SlideShare a Scribd company logo
Routing protocols in ad hoc
networks: A survey
Presented By:
Mr. JOGESWAR TRIPATHY
M.Tech In Dept. Of CSIT
From S’O’A University, Bhubaneswar6/23/19
1
Abstract
 The main objective of this paper is to create a taxonomy of the ad hoc
routing protocols.
 It also survey and compare the representative examples for each class
of protocols.
 Here authors wants to uncover the requirements considered by the
different protocols , the resource limitations under which they operate
and the design decisions made by the authors.
 Here authors also provides the sweet spot deployment scenarios and
performance metric combinations of the protocols where they out
perform their competitors for which it make easy to choose the routing
protocols.
6/23/19
2
Outline
 Introduction
 Characteristics of ad hoc networks
 Applications of ad hoc networks
 Types of routing
 Protocols in details
 Conclusion
 Future work
 References
6/23/19
3
Introduction
 The principle behind ad hoc networking is multi-hop relaying in which
messages are sent from the source to the destination by relaying through
the intermediate hops (nodes).
 In multi-hop wireless networks, communication between two end nodes is
carried out through a number of intermediate nodes whose function is to
relay information from one point to another. A static string topology is an
example of such network:
 It is useful when infrastructure not available, impractical, or expensive
 Here Information is transmitted in a store-and forward manner using
multi hop routing.
0 1 2 3 4 5 6 7
6/23/19
4
Introduction (Contd.)
 Mobility and traffic are two significant factors affecting protocol
performance. In current simulation,
 Mobility Pattern: usually, uniformly and randomly chosen
destinations (random waypoint model)
 Traffic Pattern: usually, uniformly and randomly chosen
communicating nodes
 Impact of mobility on ad hoc routing protocols is expected to be
significant
 The following figure represents different wireless networks.
 Infrastructure: cellular wireless networks
 Ad hoc: wireless sensor networks
 Hybrid: mesh networks
Cellular Wireless
Networks Wireless Mesh
Networks
Hybrid
Wireless
Network
s
Wireless Sensor
Networks
6/23/19
5
Characteristics of ad hoc networks
 Dynamic topologies: Network topology may change dynamically as the
nodes are free to move.
 Bandwidth-constrained, variable capacity links: Realized throughput of
wireless communication is less than the radio’s maximum transmission
rate. Collision occurs frequently.
 Energy-constrained operation: Some nodes in the ad hoc network may
rely on batteries or other exhaustible means for their energy.
 Limited physical security: More prone to physical security threats than
fixed cable networks.
6/23/19
6
Applications of ad hoc networks
 Network Extension: In this application area , the networking infrastructure exists, but with
insufficient coverage. Hence ad hoc network is used to extend the internet connectivity
beyond the reach of the access points.
 Local interconnection networks: This applications include point to point messaging and
audio and video conferencing.
 Ubiquitous computing: This is strongly influenced by the physical location and proximity
devices which are close to each other are more likely to communicate the remote devices . As
ad hoc network are good match for proximity based communication .E.g. – TV set-top box is
controlled from a smartphone.
 Urban Sensing: This application area exploits the sensing and computation capabilities of
smartphones, together with the wide range of their deployment in urban areas
 Vehicular Networking: This area covers the applications where one of the communication
partner is a vehicle. t is used for emerging intelligent transport systems.
 Personal area networks: It is a most popular technology formed by Bluetooth devices which
needs to establish a short range communication with infrastructure elements.
6/23/19
7
Types of routing
 Table-driven (proactive)
 Up-to-date routing information maintained
 Routing overhead independent of route usage
 Source-initiated (demand-driven / reactive)
Routes maintained only for routes in use
Explicit route discovery mechanism
 Hybrid Protocols
Combination of proactive and reactive
6/23/19
8
Types of routing(Contd.)
Ad Hoc Routing Protocols
Table driven Source-initiated
on-demand
DSDV
WRP
AODV
DSR
TORA
ABR
SSR
Reactive
Proactive
Hybrid
ZRP
Hybrid
OLSR
CGSR
Power-
aware
Geographical
Multicast
Multicast
Hierarchical
Multi path
Location aware
GPSR
DRM
LAR
SMR HSR
CEDAR
DGR
GAMER
DEAR
MHEDSR
NTBR
DCMP
6/23/19
9
Protocols in details
 Table Driven Routing Protocols:
 In table-driven protocols, each node maintain up-to-
date routing information to all the nodes in the network 
 These routing protocols differ in the method by which the topology
change information is distributed across the network and the number
of necessary routing-related tables.
 some of the existing table-driven ad hoc routing protocols are :
DSDV(Dynamic Destination-Sequenced Distance-Vector Routing
Protocol)
WRP (The Wireless Routing Protocol)
6/23/19
10
Protocols in details(Contd.)
 Hybrid Routing Protocols:
 Proactive mechanism of node discovery within a node’s immediate
neighborhood while inter-zone communication is carried out by using
reactive approaches .
 Each node individually creates its own neighborhood which it calls a
routing zone.
