A Comparative Study OF Routing Protocols IN Mobile Ad-hoc Network Neha Pharswan1, Prof. Dr. (Mrs.) Rama Sushil2 1 Department of Computer Science and Engineering, DIT University, Dehradun, Uttarakhand nehapharswan.86@gmail.com 2 Professor, Department of Computer Science & Application, DIT University, Dehradun, Uttarakhand ramasushil@yahoo.co.in Abstract: Mobile Ad hoc Networks (MANET) are a kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration. Due to the diverse applications it is an interesting current research area. There are different current research area in MANET are routing, synchronization, power consumption etc. This paper concentrates on routing protocols which is the most challenging issue due to the dynamic topology of ad hoc networks. There are different strategies proposed for efficient routing which claimed to provide improved performance. It is a kind of challenge and quite difficult to determine which protocol is best suitable protocol for different network conditions. This paper provides an overview of different routing protocols proposed in literature. I. Multi-hop radio relaying- When a source node and destination node for a message is out of the radio range, the MANETs are capable of multi-hop routing. Distributed nature of operation for security, routing and host configuration. A centralized firewall is absent here. The nodes can join or leave the network anytime, making the network topology dynamic in nature. Mobile nodes are characterized with less memory, power and light weight features. The reliability, efficiency, stability and capacity of wireless links are often inferior when compared with wired links. This shows the fluctuating link bandwidth of wireless links. Introduction A mobile ad hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated to its own use, and therefore be a router. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route traffic. Such networks may operate by themselves or may be connected to the larger Internet. MANETs are a kind of Wireless ad hoc network that usually has a routable networking environment on top of a Link Layer ad hoc network. In recent years MANET has gained popularity and lots of research is being done on different aspects of MANET. It is an infrastructure less network having no fixed base stations MANET is characterized by dynamic topology low bandwidth and low power consumption. All the nodes in the network are moving i.e. topology of the network is dynamic so the nodes can act both as host as well as router to route information unnecessary for its use. II. Characteristics of MANET In MANET, each node acts as both host and router. That is it is autonomous in behavior. III. Routing Protocols Routing protocols define a set of rules which governs the journey of message packets from source to destination in a network. In MANET, there are different types of routing protocols each of them is applied according to the network circumstances. Basic classification of routing protocols is: 1. Reactive Routing Protocol: Reactive routing protocol is also known as on demand routing protocol. In this protocol route is discovered whenever it is needed Nodes initiate 0route discovery on demand basis. Source node sees its route cache for the available route from source to destination if the route is not available then it initiates route discovery process. The on- demand routing protocols have two major components. Route discovery: In this phase source node initiates route discovery on demand basis. Source nodes consults its route cache for the available route from source to destination otherwise if the route is not present it initiates route discovery. The source node, in the packet, includes the destination address of the node as well address of the intermediate nodes to the destination. Route maintenance: Due to dynamic topology of the network cases of the route failure between the nodes arises due to link breakage etc, so route maintenance is done. Reactive protocols have acknowledgement mechanism due to which route maintenance is possible Reactive protocols add latency to the network due to the route discovery mechanism. Each intermediate node involved in the route discovery process adds latency. These protocols decrease the routing overhead but at the cost of increased latency in the network. Hence these protocols are suitable in the situations where low routing overhead is required. There are various well known reactive routing protocols present in MANET for example DSR, AODV and DYMO. Dynamic source routing (DSR) is based on source routing where the source specifies the complete path to the destination in the packet header. All intermediary nodes along the path simply forwards the packet to the next node as specified in the packet header. This means that intermediate nodes only need to keep track of their neighboring nodes to forward data packets. The source on the other hand, needs to know the complete hop sequence to the destination. This eliminates the need for maintaining latest routing information by the intermediate nodes as in DSDV. In DSR, all nodes in a network cache the latest routing information. When more than one route to the destination is found, the nodes cache all the route information so that in case of a route failure, the source node can look up their cache for other possible routes to the destination. If an alternative route is found, the source node uses that route; else the source node will initiate route discovery operations to determine possible routes to the destination. During route discovery operation, the source node floods the network with query packets. Only the destination or a node which already knows the route to destination can reply to it, hence avoiding the further propagation of query packets from it. If a broken link is detected by a node, it sends route error messages to the source node. The source node on receiving error messages will initiate route discovery operations. Unlike DSDV, there are no periodically