Вы находитесь на странице: 1из 5

c  c c c

 
  
 c 

Waseem M. Arain and Sayeed Ghani
warain@iba.edu.pk sghani@iba.edu.pk
Ê   
   

for mobile ad hoc routing protocols is to tackle the


inherent limitations of MANETS such as high power
consumption, low bandwidth and high error rate -.
c c Some of the key ad-hoc routing protocols are as
 Mobile ad hoc networks are increasingly follows.
finding their existence in the marketplace heading to a
new paradigm of pervasive computing. However there    proposed by
are many areas open to research in the field. Due to D. B. Johnson et al. -, uses two key processes namely:
node mobility resulting in an ever-changing network Route Discovery and Route Maintenance. Routes are
topology, conventional routing methods cannot be stored in caches. RREQ broadcasts leads to RREP,
applied in MANETS. Therefore, this is one of the core which contains complete routes to be used by the source
areas of research. Researchers are challenged to design and all other intermediate nodes. RERR messages are
protocols that can potentially scale to anything from used to notify the source about any broken links on the
thousand to tens of thousands of nodes and to reduce route, which on its subsequent RREQ piggybacks the
the route discovery latency. In this paper a different error notification to avoid staleness in caches.
instantiation of Way Point Routing (WPR) model is C.E. Perkins et al. - proposed !"
proposed, where a route is divided into sub-routes to #$ !"   routing based on
decrease route-latency in frequently occurring modifications to bellman-Ford routing scheme. In
subsequent-route-discoveries and to adapt varying DSDV packets are sent using routing tables stored at
topologies in MANET, and future simulations are each node. Any change in the route is updated,
suggested to evaluate the performance of the proposed periodically, throughout the network and as soon as
routing protocol. new critical information is available. Central to the
concept is the sequence number in the routing table,
Ê 
Ê  c   Ê   
Ê  against each entry, generated by the destination. This
 helps prevent looping
Mobile Ad hoc NETworks (MANETS),  c$% "$$ !" 
consist of dynamically self-configurable, un- c routing protocol is a modified DSDV with on-
administered, wireless, low-powered, autonomous multi demand behavior. It involves steps of path discovery
hops - attracting the concept of pervasive similar to DSR but here RREQ includes two additional
communications ± an idea intrinsically attached to parameters i.e. source sequence number and destination
heterogeneous networks and 4G architecture. They are sequence number. Source sequence number is used to
also referred as    as nodes not maintain freshness of the reverse route and destination
only serve as end-systems but also function as routers sequence number is used to seek freshest route (in
acting as intermediate nodes - . Any such network is RREP) from the node. Link with neighboring nodes
expected to have a dynamic and variable topology to stay active as long as the packets are delivered to them
offer the flexibility of MANETS. Applications of or in case there¶s nothing to send then a HELLO
MANETS include but are not limited to: emergency message ± a special RREQ with TTL set to 1 is sent-
services, hospitals, conferencing, community
networking, home networking, embedded computing  &!$"' '(  
applications (ubiquitous computing) and digital is a hierarchical and proactive protocol based on
battlefield operations --. DSDV. It divides the network into clusters and elects a
cluster-head such that each node is one hop from its
Due to the potential node and link mobility, cluster-head. Nodes that belong to more than one
routing is a highly challenging area of research in cluster would act as gateways. Thus it maintains route
MANETS. Many ad hoc routing protocol projects are in a hierarchy of 0  0 
underway worldwide, - mainly, to achieve the aims of fashion-
reliability, efficiency and scalability. The key challenge
In the following section we would compare the routing information than path caches and were able to
DSR and AODV, because, first these are the two reduce routing overheads more effectively. However it
protocols which have been earlier used in DOA as an was also noted that path caches are simple to implement
instantiation of way point routing -) We consider whereas link caches are complex, as nodes will have to
efficiency and scalability as two most important use graph search algorithms hence taking more CPU
characteristics which make them strong candidates for time to execute -In a similar work - also found
way point routing. Lately, in [26] also these are the two that link caches without appropriate timeout
most important and key characteristics for such mechanisms can potentially increase the route errors
comparison. resulting in performance degradation. Marti et al. -
use two extensions on top of DSR to outline processes
In section three we would propose our protocol
for efficiency such that nodes with high mobility are not
which is an instantiation of way point routing and then
chosen in a path.
in the end in section four we would set directions of our
future work before concluding. Yu - has proposed a distributed cache-
updating algorithm for DSR and has shown that it
*cÊ   +     " *c  reduces the discovery latency for path caches by up to

