
Mrs. Dhina Suresh, HOD, Department of Computer
Science, St. Joseph’s College of Arts and Science for
Women, Hosur for her continuous guidance, support and
encouragement in all my endeavors.
REFERENCES
[1]. Tomas Krag and Sebastian Büettrich (2004-01-
24). "Wireless Mesh Networking". O'Reilly
Wireless Dev Center. Retrieved 2009-01-20.
[2]. http://www.cs.rutgers.edu/~rmartin/teaching/fall04
/cs552/papers/012.pdf
[3]. http://answers.google.com/answers/threadview/id/
440378.html
[4]. Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.;
Hassard, J. (2008). "Air Pollution Monitoring and
Mining Based on Sensor Grid in
London". Sensors 8 (6):
3601.doi:10.3390/s8063601. edit
[5]. Ma, Y.; Guo, Y.; Tian, X.; Ghanem, M. (2011).
"Distributed Clustering-Based Aggregation
Algorithm for Spatial Correlated Sensor
Networks". IEEE Sensors Journal 11 (3): 641.
doi:10.1109/JSEN.2010.2056916. edit
Special Issue Published in Int. Jnl. Of Advanced Networking and Applications (IJANA) Page 49