I. Proactive algorithms:
Maintain routes to destinations even if they are not needed. Some
of the examples are Destination Sequenced Distance Vector (DSDV), Wireless Routing
Algorithm (WRP), Global State Routing (GSR), Source-tree Adaptive Routing (STAR),
Cluster-Head Gateway Switch Routing (CGSR), Topology Broadcast Reverse Path
Forwarding (TBRPF), Optimized Link State Routing (OLSR) etc.
Always maintain routes:- Little or no delay for route determination
Consume bandwidth to keep routes up-to-date
Maintain routes which may never be used
Advantages: low route latency, State information, QoS guarantee related to
connection set-up or other real-time requirements
Disadvantages: high overhead (periodic updates) and route repair depends
on update frequency
1: Hello packets
Each node periodically broadcast its Hello message. It contain list of addresses of
neighbors which heard by node and which heard by neighbor nodes. Each node
constructs its MPR selector table.
MPR selector
Sequence number
i. DSDV Algorithm
DSDV is based on the Bellman-Ford algorithm.
1) Each routing table will contain all available destinations, with the associated next
hope and a sequence number.
2) Tables are updated in the topology per exchange between nodes.
3) Each node will broadcast to its neighbors entries in its table.
4) Nodes who receive this data can update their tables when they received a better route,
or a new one.
5) It contains incremental updates which will cause less traffic.
Illustration: This algorithm will illustrated by this example:
At t=0, the network is organized as shows figure 1. We suppose at this time the network is
stable, each node has a correct routing table of all destinations. Then, we suppose G is moving,
and at t+1, the topology is as shown in figure 2.
ii. Advantages
DSDV was one of the early algorithms available.
It is quite suitable for creating ad hoc networks with small number of nodes.
DSDV guarantees for loop free path.
iii. Disadvantages
DSDV requires a regular update of its routing tables, which uses up battery power
and a small amount of bandwidth even when the network is idle.
Whenever the topology of the network changes, a new sequence number is necessary
before the network re-converges; thus, DSDV is not suitable for highly dynamic
networks
i. Types of Routing
Proactive:
On demand.
Route Delayed Availability.
ii. Working of Zone Routing Protocol
If a packet's destination is in the same zone as the origin, the proactive protocol using
an already stored routing table is used to deliver the packet immediately.
If the route extends outside the packet's originating zone, a reactive protocol takes over to
check each successive zone in the route to see whether the destination is inside that zone.
This reduces the processing overhead for those routes. Once a zone is confirmed as
containing the destination node, the proactive protocol, or stored route-listing table, is used to
deliver the packet.
In this way packets with destinations within the same zone as the originating zone are
delivered immediately using a stored routing table. Packets delivered to nodes outside the
sending zone avoid the overhead of checking routing tables along the way by using the
reactive protocol to check whether each zone encountered contains the destination node.
iii. Detailed
What is called the Intra-zone Routing Protocol (IARP), or a proactive routing
protocol, is used inside routing zones. What is called the Inter-zone Routing Protocol
(IERP), or a reactive routing protocol, is used between routing zones. IARP uses a
routing table. Since this table is already stored, this is considered a proactive protocol.
IERP uses a reactive protocol. Any route to a destination that is within the same local
zone is quickly established from the sources proactively cached routing table by IARP.
Therefore, if the source and destination of a packet are in the same zone, the packet can
be delivered immediately.
iv. Most existing proactive routing algorithms can be used as the IARP for
ZRP.
In ZRP a zone is defined around each node, called the node's k-neighborhood, which
consists of all nodes within k hops of the node. Border nodes are nodes which are exactly
k hops away from a source node.
v. Architecture
The Zone Routing Protocol, as its name implies, is based on the concept of zones. A
routing zone is defined for each node separately, and the zones of neighboring nodes
overlap.
H
G C
B
A D
S
F E I K
J
Peripheral nodes are nodes whose minimum distance to the central node is exactly equal
to the zone.
The nodes whose minimum distance is less than are interior nodes.
Example
Consider the network in Figure. The node S has a packet to send to node X. The
zone radius is ρ=2. The node uses the routing table provided by IARP to check whether
the destination is within its zone. Since it is not found, a route request is issued using
IERP. The request is border cast to the peripheral nodes (gray in the picture).
H
G C
B
A D U X
S
K
F E T W
J I L
N V
P
Q O
R
Node I do not find the destination in its routing table. Consequently, it broadcasts
the request to its peripheral nodes, shown in gray in Figure 4. Due to query control
mechanisms, the request is not passed back to nodes D, F and S.
H
G C
B
A D U
S X
K
F E T W
J I L
N V
P
Q O
R
Finally, the route request is received by node T, which can find the destination in
its routing zone, shown in Figure 5. Node T appends the path from itself to node X to the
path in the route request. A route reply, containing the reversed path is generated and sent
back to the source node. If multiple paths to the destination were available, the source
would receive several replies.
H
G
C
B
D
A U X
S
K
F E T
W
J L
I
N V
P
O
Q
R