Wide Range Of Routing Solutions Computer Science Essay

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

2.1 Introduction

A wide range of routing solutions has been proposed for mobile ad hoc networks. This chapter presents a survey of some of the important and widely used routing algorithms for mobile ad hoc networks. The routing algorithms in a mobile ad hoc network are classified into a variety of categories like flat, hierarchical, source-based, multi-path, power-aware, hybrid and location-based. As the number of surveys that study different routing-algorithm categories is quite wide, a limited but number of these surveys has been selected and reviewed in this work. This survey offers a comprehensive review of these categories of routing algorithms.

The early stages of development of mobile ad hoc routing protocols were designed on the basis of Bellman ford algorithm to control the network traffic. Various algorithms have been proposed among whom DSDV, AODV & DSR were the major ones. A large number of routing algorithms have been proposed as extensions to these basic routing algorithms to enhance the performance and to overcome the problems associated with these networks like flooding, large power consumption, load balancing, and interference etc. This chapter also covers the features of these routing algorithms and the techniques to enhance their performance.

2.2 Routing protocols

A routing protocol is a mechanism by which the network traffic is directed and transported through the network from source to destination. In addition to this, these routing protocols may need to provide different levels of Quality of Service (QoS) to support different types of applications and users. In traditional wired networks two main conventional algorithmic strategies were mainly used: link-state and distance vector algorithms. In link-state routing, each node maintains up-to-date information of the network by periodically broadcasting the link-state costs of its neighbouring nodes to all other nodes using flooding technique. When each node receives an update packet, they update their link-state information by applying a shortest-path algorithm to choose the next hop node for each destination.

In a distance-vector routing, for every destination d, each node n maintains a set of distances D for all of its neighbours. Node n selects a neighbour node m to be the next hop if it follows the shortest path from n to m. The distance-vector information is updated periodically at each node. But these two algorithmic approaches do not perform well in large MANETs because periodic route updates in large networks may consume a large of the available bandwidth and increase channel contention. Also each node is required to recharge its power supply very frequently.

To overcome the problems associated with the link-state and distance-vector algorithms a number of routing protocols have been proposed. These Routing Protocols are broadly classified into two categories: flat routing and hierarchical routing. There are further two classes in flat routing: reactive (on-demand) and proactive (table-driven). The protocols that are a combination of both reactive and proactive characteristics are referred to as hybrid, which are based on hierarchical routing. The table-driven or global ad hoc routing approach is similar to the connectionless approach of forwarding packets, with no regard to when and how frequently routes are desired. But this is not in the case of on-demand routing protocols. In that, whenever a node desires a route to a new destination, it will have to wait until the route is discovered. Unlike the table-driven approach where the routing information is constantly propagated and maintained, here a route to every other node is always available throughout the network, regardless of whether it is required or not. Figure 2.1 provides a brief outline of different routing protocols for proposed for MANETs. The accompanying table 2.1 shows the evolution of ad hoc routing protocols in chronological manner.

2.3 Proactive Routing Protocols

In proactive protocols the topological information is exchanged among all the nodes in a network. Thus, when there is a need for a route to a destination, such route information is available immediately. These protocols require each node to keep up to date routing information in different tables and to propagate updates throughout the network. As such these protocols are often called as table-driven. Periodic route updates are exchanged in order to synchronize the tables. These protocols try and maintain valid routes to all communication mobile nodes all the time before a route is actually desired. To achieve this, control messages are transmitted amongst the nodes periodically. These protocols are not bandwidth efficient because of the control messages that are broadcasted even when there is no actual data flow. However, these protocols differ in the way routing information is updated and detected, the number of routing tables used, the type of information stored in each table and the changes that are periodically broadcasted in the network. This class of routing protocols has its own advantages and disadvantages. One of its main advantages is the fact that nodes can easily get routing information and it’s easy to establish a session. The disadvantage is too much data stored by the nodes for route maintenance and it is slow to restructure when there is a failure in a particular node link.

Some of the existing proactive routing protocols are:

Destination Sequenced Distance-Vector Routing Protocol (DSDV)

Optimized Link State Routing Protocol (OLSR)

Wireless Routing Protocol (WRP)

Source Tree Adaptive Routing (STAR)

Cluster Switch Gateway Routing (CGSR)

Gateway Switch Routing (GSR)

Fisheye State Routing (FSR)

2.3.1 DSDV

Perkins and Bhagwat[] have proposed some modifications to the traditional Bellman-Ford routing mechanism, thus making it suitable for mobile ad hoc networks. This protocol work on the distance vector routing technique, thus named as Destination Sequenced Distance Vector routing protocol. All the processes of route discovery and data transfer are done through sequence numbers assigned to each and every packet that move from source node to destination node. One of the major problems of the previous Bellman-Ford algorithm was loop formation in case of broken links and changing topology. Different ways have been described and some revisions were proposed to provide MAC layer support for MANETs. In this protocol, routing tables are formed at each node which contains all the available information regarding nodes. The data is transferred with the help of a sequence number that is initiated by the destination node. Each node keeps on sending updates as soon as there is any change in the location, topology, etc. in the network. Before the actual data transfer each node advertises itself to its neighbouring nodes and shares its routing table. This helps a mobile node in data exchange with other nodes even if the destination is not within its range. When the packet is sent from source node it contains destination address, number of hops required and sequence number. Routes with recent sequence number are always preferred. In the case that two routes have a same sequence number, the one with a better cost metric is preferred. One important modification was responding to topology change which may cause link failures. Link breaks as nodes move from one location to other. In DSDV, a link failure is described by ∞ (infinity). Whenever any node detects a link to its next node as broken, it immediately assigns ∞ and updates the sequence number. When any node receives a ∞, it issues a route update message and broadcast it to all the nodes following that route. So, the DSDV protocol guarantees loop-free routes to every destination as it provides only a single path to a destination which is selected using shortest path routing. In order to minimize the overhead caused in routing DSDV uses two types of packets – full dump and incremental. The full dump carries all the available information about routing whereas incremental only carries the changed information since the last full dump. But still DSDV incurs large amounts of overhead due to update messages which are periodically sent by the nodes. So this protocol does not scale well in large size networks since a large part of the available bandwidth is wasted in sending update messages only. An alternative is to propose a technique that performs routing operations as and when needed i.e. on-demand.

