Routing Protocols
Routing Protocols
• Bandwidth Constraint
• Resource Constraints
Cont..
• The limited bandwidth availability also imposes a constraint on routing protocols in
maintaining the topological information.
• The wireless links have time-varying characteristics in terms of link capacity and link-
error probability.
• This requires that the ad hoc wireless network routing protocol interacts with the MAC
layer to find alternate routes through better-quality links.
• Routing topology
Reactive or on-demand routing protocols: These protocols do not maintain the network topology
information.
• They obtain the necessary path when it is required, by using a connection establishment process.
• For nodes that are located beyond this zone, an on-demand approach is used.
RP based on Use of Temporal Information For Routing
• Use of temporal information (lifetime of the wireless links)
Routing protocols using past temporal information: Use information about the past status of
the links or the status of links at the time of routing to make routing decisions.
• For example, the routing metric based on the availability of wireless links along with a
shortest path-finding method, provides a path that may be efficient and stable at the time of
path-finding.
• The topological changes may immediately break the path, making the path undergo a
resource-wise expensive path reconfiguration process.
Cont..
Routing protocols that use future temporal information: They use information about the
expected future status of the wireless links to make approximate routing decisions.
• Apart from the lifetime of wireless links, the future status information also includes
information regarding the lifetime of the node (the remaining battery charge and discharge
rate), prediction of location, and prediction of link availability.
RP based Routing Topology
Flat topology routing protocols: Flat topology routing protocols treat all nodes equally,
without any hierarchical structure or clustering.
• It assumes the presence of a globally unique addressing mechanism for nodes in networks.
Hierarchical topology routing protocols: Hierarchical topology routing organize nodes into
structured layers (hierarchies), improving scalability and routing efficiency for large networks.
• Certain nodes (e.g., cluster heads or gateways) manage routing within and between groups.
• The routing decisions are based on minimizing the power consumption either locally or
globally in the network.
Geographical Information Assisted Routing: Protocols belonging to this category improve the
performance of routing and reduce the control overhead by effectively utilizing the
geographical information available..
Table-Driven Routing Protocols
• These protocols maintain the global topology information in the form of tables at every node.
• These tables are updated frequently in order to maintain consistent and accurate network
state information.
Destination Sequenced Distance-Vector (DSDV) Routing Protocol
• It incorporates table updates with increasing sequence number tags to prevent loops, to
counter the count-to-infinity problem.
• Routes to all destinations are readily available at every node at all times.
• The tables are exchanged between neighbors at regular intervals to keep an up-to-date
view of the network topology.
• The tables are also forwarded if a node observes a significant change in local topology.
• The table updates are of two types: incremental updates and full dumps.
Cont..
• An incremental update takes a single network data packet unit (NDPU), while a full dump may
take multiple NDPUs.
• Table updates are initiated by a destination with a new sequence number which is always
greater than the previous one.
• Upon receiving an updated table, a node either updates its tables based on the received
information or holds it for some time to select the best metric received.
• Based on the sequence number of the table update, it may forward or reject the table.
• The number is even for periodic updates and odd for route invalidation.
• When broadcasting routing tables, nodes update their neighbors with the latest sequence
numbers.
Cont..
Cont..
Wireless Routing Protocol
• Similar to DSDV routing protocol, but avoids count-to-infinity problem.
• CGSR organizes nodes into clusters, with coordination among the members of each cluster entrusted to a
special node named cluster-head.
• This cluster head is elected dynamically by employing a least cluster change (LCC) algorithm.
• Clustering provides a mechanism to allocate bandwidth, which is a limited resource, among different
clusters, thereby improving reuse.
• All member nodes of a cluster can be reached by the cluster-head within a single hop, thereby enabling the
cluster-head to provide improved coordination among nodes that fall under its cluster.
• These nodes which are members of more than one cluster are called gateways.
• Gateway is expected to be able to listen to multiple spreading codes (CDMA) that are currently in
operation in the clusters in which the node exists as a member.
• Each node maintains a cluster member table that has mapping from each node to its respective
cluster-head.
• Each node broadcasts its cluster member table periodically and updates.
Cont..
• In addition, each node also maintains a routing table that determines the next hop to reach the
destination cluster.
• On receiving a packet, a node finds the nearest cluster-head along the route to the destination
according to the cluster member table and the routing table.
Cont..
