ROUTING PROTOCOLS FOR AD HOC WIRELESS LANs
ROUTING PROTOCOLS FOR AD HOC WIRELESS LANs
ABSTRACT
This report examines firstly the mathematical dynamism of such ad hoc networks,
which spawns the need for a different approach towards routing. Then it goes on to
explain various routing protocols for ad-hoc networks and evaluates these protocols
based on a given set of parameters. The paper provides an overview of various protocols
by presenting their characteristics and functionality, and then provides a comparison and
discussion of their respective merits and drawbacks.
TABLE OF CONTENTS
TOPIC PAGE NO.
1. Introduction 01
1.1 Local Area Network (LAN) 01
1.2 Wireless LAN (WLAN) 02
1.3 Wireless LAN Configurations 03
1.3.1 Independent (Ad hoc) Wireless LAN 03
1.3.2 Infrastructure Wireless LAN 04
1.4 Microcells, Roaming and Handoffs 05
5. Comparison of Protocols 28
5.1 Table-Driven Protocols 28
5.2 Source Initiated On-Demand Protocols 30
5.3 Table Driven vs. On-Demand Routing 34
Conclusion 38
References 39
1. INTRODUCTION
By definition, a Local Area Network means it is “local” i.e. limited in its physical
extent. Thus a Local Area Network consists of the aforementioned computing entities
that are restricted to a certain geographical range. Fast, flexible and economical
movement of data between systems is achieved by a LAN.
Mobility
Installation Speed and Simplicity
Installation Flexibility
Reduced cost of Ownership
Scalability
Wireless LANs can be simple or complex. At its most basic, two PCs equipped
with wireless adapter cards can set up an independent network whenever they are within
range of one another. This is called a peer-to-peer network. On-demand networks such as
in this example require no administration or pre configuration. Several mobile nodes (e.g.
notebook computers) may get together in a small area (e.g. in a conference room) and
establish peer-to-peer communications among themselves without the help of any
infrastructure such as wired/wireless backbone. In this case each client would only have
access to the resources of the other client and not to a central server.
Installing an access point can extend the range of an ad hoc network, effectively
doubling the range at which the devices can communicate.
Wireless communication is limited by how far signals carry for given power
output. WLANs use cells, called microcells, similar to the cellular telephone system to
extend the range of wireless connectivity. At any point in time, a mobile PC equipped
with a WLAN adapter is associated with a single access point and its microcell, or area of
coverage. Individual microcells overlap to allow continuous communication within wired
network. (Fig. 1.3) They handle low-power signals and hand off users as they roam
through a given geographic area.
Cellular structures are adopted to increase the effective total bandwidth by using
different frequencies in different microcells. This concept is known as frequency reuse.
As a result of frequency reuse, the total available communication bandwidth for all users
is much larger than the transmission speed. A function that allows a mobile node to
communicate with the access point in a cell and then switch to the access point in another
cell is called handoff or handover. The purpose of the handoff is to keep continuous or
seamless service to mobile nodes through different cell coverages. Handoff is
consequently a special feature to deal with the mobility issue for wireless networks.
2. AD HOC NETWORK ROUTING
CONSIDERATIONS
An ad hoc network is the cooperative engagement of a collection of mobile nodes
without the required intervention of any centralized access point or existing
infrastructure. In ad hoc networks all nodes are mobile and can be connected dynamically
in an arbitrary manner. All nodes of these networks behave as routers and take part in
discovery and maintenance of routes to other nodes in the network.
Akin to packet radio networks, ad-hoc wireless networks have an important role
to play in military applications. Soldiers equipped with multi-mode mobile
communicators can now communicate in an ad-hoc manner, without the need for fixed
wireless base stations. In addition, small vehicular devices equipped with audio sensors
and cameras can be deployed at targeted regions to collect important location and
environmental information which will be communicated back to a processing node via
ad-hoc mobile communications. Ship-to-ship ad-hoc mobile communication is also
desirable since it provides alternate communication paths without reliance on ground- or
space-based communication infrastructures.
