IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1210
Abstract— In last few years extensive research work has
been done in the field of routing protocols for Ad-hoc
Network. Various routing protocols have been evaluated in
different network conditions using different performance
metrics. A lot of research has been done how to modify
standard routing protocol in ad-hoc network to improve its
performance. The hop count is not only metric that gives
efficient routing path. There are various modified protocols
which make the use of other parameters along with hop
count to select the best routing path to the destination. In
standard Ad-hoc On-demand Distance Vector (AODV)
routing protocol only hop count is used for selecting the
routing path. In this paper we have studied variants of
AODV protocols with modified routing metric.
Keywords: Mobile Ad-hoc Network, cross layer, AODV,
HMAODV, Bypass AODV, AODV-BR, E-AODV, F-AODV.
I. INTRODUCTION
Mobile Ad-hoc Network (MANET) [1] is collection of
mobile nodes which are connected with each other without
any infrastructure. We can also call it as infrastructure less
network. An Ad-hoc network is highly dynamic in nature
means that nodes are free to move, they can join or leave the
network at any time. In ad-hoc network adjacent nodes
which are within each other’s range can communicate
directly while non-adjacent nodes which are not within each
other’s range have to communicate through one or more
intermediate node/s. The topology of network keep on
changing as nodes keeps on joining and leaving the network.
Hence we need to have efficient routing protocol to maintain
the communication between nodes.
The routing protocols for wireless ad-hoc network are
classified as proactive, reactive and hybrid. In proactive
routing, the routes in the network are continuously evaluated
so that when any node has data to send, it also knows the
path to destination. Each node maintains a routing table
which contains network related parameters and metric
values. These routing tables are exchanged between the
nodes periodically. It is also known as Table Driven routing
protocol. In reactive routing, the routes are discovered and
established only when they are needed. The nodes are
unaware of network topology. Each node has to go through
route discovery and route maintenance procedure. The
routes remain valid till the destination is reachable or until
route is no longer needed. So paths are established on
demand of nodes which avoids unnecessary broadcasting of
network information. It is also known as on-demand routing
protocol. Hybrid routing protocol combines both proactive
and reactive routing strategy. The routing is initially
established with any proactive route and then demand for
additional nodes through reactive flooding. So the network
is partitioned into two layers, inner layer uses proactive
while outer layer uses reactive routing.
The Ad hoc On-Demand Distance Vector (AODV) [2] [3] is
designed for ad-hoc networks. It is purely on demand
routing protocol as routing does not depend on fixed path
and routing information is exchanged only when needed. In
AODV routing protocol messages, sequence number is used
by the node to determine the freshness of the information
contained with the node. Route Request (RREQ), Route
Replies (RREP) and Route Errors (RERR) are the various
types of message used in AODV routing protocol. AODV
routing procedure can be characterized into following
phases
A. Route Discovery Process:
Route discovery process is started when any node wants to
send data to other node and it does not have valid path to
that node. Here each node maintains two different counters a
node sequence number and broadcast ID. Broadcast ID is
incremented every time source node initiates new RREQ
message. The RREQ message is broadcasted to all the
neighbors of source node .When any intermediate node
receives RREQ, it replies to source if it has path to the
destination node. If it does not have path to destination
node, it further broadcasts the RREQ message to its
neighbors. When the destination node receives the RREQ, it
sends RREP. Route Reply message is unicasted by the node.
B. Reverse Path Set Up:
As RREQ message is traversed from source to the various
nodes to the destination, the reverse path is automatically
setup from all nodes back to the source. In order to set up
this reverse path, each node stores the address of the
neighbor from which it has received the RREQ message.
C. Forward Path Set Up:
When RREQ message is received by destination node itself,
it replies to the source node. If an intermediate node has
route to the destination node, before sending RREP to
source it checks the freshness of the path information it has.
If the sequence number of the path is greater than or equal to
sequence number in the RREQ, then it replies with path to
source. If the sequence number in the RREQ message is
greater than that of path with the node then instead of
sending this path information to source, it broadcasts the
RREQ message to its neighbors.
D. Route Maintenance:
HELLO messages are used for maintaining active route.
Each node maintains a precursor list which contains the list
of nodes which needs to be notified in the case of link break.