Hu, Johnson and Perrig presented SEAD (Secure Efficient Ad hoc Distance vector routing), a lightweight secure routing protocol based on DSDV. The same authors present Ariadne which is a secure on-demand routing protocol based on DSR. The main difference between these two systems is that SEAD authenticates messages in each hop while Ariadne operates on an end-to-end basis.

2.3.2 WRP

Murthy and Garcia[]proposed Wireless Routing Protocol based on familiar Bellman-Ford algorithm. It works similar to DSDV in which each node maintains a routing table that contains an entry for each destination with the next hop and cost. Next hop is used to select the immediate neighbor node for forwarding packets. In addition to DSDV, link costs are also stored in a separate table. All the tables keep on updating themselves as the topology changes with the help of HELLO messages but only the recent path updation is considered instead of whole routing table to send data. The main goal is maintaining routing information among all nodes in the network regarding the shortest distance to every destination. Each node in the network uses a set of four tables to maintain more accurate information:

Distance table (DT)

Routing table (RT)

Link-cost table (LCT)

Message retransmission list (MRL) table

DT contains network view of the neighbours of a node. RT contains the up-to-date view of the network for all identified destinations. LCT contains the cost required to relay messages through each link. MRL table contains an entry for every update that is to be retransmitted and also maintains a counter for that. Each entry contains a sequence number, a retransmission counter, an acknowledgment and a list of updates sent in the update message. It also records which neighbours should acknowledge the retransmission. Creating and maintaining a number of tables bear an extra overhead at each node if the size of network keeps on increasing. Also WRP has one more drawback of sending empty HELLO messages to keep the links updated which consume a significant amount of bandwidth and power at each node. WRP belongs to the class of path-finding algorithms with an important exception. It counters the "count-to-infinity" problem by forcing each node to perform consistency checks of predecessor information reported by all its neighbours. This eliminates looping situations and enables faster route convergence when a link failure occurs.

2.3.3 OLSR

Clausen et al. designed the Optimized Link State Routing protocol which was an improvement to the traditional link state protocols through few optimizations concerned with MANETs. OLSR is a point to point routing protocol which optimizes the network by focusing on specially selected nodes called multipoint relays (MPR). Only these nodes are capable of forwarding the messages during route discovery process. This in turn reduces the number of messages broadcasted thus minimizes the routing overhead. Also only MPRs generate the link state information and share this information with other MPRs. OLSR aims to minimize the flooding within the network as each node does not have to forward data to all of its neighbours.. It can forward to its respective MPR which can further forward it on the route established. Only MPRs broadcasts the packets. MPRs are chosen on the criteria that they are attached with maximum number of nodes so that least number of packets may be broadcasted. During each update a node selects a set of neighbours to forward its packet. This set is called MPR of that node. All the nodes which are outside this set can only read and process each packet they receive but cannot forward it. OLSR is based on the following three mechanisms:

neighbour sensing

efficient flooding

computation of an optimal route using the shortest-path algorithm

Neighbour sensing is the detection of changes in the neighbourhood of node. MPR strategy decreases the flooding overhead in contrast with full flooding because it only retransmits a broadcast packet if it is received from a node for which it is located in the MPR set. Further receptions of the same packet are dropped. Every node determines an optimal path to every destination and stores this information in a routing table. The path to every destinations node is available as and when the when data transmission begins and remains valid for a specific period of time till the information is expired.

2.3.4 Summary

In proactive protocols the topological information is exchanged among all the nodes in a network. In contrast to source initiated routing, table driven routing has extensive precedents in the research done for routing in the wired domain. Also wired routing protocols have inspired their own classes of protocols in table driven ad hoc routing. One of these classes is the distance vector protocols where the nodes maintain only a local topology, and use the distributed Bellman-Ford algorithm to maintain the routing tables, the other class of protocols is the link state routing protocols, where the routers exchange full topology information, and then use a graph-theoretic shortest path algorithm (Dijkstra’s) on the resulting graph. However, these protocols differ in the way routing information is updated and detected, the number of routing tables used, the type of information stored in each table and the changes that are periodically broadcasted in the network. This class of routing protocols has its own advantages and disadvantages. One of its main advantages is the fact that nodes can easily get routing information and it‘s easy to establish a session. The disadvantage is too much data stored by the nodes for route maintenance and it is slow to restructure when there is a failure in a particular node link. Table 2.2 shows the comparison of some of the existing proactive routing protocols.

2.4 Reactive Routing Protocols

The reactive or on-demand routing protocols are based on Query-Reply topology in which they do not attempt to continuously maintain the up-to-date topology of the network. When a route is desired, a procedure is invoked to find a route to the destination node. Such a procedure requires some sort of flooding the network with the route query. Their major goal is to minimize the network traffic overhead. The common elements in reactive protocols are the mechanisms used for discovering and maintaining routes. The source node emits a request message for requesting a route to the destination node. This message is then flooded, i.e. forwarded by all nodes in the network, until it reaches the destination. The path followed by the request message is recorded and returned to the sender by the final destination, or by intermediate nodes with sufficient topological information. Thus there exist multiple reply messages which yield to multiple paths from source to destination node, of which the shortest is chosen. No periodic updates are required for these protocols but the routing information is only available when needed. However, this class of routing protocols is bandwidth efficient as compared to its counterpart i.e. proactive. Route is built as and when it is desired by sending route requests across the network. But still there are few disadvantages with this class also. One of them is that a large amount of time is wasted finding routes. The other disadvantage is in case of excessive flooding, there might be a possibility of network clog.