On-Demand Routing Protocols
Unlike the table-driven routing protocols, on-demand routing protocols execute the path-
finding process and exchange routing information only when a path is required by a node
to communicate with a destination.
• It does not require periodic hello packet (beacon) transmissions, which are used by a node to inform its
neighbors of its presence.
• The basic approach of this protocol (and all other on-demand RPs) during the route construction phase
is to establish a route by flooding RouteRequest packets in the network.
• The destination node, on receiving a RouteRequest packet, responds by sending a RouteReply packet
back to the source, which carries the route travelled by the RouteRequest packet received.
Cont..
• Each node, upon receiving a RouteRequest packet, rebroadcasts the packet to its
neighbors if it has not forwarded already or if the node is not the destination node,
provided the packet’s time to live (TTL) counter has not exceeded.
• Each RouteRequest carries a sequence number generated by the source node and the
path it has travelled.
• The sequence number on the packet is used to prevent loop formations and to avoid
multiple transmissions of the same RouteRequest by an intermediate node that receives
it through multiple paths.
Cont..
• A destination node, after receiving the RouteRequest packet, replies to the source node
through the reverse path the RouteRequest packet had navigated.
• In AODV, the source node and the intermediate nodes store the next-hop information
corresponding to each flow for data packet transmission.
• The major difference between AODV and other on-demand RPs is that it uses a destination
sequence number (DestSeqNum) to determine an up-to-date path to the destination.
• A node updates its path information only if the DestSeqNum of the current packet received
is greater than the last DestSeqNum stored at the node.
Cont..
• A RouteRequest carries the following details:
• the source identifier (SrcID)
• DestSeqNum indicates the freshness of the route that is accepted by the source.
• All intermediate nodes having valid routes to the destination, or the destination node itself, are allowed
to send RouteReply packets to the source.
• Every intermediate node, while forwarding a RouteRequest, enters the previous node address and its
BcastID.
• When a node receives a RouteReply packet, information about the previous node from which the
packet was received is also stored in order to forward the data packet to this next node as the next hop
toward the destination.
Cont..
Temporally Ordered Routing Algorithm (TORA)
• It uses a link reversal algorithm and provides loop-free multipath routes to a destination node.
• In TORA, each node maintains its one-hop local topology information and also has the capability
to detect partitions.
• TORA has the unique property of limiting the control packets to a small region during the
reconfiguration process initiated by a path break.
• TORA uses a distance metric which is nothing but the length of the path, or the height from the
destination H(N).
• TORA has three main functions: establishing, maintaining, and erasing routes.
Cont..
• The route establishment function is performed only when a node requires a path to a
destination but does not have any directed link.
• Query packet is originated by the source node with the destination address included in it.
• This Query packet is forwarded by intermediate nodes and reaches the destination node, or any
other node which has a route to the destination.
• The node that terminates the Query packet replies with an Update packet containing its
distance from the destination (it is zero at the destination node).
• Each node that receives the Update packet sets its distance to a value higher than the
distance of the sender of the Update packet.
Cont..
• Once a path to the destination is obtained, it is considered to exist as long as the path is
available, irrespective of the path length changes due to the reconfigurations that may
take place during the course of the data transfer session.
Cont..
• When an intermediate node (say, node 5) discovers that the route to the destination node is invalid, it
changes its distance value to a higher value than its neighbors and originates an Update packet.
• The neighboring node 4 that receives the Update packet reverses the link between 1 and 4 and forwards
the Update packet.
• If the source node has no other neighbor that has a path to the destination, it initiates a fresh Query.
Zone Routing Protocol (Hybrid RP)
• Zone routing protocol (ZRP) is a hybrid routing protocol which effectively combines the best
features of both proactive and reactive routing protocols.
• Key Concept: A proactive routing scheme within a limited zone in the r-hop neighborhood of
every node, and use a reactive routing scheme for nodes beyond this zone.
• An intra-zone routing protocol (IARP) is used in the zone where a particular node employs
proactive routing.
• The reactive routing protocol used beyond this zone is referred to as inter-zone routing
protocol (IERP).
• The routing zone of a given node is a subset of the network, within which all nodes are
reachable within less than or equal to zone radius hops.
Cont..
• With zone radius = 2, the nodes 7, 4, 12, and 13 are
interior nodes, whereas nodes 2, 3, 5, 9, 10, 13, and
15 are peripheral nodes (nodes with the shortest
distance equal to the zone radius).
• When a node s has packets to be sent to a destination node d, it checks whether node d is
within its zone.
