SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1629
Comparative Study of Reactive Routing Protocols in MANET: A Review
Shipra Tripathi1, Dr. Brajesh Kumar Singh2
1M.Tech Student, Computer Science &Engineering, R.B.S. Engineering Technical Campus, Agra, India
2Professor, Dept. of Computer Science &Engineering,R.B.S. Engineering Technical Campus, Agra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Mobile ad hoc network (MANET) is an independent structure of mobilenodesconnectedthroughthewirelesslinks.
MANET is infrastructure less ad-hoc network thatcanbeestablishingeasilyanywhere. MANETsaremostlyemployedinbattles
fields, disaster management etc. Due to its dynamic nature routing are important for data transferring.Routingprotocol inad-
hoc network performs a crucial role. Routing is responsible for forwarding the data packets along the efficient metrics in the
network. There are many routing protocols available for use in Adhocnetworks. The choiceofroutingprotocolsdependsupon
various situations like when energy is not a constraint in that situationselectionofproactiveroutingprotocolsisbestchoice.In
networking (wired and wireless), routing has been one of the important function we need to concentrate. Routing is the
process in which, we will be sending the packets or messages from the source to the destination.
Key Words: MANET, DSR, AODV, PDT, RREQ etc.
1. INTRODUCTION
Advancement in the field of internet due to wireless networking technologies advances to numerousnewapplications.Mobile
ad-hoc network (MANET) is one of the most interesting areas for research and improvement of wireless network. As the
prominence of mobile device and wireless networks essentially become greater over the past years,wirelessad-hocnetworks
has now turned out to be a standout amongst the most dynamic and energetic field of communication and networks.Amobile
ad hoc network is a collection of mobile devices such as laptops, Mobile phones, sensors, etc. that communicate with each
other through the wireless links and work together with each other in a distributed manner in order to provide the important
network functionality in the absence of a fixed infrastructure. MANET is a self-organizing network and forms an unknown
topology. This type of network operated as a stand-alone network or with one or multiple points of attachment to cellular
networks or the internet. In MANET, each node acts both as a router and as a host & even the topology of network may also
change rapidly.
2. ROUTING PROTOCOLS
In MANET, there are different types of routing protocols each of them is applied according to the network circumstances.
Figure 1 shows the basic classification of the routing protocols in
MANETs.
Fig-1: Classification of routing protocols
Proactive Protocols
These protocols always maintain up-to-date information of routes from every node to each other node in the network. These
protocols consistently learn the topology of the network by exchanging topological information among the network nodes.
Thus, when there is a requirement for a route to a destination, such route information is available right away. In proactive
protocols each node maintains one or more tables to store up to date routing information and propagate updates throughout
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1630
the network. As such, these protocols are also referred as table-driven. Examples of proactive protocols include Dynamic
Destination Sequenced Distance-Vector Routing Protocol (DSDV), Optimized Link StateRouting Protocol (OLSR)andWireless
Routing Protocol (WRP).
Reactive Protocols
The reactive protocol is also known as on-demand routing protocols and it is based on Query-Reply topology in whichtheydo
not attempt to continuously maintain the up-to-date topology of the network. When a route is needed, a procedure is calledto
find a route to the destination node. The major goal of on demand protocols is to minimize the network traffic overhead.
Examples of reactive protocols include the Dynamic Source Routing Protocol (DSR), Ad Hoc On-Demand Distance Vector
Routing Protocol (AODV), and Temporally-Ordered Routing Algorithm (TORA).
Hybrid Protocol
Hybrid protocol is introduced to overcome the shortcomings of both proactive and reactive routing protocols. Hybrid routing
protocol is the combination of both proactive and reactive protocol. It utilizes the route discovery mechanism of reactive
protocol and the table maintenance mechanism of proactive protocol in order to avoid latency and overhead problems in the
network. Hybrid protocol is useful for large networks where large numbers of nodes are available. In this large network is
divided into set of zones. Example of hybrid protocol is Zone routing protocol (ZRP).
3. Dynamic Source Routing (DSR):
The Dynamic Source Routing (DSR) protocol is an on-demand routing protocol dependent on source routing. In the source
routing procedure, a sender decides the definite sequence of nodes through which to spread a packet. The list of intermediate
nodes for routing is explicitly contained in the packet’s header. In DSR, every node in the network needs to keep up a route
cache where it reserved source routes that it has learned. When a host needs to send a packet tosomeotherhost,itfirstchecks
