SlideShare a Scribd company logo
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 191
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Comparison of Various Unicast-Multicast Routing Protocols for Mobile
Ad-Hoc Networks
Chirag R. Patel1
, Rajesh H. Davda2
1,2
Computer Engineering Department, C. U. Shah College of Engineering & Technology, Wadhwan (Gujarat)
Abstract: A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of
mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host
node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes
in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any
MANET routing protocols. This paper describes about the basic idea of different routing protocols
and its efficient use in MANET. There are several routing protocols based on UNICAST and
MULTICAST. This paper will conclude the main characteristics of these protocols with comparison
and suggest the best suited protocol for particular topology or network.
Keywords: MANET, Unicast Routing Protocol, Multicast Routing Protocol.
I. INTRODUCTION
The rapid growth in the mobile communication is mainly due to the mobility offered to end users,
providing information access to anywhere, easy deployment, and user friendliness. These types of
networks have independent centralized administration; user can enter the networks and leave the
networks easily. One of the important research areas in MANET is establishing and maintaining the
ad hoc network through the use of routing protocols. Wireless communication technology have been
developed with two primary models one is fix infrastructure based model in which much of the
nodes are mobile and connected through fixed backbone nodes using wireless medium. Another
model is Mobile Ad-hoc network. Mobile Ad-Hoc Networks (MANETs) are comprised of mobile
nodes (MNs) that are self-organizing and there are no specific routers, servers, access points for
MANET. Design issue for developing a routing protocol for wireless environment with mobility is
very different and more complex than those for wired network with static nodes [1]. Each device in a
MANET is free to move independently in any direction, and will therefore change its links to other
devices frequently. Depending upon the nature of application, appropriate routing protocol is
implemented. UNICAST and MULTICAST protocols are the two classes of MANET routing
protocols and each constitute a set of protocols.
1.1. Characteristics of MANET
MANETS have some characteristics:
Bandwidth-constrained: Variable capacity links: Wireless links will continue to have significantly
lower capacity than their hardwired counterparts. In addition, the realized throughput of wireless
communications after accounting for the effects of multiple access, fading, noise, and interference
conditions, etc. is often much less than a radio's maximum transmission rate. One effect of the
relatively low to moderate link capacities is that congestion is typically the norm rather than the
exception, i.e. aggregate application demand will likely approach or exceed network capacity
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 192
frequently. As the mobile network is often simply an extension of the fixed network infrastructure,
mobile ad hoc users will demand similar services. These demands will continue to increase as
multimedia computing and collaborative networking applications rise.
Dynamic Topologies: Nodes are free to move arbitrarily; thus, the network topology which is
typically multichip may change randomly and rapidly at unpredictable times, and may consist of
both bidirectional and unidirectional links.
Energy-constrained operation: Some or all of the nodes in a MANET may rely on batteries or
other exhaustible means for their energy. For these nodes, the most important system design criteria
for optimization may be energy conservation.
Limited physical security: Mobile wireless networks are generally more prone to physical security
threats than are fixed- cable nets. The increased possibility of eavesdropping, spoofing, and denial-
of-service attacks should be carefully considered.
Hidden problem: Node A and node C are in range for communicating with node B, but not with
each other. In the event that both try to communicate with node B simultaneously, A and C might not
detect any interference on the wireless medium. Thus, the signals collide at node B, which in turn
will be unable to receive the transmissions from either node. The typical solution for this so-called
“Hidden terminal” problem is that the nodes coordinate transmissions themselves by asking and
granting permission to send and receive packets. This scheme is often called RTS/CTS (Request To
Send/Clear To Send).
1.2. Issues in MANET
MANET faces many challenges [2] like issue of scalability, clock synchronization, Energy
conservation, Routing etc. This paper describes about the problem of Routing. It is an important
factor of reliable communication in MANET.
II. ROUTING PROTOCOLS IN MANET
Routing[3,4] is the act of moving information from a source to a destination in an internetwork.
During this process, at least one intermediate node within the internetwork is encountered. This
concept is not new to computer science since routing was used in the networks in early 1970’s. But
this concept has achieved popularity from the mid-1980’s. The major reason for this is because the
earlier networks were very simple and homogeneous environments; but, now high end and large
scale internetworking has become popular with the latest advancements in the networks and
telecommunication technology. The routing concept basically involves, two activities: firstly,
determining optimal routing paths and secondly, transferring the information groups (called packets)
through an internetwork.
2.1. Classification of Routing Protocols in MANET
MANET’s protocols are generally divided into two parts: Unicast and Multicast. Again in each part
they are divided in three parts:
Proactive routing protocols are very useful for a small-scale MANETs with high mobility, while
Reactive routing protocols are very useful for a large-scale MANETs with moderate or less
topology changes. Hybrid routing protocol attempts to strike balance between the two such a
proactive for neighborhood, and reactive for far away.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 193
Figure 1. Classification of MANET’s Protocol
III. UNICAST ROUTING PROTOCOLS
In Unicast routing protocols, one source transmits information to one destination. The Unicast
protocols are also the most common in ad-hoc environment to be developed and they are the basis on
which it is a possibility to construct other type of protocols. Unicast protocols have thought some
lacks when there is a need to send same message or stream of data to multiple destinations. So there
is an evitable need for multicast protocols. While forwarding data packet dispatch node use the
destination address in the data packet to look it up in routing table. If the destination address found in
routing table the data packet will send to the corresponding next hop. But in such condition every
node maintains the routing table in network. So the problem is that how the routing table is created
and maintained in MANET.
3.1. Proactive Unicast Routing Protocols
In Proactive Unicast routing protocol each node in MANET maintains routing information to every
other node in network to compute shortest path from the source to every destination node, which
consumes lots of bandwidth. Such routing information is kept in many different types of tables. Such
tables are time to time updates if network topology changes or a node moves from network.
Proactive routing is unsuitable for highly dynamic networks because routing tables must be updated
with each topology change, this leads to increased control message overheads which can degrade
network performance at high loads.
Proactive Unicast routing protocols are divided as Fishey State Routing Protocol (FSR), Optimized
Link State Routing Protocol (OLSR), and Topology Broadcast Based on Reverse Path Forwarding
Routing Protocol (TBRPF).
3.1.1. Fishey State Routing Protocol (FSR): FSR was proposed in [5] for aim at large scale and wit
high mobility MANET. Name of this protocol comes from property of eye‘s fish. Fishey State
Routing Algorithm works on following method.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 194
• Based on distances the network is divided into different scopes. For example if the nodes are
in 3 hops distance, they will come in same scope. Other node will come outer scope.
• The nodes which are in different scope, Routing entries corresponding to these nodes are sent
at different frequencies and routing entries for inner nodes are sent at highest frequency and
other entries are sent at lower frequency. Because of this reason the nearby node will receive
more up to date link state updates compare to the node far away node.
3.1.2. Optimized Link State Routing Protocol (OLSR): OSLR proposed in [6] for aim at large and
dense Mobile Ad-Hoc Network. OLSR works on Multipoint Relaying flooding techniques to
reduced topology broadcast packets. OLSR works according to the following points.
