Routing Protocols
Routing Protocols
1.1 Overview
Wireless networks is an emerging new technology that will allow users to access information and
services electronically, regardless of their geographic position. Wireless networks can be classified
in two types:- infrastructured network and infrastructureless (ad hoc) networks. Infrastructured
network consists of a network with fixed and wired gateways. A mobile host communicates with
a bridge in the network (called base station) within its communication radius. The mobile unit can
move geographically while it is communicating. When it goes out of range of one base station, it
connects with new base station and starts communicating through it. This is called handoff. In this
approach the base stations are fixed.
In contrast to infrastructure based networks, in ad hoc networks all nodes are mobile and can be
connected dynamically in an arbitrary manner. All nodes of these networks behave as routers and
take part in discovery and maintenance of routes to other nodes in the network. Ad hoc networks
are very useful in emergency search-and-rescue operations, meetings or conventions in which
persons wish to quickly share information, and data acquisition operations in inhospitable terrain.
In mobile ad-hoc networks where there is no infrastructure support as is the case with wireless
networks, and since a destination node might be out of range of a source node transmitting packets;
a routing procedure is always needed to find a path so as to forward the packets appropriately
between the source and the destination. Within a cell, a base station can reach all mobile nodes
without routing via broadcast in common wireless networks. In the case of ad-hoc networks, each
node must be able to forward data for other nodes. This creates additional problems along with the
problems of dynamic topology which is unpredictable connectivity changes.
Asymmetric links: Most of the wired networks rely on the symmetric links which are always
fixed. But this is not a case with ad-hoc networks as the nodes are mobile and constantly changing
their position within network. For example consider a MANET( Mobile Ad-hoc Network ) where
node B sends a signal to node A but this does not tell anything about the quality of the connection
in the reverse direction [25].
Routing Overhead: In wireless adhoc networks, nodes often change their location within network.
So, some stale routes are generated in the routing table which leads to unnecessary routing
overhead.
Interference: This is the major problem with mobile ad-hoc networks as links come and go
depending on the transmission characteristics, one transmission might interfere with another one
and node might overhear transmissions of other nodes and can corrupt the total transmission.
Dynamic Topology: This is also the major problem with ad-hoc routing since the topology is not
constant. The mobile node might move or medium characteristics might change. In ad-hoc
networks, routing tables must somehow reflect these changes in topology and routing algorithms
Fig. 1
Initially, all the nodes advertise their routing information to all the nodes in the network and hence
the routing table at MH4 initially looks like Table-1 and the forwarding table at the MH4 would
look like Table-2.
But, when the host MH1 moves its location as shown in the fig. 2 nearer to MH7 and MH8 then,
the link between MH2 and MH1 will be broken resulting in the assignment of infinity metric at
MH2 for MH1 and the sequence number will be changed to odd number in the routing table at
MH2. MH2 will update this information to its neighbor hosts. Since, there is a new neighbor host
for MH7 and MH8; they update their information in the routing tables and they broadcast. Now,
MH4 will receive its updated information from MH6 where MH6 will receive two information
packets from different neighbors to reach MH1 with same sequence number, but different metric.
The selection of the route will depend on less hop count when the sequence number is the same.
Now the routing table will look like Table-3 and the forwarding table will look like Table-4.
Advantage of DSDV
1. DSDV protocol guarantees loop free paths.
2. Count to infinity problem is reduced in DSDV.
3. We can avoid extra traffic with incremental updates instead of full dump updates.
4. Path Selection: DSDV maintains only the best path instead of maintaining multiple paths
to every destination. With this, the amount of space in routing table is reduced.
Disadvantage of DSDV
1. Wastage of bandwidth due to unnecessary advertising of routing information even if there
is no change in the network topology.
2. DSDV doesn’t support Multi path Routing.
3. It is difficult to determine a time delay for the advertisement of routes.
4. It is difficult to maintain the routing table’s advertisement for larger network. Each and
every host in the network should maintain a routing table for advertising. But for larger
network this would lead to overhead, which consumes more bandwidth.
MAHARAJA SURAJMAL INSTITUTE OF TECHNOLOGY
FACULTY: Dr. Prabhjot Kaur
1.3.1.2 Global State Routing
Global State Routing (GSR) is similar to DSDV. It takes the idea of link state routing but improves
it by avoiding flooding of routing messages.