Some of the existing reactive routing protocols are:

Dynamic Source Routing Protocol (DSR)

Ad Hoc On-Demand Distance Vector Routing Protocol (AODV)

Dynamic MANET On-demand routing protocol (DYMO)

Temporally-Ordered Routing Algorithm (TORA)

Cluster Based Routing Protocol (CBRP)

Associativity Based Routing (ABR)

Location Aided Routing (LAR)

2.4.1 AODV

Perkins and Royer (1996) have proposed Ad hoc on demand distance vector routing protocol (AODV). It is an enhancement of their previous work i.e. DSDV routing protocol developed in 1994 with an aim to reduce the unnecessary broadcasts. It performs excellently in case of unicast and multicast routing and scale well to large size networks. The main focus was to limit the broadcasting of messages to neighbour nodes by discovering new routes reactively besides keeping all the information in routing tables as in the case of simple distance vector routing. AODV works on two procedures: route discovery and route maintenance. Before sending any packet towards the destination, the source node first consults its routing table to confirm a valid route to the destination node. If the node exists, the packets are forwarded to the immediate next neighbour on the path to destination. Otherwise, a route discovery is initiated by the sender node. In route discovery process, a route request RREQ packet is forwarded to immediate neighbouring nodes and the process continues till the packet reaches a node with a valid route to destination or the destination node itself. In return, the intermediate nodes send back route reply RREP packet, only if it contains the sequence number greater than or equal to the number already contained in the RREQ packet. All the process is recorded in the form of a routing table at each node which contains the address of neighbouring nodes which first send the packet. Figure 2.2 shows the complete process of route discovery.

Each node can get to know its neighborhood by using local broadcasts, so-called HELLO messages. Nodes neighbours are all the nodes that it can directly communicate with. Although AODV is a reactive protocol it uses these periodic HELLO messages to inform the neighbours that the link is still alive. The information contained in the routing table is used to back track the path established. The process is similar to route discovery. In this the destination node sends RREP to its immediate next node on the path and the links are maintained till packet reaches the source node. However, route maintenance is required in case the destination or any intermediate node changes its position. In such case a special message link failure notification is send to each of the upstream nodes for ensuring a valid existing route. If the node is not reachable, another path is discovered with the help of RREQ messages. The moment packet reaches the source node route discovery is again initialized for next transfer. The main advantage of AODV is that it is adapted to highly dynamic networks, however extra delays may occur during route discovery and link failure, and thereby consumes more bandwidth. The main drawback of AODV is that it does not repair a broken path locally. Whenever a link breaks, the source and destination nodes are notified about it. The source node then reestablishes the route with destination. Also AODV does not provide any type of security. Zapata et al. applied some security extensions to AODV using one-way hash functions to serve metric fields during route discovery.

2.4.2 DSR

Johnson et al. have proposed a simple but very efficient protocol specifically designed for MANETs called Dynamic Source Routing protocol. It was developed at Carnegie Mellon University and is based on source routing scheme used in LANs. It was basically designed to restrict the unnecessary bandwidth consumption by eliminating the periodic routing updates as in distance vector algorithms. DSR is beacon-less which allows loop-free routing of packets and all the information about routing is stored in a buffer called cache. It is based on two procedures of route discovery and route maintenance which work collaboratively in discovering new routes and maintaining those routes as shown in figure 2.3.

DSR is purely on-demand i.e. the routes are formed as and when there is any transfer of information between the nodes. The route can be discovered automatically by the source node to any destination in a network. In the route discovery process, the source node transmits a Route Request packet, on the route that identifies the target. Upon receiving the Route Request, the nest node retransmits the request further towards the target node. Also it returns a Route Reply to the source node. DSR also allows piggy-backing of a data packet which sends the data packet with Route Request message itself. Each and every packet contains a complete sequence of nodes through which the packet must travel. This information about the nodes list is declared in the packet header sent by source. The packet then travels through the nodes until it reaches the destination. Whenever a node detects a new route to some destination it immediately adds it into its cache. In addition to this each node also takes care of the sequence number which uniquely represents the requests sent by any node. DSR assumes the route as the shortest that the first packet has travelled from source node to destination. Route reply packet is sent back to the source which contains the complete route information form source to destination. The source node then stores this route information in its cache. Maintaining a route cache in every node allows any particular node to react to any routing changes quickly as a node having multiple routes to a destination can easily switch to another route if one link fails. Thus it reduces the amount of overhead generated by avoiding performing a new route discovery each time a route fails. DSR enables the mobile nodes to automatically form a complete self-configuring and self-organizing network among themselves. In route maintenance phase two types of packets have been used: route error (RERR) and route acknowledgment (RACK). Acknowledgements are used to ensure the validity of existing routes. A RERR message is generated only in case of transmission problems that is when a node fails to receive the RACK back. The RERR packet is sent to the source node to initiate a new route discovery process. The node then removes all the entries from its cache that are using the broken route. So, DSR has an advantage that nodes can store multiple routes in their route cache which is very favourable in network with low mobility. Another advantage of DSR is that it does not require any periodic beaconing so nodes can easily enter into sleep node to conserve their battery life which in turn helps in conserving a considerable amount of network bandwidth. Besides this DSR has some disadvantages like the route maintenance mechanism cannot locally repair a broken links, stale route cache information could also result in inconsistencies during route discovery phase, connection setup delay is higher and the overall performance degrades rapidly with increase in mobility.

2.4.3 TORA

Park and Corson developed the Temporary Ordered Routing Algorithm (TORA) which was based on the concept of link reversal routing. The protocol was specifically designed to combat the problem of link failures. TORA is an adaptive and scalable protocol that operates in a highly dynamic mobile network by discovering multiple routes from source to destination. The term link reversal deals with effectively searching for alternative routes. The protocol operates on these basic functions: route creation, route maintenance and route erasure. In first two functions the nodes use a special metric to build a Directed Acyclic Graph (DAG). The metric considered is ‘height’ for calculating the height of each neighbour node. DAG is built as follows: initially the source node broadcasts a route request message to all its neighbours to discover a route to the destination node. This message is rebroadcasted until DAG is completely built. On receiving route request message, each node broadcasts its height to its neighbouring nodes. Figure 2.4 represents the DAG created during route discovery procedure in TORA. The arrows represent edges of graph and dotted arrows are the height of source node S, ht.

