Kaur 2019
Kaur 2019
Abstract- Mobile Ad-hoc Networks also known as MANETs be its routing protocol, which furthermore tend to hinder
belong to a collaborative collection of different mobile devices away the security and privacy, multicasting can also be
from a heterogeneous network, the prolific feature is the another sort of problem when it comes to an extensive
capability to join and quit the network any time. This leads to a
network, power consumption, efficiency, mobility of the
creation of a decentralized network of mobile nodes which can
connect, communicate and pass messages to each other without nodes needs to be addressed as well[1]. Ad-hoc networks
the requirement of an intermediate router. MANETs have the take into consideration almost all generic devices which
provision to offer much quicker deployment as compared to a have the capability to connect any sort of network (smart
normal networks, the deployment being horizontal type is only devices, smartphones, laptops, palmtops, etc.), also there is a
possible in this scenario. MANETs are generally used in diverse need to understand each connected device's computation
set of applications like Military operations, emergency or disaster
power, storage, power consumption and communication
relief operations, business meetings, political meetings, Mine cite
operations. In these kinds of networks the most important issue capabilities which vary tremendously with different
is that of finding the best route available between the two nodes paradigms. As an Ad-hoc device the purpose is to sense the
according to the user requirements. Undoubtedly routing presence of neighboring nodes/devices and also identify the
protocols and their evaluation is the most discussed topics in the properties of the device which gets connected, apart from
MANETs since the evolution of this network. A number of that it also has to sense what type the devices are lying in the
enhancements have been done to these basic protocols being vicinity and their relevant set of corresponding attributes.
discussed here by different researchers from time to time
according to their requirements. But this paper tends to throw
With MANETs into the picture it is important to look at the
some light on the basic protocols which will provide the readers mobility models and routing protocols that are driven into
the basic information about the characteristics, advantages and working of this efficient network infrastructure. This
disadvantages of the particular protocol and can help them to use infrastructure finds its applications into a lot of options
any protocol according to their use. An intention is to discuss available, the implications of it support the evidence that
regarding the proactive, reactive, hybrid, location-based, power this could be helpful in fields of war, disaster emergencies,
aware, uni-cast, multicast; covering apparently major number og
educational institutions, open interconnection sharing
routing protocols been proposed so far. This paper tends to cover
the routing protocol covering the timeline from last two decades. spaces, commercial network connectivity sectors and other
In the conclusion we will give the table showing the comparison personal area networks. The abundance of applications
of various discussed routing protocols. We hope that this paper makes it more scrutinized to further address the issues that
will help the researchers in the area of Adhoc networks. are faced.
Keywords- proactive; reactive; hybrid; uni-cast; multicast. Upon describing the process of routing as the name suggests
its transferring the data packets within/ between the
networks from one node to another[2]. This mere function
I. INTRODUCTION signifies that routing is an essential task within any network,
Mobile Adhoc Networks are the infrastructure-less networks it consists of sole responsibility of figuring out the optimal
which have challenging capabilities like rapidly changing path between the sender and receiver upon a given
topology, self-configurable networks. Due to increase in parameter. As the network expands, so does the complexity
demand of internet and its connectivity among people in of finding that path. Significantly, it becomes more complex
this fast growing world MANETs as an application of if multiple tiers and intermediate destinations are
infrastructure less technology have gained a lot of encountered in the route, figuring which the packet has to
popularity. With the advancement in intent of 5G traverse out the track covering all those on its way towards
technology in use and further being setup around, the AD- destination. This phenomenon becomes more important
HOC networks are finding new horizons on its spectrum. when the network is of infrastructure-less type, MANETs.
Although the ideology of these networks are an efficient The set of rules which classify the mode of functioning of
thought, there are a few issues still in process to be the networks and information gathering capacity are
addressed. The main issues for MANETs are considered to classified as proactive, reactive and hybrid.