In the LS routing method, each node floods the link state information into the whole network
(global flooding) once it realizes that links change between itself and its neighbours. The link state
information includes the delay to each of its neighbours. A node will know the whole topology
when it obtains all link information. Each node maintains a Neighbor list, a Topology table, a Next
Hop table and a Distance table. LS routing works well in networks with static topologies. When
links change quickly, however, frequent global flooding will inevitably lead to huge control
overhead. Unlike the traditional LS method, GSR does not flood the link state packets. Instead,
every node maintains the link state table based on up-to-date LS information received from
neighbouring nodes, and periodically exchanges its LS information with its neighbours only (no
global flooding). Before sending an LS packet, a node assigns the LS packet a unique sequence
number to identify the newest LS information. LS information is disseminated as the LS packets
with larger sequence numbers replace the ones with smaller sequence numbers.
The convergence time required to detect a link change in GSR is shorter than in the Distributed
Bellman-Ford (DBF) protocol. The convergence time in GSR is O(D*I) where D is the diameter
of the network and I is the link state update interval. The convergence time is normally smaller
than O(N*I) in DBF, where N is the number of nodes in the networks and I is the update interval.
Since the global topology is maintained in every node, preventing routing loops is simple and easy.
Limitations
The drawbacks of GSR are the large size of the update messages, which consume a considerable
amount of bandwidth, and the latency of the LS information propagation, which depends on the
LS information update interval time. ``Fisheye'' technology can be used to reduce the size of update
messages. In this case, every node maintains highly accurate network information about the
immediate neighboring nodes, with progressively fewer details about farther nodes.
The two major phases of the protocol are: route discovery and route maintenance. When the source
node wants to send a packet to a destination, it looks up its route cache to determine if it already
contains a route to the destination. If it finds that an unexpired route to the destination exists, then
it uses this route to send the packet. But if the node does not have such a route, then it initiates the
route discovery process by broadcasting a route request packet. The route request packet contains
the address of the source and the destination, and a unique identification number. Each
intermediate node checks whether it knows of a route to the destination. If it does not, it appends
its address to the route record of the packet and forwards the packet to its neighbors. To limit the
number of route requests propagated, a node processes the route request packet only if it has not
already seen the packet and it's address is not present in the route record of the packet.
A route reply is generated when either the destination or an intermediate node with current
information about the destination receives the route request packet. A route request packet
reaching such a node already contains, in its route record, the sequence of hops taken from the
source to this node.
DSRP uses two types of packets for route maintenance:- Route Error packet and
Acknowledgements. When a node encounters a fatal transmission problem at its data link layer, it
generates a Route Error packet. When a node receives a route error packet, it removes the hop in
error from it's route cache. All routes that contain the hop in error are are truncated at that point.
Acknowledgment packets are used to verify the correct operation of the route links. This also
includes passive acknowledgments in which a node hears the next hop forwarding the packet along
the route.
To find a path to the destination, the source broadcasts a route request packet. The neighbors in
turn broadcast the packet to their neighbors till it reaches an intermediate node that has a recent
route information about the destination or till it reaches the destination (Fig. 5). A node discards a
route request packet that it has already seen. The route request packet uses sequence numbers to
ensure that the routes are loop free and to make sure that if the intermediate nodes reply to route
requests, they reply with the latest information only.
When a node forwards a route request packet to its neighbors, it also records in its tables the node
from which the first copy of the request came. This information is used to construct the reverse
path for the route reply packet. AODV uses only symmetric links because the route reply packet
follows the reverse path of route request packet. As the route reply packet traverses back to the
source (Fig. 6), the nodes along the path enter the forward route into their tables.
If the source moves then it can reinitiate route discovery to the destination. If one of the
intermediate nodes move then the moved nodes neighbor realizes the link failure and sends a link
failure notification to its upstream neighbors and so on till it reaches the source upon which the
source can reinitiate route discovery if needed.
Advantages
1. Because of its reactive nature, AODV can handle highly dynamic behavior of Vehicle Ad-
hoc networks.
2. Used for both unicasts and multicasts using the ’J’ (Join multicast group) flag in the
packets.
Disadvantages
1. Requirement on broadcast medium: The algorithm expects/requires that the nodes in the
broadcast medium can detect each other’s broadcasts.
