Study About the Performance of Routing Protocol: A Review
An Analysis of the Performance and Classification of Routing Protocols in Wireless Sensor Networks
by Shishir Ramkumar Rastogi*, Dr. Alok Kumar Verma,
- Published in Journal of Advances and Scholarly Researches in Allied Education, E-ISSN: 2230-7540
Volume 11, Issue No. 22, Jul 2016, Pages 242 - 247 (6)
Published by: Ignited Minds Journals
ABSTRACT
The routing protocol comprises of tiny sensing, processing and networking nodes. Recent developments have resulted in several modern routing protocols for sensor networks, in which energy understanding is an important architecture issue. The routing protocols have gained much interest as they may differ according to the device and network design. This paper then studies and compares the representatives of the routing protocols for wireless networks and presents their classification and contrast. The paper eventually suggests several potential future areas of study on wireless sensor network routing protocols.
KEYWORD
performance, routing protocol, review, sensor networks, energy understanding, architecture issue, device, network design, comparison, classification, future areas of study, wireless sensor network, routing protocols
INTRODUCTION
The routing protocol is a mechanism by which data from source to destination may be chosen accordingly. The selection of the route based on the type of network, canal, and efficiency indicators is difficult for the operation. In the general case, sensor-sensing data in the Wireless Sensor Networks Wireless Sensor Network are forwarded to the base station, where data are collected, analyzed, and certain actions take place, that connects the sensor network to other networks (maybe the internet). For very narrow networks where the base station and the motes (sensor nodes) are so similar that they connect directly, but the coverage region of most Wireless Sensor Network systems is so large that thousands of nodes have to be placed and this situation involves multi-hop communications as most sensor nodes are very far removed from the sink node. Clear correspondence and multi-hop connectivity are also regarded as indirect contact. The sensor nodes not only generate and distribute their content in multi-hop contact but also act as a route into the base station for other sensor nodes. The method of determining the right route from the source node to the destination node is called routing.
PERFORMANCE: ROUTING PROTOCOL
A routing protocol lays out how routers interact to relay information and enable them and pick routes between two nodes on a computer network. Routers conduct on the Web "transport control" functions; data packets are transferred from router to router through internet networks before they enter the destination device. The basic path options are calculated by path algorithms. The networks linked to each router are explicitly identified beforehand. Such knowledge is exchanged first by immediate neighbors and then by a whole Network routing protocol. It helps routers to become acquainted with network topology. The possibility for protocols to route dynamically to changing conditions, like deactivated data lines and computers and route data around obstructions, provides a fault and high availability to the Internet. The particular features of routing protocols include how routing loops are avoided, how preferred paths are chosen, using hop cost information when it takes to achieve route convergence, scalability, and other factors such as relay multiplexing and cloud access frameworks. Other features, such as a multi-layer interface, may also be used to distribute uncompromised networking gateways to authorized ports. It always has the advantage of preventing routing protocol circuit problems.[1]
DYNAMIC SOURCE ROUTING (DSR) PROTOCOL
Dynamic source routing protocol is both an effective and easy routing protocol built specifically for wireless ad hoc network implementations in multi-hop environments. Dynamic source routing enables the device to be completely self-organizing & self-configuring without the need for any current network framework or management. It uses path routing,
exploration method is implemented only if the path cache can't locate the desired route. To monitor the Route Requests sent, a node only manages the Route request response on the condition that it has not previously acquired the query. The address is missing from the message's route record. Dynamic source routing utilizes source routing, i.e. the source manages the whole series of hops each packet needs to travel through. It has to include the hops list in the header of a single packet. A detrimental problem is that the overhead routing needs to be sent with a single packet. One big benefit, however, is that intermediate nodes will gain routes in the packets they hold from the source routes. Whereas, finding a path is usually an expensive operation in terms of space, resources, and money. It is a good reason to use routing from the source. The added advantage of source routing is that it evades the requirement for the current routing details in the intermediate nodes that will dispatch the packets because full routing knowledge is found inside the packets. Finally, it evades routing loops mostly when the entire path is calculated using a single link, instead of making the hop-by-hop verdict. The protocol contains two essential mechanisms which are basically "Route Exploration" and "Route Maintenance." These two mechanisms must operate together to enable nodes to establish routes to arbitrary destinations in the ad hoc network in addition to maintaining them. All protocol features work entirely on requests, enabling dynamic source routing packet overhead to automatically quantify whatever is requested. It also refers to the differences in the currently in use routes. The protocol agrees with several routes to any target and requires each sender to pick and monitor the routes regarded while routing their packets.[2]