A table based routing method, also known as proactive risk of loops and delays in the network, although they do
routing protocol works by figuring the routing table for its maintain a lot of overhead and routing information thereby
network[10]. The tables are formed with information increasing the load on the nodes which is also less likely to
delivered between nodes and any changes are spread be used. In smaller networks where nodes are around 50, this
throughout maintaining the evenness in topology. The approach can work efficiently but in larger networks this
periodic updates are sent for each time there is any update or tends to fail as the dynamic property cannot be maintained
on a particular time quantum. Although this generates a lot and a lot of data processing will be required, hence
of overhead while routing. The other category of protocols decreasing the scalability factor in the network itself. The
namely, On demand routing protocols are also knows as popular proactive protocols include Destination Sequenced
Reactive routing protocols[11] are initiated from the Distance Vector (DSDV), Wireless Routing Protocol (WRP),
source's side and routes are created when the nodes in the Global State Routing (GSR) and Cluster head Gateway
network would initiate the process, this was to resolve the Switch Routing (CGSR), Fisheye State Routing (FSR),
overhead increase in network by timely exchange of Optimized Link State Routing (OLSR), and Source Tree
information. This however generated lesser overhead and Adaptive Routing (STAR).
didn't overcrowd the network unnecessarily, thus decrease in
latency. Latency was an issue because it took more time to DSDV (Destination Sequence Distance Vector) [18] falls
compare and contrast the information and generate an into the category of proactive protocol which works by the
optimal route in comparison to a proactive protocol. This methodology of distance vector routing algorithm. Under this
method reduces the need of periodic updates. Lastly the the network node efficiently maintains the up-to-date routes
third category includes hybrid protocols which are merged between every node in the network. The information is
and created using positive aspects of proactive and reactive exchanged on a certain specific time interval common to all
protocols. nodes in the network to maintain the changes in the routing
This paper discusses in brief the routing protocols by table. The chances of going into loop of same information
presenting a comparison study of important ones from each being exchanged by the nodes, there is a provision of
category. In upcoming section the description of routing sequence number, which is sent by the destination node.
protocols in MANETs is given with properties and next a Although it still encounters count to infinity problem.
comparison has been made for each protocol. Wireless Routing Protocol (WRP) [13] falls into category
of table-driven protocols as well but the difference is in this
II. ROUTING PROTOCOLS FOR MANET the routing table is formed by communication between
There are a number of classification criteria for classifying second-to-last hop nodes in each destination. The
routing protocols of mobile adhoc networks. A few common functionality belongs to the category of path locating
among them are like on the basis of how routing information algorithms with exceptions; including the count-to-infinity
is acquired and maintained by the nodes, metrics used for problem.
routing path creation, how information is routed. The
categorization for protocols are reactive or proactive, single Cluster Head and Gateway Switching Routing (CGSR)
path/ multi-path, table driven or source initiated, source [14][19] is another table based routing protocol in which the
routing or hop by hop routing, full-limited or local-broadcast, nodes/ devices are grouped into clusters and the cluster is
periodic or event-based, flat or hierarchical, route selection provided with a cluster head to control the hosts in cluster.
strategy. Initially the broader classification is considered to The head is chosen by the means of distributed cluster head
be of proactive, reactive and hybrid protocol. While these selection algorithm. The clustering mechanism provides basis
broader categories are favorable, there are also some major of code separation among clusters(channel access, routing,
properties which are required to be fulfilled such as: and bandwidth allocation). To reduce intervention of cluster
Distributed operation, Loop free, Demand based operation, head selection time and again, each time a change occurs in
unidirectional link support, security, multiple routes, power the cluster the least cluster change algorithm is implemented
conservation, Quality of Security (QoS). We will give as a whole. As a drawback sometimes time is wasted while
overview of almost all routing protocols which are most selecting the cluster head, rather than packet relaying. It is
widely used and researched. In the next section we will give a feasible in case there is less routing information being stored
table which will compare all routing protocols along with at nodes, or in terms of smaller networks.
their characteristics and pros and cons.