Every link is assigned a direction, upstream or downstream based upon the relative heights of neighbouring nodes. The link with null height is declared as unfit for use. Route erasure is enabled only when any node detects a partition in the network. When the neighbouring nodes are informed of this thing they immediately set their heights to null and all the links associated with them become undirected. These three functions are accompanied using three unique control packets namely query, update and clear. TORA assumes the links to be freed from loops. At any given time no two nodes can deny on the link direction assigned to the link. TORA is a loop free and distributed protocol and works well in handling network partitions. It is basically designed to minimize the reaction of nodes in case of any topology change. It provides number of routes from source to destination route and improves the speed of rebuilding the routes.

2.4.4 DYMO

Dynamic Manet On demand routing protocol (DYMO) has been proposed by Perkins and Chakeres as ad advancement to the existing AODV protocol developed by Perkins et al. DYMO is a purely reactive protocol in which routes are computed on demand i.e. as and when required. It is a descendant of AODV protocol, and can act both as proactively as well as reactively. It extends AODV with source route path accumulation feature of DSR. We can say that DYMO is a combination of AODV with DSR. It is based on AODV structure but works on the mechanism of DSR. The basic operations of the DYMO protocol are route discovery and route management. During route discovery, the originating node initiates dissemination of a Route Request (RREQ) throughout the network to find the target node. When the target node receives the RREQ, it responds with a Route Reply (RREP) unicast toward the originating node. When the originating node receives the RREP, routes have then been established between the originating node and the target node in both directions. RERR is sent to the packet source to indicate the current route is broken. Once the source receives the RERR, it can perform route discovery. DYMO uses sequence numbers as they have been proven to ensure loop freedom. In addition, DYMO protocol can be used both in IPv4 and IPv6 network and people may use it to connect with the Internet. It can adapt to changes of the network topology, and establish a unicast route between the target node and the originating node.

As DYMO routing protocol is successor to the popular Ad hoc On-Demand Distance Vector routing protocol, it shares many of its benefits. DYMO protocol has the similar basic functions and operations to AODV. As a reactive protocol, DYMO does not explicitly store the network topology. Instead, nodes compute a unicast route towards the desired destination only when needed. As a result, little routing information is exchanged, which reduces network traffic overhead and thus saves bandwidth and power. DYMO is applicable to memory constrained devices. AODV supports unicast, multicast and broadcast. The DYMO only supports unicast routing established between the on-demand nodes in the network [36]. DYMO routing protocol with excellent performance is simple, compact, easy to implement and highly scalable characteristics, and is a very promising protocol.

2.4.5 Summary

Reactive routing is best adapted to the most challenging incarnations of the ad hoc networks. Their major goal is to minimize the network traffic overhead. The baseline for this class of protocols is set by AODV and DSR; both of them have several independent implementations for various operating systems. DYMO protocol is a successor of AODV which is based on the concept of source routing in which routing tables are maintained at each and every node unlike AODV. The common elements in reactive protocols are the mechanisms used for discovering and maintaining routes. The source node emits a request message for requesting a route to the destination node. This message is then flooded, i.e. forwarded by all nodes in the network, until it reaches the destination. The path followed by the request message is recorded and returned to the sender by the final destination, or by intermediate nodes with sufficient topological information. Thus there exist multiple reply messages which yield to multiple paths from source to destination node, of which the shortest is chosen. No periodic updates are required for these protocols but the routing information is only available when needed. However, this class of routing protocols is bandwidth efficient as compared to its counterpart i.e. proactive. Route is built as and when it is desired by sending route requests across the network. But still there are few disadvantages with this class also. One of them is that a large amount of time is wasted finding routes. The other disadvantage is in case of excessive flooding, there might be a possibility of network clog. Table 2.3 shows the comparison of some of the existing reactive routing protocols.

2.5 Hybrid Routing Protocols

Hybrid protocols are a new generation of protocols, a combination of both proactive and reactive protocols. These protocols are designed to incorporate various aspects of the other two classes of routing protocols. They are generally used to provide hierarchical routing. The difficulty of all hybrid routing protocols is how to organize the network according to network parameters. These protocols have the great potential to provide higher scalability than the other two classes. They attempt to minimize the number of re-broadcasting nodes by defining a zone, which allows the nodes to work together. The best or most suitable nodes can then be used to perform route discovery. The common disadvantage of hybrid routing protocols is that the nodes that have high level topological information maintains more routing information, which requires more memory and power consumption.

Some of the existing Hybrid Routing Protocols are:

Core Extraction Distributed Ad hoc Routing (CEDAR)

Zone Routing Protocol (ZRP)

Secure Routing Protocol (SRP)

Zone-based Hierarchical Link State (ZHLS)

Distributed Dynamic Routing (DDR)

Out of these ZRP combines the best features of both reactive and proactive routing protocols. For example, a node communicates with its neighbours using a proactive routing protocol, and uses a reactive protocol to communicate with nodes farther away. In other words, for each node, nodes within a zone are reached using proactive routing protocols. Outside this zone, reactive routing protocols will be used. Most hybrid protocols proposed to date are zone-based, which means that the network is partitioned into zones. Each node maintains both the topology information within its zone and the information neighbouring zones that means proactive behaviour within a zone and reactive behaviour among zones. Thus, a route to each destination within a zone is established without delay, while a route discovery and a route maintenance procedure is required for destinations that are in other zones. The zone routing protocol, Zone-based Hierarchical Link State routing protocol and Distributed Dynamic Routing algorithm are three hybrid routing approaches that can provide a better trade-off between communication overhead and delay. But this trade-off is subjected to the size of a zone and the dynamics of a zone. Furthermore, hybrid approaches provide a compromise on scalability issue in relation to the frequency of end-to-end connection, the total number of nodes and the frequency of topology change. Thus, the hybrid approach is an appropriate candidate for routing in a large network.

2.5.1 ZRP

Hass and Pearlman have designed the Zone Routing Protocol (ZRP) for large scale networks. It dynamically adjusts itself according to the operational conditions of the network by varying the size of a single parameter i.e. zone radius. A simple example of ZRP architecture is shown in figure 2.5 in which the network in divided into zones with a fixed value of zone radius. This figure shows the routing zone for node S. The inner circle marks the zone with radius 1 and outer circle represents the zone with radius 2. With zone radius = 1, the nodes 6, 7, 9 and 11 are interior nodes whereas nodes 2, 3, 4, 8 and 10 are peripheral nodes. The nodes 1 and 5 are out of the range of node S zones.

