SlideShare a Scribd company logo
1 of 4
Download to read offline
© 2015, IJCSE All Rights Reserved 22
International Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and Engineering Open Access
Review Paper Volume-3, Issue-8 E-ISSN: 2347-2693
Review of Different Criteria for Designing Routing Protocols
Suman Saroj1*
, Raj Gaurang Tiwari2
and Pankaj Kumar3
1*,2,3
Department of Computer Science and Engineering, SRMGPC, India
www.ijcseonline.org
Received: Jul /04/2015 Revised: Jul/16/2015 Accepted: Aug/18/2015 Published: Aug/30/ 2015
Abstract— Routing is the process of finding optimal path between source and destination. Because of the fact that packet
may be necessary to hop or several hops before a packet reach the target, a routing protocol is needed. Routing protocols
allow routers to dynamically advertise and discover routes, decide which routes are available and which are the most efficient
routes to a target. In this paper we review different existing protocols and their applicability in current scenario.
Keywords— MANET, Routing, Performance, Qualitative, Quantitative Characteristics
I. INTRODUCTION
Mobile environment differs from the stationary
environment in many respects. Computers in stationary
environments are usually very reliable and efficient during
data transfer from one host to another host. A stationary
environment can distribute an application’s components and
rely upon the use of high-bandwidth, small latency
networks to provide excellent interactive application
performance[1].
Various methods in the past have been developed to
optimize the quality of service over wireless
communications network. These methods have been
developed in order to optimize the operation in
standalone node itself. But the development was not
focused on optimizing the network performance based on
full observation in a network. The advantage of optimizing
the network performance based on observations of the full
network is to maximize the network throughput. In order to
achieve the throughput requirements various methods were
developed.
II. ROUTING PROTOCOL
A routing protocol is the mechanism by which user traffic is
directed and transported through the network from the
source node to the destination node. Objectives comprise
maximizing network performance and minimizing the cost
of network in accordance with its capacity. The network
performance depends upon hop count, delay, throughput,
loss rate, stability, cost, etc; and the network capacity is a
function of available resources resides at each node and
number of nodes in the network as well as its density,
frequency of communication, frequency of change in
topology. Routing in Ad hoc environment is diverse
compared to normal wired networks[2]. This is chiefly due
to following two factors:
1. The bandwidth restriction
2. Rapid change in network topology
The basic routing functionality for mobile ad hoc
networks is as follows:
• Path generation Mechanism: which generates paths
according to the assembled and distributed state
information of the network and of the application;
assembling and distributing network and user traffic
state information,
• Path selection Mechanism: which selects appropriate
paths based on network and application state
information.
• Data Forwarding Mechanism: which forwards user
traffic along the selected route forwarding user traffic
along the selected route.
• Path Maintenance Mechanism: maintaining of the
selected route.
III. PROPERTIES OF PROFICIENT ROUTING
ALGORITHM
Some common desirable properties that any routing
protocol for an ad hoc network should possess are as
follows:
A. Qualitative Characteristics
Several qualitative properties for designing a routing
protocol are desired for a mobile ad hoc network.
• Loop free: Presence of loops in the path from the
source to the destination result in inefficient routing.
In the worst-case situation, the packets may keep
traversing the loop indefinitely and never reach their
destination.
• Distributed control: In a centralized routing scheme,
one node stores all the topological information and
makes all routing decisions; therefore, it is neither
robust, nor scalable. The central router can be a single
point of failure; also, the network in the vicinity of the
central router may get congested with routing queries
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(22-25) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 23
and responses.
• Fast routing: The quicker the routing decisions are
made, the sooner the packets can be routed towards
the destination, as the probability that the packets take
the chosen route before it gets disrupted because of
node mobility is quite high.
• Localized reaction to topological changes:
Topological changes in one part of the network
should lead to minimal changes in routing strategy in
other distant parts of the network. This will keep the
routing update overheads in check and make the
algorithm scalable.
• Multiplicity of routes: Even if node mobility results in
disruption of some routes, other routes should be
available for packet delivery.
• Power efficient: A routing protocol should be power
efficient. That is the protocol should distribute the
load otherwise shut-off nodes may cause partitioned
topologies that may result in inaccessible routes.
• Secure: A routing protocol should be secure. We need
authentication for communicating nodes, non-
repudiation and encryption for private networking to
avoid routing deceptions.
• QoS aware: A routing protocol should also be aware
of Quality of Service. It should know about the delay
and throughput for a source destination pair, and must
be able to verify its longevity so that a real-time
application may rely on it.
B. Quantitative Characteristics
There are several quantitative performance metrics that
can be used to assess the performance of routing protocols
within a mobile ad hoc network. First, throughput and
end-to-end delay are typical performance measures that
show a routing protocol's effectiveness in doing its job
