An On-Demand Routing Protocol with Backtracking for Mobile Ad Hoc Networks† Hua-Wen Tsai1
Tzung-Shi Chen♣2
1
Department of Computer Science and Information Engineering National Cheng Kung University Tainan 701, Taiwan, ROC Tel: 886-6-2757575 ext. 62527 Fax: 886-6-2747076
[email protected]
Abstract A mobile ad hoc network (MANET) is characterized by multi-hop wireless links in the absence of cellular infrastructure and frequent host mobility. In this paper, a new on-demand routing protocol is proposed, named on-demand routing protocol with backtracking (ORB), for multi-hop mobile ad hoc networks. Suppose a source host wants to deliver a message to a destination in a MANET. First, the source host issues a request to search the destination. When a node receives the request packet, it gets a hop count value which can point the way to the source. This node broadcasts the request packet to its neighbors. When a destination receives this request, it issues a reply back to the source. We proposed a scoped flooding approach which is applied to reply information to the source. This approach will find out multi-path from a source to a destination. Every node in the MANET maintains some information for this source-destination pair in its own route table. Each node in the forwarding route uses this information to select a group of nodes, named checkpoint nodes, which may have multi-path maintained to that destination. The checkpoint node characteristic is such that a route can be recovered instantly without the need for extra control packets. When a delivering node is aware that the forwarding route is broken, it transmits an error packet back to the source along the return path. When a checkpoint receives the error packet that is backtracked to the source, it has backup paths to recover the broken route. This new route can be used immediately. The main advantage of our ORB is to reduce the flooding search time and cost when a route has been broken. We show that the proposed scheme outperforms the on-demand routing protocol existing in mobile ad hoc networks. Keywords: backup paths, mobile ad hoc networks, mobile computing, routing protocols, wireless networks.
1.
Introduction
A mobile ad hoc network is a self-organizing and dynamically reconfigurable wireless network without fixed infrastructure or central management. There are some constraints in this wireless network, such as a smaller radio † This work is supported by National Science Council under the grant NSC-92-2213-E-309-001, and by Ministry of Education under the grant 92-H-FA07-1-4, Learning Technology. ♣ Corresponding author
Chih-Ping Chu1 2
Department of Information Management Chang Jung University Tainan 711, Taiwan, ROC Tel: 886-6-2785123 ext. 2053 Fax: 886-6-2785657
[email protected]
propagation range, bandwidth limitations and battery power consumption. Routing in MANET is an important issue as it involves sending messages to a destination node in a network. Two nodes are neighbors in the network and can communicate directly when they are within transmission range of each other. Communication between nonneighboring nodes requires a multi-hop routing protocol. A packet is sent by the source host, that is retransmitted through several intermediate hosts before reaching at the destination host. Communication support design and development for distributed and collaborative applications on MANETs is the theme of this paper. Hosts move arbitrarily in MANET, causing the network topology to change frequently and unpredictably. Because of these characteristics, designing a routing protocol for MANET is more complicated than traditional wired networks. The motivation for this work stems from the challenges MANET poses for supporting reliable and efficient communication services for mobile computing. Many routing protocols have been proposed for ad hoc networks. In general, these routing protocols can be divided into two types, table-driven [8] and on-demand [1][2][3] [4][5][7][9]. Table-driven routing protocols attempt to maintain consistent, up-to-date routing information from each node to every other node in the network. These routing protocols require that each mobile host is to maintain one or more tables to store routing information. These protocols respond to change in network topology by propagating route updates throughout the network to maintain a consistent network view. A style of routing different from table-driven routing is on-demand routing. In the on-demand routing protocol, each node maintains a route for a source-destination pair, also named a session, without periodic route table update exchanges or full network topological views. On-demand routing protocols build and maintain only the routes needed to reduce the routing maintenance overhead. When a source node requests a route to transmit messages to a destination node, it initiates a route discovery process within the network. This process is completed once the route is found or all possible route permutations have been examined. Once the route has been discovered and established, it is maintained until the desti-
