SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
DOI : 10.5121/ijdps.2014.5309 87
SURVEY: COMPARISON ESTIMATION OF VARIOUS
ROUTING PROTOCOLS IN MOBILE AD-HOC
NETWORK
Priyanshu and Ashish Kumar Maurya
Department of Computer Science & Engineering, Shri Ramswaroop Memorial
University, Uttar Pradesh- 225003, India
ABSTRACT
MANET is an autonomous system of mobile nodes attached by wireless links. It represents a complex and
dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into an ad-
hoc network topology. The devices in the network may have limited transmission range therefore multiple
hops may be needed by one node to transfer data to another node in network. This leads to the need for an
effective routing protocol. In this paper we study various classifications of routing protocols and their types
for wireless mobile ad-hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast
Protocols. In this paper we also compare different routing protocols on based on a given set of parameters
Scalability, Latency, Bandwidth, Control-overhead, Mobility impact.
KEYWORDS
MANET, Routing Protocol, Reactive Proactive, Hybrid, Hierarchical, Geographic Position, Assisted
Routing Protocol.
1. INTRODUCTION
Mobile Ad-hoc Network (MANET) is collection of wireless nodes that do not depend on already
existing infrastructure so there is no concept of base station or access point. In MANETs, due to
availability of mobility in nodes and deficiency of centralized entity, the network topology
changes repeatedly and erratically [1]. In MANETs each node works as router for packet
forwarding whereas in wired network router performs routing table. It is multi-hop wireless
network because different sets of nodes want to establish a network & it is not compulsory that
each node is within the transmission range as it might be in out of range, so another set of nodes
are used to connect the out of range nodes. Therefore whenever one node sends data to another
node, a set of nodes may be used in between, where data is send in different hop that’s why they
are also called multi-hop, wireless & distributed network [2].
Figure 1. Hop to hop data transfer in MANET
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
88
Figure 1 depicts a multi-hop data transfer in a MANET. In the ad-hoc network nodes act as
routers as well as hosts therefore node may forward packets as well as run user applications [3,
4].The aim of MANET is to establish an accurate and efficient route between nodes such that any
messages are delivered on time [5]. Nowadays, with the immense growth in wireless network
applications like PDAs and cell phones, various researches are being done to improve the
network services and performance. So there are various challenging design issues in wireless
Ad Hoc networks [6].
Main challenges of these networks are:-
 Spectrum allocation
 Self configuration
 Medium access control
 Energy efficient
 Mobility management
 Security & Privacy
 Routing protocols
 QoS etc
Main applications of this network are home network, environmental monitoring and public
wireless access in urban area, Emergency rescue and Vehicular communications in military.
2. CLASSIFICATION OF ROUTING PROTOCOLS
Routing protocols define a set of rules which helps to transfer data or message packets from
source to destination in a network [6]. In MANET, there are different types of routing protocols
each of them is applied according to the network situations. Figure 2 shows the classification of
the routing protocols according to network structure in MANETs.
Figure 2. Classification of MANET routing protocols
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
89
2.1. Table Driven Routing Protocol
Table driven routing protocols are also known as proactive routing protocols. They are
conventional routing protocols based on either link-state or distance vector principles [7]. In this
routing protocol every node maintains complete information about the network topology [8, 9].
Whenever the network topology changes the routing table is updated automatically. As they need
to keep node entries for each and every node in the routing table of every node therefore these
protocols are not appropriate for usage in large networks. Proactive routing protocols maintain
different number of routing tables varying from protocol to protocol [10]. Some popular proactive
routing protocols are: DSDV, GSR, OLSR, WRP etc.
2.1.1. Destination-Sequenced Distance-Vector Routing (DSDV)
Based on the Bellman-Ford routing mechanism DSDV is a proactive routing protocol [11]. It is a
loop free routing algorithm. Every mobile node in the network maintains a routing table which
maintains data of all the feasible destinations within the network and the number of hops to reach
each destination. Every entry is marked with a sequence number assigned by the destination node
[12]. The routing table updates is done by using two methods: full dump and incremental. The
neighbour receives the entire routing table, in full dump while the neighbour receives only the
entries that require changes in incremental update [11].
2.1.2. Global State Routing (GSR)
Global State Routing is a proactive routing protocol based on link state routing in which each
node floods the link-state information to every node in the network, each time its link changes.
GSR reduces the cost of link-state information by exchange of sequenced data rather than
flooding [13]. In this algorithm, each node maintains a neighbour list (contains the list of its
neighbours), topology table (contains the link state information), next Hop table (contains the
next hop to which the packets is forwarded) and a distance table (contains the shortest path to
each destination node).
2.2. On-Demand Routing Protocol
On-Demand Routing Protocol is also known as Reactive Routing Protocol. This protocol does not
maintain up to date view of all destination nodes in the network. Whenever route is needed then
only it is discovered, nodes start route discovery on demand basis and connection is establishes in
order to transmit and receive data packets [6, 14]. Source node sees its route cache for the
available route from source to destination, if the route is not available then it initiates route
discovery process. The route request packets are flooded by using flooding technique throughout
the network for route discovery. These protocols require a route discovery & route maintenance
process [15]. Many reactive routing protocols have been proposed example DSR, AODV, TORA
and LMR.
2.2.1 Ad Hoc On-Demand Distance Vector Routing (AODV)
Ad-Hoc On-Demand Distance Vector Routing (AODV) Protocol is based on On-Demand
Routing Protocol which is fundamentally an improvement on DSDV & it is designed for network
in such a way that they support thousands of mobile nodes. It only supports the use of symmetric
link. It minimizes the number of broadcasts by creating routes based on demand [16]. In this
protocol each node maintains sequence number & broadcast-id. To send any packet from source
node to destination node, a route request (RREQ) packet is broadcasted. The neighbouring nodes
receive the packet and broadcast it further to their neighbours and this process continues until the
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
90
packet reaches the destination. It typically uses distance-vector routing algorithms that keep
information about next hops to adjacent neighbours [17, 18].
2.2.2. Dynamic Source Routing (DSR)
Dynamic Source Routing is a Reactive Protocol based on the concept of source routing in which
source initiates route discovery on demand basis in multi-hop networks. The sender determines