(i.e. delivering data packets). Second, for certain protocols
that acquire routes on-demand the amount of time it takes
to acquire a route or route discovery latency is also an
important performance measure. This measurement more
simply conforms to those protocols that are of a demand-
base property and thus should be attained. Third,
bandwidth utilization should be observed to notice, how
effectual the protocol is if both routing packets and data
packets share the same channel. One such measure would
be to attain the number of bytes (or packets) of routing
packets transmitted per number of bytes (or packets) of
data packets delivered. Another such measurement may be
the amount of data bits transmitted per data bit delivered
to show the efficiency of data delivery throughout the
network.
IV.CLASSIFICATION OF ROUTING PROTOCOLS
There are different criteria [3] for designing and
classifying routing protocols for wireless Ad hoc
networks as shown in table 2.1 below.
Table 2.1: Classification of Routing Protocols
Classification Criteria used
Pre-Computed Routing
Vs. On-Demand Routing
Depending on when the route
is computed
Periodical Update vs.
Event-Driven Up-
Date
Based on when the routing
information will be
disseminated
Flat Structure vs.
Hierarchical Structure
Based on the number of levels
(clusters) used
Decentralized
Computation vs.
Distributed Computation
Based on how (or where) a
route is computed
Source Routing Vs.
Hop-By-Hop Routing
Based on routing information
available in packet header
Single Path (unipath)
Vs. Multiple Paths
(multipath)
Based on number of paths
established
A. Pre-Computed Routing Vs. On-Demand Routing [4]
Depending on when the route is computed, routing
protocols can be divided into two categories: Pre-
computed routing and On-demand routing. Pre-computed
routing is also called proactive routing or table driven
routing
[5].
In Proactive routing, routes to all
destinations are computed a priori and link states are
maintained in node’s routing tables in order to compute
routes in advance. To keep the information up to date,
nodes require to update their information periodically.
The major benefit of proactive routing is when a source
needs to send packets to a destination, the route is already
available, i.e., and there is no latency. The drawback of
proactive routing are some routes may never be used and
dissemination of routing information will consume a lot of
the scarce wireless network bandwidth when the link
state and network topology change fast.
On-demand routing is also called reactive routing. In
Reactive (on-demand) routing, protocols update routing
information when a routing requirement is presented i.e.
a route is built only when necessary. The main benefit
reactive routing is that the precious bandwidth of
wireless Ad hoc networks is greatly saved. And the main
disadvantage is if the topology of networks changes
quickly, a lot of update packets will be generated and
distributed over the network, which will use a lot of
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(22-25) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 24
valuable bandwidth, and furthermore, may cause too
much fluctuation of routes.
B. Periodical Update Vs Event-Driven Update [4]
Routing information needs to be disseminated to
network nodes in order to ensure that the knowledge of
link state and network topology remains up-to-date.
Based on when the routing information will be
disseminated, we can classify routing protocols as
periodical update and event-driven update protocols.
Periodical update protocols disseminate routing
information periodically. Periodical updates will maintain
network stability, and most importantly, enable (new)
nodes to learn about the topology and the state of the
network. However if the period between updates is
large, the protocol may not keep the information up-to-
date. On the other hand, if the period is small, too many
routing packets will be disseminated which consumes the
precious bandwidth of a wireless network. In an event-
driven update protocol, when events occur, (such as
when a link fails or a new link appears), an update
packet will be broadcast and the up-to-date status can be
disseminated over the network soon. The problem might
be that if the topology of networks changes rapidly, a lot
of update packets will be generated and disseminated over
the network, which will use a lot of valuable bandwidth,
and furthermore, may cause too much fluctuation of
routes. One solution[6][7] is to use some threshold which
imposes maximum limit to update packets.
C. Flat Structure Vs. Hierarchical Structure
In a flat structure, all nodes in a network are at the
same level and have the same routing functionality.
Flat routing is straightforward and proficient for little
networks. The hitch is that when a network becomes
bulky, the amount of routing information will be outsized
and it will take a extended time for routing information to
arrive at remote nodes. For large networks, hierarchical
(cluster-based) routing may be used to solve the above
problems [7]. In hierarchical routing the nodes in the
network are dynamically organized into partitions named
as clusters, and then the clusters are combined again into
larger partitions called super-clusters and so on.
Organizing a network into clusters assist to maintain a
comparatively stable network topology. The high
dynamics of membership and network topology is
restricted within clusters. Only stable and high level
information such as the cluster level or the super-cluster
level will be propagated across a long distance, thus the
control traffic (or routing overhead) may be largely
reduced [6]. Within a cluster, the nodes may have
complete topology information about its cluster and
proactive routing may be used. If the destination is in a
different cluster from the source, inter-cluster routing
must be utilized. Inter-cluster routing is usually reactive,
or a combination of proactive and reactive routing. Alike
