DSR Route Discovery PDF
DSR Route Discovery PDF
e-ISSN: 2278-2834,p- ISSN: 2278-8735. Volume 5, Issue 5 (Mar. - Apr. 2013), PP 84-92
www.iosrjournals.org
Abstract : A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any
network infrastructure such as routers, servers, access points/cables or centralized administration. The nodes
are free to move about and organize themselves into a network. These nodes change position frequently. The
main classes of routing protocols are Proactive, Reactive and Hybrid. A Reactive (on-demand) routing strategy
is a popular routing category for wireless ad hoc routing. It is a relatively new routing philosophy that provides
a scalable solution to relatively large network topologies. The design follows the idea that each node tries to
reduce routing overhead by sending routing packets whenever a communication is requested. DSR and AODV
are reactive route discovery algorithms where a mobile device of MANET connects by gateway only when it is
needed. The performance differentials are analyzed using varying performance metrics. These simulations are
carried out using the ns-2 network simulator.
Keywords – AODV, DSR, MANET, NS-2, Reactive routing protocols, Survey.
I. Introduction
The wireless networks are classified as Infrastructured or Infrastructure less. In Infrastructured wireless
networks, the mobile node can move while communicating, the base stations are fixed and as the node goes out
of the range of a base station, it gets into the range of another base station. In Infrastructure less or Ad Hoc
wireless network, the mobile node can move while communicating, there are no fixed base stations and all the
nodes in the network act as routers. The mobile nodes in the Ad Hoc network dynamically establish routing
among themselves to form their own network „on the fly‟.
In areas where there is little [2] or no communication infrastructure or the existing infrastructure is
expensive or inconvenient to use, wireless mobile users may be able to communicate through the formation of
an Ad-hoc Network. In such a network, each mobile node does not operate only as a host but also as a router,
forwarding packets for other mobile nodes in the network that may not be within direct wireless transmission
range of each other. Each node participates in an ad hoc routing protocol that allows it to discover “multi-hop”
paths through the network to any other node. The idea of ad hoc networking is sometimes also called
infrastructure less networking. Some examples of the possible uses of ad hoc networking include, students using
laptop computers to participate in an interactive lecture, business associates sharing information during a
meeting, soldiers relaying information for situational awareness on the battlefield, and emergency disaster relief
personnel coordinating efforts after a hurricane or earthquake.
www.iosrjournals.org 84 | Page
Survey of Reactive Routing Protocols for MANET
Security protocols for wired networks cannot work for ad hoc networks.
APPLICATIONS OF MANET [7]
Military or police exercises.
Disaster relief operations.
Mine cite operations.
Urgent Business meetings.
www.iosrjournals.org 86 | Page
Survey of Reactive Routing Protocols for MANET
Table driven routing protocol [3] attempt to maintain consistent, up-to-date routing information from
each node to every other node in the network. These protocols require each node to maintain one or more tables
to store routing information, and they respond to changes in network topology by propagating updates routes
throughout the network in order to maintain a consistent network view. The Destination-Sequenced Distance-
Vector Routing (DSDV) protocol is a table driven algorithm that modifies the Bellman-Ford routing algorithm
to include timestamps that prevent loop-formation. The Wireless Routing Protocol (WRP) is a distance vector
routing protocol which belongs to the class of path-finding algorithms that exchange second-to-last hop to
destinations in addition to distances to destinations. This extra information helps remove the “counting-to-
infinity” problem that most distance vector routing algorithms suffer from. It also speeds up route convergence
when a link failure occurs.
www.iosrjournals.org 87 | Page
Survey of Reactive Routing Protocols for MANET
Route Discovery
When a node wants to send a packet to some destination and does not have a valid route in its routing
table for that destination, initiates a route discovery. Source node broadcasts a route request (RREQ) packet to
its neighbours, which then forwards the request to their neighbours and so on shown in figure 2.3. To control
network-wide broadcasts of RREQ packets, the source node use an expanding ring search technique. In this
technique, source node starts searching the destination using some initial time to live (TTL) value. If no reply is
received within the discovery period, TTL value incremented by an increment value. This process will continue
until the threshold value is reached. When an intermediate node forwards the RREQ, it records the address of
the neighbour from which first packet of the broadcast is received, thereby establishing a reverse path.
www.iosrjournals.org 88 | Page
Survey of Reactive Routing Protocols for MANET
Route Discovery and Route Maintenance, which work together to allow nodes to discover and maintain source
routes to arbitrary destinations in the network show in figure 4. The following sections explain these
mechanisms in more details:
Route Discovery
When a mobile node has a packet to send to some destination shown figure 4, it first checks its route
cache to decide whether it already has a route to the destination. If it has an unexpired route, it will use this route
to send the packet to the destination. On the other hand, if the cache does not have such a route, it initiates route
discovery by broadcasting a route request packet shown in figure 4. Each node receiving the route request
packet searches throughout its route cache for a route to the intended destination. If no route is found in the
cache, it adds its own address to the route record of the packet and then forwards the packet to its neighbours.
This request propagates through the network until either the destination or an intermediate node with
a route to destination is reached. Whenever route request reaches either to the destination itself or to an
intermediate node which has a route to the destination, a route reply is unicasted back to its originator.
Route Maintenance
In DSR, route is maintained by using route error packets and acknowledgments. When a packet with source
route is originated or forwarded, each node sending the packet is responsible for confirming that the packet has
been received by the next hop. The packet is retransmitted until the conformation of receipt is received. If the
packet is transmitted by a node the maximum number of times and yet no receipt information is received, this
node returns a route error message to the source of the packet. When this route error packet is received, the hop
in error is removed from the host‟s route cache and all routes containing the hop are truncated at that point.
