A Complete Study on Unipath Routing Protocols in MANETs D.Ganesh Kumar , N.Kumar

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 7- Dec 2013
A Complete Study on Unipath Routing
Protocols in MANETs
D.Ganesh Kumar 1, N.Kumar2, M.Ramesh Kumar 3
1, 2, 3
Assistant Professor1, 2, 3
Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Avadi, Chennai,
Tamil Nadu, India.
.
Abstract - Mobile Ad hoc network is a cluster of
wireless mobile nodes making a network with
dynamically changing topology without using
any permanent access point as a base station. To
create connectivity among nodes more than
single hop is needed due to low transmission
range. Increasing of mobile nodes enhances this
overhead. Many standards have been developed
for transmission and to find effective routes from
a source to some destination. In this paper, we
have analyzed the main protocols and issues of
routing in MANETs.
2. Uni-path Routing Protocol
To identify the routes and maintain the
path till the end of communication from
source and destination. In MANET, there are
two main kinds of the routing protocol: ondemand
protocols
(also
called
reactive
protocols) and table-based protocols (also
called proactive protocols)[1] ~ [5].In reactive
Keywords: adhoc networks, routing protocol,
unipath.
routing the nodes updates the routing path
1. Introduction
In proactive protocols every node
maintains a table for updating of the entire
node’s location. Messages with routing
information are exchanged using heart sync
method to keep routing tables up-to-date.
The advantages of both reactive and
proactive protocols are taken for hybrid
protocol. This always has an edge over the two
protocols and definitely handles better.
Mobile Ad hoc network is a cluster of
wireless mobile nodes making a network with
periodically changing topology without any
permanent access point as a base station. To
create connectivity among nodes more than
single hop is needed due to low transmission
range. Increasing of mobile nodes enhances
this overhead. Many standards have been
developed for transmission and to find
effective routes from a source to destination.
Wireless network has issues like low power,
unreliable nodes, unstable path dynamic
protocols, low bandwidth, and security [6].
Because of the very vast features of the
MANET, the research for the routing protocol
has been one of the concerns in the MANET.
The traditional routing algorithms for fixed
networks are not efficient for the changes.
Many protocols have been developed a lot for
routing which can be used in MANET, and
here some typical protocols are analyzed.
Section 2, reactive, proactive and hybrid
routing are discussed. Most of them is
developed from one of the uni-path routing
protocols described in the final section
ISSN: 2231-5381
when they are needed. [1][2][4].
2.1. Reactive Routing
This routing technique uses the
dynamic approach to update the routing path
whenever necessary so it is mostly suited for
large network where scalable is always an
issue. When a node wants to identify the
destination to another node, it triggers a route
discovery process to find the destination path.
It consists of two main phases [6]:
Route discovery: It is the process of seeking a
path between two nodes which is established
either directly or through any other nodes
using n number of hopes through other hosts.
Route maintenance: It is the process of
repairing a broken route or finding an alternate
route in case of a route failure. It examines the
operation of the route and informs the sender
http://www.ijettjournal.org
Page 380
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 7- Dec 2013
about the regarding errors. The most known
reactive routing protocols are DSR and
ADOV.
2.1.1. Dynamic Source Routing Protocol
(DSR)
It is a routing technique in which the
sender of a packet determines the entire
sequence of nodes and identifies their location
through using to forward the packet; the sender
of a packet finalizes the transmission of the
packet through the complete sequence of
nodes; the sender uniquely identifies this route
in the packet’s header, identifying subsequent
forwarding “hop” using the address of the next
node to transmit the packet on its path to the
destination node.
When another node receives a ROUTE
REQUEST, if that’s the destination of the
Route Discovery, it returns a ROUTE REPLY
message to the initiator. If not, the current
node attaches its address to the route
information in the ROUTE REQUEST
message and broadcast it by transmitting it as
a local broadcast packet, till the packet attains
its destination.
When the packet reaches its destination, the
node will reply a ROUTE REPLY message.
With the reply message either REPLY
message is returned can be starting a new
Route Discovery or use the sequence in
reverse of the nodes based on the networks
scenario i.e., unidirectional or bidirectional.