ZRP minimizes the cost of updates caused due to dynamically changing topology by linking their scope within a particular zone instead of whole network. It allows an efficient and faster route discovery and requires a very small amount of routing information at each node. It is more reliable, has high performance and easily detects multiple loop-free routes to the destination. ZRP is a hybrid protocol; it is both reactive and proactive in nature. The protocol works proactively within a zone and reactively between the zones. The size of zone depends on the radius, although zones may overlap with each other that help in route optimization. The nodes within a zone share the information through a proactive scheme i.e. Intrazone Routing Protocol (IARP). The neighbour discovery is done either by IARP or through HELLO messages. IARP always maintains up-to-date routing tables. On the other hand, all the routes that are discovered outside a zone follow Interzone Routing Protocol (IERP) scheme which is reactive. The route queries from a zone are forwarded to the peripheral nodes (nodes 1 & 5 as seen from figure (()) using Bordercast Resolution Protocol (BRP). ZRP provides a flexible approach in discovering new routes and maintaining those routes. The advantage of ZRP is reduced routing overhead and delays as compared to other proactive protocols. The disadvantage is that it behaves like a proactive protocol in case the zone radius is very large and reactive in case of small zone radius. One more problem with ZRP is the overlapping zone which was later removed in ZHLS (Zone Hierarchical Link State) routing protocol discussed in next section.

2.5.2 ZHLS

Haas and Pearlman proposed Zone based Hierarchical Link State routing protocol which employs hierarchical architecture represented by non-overlapping zone. Each zone in a network has a zone id and every node within a zone is assigned a node id which is computed using GPS. The whole topology is divided into two levels; node level and zone level. When route discovery process is initiated, only the node and zone ids of a node are required. No updates are required as long as node is within its zone it is only needed when a node switches to another location outside its zone. The only disadvantage of ZHLS is that before any route discovery, all the nodes must have a static zone map that contains information about all the zones in the network. So it is more suitable for network having fixed boundaries. ZHLS has an advantage of reduced overheads and compared to other reactive protocols like AODV, DSR, etc. and is highly adaptable to dynamic topologies. ZHLS has a simplified location management as all the transmission is done in the absence of any designated zone head or location manager. This helps in avoiding any single failure and congestion.

2.5.3 DST

The nodes in the network are grouped into a number of trees. Each tree has two types of nodes; route node, and internal node. The root controls the structure of the tree and whether the tree can merge with another tree, and the rest of the nodes within each tree are the regular nodes. Each node can be in one three different states; router, merge and configure depending on the type of task that it trying to perform. DST proposes two strategies to determine a route between a source and a destination pair:

Hybrid Tree Flooding (HTF): In this scheme, the source sends the control packets to all the neighbours and adjoining bridges in the spanning tree. Each packet is remained static at these places for a specific holding time.

Distributed Spanning Tree (DST): In this approach, the source sends the control packets to the tree edges till each of them reaches a leaf node. When a packet reaches the leaf node, it is forwarded to a shuttling level.

The drawback with such architecture is the existence of a single point of failure for the entire tree. If the root node fails, the entire routing structure falls apart. Furthermore, the holding time used to buffer the packets may introduce extra delays in to the network.

2.5.4 DDR

Nikaein et al. proposed a tree-based routing protocol without the need of a root node. In this strategy tree are constructed using periodic beaconing messages, which are exchanged by neighbouring nodes only. These trees within the network form a forest with the created gateway nodes acting as links between the trees in the forest. These gateway nodes are regular nodes belonging to separate trees but within transmission range of each other. A zone naming algorithm is used to assign a specific zone ID to each tree within the network. Hence, the overall network now comprises of a number of overlapping zones The DDR algorithm comprise of the following six phases: (i) preferred neighbour election; (ii) intra-tree clustering; (iii) inter-tree clustering; (iv) forest construction; (v) zone naming; and (vi) zone partitioning. To determine routes, hybrid ad hoc routing protocol (HARP) is used. HARP uses the intra-zone and inter-zone routing tables created by DDR to determine a stable path between the source and the destination. The advantage of DDR is that unlike ZHLS, it does not rely on a static zone map to perform routing and it does not require a root node or a cluster-head to coordinate data and control packet transmission between different nodes and zones.

2.5.5 Summary

Hybrid protocols are a new generation of protocols, a combination of both proactive and reactive protocols. They have the potential to provide higher scalability than pure reactive or proactive protocols. Another novelty of hybrid routing protocols is that they attempt to eliminate single point of failures and creating bottleneck nodes in the network. This is achieved by allowing any number of nodes to perform routing or data forwarding if the preferred path becomes unavailable. They are generally used to provide hierarchical routing. The difficulty of all hybrid routing protocols is how to organize the network according to network parameters. These protocols have the great potential to provide higher scalability than the other two classes. They attempt to minimize the number of re-broadcasting nodes by defining a zone, which allows the nodes to work together. The best or most suitable nodes can then be used to perform route discovery. The common disadvantage of hybrid routing protocols is that the nodes that have high level topological information maintains more routing information, which requires more memory and power consumption. Out of these ZRP combines the best features of both reactive and proactive routing protocols. Table 2.4 shows the comparison of some of the existing hybrid routing protocols.

2.6 Comparison of various routing protocols

In this section a comparison between existing routing protocols has been presented. The comparisons basically consider the characteristic properties of routing protocols in high load networks. In order to make flat addressing more efficient, the number of routing overheads introduced in the networks must be reduced. The hybrid routing protocols employ both reactive and proactive properties by maintaining intra-zone information proactively and inter-zone information reactively. Another way to reduce routing overheads is by using conditional updates rather than periodic ones. In on-demand routing protocols, the flooding-based routing protocols such as DSR and AODV will also have scalability problems. In order to increase scalability, the route discovery and route maintenance must be controlled. Hybrid routing protocols such as the ZHLS may also perform well in large networks. ZRP is another hybrid routing protocol which is designed to increase the scalability of MANETs. It maintains strong network connectivity (proactively) within the routing zones while determining remote route (outside the routing zone) quicker than flooding. Also it can incorporate other protocols to improve its performance. Although newer protocols have built upon the earlier ones, we cannot identify a single best protocol. Table 2.5 shows the overall comparison of all routing strategies against few parameters.