• Every mobile node broadcast “hello” message periodically to its neighbor. With this hello
message every mobile node can obtain topological information for every node in MANET.
• Now based on topological Information, A node will select a subset of its neighbor to act as
multipoint relaying nodes.
• Every node contains its global topological information and update, shortest path from source
node to every other node can computed with Dijkstra‘s Algorithm.
3.1.3. Topology Broadcast Based on Reverse Path Forwarding Routing Protocol (TBRPF):
TBRPF was proposed in [7] for several hundred of mobile nodes or high mobility in MANET. In
TBRPF each mobile node in network keeps incomplete global topological information. To reduce
routing overhead TBRPF adopts following optimization steps:
• “hello” messages are exchanged among neighboring nodes periodic and differential. Only the
changes of neighbor status are included in “hello” message.
• A part of spanning tree is broadcast to its neighbors if mobile node ‘A’ finds itself is on the
path from its neighbor ‘B’ to a destination ‘C’ in the ‘A’ rooted spanning tree, it will put node
‘C’ and its adjacent links in the reportable topology sent to neighbors.
• Whenever required like network topology updated, mobile node mobility etc, it will update
with “hello” message.
Table-1 gives the characteristics comparison of Proactive Unicast Routing Protocols.
Table 1. Characteristics of Proactive Unicast Routing Protocols
Characteristics FSR OLSR TBRPF
Scope
Large scale
MANETs with high
mobility
Large and dense
MANETs
MANETs with
hundreds of nodes
and high mobility
Organization of the
network
Hierarchical Flat Flat
Neighbor Detection
method
Periodical link state
updates
Periodical HELLO
messages
Differential HELLO
Messages
Optimized Broadcast
Combined with
neighbor Detection
Multipoint relaying
Combined with
HELLO messages
Broadcast
Information
Link state update MPR selector
(Partial) Spanning
tree
Route freshness
Maybe not up-to-
date
Up-to-date Up-to-date
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 195
3.2. Reactive Unicast Routing Protocols
Reactive protocols are also known as on-demand routing protocol. Such protocol were reduced the
overheads of proactive protocol by maintaining route information for active routes. Its mean the
routing information is required and maintained only when one node wants to send data packet to
destination. The concept of Reactive protocol was proposed to keep the waste of bandwidth as little
as possible.
Reactive Unicast routing protocols are divided as Ad Hoc On-demand Distance Vector Routing
Protocol (AODV), Optimized Link State Routing Protocol (DSR), and Temporally Ordered Routing
Algorithm (TORA).
3.2.1. Ad Hoc On-demand Distance Vector Routing Protocol (AODV): AODV [8] is a reactive
Unicast routing protocol for mobile ad hoc networks. As a reactive routing protocol, AODV only
needs to maintain the routing information about the active paths. In AODV, routing information is
maintained in routing tables at nodes. Every mobile node keeps a next-hop routing table, which
contains the destinations to which it currently has a route. A routing table entry expires if it has not
been used or reactivated for a pre-specified expiration time. Moreover, AODV adopts the destination
sequence number technique used by DSDV in an on-demand way.
3.2.2. Dynamic Source Routing (DSR): DSR [9] is an On Demand Unicast routing protocol that
utilizes source routing algorithm. In source routing algorithm, each data packet contains complete
routing information to reach its dissemination. Additionally, in DSR each node uses caching
technology to maintain route information that it has discovered. For example, the intermediate nodes
cache the route towards the destination and backward to the source. Furthermore, because the data
packet contains the source route in the header, the overhearing nodes are able to cache the route in its
routing cache.
3.2.3. Temporally Ordered Routing Algorithm (TORA): TORA [10, 11] is a On Demand routing
algorithm based on the concept of link reversal. This Routing protocol improves the partial link
reversal method by detecting partitions and stopping non-productive link reversals. TORA can be
used for highly dynamic mobile ad hoc networks. TORA has three basic steps: route creation, route
maintenance and route erasure. In TORA the DAG provides the capability that many nodes can send
packets to a given destination and guarantees that all routes are loop-free. Because of node mobility
the DAG in TORA may be disconnected. So, route maintenance step is a very important part of
TORA. This routing protocol has the unique feature that control messages are localized into a small
set of nodes near the topology changes occurred.
Table-2 gives the characteristics comparison of Reactive Unicast Routing Protocols.
Table 2. Characteristics of Reactive Unicast Routing Protocols
Characteristics AODV DSR TORA
Updating of Destination at Multiple Route Source Source Neighbors
Multicast Capability YES NO NO
Control Hello Message Requirement NO NO YES
Design Structure Flat Flat Flat
Unidirectional Link NO YES YES
Multiple Route NO YES YES
Loop free YES YES YES
Route maintained in Route table Route cache Route table
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 196
Advantage
Adaptive to
highly,
dynamic
topologies,
Low
overhead
Multiple
routes, Loop
free,
promiscuous
overhead
Multiple
routes
Disadvantage
Scalability
problems,
Large
delays, hello
message
Scalability
problems,
Large
delays, hello
message
Temporary
routing loops,
overall
complexity
3.3. Hybrid Unicast Routing Protocols
Hybrid Unicast routing protocols are the protocol which combines the nature of both proactive
routing protocol and reactive routing protocol. Hybrid protocols are known as new generation
protocols. Hybrid protocol reduced route discovery overheads by allowing nodes with closeness to
work together to from some short of a backbone. Hybrid protocols are proposed based on zone
(region). It means a network is divided into number of zone by each mobile node. ZRP is hybrid
Unicast routing protocol.
Hybrid Unicast routing protocols are divided as Zone Routing Protocol (ZRP) and Zone-Based
Hierarchical Link State (ZHLS).
3.3.1. Zone Routing Protocol (ZRP): ZRP [12] is a hybrid routing protocol for mobile ad hoc
networks. The hybrid protocols are proposed to reduce the control overhead of proactive routing
approaches and decrease the latency caused by route search operations in reactive routing
approaches.
3.3.2. Zone-Based Hierarchical Link State (ZHLS): In ZHLS [13] routing protocols are divided
into hierarchical structures. The complete network is divided into non-overlapping zones. Such non-
overlapping zones has unique zone ID and each node in such zone has unique node ID which is
calculated by GPS. The hierarchical structure of network (topology) is form in two levels on the
basis of node level topology and zone level topology. In ZHLS no cluster head is required for data
transmission. This reduces extra processing overhead while data transmission. When a node want to
send data packet to the node which is located in other zone, in such conditions source node broadcast
a zone level location request to all other zones, which required significantly low overhead if
compared to flooding approach in reactive protocols. ZHLS is Hierarchical in routing structure and
can have multiple routes if more than one virtual link exists in between mobile nodes. Routing
maintenance is required for both interzone and intrazone.
Table-3 gives the characteristics comparison of Hybrid Unicast Routing Protocols.
Table 3. Characteristics of Hybrid Unicast Routing Protocols
Characteristics ZRP ZHLS
Loop free Yes Yes
Routing philosophy Flat Hierarchical
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 197
IV. MULTICAST ROUTING PROTOCOLS
Multicast routing protocols try to construct a desirable routing tree or a mesh from one source to
several destinations. These protocols have also to keep up with information of joins and leave ups to
a multicast group which efficiently support to the group communication with the high throughput.
The use of multicasting within MANETs has many benefits. It can decrease the cost of wireless
communication and increase the efficiency and throughput of the wireless link between two nodes
whenever we are sending multiple copies of the same messages by accomplishment the inherent
broadcasting properties of wireless transmission. In place of sending same data through multiple
Unicasts, multicasting decrease channel capacity consumption, sender nodes and routers processing,
energy utilization , and data delivery delay, which are deliberate important for MANETs.
4.1. Proactive Multicast Routing Protocols
Proactive multicast routing protocols are divided as Ad-hoc Multicast Routing (AMRoute), Ad hoc
Multicast Routing Protocol Increasing id-numbers (AMRIS), and Core-Assisted Mesh protocol
(CAMP).
4.1.1. Ad-hoc Multicast Routing (AMRoute) [14] is a tree based multicast routing protocol for
mobile ad hoc networks. AMRoute creates a multicast shared-tree over mesh. AMRoute relies on the
existence of an underlying Unicast routing protocol. AMRoute has two key phases: mesh creation