The DSR is designed for use in the
wireless environment of a temporary or
emergency situation like an ad hoc network.
There is no regular router discovery nor
advertisement. Instead, whenever a node needs
to reach another host, it identifies the
destination based on the available information
Figure 1 Route Discovery example: from
for the routing obtained from the results of
Node A to Node E
route discovery protocol [1][2].
2.1.1.1. Route Discovery
When some node S needs to send a new
packet to other node D, it fits packet header
source route details giving the sequence of
hops that the packet should follow on its way
to D. Eventually, S will obtain a suitable
source route by seeking its temporary memory
of route information obtained. If routes are not
found in its cache, it will trigger the Route
Discovery protocol to find a new route to D
dynamically. In the above scenario, we say S
the provoker and D the solution of Route
Discovery.
For example, if node A is trying to seek a
path to node E. A transmits a ROUTE
REQUEST message as a single local broadcast
packet, which contains a distinctive request id.
ISSN: 2231-5381
When triggering a Route Discovery, the
source node saves a copy of the original packet
in a local temporary memory called the Send
Buffer. The Send Buffer contains a copy of
every packet that is unsuccessful in
transmitting by this node since source route is
missing for destination. When a packet resides
in the Send Buffer, the node should try for
route discovery every now and then.
2.1.1.2. Route Maintenance
When sending a packet using a source
route, every node sending the packet holds
responsible for verifying that the packet has
been received by the next node in the sequence
of hop along the source route; the packet is
transmitted again and again till confirmation is
received till the maximum attempts possible.
It returns an error message ROUTER
http://www.ijettjournal.org
Page 381
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 7- Dec 2013
ERROR to the sender if no confirmation for
node’s details to identify the destination
receipt is received, finding the connection
over which the packet could not be furthered.
instead of source routing. Wherein the DSR,
which uses source routing. It maintains routing
The source node then eradicate this broken
information at its intermediate host’s routing
link from its temporary memory, and habit
table to identify the path.
another route in the Route Cache, or triggers a
new Route Discovery.
2.1.2.1. Route Discovery
There are also some additional features
introduced in [1] to improve the performance
of Route Maintenance: Packet Salvaging;
Automatic Route Shortening; Increased
Spreading of ROUTE ERROR Messages;
Caching Negative Information
DSR, there are quite a few advantages:
First, unlike orthodox routing protocols, it
uses no constant routing advertisement
messages, in so doing reducing network
bandwidth overhead, especially there is an
negative movement of the host. Second, it
doesn’t need the transmission in bidirectional
between hosts. It can change quickly to
changes such as mobility in host, yet requires
no routing protocol overhead for the above
mentioned changes do not occur.
Yet, The Route Maintenance protocol do
not locally repair a broken link. The sender is
informed about the error. The DSR protocol is
Similar to DSR, the route discovery
process is initiated when a source needs to
send packet but lacks the destination. The
source node floods the network with a RREQ
packet specifying the destination for which the
route is requested. When the destination
receives the RREQ packet, the node generates
a RREP packet, which is sent back to the
source along the reverse path. Each node along
the reverse path sets up a forward pointer to
the node it received the RREP from. This
create a path for the destination.
2.1.2.2. Route Maintenance
When a node detects a disconnected
link while transmitting, it generates a RERR
packet to send to all sources using the
disconnected link. The RERR packet erases all
better served if the number of nodes is
restricted to about 200 nodes. Overhead occurs
when there is an increase in node’s movement
and count, hence the nodes can only traverse
around in this case with a controllable speed.
routes using the link along the way. If a source
Overflowing the network can cause collisions
among the packets. There is a lag at the initial
stage of the connectivity because the sender
must identify the target before starting of
free routing, optional multicast and reduced
transmission [9].
detect a unidirectional link [10].
2.1.2. Ad-hoc On-Demand Distance Vector
Routing (AODV)
2.2. Proactive Routing
receives a RERR packet and route to
destination is needed, it initiates a new route
discovery process.