Ê  29% and 49% for Link-MaxLife ± an adaptive timeout
mechanism for link caches. When a node detects a
In simulations DSR has fared better in less broken link it is proactively updated on the network.
stressful conditions, i.e., fewer nodes and less node Thus the failure detection retains its on-demand
mobility; however in more stressful conditions AODV behavior and yet the nodes are updated proactively.
has surpassed DSR -) Simulation results in -
indicate DSR and AODV have delivered 95% of data
 &.&Ê!!!
packets regardless of mobility rate. However, DSR
consistently generates less routing overhead than Erikson et al. - propose a new dynamic
AODV -), -. The poor performance and delay of addressing scheme where address and identifier of the
DSR can be attributed to its aggressive and inefficient node are two separate entities. IP address is an identifier
caching mechanics -) Yih-Shun Hu et al. have stated and routing address is a dynamically changing tree. Use
that source routing is favorable for security provisions of dynamic addressing scheme is tipped for building a
in a routing protocol as compared to distance-vector scalable routing protocol.
routing protocols. -.
Lee et al. - have proposed five versions of a
modified AODV for scalability test with 10,000 nodes.
 --Ê!!! The simulations show that it's quite difficult to scale to
Route caching is used aggressively by DSR to that level. Certain schemes have worked well in certain
reduce (i) routing overheads and (ii) route discovery ways thus leading to the intuition that similar
latency - . However it results in polluted caches over improvements can be brought about in other on-demand
time as many entries become stale. There are two types routing protocols too.
of cache organization schemes currently used in DSR,
Recently Bai et al. -) have proposed the Way
one is path cache and the other is link cache. Path cache
Point Routing model, a route is divided into segments.
keeps the full path from source to destination, whereas
Each node on a route is either a waypoint node or a
link cache proposed by Weinging Lou et al. -
forwarding node within a segment. Waypoint nodes
decomposes the path received in RREP to links, using
delimit each segment and two different protocols are
the concepts of link lists in graph theory and stores a
run: one within segment and the other between
graphical view of the topology. Simulation results have
segments. Other than source and destination all other
shown improved performance under stressful network
waypoint nodes act as Start node for the downstream
conditions when link cache was used.
segment and end-node for the upstream segment. The
Three modifications to the DSR have been source node is only a start node likewise the destination
proposed by Mahesh K. Marina et al. namely wider- node is always an end node. Since waypoint nodes are
error notification, route expiry mechanism with designated for the route only therefore they may be only
adaptive timeout selection and use of negative caches. forwarding nodes for other routes.
The simulation results showed that combination of
DOA (DSR over AODV) protocol proposed in
these techniques brings 15% improvement in packet
-) is an instantiation of the WPR model. DSR is used
delivery - 
as a high-level routing protocol for inter-segment and
Hu and Johnson -studied the cache design AODV is used as low-level routing protocol running
choices in terms of cache structure, cache capacity and within segments. Each node maintains route cache and
cache timeout. They found that link caches yield more route table for DSR and AODV respectively.