People today attend meetings and conferences with their laptops, palmtops and
notebooks. It is therefore attractive to have instant network formation, in addition to file
and information sharing without the presence of fixed base stations and systems
administrators. A presenter can multicast slides and audio to intended recipients.
Attendees can ask questions and interact on a commonly-shared white board. Ad-hoc
mobile communication is particularly useful in relaying information (status, situation
awareness, etc.) via data, video and/or voice from one rescue team member to another
over a small handheld or wearable wireless device. Again, this applies to law
enforcement personnel as well.
• Centralized or distributed.
• Adaptive or static.
• Reactive or proactive or hybrid.
When a routing protocol is centralized, all decisions are made at a center node,
where as in a distributed routing protocol, all nodes share the routing decision. An
adaptive protocol may change behavior according to the network status, which can be a
congestion on a link or many other possible factors. A reactive protocol takes required
actions such as discovering routes when needed; besides a proactive protocol discovers
the routes before they are needed. Reactive methods are called on-demand routing
protocols. Since they run on demand, the control packet overhead is greatly reduced.
Proactive methods keep tables of routes, and maintain those tables periodically. Hybrid
methods make use of both to come up with a more efficient one. Zone routing protocol is
an example to hybrid methods. Associativity Based Routing (ABR) is an adaptive
protocol, where associativity is related to spatial, temporal and connection stability of a
mobile host.
Routing protocols for existing networks have not been designed specifically to
provide the kind of dynamic, self-starting behavior needed for ad-hoc networks. Most
protocols exhibit their least desirable behavior when presented with a highly dynamic
interconnection topology. Although mobile computers could naturally be modeled as
routers, it is also clear that existing routing protocols would place too heavy a
computational burden on each mobile computer. Moreover, the convergence
characteristics of existing routing protocols did not seem good enough to fit the needs of
ad-hoc networks.
Lastly, the wireless medium differs in important ways from wired media, which
would require that we make modifications to whichever routing protocol we might
choose to experiment with. For instance, mobile computers may well have only a single
network interface adapter, whereas most existing routers have network interfaces to
connect two separate networks together. Besides, wireless media are of limited and
variable range, in distinction to existing wired media.
Since the advent of DARPA packet radio networks in the early 1970s, numerous
protocols have been developed for ad-hoc mobile networks. Such protocols must deal
with the typical limitations of these networks, which include high power consumption,
low bandwidth, and high error rates.
As shown in Figure 2.1, these routing protocols may generally be categorized as:
Every mobile node in the network maintains a routing table in which all of the
possible destinations within the network and the number of hops to each destination are
recorded. Each entry is marked with a sequence number assigned by the destination node.
The sequence numbers enable the mobile nodes to distinguish stale routes from new ones,
thereby avoiding the formation of routing loops. Routing table updates are periodically
transmitted throughout the network in order to maintain table consistency.
To help alleviate the potentially large amount of network traffic that such updates
can generate, route updates can employ two possible types of packets. The first is known
as a full dump. This type of packet carries all available routing information and can
require multiple network protocol data units (NPDUs). During periods of occasional
movement, these packets are transmitted infrequently. Smaller incremental packets are
used to relay only that information which has changed since the last full dump. Each of
these broadcasts should fit into a standard size NPDU, thereby decreasing the amount of
traffic generated.
The mobile nodes maintain an additional table where they store the data sent in
the incremental routing information packets. New route broadcasts contain the address of
the destination, the number of hops to reach the destination, the sequence number of the
information received regarding the destination, as well as a new sequence number unique
to the broadcast [11]. The route labeled with the most recent sequence number is always
used. In the event that two updates have the same sequence number, the route with the
smaller metric is used in order to optimize (shorten) the path. Mobiles also keep track of
the settling time of routes, or the weighted average time that routes to a destination will
fluctuate before the route with the best metric is received (see [11]). By delaying the
broadcast of a routing update by the length of the settling time, mobiles can reduce
network traffic and optimize routes by eliminating those broadcasts that would occur if a
better route was discovered in the very near future.