• If the destination belongs to its own zone, then it delivers the packet directly.
• Otherwise, node s bordercasts (uses unicast routing to deliver packets directly to the border
nodes) the RouteRequest to its peripheral nodes.
• If any peripheral node finds node d to be located within its routing zone, it sends a RouteReply
back to node s indicating the path; otherwise, the node re-bordercasts the RouteRequest
packet to the peripheral nodes.
Cont...
• Nodes 10 and 14 find the information about node 16 to be
available in their intra-zone routing tables, and hence they
originate RouteReply packets back to node 8.
When a broken link in the path is detected, the node performs a local path reconfiguration in which the broken link is
bypassed by means of a short alternate path connecting the ends of the broken link.
Optimized Link State Routing (Flooding Mechanism)
• The optimized link state routing (OLSR) protocol is a proactive routing protocol that employs
an efficient link state packet forwarding mechanism called multipoint relaying.
• Optimizations are done in two ways: by reducing the size of the control packets and by
reducing the number of links that are used for forwarding the link state packets.
• The reduction in the size of link state packets is made by declaring only a subset of the links in
the link state updates of the interest.
• This subset of links or neighbors that are designated for link state updates and are assigned
the responsibility of packet forwarding are called multipoint relays.
Cont..
• The link state update optimization achieves higher efficiency when operating in highly dense
networks.
• The set consisting of nodes that are multipoint relays is referred to as MPRset.
• Each node (say, P) in the network selects an MPRset that processes and forwards every link
state packet that node P originates.
• The neighbor nodes that do not belong to the MPRset process the link state packets
originated by node P but do not forward them.
• Similarly, each node maintains a subset of neighbors called MPR selectors, which is the set of
neighbors that have selected the node as a multipoint relay.
Cont..
• A node forwards packets that are received from nodes belonging to its MPRSelector set.
• The members of both MPRset and MPRSelectors keep changing over time.
• The members of the MPRset of a node P are selected such that every node in P’s two-hop
neighborhood has a bidirectional link with the node P.
• Every node periodically broadcasts its MPRSelector set to nodes in its immediate
neighborhood.
• A node periodically sends Hello messages that contain the list of neighbors with which the
node has bidirectional links and the list of neighbors whose transmissions were received in the
recent past but with whom bidirectional links have not yet been confirmed.
• A data structure called neighbor table is used to store the list of neighbors, the two-hop
neighbors, and the status of neighbor nodes.
Cont..
• Similarly a sequence number is attached with the MPRset which gets incremented with every new
MPRset.
• The MPRset need not be optimal, and during initialization of the network it may be same as the neighbor
set.
• The smaller the number of nodes in the MPRset, the higher the efficiency of protocol.
• Every node periodically originates topology control (TC) packets that contain topology information with
which the routing table is updated.
• These TC packets contain the MPRSelector set of every node and are flooded throughout the network
using the multipoint relaying mechanism.
Fisheye State Routing Protocol (Hierarchical Mechanism)
• The fisheye state routing (FSR) protocol is a generalization of the Global State Routing (GSR) protocol.
• FSR uses the fisheye technique to reduce information required to represent graphical data, to reduce
routing overhead.
• The basic principle behind this technique is the property of a fish’s eye that can capture pixel
information with greater accuracy near its eye’s focal point.
• This accuracy decreases with an increase in the distance from the center of the focal point.
• In FSR, accurate information about nodes in its local topology, and the accuracy of the network
information decreasing with increasing distance.
• FSR maintains the topology of the network at every node, but does not flood the entire network with the
information.
Cont..
• Instead of flooding, a node exchanges topology information only with its neighbors.
• This constitutes a hybrid approach comprising of the link-level information exchange of distance
vector protocols (DSDV) and the complete topology information exchange of link state protocols.
• The complete topology information of the network is maintained at every node and the desired
shortest paths are computed as required.
• The topology information exchange takes place periodically rather than being driven by an event.
• FSR defines routing scope, which is the set of nodes that are reachable in a specific number of
hops.
Cont..
• This keeps the immediate neighborhood topology information maintained at a node more
precise compared to the information about nodes farther away from it.
• Thus the message size for a typical topology information update packet is significantly reduced
due to the removal of topology information regarding the far-away nodes.
• The path information for a distant node may be inaccurate as there can be staleness in the
information.
• However, the path information gets more and more accurate as the packet nears its
destination.
Cont..