List of ad hoc routing protocols explained

An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad hoc network.

In ad hoc networks, nodes are not familiar with the topology of their networks. Instead, they have to discover it: typically, a new node announces its presence and listens for announcements broadcast by its neighbors. Each node learns about others nearby and how to reach them, and may announce that it too can reach them.

Note that in a wider sense, ad hoc protocol can also be used literally, to mean an improvised and often impromptu protocol established for a specific purpose.

The following is a list of some ad hoc network routing protocols.

Table-driven (proactive) routing

This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are:

  1. Respective amount of data for maintenance.
  2. Slow reaction on restructuring and failures.

Examples of proactive algorithms are:

On-demand (reactive) routing

This type of protocol finds a route on demand by flooding the network with Route Request packets. The main disadvantages of such algorithms are:

  1. High latency time in route finding.
  2. Excessive flooding can lead to network clogging.

Examples of on-demand algorithms are:

Hybrid (both proactive and reactive) routing

This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are:

  1. Advantage depends on number of other nodes activated.
  2. Reaction to traffic demand depends on gradient of traffic volume.

Examples of hybrid algorithms are:

Hierarchical routing protocols

With this type of protocol the choice of proactive and of reactive routing depends on the hierarchic level in which a node resides. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding on the lower levels. The choice for one or the other method requires proper attributation for respective levels. The main disadvantages of such algorithms are:

  1. Advantage depends on depth of nesting and addressing scheme.
  2. Reaction to traffic demand depends on meshing parameters.

Examples of hierarchical routing algorithms are:

See also

References

  1. [Chai Keong Toh]
  2. C. Perkins, E. Royer and S. Das: Ad hoc On-demand Distance Vector (AODV) Routing, RFC 3561
  3. David Johnson, David Maltz, Yih-Chun Hu: The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks for IPv4, RFC 4728
  4. Book: 10.1007/978-0-585-29603-6_5. Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing. 353. 153–181. The Kluwer International Series in Engineering and Computer Science. 1996. Johnson. David B.. Maltz. David A.. 978-0-7923-9697-0.
  5. 10.1016/j.adhoc.2008.11.003. On eliminating packet droppers in MANET: A modular solution. Ad Hoc Networks. 7. 6. 1243–1258. 2009. Djenouri. Djamel. Badache. Nadjib.
  6. 10.1109/49.779923. A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications. 17. 8. 1415–1425. 1999. Joa-Ng. M.. i-Tai Lu.

Further reading