The Clusterhead Gateway Switch Routing (CGSR) protocol differs from the
previous protocol in the type of addressing and network organization scheme employed.
Instead of a at network, CGSR is a clustered multihop mobile wireless network with
several heuristic routing schemes. By having a cluster head controlling a group of ad-hoc
nodes, a framework for code separation (among clusters), and channel access, routing and
bandwidth allocation can be achieved. A cluster head selection algorithm is utilized to
elect a node as the cluster head using a distributed algorithm within the cluster. The
disadvantage of having a cluster head scheme is that frequent cluster head changes can
adversely affect routing protocol performance since nodes are busy in cluster head
selection rather than packet relaying. Hence, instead of invoking cluster head reselection
every time the cluster membership changes, a Least Cluster Change (LCC) clustering
algorithm Is introduced. Using LCC, cluster heads only change when two cluster heads
come into contact, or when a node moves out of contact of all other cluster heads.
Fig. 3.1 CGSR: Routing from Node 1 to Node 8.
CGSR uses DSDV as the underlying routing scheme, and hence has much of the
same overhead as DSDV. However, it modifies DSDV by using a hierarchical cluster
head-to-gateway routing approach to route traffic from source to destination. Gateway
nodes are nodes that are within communication range of two or more cluster heads. A
packet sent by a node is first routed to its cluster head, and then the packet is routed from
the cluster head to a gateway to another cluster head, and so on until the cluster head of
the destination node is reached. The packet is then transmitted to the destination. Figure
3.1 illustrates an example of this routing scheme. Using this method, each node must
keep a cluster member table where it stores the destination cluster head for each mobile
node in the network. These cluster member tables are broadcast by each node periodically
using the DSDV algorithm. Nodes update their cluster member tables on the reception of
such a table from a neighbor.
In addition to the cluster member table, each node must also maintain a routing
table, which is used to determine the next hop in order to reach the destination. On
receiving a packet, a node will consult its cluster member table and routing table to
determine the nearest cluster head along the route to the destination. Next the node will
check its routing table to determine the node in order to reach the selected cluster head. It
then transmits the packet to this node.
1. distance table,
2. routing table,
3. link-cost table, and
4. message retransmission list (MRL) table.
Each entry of the MRL contains the sequence number of the update message, a
retransmission counter, an acknowledgment-required flag vector with one entry per
neighbor, and a list of updates sent in the update message. The MRL records which
updates in an update message need to be retransmitted and which neighbors should
acknowledge the retransmission.
Mobiles inform each other of link changes through the use of update messages.
An update message is sent only between neighboring nodes and contains a list of updates
(the destination, the distance to the destination, and the predecessor of the destination), as
well as a list of responses indicating which mobiles should acknowledge (ACK) the
update. Mobiles send update messages after processing updates from neighbors or
detecting a change in a link to a neighbor. In the event of the loss of a link between two
nodes, the nodes send update messages to their neighbors. The neighbors then update
their distance table entries and check for new possible paths through other nodes. Any
new paths are relayed back to the original nodes so that they can update their tables
accordingly.
Part of the novelty of WRP stems from the way in which it achieves loop
freedom. In WRP, routing nodes communicate the distance and second-to-last hop
information for each destination in the wireless networks. WRP belongs to the class of
path finding algorithms with an important exception. It avoids the count-to-infinity
problem [1] by forcing each node to perform consistency checks of predecessor
information reported by all its neighbors. This ultimately (though not instantaneously)
eliminates looping situations and provides faster route convergence when a link failure
event occurs.