The advantages of AODV are: loop
control overhead. But overhead is produced by
the delay caused by route discovery process
and bidirectional connection needed in order to
In Proactive Routing, also called
AODV is a reactive routing protocol
[5] which doesn’t relies on any related routing
information. AODV utilizes a broadcasting
mechanism used in DSR. But it uses dynamic
route table which update of intermediate
ISSN: 2231-5381
table-driven Routing, routes are calculated
even before transmission. The protocol tries to
keep routing information to all nodes every
time up-to-date. The update of the tables can
be heart synched by events.
http://www.ijettjournal.org
Page 382
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 7- Dec 2013
2.2.1. Optimized
Protocol (OLSR)
Link
State
Routing
In [3], a proactive routing protocol,
called Optimized Link State Routing for
MANET is proposed. The protocol obtains the
stability of the link state algorithm. Due to its
proactive nature, it has an advantage of having
the routes available when needed. OLSR is an
optimization of a pure link state protocol for
MANET. First, it reduces the size of control
packets by creating only a subset of links with
its neighbors who are its multipoint relay
selectors instead of entire links, it minimizes
flooding of this control traffic by using only
the selected nodes, called multipoint relays
(MPR), to diffuse its message in the network.
This reduces the number of retransmissions in
MPR information declaration: routing
packet Database is required to build the intraforwarding, each broadcasts specific control
messages called Topology Control (TC)
messages. This message is sent periodically by
every node in the network to declare its MPR
Selector set. Each node of the network
maintains a topology table with information
about the topology of the network obtained
from the TC messages.
Routing table calculation: Each node
maintains a routing table. Because the routing
table is based on the information contained in
the neighbor table and the topology table, any
change in these tables leads to updating of
route information.
a flooding or broadcast procedure.
Figure 2: Multi point relays (b)
Only the MPRs of a node retransmit
the packet from the node .For this purpose,
each node maintains a set of its neighbors
which are called MPR Selectors of the node. It
is explained in the followed figure 2.
The protocol working includes:
Neighbor sensing: Each node regularly
broadcast its HELLO messages and their link
status to their neighbor. These control
messages are limited to single hop and allow
each node to understand the information of its
neighbor’s within a maximum of two hops.
Multipoint Relay selection: The MPR set
is calculated such that it contain a subset of
single hop neighbors along with their two hop
neighbors.
ISSN: 2231-5381
Figure 3: OLSR information repositories
relation overview
Figure 3 displays an overview of the
information repositories in OLSR and relations
to message processing, message generation
and route calculation [4].
OLSR has minimal latency, and is ideal
in density and large networks. OLSR can
easily be extended to QoS monitoring by
including bandwidth and channel quality
information in link state entries. Thus, the
quality of the path is known prior to
transmission.OLSR has high control overhead,
high computation, and complex to implement.
http://www.ijettjournal.org
Page 383
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 7- Dec 2013
2.3. Hybrid Routing
As seen previously, both pro-active
and reactive approaches for MANET have
their
disadvantages.
The
hybrid
routing
scheme, try to utilize advantage of both.
Normally, it use pro-active discovery within a
node’s local neighborhood, and using a
reactive protocol for communication between
these neighborhoods.
Figure 4: The different components of the ZRP
The proactive protocol offers better
performances for CBR (Constant Bit Rate)
2.3.1. Zone Routing Protocol (ZRP)
In [7], a hybrid routing, called Zone
Routing Protocol is proposed. ZRP divides
the topology into zones and seek to utilize
different routing protocols within and
between the zones based on the weaknesses
and strengths of these protocols. ZRP is
totally modular, meaning that any routing
protocol can be used within and between
zones.
ZRP refers to the locally proactive
routing component as the Intra-zone Routing
Protocol (IARP). The globally reactive
routing component is named Inter-zone
Routing Protocol (IERP). IERP and IARP
are not specific routing protocols.
Information about local zone of every
node can be used to reduce traffic when
global route discovery is needed. ZRP uses a
concept called bordercasting instead of
broadcasting packets.
Bordercasting
utilizes
the
topology
information provided by IARP to direct query
request to the border of the zone. The
bordercast packet delivery service is provided
by the Bordercast Resolution Protocol (BRP).