the route from source to destination and it also includes the address of all intermediate nodes from
source to destination to the route record in the packet. Also called as a beaconless protocol where
HELLO messages are not exchanged between nodes to inform them about the presence of their
neighbours in the network [19].There are two key phases in DSR: route discovery and route
maintenance. All nodes maintain route caches that contain the source routes of which the mobile
is aware. The route caches entries are continually updated as new routes are learned. Route cache
is checked first when a source node wants to send a packet. If the route is available, the source
node incorporates the routing information inside the data packet before sending it [20].
2.3. Hybrid routing protocol
Hybrid routing protocol is the combination of proactive and reactive routing protocols. In this
protocol each node have predefine zone called cluster & all clusters form a hierarchical
infrastructure [21].The main purpose of designing this routing protocol is for larger and complex
network in order to take advantages of both Proactive and Reactive Routing Protocol. It
implements the route discovery mechanism and the table maintenance mechanism of reactive
protocol proactive protocol respectively in such a way so as to avoid latency and routing overhead
problems in the network [22]. It uses proactive protocol inside zone & reactive outside zone.
There are various hybrid routing protocols are ZRP, ZHLS, SHARP. Figure 3 and Figure 4 shows
the concepts used in hybrid protocols.
Figure 3. Combination feature of proactive and reactive routing protocol
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
91
Figure 4. Hybrid routing protocol
2.3.1. Zone Routing Protocol (ZRP)
Zone Routing Protocol (ZRP) is the combination of both reactive and proactive routing protocols
to make routing more scalable and efficient [23]. It is basically proposed for wireless ad-hoc
networks with bi-directional links [24, 25]. This routing protocol is zone based i.e. different zones
may consist of number of nodes to create route discovery and maintenance more reliable [26].
Each node has a predefined zone, in which the nodes lying Inside Zones use proactive routing and
Outside Zones use on-demand routing protocol to provide more flexibility. Route creation is done
using a query-reply mechanism through Reactive Routing. ZRP uses a query control mechanism
to reduce route query traffic and also handles the network and perform route discovery more
efficiently [23,27]. Figure 5 shows a central node, inside zone and outside zone division of nodes.
Figure 5. Example: ZRP having zone radius = 2
2.4. Hierarchical Routing Protocol
Hierarchical Routing is multilevel clustering of mobile nodes. Routing protocols for mobile ad
hoc networks utilize hierarchical network architectures. The proper proactive routing and reactive
routing approach are dominated in different hierarchical levels. They are also appropriate for
wireless sensor networks (HSR). In case of a route failure the entire route does not need to be
recalculated. These networks address the scalability. This routing provides fast and most efficient
way of establishment for the communications of mobile nodes in MANET [28].
2.4.1. Fisheye State Routing (FSR)
FSR is a hierarchical routing protocol and a proactive protocol, based on link state routing
protocol that is suitable for wireless ad hoc network [29, 30]. FSR is more appropriate for large
networks where mobility is high and bandwidth is low. Basically FSR is an improvement of GSR.
It maintains updated information from the neighbour node through a link state table. FSR uses the
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
92
‘fisheye’ technique to reduce the size of information required to represent graphical data. It helps
to make a routing protocol more scalable by assembly data on the topology [31, 32]. Distance is
calculated by hops from the node and is used to classify zones in FSR.
2.4.2. Cluster Gateway Switch Routing Protocol (CGSR)
CGSR is a multi-hop mobile wireless network with various routing schemes [15] in which nodes
are organized into hierarchy of clusters. It is a multichannel operation capable protocol [33]
where each node has a cluster head and packet is sent through cluster heads. Cluster heads
communicate amongst themselves using DSDV and two clusters are connected through a gateway
node. A packet sent by a source node is first sent to its cluster head, and then the gateway receives
packet from the cluster head. The gateway then sent it over to another cluster head, and this
process goes on until the cluster head of the destination node is reached. A cluster head is able to
control a group of ad-hoc hosts and each node maintains two tables, first table is: cluster member
table that contain the cluster head for each destination node & second table is: DV-routing table
that contain the next hop to the destination.
Figure 6. CGSR
2.5. Geographic position assisted routing protocols
Geographic routing protocols have a lot of attention in the field of routing protocols for ad-hoc
network. They are more well-organized and scalable for ad-hoc network because these routing
protocols make minimum use of the topology information and there is no necessity needed to
keep routing tables up-to-date [34]. In this protocol each nodes know their geo coordinates and
propagate geo info by flooding. Geographic routing protocols such as LAR, DREAM, and GPSR
are the example of these routing protocols [35].
2.5.1. Location-Aided Routing (LAR)
Location information is used by LAR protocols to reduce the search space for a proper route.
Each node knows its location in each moment and utilizes location information for discovering a
new route to a smaller requested zone. Route discovery is initiated when source node doesn’t
know a route to destination or previous route from source to destination is broken. This protocol
is basically based on limited flooding to discover routes.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
93
2.5.2. Geocast Protocols
Spread of a message to a few or all nodes within a geographical area is geocast. It uses specific
geographic information to specify the destination. Geocast group is only distinct by a geographic
region. Its information can be used to make routing more efficient. The main goal of geocast
protocols is to deliver data packets to a group of nodes that are inside a specified geographical
area [36]. It provides a better scalability among group of nodes [37]. Geocast is a variety of
amplification of multicast operations. The protocol to perform geocast operations can be divided
into two categories: data-transmission oriented protocols (such as LBM) and routing-creation
oriented protocols (Geo Tora). When a node in the geocast region receives the geocast packet, it
floods the packet such that the flooding is limited to the geocast region.
Figure 7. Geo cast
3. PERFORMANCE COMPARISONS
Since there are number of routing protocols and their different algorithms as discussed above
therefore there is a need to compare different routing protocols to judge the performance and their
usage over different networks. The comparison done here is based on a given set of parameters
such Scalability, Latency, Bandwidth, Control-overhead, Mobility impact.
Table 1. Comparison of Various Routing Protocol
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
94
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
95
4. CONCLUSIONS
We have seen a great improvement in the field of wireless and Mobile ad hoc network .In this
paper we have described a number of algorithms for routing and broadly categorized routing