1. Route Discovery
Route Exploration is intentional when a source node needs a route to a node of destination. The source node initially inspects its path cache to determine whether it has previously contained a guide to the endpoint. When the source considers a reasonable route to the target, it uses this route to deliver its packets of data. When the node does not require a clear path to the destination, it can start a route discovery process by sending a Route request. A code covers the source along with the destination address and a different I‘d number. A node that exits in the middle path may find a Route request message to search its route cache for a sink direction. The message must propagate across the network before either the sink or an intermediate node hits the endpoint through a path. A Route Reply message is then generated, encompassing the correct hop
2. Route Maintenance
Route Management is used to handle road interruptions. If a node encounters a serious transmitting problem at its transport layer, it can eliminate the way out of its route cache and render a message for Route Error. A node obtains a notification from the Route Error, it confiscates the hop from its path cache in error. Acceptance messages are used to verify the exact mechanism of the connections to the path. If there is no built-in recognition function, the node conveying the message will freely call a DSR-specific program acknowledgment that will be returned by the next node next to the path. Figures 1.4 and 1.5 demonstrate the Route Request and Route Reply method for dynamic source routing Route Reply.[4]
Figure 1.4 Dynamic source routing Route Request
Figure 1.5 Dynamic source routing Route Reply
AD HOC ON-DEMAND DISTANCE VECTOR PROTOCOL
Ad Hoc On-Demand Distance Vector is known as one of the Mobile Ad Hoc Network routing protocols along with additional ad-hoc wireless networks. The Ad Hoc On-Demand Distance Vector protocol creates routes among nodes only if they are requested by source nodes. Accordingly, Ad Hoc On-Demand Distance Vector has discussed an on-demand protocol and generates no further contact traffic except connections. The roads are maintained where the members of the multicast community. Ad Hoc On-Demand Distance Vector uses an on-demand approach to discover routes, i.e. whenever a source code requires it to pass data packets as seen in Figure 1.6, a path is recognized. To know the current direction, it calls destination series numbers. Ad Hoc On-Demand Distance Vector performs traffic identification and maintenance of the route [5].
Figure 1.6: Route Discovery by Ad Hoc On-Demand Distance Vector
Figure 1.7: Ad Hoc On-Demand Distance Vector Protocol‟s Events
Ad Hoc On-Demand Distance Vector has subsequent events as presented in Figure 1.7. ► Hello ► Route request (RREQ) ► Route Reply (RREP) ► Route Error (RERR)
ZONE ROUTING PROTOCOL (ZRP)
One of the key problems is the construction of a routing protocol for ad-hoc networks. Since a node needs to remember at least the details accessible to its neighbors on behalf of deciding a packet path and managing the network topology due to regular signal
either be classified as constructive or reactive. Proactive protocols periodically seek to determine the routes inside the network. So that the path is already known and can be utilized automatically when a packet wishes to be dispatched. Hence, any route discovery technique should be used when a route is required.
Flexible routing has the benefit that all the routing knowledge is present in the routing list. If a route is required, the route is decided with little delay by the source with the aid of the routing chart. Route details cannot be provided at the time of the appropriate path insensitive protocols so it may often identify a path with a pause. The source initiates the on-demand path discovery method with a minimal quest expense and is the strongest routing approach. Hybrid routing is therefore a blend of reactive as well as constructive schemes. One example of this is the zone routing protocol. The source node searches the destination region in zone routing protocol; if a target is in the same country, then the constructive routing system uses the routing list, which is already installed in its memory, and automatically transfers the packets to the target. If the endpoint is outside the region, the target is identified by the reactive routing system. When this is known, it is modified in a routing table by the constructive routing system and it transfers the packet. Zone routing protocol is often used for reducing overhead power. Zone routing protocol is a composite protocol focused on the Global Positioning System with the special feature of operating together, both constructive and reactive elements. Zone routing protocol identifies a zone X for each nose which groups all nodes around the node X that are within a certain distance in hops, called zone radius. Nodes which are exactly region radius distance away from node X are called X field boundary nodes. A link-state protocol powered by a table enables every node to provide full topology details inside that region. If a node X needs to find a route to another node Y not in the same location, then on-demand basis it begins a route quest similar to flooding with the exception that it is limited to the station of the premises only. Route query records the reversal path on its way outside of X, and when the query enters the border node in the Y region the border node, transmits the response from the question through an installed path. Zone routing protocols will behave as a pure table powered or on-demand, or between the two, on the base of preference of zone size. Although this is an excellent choice for rendering network conditions by changing one parameter only, i.e. area radius [6].