 Ê c ÊcÊ   eliminated by load balancing [22]. It is likely to have
lower overhead in comparison to DSR and TORA.
Several routing protocols have been proposed
Though in some simulation studies it has been shown
to date, having strengths and applications in different
that TORA has serious performance bottlenecks [23,
areas. However our motivation comes from the study of
24] however, studies are not available to compare if M-
hybrid and hierarchical reactive protocols. WPR as a
TORA has not significantly altered the situation. Thus
model has a distinct advantage over two key
M-TORA meets our criterion i.e. it is the only protocol
hierarchical protocols; namely, CGSR and ZRP (zone
after DSR and TORA to have the ability to record
routing protocol). We have discussed only one of them
multiple paths and it is the only protocol that uses load
i.e. CGSR to explain the underlying idea used in such
balancing capability.
protocols. It fairly distributes the work by splitting the
route into segments rather than the entire network into Associativity-Based Routing (ABR) protocol
clusters where additional work is placed on certain is selected for intra-segment routing because it has been
nodes in the network, thereby depriving them of their found stable and reliable, with lower overhead and
energy resources [19]. plausibly better throughput when compared to AODV.
This observation stems form the fact that ABR has
We propose here a new protocol, as an
fared well on overhead, delay and throughput
instantiation of the Way Point Routing approach for
parameters when compared with DSR [25].
reasons of achieving better scalability and efficiency of
M-TORA and ABR protocols. After studying the set of
 /!$*($
protocols we selected M-TORA and ABR as inter-
segment and intra-segment protocols respectively. In a We propose to conduct broad-ranging
similar work earlier [19], DSR is used as a high-level simulations using NS2. Our simulations will compare
routing protocol for inter-segment and AODV is used as the DOA and our proposed instantiation of the WPR for
low-level routing protocol running within segments. performance and scalability factors. We will study the
scalability in networks with 100 to 2500 nodes with a
 !!!/-*"c$c  minimum pause time of 0 indicating constant mobility.
Five simulation parameters will be used, i.e., control
Among a plethora of protocol properties we
overhead, packet delivery ratio (PDR), end-to-end
believe that the ability of a routing protocol to keep
delay, average route length and route repair ratio.
multiple paths and load-balancing should be the key
However upon finalization of our protocol design,
requirements of the inter-segment routing protocol. This
additional parameters and simulation conditions may be
is because multiple routes ensure that there are
included.
alternatives available when a link goes down and load
balancing prevents congestion, consequently resulting Though in -  QualNet was evaluated to be
in fewer subsequent route discoveries, low latency, the best among other alternatives for simulating Mobile
congestion control leading to better packet delivery Ad-hoc Networks. The preference to work with
ratio (PDR) and energy management. Similarly for a QualNet or GloMoSim is there, because Bai et. al has
protocol to be fit for intra-segment routing, high degree implemented DOA while using GloMoSim -) and
of stability and reliability apart from greater throughput QualNet is simply an industrial version of GloMoSim
will be the most desirable features. but there is also a good justification to use NS2 for our
simulation. First, it has been cited as most widely used
M-TORA TORA DSR AODV ABR
Route Metric Shortest Shortest Shortest Freshest Associativity, simulation tool for studies on Mobile Ad-hoc Networks,
Path, Path path and load delay etc second it¶s an open source with many researchers
Congestion Shortest
free Path path contributing to it and third it has been extensively used
Periodic IMEP IMEP None Hello Beacons
Message Control Control
in credible research projects like Monarch, establishing
Multicast Yes Yes No Yes No its validity. Also, it has the potential to be used as an
Multiple route Yes Yes Yes Yes No
possibilities emulator, though this function still needs lots of
Route
Reconfigurati
Link
Reversal,
Link
Reversa
Erase
Route,
Erase
Route,
Localized
Broadcast
improvements.
on Route l, Route Notify Notify Query
Methodology Repair Repair Source Source
Source No No Yes No Yes 

  0c  
Ê 
Routing
First simulations need to be conducted to
|
  00 0 0 compare the MOA ± proposed protocol ± with DOA
        then a special case of improving the DOA (DSR Over
Lately M-TORA has been propose, where AODV) by implementing it with modified DSR with
some of the bottlenecks such as congestion, believed to distributed cache updating as discussed in [16] can also
be responsible for low throughput of TORA have been being considered. A decision regarding changing both

or one of the protocols would also have to be taken after  0  Ê ( " 
a thorough study of these protocols. The design choice ,Ê'"().-, /).+//, Apr. 1997.
for our protocol will depend on multiple factors 9. S.R. Das, C.E. Perkins, and E.E. Royer,
including the convenience to work with the selected ³Performance Comparison of Two On-
protocols among 0   0. Demand Routing Protocols for Ad Hoc
Networks,´  0Ê"0'' , $/+, 2000.
There were many other works suggesting
10. J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu,
improvements but we have chosen only those that bring
and J. Jetcheva, ³A Performance Comparison
forth some significant improvement of our interest that
of Multi-Hop Wireless Ad Hoc Network
is scalability and efficiency of a routing protocol for
Routing Protocols,´  0 # , 1%
mobile ad hoc networks. It is clear from the above
)., 1998.
discussion that a growing body of research is indicating
11. Y.-C. Hu, A. Perrig, and D.B. Johnson,
two factors of critical importance for MANETs
³Ariadne: A Secure On-Demand Routing
maturity i.e., the routing protocols should be able to
Protocol for Ad Hoc Networks,´  0 #
scale well and should handle communication efficiently
 (2+, /++$, 2002.
i.e. with lesser route discovery latency. The DOA
12. M. Marina and S. Das, ³Performance of
protocol was designed in order to meet these goals,
Routing Caching Strategies in Dynamic Source
however, it can further be improved if the underlying
Routing,´  00 Ê ( 
idea behind the DOA protocol i.e., waypoint routing
 "   #  , 
approach, is utilized to design further improved
*+%*$+, 2001.
protocols. Hence our paper has suggested another
13. W. Lou and Y. Fang, ³Predictive Caching
instantiation of the WPR model and we have proposed
Strategy for On-Demand Routing Protocols in
that simulation be carried out to evaluate and compare
Wireless Ad Hoc Networks,´  
its performance with DOA.
" , 13 434./4.), 2002.
14. Y.-C. Hu and D. Johnson, ³Caching Strategies
    1
in On-Demand Routing Protocols for Wireless
1. C. E. Perkins, ³Ad Hoc Networking in the Ad Hoc Networks,´  05
 