triggered route updates. Ad Hoc On-Demand Distance Vector (AODV) routing protocol shares DSR’s on demand characteristics in that it also discovers routes on an “as needed’’ basis via a similar route discovery process. However, AODV adopts different mechanism to maintain routing information. It uses traditional DSDV routing tables, with one entry per destination. AODV uses sequence numbers maintained at each destination to determine whether the routing information is latest and up to date and to prevent looping of packets across routes. Just like DSDV, during route discovery AODV floods broadcast route request packets to its neighboring nodes. Each route request contains the source node id, the destination node id, the sequence numbers of the source and the destination, the hop count and the broadcast id. Every time a route discovery operation is initiated, the source sequence number is incremented. AODV depends on sequence numbers to avoid count to infinity problem. Like DSR, a response message is generated once the request packet reaches the destination or a node which knows the route to the destination. This response message contains the latest route information from the source to the destination. AODV also has a feature called "precursor list" maintained by every node. It contains the list of neighbor nodes that are most likely to use the current node for routing packets. Routing table entry of every node contains a list of predecessor nodes that most likely to use that entry to route data packets. This becomes essential when a broken link is encountered. On encountering such broken links, all the predecessor nodes will be notified with route error messages. DYMO(Dynamic MANET On Demand) routing protocol has been proposed by Perkins & Chakeres as advancement to the existing AODV protocol. It is also defined to as successor of AODV and keeps on updating till date. DYMO operates similar to its predecessor i.e. AODV and does not add any extra modifications to the existing functionality but operation is moreover quite simpler. DYMO is a purely reactive protocol in which routes are computed on demand i.e. as and when required. Unlike AODV, DYMO does not support unnecessary HELLO messages and operations purely based on sequence numbers assigned to all the packets. It is a reactive routing protocol that computes unicast routes on demand or when required. It employs sequence numbers to ensure loop freedom. It enables on demand, multi-hop unicast routing among the nodes in a mobile ad hoc network. The basic operations are route discovery and maintenance. Route discovery is performed at source node to a destination for which it does not have a valid path. And route maintenance is performed to avoid the existing obliterated routes from the routing table and also to reduce the packet dropping in case of any route break or node failure. Basic DYMO protocol shows in a figure. 2. Proactive Routing Protocol: Proactive routing protocols are also called as table driven routing protocols. In this every node maintain routing table which contains information about the network topology even without requiring it. This feature although useful for datagram traffic, incurs substantial signaling traffic and power consumption. The routing tables are updated periodically whenever the network topology changes. Proactive protocols are not suitable for large networks as they need to maintain node entries for each and every node in the routing table of every node. These protocols maintain different number of routing tables varying from protocol to protocol. There are various well known reactive routing protocols present in MANET for example DSDV and OLSR. Destination sequenced distance vector (DSDV) routing protocol is table driven protocol based on the Distributed Bellman Ford Algorithm. In DSDV, each node maintains a routing table which contains an entry for destination node in the network. The routing table contains entries such as the next hop address, metric or the number of hop counts, and the sequence number. Sequence numbers are assigned by destination node for identification of the routes. DSDV tags each route with a sequence number and considers a route X more favorable than Y if X has a greater sequence number, or if the two routes have equal sequence numbers but X has a lower metric. This was done so that the routing tables have the latest updated path. The sequence number for a route is updated every time a new route discovery is initiated. When a broken link is encountered, the sequence number is set to infinity and it is broadcasted to all the nodes so that the routing tables of the node containing the broken link can be updated to infinity and the link is discarded. The sequence number of every route is assigned by the destination and it is incremented for every route discovery operation. Thus in case of mobile ad-hoc networks, the sequence numbers enable DSDV to maintain up to date routing information at the nodes ensuring the consistency of routing data across all routing tables. Both periodic and triggered route updates are initiated by DSDV to maintain consistency of routing information. In case of periodic updates, fresh route discovery operations are initiated after the elapse of fixed interval of time. Triggered route updates are initiated whenever a node encounters a broken link which can be a result of sudden network topology change or communication link failure. Optimized Link State Routing Protocol (OLSR) is an IP routing protocol optimized for mobile ad hoc networks, which can also be used on other wireless ad hoc networks. OLSR is a proactive link- state routing protocol, which uses hello and topology control (TC) messages to discover and then disseminate link state information throughout the mobile ad hoc network. Individual nodes use this topology information to compute next hop destinations for all nodes in the network using shortest hop forwarding paths. Link-state routing protocols such as Open Shortest Path First (OSPF) and