cellular structure in cellular systems, a hierarchical
cluster is readily deployable to achieve some kind of
resource reuse such as frequency reuse and code reuse
and interference can be reduced when using different
spreading codes across clusters.
D. Decentralized Computation Vs. Distributed
Computation
Based on how (or where) a route is computed, there
are two categories of routing protocols: decentralized
computation and distributed computation. In a
decentralized computation-based protocol, all node in the
network preserve global and complete information about
the network topology such that the node can compute the
route to a destination itself when desired. The route
computation in LSR is a typical example of
decentralized computation.
In a distributed computation-based protocol, every node
in the network only maintains partial and local
information about the network topology. When a route
needs to be calculated, many nodes collaborate to
compute the route. The route computation in DVR and
the route discovery in on demand routing belong to
this category.
E. Source Routing Vs. Hop-by-Hop Routing
Some routing protocols place the entire route (i.e., nodes
in the route) in the headers of data packets so that the
intermediate nodes only forward these packets according
to the route in the header. Such a routing is called
“source routing”. Source routing has the advantage that
intermediate nodes do not need to maintain up-to-date
routing information in order to route the packets they
forward, because the packets themselves previously
contain all the routing decisions. This fact, when coupled
with on demand route computation, eradicates the
necessity for the periodic route advertisement and
neighbour detection packets required in other kinds of
protocols [8]. The major difficulty with source routing is
that when the network is large and the route is long,
placing the whole route in the header of every packet will
waste a lot of scarce bandwidth.
In a hop-by-hop routing, the route to a destination is
distributed in the “next hop” of the nodes alongside the
route. When a node accepts a packet to a target, it
forwards the packet to the next hop corresponding to
the target. The tribulations are that all nodes need to
maintain routing information and there may be a
possibility of forming a routing loop.
F. Single Path Vs. Multiple Paths
Some routing protocols will find a single route from a
source to a destination, which results in simple protocol
International Journal of Computer Sciences and Engineering Vol.-3(8), PP(22-25) Aug 2015, E-ISSN: 2347-2693
© 2015, IJCSE All Rights Reserved 25
and saves storage. Other routing protocols will find
manifold routes, which have the benefits of simple
recovery from a route malfunction and being more
reliable and robust. Single path routing protocols
have been extensively examined in the past[9][10]. A
more recent research topic for MANETs is multipath
routing protocols. Multipath routing protocols set up
numerous disjoint paths from a source to a destination
and are thereby improving resilience to network failures
and allow for network load balancing. These upshots are
principally interesting in networks with high node
density (and the corresponding larger choice of disjoint
paths) and high network load (due to the ability to
load balance the traffic around congested networks).
V. CONCLUSION
Routing is the process of finding optimal path between
source and destination. Because of the fact that packet
may be necessary to hop or several hops before a packet
reach the target, a routing protocol is needed. Routing
protocols allow routers to dynamically advertise and
discover routes, decide which routes are available and
which are the most efficient routes to a target. The routing
protocol has two main jobs, selection of routes for various
source-target pairs and the deliverance of massages to
their correct target. The second function is conceptually
straight forward using a verity of protocols and data
structures (routing tables). In this research work we
focused on selecting and finding various criteria for
routing protocols.
REFERENCES
[1]. Laiali Almazaydeh, Eman Abdelfattah, Manal Al-
Bzoor, and Amer Al- Rahayfeh “Performance
Evaluation Of Routing Protocols In Wireless Sensor
Networks” International Journal of Computer
Science and Information Technology, Volume 2,
Number 2, April 2010
[2]. Jamal N. Al- Karaki, Ahmed E. kamal,”Routing
Techniques In Wireless Sensor Networks:A
Survey”,IEEE Wireless Communications December
2004.
[3]. Smt. Rajashree.V. Biradar & Prof V. C. Patil,
“Classification and Comparison of routing
Techniques in Wireless Ad-hoc Networks”,
Proceedings of international Symposium on Ad-
hoc Ubiquitous Computing (ISHUC’06), pages 7-
11, 2006.
[4]. Yi-Chun Hu, Adrian Perrig, “A Survey of Secure
Wireless Ad Hoc Routing”, IEEE Security and
Privacy, 2(3): pages 28-39, May/June 2004.
[5]. P. Gupta and P. Kumar, “The capacity of
wireless networks”, IEEE Transactions on
Information Theory, 46(2): pages 388-394, March
2000.
[6]. G. S. Lauer, “Packet-radio Routing in
Communications Networks”, (Ed. M. teenstrup),
pages 313–350, 2004.
[7]. Bokureche, “Performance evaluation of routing
protocols for ad hoc wireless networks”, ACM
Mobile networks application, vol.9, no.4, pages
333-342, august- 2004.
[8]. L. Schwiebert, S. K. S. Gupta, and J. Weinmann,
“Reserach challenges in wireless networks of
biomedical sensors”, Proceedings of the 7th
ACM International Conference on Mobile
Computing and Networking (MobiCom ’01), pages
151-165, Rome, Italy, July 2001.
[9]. M. R. Pearlman, Z. J. Haas, P. Sholander and S. S.
Tabrizi, “On the Impact of Alternate Path Routing
for Load Balancing in Mobile Ad Hoc
Networks”, Proceedings of the ACM MobiHoc,
pages 3-10, 2000.
[10]. Nasipuri, R. Castaneda, and S. R. Das, “Performance
of multipath routing for on-demand protocols in
mobile ad hoc networks”, Mobile Networks and
Applications, vol. 6, pages 339-349, 2001.