its route cache for a route to the destination. If route is found in the route cache, the sender utilizes this route to propagate the
packet. Otherwise the source node starts the route discovery process. DSR performs its work in two phases: Route discovery
and Route maintenance.
3.1 Route Discovery
For route discovery, the source node broadcast a route request packet that can be received by all nodes within its wireless
transmission range. The route request contains the addressofthedestinationhost[1], thesource’saddress,a route recordfield
and a unique identification number. If the route discovery is completed the sender receives a route reply packet containing a
list of network nodes through which it should propagate the packets. During the routediscoveryprocess,therouterecordfield
is used to accumulate the sequence of hops already taken. First of all the sender initiates the route record as a list with a single
element containing itself. The following node appends itself to the list and so on. Each route request uniquely identified by
request_id. The request_id is a simple counter which is increased whenever a new route request packet is being sent by the
source node. Thus, every route request packet can be uniquely identified through its source’s address and request_id. By this
we can make sure that no loops will occur during the broadcasting of the packets.
When any nodes receives a route request packet then, process it in the below described order:
1. If the pair ( source address, request_id ) is found in the list of recent route requests, the packet is discarded.
2. If the host’s address is already mentioned in the request’s route record, the packet is also discarded.
3. If the destination address in the route request matches the host’s address, the route record field containstheroutebywhich
the request reached this host from the source node. A route reply packet is sent back to the source node containing a copy of
this route.
4. Otherwise, add this present host’s address to the route record field of the route request packet and re-broadcast the packet.
A route reply is sent back either if the request packet reaches the destination node itself, or if the request reaches an
intermediate node which has an active route to the destination in its route cache. The route record field in the request packet
indicates which sequence of hops was taken. If the node generating the route reply is the destination node, it just takes the
route record field of the route request and places it into the route reply. If the responding node is an intermediate node,itadds
the cached route to the route record and then generates the route reply.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1631
Sending back route replies can be accomplished by two different ways: DSR may use symmetric links, but it is not required to.
In the case of symmetric links, the node generating the route reply just uses the reverse route of the route record. When using
unidirectional (asymmetric) links, the node needs to initiate its own route discovery process and piggyback theroutereplyon
the new route request.
3.2 Route Maintenance
Route maintenance can be accomplished by two processes:
 Hop-by-hop acknowledgement at the data link layer
 End-to-end acknowledgements
Hop-by-hop acknowledgement at the data link layer permits an earlydetectionandretransmissionoflostorcorruptpackets.If
the data link layer detect a transmission error (for example, because the maximum number of retransmissions is exceeded),a
route error packet is being sent back to the sender.
The route error packet contains two information:
 The address of the node find the error and
 The host’s address which it was trying to send the packet to.
Whenever a node receives a route error packet, the hop in error is removed from the route cache and all routes which contain
this hop must be truncated by then.
End-to-end acknowledgement might be utilized, if wirelesstransmissionbetweentwo hostsdoes not work similarlywell inthe
both directions. As long as a route exists by which the two end hosts are able to communicate, route maintenance is possible.
There may be various routes in both directions. In this case, replies or acknowledgementsontheapplicationortransportlayer
may be used to indicate the status of the route from one host to the other. However,withend-to-endacknowledgementitisnot
possible to find out the hop which has been in error.
4. Ad hoc on demand distance vector (AODV):
AODV is the reactive routing protocol for finding the best path to deliver the packet, when needed. It is designed for use in ad-
hoc mobile networks. It uses traditional routing tables, one entry per destination, andsequencenumberstodeterminewhether
routing information is up to-date and to prevent routing loops. An important feature of AODV is the maintenanceof time-based
states in each node. In case of a route broken, the neighbors can be notified to source. Source node start the route discovery
process which is based on query and reply cycles, and route information is stored in all intermediate nodes along the route in
the form of route table entries.
4.1 Route Discovery
Route Discovery is the main procedure of AODV protocol. As shown in fig 2, if a source node needs a route to destination, it