The destination-sequenced distance vector is a table-driven or proactive routing protocol which needs the respective Mobile Node to communicate routing updates sometimes just to find the route within a Mobile Ad Hoc Network. Within a Mobile Ad Hoc Network, a mobile node acts or behaves as a router and therefore each mobile node maintains a routing table for each possible destination and the number of hops to each destination node. The packets are transmitted among the mobile node of a mobile ad hoc network by recognizing this routing chart, details of the mobile node. With this function, routing details will still be readily available independently of which node requires the information or not. The sequence number is linked to a node of destination and originates from the node of the sender. The sequence number is maintained by a route entry's destination node and is supplemented as the mobile node communicates or distributes its routing information. Each node that resides in the network uses the meaning of the sequence number to determine the freshness of the route knowledge found in a destination route update. Meanwhile, the interest is increased; a larger amount of sequences indicates the routing data is creative.[7] The loss of the connection may be detected by the medium access control (layer 2) which can be translated as infinity. The routing table changes are often transmitted throughout the network to keep the table stable. The changes are performed in a regular and activated manner to boost potentially big network traffic attributable to routing improvements. The periodic updating occurs at normal, fixed intervals; a node transmits the entire routing table in a packet called a complete dump. Incremental routing upgrade packets are used as critical topological change cases such as node stability, path breaks, and node power are caused. The incremental dump packets are used only to express the knowledge that has shifted as the last full dump. In the reduced overhead faced by the protocol, the activated tells with gradual dump packets impact. If a network becomes secure, intermittent changes are sent, so usually, a complete dump becomes uncommon. Complete dumps would be more popular in a fast-moving network, instead [8]. When a node receives the latest routing transmissions it contains the following criteria in a routing table: i) Target address server, ii) The present hop count to the target node, and iii) Top identified destination sequence number. to the node's compatible neighbors within a network. This process should be repeated before a copy of the upgrade packet has been given to all nodes in the network. If a node obtains a route entry with a higher sequence number for a different destination node, the old route entry is substituted with the newer path. The latest entry meanwhile is smaller or younger than the previous one. When a node obtains identical update packets or two update packets of the same series number, the node should consider the update packet with the shortest hop count and disregard the remainder. E.g. a node 'S' gets a route ad for destination node 'D' with the sequence number 'n' and metric' (shortest path) from the node 'I.' Subsequent processes will be identified by node S based on the circumstances. 1) Unless the importance of sequence number n is greater or newer than that of the source node in the main route insertion of node S, node S shall overwrite its current entry with the new route by node I. 2) Node S embraces a new route if the sequence number is similar but the metric m (shortest path) is better than the current route metric. 3) When node S has no path to destination node D then the current path is approved. Node S otherwise lacks current path ads.[9]
CLUSTER-BASED ROUTING PROTOCOLS
Control Based Routing Protocol is a routing protocol acceptable to hierarchical networks. Control Based Routing Protocol divides the nodes apart into different classes. A node leader is chosen to manage the nodes of a cluster and its cluster leaders. Routes are scanned and held at the cluster leader for intercluster contact, the procedure efficiently eliminates floods packets during the route quest phase, therefore the operation is swift. Control Based Routing Protocol also accepts unidirectional connections and enables such ties to interact within the same node and then another node.[10] Control Based Routing Protocol's two main assets are one for shortening the path and offering local repair. With the support of transmitting Hello messages, all properties are used by two-hop-topology knowledge received by each node. The technique of path shortening automatically shortens the path of a forwarded data packet and transmits the information on the best way. The local repair system immediately restores the source route down and prevents source route rediscovery. There are specific difficulties in hoc network owing, for example, to complex topology owing to node movement in a network, which pursues the need for certain routing protocols that can dynamically discover routes. The second problem could be that a handheld wireless ad-hoc network requires inadequate IP subnetting functionality as protocols participate disproportionately in flat network routing when opposed to the flexible network. The third problem in a mobile ad-hoc network, asymmetric links on the other hand, if a routing protocol relies only on bidirectional links, the network's size and bandwidth can be restricted; protocols that retain unidirectional links may dramatically decrease network partitions and increase routing efficiency.[11][12] Specific characteristics of Control Based Routing Protocol include: ► Dispersed service ► Minimized flood flow during complex path identification ► Special usage of unidirectional connections not otherwise allowed ► Local downlink repair without a method of rediscovery ► Suboptimal roads as they are known should be reduced. Control Based Routing Protocol Dynamic topology provides minimized overhead monitor updating. However, the overhead for maintaining up-to-date details on all cluster member nodes and intercluster routing information for each node to submit packets is substantial.[13][14].