IETF´,  Ê, April, 2006 # , +$/+*+, 2000.
2. D. Remondo, ³Tutorial on Wireless Ad Hoc 15. S. Marti, T.J. Giuli, K. Lai, and M. Baker,
Network´, HET-Nets 2004: 0  ³Mitigating Routing Misbehavior in Mobile
Ê        0  Ad Hoc Networks,´  0 # (22, 
   0      +%%+4%, 2000.
!  " , July 2004 16. Uin Yu ³Distributed Cache Updating for the
3. C. E. Perkins, ³Mobile IP, Ad-Hoc Dynamic Routing Protocol´, Ê
Networking, and Nomadicity´, Ê 1996 |  0   #  , 6%3
4. E. M. Royer et al., ³A Review of Current "4, June 2006
Routing Protocols for Ad Hoc Wireless 17. J. Eriksson, M. Faloutsos, and S.
Networks´, Ê    0  Krishnamurthy, ³Scalable Ad Hoc Routing:
April 1999. The Case for Dynamic Addressing,´  0
5. D.B. Johnson and D.A. Maltz, ³Dynamic Ê"0'' , Mar. 2004.
Source Routing in Ad Hoc Wireless 18. S.-J. Lee, E.M. Belding-Royer, and C.E.
Networks,´ #  , $%$. Perkins, ³Scalability Study of the Ad Hoc On-
Kluwer Academic, 1996. Demand Distance Vector Routing Protocol,´
6. C.E. Perkins and P. Bhagwat, ³Highly Ê (7"     , /$3 +,
Dynamic Destination-Sequenced Distance- ).//*, 2003.
Vector Routing (DSDV) for Mobile 19. Rondong Bai and Mukesh Singhal, ³DOA:
Computers,´  0
 Ê&' ()*,  DSR over AODV Routing for Mobile Ad Hoc
+$*+**, 1994. Networks´ Ê|  0  #
7. C.E. Perkins and E.M. Royer, ³Ad-Hoc On-   6%3"/2August 2006
Demand Distance Vector Routing,´  0 20. Giani A. Di Caro, ³Analysis of simulation
  #     environments for mobile ad-hoc networks´,

0 , 
())-, Feb. 1999. |0 08 "Ê9Ê
+*2$3Dec 2003.
8. C.-C. Chiang, H.-K. Wu, W. Liu, and M. (|  #   0     
Gerla, ³Routing in Clustered Multihop Mobile 9 #9//:9      # 
Wireless Networks with Fading Channel,´ 0  ;<  8|9 =0
Ê'",Ê|+22/$1)+$--


21. Kevin Fall (editor) and Kennan Varadhan
(editor), ³The Manual´, Nov. 2006.
22. Qiang Liu et al., ³M-TORA: A TORA-Based
Multi-Path Routing Algorithm for Mobile Ad
Hoc Networks.´ Ê&#0 +224
 0  
23. Erik Weiss et al., ³Performance Analysis of
Temporally Ordered Routing Algorithm Based
on IEEE 802.11a´ Ê+22%
24. Yuan Peiyan and LI Layuan ³Performance
Evaluation and Simulations of Routing
Protocols in Ad Hoc Networks´
 Ê 
  #  #  00 
#>   +224
25. Sung-Ju Lee and Mario Gerla ³A Simulation
Study of Table Driven and On Demand
Routing Protocols for Mobile Ad Hoc
Networks´ Ê" /)))
26. Nidhi S. Kulkarni, Balasubramanian Raman
and Indra Gupta ³On demand routing protocols
for mobile ad hoc networks: A review´ Ê
Ê   
 0     0

-  0+22)


Вам также может понравиться