When a source node desires to send a message to some destination node and does
not already have a valid route to that destination, it initiates a Path Discovery process to
locate the other node. It broadcasts a route request (RREQ) packet to its neighbors, which
then forward the request to their neighbors, and so on, until either the destination or an
intermediate node with a fresh enough route to the destination is located. Figure 4.1(a)
illustrates the propagation of the broadcast RREQs across the network. AODV utilizes
destination sequence numbers to ensure all routes are loop-free and contain the most
recent route information. Each node maintains its own sequence number, as well as a
broadcast ID. The broadcast ID is incremented for every RREQ the node initiates, and
together with the node's IP address, uniquely identifies a RREQ. Along with its own
sequence number and the broadcast ID, the source node includes in the RREQ the most
recent sequence number it has for the destination. Intermediate nodes can reply to the
RREQ only if they have a route to the destination whose corresponding destination
sequence number is greater than or equal to that contained in the RREQ.
Fig. 4.1 AODV Route Discovery
During the process of forwarding the RREQ, intermediate nodes record in their
route tables the address of the neighbor from which the first copy of the broadcast packet
is received, thereby establishing a reverse path. If additional copies of the same RREQ
are later received, these packets are discarded. Once the RREQ reaches the destination or
an intermediate node with a fresh enough route, the destination/intermediate node
responds by unicasting a route reply (RREP) packet back to the neighbor from which it
first received the RREQ [Figure 4.1(b)]. As the RREP is routed back along the reverse
path, nodes along this path set up forward route entries in their route tables which point to
the node from which the RREP came. These forward route entries indicate the active
forward route. Associated with each route entry is a route timer which will cause the
deletion of the entry if it is not used within the specified lifetime. Because the RREP is
forwarded along the path established by the RREQ, AODV only supports the use of
symmetric links.
An additional aspect of the protocol is the use of hello messages, periodic local
broadcasts by a node to inform each mobile node of other nodes in its neighborhood.
Hello messages can be used to maintain the local connectivity of a node. However the use
of hello messages is not required. Nodes listen for retransmissions of data packets to
ensure the next hop is still within reach. If such a retransmission is not heard, the node
may use any one of a number of techniques, including the reception of hello messages, to
determine whether the next hop is within communication range. The hello messages may
list the other nodes from which a mobile has heard, thereby yielding a greater knowledge
of the network connectivity.
Each node receiving the packet checks whether it knows of a route to the
destination. If it does not, it adds its own address to the route record of the packet and
then forwards the packet along its outgoing links. To limit the number of route requests
propagated on the outgoing links of a node, a mobile only forwards the route request if
the request has not yet been seen by the mobile and if the mobile's address does not
already appear in the route record.
A route reply is generated when either the route request reaches the destination
itself, or when it reaches an intermediate node which contains in its route caches an
unexpired route to the destination. By the time the packet reaches either the destination or
such an intermediate node, it contains a route record yielding the sequence of hops taken.
Figure 4.2(a) illustrates the formation of the route record as the route request propagates
through the network. If the node generating the route reply is the destination, it places the
route record contained in the route request into the route reply. If the responding node is
an intermediate node, it will append its cached route to the route record and then generate
the route reply. To return the route reply, the responding node must have a route to the
initiator. If it has a route to the initiator in its route cache, it may use that route.
Otherwise, if symmetric links are supported, the node may reverse the route in the route
record. If symmetric links are not supported, the node may initiate its own route
discovery and piggyback the route reply on the new route request. Figure 4.2(b) shows
the transmission of the route reply with its associated route record back to the source
node.
Route maintenance is accomplished through the use of route error packets and
acknowledgments. Route error packets are generated at a node when the data link layer
encounters a fatal transmission problem. When a route error packet is received, the hop in
error is removed from the node's route cache and all routes containing the hop are
truncated at that point. In addition to route error messages, acknowledgments are used to
verify the correct operation of the route links. Such acknowledgments include passive
acknowledgments, where a mobile is able to hear the next hop forwarding the packet
along the route.