nation becomes inaccessible along every path from the source or the route is no longer desired. All of these protocols use a flood search to create routes to destinations. AODV [9] combines the use of destination sequence numbers in DSDV [8] with the on-demand route discovery technique in DSR [3] to formulate a loop-free, on-demand, single path, distance vector protocol. Unlike DSR, which uses source routing, AODV is based on hop-by-hop routing approach. Ad hoc on-demand multi-path distance vector (AOMDV) [5] is extension to AODV. AOMDV computes “multiple loop-free and link-disjoint paths”. The notion of an “advertised hopcount” is used to maintain multiple loop-free paths. A particular property of flooding is used to ensure link-disjointness of the multiple paths computed within a single route discovery. When a destination fails or becomes unreachable from a network component, the source attempts to use floodingsearch to obtain other paths to the destination. This method is used in some of today’s on-demand protocols. The flooding-search process produces too many control packets and obstructs the wireless network channel. An efficient on-demand routing protocol, called on-demand routing with backtracking (ORB) is presented in this work for ad hoc networks. Our objective is to develop an on-demand, backup path protocol to avoid using flooding-search to reconstruct routing. When a source attempts to deliver a message to a destination, the source host issues a request to search for all probable paths to that destination. Each node in the MANET maintains a hop-count and neighbors link-state for a session in its own route table. The node hop-count value is the distance from the source to this node and it points the way return to the source. The neighbor link-state determines if the node can forward the message to the destination through the neighbor or not. If a node has two forwarding paths to the destination, it will be a checkpoint node. Possessing backup paths to deliver data messages to destinations is the characteristic of the checkpoint node. A checkpoint node can reconstruct a route if delivery route link failure occurs. Our ORB can effectively reduce the frequency of route reconstruction and the number of control messages required for the source to re-initiate a route. The rest of this paper is organized as follows. In Section 2, the preliminaries for the MANET OBR protocol are introduced. Section 3 presents the ORB protocol. Section 4 shows the experimental results. The conclusions from this work are presented in Section 5.
networks, a new route discovery is needed in response to every broken route. Each route discovery is associated with high overhead and latency. The ORB protocol contains a method that establishes multi-path to the destination. The nodes in the main route use this information to select a group of nodes, called checkpoint nodes, which have backup routes to the destination. When a node in the forwarding route becomes aware that the next hop in the forwarding route cannot be made, it sends an error message to the source. When a checkpoint node in the return path receives this error message backtracked to the source, it immediately delivers a data message to a backup route. A backup route from the checkpoint node to the destination is then substituted for the broken route. The proposed ORB method can effectively reduce the route discovery frequency and discovery cost. We assumed that S is the source and D is the destination for a session in this paper. In Figure 1 S has a forwarding route (path 1) with two checkpoint nodes, CP1 (node A) and CP2 (node B), to D. In MANET, each mobile host is free to move, causing the network topology may be changed frequently. The topology of the local network between nodes B and D has changed. The forwarding route (path 1) has therefore failed. When a node in the forwarding route detects link failure and cannot deliver a message to the destination, it sends an error message back to the source. This error message is delivered back to the source along the reverse route path. When an intermediate node, which is a checkpoint node in return route, receives this error message, it can recover the route and retransmit the data message to D. The characteristic of a checkpoint node is that it has backup paths maintained to the destination node and can immediately to recover the broken routes. Therefore, the source can reduce the number of rediscover routes and the number of discovery packets in MANET. Every node is assumed to have a buffer space for storing data messages for a period of time. B (CP2) has a backup path and reconstructs route path 2 to D. When B received the error message, it retransmits the data message to D along the backup path, S would then use route path 2 to transmit data messages. 2 B
S
CP1 A
1 D
L ocal N etw ork
2.
Preliminaries
The backtracking routing concept is introduced in this section. The main idea in ORB is to recover a route when an error message backtracks to the source. This method is designed primarily for highly dynamic ad hoc networks in which link failures and route breaks occur frequently. When a single path on-demand routing protocol is used in such
Figure 1: Overview of ORB.