More Related Content

What's hot

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...IRJET Journal
 
IRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief ReviewIRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief ReviewIRJET Journal
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...eSAT Publishing House
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Jitender Grover
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...IJECEIAES
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) ArunChokkalingam
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over ltetanawan44
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETijsrd.com
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...eSAT Journals
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingeSAT Publishing House
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 

What's hot (16)

Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...Network Surveillance Based Data Transference in Cognitive Radio Network with ...
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
 
Ft3410671073
Ft3410671073Ft3410671073
Ft3410671073
 
IRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief ReviewIRJET- Routing Protocols in Vanet a Brief Review
IRJET- Routing Protocols in Vanet a Brief Review
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Routing ad hoc network
Routing ad hoc networkRouting ad hoc network
Routing ad hoc network
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
Impact of Variable Transmission Range and Scalability With Respect To Mobilit...
 
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...Design and analysis of routing protocol for cognitive radio ad hoc networks i...
Design and analysis of routing protocol for cognitive radio ad hoc networks i...
 
AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing) AODV (adhoc ondemand distance vector routing)
AODV (adhoc ondemand distance vector routing)
 
1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte1 improvement of tcp congestion window over lte
1 improvement of tcp congestion window over lte
 
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANETIntegrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET
 
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 

Viewers also liked

Change and Service Delivery
Change and Service DeliveryChange and Service Delivery
Change and Service DeliveryBolaji Okusaga
 
Startup Gathering 'Driving Business Forward'
Startup Gathering 'Driving Business Forward'Startup Gathering 'Driving Business Forward'
Startup Gathering 'Driving Business Forward'Tssg Wit
 
Minutes of the May 12 2015 MHSPC Meeting
Minutes of the May 12 2015 MHSPC MeetingMinutes of the May 12 2015 MHSPC Meeting
Minutes of the May 12 2015 MHSPC MeetingA Wittnebel Consulting
 
Social Programme 12.10.15
Social Programme 12.10.15Social Programme 12.10.15
Social Programme 12.10.15lsiworldwide1
 
2016 Adaptive Insights Torchie Award Winners
2016 Adaptive Insights Torchie Award Winners2016 Adaptive Insights Torchie Award Winners
2016 Adaptive Insights Torchie Award WinnersAdaptive Insights
 
Метапарадигма 10
Метапарадигма 10Метапарадигма 10
Метапарадигма 10ikonnik
 
The Sportskid Whisperer - Project presentation with animation
The Sportskid Whisperer - Project presentation with animationThe Sportskid Whisperer - Project presentation with animation
The Sportskid Whisperer - Project presentation with animationAndrej Miklavc
 
Química de las drogas
Química de las drogasQuímica de las drogas
Química de las drogasleidydiana98
 
15 Angel Investors And Startups They Invested In.
15 Angel Investors And Startups They Invested In.15 Angel Investors And Startups They Invested In.
15 Angel Investors And Startups They Invested In.designs.codes
 
Mobile by Filipi Neves
Mobile by Filipi NevesMobile by Filipi Neves
Mobile by Filipi NevesFilipi Neves
 

Viewers also liked (15)

Change and Service Delivery
Change and Service DeliveryChange and Service Delivery
Change and Service Delivery
 
ADP PPT Day 1
ADP PPT Day 1ADP PPT Day 1
ADP PPT Day 1
 
Startup Gathering 'Driving Business Forward'
Startup Gathering 'Driving Business Forward'Startup Gathering 'Driving Business Forward'
Startup Gathering 'Driving Business Forward'
 
Ecommerce
EcommerceEcommerce
Ecommerce
 
Minutes of the May 12 2015 MHSPC Meeting
Minutes of the May 12 2015 MHSPC MeetingMinutes of the May 12 2015 MHSPC Meeting
Minutes of the May 12 2015 MHSPC Meeting
 