I. route creation,
II. route maintenance, and
III. route erasure.
During the route creation and maintenance phases, nodes use a height metric to
establish a directed acyclic graph (DAG) rooted at the destination. Thereafter, links are
assigned a direction (upstream or downstream) based on the relative height metric of
neighboring nodes, as shown in Figure 4.3(a). This process of establishing a DAG is
similar to the query/reply process proposed in LMR (Lightweight Mobile Routing). In
times of node mobility, the DAG route is broken and route maintenance is necessary to
re-establish a DAG rooted at the same destination. As shown in Figure 4.3(b), upon
failure of the last downstream link, a node generates a new reference level which results
in the propagation of that reference level by neighboring nodes, effectively coordinating a
Fig 4.3 (a) Route creation (showing link direction assignment), (b) Route Maintenance (showing
link reversal phenomenon) in TORA.
structured reaction to the failure. Links are reversed to reflect the change in adapting to
the new reference level. This has the same effect as reversing the direction of one or more
links when a node has no downstream links.
Timing is an important factor for TORA because the height metric is dependent
on the logical time of a link failure; TORA assumes all nodes have synchronized clocks
(accomplished via an external time source such as Global Positioning System). TORA's
metric is a quintuple comprised of five elements, namely:
1. route discovery,
2. route re-construction (RRC), and
3. route deletion.
When a discovered route is no longer desired, the source node initiates a route
delete (RD) broadcast so that all nodes along the route update their routing tables. The
RD message is propagated by a full broadcast, as opposed to a directed broadcast,
because the source node may not be aware of any route node changes that occurred
during route re-constructions.
The SRP processes packets by passing the packet up the stack if it is the intended
receiver or looking up the destination in the RT and then forwarding the packet if it is
not. If no entry is found in the RT for the destination, a route-search process is initiated to
find a route. Route requests are propagated throughout the network but are only
forwarded to the next hop if they are received over strong channels and have not been
previously processed (to prevent looping). The destination chooses the first arriving
route-search packet to send back because it is most probable that the packet arrived over
the shortest and/or least congested path. The DRP then reverses the selected route and
sends a route-reply message back to the initiator. The DRP of the nodes along the path
update their RTs accordingly.
Route-search packets arriving at the destination have necessarily chosen the path
of strongest signal stability, as the packets are dropped at a node if they have arrived over
a weak channel. If there is no route-reply message received at the source within a specific
timeout period, the source changes the PREF field in the header to indicate that weak
channels are acceptable, as these may be the only links over which the packet can be
propagated.
When a failed link is detected within the network, the intermediate nodes send an
error message to the source indicating which channel has failed. The source then initiates
another route-search process to find a new path to the destination. The source also sends
an erase message to notify all nodes of the broken link.
5. COMPARISONS
Our discussion here will be based on Table 5.1. As stated earlier, DSDV routing
is essentially a modification of the basic Bellman-Ford routing algorithm. The
modifications include the guarantee of loop-free routes and a simple route update
protocol. While only providing one path to any given destination, DSDV selects the
shortest path based on the number of hops to the destination. DSDV provides two types
of update messages, one of which is significantly smaller than the other. The smaller
update message can be used for incremental updates so that the entire routing table need
not be transmitted for every change in network topology. However, DSDV is inefficient
because of the requirement of periodic update transmissions, regardless of the number of
changes in the network topology. This effectively limits the number of nodes that can
connect to the network since the overhead grows as O(n2).
Abbreviations:
N = Number of nodes in the network
d = Network diameter
h = Height of routing tree
x = Number of nodes affected by a topological change
The WRP protocol differs from the other protocols in several ways. WRP requires
each node to maintain four routing tables. This can lead to substantial memory
requirements, especially when the number of nodes in the network is large. Furthermore,
the WRP protocol requires the use of hello packets whenever there are no recent packet
transmissions from a given node. The hello packets consume bandwidth and disallow a
node to enter sleep mode. However, though it belongs to the class of path finding
algorithms, WRP has an advantage over other path finding algorithms because it avoids
the problem of creating temporary routing loops that these algorithms have through the
verification of predecessor information, as described in Section 3.3. Having discussed the
operation and characteristics of each of the existing table-driven based routing protocols,
it is important to highlight the differences. During link failures, WRP has lower time
complexity than DSDV since it only informs neighboring nodes about link status
changes. During link additions, hello messages are used as a presence indicator such that
the routing table entry can be updated. Again, this only affects neighboring nodes. In
CGSR, because routing performance is dependent on the status of specific nodes (cluster
head, gateway or normal nodes), time complexity of a link failure associated with a
cluster head is higher than DSDV, given the additional time needed to perform cluster
head reselection. Similarly, this applies to the case of link additions associated with the
cluster head. There is no gateway selection in CGSR since each node declares it is a
gateway node to its neighbors if it is responding to multiple radio codes. If a gateway
node moves out of range, the routing protocol is responsible for routing the packet to
another gateway.