ISIS elect a designated router on every link to perform flooding of topology information. In wireless ad hoc networks, there is different notion of a link, packets can and do go out the same interface; hence, a different approach is needed in order to optimize the flooding process. Using Hello messages the OLSR protocol at each node discovers 2-hop neighbor information and performs a distributed election of a set of multipoint relays (MPRs). Nodes select MPRs such that there exists a path to each of its 2-hop neighbors via a node selected as an MPR. These MPR nodes then source and forward TC messages that contain the MPR selectors. This functioning of MPRs makes OLSR unique from other link state routing protocols in a few different ways: The forwarding path for TC messages is not shared among all nodes but varies depending on the source, only a subset of nodes source link state information, not all links of a node are advertised but only those that represent MPR selections. Since link-state routing requires the topology database to be synchronized across the network, OSPF and IS-IS perform topology flooding using a reliable algorithm. Such an algorithm is very difficult to design for ad hoc wireless networks, so OLSR doesn't bother with reliability; it simply floods topology data often enough to make sure that the database does not remain unsynchronized for extended periods of time. Proactive protocols also has various advantages and disadvantages, being table driven protocols they increase the control messages in the network due which message overhead in the network increases .But at the same time due to routing information already present latency is reduced in the network. Proactive approaches also suffer from either out of date states or flooding of periodic updates. IV. Parametric comparison Parameters Routing philosophy Routing scheme Routing overhead Latency Scalability level Availability of routing information Periodic updates Storage capacity Mobility support Reactive Protocol Flat On demand Low High due to flooding Not suitable for large network Available when required Proactive Protocol Flat/Hierarchical Table driven High Low due to routing tables Low Not needed as route available On demand Low generally Depends upon the number of routes Route maintenance Yes. Whenever the topology of the network changes High ,due to the routing tables Always available stored in tables Periodical updates V. Conclusion Wireless mobile ad-hoc network has very enterprising applications in today’s world. With fast growing technology mobile laptop computers and wireless hardware costs are becoming very affordable. There is increasing use of wireless devises. The field of mobile ad-hoc networks is very vast and there are various challenges that need to be met, so these networks are going to have widespread use in the future. Reactive and Proactive protocols are active research area in the field of ad-hoc mobile network. There are still lots of simulations to be done in this promising field. VI. Future Work: In future, we intend to design an optimized protocol, for a specific area of application e.g. for battlefield a protocol could be designed with basic MANET needs, and Maximum life time data gathering approach, customized for AODV routing or OLSR routing. References: [1] Robinpreet Kaur & Mritunjay Kumar Rai. “A Novel Review on Routing Protocols in MANETs”. Undergraduate Academic Research Journal (UARJ), ISSN: 227 –1129, Volume-1, Issue-1,2012. [2] Charles E.Perkins and Elizabeth M. Royer, “Ad hoc on demand distance vector (AODV) routing (Internet-Draft)”,Aug-1998. [3] Tarek Sheltami and Hussein Mouftah “Comparative study of on demand and Cluster Based Routing protocols in MANETs”, IEEE conference, pp. 291-295, 2003. [4] Krishna Gorantala , “Routing Protocols in Mobile Ad-hoc Networks”, A Master’ thesis in computer science, pp-1-36, 2006. [5] Anuj K. Gupta, Harsh Sadawarti and Anil K.Verma. “IMPLEMENTATION OF DYMO ROUTING PROTOCOL”. International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.2, May 2013 [6] Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma, “Review of various Routing Protocols forMANETs”, International Journal of Information & Electronics Engineering (IJIEE), ISSN: 1109- 2742, Article No. 40, 1(3): 251-259, November 2011. [7] Williams Su, Sung-Ju Lee and Mario Gerla, “Mobility prediction and routing in ad hoc wireless networks”, International journal of network management, 2001; 11:3-30 [8] Padmini Misra, “Routing Protocols for ad hoc mobile wireless Networks”, http://www.cse.ohio-state.edu /~jain/cis78899/ftp/adhoc_routing/#TDRP, Nov-1999. [9] Gurpreet Singh Saini, Priyanka Dubey, Md Tanzilur Rahman. Review Study For InterOperability Of ManetProtocols In Wireless Sensor Networks. International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 6–May 2013 ISSN: 2231 [10] Elizabeth M. Royer “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks” University of California, Santa Barbara Chai-Keong Toh, Georgia Institute of Technology, IEEE Personal Communications, pp. 46-55, April 1999. [11] Abdellah Jameli, Najib Naja and Driss ElOuadgiri “Comparative Analysis of Ad Hoc Networks Routing Protocols For Multimedia Streaming”, IEEE, 1999. [12] T.G.Basavaraju and Subir Kumar Sarkar, “Ad-hoc Mobile Wireless Networks: Principles,Protocols and Applications ”, Auerbach Publications, 2008. [13] Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma, “Performance Analysis of MANET Routing Protocols in Different Mobility Models”, International Journal of Information Technology and Computer Science (IJITCS), ISSN: 2074-9015, 5(6): 73-82, May 2013. [14] A. Boukerche, B. Turgut, N. Aydin, M. Z. Ahmad, L. Bölöni, and D.Turgut, “Routing protocols in ad hoc networks: A survey,” “Elsevier Computer Networks”, 55 (2011) 3032 - 3080. [15] Shailender Gupta, Chirag Kumar, Seema Rani and Bharat Bhushan, “Performance comparison of routing protocols using different mobility models”, IJMECS, vol. 4, no. 8, pp. 54-61, 2012.