Some Popular Routing Protocols In Ad Hoc Networks


research on networks and communications in general and in the study of ad hoc networks in particular.

1.5. Summary of Chapter 1

An ad hoc network is a collection of mobile nodes that are capable of self-connection and self-organization to form a network without the need for underlying network infrastructure devices to act as intermediaries to receive/transmit signals and forward data. Each network node acts as both an end device and a router to find paths and forward data to other network nodes.

With the advantages of high flexibility and not requiring existing network infrastructure, ad hoc networks have the potential to be applied in many areas serving human life such as in military communication networks, natural disaster warning, transportation, commerce, entertainment, education, etc.

Maybe you are interested!

Because the nodes of the network are able to move freely and randomly, the topology of the ad hoc network changes frequently, and the links and data paths in the network are frequently broken and newly formed. Therefore, the routing protocols in the ad hoc network need to be designed to suit this requirement. There are many routing strategies designed for ad hoc networks. Each strategy has different advantages and disadvantages and is used appropriately in different conditions and circumstances.

IEEE 802.11 standard is widely used standard at Physical layer and Data Link layer of wireless networks. However, CSMS/CD medium access mechanism used in IEEE 802.11 Ethernet technology is not suitable for ad hoc wireless networks because of the physical nature of wireless networks and the hidden station problem. CSMA/CA medium access mechanism in DCF of

Some Popular Routing Protocols In Ad Hoc Networks


IEEE 802.11 standard has been designed to solve technical problems at MAC layer for ad hoc networks. Conversation-based virtual carrier sensing technique using RTS, CTS, ACK packets has been presented in detail in this chapter.

Network performance is the main criteria used in the design and operation of network systems. The purpose of evaluating network performance is to compare designs to find the best design. There are three common methods commonly used to evaluate network performance: measurement evaluation, analytical modeling evaluation, and simulation evaluation. These network performance evaluation methods can be used to evaluate the performance of routing protocols in ad hoc networks.

Among the above three methods, simulation evaluation method has been used in this thesis to evaluate the impact of travel speed and data load on routing performance in ad hoc network based on using NS2 simulator.


CHAPTER 2. SOME POPULAR ROUTING PROTOCOLS IN AD HOC NETWORKS

2.1. Requirements for routing protocols and algorithms in ad hoc networks


Because ad hoc networks have many differences compared to traditional networks, routing protocols and algorithms in ad hoc networks must be designed to ensure the following technical requirements:

The algorithm must be designed to accommodate the dynamics of the network topology and asymmetric links.

Ability to operate in a distributed manner: a centralized approach to Ad hoc networks will fail because it will take a lot of time to gather the current state information of the network to calculate and then redistribute it to the network nodes. During that time, the network configuration may have changed a lot.

Saving energy and network bandwidth: Since network nodes have limited energy resources, it is necessary to consider the issue of energy saving. Routing protocols can provide energy conservation requirements at network nodes when possible. Network bandwidth also needs to be considered to avoid unnecessary bandwidth waste.

Avoid loop routing: This occurs when a small portion of packets travel around the network for a period of time. A possible solution is to use a hop counter in each packet. Each time a packet travels to a new network node, the hop counter will increase by one, and when it reaches a certain value, the packet will be discarded.


Security: Ad hoc network routing protocols can be easily attacked in some forms such as giving incorrect routing updates or preventing packet forwarding, indirectly causing denial of service leading to packets never reaching their destination. They can also change routing information in the network, although that information is not dangerous but also wastes bandwidth and energy, which are "rare" resources in Ad hoc networks. Therefore, appropriate security methods are needed to prevent modification of protocol operations.

2.2. DSDV routing protocol

2.2.1. Overview of DSDV routing protocol


The DSDV routing protocol [6] is a typical distance vector “path-ahead” routing protocol. It not only solves the routing problem for ad hoc networks but also describes how to implement routing functions at Layer 2. Packets are transmitted between stations in a network using routing tables stored at each station. Each routing table at each station is a list of possible destinations from that station and the number of hops that must be passed to reach each destination. Each row in the routing table is assigned a sequence number, which is first established by the destination station. To maintain the consistency of routing tables when the network topology changes dynamically, each station must periodically send and receive updates or immediately send updates when it detects a change. Since the problem of storing any form of synchronous time information on the machines does not arise here, the phase relationship of update times between mobile stations is also not taken into account. In distance vector routing algorithms,


Each station uses packets broadcast from other stations to determine which stations it can reach and the number of hops required to reach the desired station. The problem here is to assign sequence numbers to a path, not to assign distance measurements to a path. The packets transmitted will contain either a Layer 2 (MAC) address or a Layer 3 (Network) address.