When any node detects link break for the next node in its
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Ashish B. Gaigole1
1
M.Tech Scholar, Department of Computer Science and Engg.
1
Visvesvaraya National Institute of Technology (VNIT), Nagpur, Maharashtra, India
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 5/2013/043)
All rights reserved by www.ijsrd.com 1211
path towards the destination, it sends RERR message to all
the nodes in its precursor list. Once the source node receives
the notification of the broken link, the source node can
restart the route discovery process if it has data to send to
the destination.
II. LITERATURE SURVEY
The standard AODV routing protocol had been modified
previously considering different parameters as mobility,
energy level, congestion, bandwidth and node load. In this
section we are going to discuss some of these modified
AODV routing protocols.
Heterogeneity and Mobility aware AODV (H-MAODV) [4]
have considered the relative velocity and the distance
between each node and node which is one hop away from it
to calculate one weight metric. This weight metric is
calculated at each node and this parameter is added as an
entry in the RREQ message. If the calculated value of the
metric at any node is more than that in the RREQ, the value
of the metric is replaced else the parameter value is kept
unchanged. The destination node selects the path whose
metric value in RREQ is least among all the paths. This
protocol mainly focuses on increasing the lifetime of the
routing path. It improves the packet delivery ratio than basic
AODV protocol. The weight function (Fij) is the parameter
that allows nodes to select best path as shown in equation
1.1.
Where,
α and β are the weights satisfied .
Dij is the distance between node i and node j.
Tri is transmission range of node i.
Vrij is relative velocity between node i and node j.
Vrmaxij is maximum relative velocity between node i and
node j.
In Throughput Enhancement in AODV Routing Using
Mobility Awareness [5] the movement of the nodes is
considered for selecting best route to the destination. Here
each node broadcasts its current location in the network at
regular time intervals inside the HELLO packet. Hence each
node is aware of the mobility of its neighbors. The RREP is
sent that neighbor which has more stability or less
movement. So path to destination has maximum possible
stable nodes. Hence it increases route lifetime, reduces re-
route discoveries and link breakage. Here throughput is
improved.
Bypass AODV [6] uses cross layering to identify link breaks
due to mobility and set up the bypass path between the end
nodes whose link is broken keeping rest of the path same.
Here MAC layer is modified and channel has assigned
different states which are used to distinguish packet loss due
to link break. Two new messages bypass-RREQ and bypass-
RREP are used for bypassing purpose. The information
about bypass route is stored in bypass routing-table. This
bypass routing table is used when any node receives RREQ
or RREP message to invalidate that particular route entry.
Bypass AODV shows continuously improved performance
as node density increases. Bypass AODV results higher
packet delivery ratio than standard AODV as it buffers the
packets for transmission over bypassed route. It reduces the
invocation of unnecessary route error messages which in
turn reduces routing overhead in the network.
Backup Routing in AODV (AODV-BR) utilizes a mesh
network to provide multiple alternate paths to existing on
demand routing protocols without producing additional
control messages [7]. Instead of depending on single path,
alternative paths are maintained at each node by overhearing
route reply messages of the nodes within the range. As soon
as link breakage is identified by any node it broadcasts
packets to its neighbors hoping that at least one of them will
have alternate route to the destination. That node also sends
RERR message to the source node so that source can start
new route. This mechanism is similar to that of DSR’s
routing mechanism. In this scheme mesh link is used to skip
the broken link in the route while in DSR node uses route
cache information to replace the entire route till destination
node on routing path. This algorithm results into better
packet delivery ratio and end to end delay for mobile nodes
network. But this is not that much effective in heavily
loaded network as it is in lightly loaded network.
In [8], cross layering mechanism is used to improve route
selection metric in which route is selected based on various
parameters as hop metric, node load, bandwidth etc. The
cross layering mechanism integrates the parameters from
different stack layers. The parameters from network layer,
MAC layer and physical layer are combined. The modified
route selection mechanism is done by combining different
metrics into single metric to get better performance. The
result shows that when multiple metrics are used for route
selection, performance is improved in terms of end to end
delay, packet delivery ratio and route load especially for
high speed mobile network.