Social Programme 12.10.15
Social Programme 12.10.15Social Programme 12.10.15
Social Programme 12.10.15
 
2016 CV
2016 CV2016 CV
2016 CV
 
Queen
QueenQueen
Queen
 
2016 Adaptive Insights Torchie Award Winners
2016 Adaptive Insights Torchie Award Winners2016 Adaptive Insights Torchie Award Winners
2016 Adaptive Insights Torchie Award Winners
 
AF Presentation
AF PresentationAF Presentation
AF Presentation
 
Метапарадигма 10
Метапарадигма 10Метапарадигма 10
Метапарадигма 10
 
The Sportskid Whisperer - Project presentation with animation
The Sportskid Whisperer - Project presentation with animationThe Sportskid Whisperer - Project presentation with animation
The Sportskid Whisperer - Project presentation with animation
 
Química de las drogas
Química de las drogasQuímica de las drogas
Química de las drogas
 
15 Angel Investors And Startups They Invested In.
15 Angel Investors And Startups They Invested In.15 Angel Investors And Startups They Invested In.
15 Angel Investors And Startups They Invested In.
 
Mobile by Filipi Neves
Mobile by Filipi NevesMobile by Filipi Neves
Mobile by Filipi Neves
 

Similar to 5 ijcse-01219

A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...eSAT Journals
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...eSAT Journals
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkIJSRED
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Networkijtsrd
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
An Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETAn Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETIRJET Journal
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...IOSR Journals
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTsulaiman_karim
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms IJECEIAES
 

Similar to 5 ijcse-01219 (20)

[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
[IJCT-V3I3P5] Authors: Alok Kumar Dwivedi, Gouri Shankar Prajapati
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...Design and development of load sharing multipath routing protcol for mobile a...
Design and development of load sharing multipath routing protcol for mobile a...
 
50120130405022
5012013040502250120130405022
50120130405022
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Performance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University NetworkPerformance Evaluation of Routing Protocols in University Network
Performance Evaluation of Routing Protocols in University Network
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
An Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANETAn Ordinary & Innovative Packet Routing Schemes in VANET
An Ordinary & Innovative Packet Routing Schemes in VANET
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
Routing basic
Routing basicRouting basic
Routing basic
 
Comprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoTComprehensive survey on routing protocols for IoT
Comprehensive survey on routing protocols for IoT
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
Ijetr021261
Ijetr021261Ijetr021261
Ijetr021261
 
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms Performance Analysis of Mesh-based NoC’s on Routing Algorithms
Performance Analysis of Mesh-based NoC’s on Routing Algorithms
 

More from Shivlal Mewada

More from Shivlal Mewada (20)

31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi31 ijcse-01238-9 vetrikodi
31 ijcse-01238-9 vetrikodi
 
30 ijcse-01238-8 thangaponu
30 ijcse-01238-8 thangaponu30 ijcse-01238-8 thangaponu
30 ijcse-01238-8 thangaponu
 
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
 
28 ijcse-01238-6 sowmiya
28 ijcse-01238-6 sowmiya28 ijcse-01238-6 sowmiya
28 ijcse-01238-6 sowmiya
 
27 ijcse-01238-5 sivaranjani
27 ijcse-01238-5 sivaranjani27 ijcse-01238-5 sivaranjani
27 ijcse-01238-5 sivaranjani
 
26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja26 ijcse-01238-4 sinthuja
26 ijcse-01238-4 sinthuja
 
25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha25 ijcse-01238-3 saratha
25 ijcse-01238-3 saratha
 
24 ijcse-01238-2 manohari
24 ijcse-01238-2 manohari24 ijcse-01238-2 manohari
24 ijcse-01238-2 manohari
 
23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha23 ijcse-01238-1indhunisha
23 ijcse-01238-1indhunisha
 
22 ijcse-01208
22 ijcse-0120822 ijcse-01208
22 ijcse-01208
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
 
20 ijcse-01225-3
20 ijcse-01225-320 ijcse-01225-3
20 ijcse-01225-3
 
19 ijcse-01227
19 ijcse-0122719 ijcse-01227
19 ijcse-01227
 
18 ijcse-01232
18 ijcse-0123218 ijcse-01232
18 ijcse-01232
 
16 ijcse-01237
16 ijcse-0123716 ijcse-01237
16 ijcse-01237
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
 
14 ijcse-01234
14 ijcse-0123414 ijcse-01234
14 ijcse-01234
 
13 ijcse-01233
13 ijcse-0123313 ijcse-01233
13 ijcse-01233
 
12 ijcse-01224
12 ijcse-0122412 ijcse-01224
12 ijcse-01224
 
9 ijcse-01223
9 ijcse-012239 ijcse-01223
9 ijcse-01223
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