broadcasts a route request (RREQ) message. Every node maintains a broadcast id when it taken together with theoriginator’s
IP address then they extraordinarily recognizes a RREQ. Each time a sender issues a RREQ, it increments its broadcast id and
sequence number by one. The sender buffers this RREQ until its neighbors send it to the back this time called path discovery
time (PDT) after this time sender can reprocess it again. The sender then waits for net traversal time (NETT) for a route reply
(RREP) message. If the sender does not receive RREP within this time then the sender will rebroadcast another RREQ up to
RREQ TRIES times. The holding up time (NETT) is multiplied with each additional attempt. When a node receives a RREQ
message that has not seen before, it sets up a reverse route back to thenodefrom wheretheRREQcome.Thisreverseroutehas
a lifetime value which is called active route timeout (ART). The reverse route entry is stored along with the requested
destination address. If the node that receives this message does not have a route to the destination again rebroadcasts the
RREQ. Each node keeps track of the number of hops from where the message has made, as well as which node has sent the
RREQ message. If nodes receive a RREQ message, which they have effectively prepared, they dispose of the RREQ and don't
advance it. On the off chance that a hub has a course to the goal, at that point it answers by unicasting a RREP back to the node
from where it received the request. Once the source node receives the RREP from the neighbor node then the route has been
set up and information parcels might be sent to the destination.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1632
Fig- 2: Example of a AODV Routing Protocol
4.2 Route Maintenance
The job of route maintenance is to give input to the sender on the off chance that a switch or connection has gone down, to
enable the course to be changed or re-found. A course can quit working when any of the versatile hubs has moved. If a source
node moves, then it should rediscover a new route. If an intermediate node moves, it must inform all itsneighbors thatneeded
this hop. This message is forwarded to all the other nodes in the network and the old route is deleted. Then the source node
must rediscover a new route. One proposed way for a node to keep track of its neighbors by using HELLO messages. Theseare
periodically sent to detect link failures. Upon receiving notification for a broken link, the source nodecanstarttherediscovery
process. If there is a link breakage, a route error (RERR) message can be broadcast on the network. Any host that receives the
RERR message invalidates the route and rebroadcasts the error messages with the unreachable destination informationtoall
nodes in the network.
5. Comparison of DSR and AODV:
S.NO Protocol Property DSR AODV
1. Table driven/ Source
Routing
Source Routing Table driven and Source
Routing
2. Route
Discovery
On
Demand
On
Demand
3. Periodic
Route mechanism/Maintenancein
Complete Route cached Route table with next hop
4. Need of Hello message No Yes
5. Network Overhead Low Medium
6. Node overhead High Medium
7. Loop freedom Yes Yes
8. Multiple Routes Yes No
9. Multicast No Yes
10. Unidirectional link support Yes No
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1633
11. Packet size Non Uniform Uniform
12. Network Size Up to 200 nodes Highly Dynamic
6. CONCLUSIONS
Dynamic Source Routing (DSR)
The key distinguishing feature of DSR is the use of source routing. It is a reactive protocol i.e. it doesn’t use periodic
advertisements. It computes the routes when necessary and then maintains them. Source routing is a routing technique in
which the sender of a packet determines the complete sequence of nodes through which the packet has to pass, the sender
explicitlylists this route in the packet’s header, identifying each forwarding “hop” by the address of the next node to which to
transmit the packet on its way to the destination host.
Adhoc demand Distance Vector Routing (AODV)
AODV is a basically a blend of both DSR and DSDV. It acquires the basic on-demand mechanism of RouteDiscovery andRoute
Maintenance from DSR, and the use of hop-by-hop routing, sequence numbers, and periodic guides from DSDV. It uses
destination sequence numbers to ensure loop freedom at all times and by avoiding the Bellman-Ford ”count-to -infinity”
problem offers quick convergence when the ad hoc network topology changes.
REFERENCES
[1] D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, T. Imielinski
and H. Korth, Eds. Kluwer Academic Publishers, 1996, vol. 353, ch. 5, pp. 153–181.
[2] Basu Dev Shivahare1 ,Charu Wahi2 , Shalini Shivhare3”ComparisonOfProactiveAnd ReactiveRoutingProtocolsInMobile
Adhoc Network Using Routing Protocol Property” International Journal of Emerging Technology and Advanced
Engineering, ISSN 2250-2459, Volume 2, Issue 3, March 2012.
[3] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on demand distance vector (AODV) routing "RFC 3561, July ,2003.
[4] Charles E. Perkins and Elizabeth M.” Ad hoc On Demand Distance Vector Routing”
[5] Sunil Taneja and Ashwani Kush” A Survey of Routing Protocols in Mobile Ad Hoc Networks” International Journal of
Innovation, Management and Technology, Vol. 1,No.3, August 2010 ISSN: 2010-0248