In E-AODV [9] the main goal is to route the data packets
through the nodes which are expected to have better residual
energy. The energy consumption rate specifies how fast
node is consuming its remaining energy. In F-AODV [10]
main goal is to optimize the data forwarding in MANET by
minimizing number of forwarding nodes. The selection of
forwarding node is based on maximum battery level and
queue occupancy. Maximum battery level and queue
occupancy information are injected in route request and
route reply messages.
In [11], two modified protocols E-AODV which considers
energy consumption rate and F-AODV which uses cross
layer forwarding mechanism are compared. Both E-AODV
and F-AODV give better packet delivery ratio for variable
node density. Due to high reactiveness of E-AODV and F-
AODV to the link changes compared to AODV, E-AODV
and F-AODV have lower routing overhead compared to
AODV protocol. For lower data rates all three protocols
perform approximately same but for higher data rates E-
AODV and F-AODV outperforms AODV.
III. CONCLUSION
We have studied and reviewed various modified AODV
routing protocols for mobile ad-hoc network. In standard
AODV routing protocol the basic metric used for selection
of path is hop count. The use of other parameters with hop
count gives more efficient routing path that result into
improved network performance. As some network
parameters are varied, there was dip in the performance. We
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
(IJSRD/Vol. 1/Issue 5/2013/043)
All rights reserved by www.ijsrd.com 1212
conclude that there is need of a protocol that can adapt itself
according to network parameters to perform optimally.
IV. FUTURE WORK
As future enhancement, energy parameter of node with hop
count can be used as path selection metric to establish more
efficient routing path. Residue Energy Battery Model along
with AODV routing can be used for this. The initial energy
of any node is given the parameter
DEFAULT_FULL_BATTERY_CAP. In our algorithm we
will use one threshold energy paramater which will be
initialised as shown in equation 1.2.
Where,
To get the optimal value of α that gives best results, analysis
needs to be done on this modification in route discovery
process. Every node will first check its residue energy with
this threshold value. If the node has energy equal or more
than that of threshold value then only broadcast the RREQ
packets to its immediate neighbors. This process will be
continued until route is established or RREQ message is
received at destination.
REFERENCES
[1] S. Corson, Mobile Ad hoc Networking (MANET):
Routing Protocol Performance Issues and Evaluation
Considerations, RFC-2501, 1999.
[2] C.Perkins, Ad hoc On Demand Distance Vector
(AODV) routing, RFC-3561, 2003.
[3] Luke Klein-Berndt, A Quick Guide to AODV
Routing, National Institute Of Standards And
Technology (NIST).
[4] Bisngar Ahmed, Zytoune Ouadoudi, RzizaMohamed
and Ouadou Mohamed, “A mobility aware Modified
AODV for heterogeneous mobile ad hoc networks”,
IEEE 2012.
[5] Dr.S.A.Hussain, Dr.E.Garcia and M.Idrees, “In
Throughput Enhancement in AODV Routing Using
Mobility Awareness”, Unpublished.
[6] Ahed M. Alshanyour, Uthman Baroudi, “Bypass
AODV: Improving Performance of Ad Hoc On-
Demand Distance Vector (AODV) Routing Protocol
in Wireless Ad Hoc Networks”, ICST February 2008.
[7] Sung-Ju Lee and Mario Gerla, “AODV-BR:Backup
Routing in Ad-hoc Networks”, Defence Advanced
Research Projects Agency(DARPA).
[8] Jihong Shi, Jiang Yu, Haiyan Li and Rong Zong,
“AODV Protocol Optimization Based on Cross-Layer
Design of WMN”, IEEE, 2011.
[9] Lamia Romdhani, Christian Bonnet, “Energy
consumption speed-based routing for mobile ad hoc
networks”, Tokyo, Japan, WWAN 2004.
[10] Lamia Romdhani, Christian Bonnet, “A cross-layer
feature for an efficient forwarding strategy in wireless
ad hoc networks”, 20th
IEEE, Vienna, Austria, AINA
2006.
[11] Lamia Romdhani, Christian Bonnet, “Energy-based
routing optimization in MANET: Cross-layer
benefits”, proceeding of 9th
international conference
on mobile and wireless communication networks,
2007.