Advantages and Drawbacks of DSR
DSR protocol has number of advantages [1]. It does not use periodic routing messages (e.g. no router
advertisements and no link-level neighbour status messages), thereby reducing network bandwidth overhead,
conserving battery power, and avoiding the propagation of potentially large routing updates throughout the ad
hoc network. There is no need to keep routing table so as to route a given data packet as the entire route is
contained in the packet header. The routes are maintained only between nodes that need to communicate. This
reduces overhead of route maintenance. Route caching can further reduce route discovery overhead. A single
route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches.
The DSR protocol guarantees loop-free routing and very rapid recovery when routes in the network change. It is
able to adapt quickly to changes such as host movement, yet requires no routing protocol overhead during
periods in which no such changes occur. In addition, DSR has been designed to compute correct routes in the
presence of asymmetric (uni-directional) links. In wireless networks, links may at times operate asymmetrically
due to sources of interference, differing radio or antenna capabilities, or the intentional use of asymmetric
communication technology such as satellites. Due to the existence of asymmetric links, traditional link-state or
distance vector protocols may compute routes that do not work. DSR, however, will find a correct route even in
the presence of asymmetric links.
DSR protocol is not totally free from drawbacks [1] as it is not scalable to large networks. It is mainly
efficient for mobile ad hoc networks with less than two hundred nodes. DSR requires significantly more
processing resources than most other protocols. In order to obtain the routing information, each node must spend
lot of time to process any control data it receives, even if it is not the intended recipient. The contention is
increased if too many route replies come back due to nodes replying using their local cache. The Route Reply
Storm problem is there. An intermediate node may send Route Reply using a stale cached route, thus polluting
other caches. This problem can be eased if some mechanism to purge (potentially) invalid cached routes is
incorporated.
www.iosrjournals.org 89 | Page
Survey of Reactive Routing Protocols for MANET
The Route Maintenance protocol does not locally repair a broken link. The broken link is only communicated
to the initiator. Packet header size grows with route length due to source routing. Flood of route requests may
potentially reach all nodes in the network. Care must be taken to avoid collisions between route requests
propagated by neighbouring nodes.
The network animator for two nodes using TCP traffic is shown in the fig. 5. We can see that the node_0 work
as source node and transmits traffic to node_1 while node_1 works as a destination and transmits
acknowledgement to node_0. Fig. 6 shows the comparison of throughput for reactive routing protocols(AODV
and DSR). The AODV gives better throughput compared to DSR because of least congested path.
www.iosrjournals.org 90 | Page
Survey of Reactive Routing Protocols for MANET
Fig. 5: Network Animator for Simulation using two nodes with TCP traffic
Fig. 6: Comparison of Throughput for reactive routing protocols AODV and DSR
V. Conclusion
By surveying about the reactive routing protocols, we come to know in detail about reactive routing
protocols and observe that AODV selects least congested path for traffic flow with minimum possibility of
packet drop while DSR selects shortest path with higher possibility of packet drop compared to AODV. We
have compared two Reactive (On-demand) Routing Protocols, namely, Ad hoc On-Demand Distance Vector
Routing (AODV) and Dynamic Source Routing (DSR). As the traffic parameter we have used File Transfer
Protocol (FTP). We analyze both protocols in terms of Throughput. As the time increases, the Throughput
increases in AODV and DSR. By comparison of throughput of both the routing protocols, we can observe that
AODV gives higher throughput compared to DSR in wireless ad hoc network, which matches with our
surveying results.
www.iosrjournals.org 91 | Page
Survey of Reactive Routing Protocols for MANET
References
[1] Sunil Taneja, Ashwani Kush and Amandeep Makkar, “Experimental Analysis of DSR, AODV using Speed and Pause time”,
International Journal of Innovation, Management and Technology, Vol. 1, No. 5, December 2010, 453-458, ISSN: 2010-0248.
[2] Anil Kumar Sharma and Neha Bhatia, “Behavioral Study of MANET Routing Protocols by using NS-2”, International Journal of
Computational Engineering & Management, Vol. 12, April 2011, 100-104, ISSN (Online): 2230-7893, www.IJCEM.org.
[3] Dhananjay Bisen, Preetam Suman, Prof. Sanjeev Sharma and Rajesh Shukla, “Effect of Pause Time on DSR, AODV and DYMO
Routing Protocols in MANET”, Manuscript received November 20, 2009.
[4] Manijeh Keshtgary and Vahide Babaiyan, “Performance Evaluation of Reactive, Proactive and Hybrid Routing Protocols in
MANET”, Manijeh Keshtgary et al. / International Journal on Computer Science and Engineering (IJCSE), Vol. 4(2), Feb. 2012,
248-254, ISSN: 0975-3397.
[5] Baldev Ram Mali and N.C. Barwar, “Effect of Mobility on Performance of MANET Routing Protocols under Different Traffic
Patterns”, IP Multimedia Communications, A Special Issue from IJCA - www.ijcaonline.org, 19-24.
[6] C. Siva Ram Murthy and B. S. Manoj, “Ad Hoc Wireless Networks Architectures and Protocols”, Prentice Hall, PTR, 2004.
[7] Sachin Dnyandeo Ubarhande, “Performance Evolution of AODV and DSR Routing Protocols in MANET Using NS2”,
International Journal of Scientific and Engineering Research, Vol.3, Issue 5, May 2012, 1-5, ISSN: 2229-5518.
www.iosrjournals.org 92 | Page