protocols- Table driven, on demand, Hierarchical, Hybrid and Geographic position assisted
routing protocols and compared the various routing protocol of mobile ad-hoc networks and
presented in the form of table for a given parameter. There is not any defined single protocol that
can be perfect for usage in all type of networks. For comparatively small network proactive and
reactive routing protocols are appropriate. But in large network can be either hierarchical or
geographic routing protocols are suitable.
REFERENCES
[1] Elizabeth Royer, and Chai-Keong Toh, (1999), “A Review of Current Routing Protocols for Ad Hoc
Mobile Wireless Networks,” IEEE Personal Communications, pp 46-55.
[2] Robinpreet Kaur and Mritunjay Kumar Rai, (2012), “A Novel Review on Routing Protocols in
MANETs”, Undergraduate Academic Research Journal (UARJ), vol. 1, Issue-1, ISSN : 2278 –
1129.
[3] P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, M. Degermark, (1999), “Scenario-based
Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks”, ACM Proceedings of the
5th
annual International Conference on Mobile Computing and Networking, pp.195-206, isbn -
58113-142-9.
[4] Prabhakara Reddy, E. Suresh Babu, and M. L. Ravi Chandra, (2012) “A comprehensive study of
Routing protocols in Mobile Ad hoc Networks”, Research Survey International Journal of Advanced
Information Science and Technology (IJAIST), ISSN: 2319:2682, Vol.7, No.7.
[5] Elizabeth M. Royer and Chai-Keong Toh, (1999) “A Review of Current Routing Protocols for Ad
Hoc Mobile Wireless Networks”, IEEE Personal Communications, vol. 6, no. 2.
[6] Dr.S.S.Dhenakaran and A.Parvathavarthini, (2013) “An Overview of Routing Protocols in Mobile
Ad-Hoc Network”, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 2.
[7] Larry L. Peterson and Bruce S. Davie, (1996) Computer Networks - A Systems Approach, Morgan
Kaufmann Publishers Inc., San Francisco, ISBN l-55860-368-9.
[8] Robinpreet Kaur, and Mritunjay Kumar Rai, (2012), “A Novel Review on Routing Protocols in
MANETs”, Undergraduate Academic Research Journal (UARJ), Vol. 1, Issue-1, ISSN: 2278 – 1129.
[9] Elizabeth M. Royer, (1999) “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless
Networks” , IEEE Personal Communications, pp. 46-55.
[10] P. Manickam, T. Guru Baskar, M. Girija and Dr. D. Manimegalai, (2011), "Performance comparisons
of routing protocols in mobile ad hoc networks", International Journal of Wireless & Mobile
Networks (IJWMN), vol. 3, no. 1.
[11] Adel.S.El ashheb, (2012), "Performance Evaluation of AODV and DSDV Routing Protocol in
wireless sensor network Environment ", International Conference on Computer Networks and
Communication Systems, PCSIT vol.35, pp. 55-62.
[12] Perkins CE, and Bhagwat P, (1994), “Highly Dynamic Destination-Sequenced Distance-Vector
Routing (DSDV) for Mobile Computers”, Proceedings of ACM SIGCOMM, pp. 234–244.
[13] T. Chen, and M. Gerla, (1998), “Global State Routing: A new Routing Scheme for Ad-Hoc Wireless
Networks”, Proceedings of IEEE ICC, pp. 171 - 175.
[14] Krishna Gorantala, (2006), “Routing Protocols in Mobile Ad-hoc Networks”, A Master’s thesis in
computer science, pp. 1-36.
[15] Tarek Sheltami and Hussein Mouftah, (2003), “Comparative study of on demand and Cluster Based
Routing protocols in MANETs”, IEEE conference, pp. 291-295, 2003.
[16] Charles E. Perkins, Elizabeth M. Belding-Royer, and Ian D. Chakeres, (2004) “ Mobile Ad Hoc
Networking Working Group INTERNET DRAFT”.
[17] Ian D.Chakeres, and Elizabeth M.Belding-Royer, (2004) “AODV Routing Protocol Implementation
Design” International Conf. on Distributed Computing Sysmtes, IEEE, vol.7.
International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014
96
[18] G.Vijaya Kumar, Y.Vasudeva Reddyr, and Dr.M.Nagendra, (2010), ”Current Research Work on
Routing Protocols for MANET: A Literature Survey”, International Journal on Computer Science
and Engineering, Vol. 02, No. 03, pp. 706-713.
[19] S. Meenakshi Sundaram,Dr.S.Palani, and Dr. A. Ramesh Babu, (2013)” A Performance Comparison
study of Unicast and Multicast Routing Protocols for Mobile Ad hoc Networks”, International Journal
of Engineering Research and Applications (IJERA) , Vol. 3, Issue 2, pp.1446-1458.
[20] S. Sathish, K. Thangavel and S. Boopathi, (2011), "Comparative Analysis of DSR, FSR and ZRP
Routing Protocols in MANET ",International Conference on Information and Network Technology ,
IPCSIT vol.4, IACSIT Press.
[21] Ravi Prakash, Andre Schiper and Mansoor Mohsin, (2003) “Reliable Multicast in Mobile Networks”,
Proc. of IEEE, (WCNC).
[22] Dr.S.S.Dhenakaran , A.Parvathavarthini, (2013), "An Overview of Routing Protocols in Mobile Ad-
Hoc Network",International Journal of Advanced Research in Computer Science and Software
Engineering,Volume 3, Issue 2.
[23] M.L Sharma, Noor Fatima Rizvi, Nipun Sharma, Anu Malhan and Swati Sharma, (2010)
“Performance Evaluation of MANET Routing Protocols under CBR and FTP traffic classes”, Int. J.
Comp. Tech. Appl., vol. 2 (3),pp. 392-400.
[24] Pearlman MR, and Samar P, (2002 ) “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”,
IETF draft, available at http://tools.ietf.org/id/draft-ietf-manetzone-zrp-04.txt. Accessed.
[25] Chiang C-C, Wu H-K, and Liu W, Gerla M, (1989) “Routing in Clustered Multihop, Mobile
Wireless Networks with Fading Channel”, Proceedings of IEEE SICON,pp.197–211.
[26] Zygmunt J. Haas, and Marc R. Pearlman, (2001) “The performance of Query Control Schemes for the
Zone Routing Protocol”, IEEE/ACM transactions on networking, vol. 9, no. 4.
[27] A.-S.K. Pathan, C.S. Hong Haas ZJ, Pearlman MR, Samar P, (2002)“Intrazone Routing Protocol
(IARP)”, IETF Internet Draft.
[28] Weiliang Li, and Jianjun Hao, (2010) “Research on the Improvement of Multicast Ad Hoc On-
demand Distance Vector in MANETS”, IEEE International Conference on Computer and Automation
Engineering (Singapore), vol. 1, pp.702-705.
[29] Mehran Abolhasan and Tadeusz Wysocki, (2003) “Displacement based Route update strategies for
proactive routing protocols in mobile ad hoc networks” International Workshop on the Internet,
Telecommunications and Signal processing.
[30] Pei G., Gerla M., and Tsu-Wei Chen, (2000)"Fisheye State Routing: A Routing Scheme for Ad Hoc
Wireless Networks," IEEE ICC vol. 1, pp. 70 -74.
[31] A. Iwata, C.C. Chiang, G. Pei, M. Gerla, and T.W. Chen, (1999) “Scalable Routing Strategies for
Ad- Hoc Wireless Networks”, IEEE Journal on Selected Areas in Communications, pp. 17(8): 1369 -
1379.
[32] Mario Gerla, Xiaoyan Hong, and Guangyu Pei, (2002) “Fisheye State Routing Protocol (FSR) for Ad
Hoc Networks”, INTERNETDRAFT-<draft-ietf-manet-fsr-03.txt>.
[33] C.C. Chiang, H.K. Wu, W. Liu, M. Gerla, (1997) “Routing in Clustered Multihop Mobile Wireless
Networks with Fading Channel”, Proceeding of IEEE Singapore International Conference on
Networks SICON, pages 197 -212.
[34] Biao Zhou,Yeng-Zhong Lee,Mario Gerla, (2008) “Direction Assisted Geographic Routingfor Mobile
Ad Hoc networks ", IEEE Military communications conference (San Diego), pp. 1-7.
[35] Divya Wadhwa,Deepika,Vimmi Kochher and Rajesh Kumar Tyag, (2014) "A Review of Comparision
of Geographic Routing Protocols in Mobile Adhoc Network ",ISSN 2231-1297, Volume 4, Number 1
, pp. 51-58.
[36] Konglin Zhu , Biao Zhou, Xiaoming Fu, and Mario Gerla, (2011) “Geo-assisted Multicast Inter-
Domain Routing (GMIDR) Protocol for MANETs”, IEEE International Conference.
[37] S.Esakki Muthu, and S.Sudha, (2013) “Dynamic Geographical broadcast over Mobile ad Hoc
networks”, IJREAT International Journal of Research in Engineering & Advanced Technology, Vol.
1, Issue 1, ISSN: 2320 – 8791.