More Related Content

PDF
En33838844
PDF
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
PDF
Paper id 71201928
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PDF
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
PDF
Progressive Routing Protocol using Hybrid Analysis for MANETs
PDF
H01115155
PDF
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
En33838844
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Paper id 71201928
Welcome to International Journal of Engineering Research and Development (IJERD)
The Effects of Speed on the Performance of Routing Protocols in Mobile Ad-hoc...
Progressive Routing Protocol using Hybrid Analysis for MANETs
H01115155
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs

What's hot (17)

PDF
A novel approach of hybrid multipath routing protocol for manets using receiv...
PDF
Comparing: Routing Protocols on Basis of sleep mode
PDF
E010322531
PDF
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PDF
10.1.1.258.7234
PDF
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
PDF
Research Inventy : International Journal of Engineering and Science
PDF
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
PDF
Enhanced aodv route discovery and route establishment for qos provision for r...
PDF
Performance analysis on multihop transmission using arp routing protocol in i...
PDF
Performance analysis on multihop transmission using
PDF
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
PDF
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
PDF
Performance analysis of aodv, olsr, grp and dsr routing
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
PDF
O26087092
PDF
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
A novel approach of hybrid multipath routing protocol for manets using receiv...
Comparing: Routing Protocols on Basis of sleep mode
E010322531
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
10.1.1.258.7234
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying...
Research Inventy : International Journal of Engineering and Science
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Enhanced aodv route discovery and route establishment for qos provision for r...
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
Performance analysis of aodv, olsr, grp and dsr routing protocols with databa...
Performance analysis of aodv, olsr, grp and dsr routing
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
O26087092
ENERGY AND PERFORMANCE EVALUATION OF REACTIVE, PROACTIVE, AND HYBRID ROUTING ...
Ad

Viewers also liked (15)

PDF
State of the Art in Cloud Security
PDF
Review on variants of Security aware AODV
PDF
Segment Combination based Approach for Energy- Aware Multipath Communication ...
PDF
Design & Development of Articulated Inspection ARM for in House Inspection in...
PDF
Low Power Design flow using Power Format
PDF
Design and Simulation of 4-bit DAC Decoder Using Custom Designer
PDF
An authentication framework for wireless sensor networks using Signature Base...
PDF
Performance Analysis of Small Sized Engine with Supercharger using Gasoline -...
PDF
Mining Frequent Item set Using Genetic Algorithm
PDF
Analysis on Data Fusion Techniques for Combining Conflicting Beliefs
PDF
A Review on Image Denoising using Wavelet Transform
PDF
Analysis and Detection of Image Forgery Methodologies
PDF
The Optimizing Multiple Travelling Salesman Problem Using Genetic Algorithm
PDF
Optimization Approach for Capacitated Vehicle Routing Problem Using Genetic A...
PDF
SDH (Synchronous Digital Hierarchy) & Its Architecture
State of the Art in Cloud Security
Review on variants of Security aware AODV
Segment Combination based Approach for Energy- Aware Multipath Communication ...
Design & Development of Articulated Inspection ARM for in House Inspection in...
Low Power Design flow using Power Format
Design and Simulation of 4-bit DAC Decoder Using Custom Designer
An authentication framework for wireless sensor networks using Signature Base...
Performance Analysis of Small Sized Engine with Supercharger using Gasoline -...
Mining Frequent Item set Using Genetic Algorithm
Analysis on Data Fusion Techniques for Combining Conflicting Beliefs
A Review on Image Denoising using Wavelet Transform
Analysis and Detection of Image Forgery Methodologies
The Optimizing Multiple Travelling Salesman Problem Using Genetic Algorithm
Optimization Approach for Capacitated Vehicle Routing Problem Using Genetic A...
SDH (Synchronous Digital Hierarchy) & Its Architecture
Ad

Similar to Survey of Modified Routing Protocols for Mobile Ad-hoc Network (20)

PDF
En33838844
PDF
B03406010
PDF
Research Inventy : International Journal of Engineering and Science
PDF
As33259263
PDF
As33259263
PDF
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
PDF
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
DOC
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
PDF
A Survey of Enhanced Routing Protocols for Manets
PDF
A study on performance comparison of dymo with aodv and dsr
PDF
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
PDF
SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC N...