2.7 Mobility models

A Mobility model (MM) is used to describe the movement of a mobile node, its location and speed variation over time while the simulation of a routing protocol. It is one of the key parameters that researchers have to consider before analyzing and simulating the performance of the routing protocols. We have studied how different mobility model scan influence the performance of routing protocols. Thus, it becomes necessary to choose a right mobility model when evaluating a MANET protocol.

Sanchez and Manzoni categorized the mobility models into two types: traces and synthetic models. Traces are those that deal with real life systems. However, traces provide accurate information but the ad hoc networks are not easily modelled if proper traces have not been created. In these networks synthetic models are rather used as they attempt to realistically represent the behaviours of MNs without the use of traces and other unknown statistics. There exists a large variety of synthetic mobility models that are categorized into two broad classes based upon their mobility characteristics. Figure 2.6 shows the classification of different mobility models.

First class is Entity Mobility Models and second one is Group Mobility Models. One of the characteristics features of every mobility model is to ensure that none of the mobile nodes can travel outside the network simulation area. In Entity Mobility Models mobile nodes move independently within the simulation area. They include Random Walk MM, Random Waypoint MM, Random Direction MM, Boundless Simulation Area MM, Gauss-Markov MM, Probabilistic version of Random Waypoint MM, City Area and Street Section MM. Out of these all the Random MM belong to Ad-hoc MM and the remaining belong to Cellular MM. In Group Mobility Models all the mobile nodes are arranged in a group and the mobility of nodes depends upon the movement pattern of the whole group i.e. all the nodes move together collectively. This class includes Exponential Correlated Random MM, Column MM, Nomadic Community MM, Pursue MM, Reference Point Group MM. Since there are a large number of MMs as mentioned above, we have chosen Random waypoint MM for our study.

2.7.1 Entity Mobility Models

Random Waypoint Mobility Model

The Random Waypoint Mobility Model (RWPMM) used by Johnson and Lee includes pause times between changes in direction and/or speed. In all the random based mobility models, the mobile nodes are set free to move randomly in any direction within the simulation area. We can say that a node is free to select its destination, speed and direction independent of the neighbour nodes. RWPMM is the only model that is widely implemented & analyzed in simulation of routing protocols because of its simplicity and availability. It was first proposed by Johnson and Maltz. At the start of the simulation each mobile node waits for a specified time called pause time, tp and randomly selects one location. A MN chooses a new random destination after staying at its previous position for a time period of tp till its expiry. A node travels across the area at a random speed distributed uniformly from v0 to vmax where v0 and vmax represent the minimum and maximum node velocities. This process of choosing random destination at random velocity is repeated again and again until the simulation is finished. If Δmax is small and tp is long then the network is stable and in reverse case it is dynamic. When tp = 0, it represents a continuous mobility. This concept was proposed by Perkins & Royer, Nesargi & Prakash. They modified the existing RWPMM to let a MN travel at a uniform speed throughout the simulation by setting pause time to zero. In this case the RWPMM behaves similar to Random Walk Mobility Model.

Figure 2.7 shows the movement trace of mobile nodes in RWPMM. Despite of so many characteristics, there are certain shortcomings in RWPMM. Firstly, the probability of choosing a new destination is very high. Secondly it can generate different mobility scenarios with different speed levels. According to Euros W. Navidi, nodes moving with RWPMM cause the generation of dense waves (i.e. clustering of nodes in one part of the simulation area), thus they appear to converge, disperse and again converge. To eliminate this problem Random Direction MM was developed.

Advantages

The most common use mobility model, because of its simplicity.

A building block for developing a variety of mobility models.

Disadvantages

Lack of regular movement modelling.

Exhibits speed decay.

Generates density waves.

Memory-less movement behaviours (a common problem for all random waypoint variations).

Random Direction Mobility Model (RDMM)

The Random Direction Mobility Model was created in order to overcome a flaw discovered in the Random Waypoint Mobility Model. In this model, MNs choose a random direction instead of a random destination. A MN tends to travel to the middle of the simulation area up to the boundary or nest intermediate location in that direction. It was mainly designed to curb the density waves generated in Random Waypoint Mobility Model. All the MNs are placed randomly in the network area and are assigned an angular direction in the range from 0 to 2Ï€ at a uniform random velocity between t0 and tmax. On reaching the border of simulation area, MN pauses for a specific time and a new angle of movement and new velocity are assigned to the node. This process is continued till simulation ends. Since MNs used to travel to and pause at the boundary for some time, the average hop count for packets is much high as compared to other mobility models. Figure 2.8 shows the movement trace of a mobile node in RDMM.

Random Walk Mobility Model (RWMM)

The Random Walk model was first described mathematically by Einstein in 1926. It has proven to be one of the most widely used mobility models because it describes individual movements relative to cells. It is a memory-less mobility process which retains no information about the previous status the node while moving to future decision. A MN randomly and uniformly chooses a direction θ(t) in the predefined range from 0 to 2π and speed vt between 0 and vmax to move to a new location. After a constant time interval t, a new direction and speed are calculated and assigned to MN. If the MN reaches the network area border, it is bounced back at an angle of θ(t) or π-θ(t). In RWMM the current speed is not dependent on the previous speed of the MN. This discrepancy can be eradicated in Random Gauss-Markov Mobility Model discussed in next section. Figure 2.9 shows the movement trace of a mobile node in RWMM.

Manhattan Mobility Model

Manhattan model was introduced to emulate the movement pattern of mobile nodes on streets defined by maps. It can be useful in modelling movement in an urban area where a pervasive computing service between portable devices is provided. The map is composed of a number of horizontal and vertical streets. Each street has two lanes for each direction (north and south direction for vertical streets, east and west for horizontal streets). The mobile node is allowed to move along the grid of horizontal and vertical streets on the map. At an intersection of a horizontal and a vertical street, the mobile node can turn left, right or go straight. This choice is probabilistic: the probability of moving on the same street is 0.5, the probability of turning left is 0.25 and the probability of turning right is 0.25. Figure 2.10 shows the movement pattern of mobile nodes in this model.