3. On-Demand Routing Protocol with Backtracking Three phases are used in our ORB protocol. The first phase is the route discovery phase. The first phase has a route request and route reply process. After the source im-
3.1.1. Route Request We assumed that N is a node in MANET, N’s neighbor Ni is recorded in N’s route table, where 1≤i≤k, k is the number of N’s neighbors. HCN is the hop-count value for N and represents the hop distance from the source to N. HCN is the minimum distance from the node N to the source. LS NN i is defined the link-state between in node N and N’s neighbor Ni. LSN is the highest priority value from LS NN i 1≤i≤k. N computes LS NN i based on three different values recorded in N’s route table, HCN, HC N and LS N . Therei i fore N obtains k link-states ( LS NN i 1≤i≤k) due to k neighbors Ni and N sets the link-state LSN value from LS N 1≤i≤k with the highest priority value. represent the route sequence from S1 to Sk. When a route is requested but no information to D is known, S floods route request packet (RREQ) to discover a route. We assumed that a node F forwards the RREQ to its neighbors. The RREQ format is RREQ(SIP, DIP, FIP, HCF), where SIP is the IP address of S. DIP is the IP address of D. FIP is the IP address of F. HCF is the hop-count for F. This value is the hop distance from F to S. When S initially broadcasts RREQ, HCF is set to 0. In the proposed ORB protocol, each node N builds a route table RTN(Node, Hop-Count, Link-State) for a session. The “Node” field is recorded neighbor Ni. The “Hop-Count” and the “Link-State” fields are recorded HC N and LS NN i , respeci tively. If the route table entry is not refreshed within a given period of time, it is deleted. When N receives a non-duplicate RREQ broadcast from its neighbor Ni, it builds a route entry for the pair and records the previous nodes Ni IP and HC N i to this route entry. N then computes HCN on the basis of HC N and records it into the route table. The HCN value i is equal to that for the previous node plus 1, i.e., HCN= HC N +1. This previous node information is needed i later to reply to the route reply packet (RREP). The N’s IP and HCN replaced with the original FIP and HCF of RREQ. N then broadcasts the RREQ to its neighbor nodes. If N receives a duplicate RREQ, it records the FIP and HCN of i the RREQ into the route entry for the pair and then discards the RREQ. If HC N +1 is lower than the i original HCN, HC N +1 is replaced by HCN and recorded in i the route table. After RREQ flooded, every node N obtains a HCN for S
i
R outing T able N ode H C L S N H C N L SN N 0 H C N LS NN 0
N ode H C L S B 2 A 1 C 3 R R E Q (S ,D ,B ,2)
C
...
0
...
3.1. Route Discovery Phase
and knows its neighbor’s hop-count in the route table as shown in Figure 2 (a). The distance from node A to node S is one hop, i.e., HCA=1. After the RREQ is flooded, every node records its own and its neighbor’s hop-count values in the hop-count entry of the route table. When a node N wants to reply a packet to the source, it sends the packet to its previous node Np. The previous node is select from N’s table and HC N < HC N . Figure 2(b) is shown the reply path for every node.
...
plements the first phase, all probable routes are built from the source to the destination. The message delivery phase is the second phase. After the route has been established, the source delivers data messages to the destination. The third phase is the path maintenance phase. In the proposed ORB protocol, a group of nodes, called checkpoint nodes, are used to recover the broken forwarding routes. The checkpoint node selection is based on the node has multi-path or not. When a node detects its neighbors have changed, it deletes the related information from route table in link pruning phase.
N ode H C C 3 B 2 E 4
N k H C N k LS
E
R R E Q (S ,D ,A ,1)
A
S R R E Q (S ,D ,S ,0) N ode H C S 0 1 A
LS
D R R E Q (S ,D ,A ,1)
N ode H C 1 A B 2 D S 0
LS
H C C =3
R R E Q (S ,D ,C ,3)
B
Nk N
LS
N ode H C E 4 C 3 D
H C E =4
B
E
R R E Q (S ,D ,E ,4) N ode H C 2 D 1 A 4 E
C
H C B =2 LS
LS
S
A
D
H C S =0
H C A =1
H C D =2
R eturn Path (a)
(b)
Figure 2: An example of the request phase.