and tree creation. This protocol can be used for networks in which only a set of nodes supports
AMRoute routing function.
4.1.2. Ad hoc Multicast Routing Protocol Increasing id-numbers (AMRIS) [15] is a proactive
shared tree based multicast routing protocol, which is independent of the fundamental Unicast
routing protocol. In AMRIS, the tree maintenance procedure operates continuously and locally to
ensure a node’s connection to the multicast session delivery tree. In AMRIS, the tree maintenance
procedure operates continuously and locally to ensure a node’s connection to the multicast session
delivery tree. AMRIS is an on demand protocol that constructs a shared delivery tree to support
multiple senders and receivers within a multicast session.
4.1.3. Core-Assisted Mesh protocol (CAMP) [16, 17] is a proactive multicast routing protocol
based on shared meshes. The mesh structure provides at least one path from each source to each
receiver in the multicast group. CAMP relies on an underlying Unicast protocol which can provide
correct distances to all destinations within finite time. Every node maintains a Routing Table (RT)
that is created by the underlying Unicast routing protocol. CAMP modifies this table when a
multicast group joins or leaves the network. A Multicast Routing Table (MRT) is based on the
Routing Table that contains the set of known groups.
Table-4 gives the characteristics comparison of Proactive Multicast Routing Protocols.
Table 4. Characteristics of Proactive Multicast Routing Protocols
Characteristics AMRoute AMRIS CAMP
Structure of Multicast delivery Tree Tree Mesh
Loop free No Yes Yes
Dependency on Unicast routing protocol Yes No Yes
Scalability Yes No Yes
Control Packet flooding Fair Fair Good
Dependency on Unicast Flat Flat Flat
Periodic message requirement Yes Yes Yes
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 198
4.2. Reactive Multicast Routing Protocols
Reactive multicast routing protocols are divided as On-Demand Multicast Routing Protocol
(ODMRP) and Multicast Ad-hoc On-demand Distance Vector (MAODV).
4.2.1. On-Demand Multicast Routing Protocol (ODMRP) [18] is a reactive mesh based multicast
routing protocol. ODMRP is not only a multicast routing protocol, but also provides Unicast routing
capability.
4.2.2. Multicast Ad-hoc On-demand Distance Vector (MAODV) [19] is a reactive tree-based
multicast routing protocol. MAODV is an extension of the Unicast routing protocol Ad-hoc On-
demand Distance Vector (AODV).
Table-5 gives the characteristics comparison of Reactive Unicast Routing Protocols.
Table 5. Characteristics of Reactive Multicast Routing Protocols
Characteristics ODMRP MAODV
Multicast delivery structure Mesh Core based Tree
Loop free YES YES
Periodic messages requirement YES NO
Routing Hierarchy Flat Flat
Scalability Fair Fair
4.3. Hybrid Multicast Routing Protocols
Hybrid multicast routing protocols are divided as Optimized Polymorphic Hybrid Multicast Routing
Protocol (OPHMR).
4.3.1. Optimized Polymorphic Hybrid Multicast Routing Protocol (OPHMR): This protocol [20]
is invested with different operational modes that are either proactive or reactive based on a MN’s
power remainder, mobility level, and vicinity density level. It attempts to address the issues of power
efficiency, latency, and protocol overhead in an adaptive manner. OPHMR’s reactive behaviour is
based on the On-Demand Multicast Routing Protocol (ODMRP). It’s relatively simplistic. It
generates on-demand route paths for multicast message requests. OPHMR’s proactive behaviour is
based on the Multicast Zone Routing (MZR) protocol. It builds a zone around each Mobile Node (in
hops) and periodically sends updates within each defined zone. For added efficiency, OPHMR
utilizes an optimizing scheme adapted from the Optimized Link State Routing (OLSR) protocol. It
used to decrease the amount of control overhead that is produced. OPHMR is, after a very lengthy
period of time, able to extend battery life and enhance the survivability of the mobile ad hoc nodes.
As a result, it decreases the end-to-end delay and increases the packet delivery ratio.
V. CONCLUSION
A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of mobile nodes
with no permanent infrastructure. In a MANETs, there is no difference between a host node and a
router so that all nodes can be source plus forwarders of traffic. Routing is an essential component of
communication protocols in mobile ad hoc networks. Routing protocols typically fall under two
categories; Unicast routing protocol and Multicast routing protocol. The design of the protocols are
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 199
driven by specific goals and requirements based on respective assumptions about the network
properties or application area. According to the description and comparison of their characteristics,
we can arrive at the conclusions: Hybrid Unicast or multicast routing protocol seems to be a better
candidate than pure proactive and reactive routing protocols. Many of the application use Unicast
protocol whereas in group communication Multicast routing gives comparatively better performance.
However, its performance needs to be fully exploited and the OPHMR is a batter than another
Routing Protocol because OPHMR is a hybrid multicast routing protocol. For added efficiency
OPHMR utilizes an optimizing scheme through a Multipoint Relay (MPR). It used to decrease the
amount of control overhead that is produced. So we can say that OPHMR is a better than another
routing protocol. This paper gives the comparison of various Unicast-Multicast routing protocols for
Mobile Ad-Hoc Networks.
REFERENCES
[1] Murthy, S. and J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM Mobile
Networks and App. J., Special Issue on Routing in Mobile Communication Networks, Oct. 1996, pp. 183-97.
[2] C. M. Cordeiro, D.P.Agrawal “Ad-hoc & Sensor Networks Theory and Applications”.
[3] Cisco. Cisco Internetworking. Cisco Press, 2002.
[4] R F Sari, A Syarif, K Ramli, B Budiardjo “Performance Evaluation of AODV Routing Protocol on Ad-hoc Hybrid
Network Testbed Using PDAS”, IEEE 2005.
[5] Mario Gerla, Ziaoyan Hong, and Guangyu Pei, ―Fisheye State Routing Protocol (FSR) for Ad Hoc Networksǁ,
draft-ietf—manet-fsr-03.txt, June 2002.
[6] Amir Qayyum, Laurent Viennot, and Anis Laouiti, ― Optmized Link State Routing Protocolǁ, draft-ieft-manet-olsr-
06.txt, September 2002.
[7] Richard G. Ogier, Fred L. Templin, Bhargav Bellur, and Mark G. Lewis, ―Topology Broadcast Based on Reverse-
Path Forwading (TBRPF)ǁ, draft-ietf-manet-tbrpf-05.txt, March 2002.
[8] C.E. Perkins and E.M. Royer, “Ad hoc on demand Distance Vector routing”, mobile computing systems and
applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, 1999, p90 -p100.
[9] D. Johnson, D. A. Maltz, “Dynamic source routing in ad hoc wireless networks”, in Mobile Computing (T. Imielinski
and H. Korth, eds.), Kluwer Acad. Publ., 1996.
[10] V. Park, and S. Corson, “Temporally-Ordered Routing Algorithm (TORA)”, Version 1 Functional Specification.
IETF Internet draft, 1997.
[11] V. D. Park and M. S. Corson. “A highly adaptive distributed routing algorithm for mobile wireless networks”,
INFOCOM ’97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving
the Information Revolution, Proceedings IEEE, Volume: 3, 1997 Page(s): 1405 -1413 vol.3.
[12] Z. J. Haas and M.R Pearlman, “The Zone Routing Protocol (ZRP) for ad hoc networks”, IETF Internet draft ,
August 1998.
[13] M. Joa-Ng, I.-TLu, A peer-to-peer zone based tow-level link state routing for mobile ad hoc networks, IEEE Journal
on Selected Areas in Communications 17(8) (1999) 1415-1425.
[14] M. Liu, R. Talpade, A. McAuley, and E. Bommaiah, “AMRoute: Adhoc multicast routing protocol”, Technical
Report, CSHCN T. R. 99-1, University of Maryland.
[15] C.W. Wu, Y.C. Tay, “AMRIS: a multicast protocol for ad hoc wireless networks”, Proceedings IEEE MILCOM’99,
Atlantic City, Nov. 1999.
[16] J.J. Garcia-Luna-Aceves, E.L. Madruga, “A Multicast Routing Protocol for Ad-Hoc Networks”, Proceedings of
IEEE INFOCOM’99, New York, pages 784-792, March 1999.
[17] J.J. Garcia-Luna-Aceves and E.L. Madruga, “The Core-Assisted Mesh Protocol”, The IEEE Journal on Selected
Area in Communication, vol.17, no.8, Aug. 1999, pp1380-1394.
[18] S.J. Lee, M. Gerla, C.C. Chiang, “On Demand Multicast Routing Protocol”, Proceedings of IEEE WCNC’99, New
Orleans, pages 1298-1302, Sept 1999.
[19] E. M. Royer and C. E. Perkins, “Multicast Operation of the Ad hoc On-Demand Distance Vector Routing Protocol”,
Proceedings of IEEE MOBICOM’99, Seattle, WA, August 1999, pp. 207-218.
[20]A.B.Mnaouer, L. Chen, C. H. Foh, and J.W.Tantra, “OPHMR: An Optimized Polymorphic Hybrid Multicast
Routing for MANETs”, IEEE transaction on mobile computing. Vol 5, No. 6, May 2007.
[21] Kamal Kant, Lalit K. Awasthi, “Unicast And Multicast Routing Protocols For Manets: A Comparative Survey”.
[22] Sunil Pathak, Dr. Sonal Jain,. “A Survey: On Unicast Routing Protocols for Mobile Ad Hoc Network”, International
Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, pp 204-210, Volume 3, Issue 1,
January 2013.
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks
Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks

More Related Content

What's hot

IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
Rumesh Hapuarachchi
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
Kathirvel Ayyaswamy
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
techbed
 
Ipmulticasting
IpmulticastingIpmulticasting
Ipmulticasting
Sachith Walpita
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
Prafull Johri
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses myrajendra
 
IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
Pedro De Almeida
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocolsAbhishek Kesharwani
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
guesta81d4b
 
Switching
SwitchingSwitching
Switching
Shankar Gangaju
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
Dr Praveen Jain
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
F41023946
F41023946F41023946
F41023946
IJERA Editor
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
Rajesh Piryani
 

What's hot (20)

IP Multicasting
IP MulticastingIP Multicasting
IP Multicasting
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
Multicast
MulticastMulticast
Multicast
 
Ipmulticasting
IpmulticastingIpmulticasting
Ipmulticasting
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses Packet transfer mechanism using routers and IP addresses
Packet transfer mechanism using routers and IP addresses
 
IP Multicast Routing
IP Multicast RoutingIP Multicast Routing
IP Multicast Routing
 
Multicasting and multicast routing protocols
Multicasting and multicast routing protocolsMulticasting and multicast routing protocols
Multicasting and multicast routing protocols
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Switching
SwitchingSwitching
Switching
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Dynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attackDynamic Source Routing Sink hole attack
Dynamic Source Routing Sink hole attack
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
F41023946
F41023946F41023946
F41023946
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 

Viewers also liked

Multicast vs unicast diagram
Multicast vs unicast diagramMulticast vs unicast diagram
Multicast vs unicast diagram
internetstreams
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layerNitesh Singh
 
Catalogue-FULU MOTOR
Catalogue-FULU MOTORCatalogue-FULU MOTOR
Catalogue-FULU MOTOR圆圆 孟
 
Rising Asia - Inaugural Issue, April 2015
Rising Asia - Inaugural Issue, April 2015Rising Asia - Inaugural Issue, April 2015
Rising Asia - Inaugural Issue, April 2015Rumman Ahamed
 
三百多个桥梁工程专有名词术语解释
三百多个桥梁工程专有名词术语解释三百多个桥梁工程专有名词术语解释
三百多个桥梁工程专有名词术语解释undral13
 
Mini-Training: Let's have a rest
Mini-Training: Let's have a restMini-Training: Let's have a rest
Mini-Training: Let's have a rest
Betclic Everest Group Tech Team
 
Hybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-PaperHybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-PaperNguyen Nguyen
 
WWDC 2013
WWDC 2013WWDC 2013
WWDC 2013
mizoooi
 
V kap. 9 distribusjon
V kap. 9 distribusjonV kap. 9 distribusjon
V kap. 9 distribusjon
Trine Skarvang
 
Numeración romana
Numeración romanaNumeración romana
Numeración romana
Samuel Rodríguez
 
Nevi cpd missie visie en strategie v1.0
Nevi cpd missie visie en strategie v1.0Nevi cpd missie visie en strategie v1.0
Nevi cpd missie visie en strategie v1.0
John van Veen
 
Monomictic lakes francisco muñoz maestre
Monomictic lakes francisco muñoz maestreMonomictic lakes francisco muñoz maestre
Monomictic lakes francisco muñoz maestreFrancisco Maestre
 
Ppt 3 Minutes Of Fame
Ppt 3 Minutes Of FamePpt 3 Minutes Of Fame
Ppt 3 Minutes Of Fame
guest437642
 
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue1402 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
Akhil Bharat Mahasabha
 
365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721
Rui (Nash) Yang
 
Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)
PassLoveCharity
 
Universal Image Loader: Story, Architecture, FAQ
Universal Image Loader: Story, Architecture, FAQUniversal Image Loader: Story, Architecture, FAQ
Universal Image Loader: Story, Architecture, FAQ
Sergey Tarasevich
 
OICX Retail Customer Experience
OICX Retail Customer ExperienceOICX Retail Customer Experience
OICX Retail Customer ExperienceDamian Kernahan
 

Viewers also liked (20)

Multicast vs unicast diagram
Multicast vs unicast diagramMulticast vs unicast diagram
Multicast vs unicast diagram
 