2.7.2 Group Mobility Models

The mobility models proposed so far in the literature assume some kind of permanent group affiliation. Also they require that each node belongs to a single group. In reality in a typical military scenario, much more complex mobility behaviour is observed. Some nodes move in groups; while others move individually and independently; a fraction of nodes are static. Moreover, the group affiliation is not permanent. The mobile groups can dynamically re-configure themselves triggering group partition and mergence. All these different mobility behaviours coexist in military scenarios. A good realistic mobility model must capture all these mobility dynamics in order to yield realistic performance evaluation results, which, unfortunately, is not satisfactorily captured in any of the existing models.

Column Mobility Model

It is mostly used for scanning and searching purposes. A set of MNs form a line and move uniformly in a particular direction. Each individual MN follows one another. According to Sanchez, in Column MM individual MNs are placed in a single-file line and move about their initial positions. The process begins by calculating a new reference position using:

new_ref_pos = old_ref_pos + advance_vector

where old_ref_pos is the previous reference point and advance vector is a predefined offset. New position of MN is calculated as:

new_pos = new_ref_pos + random_vector

Figure 2.11 shows the movement of three MNs using Column MM.

All the MNs move around their respective reference points, i.e. they follow a particular reference point and move accordingly. As seen from the above figure, the MNs are initially lined up in bottom left corner and begin moving 4 units to the right and 3 units up as specified by their advance vector (4,3).The new positions can then be calculated using the above formulas.

Reference Point Group Mobility Model (RPGMM)

According to Hong et al., this model represents a random motion of a group of MNs as well as a random motion of each individual MN within the group. All the group movements are based upon the path travelled by a logical center, which may be pre-defined or completely random. This group motion is represented with a group motion vector. The motion of the group center completely characterizes the movement of its corresponding group of MNs, including their direction and speed. Individual MNs randomly move about their own pre-defined reference points, whose movements depend on the group movement. Figure below shows the movements of MNs using RPGMM. As the individual reference points RP move from time t tot+1, their locations are updated according to the group’s logical center. Once the updated reference points RP (t+1) are calculated they are combined with a random motion vector to represent the random motion of each MN about its individual reference point. Figure 2.12 shows the movement trace of five groups in RPGMM.

Applications of Group mobility models

Group mobility can be used in military battle field communications where the commander and soldiers form a logical group.

2.7.3 Summary

The main role of a mobility model is to mimic the movement behaviours of actual users. Given the critical role of the mobility model in supporting realistic and accurate protocol simulations, its correct design and selection is essential. Different mobility models have different characteristics and serve different purposes. Therefore, instead of defaulting to a fixed Mobility Model for every simulation, or implementing a model that fails to model accurate MN behaviour, the researchers should conduct a thorough analysis of appropriate mobility models before beginning their simulations. In a nutshell, if an entity mobility model is desired, we recommend using either the Random Waypoint Mobility Model or Group Mobility Model.

2.8 Swarm Intelligence

Swarm Intelligence (SI) is a part of artificial intelligence. It is an innovative artificial distributed intelligent paradigm based on the study of emergent behaviour in decentralized (multi agent), self-organized systems for solving optimization problems. SI is the emergent collective intelligence of groups of simple autonomous agents. SI is sometimes also called as "collective intelligence" as it is inspired from the collective movement characteristics of ants, bees, flock of birds, herds of animals etc. The communication between insects in a colony has been the base for all the communication systems that contribute to the collective intelligence. SI is based on two techniques to optimize the network performance i.e. Bee colony and Ant colony as discussed in next section. Bee colony optimization has taken inspiration from real ants’ behaviour while bee colony optimization has been inspired from the behaviour of honey bees.

2.8.1 Bee Colony Optimization (BCO)

The Bee colony is a new and youngest meta-heuristic technique capable of solving hard and complex combinatorial optimization problems. It is inspired by the behaviour of honey bee colony in nectar collection. The honey bees evaluate the quality of every discovered food source and wave to and fro if the quality is above a certain threshold level. Three main things that are important while taking some action are the direction, distance from source and quality. Same inspiration has been taken and applied on networks to find best routes from source to destination. Mainly two agents are used to find an efficient route in the network that is scouts and foragers. Scouts are helpful in searching new fresh routes to the destinations while foragers carry the data packets that need to be sent and simultaneously evaluate the quality of the discovered paths. The population of artificial bees searches for the best optimal path. The artificial bees represent agents which collectively solve the problem. The technique has toe phases: forward phase and backward phase. In forward phase the scout agents search for new paths while in backward phase the forager agents share information about the solutions. The list of a few BCO applications for solving optimization problems have been given in table 2.6.

2.8.2 Ant Colony Optimization (ACO)

Ant colony is basically inspired from the behaviour and action of the natural ants. The ants navigate their designated selection of paths while depositing a certain amount of substance called pheromone on the ground, marking a trail. The idea behind this technique is that the more ants follow a particular trail, the more attractive is that trail for being followed by other ants. They therefore dynamically find a path on the fly, using the explained notion of stigmergy to communicate indirectly amongst them. An ant chooses a trail depending on the amount of pheromone deposited on the ground. Each ant compares the amounts of trails, for the selected destination on each link, toward the neighbouring nodes. The larger the concentration of pheromone in a particular trail, the greater is the probability of trail being selected by an ant. The concentration of the pheromone on the links formed evaporates with time at a certain rate. Each node in the network has a routing table which helps it determine where to send the next packet or ant. These routing tables have the neighbours of the node as rows, and all of the other nodes in the network as columns.

ACO algorithms have been employed to solve numerous problems in ad hoc networks. Dorigo et al. were first to propose ant algorithms as a multi-agent approach to difficult combinatorial optimizations problems such as the travelling salesman problem, graph colouring, quadratic assignment problem and routing in communication networks and so on. The list of a few ACO applications for solving optimization problems have been given in table 2.7. Ant algorithms are inspired by the observation of real ant colonies.

An important behaviour of ant colonies is their foraging behaviour i.e. how ants find the shortest paths between food sources and their nest. While searching for food, ants deposit on ground an amount Δτ of special substance called pheromone at each visited node, where.