Table 5.2 presents a comparison of AODV, DSR, TORA, ABR and SSR. The
AODV protocol employs a route discovery procedure similar to DSR; however, there are
a couple important distinctions. The most notable of these is that the overhead of DSR is
potentially larger than that of AODV since each DSR packet must carry full routing
information, whereas in AODV packets need only contain the destination address.
Similarly, the route replies in DSR are larger because they contain the address of every
node along the route, whereas in AODV route replies need only carry the destination IP
address and sequence number. Also, the memory overhead may be slightly greater in
DSR because of the need to remember full routes, as opposed to only next hop
information in AODV. A further advantage of AODV is its support for multicast [7].
None of the other algorithms considered in this paper currently incorporate multicast
communication. On the downside, AODV requires symmetric links between nodes, and
hence cannot utilize routes with asymmetric links. In this aspect, DSR is superior as it
does not require the use of such links, and can utilize asymmetric links when symmetric
links are not available.
The DSR algorithm is intended for networks in which the mobiles move at a
moderate speed with respect to packet transmission latency. Assumptions that the
algorithm makes for operation are that the network diameter is relatively small and that
the mobile nodes can enable a promiscuous receive mode, whereby every received packet
is delivered to the network driver software without filtering by destination address. An
advantage of DSR over some of the other on-demand protocols is that DSR does not
make use of periodic routing advertisements, thereby saving bandwidth and reducing
power consumption. Hence the protocol does not incur any overhead when there are no
changes in network topology. Additionally, DSR allows nodes to keep multiple routes to
a destination in their cache. Hence, when a link on a route is broken, the source node can
check its cache for another valid route. If such a route is found, route reconstruction does
not need to be reinvoked. In this case, route recovery is faster than in many of the other
on-demand protocols. However, if there are no additional routes to the destination in the
source node's cache, route discovery must be reinitiated, as in AODV, if the route is still
required.
On the other hand, because of the small diameter assumption and because of the
source routing requirement, DSR is not scalable to large networks. Furthermore, as
previously stated, the need to place the entire route in both route replies and data packets
causes greater control overhead than in AODV.
TORA is a link reversal algorithm that is best-suited for networks with large,
dense populations of nodes. Part of the novelty of TORA stems from its creation of
DAGs to aid route establishment. One of the advantages of TORA is its support for
multiple routes.
Abbreviations:
l = Diameter of the affected network segment
y = Total number of nodes forming the directed path where the REPLY packet transits
z = Diameter of the directed path where the REPLY packet transits
TORA and DSR are the only on-demand protocols considered here which retain
multiple route possibilities for a single source/destination pair. Route reconstruction is
not necessary until all known routes to a destination are deemed invalid, and hence
bandwidth can potentially be conserved because of the necessity for fewer route
rebuilding. Another advantage of TORA is its support for multicast. Although, unlike
AODV, TORA does not incorporate multicast into its basic operation, it functions as the
underlying protocol for the Lightweight Adaptive Multicast Algorithm (LAM), and
together the two protocols provide multicast capability. TORA's reliance on synchronized
clocks, while a novel idea, inherently limits its applicability. If a node does not have a
GPS positioning system or some other external time source, it cannot use the algorithm.