CONCLUSION
Sensor network routing in recent years has attracted great attention and brought unparalleled challenges compared with traditional Wired Network Data routing. This paper summarizes the dynamic source routing, the Ad Hoc On-Demand Distance Vector and Zone Routing Protocols, the Destination-Sequenced Distance Vector, and the Cluster-Based Routing Protocol, Destination-Sequenced Distance Vector protocol. Also tested is the difference of these routing protocols. While their success in terms of energy consumption is encouraging, more work will be needed to tackle issues including service quality. The awareness of node stability is another important problem for routing protocols. The overhead of versatility and shift in topology in this energy-restricting setting includes the current routing algorithm. Since each environment has different routing requirements, further research is needed to handle these cases. Further research integration of sensor networks into wired networks (the Internet).
REFERENCES
1. Narsimha, V. B. (2011). Compare the Performance of the Two Prominent Routing Protocols for Mobile Ad-hoc Networks. Journal of Computer Applications (JCA), 4(4). 2. Sharma, R., & Sabharwal, S. (2013). Dynamic Source Routing Protocol (DSR). International Journal of Advanced Research in Computer Science and Software Engineering, 3(7). 3. Kumar, A., Selvarani, R., & Kumar, T. S. (Eds.). (2012). Proceedings of International Conference on Advances in Computing (Vol. 174). Springer Science & Business Media. 4. Johnson, D. B., Maltz, D. A., & Broch, J. (2001). DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc networking, 5, pp. 139-172. 5. Tie, T. H., Tan, C. E., & Lau, S. P. (2010, May). Alternate link maximum energy level ad hoc distance vector scheme for energy-efficient ad hoc networks routing. In Computer and Communication Engineering (ICCCE), 2010 International Conference on (pp. 1-6). IEEE. 6. Samba Essay, Zongkai Vang, Jianhua He (2004). ―A survey on the mobile ad-hoc wireless network.‖ Asian Network for Scientific Information, White paper[online] available at http:/whitepaper.zdnet.com/white paper.aspx?&docid=148894 & promo=10051. 7. Chiang, C. C., Wu, H. K., Liu, W., & Gerla, M. (1997, April). Routing in clustered multihop, mobile wireless networks with fading channel. In Proceedings of IEEE SICON (Vol. 97, No. 1997, pp. 197-211). 8. Aggarwal, A., Gandhi, S., & Chaubey, N. (2014). Performance analysis of AODV, DSDV, and DSR in MANETS. arXiv preprint arXiv:1402.2217. 9. Jane, Y. Y., Chong, P. H., & Zhang, M. (2008, September). Performance of efficient CBRP in mobile ad hoc networks (MANETS). In Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th (pp. 1-7). IEEE. 10. Shigei, N., Morishita, H., Miyajima, H., & Maeda, M. (2009). Residual Energy Based Clustering for Energy EfficientWireless Sensor Networks. In Intelligent Automation and
11. Liu, X. (2012). A survey on clustering routing protocols in wireless sensor networks. Sensors, 12(8), pp. 11113-11153. 12. Aggarwal, A., Gandhi, S., & Chaubey, N. (2014). Performance analysis of AODV, DSDV, and DSR in MANETS. arXiv preprint arXiv:1402.2217. 13. Zhou, B., Jin, H., & Zheng, R. (2014, September). A High-Speed Lossless Compression Algorithm Based on CPU and GPU Hybrid Platform. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on (pp. 693-698). IEEE. 14. Vijay, U., & Gupta, N. (2013, January). Clustering in WSN based on a minimum spanning tree using the divide and conquer approach. In Proceedings of World Academy of Science, Engineering and Technology (No. 79, p. 578). World Academy of Science, Engineering, and Technology (WASET).
Corresponding Author Shishir Ramkumar Rastogi*
Research Scholar, Mewar University, Chittorgarh, Rajasthan