Fisheye State Routing (FSR) [15] algorithm implemented
Proactive Routing protocols[19]: This protocol works by for ad-hoc networks when there are multiple-levels to the
maintaining a table to keep track of the current nodes in the routing table updates. In this a single node stores the state of
network and any change is notified by the nodes in a the link for every destination node at present in the network.
particular time frame. Updates in the entire network are The information regarding the link state is broadcasted to the
diverted through the means of nodes. The proactive routing destination in interval that depends on the hop distance to that
protocols provide simpler implementation by decreasing the destination or in case there is a change through the network.
The updates that are sent across network don't contain all the Distance Vector (AODV), Dynamic Source Routing (DSR),
information but the updated inputs from the network, thereby Temporally Ordered Routing Algorithm (TORA),
reducing the latency of processing and overhead Associativity-Based Routing (ABR), Signal Stability Routing
(SSR) and Location Aided Routing (LAR).
The Source Tree Adaptive Routing (STAR) [16] under the
category of proactive routing protocol is overcoming the Adhoc On-demand Distance Vector Routing (AODV) [12]
drawback of other routing protocols, the periodic update is creates the information about network routes when the
not required and also it doesn't depend on maintaining network needs it. Discovery of routes is done on the basis of
optimal routes in the network path between source and query and reply cycles and the intermediate nodes are storing
destination. The STAR algorithm works by circulating the the information propagated. Routing request message(RREQ)
control information with regard to the conditions in the is circulated in case a node needs to inquire about other
network, thus reducing the overhead. It examines updates in nodes. This message is uni-casted upon the network and a
the network and uses neighbor discovery protocol to discover reply is sent back. In case of an error(RERR) Route error
the presence of nearby mobile nodes. With usage of STAR message is notified to other nodes, which arises when the
there are control messages as well as user data flowing node is not linked anymore. HELLO messages are used for
through the same network, it also uses sequence number to detecting and monitoring links to neighbors.
validate the link-state updates(LSUs). It is learnt to use
Dijkstra's shortest path algorithm to find the routes in the Dynamic Source Routing (DSR) [19] on the other hand uses
network. pure on-demand protocol, it doesn't deploy any timely
routing updates. It doesn't deploy periodic routing , hence
The Optimized Link State Routing Protocol (OLSR) [17] reducing network bandwidth overhead and conserving battery
a table-based and proactive routing protocol it selects nodes of devices. It also decreases the chances of count-to-infinity
based on Link-state routing. S node selects its neighbors and problem and works with efficiently with route maintenance
would marks them as multi-point relays, which then would be and route discovery.
responsible for forwarding the traffic towards destination
nodes. The data is diffused into the network with a provision Temporally Ordered Routing Algorithm (TORA) Works
for flood control by decreasing the transmissions in a time with source initiated, adaptive approach to provide a loop-
interval. This mechanism is well suited for large and free and multi-path routing algorithm. Link reversal plays a
spontaneous networks where the traffic is sporadic and major role in this algorithm[20], it localizes the control
widespread. An exclusive network is formed between the messages flowing in the network and distributes them on the
small set of network nodes. basis of topology. Dynamically it operates in three phases:
Distance Vector Multicast Routing Protocol (DVMRP) [8] route creation, route maintenance and route erasure. With
is based loosely on the multicasting properties which are coordination between nodes it maintains the network and
based on wired networks ideology. An extension to this is makes sure the count-to-infinity problem doesn't arise.
created by detecting the leaf nodes in the network and
working towards dynamic grafting/pruning, and the use of The Associativity Based Routing (ABR) [22] falls under
packet duplication check to function efficiently in wireless another source-initiated on-demand protocol that consists of
networks. DVMRP maintains source-based multicast delivery three phases: route creation, maintenance and deletion.
trees. There exists controversy as to the applicability of Connections are studies to find the stronger connections and
DVMRP to mobile ad hoc networks. maintaining them. A stable route is contrasted against a
shorter route to determine which would be optimal.
