List of ad hoc routing protocols

An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network.

In ad hoc networks, nodes are not familiar with the topology of their networks. Instead, they have to discover it: typically, a new node announces its presence and listens for announcements broadcast by its neighbors. Each node learns about others nearby and how to reach them, and may announce that it too can reach them.

Note that in a wider sense, ad hoc protocol can also be used literally, to mean an improvised and often impromptu protocol established for a specific purpose.

The following is a list of some ad hoc network routing protocols.

Table-driven (proactive) routing

This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are:

  1. Respective amount of data for maintenance.
  2. Slow reaction on restructuring and failures.

Examples of proactive algorithms are:

On-demand (reactive) routing

This type of protocol finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are:

  1. High latency time in route finding.
  2. Excessive flooding can lead to network clogging.

Examples of on-demand algorithms are:

Hybrid (both proactive and reactive) routing

This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are:

  1. Advantage depends on number of other nodes activated.
  2. Reaction to traffic demand depends on gradient of traffic volume.

ads Examples of hybrid algorithms are:

Hierarchical routing protocols

With this type of protocol the choice of proactive and of reactive routing depends on the hierarchic level in which a node resides. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding on the lower levels. The choice for one or the other method requires proper attributation for respective levels. The main disadvantages of such algorithms are:

  1. Advantage depends on depth of nesting and addressing scheme.
  2. Reaction to traffic demand depends on meshing parameters.

Examples of hierarchical routing algorithms are:

References

  1. Chai Keong Toh Ad Hoc Mobile Wireless Networks, Prentice Hall Publishers, 2002. ISBN 978-0-13-007817-9
  2. C. Perkins, E. Royer and S. Das: Ad hoc On-demand Distance Vector (AODV) Routing, RFC 3561
  3. David Johnson, David Maltz, Yih-Chun Hu: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4, RFC 4728
  4. David B. Johnson, David A. Maltz: Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Thomasz Imielinski and Hank Korth (Editors), Vol. 353, Chapter 5, pp. 153–181, Kluwer Academic Publishers, 1996
  5. Yih-Chun Hu, David B. Johnson, David A. Maltz: Flow State in the Dynamic Source Routing Protocol Internet Draft, work in progress, June 2001.
  6. D. Djenouri, N. Badache. On Eliminating Packet Droppers in MANET: A Modular Solution, Ad hoc Networks Journal, Vol 7, Issue 6, pp 1243–1258, Elsevier Publisher, August 2009.
  7. Zygmunt J. Haas, Marc R. Pearlman, Prince Samar: The Zone Routing Protocol (ZRP) for Ad Hoc Networks, Internet Draft, work in progress, July 2002.
  8. 1 2 Mario Joa-Ng and I-Tai Lu. "A peer-to-peer two-level link state routing for mobile ad-hoc wireless network". The special issue on Wireless Ad Hoc Networks of IEEE JSAC, Vol. 17, No. 8, pp.1415-1425, Aug. 1999.
  9. M. Jiang, J. Li, Y. C. Tay: Cluster Based Routing Protocol (CBRP) Functional Specification, Internet Draft, work in progress, June 1999. Draft has expired.
  10. Maria Gerla, Guangyu Pei, Xiaoyan Hong, Tsu-Wei Chen: Fisheye State Routing Protocol (FSR) for Ad Hoc Networks, Internet Draft, work in progress, June 2001. Draft has expired.

Further reading

This article is issued from Wikipedia - version of the 11/26/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.