3.1.2. Route Reply In the ORB, the link-state value indicates if the source can deliver the data messages to the destination via N. Every node sets a link-state value for a neighbor. A node can determine the forwarding path to destination using the link-state. Every node N sets HCN in the discovery request phase. Node N then sets LSN on the basis of HCN, the hop-count value and the link-state for its neighbors. The link-state value is set in the route discovery reply phase. The link-state LS NN has four respective state values, defined below with the different priorities 3, 2, 1, and 0 from high to low. 0: indicates the initial state or unknown state. 1: the farther this path is from N to the destination via Ni. N forwards the message to Ni that has the greater the hop-count. 2: the farther path is from N to destination via Ni. N forwards the message to Ni that has the smaller the hop-count. 3: the shortest path is from N to the destination via Ni. i
When D receives the RREQ, it begins to execute the route reply process. D replies with a route reply packet (RREP) back to S via all probable paths. We assumed that a node F forwards the RREP to its neighbors. The RREP format is RREP(SIP, DIP, FIP, HCF, LSF), where SIP is the IP address of S. DIP is the IP address of D. FIP is the IP address of F. HCF is the hop-count of F. LSF is the link-state of F is the highest priority value from LSFFi 1≤i≤k. When a node N broadcasts a RREP, all neighbor nodes Ni should receive this packet compute LS NN . We propose a state transition function (STF) to compute the link-state. The STF is shown in Figure 3. The STF defines how node N computes LS NN i . We assumed that node R receives the RREP packet broadcast from neighbor F. A node R receives RREP and records F as the neighbor node in the “Node” field, HCF in the “Hop-Count” field and LSF in the “Link-State” field. This information is needed later to dei
liver the data messages to the destination and compute LSRF . If LSRF > LSR , then LSR = LS RF . If LSR>0 and R never broadcast this RREP before, the IP of R, HCR and LSR are replaced the original FIP, HCF and LSF for the RREP. R then broadcasts RREP to its neighbors. If LSR=0, R stops to broadcast RREP to its neighbors. RREP is a scope flood from the destination to the source. This process is reiterated until S receives the RREP. (STF1) 2, if LS i = 3 and HC N ≥ HC N i and N i = D 3, if LS = 3 and HC < HC (STF2) i N Ni = > ≠ (STF3) 2, if 2 and and LS HC HC N D i N Ni i LS NN i = (STF4) 1, if LSi = 2 and HC N < HC N i and N i ≠ D 1, if LSi = 1 and HC N < HC N and N i ≠ D (STF5) i (STF6) 0 , other cases Figure 3: State Transition Function (STF).
...
...
...
N ode H C LS N H C N L SN N 0 H C N 0 LS NN 0 N k H C N LSNN k
LS 1 B 2 0 A 1 C 3 1 R R E P (S ,D ,C ,3,1)
k
C
N ode H C C 3 B 2 E 4
B E
R R E Q (S ,D ,B ,2,1)
A
S R R E Q (S ,D ,A ,1,3) N ode H C S 0 1 A
LS 3 3
D LS 3 1 3 0
LS BC = 1
N ode H C E 4 3 C 2 D
LS 2 0 2
R R E P (S ,D ,D ,2,3)
R R E P(S ,D ,D ,2,3)
N ode H C 1 A B 2 2 D S 0
LS 1 0 1
R R E P (S ,D ,E ,4,2)
N ode H C D 2 1 A E 4
(a)
LS 3 0 0
C
LSCE = 1
B E LS AB = 1
LSED = 2
A
S LS SA = 3
3.3. Path Maintenance Phase 3.3.1. Checkpoint Selection
Figure 4(a) is shown an example of the reply phase. D broadcasts a RREP to its neighbors. Nodes A and E receiver the RREP, and they record HCD in their route table and compute link-state LS AD = 3 and LS ED = 2 , respective. Because LS AD = 3 and LS ED = 2 , nodes A and E broadcast RREP to their neighbors. If node N sets LS N = 0 or has forwarded the RREP before, it stops to broadcast the RREP. This process is reiterated until S receives the RREP. R outing T able N ode H C
detects whether NN is in its radio range or not. This detecting action is RTS-CTS in the MAC layer. If NN is in N’s radio range, N delivers MP to NN. After NN receives MP delivered from N, it determines if it is D or not. If NN is D for the pair, the delivery process is completed. If NN is not D, NN would act as N and reiterate the message delivery process. If NN is not in N’s radio range, N first determines if it was a checkpoint or not. The checkpoint selection is described in Section 3.3.1. If it is, it can find a backup path to D. If it is not a checkpoint, it replies with an ERRP to NP. The nodes in the return route reiterate this process until ERRP reaches the checkpoint node or S. If S receives ERRP and it is not a checkpoint node, S rediscovers the destination node using the route discovery phase.
D LS AD = 3
Forw arding path (b)
Figure 4: An example of routing reply phase.