2. Overhead on the bandwidth: Overhead on bandwidth will be occurred compared to DSR,
when an RREQ travels from node to node in the process of discovering the route info on
demand, it sets up the reverse path in itself with the addresses of all the nodes through
which it is passing and it carries all this info all its way.
3. No reuse of routing info: AODV lacks an efficient route maintenance technique. The
routing info is always obtained on demand, including for common case traffic.
MAHARAJA SURAJMAL INSTITUTE OF TECHNOLOGY
FACULTY: Dr. Prabhjot Kaur
4. It is vulnerable to misuse: The messages can be misused for insider attacks including
route disruption, route invasion, node isolation, and resource consumption.
5. AODV lacks support for high throughput routing metrics: AODV is designed to
support the shortest hop count metric. This metric favors long, low bandwidth links over
short, high-bandwidth links.
6. High route discovery latency: AODV is a reactive routing protocol. This means that
AODV does not discover a route until a flow is initiated. This route discovery latency result
can be high in large-scale mesh networks.
Dynamic Source Routing (DSR) and AdHoc On Demand Distance Vector Routing (AODV) are
both routing protocols for wireless mesh/ad hoc networks. Both the protocols employ different
mechanisms that result in varied performance levels. DSR and AODV can be compared and
evaluated based on the packet delivery ratio, normalized MAC load, normalized routing load, and
average end-to-end delay by altering the number of sources, speed, and pause time.
Both DSR and AODV are demand-driven protocols which form a route on demand when a
transmitting computer desires a route. The main difference between DSR and AODV is the source
routing feature. The DSR is based on source routing in which all the routing information such as
is maintained at the mobile nodes. The DSR computes the routes and also updates them. The source
routing is a technique in which the packet sender identifies the entire sequence of the node into
which the packet has to pass through. The packet sender lists the route in the packet’s header so
that the next node to which the packet has to be transmitted can be identified by the address on the
way to the destination host. The AODV uses a combination of a DSR and DSDV mechanism. It
uses the route discovery and route maintenance from a DSR and hop-by-hop routing, periodic
advertisements, sequence numbers from DSDV. The AODV easily overcomes the counting to
infinity and Bellman Ford problems, and it also provides quick convergence whenever the ad hoc
network topology is altered.
When DSR and AODV are analyzed using a packet delivery ratio parameter by varying the
paused time in the intervals of 0, 10, 20, 40, 100, the results obtained for both on demand routing
protocols look similar.
The normalized routing load is analyzed for both protocols by varying paused times.
The values for the DSR protocol were less as compared to the AODV which show fairly stable
results even after increasing the number of sources. If normalized routing load is stable, the
protocol is considered to be scalable. The routing overhead for AODV is mainly from the route
requests. DSR finds the route in the cache as a result of aggressive caching. This helps to avoid a
frequent route discovery process in DSR thereby decreasing the routing overhead for DSR when
compared to AODV.
When it comes to performance comparison between the two protocols, the cache staleness and
high MAC overhead degrade the performance of DSR in high mobility scenarios. In lower-
mobility scenarios, the performance of DSR is better than AODV as the route is always found
quickly in cache avoiding the route discovery process.
1. http://www8.cs.umu.se/education/examina/Rapporter/KrishnaGorantala.pdf
2. David B. Johnson, Davis A. Maltz, "Dynamic Source Routing in Ad Hoc Networks",
Mobile Computing, T. Imielinski and H. Korth, Eds., Kulwer, 1996, pp. 152-81.
3. Charles E. Perkins, Elizabeth M. Royer, Samir R. Das, "Ad Hoc On-demand Distance
Vector Routing", October 99 IETF Draft, 33 pages.
4. A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, "Scalable Routing Strategies
for Ad Hoc Wireless Networks" IEEE Journal on Selected Areas in Communications,
Special Issue on Ad-Hoc Networks, Aug. 1999, pp.1369-79.
http://www.cs.ucla.edu/NRL/wireless/PAPER/jsac99.ps.gz.
5. Tsu-Wei Chen and Mario Gerla, "Global State Routing: A New Routing Scheme for Ad-
hoc Wireless Networks" Proc. IEEE ICC'98, 5 pages.
http://www.ics.uci.edu/~atm/adhoc/paper-collection/gerla-gsr-icc98.pdf.
6. http://webhome.csc.uvic.ca/~wkui/Courses/wireless/Lecture4.pdf