 The zone is defined as a collection of nodes whose minimum distance in
hops from the node in question is no greater than a value that is called
the “zone radius” .
 Note that routing zones of nodes might overlap heavily .
E.g.- ZRP(Zone Routing Protocol)
6/23/19
11
Protocols in details(Contd.)
 Source Initiated Protocol:
 Route is created only when the source requests a route to a destination
 Route discovery process
 Route maintenance
 Reactive Protocols acquire routing information only when it is actually needed. The
Advantage is that due to the high uncertainty in the position of the nodes,
however, the reactive protocols are much suited and perform better for ad-hoc
networks.
 The Disadvantages of reactive protocols include high latency time in route finding
and excessive flooding leading to network clogging. Some of the Reactive Routing
Protocols are:
ABR (Associativity Based Routing)
AODV (Ad hoc on-demand Distance Vector)
DSR (Dynamic Source Routing)
6/23/19
12
Protocols in details(Contd.)
 Location Aware Routing Protocol:
 Location-aware routing schemes in mobile ad hoc networks assume that the
individual nodes are aware of the locations of all the nodes within the
network.
 It utilizes location information to minimize the search space for route
discovery towards the destination node.
 Here, there are two flooding region in LAR protocol, i.e. the expected zone
and request zone.
 When source node wants to send packet to destination node, first source
node should get the position of destination node by using location services
which is used to get position of node.
 If the source node has no information about the speed and the direction of
the destination node, the entire network is considered as the expected zone.
6/23/19
13
Protocols in details(Contd.)
 Multi path Routing Protocol:
 Instead of only a single path, it can be useful to compute multiple
paths between a given source/destination pair.
 Multiple paths can be disjoint or braided.
 It can be Used simultaneously, alternatively or randomly.
 Multipath routing protocols create multiple routes from source to
destination
6/23/19
14
Protocols in details(Contd.)
 Hierarchical Routing Protocol:
 Hierarchical ad hoc routing protocols build a hierarchy of
nodes, typically through clustering techniques .
 Nodes at the higher levels of the hierarchy provide special
services, improving the scalability and the efficiency of
routing .
 Creation of cluster
 Election of cluster head
6/23/19
15
Protocols in details(Contd.)
 Multicast Routing Protocol:
 Distribute a packet to all reachable nodes (broadcast) or to a somehow
(explicitly) denoted subgroup (multicast)
 Basic options:
 Source-based tree: Construct a tree (one for each source) to reach all
addressees
 Minimize total cost (= sum of link weights) of the tree
 Minimize maximum cost to each destination
Shared, core-based trees
 Use only a single tree for all sources
 Every source sends packets to the tree where they are distributed
 Mesh
 Trees are only 1-connected ! use meshes to provide higher redundancy and
thus robustness in mobile environments
6/23/19
16
Protocols in details(Contd.)
 Geographical Multicast Routing Protocol:
 It construct virtual coordinates that preserve enough
neighborhood information to be useful in geographic routing but do
not require actual position determination.
 Use polar coordinates from a center point.
 Assign “virtual angle range” to neighbors of a node, bigger radius .
 Angles are recursively redistributed to children nodes.
6/23/19
17
Protocols in details(Contd.)
 Power-aware Routing Protocols:
 Create a efficient route between source node and destination node
 Active :
- Transmission power control
- Load distribution
Inactive period
- Sleep mode or simply turns it off when there is no data to
transmit or receive
6/23/19
18
Conclusion and Future work
 In this paper several representative protocols are reviewed and compared ,
while different classes of protocols operate under different scenarios, but
they usually share the common goal to reduce control packet overhead,
maximized throughput and minimize end-to-end delay.
 The main differentiating factor between the protocols is the ways of finding
and/or maintaining the routes between source and destination pairs.
 It will be more helpful for choosing the appropriate routing protocol .
 It can be make more reusable and deployable by using security issues in
future.
6/23/19
19
THANK YOU!!
???
6/23/19
20
References
[1] J.-D. Abdulai, M. Ould-Khaoua, L. Mackenzie, Adjusted probabilistic route
discovery in mobile ad hoc networks, Computers and Electrical Engineering
35 (1) (2009) 168–182.
[2] P. Papadimitratos and Z.J. Haas, “Secure Link State Routing for Mobile Ad
Hoc Networks,” Proc. IEEE Workshop on Security and Assurance in Ad Hoc
Networks, IEEE Press, 2003, pp. 27–31.
[3] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts,” Proc. IEEE
Workshop on Mobile Computing Systems and Applications (WMCSA’94),
IEEE Press, 1994, pp. 158–163.
[4] Suraj Sharma, Deepak Puthal, Sabah Tazeen, Mukesh Prasad, Albert Y.
Zomaya, "MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol
for Wireless Sensor Networks", Access IEEE, vol. 5, pp. 19864-19875, 2017.
[5] Sobinder Singh, Abhishek Swaroop, Ajay Kumar, Anamika, "A survey on
techniques to achive energy efficiency in cloud computing", Computing
Communication and Automation (ICCCA) 2016 International Conference on,
pp. 1281-1285, 2016.
6/23/19
21