PDF
IRJET- Optimum Routing Algorithm for MANET
PDF
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
PDF
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
PDF
Q01821111115
PDF
To improve the QoS in MANETs through analysis between reactive and proactive ...
PDF
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
En33838844
B03406010
Research Inventy : International Journal of Engineering and Science
As33259263
As33259263
PERFORMANCE EVALUATION ON EXTENDED ROUTING PROTOCOL OF AODV IN MANET
Performance Comparison of AODV and DSDV Routing Protocols for Ad-hoc Wireless...
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
A Survey of Enhanced Routing Protocols for Manets
A study on performance comparison of dymo with aodv and dsr
Survey comparison estimation of various routing protocols in mobile ad hoc ne...
SURVEY: COMPARISON ESTIMATION OF VARIOUS ROUTING PROTOCOLS IN MOBILE AD-HOC N...
IRJET- Optimum Routing Algorithm for MANET
Review paper on performance analysis of AODV, DSDV, OLSR on the basis of pack...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Q01821111115
To improve the QoS in MANETs through analysis between reactive and proactive ...
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
IJCER (www.ijceronline.com) International Journal of computational Engineerin...

More from ijsrd.com (20)

PDF
IoT Enabled Smart Grid
PDF
A Survey Report on : Security & Challenges in Internet of Things
PDF
IoT for Everyday Life
PDF
Study on Issues in Managing and Protecting Data of IOT
PDF
Interactive Technologies for Improving Quality of Education to Build Collabor...
PDF
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
PDF
A Study of the Adverse Effects of IoT on Student's Life
PDF
Pedagogy for Effective use of ICT in English Language Learning
PDF
Virtual Eye - Smart Traffic Navigation System
PDF
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
PDF
Understanding IoT Management for Smart Refrigerator
PDF
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
PDF
A Review: Microwave Energy for materials processing
PDF
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
PDF
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
PDF
Making model of dual axis solar tracking with Maximum Power Point Tracking
PDF
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
PDF
Study and Review on Various Current Comparators
PDF
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
PDF
Defending Reactive Jammers in WSN using a Trigger Identification Service.
IoT Enabled Smart Grid
A Survey Report on : Security & Challenges in Internet of Things
IoT for Everyday Life
Study on Issues in Managing and Protecting Data of IOT
Interactive Technologies for Improving Quality of Education to Build Collabor...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
A Study of the Adverse Effects of IoT on Student's Life
Pedagogy for Effective use of ICT in English Language Learning
Virtual Eye - Smart Traffic Navigation System
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Understanding IoT Management for Smart Refrigerator
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
A Review: Microwave Energy for materials processing
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
Making model of dual axis solar tracking with Maximum Power Point Tracking
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
Study and Review on Various Current Comparators
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Defending Reactive Jammers in WSN using a Trigger Identification Service.

Recently uploaded (20)

PDF
Software defined netwoks is useful to learn NFV and virtual Lans
PPT
Comprehensive Java Training Deck - Advanced topics
PDF
Performance, energy consumption and costs: a comparative analysis of automati...
PPT
UNIT-I Machine Learning Essentials for 2nd years
PDF
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
PDF
Lesson 3 .pdf
PPTX
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
PDF
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
PDF
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
PDF
Project_Mgmt_Institute_-Marc Marc Marc .pdf
PDF
Principles of operation, construction, theory, advantages and disadvantages, ...
DOCX
An investigation of the use of recycled crumb rubber as a partial replacement...
PPTX
AI-Reporting for Emerging Technologies(BS Computer Engineering)
PPTX
Design ,Art Across Digital Realities and eXtended Reality
PDF
IAE-V2500 Engine for Airbus Family 319/320
PDF
Cryptography and Network Security-Module-I.pdf
PDF
Research on ultrasonic sensor for TTU.pdf
PPT
Programmable Logic Controller PLC and Industrial Automation
Software defined netwoks is useful to learn NFV and virtual Lans
Comprehensive Java Training Deck - Advanced topics
Performance, energy consumption and costs: a comparative analysis of automati...
UNIT-I Machine Learning Essentials for 2nd years
VTU IOT LAB MANUAL (BCS701) Computer science and Engineering
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
Lesson 3 .pdf
Soft Skills Unit 2 Listening Speaking Reading Writing.pptx
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
ASPEN PLUS USER GUIDE - PROCESS SIMULATIONS
Project_Mgmt_Institute_-Marc Marc Marc .pdf
Principles of operation, construction, theory, advantages and disadvantages, ...