Weitere ähnliche Inhalte

Was ist angesagt?

PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingeSAT Publishing House
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...eSAT Journals
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ijwmn
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIJCNCJournal
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attackijsrd.com
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...ijwmn
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantificationijwmn
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 

Was ist angesagt? (17)

PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Performance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routingPerformance analysis of aodv, olsr, grp and dsr routing
Performance analysis of aodv, olsr, grp and dsr routing
 
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
O26087092
O26087092O26087092
O26087092
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATION
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETSIMPROVED NETWORK CONNECTIVITY IN MANETS
IMPROVED NETWORK CONNECTIVITY IN MANETS
 
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole AttackPerformance Comparison of IAODV and OLSR Protocols under Black Hole Attack
Performance Comparison of IAODV and OLSR Protocols under Black Hole Attack
 
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...T HE  I MPACT OF  TCP C ONGESTION  W INDOW  S IZE  ON THE  P ERFORMANCE  E VA...
T HE I MPACT OF TCP C ONGESTION W INDOW S IZE ON THE P ERFORMANCE E VA...
 
Local distance's neighbouring quantification
Local distance's neighbouring quantificationLocal distance's neighbouring quantification
Local distance's neighbouring quantification
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 

Andere mochten auch

Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...ijdpsjournal
 
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESSURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
 
On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...ijdpsjournal
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...ijdpsjournal
 
Spectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countriesSpectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countriesijdpsjournal
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...ijdpsjournal
 
Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...ijdpsjournal
 
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...ijdpsjournal
 
GPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite ImagesGPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite Imagesijdpsjournal
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEYBREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEYijdpsjournal
 
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORSSTUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORSijdpsjournal
 
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...ijdpsjournal
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Networkijdpsjournal
 

Andere mochten auch (19)

Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
Design Of Elliptic Curve Crypto Processor with Modified Karatsuba Multiplier ...
 
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESSURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
 
Crypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sqlCrypto multi tenant an environment of secure computing using cloud sql
Crypto multi tenant an environment of secure computing using cloud sql
 
On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...On the fly porn video blocking using distributed multi gpu and data mining ap...
On the fly porn video blocking using distributed multi gpu and data mining ap...
 
Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...Implementing database lookup method in mobile wimax for location management a...
Implementing database lookup method in mobile wimax for location management a...
 
Spectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countriesSpectrum requirement estimation for imt systems in developing countries
Spectrum requirement estimation for imt systems in developing countries
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
A LIGHT-WEIGHT DISTRIBUTED SYSTEM FOR THE PROCESSING OF REPLICATED COUNTER-LI...
 
Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...Management of context aware software resources deployed in a cloud environmen...
Management of context aware software resources deployed in a cloud environmen...
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...Survey comparison estimation of various routing protocols in mobile ad hoc ne...
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
 
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
HIGHLY SCALABLE, PARALLEL AND DISTRIBUTED ADABOOST ALGORITHM USING LIGHT WEIG...
 
GPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite ImagesGPU Accelerated Automated Feature Extraction From Satellite Images
GPU Accelerated Automated Feature Extraction From Satellite Images
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEYBREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
BREAST CANCER DIAGNOSIS USING MACHINE LEARNING ALGORITHMS –A SURVEY
 
4213ijdps03
4213ijdps034213ijdps03
4213ijdps03
 
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORSSTUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
STUDY OF VARIOUS FACTORS AFFECTING PERFORMANCE OF MULTI-CORE PROCESSORS
 
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
EFFICIENT SCHEDULING STRATEGY USING COMMUNICATION AWARE SCHEDULING FOR PARALL...
 
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc NetworkTarget Detection System (TDS) for Enhancing Security in Ad hoc Network
Target Detection System (TDS) for Enhancing Security in Ad hoc Network
 

Ähnlich wie Survey comparison estimation of various routing protocols in mobile ad hoc network

COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKpijans
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...IOSR Journals
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcppijans
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...CSEIJJournal
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Editor IJARCET
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...Narendra Singh Yadav
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsidescitation
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewBRNSSPublicationHubI
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Narendra Singh Yadav
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 

Ähnlich wie Survey comparison estimation of various routing protocols in mobile ad hoc network (20)

COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORKCOMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
COMPARING THREE PROTOCOLS OF DODV, DSR, DSDV FOR VANET NETWORK
 
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
A Simulation Based Performance Comparison of Routing Protocols (Reactive and ...
 
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over TcpPerformance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
Performance Analysis of Mobile Adhoc Network Routing Protocols Over Tcp
 
To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...To improve the QoS in MANETs through analysis between reactive and proactive ...
To improve the QoS in MANETs through analysis between reactive and proactive ...
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286Ijarcet vol-2-issue-7-2281-2286
Ijarcet vol-2-issue-7-2281-2286
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
J0935461
J0935461J0935461
J0935461
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
Progressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETsProgressive Routing Protocol using Hybrid Analysis for MANETs
Progressive Routing Protocol using Hybrid Analysis for MANETs
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
A New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A ReviewA New Energy Efficient Approach in MANETs: A Review
A New Energy Efficient Approach in MANETs: A Review
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 
Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)Source routing in Mobile Ad hoc NETworks (MANETs)
Source routing in Mobile Ad hoc NETworks (MANETs)
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 

Kürzlich hochgeladen

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Kürzlich hochgeladen (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Survey comparison estimation of various routing protocols in mobile ad hoc network