More Related Content

What's hot (19)

PDF
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
PDF
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
PDF
A study on performance comparison of dymo with aodv and dsr
IAEME Publication
 
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
PDF
En33838844
IJERA Editor
 
PDF
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 
PDF
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
PDF
As33259263
IJERA Editor
 
PDF
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
IJMER
 
PDF
O26087092
IJERA Editor
 
PDF
The Impact of Signal Strength over Routing Protocols in Wireless Networks
Dr. Amarjeet Singh
 
PDF
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
ijngnjournal
 
PDF
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
PDF
F41023946
IJERA Editor
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
PDF
Research on performance of routing protocols in manet
Australian Society for Commerce Industry Engineering
 
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 
IMPROVED NETWORK CONNECTIVITY IN MANETS
IJCNCJournal
 
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Narendra Singh Yadav
 
Welcome to International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
A study on performance comparison of dymo with aodv and dsr
IAEME Publication
 
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
ijasuc
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
En33838844
IJERA Editor
 
Prediction Algorithm for Mobile Ad Hoc Network Connection Breaks
IJCNCJournal
 
Comparing: Routing Protocols on Basis of sleep mode
IJMER
 
As33259263
IJERA Editor
 
Experiment of Routing Protocol AODV (AdHoc On-demand Distance Vector)
IJMER
 
O26087092
IJERA Editor
 
The Impact of Signal Strength over Routing Protocols in Wireless Networks
Dr. Amarjeet Singh
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
ijngnjournal
 
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
pijans
 
F41023946
IJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
ijceronline
 
Research on performance of routing protocols in manet
Australian Society for Commerce Industry Engineering
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
IOSR Journals
 

Similar to IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review (20)

PDF
Hd3312521256
IJERA Editor
 
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
PDF
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
PDF
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
PDF
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
 
PDF
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
PDF
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
PDF
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
IRJET Journal
 
PDF
Performance evaluation of various types of nodes in
eSAT Publishing House
 
PDF
Performance evaluation of various types of nodes in manet with dsr routing pr...
eSAT Journals
 
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Computer Science Journals
 
PDF
E010322531
IOSR Journals
 
PDF
A Survey On Hybrid Routing Protocols In MANETS
Sabrina Ball
 
PDF
Attacks and Routing Protocols in MANET: A Review
IRJET Journal
 
PDF
Hd3612761280
IJERA Editor
 
PDF
E41022938
IJERA Editor
 
PDF
En33838844
IJERA Editor
 
PDF
As33259263
IJERA Editor
 
Hd3312521256
IJERA Editor
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
ijdpsjournal
 