Routing protocols-network-layer
Routing protocols-network-layerRouting protocols-network-layer
Routing protocols-network-layer
 
Catalogue-FULU MOTOR
Catalogue-FULU MOTORCatalogue-FULU MOTOR
Catalogue-FULU MOTOR
 
Rising Asia - Inaugural Issue, April 2015
Rising Asia - Inaugural Issue, April 2015Rising Asia - Inaugural Issue, April 2015
Rising Asia - Inaugural Issue, April 2015
 
三百多个桥梁工程专有名词术语解释
三百多个桥梁工程专有名词术语解释三百多个桥梁工程专有名词术语解释
三百多个桥梁工程专有名词术语解释
 
Mini-Training: Let's have a rest
Mini-Training: Let's have a restMini-Training: Let's have a rest
Mini-Training: Let's have a rest
 
Hybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-PaperHybrid-Active-Optical-Cable-White-Paper
Hybrid-Active-Optical-Cable-White-Paper
 
WWDC 2013
WWDC 2013WWDC 2013
WWDC 2013
 
2
22
2
 
V kap. 9 distribusjon
V kap. 9 distribusjonV kap. 9 distribusjon
V kap. 9 distribusjon
 
Numeración romana
Numeración romanaNumeración romana
Numeración romana
 
Nevi cpd missie visie en strategie v1.0
Nevi cpd missie visie en strategie v1.0Nevi cpd missie visie en strategie v1.0
Nevi cpd missie visie en strategie v1.0
 
Monomictic lakes francisco muñoz maestre
Monomictic lakes francisco muñoz maestreMonomictic lakes francisco muñoz maestre
Monomictic lakes francisco muñoz maestre
 
Ppt 3 Minutes Of Fame
Ppt 3 Minutes Of FamePpt 3 Minutes Of Fame
Ppt 3 Minutes Of Fame
 
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue1402 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
02 july-2014 to-08-july-2014-hindu_sabhavarta_year38_issue14
 
ijhff
ijhffijhff
ijhff
 
365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721365 产品介绍 产品推广app_20150721
365 产品介绍 产品推广app_20150721
 
Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)Pass Love Charity Foundation (PLCF)
Pass Love Charity Foundation (PLCF)
 
Universal Image Loader: Story, Architecture, FAQ
Universal Image Loader: Story, Architecture, FAQUniversal Image Loader: Story, Architecture, FAQ
Universal Image Loader: Story, Architecture, FAQ
 
OICX Retail Customer Experience
OICX Retail Customer ExperienceOICX Retail Customer Experience
OICX Retail Customer Experience
 

Similar to Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks

IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET Journal
 
A0110104
A0110104A0110104
A0110104
IJRES Journal
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
Angela Shin
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
IRJET Journal
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
Laurie Smith
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
Roopali Singh
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
IJRAT
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
graphhoc
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and Odmrp
IJMER
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
IJERA Editor
 
Mane ts
Mane tsMane ts
Mane ts
Nunna Swathi
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
INFOGAIN PUBLICATION
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
ijasuc
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
jake henry
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
IJARIIT
 

Similar to Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks (20)

eaodv
eaodveaodv
eaodv
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
A0110104
A0110104A0110104
A0110104
 
Mobile adhoc
Mobile adhocMobile adhoc
Mobile adhoc
 
A Background Study Of MANET
A Background Study Of MANETA Background Study Of MANET
A Background Study Of MANET
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
A Literature Survey of MANET.pdf
A Literature Survey of MANET.pdfA Literature Survey of MANET.pdf
A Literature Survey of MANET.pdf
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Efficient and stable route selection by using cross layer concept for highly...
 Efficient and stable route selection by using cross layer concept for highly... Efficient and stable route selection by using cross layer concept for highly...
Efficient and stable route selection by using cross layer concept for highly...
 
CHAPTER-1234
CHAPTER-1234CHAPTER-1234
CHAPTER-1234
 
Paper id 28201444
Paper id 28201444Paper id 28201444
Paper id 28201444
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Analysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and OdmrpAnalysis of Multicast Routing Protocols: Puma and Odmrp
Analysis of Multicast Routing Protocols: Puma and Odmrp
 
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
Performance Evaluation of DSDV and MDSDV Routing Protocol with Varying Node D...
 
Mane ts
Mane tsMane ts
Mane ts
 
3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...3 a survey analysis on manet routing protocols and mobility models for variou...
3 a survey analysis on manet routing protocols and mobility models for variou...
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc NetworksComparative Review for Routing Protocols in Mobile Ad-Hoc Networks
Comparative Review for Routing Protocols in Mobile Ad-Hoc Networks
 
Manet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metricsManet review characteristics, routing protocols, attacks and performance metrics
Manet review characteristics, routing protocols, attacks and performance metrics
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 

Recently uploaded (20)

Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 

Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 191 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Comparison of Various Unicast-Multicast Routing Protocols for Mobile Ad-Hoc Networks Chirag R. Patel1 , Rajesh H. Davda2 1,2 Computer Engineering Department, C. U. Shah College of Engineering & Technology, Wadhwan (Gujarat) Abstract: A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host node and a router so that all nodes can be source plus forwarders of traffic. The task of finding routes in Mobile Ad-hoc Network (MANET) is an important factor in determining the efficiency of any MANET routing protocols. This paper describes about the basic idea of different routing protocols and its efficient use in MANET. There are several routing protocols based on UNICAST and MULTICAST. This paper will conclude the main characteristics of these protocols with comparison and suggest the best suited protocol for particular topology or network. Keywords: MANET, Unicast Routing Protocol, Multicast Routing Protocol. I. INTRODUCTION The rapid growth in the mobile communication is mainly due to the mobility offered to end users, providing information access to anywhere, easy deployment, and user friendliness. These types of networks have independent centralized administration; user can enter the networks and leave the networks easily. One of the important research areas in MANET is establishing and maintaining the ad hoc network through the use of routing protocols. Wireless communication technology have been developed with two primary models one is fix infrastructure based model in which much of the nodes are mobile and connected through fixed backbone nodes using wireless medium. Another model is Mobile Ad-hoc network. Mobile Ad-Hoc Networks (MANETs) are comprised of mobile nodes (MNs) that are self-organizing and there are no specific routers, servers, access points for MANET. Design issue for developing a routing protocol for wireless environment with mobility is very different and more complex than those for wired network with static nodes [1]. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Depending upon the nature of application, appropriate routing protocol is implemented. UNICAST and MULTICAST protocols are the two classes of MANET routing protocols and each constitute a set of protocols. 1.1. Characteristics of MANET MANETS have some characteristics: Bandwidth-constrained: Variable capacity links: Wireless links will continue to have significantly lower capacity than their hardwired counterparts. In addition, the realized throughput of wireless communications after accounting for the effects of multiple access, fading, noise, and interference conditions, etc. is often much less than a radio's maximum transmission rate. One effect of the relatively low to moderate link capacities is that congestion is typically the norm rather than the exception, i.e. aggregate application demand will likely approach or exceed network capacity
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 192 frequently. As the mobile network is often simply an extension of the fixed network infrastructure, mobile ad hoc users will demand similar services. These demands will continue to increase as multimedia computing and collaborative networking applications rise. Dynamic Topologies: Nodes are free to move arbitrarily; thus, the network topology which is typically multichip may change randomly and rapidly at unpredictable times, and may consist of both bidirectional and unidirectional links. Energy-constrained operation: Some or all of the nodes in a MANET may rely on batteries or other exhaustible means for their energy. For these nodes, the most important system design criteria for optimization may be energy conservation. Limited physical security: Mobile wireless networks are generally more prone to physical security threats than are fixed- cable nets. The increased possibility of eavesdropping, spoofing, and denial- of-service attacks should be carefully considered. Hidden problem: Node A and node C are in range for communicating with node B, but not with each other. In the event that both try to communicate with node B simultaneously, A and C might not detect any interference on the wireless medium. Thus, the signals collide at node B, which in turn will be unable to receive the transmissions from either node. The typical solution for this so-called “Hidden terminal” problem is that the nodes coordinate transmissions themselves by asking and granting permission to send and receive packets. This scheme is often called RTS/CTS (Request To Send/Clear To Send). 1.2. Issues in MANET MANET faces many challenges [2] like issue of scalability, clock synchronization, Energy conservation, Routing etc. This paper describes about the problem of Routing. It is an important factor of reliable communication in MANET. II. ROUTING PROTOCOLS IN MANET Routing[3,4] is the act of moving information from a source to a destination in an internetwork. During this process, at least one intermediate node within the internetwork is encountered. This concept is not new to computer science since routing was used in the networks in early 1970’s. But this concept has achieved popularity from the mid-1980’s. The major reason for this is because the earlier networks were very simple and homogeneous environments; but, now high end and large scale internetworking has become popular with the latest advancements in the networks and telecommunication technology. The routing concept basically involves, two activities: firstly, determining optimal routing paths and secondly, transferring the information groups (called packets) through an internetwork. 2.1. Classification of Routing Protocols in MANET MANET’s protocols are generally divided into two parts: Unicast and Multicast. Again in each part they are divided in three parts: Proactive routing protocols are very useful for a small-scale MANETs with high mobility, while Reactive routing protocols are very useful for a large-scale MANETs with moderate or less topology changes. Hybrid routing protocol attempts to strike balance between the two such a proactive for neighborhood, and reactive for far away.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 193 Figure 1. Classification of MANET’s Protocol III. UNICAST ROUTING PROTOCOLS In Unicast routing protocols, one source transmits information to one destination. The Unicast protocols are also the most common in ad-hoc environment to be developed and they are the basis on which it is a possibility to construct other type of protocols. Unicast protocols have thought some lacks when there is a need to send same message or stream of data to multiple destinations. So there is an evitable need for multicast protocols. While forwarding data packet dispatch node use the destination address in the data packet to look it up in routing table. If the destination address found in routing table the data packet will send to the corresponding next hop. But in such condition every node maintains the routing table in network. So the problem is that how the routing table is created and maintained in MANET. 3.1. Proactive Unicast Routing Protocols In Proactive Unicast routing protocol each node in MANET maintains routing information to every other node in network to compute shortest path from the source to every destination node, which consumes lots of bandwidth. Such routing information is kept in many different types of tables. Such tables are time to time updates if network topology changes or a node moves from network. Proactive routing is unsuitable for highly dynamic networks because routing tables must be updated with each topology change, this leads to increased control message overheads which can degrade network performance at high loads. Proactive Unicast routing protocols are divided as Fishey State Routing Protocol (FSR), Optimized Link State Routing Protocol (OLSR), and Topology Broadcast Based on Reverse Path Forwarding Routing Protocol (TBRPF). 3.1.1. Fishey State Routing Protocol (FSR): FSR was proposed in [5] for aim at large scale and wit high mobility MANET. Name of this protocol comes from property of eye‘s fish. Fishey State Routing Algorithm works on following method.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 194 • Based on distances the network is divided into different scopes. For example if the nodes are in 3 hops distance, they will come in same scope. Other node will come outer scope. • The nodes which are in different scope, Routing entries corresponding to these nodes are sent at different frequencies and routing entries for inner nodes are sent at highest frequency and other entries are sent at lower frequency. Because of this reason the nearby node will receive more up to date link state updates compare to the node far away node. 3.1.2. Optimized Link State Routing Protocol (OLSR): OSLR proposed in [6] for aim at large and dense Mobile Ad-Hoc Network. OLSR works on Multipoint Relaying flooding techniques to reduced topology broadcast packets. OLSR works according to the following points. • Every mobile node broadcast “hello” message periodically to its neighbor. With this hello message every mobile node can obtain topological information for every node in MANET. • Now based on topological Information, A node will select a subset of its neighbor to act as multipoint relaying nodes. • Every node contains its global topological information and update, shortest path from source node to every other node can computed with Dijkstra‘s Algorithm. 