An investigation of the use of recycled crumb rubber as a partial replacement...
AI-Reporting for Emerging Technologies(BS Computer Engineering)
Design ,Art Across Digital Realities and eXtended Reality
IAE-V2500 Engine for Airbus Family 319/320
Cryptography and Network Security-Module-I.pdf
Research on ultrasonic sensor for TTU.pdf
Programmable Logic Controller PLC and Industrial Automation

Survey of Modified Routing Protocols for Mobile Ad-hoc Network

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 5, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1210 Abstract— In last few years extensive research work has been done in the field of routing protocols for Ad-hoc Network. Various routing protocols have been evaluated in different network conditions using different performance metrics. A lot of research has been done how to modify standard routing protocol in ad-hoc network to improve its performance. The hop count is not only metric that gives efficient routing path. There are various modified protocols which make the use of other parameters along with hop count to select the best routing path to the destination. In standard Ad-hoc On-demand Distance Vector (AODV) routing protocol only hop count is used for selecting the routing path. In this paper we have studied variants of AODV protocols with modified routing metric. Keywords: Mobile Ad-hoc Network, cross layer, AODV, HMAODV, Bypass AODV, AODV-BR, E-AODV, F-AODV. I. INTRODUCTION Mobile Ad-hoc Network (MANET) [1] is collection of mobile nodes which are connected with each other without any infrastructure. We can also call it as infrastructure less network. An Ad-hoc network is highly dynamic in nature means that nodes are free to move, they can join or leave the network at any time. In ad-hoc network adjacent nodes which are within each other’s range can communicate directly while non-adjacent nodes which are not within each other’s range have to communicate through one or more intermediate node/s. The topology of network keep on changing as nodes keeps on joining and leaving the network. Hence we need to have efficient routing protocol to maintain the communication between nodes. The routing protocols for wireless ad-hoc network are classified as proactive, reactive and hybrid. In proactive routing, the routes in the network are continuously evaluated so that when any node has data to send, it also knows the path to destination. Each node maintains a routing table which contains network related parameters and metric values. These routing tables are exchanged between the nodes periodically. It is also known as Table Driven routing protocol. In reactive routing, the routes are discovered and established only when they are needed. The nodes are unaware of network topology. Each node has to go through route discovery and route maintenance procedure. The routes remain valid till the destination is reachable or until route is no longer needed. So paths are established on demand of nodes which avoids unnecessary broadcasting of network information. It is also known as on-demand routing protocol. Hybrid routing protocol combines both proactive and reactive routing strategy. The routing is initially established with any proactive route and then demand for additional nodes through reactive flooding. So the network is partitioned into two layers, inner layer uses proactive while outer layer uses reactive routing. The Ad hoc On-Demand Distance Vector (AODV) [2] [3] is designed for ad-hoc networks. It is purely on demand routing protocol as routing does not depend on fixed path and routing information is exchanged only when needed. In AODV routing protocol messages, sequence number is used by the node to determine the freshness of the information contained with the node. Route Request (RREQ), Route Replies (RREP) and Route Errors (RERR) are the various types of message used in AODV routing protocol. AODV routing procedure can be characterized into following phases A. Route Discovery Process: Route discovery process is started when any node wants to send data to other node and it does not have valid path to that node. Here each node maintains two different counters a node sequence number and broadcast ID. Broadcast ID is incremented every time source node initiates new RREQ message. The RREQ message is broadcasted to all the neighbors of source node .When any intermediate node receives RREQ, it replies to source if it has path to the destination node. If it does not have path to destination node, it further broadcasts the RREQ message to its neighbors. When the destination node receives the RREQ, it sends RREP. Route Reply message is unicasted by the node. B. Reverse Path Set Up: As RREQ message is traversed from source to the various nodes to the destination, the reverse path is automatically setup from all nodes back to the source. In order to set up this reverse path, each node stores the address of the neighbor from which it has received the RREQ message. C. Forward Path Set