Lecture 11 14. Adhoc routing protocols cont..
Chandra Meena
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Network Surveillance Based Data Transference in Cognitive Radio Network with ...
IRJET Journal
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
 
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
Ijarcet vol-2-issue-7-2281-2286
Editor IJARCET
 
Review and Analysis of Reactive Routing Protocols: AODV, DSR, TORA and DYMO i...
IRJET Journal
 
Performance evaluation of various types of nodes in
eSAT Publishing House
 
Performance evaluation of various types of nodes in manet with dsr routing pr...
eSAT Journals
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Computer Science Journals
 
E010322531
IOSR Journals
 
A Survey On Hybrid Routing Protocols In MANETS
Sabrina Ball
 
Attacks and Routing Protocols in MANET: A Review
IRJET Journal
 
Hd3612761280
IJERA Editor
 
E41022938
IJERA Editor
 
En33838844
IJERA Editor
 
As33259263
IJERA Editor
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PPTX
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
PDF
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PDF
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
DOC
MRRS Strength and Durability of Concrete
CivilMythili
 
PPTX
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
PDF
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
PDF
Zilliz Cloud Demo for performance and scale
Zilliz
 
PPTX
Day2 B2 Best.pptx
helenjenefa1
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PDF
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PPTX
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
PPTX
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
PPTX
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PPTX
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
PPTX
Green Building & Energy Conservation ppt
Sagar Sarangi
 
PDF
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 
Product Development & DevelopmentLecture02.pptx
zeeshanwazir2
 
Reasons for the succes of MENARD PRESSUREMETER.pdf
majdiamz
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
MAD Unit - 1 Introduction of Android IT Department
JappanMavani
 
MRRS Strength and Durability of Concrete
CivilMythili
 
VITEEE 2026 Exam Details , Important Dates
SonaliSingh127098
 
Basic_Concepts_in_Clinical_Biochemistry_2018كيمياء_عملي.pdf
AdelLoin
 
Zilliz Cloud Demo for performance and scale
Zilliz
 
Day2 B2 Best.pptx
helenjenefa1
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
International Journal of Information Technology Convergence and services (IJI...
ijitcsjournal4
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Thermal runway and thermal stability.pptx
godow93766
 
Evaluation and thermal analysis of shell and tube heat exchanger as per requi...
shahveer210504
 
Depth First Search Algorithm in 🧠 DFS in Artificial Intelligence (AI)
rafeeqshaik212002
 
美国电子版毕业证南卡罗莱纳大学上州分校水印成绩单USC学费发票定做学位证书编号怎么查
Taqyea
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
Arduino Based Gas Leakage Detector Project
CircuitDigest
 