2.2.2. Routing table and route advertisement information


Routing information in DSDV is provided by broadcasting or multicasting packets. These packets are transmitted periodically and are supplemented when changes in the network topology are detected, such as when stations move within a network. Data on the first path arrival time and the best path arrival time for each destination station are stored. A decision on the delay between two routing advertisements is made on the basis of this data to reduce the variability in the routing tables. The delay between two advertisements may be arbitrary to reduce the number of advertised routes already in the routing tables with the same sequence number.

The DSDV protocol requires each mobile station to advertise its own routing table (i.e., its flows) to its neighbors. The flows in this list may change dynamically over time, so the number of advertisements that must be performed must be large enough to ensure that every mobile station can always identify other stations in the area. In addition, each mobile station must forward data packets to other stations on an as-needed basis. This forwarding makes it possible to determine


a path to the destination with the smallest number of hops. A mobile computer can exchange data with any other mobile computer in the group even if the other computer is not in direct communication range. If DSDV works at layer 2, it will work at higher layers.

All computers must cooperate to create data paths between them and broadcast the necessary data periodically, usually every few seconds. In a wireless environment, it is important that the broadcast information is limited by the transmission range of the physical medium. This is different from the situation in cabled environments where the transmission range to the destination is precisely defined. The broadcast data from each mobile computer includes its new sequence number and the following information about each new path:

Destination address;

Number of relay nodes to reach the destination;

The sequence number of the information received for the destination, initially labeled with the destination.

The transmitted routing tables also contain the hardware addresses, and (if appropriate) the network addresses of the transmitting computers in the headers of the packets. The paths with the latest sequence numbers will always be given priority in forwarding decisions, but are not necessarily advertised. For paths with the same sequence number, the path with the smallest metric will be used. When transmitting routing tables, the sequence number will also be sent to all hosts.


mobility is different and each machine will decide for itself to maintain each routing line to the source machine.

Paths received by broadcast will be forwarded by the receiver to other hosts as it broadcasts its information; the receiver will increment the path length measure before broadcasting the path in case the data packets require one or more relay nodes to reach the destination.

2.2.3. Frequency of route advertising


One of the most important parameters in the selection is the interval between two broadcasts of packets containing routing information. However, when a mobile computer receives any new or modified information about a route, it is transmitted immediately. This has the effect of spreading the new routing information as quickly as possible among the mobile computers in the workspace. This rapid re-broadcasting places a new requirement on the protocols to converge as quickly as possible. The movement of a mobile computer can cause a broadcast storm, which can damage and degrade the wireless medium. Mobile computers cause link breaks as they move from one location to another. Link breaks can be detected by Layer 2 protocols or when a machine does not receive advertisements from a neighboring station for a specified period of time. A broken link is described by a measure of ∞ (i.e., any value greater than the largest possible measure). When a link to the next node is broken, any path to that node will be assigned a distance measure of ∞. When there is a change in the path


occurs, information about the modified path is included in the routing advertisement packets. The construction of the broken link description information only occurs when sequence numbers are generated by mobile stations other than the destination mobile station. The sequence numbers defined by the originating mobile stations are even numbers, and the sequence numbers generated to specify measures ∞ are odd numbers. In this way, any odd “real” sequence number can be used to replace a measure with ∞. When a node receives a measure ∞, and then has a finite-measure sequence number, it triggers the routing update advertisement to distribute important information about a destination.

In networks with a large number of mobile stations, changes may occur between periodic routing advertisements. To reduce the amount of information in these routing advertisements, two types of packets are defined. The first type carries all the information in the packet and is called the “ full ” type . The second type carries only the information that has changed since the last full routing advertisement and is called the “ supplemental ” type. By design, the information in the supplemental routing update form should fit into a single network protocol data unit (NPDU). The full routing update form usually requires many NPDUs, even for a network with a small number of mobile stations. When mobile stations are not moving, the full routing update form is transmitted. When movement is frequent and the size of the supplemental routing information is close to the size of an NPDU, the full routing update form is included in the plan. Each mobile node wants to determine which path changes are important enough to send in each additional advertisement. For example, when a stable path gives a different metric to some destination, this change is an important change.

Comment


Agree Privacy Policy *