3.2. Message delivery phase When S receives the RREP, the routing has established. S can deliver the data message to D along forwarding path. We assumed that node N is a node in the forwarding route. Node NN is the next node of N in the forwarding route. Node NP is the next node of N in the return route. MP is a message packet. RREP is an error packet. The MP and ERRP formats are MP(SIP, DIP, RIP, FIP, Data) and ERRP(SIP, DIP, RIP, FIP), where node F broadcasts the packet to its neighbors. SIP is the IP address of S. DIP is the IP address of D. RIP is the IP address of R that receives the packet. FIP is the IP address of F that forwards the packet. Data is the payload data. We assumed that S begins to deliver a MP to D along the forwarding route. When S delivers a MP, it is regarded as node N. N selects a node NN that has the highest priority value from LS NN i 1≤i≤k in route table. The message always is forwarded using shortest path to the destination. N first
The essential checkpoint feature is that it can deliver a message along backup paths to the destination node when forwarding route is broken. When a node in the forwarding route detects a broken route, it replies with an error message that backtracks to the checkpoint node. The checkpoint node then uses another path that can recover the route to the destination. The checkpoints are selected from the forwarding path route. If a node has two or more then two forwarding routes, it is a checkpoint node. In Figure 4(a), node A is a checkpoint node. Node A is in forwarding path and has two forwarding path LS AB = 1 and LS AD = 3 . Node A has two forwarding path, so it determines it is a checkpoint node. Node A can deliver a message along a backup path to D. The backup path is . 3.3.2. Link Pruning phase When the local connectivity of a mobile node is involved, each mobile node can detect the other nodes in its neighborhood via a local broadcast technique using a beacon packet. The route tables of the nodes within the neighborhood are organized to optimize the response time to local movements and provide a quick response time for requests for the establishment of new routes. In the ORB protocol, every node periodically broadcasts a beacon packet to detect its neighbor nodes. When a neighbor node receives a beacon packet from N, it refreshes the N’s route table entry. If the route table entry is not refreshed within a given period of time, it is deleted. If a node N detects its neighbor not in its radio range. N broadcasts a RPRU packet to prune break path. The PRUP format is RPRU(SIP, DIP), where SIP is the IP address of S. DIP is the IP address of D. When a next node NN in forwarding route receives a RPRU packet from N, NN deletes the route table entry of N. If NN has other return paths in its route table, it stops to broadcast the RPRU to its neighbor. If NN has not any return path, it deletes all routing entries for pair and broadcasts RPRU to its neighbors. When a previous node NP in the return path receives a RPRU packet from N, NP deletes the route table entry of N.
If NP has other forwarding paths in its route table, it stops to broadcast the RPRU to its neighbor. If NP has not any forwarding path, it deletes all routing entries for pair and broadcasts RPRU to its neighbors. An example of link pruning phase is shown in Figure 5. When node B cannot detect node C, B broadcasts a RPRU to its neighbors. B has no any forwarding path, so it deletes all routing entries for pair. When node A receives this RPRU, it deletes the routing entry of node B. Node A stops to broadcast the RPRU, because it has another forwarding path in its route table. When node C cannot detect node B, it broadcasts a RPRU to its neighbors. C has no any return path, so it deletes all routing entries for pair. When node E receives this RPRU, it deletes the routing entry of node C. Node E also has no any return path, it broadcasts a RPRU to its neighbors and deletes all routing entries for pair. When node D receives the RPRU, it deletes the routing entry of node E.
N k H C N LSNN k
C
B k
R PR U (S ,D )
S N ode H C S 0 1 A
LS 1 0 1
C
R PR U (S ,D )
...
...
...
N ode H C L S N H C N L SN N 0 H C N 0 LS NN 0
N ode H C C 3 B 2 E 4
LS 3 3
A N ode H C 1 A B 2 2 D 0 S
D LS 3 1 3 0
LSCE = 1
LS BC = 1
N ode H C E 4 E C 3 2 D R PR U (S ,D )
LS 2 0 2
N ode H C D 2 1 A E 4
LS 3 0 0
B E LS = 1 B A
A
S
(a)
LS ED = 2
LS SA = 3
D
We evaluate three key performance metrics: (i) Packet delivery ratio: ratio of data packets delivered to the destination to those generated by the source; or a related metric received throughput in Kb/sec received at destination. (ii) Route discovery frequency: the total number of route discoveries initiated per second. (iii) Normalized routing load: the total number of routing packets transmitted for each delivered data packet. Each hop-wise transmission of these packets is counted as one transmission. (iv) Control packet overhead: the control packets are needed to establish route from the source to the destination. The control packets include RREQ, RREP and ERRP.