Green Building & Energy Conservation ppt
Sagar Sarangi
 
Introduction to Productivity and Quality
মোঃ ফুরকান উদ্দিন জুয়েল
 

IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1629 Comparative Study of Reactive Routing Protocols in MANET: A Review Shipra Tripathi1, Dr. Brajesh Kumar Singh2 1M.Tech Student, Computer Science &Engineering, R.B.S. Engineering Technical Campus, Agra, India 2Professor, Dept. of Computer Science &Engineering,R.B.S. Engineering Technical Campus, Agra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Mobile ad hoc network (MANET) is an independent structure of mobilenodesconnectedthroughthewirelesslinks. MANET is infrastructure less ad-hoc network thatcanbeestablishingeasilyanywhere. MANETsaremostlyemployedinbattles fields, disaster management etc. Due to its dynamic nature routing are important for data transferring.Routingprotocol inad- hoc network performs a crucial role. Routing is responsible for forwarding the data packets along the efficient metrics in the network. There are many routing protocols available for use in Adhocnetworks. The choiceofroutingprotocolsdependsupon various situations like when energy is not a constraint in that situationselectionofproactiveroutingprotocolsisbestchoice.In networking (wired and wireless), routing has been one of the important function we need to concentrate. Routing is the process in which, we will be sending the packets or messages from the source to the destination. Key Words: MANET, DSR, AODV, PDT, RREQ etc. 1. INTRODUCTION Advancement in the field of internet due to wireless networking technologies advances to numerousnewapplications.Mobile ad-hoc network (MANET) is one of the most interesting areas for research and improvement of wireless network. As the prominence of mobile device and wireless networks essentially become greater over the past years,wirelessad-hocnetworks has now turned out to be a standout amongst the most dynamic and energetic field of communication and networks.Amobile ad hoc network is a collection of mobile devices such as laptops, Mobile phones, sensors, etc. that communicate with each other through the wireless links and work together with each other in a distributed manner in order to provide the important network functionality in the absence of a fixed infrastructure. MANET is a self-organizing network and forms an unknown topology. This type of network operated as a stand-alone network or with one or multiple points of attachment to cellular networks or the internet. In MANET, each node acts both as a router and as a host & even the topology of network may also change rapidly. 2. ROUTING PROTOCOLS In MANET, there are different types of routing protocols each of them is applied according to the network circumstances. Figure 1 shows the basic classification of the routing protocols in MANETs. Fig-1: Classification of routing protocols Proactive Protocols These protocols always maintain up-to-date information of routes from every node to each other node in the network. These protocols consistently learn the topology of the network by exchanging topological information among the network nodes. Thus, when there is a requirement for a route to a destination, such route information is available right away. In proactive protocols each node maintains one or more tables to store up to date routing information and propagate updates throughout
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1630 the network. As such, these protocols are also referred as table-driven. Examples of proactive protocols include Dynamic Destination Sequenced Distance-Vector Routing Protocol (DSDV), Optimized Link StateRouting Protocol (OLSR)andWireless Routing Protocol (WRP). Reactive Protocols The reactive protocol is also known as on-demand routing protocols and it is based on Query-Reply topology in whichtheydo not attempt to continuously maintain the up-to-date topology of the network. When a route is needed, a procedure is calledto find a route to the destination node. The major goal of on demand protocols is to minimize the network traffic overhead. Examples of reactive protocols include the Dynamic Source Routing Protocol (DSR), Ad Hoc On-Demand Distance Vector Routing Protocol (AODV), and Temporally-Ordered Routing Algorithm (TORA). Hybrid Protocol Hybrid protocol is introduced to overcome the shortcomings of both proactive and reactive routing protocols. Hybrid routing protocol is the combination of both proactive and reactive protocol. It utilizes the route discovery mechanism of reactive protocol and the table maintenance mechanism of proactive protocol in order to avoid latency and overhead problems in the network. Hybrid protocol is useful for large networks where large numbers of nodes are available. In this large network is divided into set of zones. Example of hybrid protocol is Zone routing protocol (ZRP). 3. Dynamic Source Routing (DSR): The Dynamic Source Routing (DSR) protocol is an on-demand routing protocol dependent on source routing. In the source routing procedure, a sender decides the definite sequence of nodes through which to spread a packet. The list of intermediate nodes for routing is explicitly contained in the packet’s header. In DSR, every node in the network needs to keep up a route cache where it reserved source routes that it has learned. When a host needs to send a packet tosomeotherhost,itfirstchecks its route cache for a route to the destination. If route is found in the route cache, the sender utilizes this route to propagate the packet. Otherwise the source node starts the route discovery process. DSR performs its work in two phases: Route discovery and Route maintenance. 