The performance evaluation in [11] shows that
the traffic load, the mobile node mobility and
the network density all have impact on the
performance of the routing protocol.
sources and it guaranties lowest delay and
jitter but consumes large bandwidth. And
when the mobility is low, the reactive protocol
performance is low. The hybrid ZRP is a
framework than a routing protocol, and it
depends on well-defined and robust routing
protocols to be utilized in and between the
zones. The need for ZRP might arise when the
basic protocols are well tested and their
limitations have been proven.
3. Conclusions
Mobile ad hoc networks is cluster of
mobile nodes which periodically transfers data
among them without depending on any
permanent base station or a fixed network for
an interactive backbone support, which makes
the wireless network a sensitive network to
handle. In this analysis, we examined the main
protocols and issues of routing in MANETs
and especially discussed the Unipath protocol.
However, there is a scope for many
other research opportunities have to be made
in routing protocol’s architecture. Among
those the primary goal is the inventing of the
dynamic routing protocol that can optimally
find routes between two nodes for
communication. In order to analyze and
improve existing or even better a new
MANET routing protocols, it is keen to
examine metrics like power factor, fault
tolerance, hop count and jitter in various
mobility and traffic models.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 384
International Journal of Engineering Trends and Technology (IJETT) – Volume 6 Number 7- Dec 2013
Reference
[1]
David B. Johnson, David A. Maltz, Josh Broch,
“DSR: The Dynamic Source Routing Protocol for
Multi-Hop Wireless Ad Hoc Networks,” Ad Hoc
Networking, Addison-Wesley, 2001:139~172.
[2]
[3]
David B. Johnson, David A. Maltz, “Dynamic
Source Routing in Ad hoc Wireless Networks”,
Mobile Computing. (1996) 153-181.
P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A.
Qayyum, L.Viennot, “Optimized Link State Routing
Protocol for Ad Hoc Networks,” Proceedings of the
5th IEEE Multi Topic Conference (INMIC 2001)
[4]
[5]
Andreas Tønnesen, “Implementing and extending the
Optimized Link State Routing protocol,” Master
thesis, 2004.
Charles E. Perkins and Elizabeth M. Royer. "Ad hoc
On-Demand Distance Vector Routing." Proceedings
of the 2nd IEEE Workshop on Mobile Computing
Systems and Applications, New Orleans, LA,
February 1999, pp. 90-100
[6]
Stephen Mueller, Rose P. Tsang, Dipack Ghosal.
“Multipath Routing in Mobile Ad Hoc Networks:
Issues and Challenges,” In Perfor-. mance Tools and
Applications to Networked Systems, vol-. ume 2965
[7]
of LNCS. Springer-Verlag, 2004
Nicklas Beijar, “Zone Routing
Protocol,”
http://www.tct.hut.fi/opetus/s38030/k02/ Papers/08Nicklas.pdf
[8]
Frederick Ducatelle, Gianni Di Caro, Luca Maria
Gambardella. “Ant Agents for Hybrid Multipath
Routing in Mobile Ad Hoc Networks,” Wireless Ondemand Network Systems and Services, 2005.
WONS 2005. Second Annual Conference ,19-21 Jan.
2005
[9]
Dynamic Source Routing, http://wiki.uni.lu/secanlab/Dynamic+Source+Routing.html
[10] Ad Hoc On-Demand Distance Vector Routing
Protocol, http://wiki.uni.lu/secan lab/Ad+Hoc+On
Demand+Distance+Vector+Routing+Protocol. html
[11] Salima Hamma, Eddy Cizeron, Hafiz Issaka, JeanPierre Guedon, “Performance evaluation of reactive
and proactive routing protocol in IEEE 802.11 ad
hoc network, Next Generation Communication and
Sensor Network 2006, Boston 2006.
[12] Marc R Pearlman, Zygmunt J Haas, Peter Sholander,
et al. Alernate Path Routing in Mobile Ad Hoc
Networks, Proc of IEEE INFOCOM 2002.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 385
Download