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 DOI : 10.5121/ijdps.2014.5309 87 SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK Priyanshu and Ashish Kumar Maurya Department of Computer Science & Engineering, Shri Ramswaroop Memorial University, Uttar Pradesh- 225003, India ABSTRACT MANET is an autonomous system of mobile nodes attached by wireless links. It represents a complex and dynamic distributed systems that consist of mobile wireless nodes that can freely self organize into an ad- hoc network topology. The devices in the network may have limited transmission range therefore multiple hops may be needed by one node to transfer data to another node in network. This leads to the need for an effective routing protocol. In this paper we study various classifications of routing protocols and their types for wireless mobile ad-hoc networks like DSDV, GSR, AODV, DSR, ZRP, FSR, CGSR, LAR, and Geocast Protocols. In this paper we also compare different routing protocols on based on a given set of parameters Scalability, Latency, Bandwidth, Control-overhead, Mobility impact. KEYWORDS MANET, Routing Protocol, Reactive Proactive, Hybrid, Hierarchical, Geographic Position, Assisted Routing Protocol. 1. INTRODUCTION Mobile Ad-hoc Network (MANET) is collection of wireless nodes that do not depend on already existing infrastructure so there is no concept of base station or access point. In MANETs, due to availability of mobility in nodes and deficiency of centralized entity, the network topology changes repeatedly and erratically [1]. In MANETs each node works as router for packet forwarding whereas in wired network router performs routing table. It is multi-hop wireless network because different sets of nodes want to establish a network & it is not compulsory that each node is within the transmission range as it might be in out of range, so another set of nodes are used to connect the out of range nodes. Therefore whenever one node sends data to another node, a set of nodes may be used in between, where data is send in different hop that’s why they are also called multi-hop, wireless & distributed network [2]. Figure 1. Hop to hop data transfer in MANET
  • 2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 88 Figure 1 depicts a multi-hop data transfer in a MANET. In the ad-hoc network nodes act as routers as well as hosts therefore node may forward packets as well as run user applications [3, 4].The aim of MANET is to establish an accurate and efficient route between nodes such that any messages are delivered on time [5]. Nowadays, with the immense growth in wireless network applications like PDAs and cell phones, various researches are being done to improve the network services and performance. So there are various challenging design issues in wireless Ad Hoc networks [6]. Main challenges of these networks are:-  Spectrum allocation  Self configuration  Medium access control  Energy efficient  Mobility management  Security & Privacy  Routing protocols  QoS etc Main applications of this network are home network, environmental monitoring and public wireless access in urban area, Emergency rescue and Vehicular communications in military. 2. CLASSIFICATION OF ROUTING PROTOCOLS Routing protocols define a set of rules which helps to transfer data or message packets from source to destination in a network [6]. In MANET, there are different types of routing protocols each of them is applied according to the network situations. Figure 2 shows the classification of the routing protocols according to network structure in MANETs. Figure 2. Classification of MANET routing protocols
  • 3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 89 2.1. Table Driven Routing Protocol Table driven routing protocols are also known as proactive routing protocols. They are conventional routing protocols based on either link-state or distance vector principles [7]. In this routing protocol every node maintains complete information about the network topology [8, 9]. Whenever the network topology changes the routing table is updated automatically. As they need to keep node entries for each and every node in the routing table of every node therefore these protocols are not appropriate for usage in large networks. Proactive routing protocols maintain different number of routing tables varying from protocol to protocol [10]. Some popular proactive routing protocols are: DSDV, GSR, OLSR, WRP etc. 2.1.1. Destination-Sequenced Distance-Vector Routing (DSDV) Based on the Bellman-Ford routing mechanism DSDV is a proactive routing protocol [11]. It is a loop free routing algorithm. Every mobile node in the network maintains a routing table which maintains data of all the feasible destinations within the network and the number of hops to reach each destination. Every entry is marked with a sequence number assigned by the destination node [12]. The routing table updates is done by using two methods: full dump and incremental. The neighbour receives the entire routing table, in full dump while the neighbour receives only the entries that require changes in incremental update [11]. 2.1.2. Global State Routing (GSR) Global State Routing is a proactive routing protocol based on link state routing in which each node floods the link-state information to every node in the network, each time its link changes. GSR reduces the cost of link-state information by exchange of sequenced data rather than flooding [13]. In this algorithm, each node maintains a neighbour list (contains the list of its neighbours), topology table (contains the link state information), next Hop table (contains the next hop to which the packets is forwarded) and a distance table (contains the shortest path to each destination node). 2.2. On-Demand Routing Protocol On-Demand Routing Protocol is also known as Reactive Routing Protocol. This protocol does not maintain up to date view of all destination nodes in the network. Whenever route is needed then only it is discovered, nodes start route discovery on demand basis and connection is establishes in order to transmit and receive data packets [6, 14]. Source node sees its route cache for the available route from source to destination, if the route is not available then it initiates route discovery process. The route request packets are flooded by using flooding technique throughout the network for route discovery. These protocols require a route discovery & route maintenance process [15]. Many reactive routing protocols have been proposed example DSR, AODV, TORA and LMR. 2.2.1 Ad Hoc On-Demand Distance Vector Routing (AODV) Ad-Hoc On-Demand Distance Vector Routing (AODV) Protocol is based on On-Demand Routing Protocol which is fundamentally an improvement on DSDV & it is designed for network in such a way that they support thousands of mobile nodes. It only supports the use of symmetric link. It minimizes the number of broadcasts by creating routes based on demand [16]. In this protocol each node maintains sequence number & broadcast-id. To send any packet from source node to destination node, a route request (RREQ) packet is broadcasted. The neighbouring nodes receive the packet and broadcast it further to their neighbours and this process continues until the