Up: When RREQ message is received by destination node itself, it replies to the source node. If an intermediate node has route to the destination node, before sending RREP to source it checks the freshness of the path information it has. If the sequence number of the path is greater than or equal to sequence number in the RREQ, then it replies with path to source. If the sequence number in the RREQ message is greater than that of path with the node then instead of sending this path information to source, it broadcasts the RREQ message to its neighbors. D. Route Maintenance: HELLO messages are used for maintaining active route. Each node maintains a precursor list which contains the list of nodes which needs to be notified in the case of link break. When any node detects link break for the next node in its Survey of Modified Routing Protocols for Mobile Ad-hoc Network Ashish B. Gaigole1 1 M.Tech Scholar, Department of Computer Science and Engg. 1 Visvesvaraya National Institute of Technology (VNIT), Nagpur, Maharashtra, India
  • 2. Survey of Modified Routing Protocols for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 5/2013/043) All rights reserved by www.ijsrd.com 1211 path towards the destination, it sends RERR message to all the nodes in its precursor list. Once the source node receives the notification of the broken link, the source node can restart the route discovery process if it has data to send to the destination. II. LITERATURE SURVEY The standard AODV routing protocol had been modified previously considering different parameters as mobility, energy level, congestion, bandwidth and node load. In this section we are going to discuss some of these modified AODV routing protocols. Heterogeneity and Mobility aware AODV (H-MAODV) [4] have considered the relative velocity and the distance between each node and node which is one hop away from it to calculate one weight metric. This weight metric is calculated at each node and this parameter is added as an entry in the RREQ message. If the calculated value of the metric at any node is more than that in the RREQ, the value of the metric is replaced else the parameter value is kept unchanged. The destination node selects the path whose metric value in RREQ is least among all the paths. This protocol mainly focuses on increasing the lifetime of the routing path. It improves the packet delivery ratio than basic AODV protocol. The weight function (Fij) is the parameter that allows nodes to select best path as shown in equation 1.1. Where, α and β are the weights satisfied . Dij is the distance between node i and node j. Tri is transmission range of node i. Vrij is relative velocity between node i and node j. Vrmaxij is maximum relative velocity between node i and node j. In Throughput Enhancement in AODV Routing Using Mobility Awareness [5] the movement of the nodes is considered for selecting best route to the destination. Here each node broadcasts its current location in the network at regular time intervals inside the HELLO packet. Hence each node is aware of the mobility of its neighbors. The RREP is sent that neighbor which has more stability or less movement. So path to destination has maximum possible stable nodes. Hence it increases route lifetime, reduces re- route discoveries and link breakage. Here throughput is improved. Bypass AODV [6] uses cross layering to identify link breaks due to mobility and set up the bypass path between the end nodes whose link is broken keeping rest of the path same. Here MAC layer is modified and channel has assigned different states which are used to distinguish packet loss due to link break. Two new messages bypass-RREQ and bypass- RREP are used for bypassing purpose. The information about bypass route is stored in bypass routing-table. This bypass routing table is used when any node receives RREQ or RREP message to invalidate that particular route entry. Bypass AODV shows continuously improved performance as node density increases. Bypass AODV results higher packet delivery ratio than standard AODV as it buffers the packets for transmission over bypassed route. It reduces the invocation of unnecessary route error messages which in turn reduces routing overhead in the network. Backup Routing in AODV (AODV-BR) utilizes a mesh network to provide multiple alternate paths to existing on demand routing protocols without producing additional control messages [7]. Instead of depending on single path, alternative paths are maintained at each node by overhearing route reply messages of the nodes within the range. As soon as link breakage is identified by any node it broadcasts packets to its neighbors hoping that at least one of them will have alternate route to the destination. That node also sends RERR message to the source node so that source can start new route. This mechanism is similar to that of DSR’s routing mechanism. In this scheme mesh link is used to skip the broken link in the route while in DSR node uses route cache information