More Related Content

What's hot

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
shiujinghan
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
Pradeep Kumar TS
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
Arpita Sanghani
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
Gaurav Dalvi
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Pallepati Vasavi
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
Ipsita Sharma
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
nitss007
 

What's hot (20)

Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Issues in routing protocol
Issues in routing protocolIssues in routing protocol
Issues in routing protocol
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Gprs architecture ppt
Gprs architecture pptGprs architecture ppt
Gprs architecture ppt
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...Mobile computing unit2,SDMA,FDMA,CDMA,TDMA  Space Division Multi Access,Frequ...
Mobile computing unit2,SDMA,FDMA,CDMA,TDMA Space Division Multi Access,Frequ...
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
WCDMA
WCDMAWCDMA
WCDMA
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Zone Routing Protocol
Zone Routing ProtocolZone Routing Protocol
Zone Routing Protocol
 

Similar to Routing protocols in ad hoc network

3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
MohitKumarSingh71
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
ijsrd.com
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
Narendra Singh Yadav
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
Saurabh Mishra
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsChandra Meena
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Sitamarhi Institute of Technology
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
ijsrd.com
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ijasuc
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
IJERA Editor
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
شيماء شقيرة
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
pijans
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
IOSR Journals
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
Rajesh Piryani
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
eSAT Journals
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
IOSR Journals
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
Abhishek Kona
 

Similar to Routing protocols in ad hoc network (20)

3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
PERFORMANCE COMPARISION OF DSDV, AODV AND DSRFOR MOBILE AD HOC NETWORK BY VAR...
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Md3421762181
Md3421762181Md3421762181
Md3421762181
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
A Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for ManetsA Survey of Enhanced Routing Protocols for Manets
A Survey of Enhanced Routing Protocols for Manets
 
H01115155
H01115155H01115155
H01115155
 
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Improved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANETImproved AODV based on Load and Delay for Route Discovery in MANET
Improved AODV based on Load and Delay for Route Discovery in MANET
 
Wireless mesh networkk routing
Wireless mesh networkk routingWireless mesh networkk routing
Wireless mesh networkk routing
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