  • 4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 90 packet reaches the destination. It typically uses distance-vector routing algorithms that keep information about next hops to adjacent neighbours [17, 18]. 2.2.2. Dynamic Source Routing (DSR) Dynamic Source Routing is a Reactive Protocol based on the concept of source routing in which source initiates route discovery on demand basis in multi-hop networks. The sender determines the route from source to destination and it also includes the address of all intermediate nodes from source to destination to the route record in the packet. Also called as a beaconless protocol where HELLO messages are not exchanged between nodes to inform them about the presence of their neighbours in the network [19].There are two key phases in DSR: route discovery and route maintenance. All nodes maintain route caches that contain the source routes of which the mobile is aware. The route caches entries are continually updated as new routes are learned. Route cache is checked first when a source node wants to send a packet. If the route is available, the source node incorporates the routing information inside the data packet before sending it [20]. 2.3. Hybrid routing protocol Hybrid routing protocol is the combination of proactive and reactive routing protocols. In this protocol each node have predefine zone called cluster & all clusters form a hierarchical infrastructure [21].The main purpose of designing this routing protocol is for larger and complex network in order to take advantages of both Proactive and Reactive Routing Protocol. It implements the route discovery mechanism and the table maintenance mechanism of reactive protocol proactive protocol respectively in such a way so as to avoid latency and routing overhead problems in the network [22]. It uses proactive protocol inside zone & reactive outside zone. There are various hybrid routing protocols are ZRP, ZHLS, SHARP. Figure 3 and Figure 4 shows the concepts used in hybrid protocols. Figure 3. Combination feature of proactive and reactive routing protocol
  • 5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 91 Figure 4. Hybrid routing protocol 2.3.1. Zone Routing Protocol (ZRP) Zone Routing Protocol (ZRP) is the combination of both reactive and proactive routing protocols to make routing more scalable and efficient [23]. It is basically proposed for wireless ad-hoc networks with bi-directional links [24, 25]. This routing protocol is zone based i.e. different zones may consist of number of nodes to create route discovery and maintenance more reliable [26]. Each node has a predefined zone, in which the nodes lying Inside Zones use proactive routing and Outside Zones use on-demand routing protocol to provide more flexibility. Route creation is done using a query-reply mechanism through Reactive Routing. ZRP uses a query control mechanism to reduce route query traffic and also handles the network and perform route discovery more efficiently [23,27]. Figure 5 shows a central node, inside zone and outside zone division of nodes. Figure 5. Example: ZRP having zone radius = 2 2.4. Hierarchical Routing Protocol Hierarchical Routing is multilevel clustering of mobile nodes. Routing protocols for mobile ad hoc networks utilize hierarchical network architectures. The proper proactive routing and reactive routing approach are dominated in different hierarchical levels. They are also appropriate for wireless sensor networks (HSR). In case of a route failure the entire route does not need to be recalculated. These networks address the scalability. This routing provides fast and most efficient way of establishment for the communications of mobile nodes in MANET [28]. 2.4.1. Fisheye State Routing (FSR) FSR is a hierarchical routing protocol and a proactive protocol, based on link state routing protocol that is suitable for wireless ad hoc network [29, 30]. FSR is more appropriate for large networks where mobility is high and bandwidth is low. Basically FSR is an improvement of GSR. It maintains updated information from the neighbour node through a link state table. FSR uses the
  • 6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 92 ‘fisheye’ technique to reduce the size of information required to represent graphical data. It helps to make a routing protocol more scalable by assembly data on the topology [31, 32]. Distance is calculated by hops from the node and is used to classify zones in FSR. 2.4.2. Cluster Gateway Switch Routing Protocol (CGSR) CGSR is a multi-hop mobile wireless network with various routing schemes [15] in which nodes are organized into hierarchy of clusters. It is a multichannel operation capable protocol [33] where each node has a cluster head and packet is sent through cluster heads. Cluster heads communicate amongst themselves using DSDV and two clusters are connected through a gateway node. A packet sent by a source node is first sent to its cluster head, and then the gateway receives packet from the cluster head. The gateway then sent it over to another cluster head, and this process goes on until the cluster head of the destination node is reached. A cluster head is able to control a group of ad-hoc hosts and each node maintains two tables, first table is: cluster member table that contain the cluster head for each destination node & second table is: DV-routing table that contain the next hop to the destination. Figure 6. CGSR 2.5. Geographic position assisted routing protocols Geographic routing protocols have a lot of attention in the field of routing protocols for ad-hoc network. They are more well-organized and scalable for ad-hoc network because these routing protocols make minimum use of the topology information and there is no necessity needed to keep routing tables up-to-date [34]. In this protocol each nodes know their geo coordinates and propagate geo info by flooding. Geographic routing protocols such as LAR, DREAM, and GPSR are the example of these routing protocols [35]. 2.5.1. Location-Aided Routing (LAR) Location information is used by LAR protocols to reduce the search space for a proper route. Each node knows its location in each moment and utilizes location information for discovering a new route to a smaller requested zone. Route discovery is initiated when source node doesn’t know a route to destination or previous route from source to destination is broken. This protocol is basically based on limited flooding to discover routes.
  • 7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 93 2.5.2. Geocast Protocols Spread of a message to a few or all nodes within a geographical area is geocast. It uses specific geographic information to specify the destination. Geocast group is only distinct by a geographic region. Its information can be used to make routing more efficient. The main goal of geocast protocols is to deliver data packets to a group of nodes that are inside a specified geographical area [36]. It provides a better scalability among group of nodes [37]. Geocast is a variety of amplification of multicast operations. The protocol to perform geocast operations can be divided into two categories: data-transmission oriented protocols (such as LBM) and routing-creation oriented protocols (Geo Tora). When a node in the geocast region receives the geocast packet, it floods the packet such that the flooding is limited to the geocast region. Figure 7. Geo cast 3. PERFORMANCE COMPARISONS Since there are number of routing protocols and their different algorithms as discussed above therefore there is a need to compare different routing protocols to judge the performance and their usage over different networks. The comparison done here is based on a given set of parameters such Scalability, Latency, Bandwidth, Control-overhead, Mobility impact. Table 1. Comparison of Various Routing Protocol
  • 8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 94