3.1 Route Discovery For route discovery, the source node broadcast a route request packet that can be received by all nodes within its wireless transmission range. The route request contains the addressofthedestinationhost[1], thesource’saddress,a route recordfield and a unique identification number. If the route discovery is completed the sender receives a route reply packet containing a list of network nodes through which it should propagate the packets. During the routediscoveryprocess,therouterecordfield is used to accumulate the sequence of hops already taken. First of all the sender initiates the route record as a list with a single element containing itself. The following node appends itself to the list and so on. Each route request uniquely identified by request_id. The request_id is a simple counter which is increased whenever a new route request packet is being sent by the source node. Thus, every route request packet can be uniquely identified through its source’s address and request_id. By this we can make sure that no loops will occur during the broadcasting of the packets. When any nodes receives a route request packet then, process it in the below described order: 1. If the pair ( source address, request_id ) is found in the list of recent route requests, the packet is discarded. 2. If the host’s address is already mentioned in the request’s route record, the packet is also discarded. 3. If the destination address in the route request matches the host’s address, the route record field containstheroutebywhich the request reached this host from the source node. A route reply packet is sent back to the source node containing a copy of this route. 4. Otherwise, add this present host’s address to the route record field of the route request packet and re-broadcast the packet. A route reply is sent back either if the request packet reaches the destination node itself, or if the request reaches an intermediate node which has an active route to the destination in its route cache. The route record field in the request packet indicates which sequence of hops was taken. If the node generating the route reply is the destination node, it just takes the route record field of the route request and places it into the route reply. If the responding node is an intermediate node,itadds the cached route to the route record and then generates the route reply.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1631 Sending back route replies can be accomplished by two different ways: DSR may use symmetric links, but it is not required to. In the case of symmetric links, the node generating the route reply just uses the reverse route of the route record. When using unidirectional (asymmetric) links, the node needs to initiate its own route discovery process and piggyback theroutereplyon the new route request. 3.2 Route Maintenance Route maintenance can be accomplished by two processes:  Hop-by-hop acknowledgement at the data link layer  End-to-end acknowledgements Hop-by-hop acknowledgement at the data link layer permits an earlydetectionandretransmissionoflostorcorruptpackets.If the data link layer detect a transmission error (for example, because the maximum number of retransmissions is exceeded),a route error packet is being sent back to the sender. The route error packet contains two information:  The address of the node find the error and  The host’s address which it was trying to send the packet to. Whenever a node receives a route error packet, the hop in error is removed from the route cache and all routes which contain this hop must be truncated by then. End-to-end acknowledgement might be utilized, if wirelesstransmissionbetweentwo hostsdoes not work similarlywell inthe both directions. As long as a route exists by which the two end hosts are able to communicate, route maintenance is possible. There may be various routes in both directions. In this case, replies or acknowledgementsontheapplicationortransportlayer may be used to indicate the status of the route from one host to the other. However,withend-to-endacknowledgementitisnot possible to find out the hop which has been in error. 4. Ad hoc on demand distance vector (AODV): AODV is the reactive routing protocol for finding the best path to deliver the packet, when needed. It is designed for use in ad- hoc mobile networks. It uses traditional routing tables, one entry per destination, andsequencenumberstodeterminewhether routing information is up to-date and to prevent routing loops. An important feature of AODV is the maintenanceof time-based states in each node. In case of a route broken, the neighbors can be notified to source. Source node start the route discovery process which is based on query and reply cycles, and route information is stored in all intermediate nodes along the route in the form of route table entries. 