Routing protocols in ad hoc network

  • 1. Routing protocols in ad hoc networks: A survey Presented By: Mr. JOGESWAR TRIPATHY M.Tech In Dept. Of CSIT From S’O’A University, Bhubaneswar6/23/19 1
  • 2. Abstract  The main objective of this paper is to create a taxonomy of the ad hoc routing protocols.  It also survey and compare the representative examples for each class of protocols.  Here authors wants to uncover the requirements considered by the different protocols , the resource limitations under which they operate and the design decisions made by the authors.  Here authors also provides the sweet spot deployment scenarios and performance metric combinations of the protocols where they out perform their competitors for which it make easy to choose the routing protocols. 6/23/19 2
  • 3. Outline  Introduction  Characteristics of ad hoc networks  Applications of ad hoc networks  Types of routing  Protocols in details  Conclusion  Future work  References 6/23/19 3
  • 4. Introduction  The principle behind ad hoc networking is multi-hop relaying in which messages are sent from the source to the destination by relaying through the intermediate hops (nodes).  In multi-hop wireless networks, communication between two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another. A static string topology is an example of such network:  It is useful when infrastructure not available, impractical, or expensive  Here Information is transmitted in a store-and forward manner using multi hop routing. 0 1 2 3 4 5 6 7 6/23/19 4
  • 5. Introduction (Contd.)  Mobility and traffic are two significant factors affecting protocol performance. In current simulation,  Mobility Pattern: usually, uniformly and randomly chosen destinations (random waypoint model)  Traffic Pattern: usually, uniformly and randomly chosen communicating nodes  Impact of mobility on ad hoc routing protocols is expected to be significant  The following figure represents different wireless networks.  Infrastructure: cellular wireless networks  Ad hoc: wireless sensor networks  Hybrid: mesh networks Cellular Wireless Networks Wireless Mesh Networks Hybrid Wireless Network s Wireless Sensor Networks 6/23/19 5
  • 6. Characteristics of ad hoc networks  Dynamic topologies: Network topology may change dynamically as the nodes are free to move.  Bandwidth-constrained, variable capacity links: Realized throughput of wireless communication is less than the radio’s maximum transmission rate. Collision occurs frequently.  Energy-constrained operation: Some nodes in the ad hoc network may rely on batteries or other exhaustible means for their energy.  Limited physical security: More prone to physical security threats than fixed cable networks. 6/23/19 6
  • 7. Applications of ad hoc networks  Network Extension: In this application area , the networking infrastructure exists, but with insufficient coverage. Hence ad hoc network is used to extend the internet connectivity beyond the reach of the access points.  Local interconnection networks: This applications include point to point messaging and audio and video conferencing.  Ubiquitous computing: This is strongly influenced by the physical location and proximity devices which are close to each other are more likely to communicate the remote devices . As ad hoc network are good match for proximity based communication .E.g. – TV set-top box is controlled from a smartphone.  Urban Sensing: This application area exploits the sensing and computation capabilities of smartphones, together with the wide range of their deployment in urban areas  Vehicular Networking: This area covers the applications where one of the communication partner is a vehicle. t is used for emerging intelligent transport systems.  Personal area networks: It is a most popular technology formed by Bluetooth devices which needs to establish a short range communication with infrastructure elements. 6/23/19 7
  • 8. Types of routing  Table-driven (proactive)  Up-to-date routing information maintained  Routing overhead independent of route usage  Source-initiated (demand-driven / reactive) Routes maintained only for routes in use Explicit route discovery mechanism  Hybrid Protocols Combination of proactive and reactive 6/23/19 8
  • 9. Types of routing(Contd.) Ad Hoc Routing Protocols Table driven Source-initiated on-demand DSDV WRP AODV DSR TORA ABR SSR Reactive Proactive Hybrid ZRP Hybrid OLSR CGSR Power- aware Geographical Multicast Multicast Hierarchical Multi path Location aware GPSR DRM LAR SMR HSR CEDAR DGR GAMER DEAR MHEDSR NTBR DCMP 6/23/19 9
  • 10. Protocols in details  Table Driven Routing Protocols:  In table-driven protocols, each node maintain up-to- date routing information to all the nodes in the network   These routing protocols differ in the method by which the topology change information is distributed across the network and the number of necessary routing-related tables.  some of the existing table-driven ad hoc routing protocols are : DSDV(Dynamic Destination-Sequenced Distance-Vector Routing Protocol) WRP (The Wireless Routing Protocol) 6/23/19 10
  • 11. Protocols in details(Contd.)  Hybrid Routing Protocols:  Proactive mechanism of node discovery within a node’s immediate neighborhood while inter-zone communication is carried out by using reactive approaches .  Each node individually creates its own neighborhood which it calls a routing zone.  The zone is defined as a collection of nodes whose minimum distance in hops from the node in question is no greater than a value that is called the “zone radius” .  Note that routing zones of nodes might overlap heavily . E.g.- ZRP(Zone Routing Protocol) 6/23/19 11