5 ijcse-01219

  • 1. © 2015, IJCSE All Rights Reserved 22 International Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and EngineeringInternational Journal of Computer Sciences and Engineering Open Access Review Paper Volume-3, Issue-8 E-ISSN: 2347-2693 Review of Different Criteria for Designing Routing Protocols Suman Saroj1* , Raj Gaurang Tiwari2 and Pankaj Kumar3 1*,2,3 Department of Computer Science and Engineering, SRMGPC, India www.ijcseonline.org Received: Jul /04/2015 Revised: Jul/16/2015 Accepted: Aug/18/2015 Published: Aug/30/ 2015 Abstract— Routing is the process of finding optimal path between source and destination. Because of the fact that packet may be necessary to hop or several hops before a packet reach the target, a routing protocol is needed. Routing protocols allow routers to dynamically advertise and discover routes, decide which routes are available and which are the most efficient routes to a target. In this paper we review different existing protocols and their applicability in current scenario. Keywords— MANET, Routing, Performance, Qualitative, Quantitative Characteristics I. INTRODUCTION Mobile environment differs from the stationary environment in many respects. Computers in stationary environments are usually very reliable and efficient during data transfer from one host to another host. A stationary environment can distribute an application’s components and rely upon the use of high-bandwidth, small latency networks to provide excellent interactive application performance[1]. Various methods in the past have been developed to optimize the quality of service over wireless communications network. These methods have been developed in order to optimize the operation in standalone node itself. But the development was not focused on optimizing the network performance based on full observation in a network. The advantage of optimizing the network performance based on observations of the full network is to maximize the network throughput. In order to achieve the throughput requirements various methods were developed. II. ROUTING PROTOCOL A routing protocol is the mechanism by which user traffic is directed and transported through the network from the source node to the destination node. Objectives comprise maximizing network performance and minimizing the cost of network in accordance with its capacity. The network performance depends upon hop count, delay, throughput, loss rate, stability, cost, etc; and the network capacity is a function of available resources resides at each node and number of nodes in the network as well as its density, frequency of communication, frequency of change in topology. Routing in Ad hoc environment is diverse compared to normal wired networks[2]. This is chiefly due to following two factors: 1. The bandwidth restriction 2. Rapid change in network topology The basic routing functionality for mobile ad hoc networks is as follows: • Path generation Mechanism: which generates paths according to the assembled and distributed state information of the network and of the application; assembling and distributing network and user traffic state information, • Path selection Mechanism: which selects appropriate paths based on network and application state information. • Data Forwarding Mechanism: which forwards user traffic along the selected route forwarding user traffic along the selected route. • Path Maintenance Mechanism: maintaining of the selected route. III. PROPERTIES OF PROFICIENT ROUTING ALGORITHM Some common desirable properties that any routing protocol for an ad hoc network should possess are as follows: A. Qualitative Characteristics Several qualitative properties for designing a routing protocol are desired for a mobile ad hoc network. • Loop free: Presence of loops in the path from the source to the destination result in inefficient routing. In the worst-case situation, the packets may keep traversing the loop indefinitely and never reach their destination. • Distributed control: In a centralized routing scheme, one node stores all the topological information and makes all routing decisions; therefore, it is neither robust, nor scalable. The central router can be a single point of failure; also, the network in the vicinity of the central router may get congested with routing queries
  • 2. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(22-25) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 23 and responses. • Fast routing: The quicker the routing decisions are made, the sooner the packets can be routed towards the destination, as the probability that the packets take the chosen route before it gets disrupted because of node mobility is quite high. • Localized reaction to topological changes: Topological changes in one part of the network should lead to minimal changes in routing strategy in other distant parts of the network. This will keep the routing update overheads in check and make the algorithm scalable. • Multiplicity of routes: Even if node mobility results in disruption of some routes, other routes should be available for packet delivery. • Power efficient: A routing protocol should be power efficient. That is the protocol should distribute the load otherwise shut-off nodes may cause partitioned topologies that may result in inaccessible routes. • Secure: A routing protocol should be secure. We need authentication for communicating nodes, non- repudiation and encryption for private networking to avoid routing deceptions. • QoS aware: A routing protocol should also be aware of Quality of Service. It should know about the delay and throughput for a source destination pair, and must be able to verify its longevity so that a real-time application may rely on it. B. Quantitative Characteristics There are several quantitative performance metrics that can be used to assess the performance of routing protocols within a mobile ad hoc network. First, throughput and end-to-end delay are typical performance measures that show