4.1 Route Discovery Route Discovery is the main procedure of AODV protocol. As shown in fig 2, if a source node needs a route to destination, it broadcasts a route request (RREQ) message. Every node maintains a broadcast id when it taken together with theoriginator’s IP address then they extraordinarily recognizes a RREQ. Each time a sender issues a RREQ, it increments its broadcast id and sequence number by one. The sender buffers this RREQ until its neighbors send it to the back this time called path discovery time (PDT) after this time sender can reprocess it again. The sender then waits for net traversal time (NETT) for a route reply (RREP) message. If the sender does not receive RREP within this time then the sender will rebroadcast another RREQ up to RREQ TRIES times. The holding up time (NETT) is multiplied with each additional attempt. When a node receives a RREQ message that has not seen before, it sets up a reverse route back to thenodefrom wheretheRREQcome.Thisreverseroutehas a lifetime value which is called active route timeout (ART). The reverse route entry is stored along with the requested destination address. If the node that receives this message does not have a route to the destination again rebroadcasts the RREQ. Each node keeps track of the number of hops from where the message has made, as well as which node has sent the RREQ message. If nodes receive a RREQ message, which they have effectively prepared, they dispose of the RREQ and don't advance it. On the off chance that a hub has a course to the goal, at that point it answers by unicasting a RREP back to the node from where it received the request. Once the source node receives the RREP from the neighbor node then the route has been set up and information parcels might be sent to the destination.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1632 Fig- 2: Example of a AODV Routing Protocol 4.2 Route Maintenance The job of route maintenance is to give input to the sender on the off chance that a switch or connection has gone down, to enable the course to be changed or re-found. A course can quit working when any of the versatile hubs has moved. If a source node moves, then it should rediscover a new route. If an intermediate node moves, it must inform all itsneighbors thatneeded this hop. This message is forwarded to all the other nodes in the network and the old route is deleted. Then the source node must rediscover a new route. One proposed way for a node to keep track of its neighbors by using HELLO messages. Theseare periodically sent to detect link failures. Upon receiving notification for a broken link, the source nodecanstarttherediscovery process. If there is a link breakage, a route error (RERR) message can be broadcast on the network. Any host that receives the RERR message invalidates the route and rebroadcasts the error messages with the unreachable destination informationtoall nodes in the network. 5. Comparison of DSR and AODV: S.NO Protocol Property DSR AODV 1. Table driven/ Source Routing Source Routing Table driven and Source Routing 2. Route Discovery On Demand On Demand 3. Periodic Route mechanism/Maintenancein Complete Route cached Route table with next hop 4. Need of Hello message No Yes 5. Network Overhead Low Medium 6. Node overhead High Medium 7. Loop freedom Yes Yes 8. Multiple Routes Yes No 9. Multicast No Yes 10. Unidirectional link support Yes No
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1633 11. Packet size Non Uniform Uniform 12. Network Size Up to 200 nodes Highly Dynamic 6. CONCLUSIONS Dynamic Source Routing (DSR) The key distinguishing feature of DSR is the use of source routing. It is a reactive protocol i.e. it doesn’t use periodic advertisements. It computes the routes when necessary and then maintains them. Source routing is a routing technique in which the sender of a packet determines the complete sequence of nodes through which the packet has to pass, the sender explicitlylists this route in the packet’s header, identifying each forwarding “hop” by the address of the next node to which to transmit the packet on its way to the destination host. Adhoc demand Distance Vector Routing (AODV) AODV is a basically a blend of both DSR and DSDV. It acquires the basic on-demand mechanism of RouteDiscovery andRoute Maintenance from DSR, and the use of hop-by-hop routing, sequence numbers, and periodic guides from DSDV. It uses destination sequence numbers to ensure loop freedom at all times and by avoiding the Bellman-Ford ”count-to -infinity” problem offers quick convergence when the ad hoc network topology changes. REFERENCES [1] D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing, T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers, 1996, vol. 353, ch. 5, pp. 153–181. [2] Basu Dev Shivahare1 ,Charu Wahi2 , Shalini Shivhare3”ComparisonOfProactiveAnd ReactiveRoutingProtocolsInMobile Adhoc Network Using Routing Protocol Property” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 3, March 2012. [3] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on demand distance vector (AODV) routing "RFC 3561, July ,2003. [4] Charles E. Perkins and Elizabeth M.” Ad hoc On Demand Distance Vector Routing” [5] Sunil Taneja and Ashwani Kush” A Survey of Routing Protocols in Mobile Ad Hoc Networks” International Journal of Innovation, Management and Technology, Vol. 1,No.3, August 2010 ISSN: 2010-0248