  • 12. Protocols in details(Contd.)  Source Initiated Protocol:  Route is created only when the source requests a route to a destination  Route discovery process  Route maintenance  Reactive Protocols acquire routing information only when it is actually needed. The Advantage is that due to the high uncertainty in the position of the nodes, however, the reactive protocols are much suited and perform better for ad-hoc networks.  The Disadvantages of reactive protocols include high latency time in route finding and excessive flooding leading to network clogging. Some of the Reactive Routing Protocols are: ABR (Associativity Based Routing) AODV (Ad hoc on-demand Distance Vector) DSR (Dynamic Source Routing) 6/23/19 12
  • 13. Protocols in details(Contd.)  Location Aware Routing Protocol:  Location-aware routing schemes in mobile ad hoc networks assume that the individual nodes are aware of the locations of all the nodes within the network.  It utilizes location information to minimize the search space for route discovery towards the destination node.  Here, there are two flooding region in LAR protocol, i.e. the expected zone and request zone.  When source node wants to send packet to destination node, first source node should get the position of destination node by using location services which is used to get position of node.  If the source node has no information about the speed and the direction of the destination node, the entire network is considered as the expected zone. 6/23/19 13
  • 14. Protocols in details(Contd.)  Multi path Routing Protocol:  Instead of only a single path, it can be useful to compute multiple paths between a given source/destination pair.  Multiple paths can be disjoint or braided.  It can be Used simultaneously, alternatively or randomly.  Multipath routing protocols create multiple routes from source to destination 6/23/19 14
  • 15. Protocols in details(Contd.)  Hierarchical Routing Protocol:  Hierarchical ad hoc routing protocols build a hierarchy of nodes, typically through clustering techniques .  Nodes at the higher levels of the hierarchy provide special services, improving the scalability and the efficiency of routing .  Creation of cluster  Election of cluster head 6/23/19 15
  • 16. Protocols in details(Contd.)  Multicast Routing Protocol:  Distribute a packet to all reachable nodes (broadcast) or to a somehow (explicitly) denoted subgroup (multicast)  Basic options:  Source-based tree: Construct a tree (one for each source) to reach all addressees  Minimize total cost (= sum of link weights) of the tree  Minimize maximum cost to each destination Shared, core-based trees  Use only a single tree for all sources  Every source sends packets to the tree where they are distributed  Mesh  Trees are only 1-connected ! use meshes to provide higher redundancy and thus robustness in mobile environments 6/23/19 16
  • 17. Protocols in details(Contd.)  Geographical Multicast Routing Protocol:  It construct virtual coordinates that preserve enough neighborhood information to be useful in geographic routing but do not require actual position determination.  Use polar coordinates from a center point.  Assign “virtual angle range” to neighbors of a node, bigger radius .  Angles are recursively redistributed to children nodes. 6/23/19 17
  • 18. Protocols in details(Contd.)  Power-aware Routing Protocols:  Create a efficient route between source node and destination node  Active : - Transmission power control - Load distribution Inactive period - Sleep mode or simply turns it off when there is no data to transmit or receive 6/23/19 18
  • 19. Conclusion and Future work  In this paper several representative protocols are reviewed and compared , while different classes of protocols operate under different scenarios, but they usually share the common goal to reduce control packet overhead, maximized throughput and minimize end-to-end delay.  The main differentiating factor between the protocols is the ways of finding and/or maintaining the routes between source and destination pairs.  It will be more helpful for choosing the appropriate routing protocol .  It can be make more reusable and deployable by using security issues in future. 6/23/19 19
  • 21. References [1] J.-D. Abdulai, M. Ould-Khaoua, L. Mackenzie, Adjusted probabilistic route discovery in mobile ad hoc networks, Computers and Electrical Engineering 35 (1) (2009) 168–182. [2] P. Papadimitratos and Z.J. Haas, “Secure Link State Routing for Mobile Ad Hoc Networks,” Proc. IEEE Workshop on Security and Assurance in Ad Hoc Networks, IEEE Press, 2003, pp. 27–31. [3] D.B. Johnson, “Routing in Ad Hoc Networks of Mobile Hosts,” Proc. IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’94), IEEE Press, 1994, pp. 158–163. [4] Suraj Sharma, Deepak Puthal, Sabah Tazeen, Mukesh Prasad, Albert Y. Zomaya, "MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks", Access IEEE, vol. 5, pp. 19864-19875, 2017. [5] Sobinder Singh, Abhishek Swaroop, Ajay Kumar, Anamika, "A survey on techniques to achive energy efficiency in cloud computing", Computing Communication and Automation (ICCCA) 2016 International Conference on, pp. 1281-1285, 2016. 6/23/19 21