Additionally, if the external time source fails, the algorithm will cease to operate. Further,
route rebuilding in TORA may not occur as quickly as in the other algorithms due to the
potential for oscillations during this period. This can lead to potentially lengthy delays
while waiting for the new routes to be determined. ABR is a compromise between
broadcast and point-to-point routing and uses the connection-oriented packet forwarding
approach. Route selection is primarily based on the aggregated associativity ticks of
nodes along the path. Hence, although the resulting path does not necessarily result in the
smallest possible number of hops, the path tends to be longer-lived than other routes. A
long-lived route requires fewer route reconstructions and therefore yields higher
throughput. Another benefit of ABR is that, like the other protocols, it is guaranteed to be
free from packet duplicates. The reason is that only the best route is marked valid while
all other possible routes remain passive. ABR, however, relies on the fact that each node
is beaconing periodically. The beaconing interval must be short enough so as to
accurately reflect the spatial, temporal, and connectivity state of the mobile hosts. This
beaconing requirement may result in additional power consumption. However,
experimental results obtained in [24] reveal that the inclusion of periodic beaconing has a
minute inuance on the overall battery power consumption. Unlike DSR, ABR does not
utilize route caches. The SSR algorithm is a logical descendant of ABR. It utilizes a new
technique of selecting routes based on the signal strength and location stability of nodes
along the path. As in ABR, while the paths selected by this algorithm are not necessarily
shortest in hop count, they do tend to be more stable and longer-lived, resulting in fewer
route reconstructions.
One of the major drawbacks of the SSR protocol is that, unlike in AODV and
DSR, intermediate nodes cannot reply to route requests sent towards a destination; this
results in potentially long delays before a route can be discovered. Additionally, when a
link failure occurs along a path, the route discovery algorithm must be re-invoked from
the source to find a new path to the destination. No attempt is made to use partial route
recovery (unlike ABR) - i.e. to allow intermediate nodes to attempt to rebuild the route
themselves. AODV and DSR also do not specify intermediate node rebuilding. While this
may lead to longer route reconstruction times since link failures cannot be resolved
locally without the intervention of the source node, the attempt and failure of an
intermediate node to rebuild a route will cause a longer delay then if the source node had
attempted the rebuilding as soon as the broken link was noticed. Thus it remains to be
seen whether intermediate node route rebuilding is more optimal than source node route
rebuilding.
Table 5.3: Overall Comparisons of On-Demand versus Table-Driven Based Routing Protocols.
Table 5.3 lists some of the basic differences between the two classes of
algorithms. Another consideration is whether a at or hierarchical addressing scheme
should be used. All of the protocols considered here, except for CGSR, use a at
addressing scheme. In [6], a discussion of the two addressing schemes is presented.
While at addressing may be less complicated and easier to use, there are doubts as to its
scalability.
6. AD HOC ROUTING PROTOCOLS: THE NEXT
GENERATION
Another important factor is the limited power supply in handheld devices which
can seriously prohibit packet forwarding in an ad-hoc mobile environment. Hence,
routing traffic based on nodes' power metric is one way to distinguish routes that are
more long-lived than others. Finally, instead of using beaconing or broadcast search,
location-aided routing uses positioning information to define associated regions so that
the routing is spatially-oriented and limited. This is analogous to associativity-oriented
and restricted broadcast in ABR.
Current ad-hoc routing approaches have introduced several new paradigms, such
as exploiting user's demand, the use of location, power, and association parameters.
Adaptivity and self-configuration are key features of these approaches. However,
flexibility is also important. A flexible ad-hoc routing protocol could responsively invoke
table-driven approaches and/or on-demand approaches based on situations and
communication requirements. The toggle between these two approaches may not be
trivial since concerned nodes must be in-sync with the toggling. Co-existence of both
approaches may also exist in spatially clustered ad-hoc groups, with intra-cluster
employing the table-driven approach and inter-cluster employing the demand-driven
approach or vice versa.
10] Elizabeth M. Royer, C-K Toh, “A Review of Current Routing Protocols for Ad-
Hoc Mobile Wireless Networks”, March 2000.