  • 9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 95 4. CONCLUSIONS We have seen a great improvement in the field of wireless and Mobile ad hoc network .In this paper we have described a number of algorithms for routing and broadly categorized routing protocols- Table driven, on demand, Hierarchical, Hybrid and Geographic position assisted routing protocols and compared the various routing protocol of mobile ad-hoc networks and presented in the form of table for a given parameter. There is not any defined single protocol that can be perfect for usage in all type of networks. For comparatively small network proactive and reactive routing protocols are appropriate. But in large network can be either hierarchical or geographic routing protocols are suitable. REFERENCES [1] Elizabeth Royer, and Chai-Keong Toh, (1999), “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks,” IEEE Personal Communications, pp 46-55. [2] Robinpreet Kaur and Mritunjay Kumar Rai, (2012), “A Novel Review on Routing Protocols in MANETs”, Undergraduate Academic Research Journal (UARJ), vol. 1, Issue-1, ISSN : 2278 – 1129. [3] P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, M. Degermark, (1999), “Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks”, ACM Proceedings of the 5th annual International Conference on Mobile Computing and Networking, pp.195-206, isbn - 58113-142-9. [4] Prabhakara Reddy, E. Suresh Babu, and M. L. Ravi Chandra, (2012) “A comprehensive study of Routing protocols in Mobile Ad hoc Networks”, Research Survey International Journal of Advanced Information Science and Technology (IJAIST), ISSN: 2319:2682, Vol.7, No.7. [5] Elizabeth M. Royer and Chai-Keong Toh, (1999) “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communications, vol. 6, no. 2. [6] Dr.S.S.Dhenakaran and A.Parvathavarthini, (2013) “An Overview of Routing Protocols in Mobile Ad-Hoc Network”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 2. [7] Larry L. Peterson and Bruce S. Davie, (1996) Computer Networks - A Systems Approach, Morgan Kaufmann Publishers Inc., San Francisco, ISBN l-55860-368-9. [8] Robinpreet Kaur, and Mritunjay Kumar Rai, (2012), “A Novel Review on Routing Protocols in MANETs”, Undergraduate Academic Research Journal (UARJ), Vol. 1, Issue-1, ISSN: 2278 – 1129. [9] Elizabeth M. Royer, (1999) “A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks” , IEEE Personal Communications, pp. 46-55. [10] P. Manickam, T. Guru Baskar, M. Girija and Dr. D. Manimegalai, (2011), "Performance comparisons of routing protocols in mobile ad hoc networks", International Journal of Wireless & Mobile Networks (IJWMN), vol. 3, no. 1. [11] Adel.S.El ashheb, (2012), "Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment ", International Conference on Computer Networks and Communication Systems, PCSIT vol.35, pp. 55-62. [12] Perkins CE, and Bhagwat P, (1994), “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers”, Proceedings of ACM SIGCOMM, pp. 234–244. [13] T. Chen, and M. Gerla, (1998), “Global State Routing: A new Routing Scheme for Ad-Hoc Wireless Networks”, Proceedings of IEEE ICC, pp. 171 - 175. [14] Krishna Gorantala, (2006), “Routing Protocols in Mobile Ad-hoc Networks”, A Master’s thesis in computer science, pp. 1-36. [15] Tarek Sheltami and Hussein Mouftah, (2003), “Comparative study of on demand and Cluster Based Routing protocols in MANETs”, IEEE conference, pp. 291-295, 2003. [16] Charles E. Perkins, Elizabeth M. Belding-Royer, and Ian D. Chakeres, (2004) “ Mobile Ad Hoc Networking Working Group INTERNET DRAFT”. [17] Ian D.Chakeres, and Elizabeth M.Belding-Royer, (2004) “AODV Routing Protocol Implementation Design” International Conf. on Distributed Computing Sysmtes, IEEE, vol.7.
  • 10. International Journal of Distributed and Parallel Systems (IJDPS) Vol.5, No.1/2/3, May 2014 96 [18] G.Vijaya Kumar, Y.Vasudeva Reddyr, and Dr.M.Nagendra, (2010), ”Current Research Work on Routing Protocols for MANET: A Literature Survey”, International Journal on Computer Science and Engineering, Vol. 02, No. 03, pp. 706-713. [19] S. Meenakshi Sundaram,Dr.S.Palani, and Dr. A. Ramesh Babu, (2013)” A Performance Comparison study of Unicast and Multicast Routing Protocols for Mobile Ad hoc Networks”, International Journal of Engineering Research and Applications (IJERA) , Vol. 3, Issue 2, pp.1446-1458. [20] S. Sathish, K. Thangavel and S. Boopathi, (2011), "Comparative Analysis of DSR, FSR and ZRP Routing Protocols in MANET ",International Conference on Information and Network Technology , IPCSIT vol.4, IACSIT Press. [21] Ravi Prakash, Andre Schiper and Mansoor Mohsin, (2003) “Reliable Multicast in Mobile Networks”, Proc. of IEEE, (WCNC). [22] Dr.S.S.Dhenakaran , A.Parvathavarthini, (2013), "An Overview of Routing Protocols in Mobile Ad- Hoc Network",International Journal of Advanced Research in Computer Science and Software Engineering,Volume 3, Issue 2. [23] M.L Sharma, Noor Fatima Rizvi, Nipun Sharma, Anu Malhan and Swati Sharma, (2010) “Performance Evaluation of MANET Routing Protocols under CBR and FTP traffic classes”, Int. J. Comp. Tech. Appl., vol. 2 (3),pp. 392-400. [24] Pearlman MR, and Samar P, (2002 ) “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, IETF draft, available at http://tools.ietf.org/id/draft-ietf-manetzone-zrp-04.txt. Accessed. [25] Chiang C-C, Wu H-K, and Liu W, Gerla M, (1989) “Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel”, Proceedings of IEEE SICON,pp.197–211. [26] Zygmunt J. Haas, and Marc R. Pearlman, (2001) “The performance of Query Control Schemes for the Zone Routing Protocol”, IEEE/ACM transactions on networking, vol. 9, no. 4. [27] A.-S.K. Pathan, C.S. Hong Haas ZJ, Pearlman MR, Samar P, (2002)“Intrazone Routing Protocol (IARP)”, IETF Internet Draft. [28] Weiliang Li, and Jianjun Hao, (2010) “Research on the Improvement of Multicast Ad Hoc On- demand Distance Vector in MANETS”, IEEE International Conference on Computer and Automation Engineering (Singapore), vol. 1, pp.702-705. [29] Mehran Abolhasan and Tadeusz Wysocki, (2003) “Displacement based Route update strategies for proactive routing protocols in mobile ad hoc networks” International Workshop on the Internet, Telecommunications and Signal processing. [30] Pei G., Gerla M., and Tsu-Wei Chen, (2000)"Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks," IEEE ICC vol. 1, pp. 70 -74. [31] A. Iwata, C.C. Chiang, G. Pei, M. Gerla, and T.W. Chen, (1999) “Scalable Routing Strategies for Ad- Hoc Wireless Networks”, IEEE Journal on Selected Areas in Communications, pp. 17(8): 1369 - 1379. [32] Mario Gerla, Xiaoyan Hong, and Guangyu Pei, (2002) “Fisheye State Routing Protocol (FSR) for Ad Hoc Networks”, INTERNETDRAFT-<draft-ietf-manet-fsr-03.txt>. [33] C.C. Chiang, H.K. Wu, W. Liu, M. Gerla, (1997) “Routing in Clustered Multihop Mobile Wireless Networks with Fading Channel”, Proceeding of IEEE Singapore International Conference on Networks SICON, pages 197 -212. [34] Biao Zhou,Yeng-Zhong Lee,Mario Gerla, (2008) “Direction Assisted Geographic Routingfor Mobile Ad Hoc networks ", IEEE Military communications conference (San Diego), pp. 1-7. [35] Divya Wadhwa,Deepika,Vimmi Kochher and Rajesh Kumar Tyag, (2014) "A Review of Comparision of Geographic Routing Protocols in Mobile Adhoc Network ",ISSN 2231-1297, Volume 4, Number 1 , pp. 51-58. [36] Konglin Zhu , Biao Zhou, Xiaoming Fu, and Mario Gerla, (2011) “Geo-assisted Multicast Inter- Domain Routing (GMIDR) Protocol for MANETs”, IEEE International Conference. [37] S.Esakki Muthu, and S.Sudha, (2013) “Dynamic Geographical broadcast over Mobile ad Hoc networks”, IJREAT International Journal of Research in Engineering & Advanced Technology, Vol. 1, Issue 1, ISSN: 2320 – 8791.