The amount of pheromone deposited is proportional to the quality of the route found by the ant depositing pheromone. The quality of the route is inversely proportional to the route length, Ld(t).The pheromone trail helps ants to find their way back to the food source. The ants which traverse through the shortest path reinforce the path with more amount of pheromone that helps other ants to follow. However the deposition of amount of pheromone diverges from the observed behaviour of real ants. Therefore, ants employ two forms of solution evaluation:

Explicit evaluation- Here ants deposit an amount of pheromone proportional to the quality of the solution.

Implicit evaluation- Here ants deposit the same amount of pheromone and the algorithm exploits the differential path length effect to find solutions.

As ad hoc networks have dynamic topologies it is necessary to develop a mechanism for eliminating the old routes. In ACO this is achieved by evaporating the pheromone exponentially over time. The pheromone values at any edge (i, j) are updated by all the ants that have completed the path length as follows:

Where m is the number of ants that have completed the path. is the evaporation constant that determines the evaporation rate of the pheromone. is the quantity ofpheromone deposited by ant k on edge (i, j).

2.9 Ant based routing protocols

This section will present an overview of the different ways in which Ant algorithms have been employed to solve various variations of routing in ad hoc networks. ACO is used in both flat as well as hierarchical ad hoc networks. Dorigo et al. combined ACO with source routing to develop AntNet. Schoonerwoerd et al combined ACO with distance vector routing to develop Ant-based control (ABC) routing.

2.9.1 Ant based flat routing algorithms

All the nodes form a homogeneous network. All the nodes share similar network responsibility and packet handling. The protocols proposed basically use ACO with basic source routing or distance vector algorithms where routing tables are replaced with pheromone tables. This section presents some of the existing routing algorithms that incorporate the applications of ACO.

AntNet

AntNet algorithm was basically proposed for fixed wired networks, which derives features from parallel replicated Monte Carlo systems, previous work on artificial ant colonies techniques and telephone network routing. Dorigo et al. used Ant Net to describe the application of ACO to dynamic routing in packet-switched networks. It is based on source routing mechanism. The basic idea in AntNet is to use two network exploration agents – Forward ants (FA) and Backward ants (BA), which collect information about the delay, congestion status and path in the network. Each node n generates a FA at regular time intervals to a randomly selected destination d. FA uses the current routing tables to find a path to node d and records the route taken. On reaching at the destination, FA creates another ant called BA moves back to the source node n reverse the path of FA. The BAs get their information from the FAs and use it to achieve routing updates at the nodes. After creating a BA, the FA dies. Each node stores a routing table Tk organized as in distance-vector algorithms storing probability values. For each destination-neighbour pair (d, n), Tk stores a probability value Pnd which helps in choosing n as next-hop node to destination d, such that

According to Dorigo the AntNet algorithm provides better performance in terms of average delay. The last step is to update the routing table when a BA arrives. The action involves increase in corresponding routing probability of FA and decrease in probabilities of all other neighbouring nodes. The values are increased and decreased such that the sum of all probabilities will remain 1.

ABC

Ant Based Control is the first ACO application to dynamic problems proposed by Schoonerwoerd. ABC is another stigmergy-based ant algorithm designed for packet-switched telephone networks and uses distance vector routing. It shares many similarities with AntNet, but also incorporates certain differences. ABC replaces routing tables with pheromone tables. Another difference is that ABC only uses a single class of ants (i.e. forward ants), which are initiated at regular time intervals from every source to a randomly chosen destination. Ants move from node to node selecting next node to move according to the probabilities in pheromone tables for their destination node. Arriving at a node, ants update the pheromone tables’ entries for corresponding node. The ants die after reaching their destination. Here the probability increase is represented by ΔP as shown below in the probability update equation.

Schoonerwoerd et al. introduced two new aspects – age and delay. They set all pheromone levels to an initial value and intend to primarily encourage the ants to find short paths, and to secondly prevent the agents from visiting heavily congested nodes. The first goal is accomplished by reducing the ΔP value, which reinforces the routing table, gradually over time. A relative pheromone update scheme was implemented in which the amount of pheromone updated by each ant is inversely proportional to the age of ant. The second objective is obtained by adding an artificial delay to the ants when passing congested nodes. Though ABC is a simple algorithm designed for packet-switched networks, it performs better than other ACO based algorithms.

ARA

Ant-colony based Routing Algorithm was proposed by Gunes et al. Route discovery is done by flooding a forward ant to the destination, similar to Route Request in AODV. Duplicate packets are identified by the use of a sequence number and are deleted by system. When a route is found to the destination, a backward ant is created similar to Route Reply in AODV. The backward ant follows the path with the shortest trip time detected by the forward ant. The amount of pheromone deposited by both ants is a function of route length associated with pheromone. The route maintenance phase is responsible for updating the routing information during the communication. The algorithm updates both the forward and the backward path with an equal amount of pheromone (presumed as 0.1). ARA also allows for the evaporation of pheromones. Every second the amount of pheromone is decreased by a multiplicative factor f as shown below:

ARA achieves loop free paths using sequence numbers. If a node receives a duplicate packet, it sets the DUPLICATE_ERROR flag and returns the packet to the previous node, and removes the link. According to Gunes et al. ARA performs comparatively better in terms of overhead ratio and delivery rate.

AntHocNet

DiCaro and Gambardella et al. proposed a hybrid multipath routing algorithm called AntHocNet that combines both proactive and reactive components with ACO. Routes are discovered reactively, where reactive forward ants (FA) are sent by the source node to find multiple paths towards the destination node. Unlike AODV, AntHocNet compares both travel time and hop count of subsequent forward ant and rebroadcasts only if both the criteria are within a certain factor of the best forward ant. The FA gathers route information while moving towards destination node. After reaching there it becomes backward ant (BA) which traces its path back to source node and creates a route with the help of intermediate visited nodes. Each node m stores a routing table Tm which contains a measure Tmnd of the desirability of using node n as the next hop to destination d. The amount of pheromone deposited by BA is measured as the average of the inverse of cost (in terms of delay and number of hops) of travelling to the node d through node n. For each destination-neighbour pair Tm stores a proba



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now