3.1.3. Topology Broadcast Based on Reverse Path Forwarding Routing Protocol (TBRPF): TBRPF was proposed in [7] for several hundred of mobile nodes or high mobility in MANET. In TBRPF each mobile node in network keeps incomplete global topological information. To reduce routing overhead TBRPF adopts following optimization steps: • “hello” messages are exchanged among neighboring nodes periodic and differential. Only the changes of neighbor status are included in “hello” message. • A part of spanning tree is broadcast to its neighbors if mobile node ‘A’ finds itself is on the path from its neighbor ‘B’ to a destination ‘C’ in the ‘A’ rooted spanning tree, it will put node ‘C’ and its adjacent links in the reportable topology sent to neighbors. • Whenever required like network topology updated, mobile node mobility etc, it will update with “hello” message. Table-1 gives the characteristics comparison of Proactive Unicast Routing Protocols. Table 1. Characteristics of Proactive Unicast Routing Protocols Characteristics FSR OLSR TBRPF Scope Large scale MANETs with high mobility Large and dense MANETs MANETs with hundreds of nodes and high mobility Organization of the network Hierarchical Flat Flat Neighbor Detection method Periodical link state updates Periodical HELLO messages Differential HELLO Messages Optimized Broadcast Combined with neighbor Detection Multipoint relaying Combined with HELLO messages Broadcast Information Link state update MPR selector (Partial) Spanning tree Route freshness Maybe not up-to- date Up-to-date Up-to-date
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 195 3.2. Reactive Unicast Routing Protocols Reactive protocols are also known as on-demand routing protocol. Such protocol were reduced the overheads of proactive protocol by maintaining route information for active routes. Its mean the routing information is required and maintained only when one node wants to send data packet to destination. The concept of Reactive protocol was proposed to keep the waste of bandwidth as little as possible. Reactive Unicast routing protocols are divided as Ad Hoc On-demand Distance Vector Routing Protocol (AODV), Optimized Link State Routing Protocol (DSR), and Temporally Ordered Routing Algorithm (TORA). 3.2.1. Ad Hoc On-demand Distance Vector Routing Protocol (AODV): AODV [8] is a reactive Unicast routing protocol for mobile ad hoc networks. As a reactive routing protocol, AODV only needs to maintain the routing information about the active paths. In AODV, routing information is maintained in routing tables at nodes. Every mobile node keeps a next-hop routing table, which contains the destinations to which it currently has a route. A routing table entry expires if it has not been used or reactivated for a pre-specified expiration time. Moreover, AODV adopts the destination sequence number technique used by DSDV in an on-demand way. 3.2.2. Dynamic Source Routing (DSR): DSR [9] is an On Demand Unicast routing protocol that utilizes source routing algorithm. In source routing algorithm, each data packet contains complete routing information to reach its dissemination. Additionally, in DSR each node uses caching technology to maintain route information that it has discovered. For example, the intermediate nodes cache the route towards the destination and backward to the source. Furthermore, because the data packet contains the source route in the header, the overhearing nodes are able to cache the route in its routing cache. 3.2.3. Temporally Ordered Routing Algorithm (TORA): TORA [10, 11] is a On Demand routing algorithm based on the concept of link reversal. This Routing protocol improves the partial link reversal method by detecting partitions and stopping non-productive link reversals. TORA can be used for highly dynamic mobile ad hoc networks. TORA has three basic steps: route creation, route maintenance and route erasure. In TORA the DAG provides the capability that many nodes can send packets to a given destination and guarantees that all routes are loop-free. Because of node mobility the DAG in TORA may be disconnected. So, route maintenance step is a very important part of TORA. This routing protocol has the unique feature that control messages are localized into a small set of nodes near the topology changes occurred. Table-2 gives the characteristics comparison of Reactive Unicast Routing Protocols. Table 2. Characteristics of Reactive Unicast Routing Protocols Characteristics AODV DSR TORA Updating of Destination at Multiple Route Source Source Neighbors Multicast Capability YES NO NO Control Hello Message Requirement NO NO YES Design Structure Flat Flat Flat Unidirectional Link NO YES YES Multiple Route NO YES YES Loop free YES YES YES Route maintained in Route table Route cache Route table
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 196 Advantage Adaptive to highly, dynamic topologies, Low overhead Multiple routes, Loop free, promiscuous overhead Multiple routes Disadvantage Scalability problems, Large delays, hello message Scalability problems, Large delays, hello message Temporary routing loops, overall complexity 3.3. Hybrid Unicast Routing Protocols Hybrid Unicast routing protocols are the protocol which combines the nature of both proactive routing protocol and reactive routing protocol. Hybrid protocols are known as new generation protocols. Hybrid protocol reduced route discovery overheads by allowing nodes with closeness to work together to from some short of a backbone. Hybrid protocols are proposed based on zone (region). It means a network is divided into number of zone by each mobile node. ZRP is hybrid Unicast routing protocol. Hybrid Unicast routing protocols are divided as Zone Routing Protocol (ZRP) and Zone-Based Hierarchical Link State (ZHLS). 3.3.1. Zone Routing Protocol (ZRP): ZRP [12] is a hybrid routing protocol for mobile ad hoc networks. The hybrid protocols are proposed to reduce the control overhead of proactive routing approaches and decrease the latency caused by route search operations in reactive routing approaches. 3.3.2. Zone-Based Hierarchical Link State (ZHLS): In ZHLS [13] routing protocols are divided into hierarchical structures. The complete network is divided into non-overlapping zones. Such non- overlapping zones has unique zone ID and each node in such zone has unique node ID which is calculated by GPS. The hierarchical structure of network (topology) is form in two levels on the basis of node level topology and zone level topology. In ZHLS no cluster head is required for data transmission. This reduces extra processing overhead while data transmission. When a node want to send data packet to the node which is located in other zone, in such conditions source node broadcast a zone level location request to all other zones, which required significantly low overhead if compared to flooding approach in reactive protocols. ZHLS is Hierarchical in routing structure and can have multiple routes if more than one virtual link exists in between mobile nodes. Routing maintenance is required for both interzone and intrazone. Table-3 gives the characteristics comparison of Hybrid Unicast Routing Protocols. Table 3. Characteristics of Hybrid Unicast Routing Protocols Characteristics ZRP ZHLS Loop free Yes Yes Routing philosophy Flat Hierarchical
  • 7. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 197 IV. MULTICAST ROUTING PROTOCOLS Multicast routing protocols try to construct a desirable routing tree or a mesh from one source to several destinations. These protocols have also to keep up with information of joins and leave ups to a multicast group which efficiently support to the group communication with the high throughput. The use of multicasting within MANETs has many benefits. It can decrease the cost of wireless communication and increase the efficiency and throughput of the wireless link between two nodes whenever we are sending multiple copies of the same messages by accomplishment the inherent broadcasting properties of wireless transmission. In place of sending same data through multiple Unicasts, multicasting decrease channel capacity consumption, sender nodes and routers processing, energy utilization , and data delivery delay, which are deliberate important for MANETs. 4.1. Proactive Multicast Routing Protocols Proactive multicast routing protocols are divided as Ad-hoc Multicast Routing (AMRoute), Ad hoc Multicast Routing Protocol Increasing id-numbers (AMRIS), and Core-Assisted Mesh protocol (CAMP). 4.1.1. Ad-hoc Multicast Routing (AMRoute) [14] is a tree based multicast routing protocol for mobile ad hoc networks. AMRoute creates a multicast shared-tree over mesh. AMRoute relies on the existence of an underlying Unicast routing protocol. AMRoute has two key phases: mesh creation and tree creation. This protocol can be used for networks in which only a set of nodes supports AMRoute routing function. 