a routing protocol's effectiveness in doing its job (i.e. delivering data packets). Second, for certain protocols that acquire routes on-demand the amount of time it takes to acquire a route or route discovery latency is also an important performance measure. This measurement more simply conforms to those protocols that are of a demand- base property and thus should be attained. Third, bandwidth utilization should be observed to notice, how effectual the protocol is if both routing packets and data packets share the same channel. One such measure would be to attain the number of bytes (or packets) of routing packets transmitted per number of bytes (or packets) of data packets delivered. Another such measurement may be the amount of data bits transmitted per data bit delivered to show the efficiency of data delivery throughout the network. IV.CLASSIFICATION OF ROUTING PROTOCOLS There are different criteria [3] for designing and classifying routing protocols for wireless Ad hoc networks as shown in table 2.1 below. Table 2.1: Classification of Routing Protocols Classification Criteria used Pre-Computed Routing Vs. On-Demand Routing Depending on when the route is computed Periodical Update vs. Event-Driven Up- Date Based on when the routing information will be disseminated Flat Structure vs. Hierarchical Structure Based on the number of levels (clusters) used Decentralized Computation vs. Distributed Computation Based on how (or where) a route is computed Source Routing Vs. Hop-By-Hop Routing Based on routing information available in packet header Single Path (unipath) Vs. Multiple Paths (multipath) Based on number of paths established A. Pre-Computed Routing Vs. On-Demand Routing [4] Depending on when the route is computed, routing protocols can be divided into two categories: Pre- computed routing and On-demand routing. Pre-computed routing is also called proactive routing or table driven routing [5]. In Proactive routing, routes to all destinations are computed a priori and link states are maintained in node’s routing tables in order to compute routes in advance. To keep the information up to date, nodes require to update their information periodically. The major benefit of proactive routing is when a source needs to send packets to a destination, the route is already available, i.e., and there is no latency. The drawback of proactive routing are some routes may never be used and dissemination of routing information will consume a lot of the scarce wireless network bandwidth when the link state and network topology change fast. On-demand routing is also called reactive routing. In Reactive (on-demand) routing, protocols update routing information when a routing requirement is presented i.e. a route is built only when necessary. The main benefit reactive routing is that the precious bandwidth of wireless Ad hoc networks is greatly saved. And the main disadvantage is if the topology of networks changes quickly, a lot of update packets will be generated and distributed over the network, which will use a lot of
  • 3. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(22-25) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 24 valuable bandwidth, and furthermore, may cause too much fluctuation of routes. B. Periodical Update Vs Event-Driven Update [4] Routing information needs to be disseminated to network nodes in order to ensure that the knowledge of link state and network topology remains up-to-date. Based on when the routing information will be disseminated, we can classify routing protocols as periodical update and event-driven update protocols. Periodical update protocols disseminate routing information periodically. Periodical updates will maintain network stability, and most importantly, enable (new) nodes to learn about the topology and the state of the network. However if the period between updates is large, the protocol may not keep the information up-to- date. On the other hand, if the period is small, too many routing packets will be disseminated which consumes the precious bandwidth of a wireless network. In an event- driven update protocol, when events occur, (such as when a link fails or a new link appears), an update packet will be broadcast and the up-to-date status can be disseminated over the network soon. The problem might be that if the topology of networks changes rapidly, a lot of update packets will be generated and disseminated over the network, which will use a lot of valuable bandwidth, and furthermore, may cause too much fluctuation of routes. One solution[6][7] is to use some threshold which imposes maximum limit to update packets. C. Flat Structure Vs. Hierarchical Structure In a flat structure, all nodes in a network are at the same level and have the same routing functionality. Flat routing is straightforward and proficient for little networks. The hitch is that when a network becomes bulky, the amount of routing information will be outsized and it will take a extended time for routing information to arrive at remote nodes. For large networks, hierarchical (cluster-based) routing may be used to solve the above problems [7]. In hierarchical routing the nodes in the network are dynamically organized into partitions named as clusters, and then the clusters are combined again into larger partitions called super-clusters and so on. Organizing a network into clusters assist to maintain a comparatively stable network topology. The high dynamics of membership and network topology is restricted within clusters. Only stable and high level information such as the cluster level or the super-cluster level will be propagated across a long distance, thus the control traffic (or routing overhead) may be largely reduced [6]. Within a cluster, the nodes may have complete topology information about its cluster and proactive routing may be used. If the destination is in a different cluster from the source, inter-cluster routing must be utilized. Inter-cluster routing is usually