to replace the entire route till destination node on routing path. This algorithm results into better packet delivery ratio and end to end delay for mobile nodes network. But this is not that much effective in heavily loaded network as it is in lightly loaded network. In [8], cross layering mechanism is used to improve route selection metric in which route is selected based on various parameters as hop metric, node load, bandwidth etc. The cross layering mechanism integrates the parameters from different stack layers. The parameters from network layer, MAC layer and physical layer are combined. The modified route selection mechanism is done by combining different metrics into single metric to get better performance. The result shows that when multiple metrics are used for route selection, performance is improved in terms of end to end delay, packet delivery ratio and route load especially for high speed mobile network. In E-AODV [9] the main goal is to route the data packets through the nodes which are expected to have better residual energy. The energy consumption rate specifies how fast node is consuming its remaining energy. In F-AODV [10] main goal is to optimize the data forwarding in MANET by minimizing number of forwarding nodes. The selection of forwarding node is based on maximum battery level and queue occupancy. Maximum battery level and queue occupancy information are injected in route request and route reply messages. In [11], two modified protocols E-AODV which considers energy consumption rate and F-AODV which uses cross layer forwarding mechanism are compared. Both E-AODV and F-AODV give better packet delivery ratio for variable node density. Due to high reactiveness of E-AODV and F- AODV to the link changes compared to AODV, E-AODV and F-AODV have lower routing overhead compared to AODV protocol. For lower data rates all three protocols perform approximately same but for higher data rates E- AODV and F-AODV outperforms AODV. III. CONCLUSION We have studied and reviewed various modified AODV routing protocols for mobile ad-hoc network. In standard AODV routing protocol the basic metric used for selection of path is hop count. The use of other parameters with hop count gives more efficient routing path that result into improved network performance. As some network parameters are varied, there was dip in the performance. We
  • 3. Survey of Modified Routing Protocols for Mobile Ad-hoc Network (IJSRD/Vol. 1/Issue 5/2013/043) All rights reserved by www.ijsrd.com 1212 conclude that there is need of a protocol that can adapt itself according to network parameters to perform optimally. IV. FUTURE WORK As future enhancement, energy parameter of node with hop count can be used as path selection metric to establish more efficient routing path. Residue Energy Battery Model along with AODV routing can be used for this. The initial energy of any node is given the parameter DEFAULT_FULL_BATTERY_CAP. In our algorithm we will use one threshold energy paramater which will be initialised as shown in equation 1.2. Where, To get the optimal value of α that gives best results, analysis needs to be done on this modification in route discovery process. Every node will first check its residue energy with this threshold value. If the node has energy equal or more than that of threshold value then only broadcast the RREQ packets to its immediate neighbors. This process will be continued until route is established or RREQ message is received at destination. REFERENCES [1] S. Corson, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, RFC-2501, 1999. [2] C.Perkins, Ad hoc On Demand Distance Vector (AODV) routing, RFC-3561, 2003. [3] Luke Klein-Berndt, A Quick Guide to AODV Routing, National Institute Of Standards And Technology (NIST). [4] Bisngar Ahmed, Zytoune Ouadoudi, RzizaMohamed and Ouadou Mohamed, “A mobility aware Modified AODV for heterogeneous mobile ad hoc networks”, IEEE 2012. [5] Dr.S.A.Hussain, Dr.E.Garcia and M.Idrees, “In Throughput Enhancement in AODV Routing Using Mobility Awareness”, Unpublished. [6] Ahed M. Alshanyour, Uthman Baroudi, “Bypass AODV: Improving Performance of Ad Hoc On- Demand Distance Vector (AODV) Routing Protocol in Wireless Ad Hoc Networks”, ICST February 2008. [7] Sung-Ju Lee and Mario Gerla, “AODV-BR:Backup Routing in Ad-hoc Networks”, Defence Advanced Research Projects Agency(DARPA). [8] Jihong Shi, Jiang Yu, Haiyan Li and Rong Zong, “AODV Protocol Optimization Based on Cross-Layer Design of WMN”, IEEE, 2011. [9] Lamia Romdhani, Christian Bonnet, “Energy consumption speed-based routing for mobile ad hoc networks”, Tokyo, Japan, WWAN 2004. [10] Lamia Romdhani, Christian Bonnet, “A cross-layer feature for an efficient forwarding strategy in wireless ad hoc networks”, 20th IEEE, Vienna, Austria, AINA 2006. [11] Lamia Romdhani, Christian Bonnet, “Energy-based routing optimization in MANET: Cross-layer benefits”, proceeding of 9th international conference on mobile and wireless communication networks, 2007.