4.1.2. Ad hoc Multicast Routing Protocol Increasing id-numbers (AMRIS) [15] is a proactive shared tree based multicast routing protocol, which is independent of the fundamental Unicast routing protocol. In AMRIS, the tree maintenance procedure operates continuously and locally to ensure a node’s connection to the multicast session delivery tree. In AMRIS, the tree maintenance procedure operates continuously and locally to ensure a node’s connection to the multicast session delivery tree. AMRIS is an on demand protocol that constructs a shared delivery tree to support multiple senders and receivers within a multicast session. 4.1.3. Core-Assisted Mesh protocol (CAMP) [16, 17] is a proactive multicast routing protocol based on shared meshes. The mesh structure provides at least one path from each source to each receiver in the multicast group. CAMP relies on an underlying Unicast protocol which can provide correct distances to all destinations within finite time. Every node maintains a Routing Table (RT) that is created by the underlying Unicast routing protocol. CAMP modifies this table when a multicast group joins or leaves the network. A Multicast Routing Table (MRT) is based on the Routing Table that contains the set of known groups. Table-4 gives the characteristics comparison of Proactive Multicast Routing Protocols. Table 4. Characteristics of Proactive Multicast Routing Protocols Characteristics AMRoute AMRIS CAMP Structure of Multicast delivery Tree Tree Mesh Loop free No Yes Yes Dependency on Unicast routing protocol Yes No Yes Scalability Yes No Yes Control Packet flooding Fair Fair Good Dependency on Unicast Flat Flat Flat Periodic message requirement Yes Yes Yes
  • 8. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 198 4.2. Reactive Multicast Routing Protocols Reactive multicast routing protocols are divided as On-Demand Multicast Routing Protocol (ODMRP) and Multicast Ad-hoc On-demand Distance Vector (MAODV). 4.2.1. On-Demand Multicast Routing Protocol (ODMRP) [18] is a reactive mesh based multicast routing protocol. ODMRP is not only a multicast routing protocol, but also provides Unicast routing capability. 4.2.2. Multicast Ad-hoc On-demand Distance Vector (MAODV) [19] is a reactive tree-based multicast routing protocol. MAODV is an extension of the Unicast routing protocol Ad-hoc On- demand Distance Vector (AODV). Table-5 gives the characteristics comparison of Reactive Unicast Routing Protocols. Table 5. Characteristics of Reactive Multicast Routing Protocols Characteristics ODMRP MAODV Multicast delivery structure Mesh Core based Tree Loop free YES YES Periodic messages requirement YES NO Routing Hierarchy Flat Flat Scalability Fair Fair 4.3. Hybrid Multicast Routing Protocols Hybrid multicast routing protocols are divided as Optimized Polymorphic Hybrid Multicast Routing Protocol (OPHMR). 4.3.1. Optimized Polymorphic Hybrid Multicast Routing Protocol (OPHMR): This protocol [20] is invested with different operational modes that are either proactive or reactive based on a MN’s power remainder, mobility level, and vicinity density level. It attempts to address the issues of power efficiency, latency, and protocol overhead in an adaptive manner. OPHMR’s reactive behaviour is based on the On-Demand Multicast Routing Protocol (ODMRP). It’s relatively simplistic. It generates on-demand route paths for multicast message requests. OPHMR’s proactive behaviour is based on the Multicast Zone Routing (MZR) protocol. It builds a zone around each Mobile Node (in hops) and periodically sends updates within each defined zone. For added efficiency, OPHMR utilizes an optimizing scheme adapted from the Optimized Link State Routing (OLSR) protocol. It used to decrease the amount of control overhead that is produced. OPHMR is, after a very lengthy period of time, able to extend battery life and enhance the survivability of the mobile ad hoc nodes. As a result, it decreases the end-to-end delay and increases the packet delivery ratio. V. CONCLUSION A Mobile Ad-hoc Network (MANET) is a self configuring network which consists of mobile nodes with no permanent infrastructure. In a MANETs, there is no difference between a host node and a router so that all nodes can be source plus forwarders of traffic. Routing is an essential component of communication protocols in mobile ad hoc networks. Routing protocols typically fall under two categories; Unicast routing protocol and Multicast routing protocol. The design of the protocols are
  • 9. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 199 driven by specific goals and requirements based on respective assumptions about the network properties or application area. According to the description and comparison of their characteristics, we can arrive at the conclusions: Hybrid Unicast or multicast routing protocol seems to be a better candidate than pure proactive and reactive routing protocols. Many of the application use Unicast protocol whereas in group communication Multicast routing gives comparatively better performance. However, its performance needs to be fully exploited and the OPHMR is a batter than another Routing Protocol because OPHMR is a hybrid multicast routing protocol. For added efficiency OPHMR utilizes an optimizing scheme through a Multipoint Relay (MPR). It used to decrease the amount of control overhead that is produced. So we can say that OPHMR is a better than another routing protocol. This paper gives the comparison of various Unicast-Multicast routing protocols for Mobile Ad-Hoc Networks. REFERENCES [1] Murthy, S. and J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”, ACM Mobile Networks and App. J., Special Issue on Routing in Mobile Communication Networks, Oct. 1996, pp. 183-97. [2] C. M. Cordeiro, D.P.Agrawal “Ad-hoc & Sensor Networks Theory and Applications”. [3] Cisco. Cisco Internetworking. Cisco Press, 2002. [4] R F Sari, A Syarif, K Ramli, B Budiardjo “Performance Evaluation of AODV Routing Protocol on Ad-hoc Hybrid Network Testbed Using PDAS”, IEEE 2005. [5] Mario Gerla, Ziaoyan Hong, and Guangyu Pei, ―Fisheye State Routing Protocol (FSR) for Ad Hoc Networksǁ, draft-ietf—manet-fsr-03.txt, June 2002. [6] Amir Qayyum, Laurent Viennot, and Anis Laouiti, ― Optmized Link State Routing Protocolǁ, draft-ieft-manet-olsr- 06.txt, September 2002. [7] Richard G. Ogier, Fred L. Templin, Bhargav Bellur, and Mark G. Lewis, ―Topology Broadcast Based on Reverse- Path Forwading (TBRPF)ǁ, draft-ietf-manet-tbrpf-05.txt, March 2002. [8] C.E. Perkins and E.M. Royer, “Ad hoc on demand Distance Vector routing”, mobile computing systems and applications, 1999. Proceedings. WMCSA ’99. Second IEEE Workshop on, 1999, p90 -p100. [9] D. Johnson, D. A. Maltz, “Dynamic source routing in ad hoc wireless networks”, in Mobile Computing (T. Imielinski and H. Korth, eds.), Kluwer Acad. Publ., 1996. [10] V. Park, and S. Corson, “Temporally-Ordered Routing Algorithm (TORA)”, Version 1 Functional Specification. IETF Internet draft, 1997. [11] V. D. Park and M. S. Corson. “A highly adaptive distributed routing algorithm for mobile wireless networks”, INFOCOM ’97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution, Proceedings IEEE, Volume: 3, 1997 Page(s): 1405 -1413 vol.3. [12] Z. J. Haas and M.R Pearlman, “The Zone Routing Protocol (ZRP) for ad hoc networks”, IETF Internet draft , August 1998. [13] M. Joa-Ng, I.-TLu, A peer-to-peer zone based tow-level link state routing for mobile ad hoc networks, IEEE Journal on Selected Areas in Communications 17(8) (1999) 1415-1425. [14] M. Liu, R. Talpade, A. McAuley, and E. Bommaiah, “AMRoute: Adhoc multicast routing protocol”, Technical Report, CSHCN T. R. 99-1, University of Maryland. [15] C.W. Wu, Y.C. Tay, “AMRIS: a multicast protocol for ad hoc wireless networks”, Proceedings IEEE MILCOM’99, Atlantic City, Nov. 1999. [16] J.J. Garcia-Luna-Aceves, E.L. Madruga, “A Multicast Routing Protocol for Ad-Hoc Networks”, Proceedings of IEEE INFOCOM’99, New York, pages 784-792, March 1999. [17] J.J. Garcia-Luna-Aceves and E.L. Madruga, “The Core-Assisted Mesh Protocol”, The IEEE Journal on Selected Area in Communication, vol.17, no.8, Aug. 1999, pp1380-1394. [18] S.J. Lee, M. Gerla, C.C. Chiang, “On Demand Multicast Routing Protocol”, Proceedings of IEEE WCNC’99, New Orleans, pages 1298-1302, Sept 1999. [19] E. M. Royer and C. E. Perkins, “Multicast Operation of the Ad hoc On-Demand Distance Vector Routing Protocol”, Proceedings of IEEE MOBICOM’99, Seattle, WA, August 1999, pp. 207-218. [20]A.B.Mnaouer, L. Chen, C. H. Foh, and J.W.Tantra, “OPHMR: An Optimized Polymorphic Hybrid Multicast Routing for MANETs”, IEEE transaction on mobile computing. Vol 5, No. 6, May 2007. [21] Kamal Kant, Lalit K. Awasthi, “Unicast And Multicast Routing Protocols For Manets: A Comparative Survey”. [22] Sunil Pathak, Dr. Sonal Jain,. “A Survey: On Unicast Routing Protocols for Mobile Ad Hoc Network”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, pp 204-210, Volume 3, Issue 1, January 2013.