reactive, or a combination of proactive and reactive routing. Alike cellular structure in cellular systems, a hierarchical cluster is readily deployable to achieve some kind of resource reuse such as frequency reuse and code reuse and interference can be reduced when using different spreading codes across clusters. D. Decentralized Computation Vs. Distributed Computation Based on how (or where) a route is computed, there are two categories of routing protocols: decentralized computation and distributed computation. In a decentralized computation-based protocol, all node in the network preserve global and complete information about the network topology such that the node can compute the route to a destination itself when desired. The route computation in LSR is a typical example of decentralized computation. In a distributed computation-based protocol, every node in the network only maintains partial and local information about the network topology. When a route needs to be calculated, many nodes collaborate to compute the route. The route computation in DVR and the route discovery in on demand routing belong to this category. E. Source Routing Vs. Hop-by-Hop Routing Some routing protocols place the entire route (i.e., nodes in the route) in the headers of data packets so that the intermediate nodes only forward these packets according to the route in the header. Such a routing is called “source routing”. Source routing has the advantage that intermediate nodes do not need to maintain up-to-date routing information in order to route the packets they forward, because the packets themselves previously contain all the routing decisions. This fact, when coupled with on demand route computation, eradicates the necessity for the periodic route advertisement and neighbour detection packets required in other kinds of protocols [8]. The major difficulty with source routing is that when the network is large and the route is long, placing the whole route in the header of every packet will waste a lot of scarce bandwidth. In a hop-by-hop routing, the route to a destination is distributed in the “next hop” of the nodes alongside the route. When a node accepts a packet to a target, it forwards the packet to the next hop corresponding to the target. The tribulations are that all nodes need to maintain routing information and there may be a possibility of forming a routing loop. F. Single Path Vs. Multiple Paths Some routing protocols will find a single route from a source to a destination, which results in simple protocol
  • 4. International Journal of Computer Sciences and Engineering Vol.-3(8), PP(22-25) Aug 2015, E-ISSN: 2347-2693 © 2015, IJCSE All Rights Reserved 25 and saves storage. Other routing protocols will find manifold routes, which have the benefits of simple recovery from a route malfunction and being more reliable and robust. Single path routing protocols have been extensively examined in the past[9][10]. A more recent research topic for MANETs is multipath routing protocols. Multipath routing protocols set up numerous disjoint paths from a source to a destination and are thereby improving resilience to network failures and allow for network load balancing. These upshots are principally interesting in networks with high node density (and the corresponding larger choice of disjoint paths) and high network load (due to the ability to load balance the traffic around congested networks). V. CONCLUSION Routing is the process of finding optimal path between source and destination. Because of the fact that packet may be necessary to hop or several hops before a packet reach the target, a routing protocol is needed. Routing protocols allow routers to dynamically advertise and discover routes, decide which routes are available and which are the most efficient routes to a target. The routing protocol has two main jobs, selection of routes for various source-target pairs and the deliverance of massages to their correct target. The second function is conceptually straight forward using a verity of protocols and data structures (routing tables). In this research work we focused on selecting and finding various criteria for routing protocols. REFERENCES [1]. Laiali Almazaydeh, Eman Abdelfattah, Manal Al- Bzoor, and Amer Al- Rahayfeh “Performance Evaluation Of Routing Protocols In Wireless Sensor Networks” International Journal of Computer Science and Information Technology, Volume 2, Number 2, April 2010 [2]. Jamal N. Al- Karaki, Ahmed E. kamal,”Routing Techniques In Wireless Sensor Networks:A Survey”,IEEE Wireless Communications December 2004. [3]. Smt. Rajashree.V. Biradar & Prof V. C. Patil, “Classification and Comparison of routing Techniques in Wireless Ad-hoc Networks”, Proceedings of international Symposium on Ad- hoc Ubiquitous Computing (ISHUC’06), pages 7- 11, 2006. [4]. Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 2(3): pages 28-39, May/June 2004. [5]. P. Gupta and P. Kumar, “The capacity of wireless networks”, IEEE Transactions on Information Theory, 46(2): pages 388-394, March 2000. [6]. G. S. Lauer, “Packet-radio Routing in Communications Networks”, (Ed. M. teenstrup), pages 313–350, 2004. [7]. Bokureche, “Performance evaluation of routing protocols for ad hoc wireless networks”, ACM Mobile networks application, vol.9, no.4, pages 333-342, august- 2004. [8]. L. Schwiebert, S. K. S. Gupta, and J. Weinmann, “Reserach challenges in wireless networks of biomedical sensors”, Proceedings of the 7th ACM International Conference on Mobile Computing and Networking (MobiCom ’01), pages 151-165, Rome, Italy, July 2001. [9]. M. R. Pearlman, Z. J. Haas, P. Sholander and S. S. Tabrizi, “On the Impact of Alternate Path Routing for Load Balancing in Mobile Ad Hoc Networks”, Proceedings of the ACM MobiHoc, pages 3-10, 2000. [10]. Nasipuri, R. Castaneda, and S. R. Das, “Performance of multipath routing for on-demand protocols in mobile ad hoc networks”, Mobile Networks and Applications, vol. 6, pages 339-349, 2001.