Multicast Open Shortest Path First (MOSPF) works as a
multicast proactive protocol which is also considered to be Signal Stability-Based Adaptive Routing (SSR) [21]
the enhancement to OSPFv2, in this case the routers maintain successor of Associativity-based routing approach, this
the paradigm of the whole network topology through uni-cast protocol selects routes by determining their signal strength
OSPF and is maintained by timely broadcast in case a new from different nodes in the vicinity. Its lesser novel approach
link is formed, the new creation is also named as the link- to sort the nodes on the basis of signal strength plays some
state and MOSPF adapts to the changes in the network very anomalies. It is parted into two categories : (a) the Dynamic
rapidly. Routing Protocol (DRP), and (b) the Static Routing Protocol
Reactive Routing Protocols: Source-initiated protocols (SRP). Every time a link is removed or added the source is
which are also known as On demand protocols, in these the interrupted. Location aware routing reads this information to
routing information is collected only when there is certain improve the optimal performance of the MANETs. LAR
change in the topology of the network. It is observed that ensures that the requests are only made between smaller sub-
reactive protocols generate lesser traffic as compared to networks, hence reducing the total signal traffic. There are
proactive routing protocols. Some reactive protocols are two different concepts associated with LAR: (a) expected
Cluster Based Routing Protocol (CBRP), Ad hoc On-Demand zone, and (b) request zone.
DSR Source routing. Reactive Flat Multiple Uni-cast Loop Free Route maintenance
Designed mainly for Less network bandwidth usage. mechanism does not locally
mobile ad-hoc networks very quick recovery when repair a broken link. Stale
of up to about two routes in the network route cache information
hundred nodes. Work change could also result in
well even with very inconsistencies.
high rates of mobility. considerable routing
Uses no periodic overhead due to the source
routing messages. routing mechanism
AODV Self starting. High Reactive Flat Single Uni-cast Overall best algorithm. Loop Poor scalability. High
scalable. Power /Multiple free. Quick response to link network overhead. Cannot
efficient for breakages. Avoids count to utilize nodes with
bidirectional traffic. infinity problem. asymmetric links.
DSDV Uses sequence no. to Proactive Flat Single Uni-cast Better choice for low speed Increased size of routing
provide loop freedom. networks. High degree of table. Fluctuation problem.
Uses Hello messages. complexity. Less High bandwidth required if
bandwidth required number of nodes is large.
compared to other proactive
method.
ZRP Within zone similar to Hybrid Hierarc Single Uni-cast Reduces the control Could create
DSDV, inter zone hical overhead.Decrease latency unpredictable large
similar to DSR caused by route search. overhead for large
Routing zone based broadcast networks. High memory
efficiently guide route queries. requirement.
WRP Belong to the class of Proactive Flat Single Uni-cast Loop free. Periodic updates Requires large no. of tables,
path finding algo. messages are used for with periodic updates.
Transmit HELLO accuracy. Avoids count-
messages. toinfinity problem.
CGSR Cluster based. Busy in Proactive Hierarc Single/M Uni-cast Less routing info to be kept. Longer routes need to be
cluster head selection hical ultiple LLC algo. Is used to avoid CH maintained. Updates are
rather than packet reselection. Loop free needed for routing and
relaying. cluster member tables.
OLSR Immediate Proactive Flat Single/M Uni-cast Loop free. Reduction of Not energy aware.
availability of routes ultipath overhead using MPRs. Consumes more resources.
whenever needed Performs better in denser than AODV. Anonymity
networks and highly sporadic property is not fulfilled.
traffic.
BeeAdhoc Nature inspired, uses bee Reactive Flat Mutipath Uni-cast/M Uses source routing. Energy Not loop free.
colony concept ulticast efficient. Better performance
than AODV
Anthoc Net Automatic load Hybrid Probabil Multi-path Uni-cast/M Superior performance Large control overhead
balancing. Designed for istic ulticast at expense of compared to AODV. Not
path exploration. relatively low routing overhead. loop free
ANSI Uses concept of Reactive Flat Single Uni-cast/M Deterministic single- Not loop free. Not energy
Swarn intelligence. ulticast path routing tables aware.
Pherome tables are used. for data
packets are used.
TORA Suitable for Reactive Flat Multi-path Uni-cast/M Loop free. Supports Not energy aware.
large mobile ulticast multicasting. Performs well in Overhead is high.