4.3. Results and Analysis The average packet delivery ratio is shown in Figure 6, our ORB has higher packet delivery ratio then other two protocols at any model mobility, especially exhibited higher performance at higher speed. Because ORB has multi-path to recover broken path and can backtrack to search other backup path, ORB lost fewer packets than AODV and AOMDV: 12.50%, 23.24%, respectively. Our ORB provides efficient fault tolerance in the sense of faster and efficient recovery from route failures in dynamic networks.
LS AD = 3
Forw arding path (b)
Figure 5: An example of link pruning phase.
4. Experimental results 4.1. Simulation Environment A simulator was designed and implemented as an experimental platform. The main part of this simulator is a discrete event-driven engine designed to simulate systems that can be modeled using processes communicating through signals. We built a simulation platform to perform the routing operations in a MANET. Three routing protocols, AODV, AOMDV and our ORB were implemented. Our simulation modeled a network of 100 mobile hosts placed randomly within a 1000 meter × 1000 meter area. The radio propagation range of each node was 200 meters and the channel capacity was 2Mb/s. Each run was executed for 500 seconds of simulation time. There were thirty data sessions, each with a traffic rate of four to eight packets per second. The size of data payload was 512 bytes and 8 packets per second. The random waypoint model [1] was used to model mobility. Here, each node started its journey from a random location to a random destination at a randomly chosen speed (uniformly distributed between 0 and max. speed). Once the destination was reached, another destination was targeted instantly. The maximum speed was set from 10 to 90 Km/hr.
1
ORB AODV AOMDV
0.9
Packet delivery ratio
N ode H C L S B 2 1→0 0 A 1 1 C 3
R outing T able
4.2. Performance metrics
0.8 0.7 0.6 0.5 0.4 10
20
30
40
50
60
70
80
90
Speed(km/hr)
Figure 6: Packet delivery ratio.
Figure 7 shows the discovery frequency performance. The ORB needed less discovery times to maintain routes for sessions. The AODV is a simple path routing protocol, so the source must broadcasts a lot of discovery packet to recover the broken path. The AOMDV is a multi-path routing protocol, but the AOMDV has fewer multi-paths then our ORB. The AOMDV cannot backtrack to search other backup path, so the AOMDV also has more discovery time then our ORB. Figure 8 shows the normalized route load performance. The ORB was better than other protocols. The ORB used fewer control packets to maintain routes, and had better packet delivery ratio. From the simulation results our ORB can efficient to reduce the traffic load to system. Figure 9 shows the amount of all control packets. The ORB has fewer discovery times, so it needs fewer RREQ
then others. Our ORB uses a scoped flooding approach, so the amount of RREP fewer then the AOMDV. The AODV only needs fewer RREP to reply, because it is a simple routing protocol. The AOMDV needs much RREP to find out possible path, because RREP is flooded to MANET. Our ORB is using ERRP to backtrack and recover the broken path, so it needs more ERRP then the AOMDV.
Route discovery frequency
12000 10000
ORB AODV AOMDV
8000 6000 4000 2000
References
0 10
20
30
40
50
60
70
80
90
Speed (km/hr)
Figure 7: Route discovery frequency. 20
Normalized routine load
18 16 14 12
ORB AODV AOMDV
10 8 6 4 2 0 10
20
30
40
50
60
Speed (km/hr)
70
80
90
Figure 8: Normalized routing load. ORB-RREQ AODV-RREQ AOMDV-ERRQ ORB-RREP AODV-RREP AOMDV-RREP ORB-ERRP AODV-ERRP AOMDV-ERRP
Packet overhead (thousand packet)
1000
100
10
1
Control packet
Figure 9: Control packet overhead.
5.
possible paths and checkpoint nodes are found in the reply phase. The checkpoint has backup paths to the destination, and each node in the forwarding route can reply to an error packet backtrack route to find a checkpoint when the route is broken. The ORB effectively decreases the number of rediscovery times and cost. The number of flooded control packets is a main issue that obstructs the network. The proposed ORB protocol could search for more routes to the destination, and reduce the number of rediscovery times and control the number of packets flooded into the MANET. The ORB protocol is an easy algorithm that uses less control packet cost to maintain routes and record local route information in route tables. The proposed protocol uses a simple algorithm to maintain route information and obtains better performance than the AODV and AOMDV form the experimental results.
Conclusions
An on-demand, multi-path, backtrack routing protocol was proposed in this paper. A scoped routing reply phase flooding approach is proposed in our ORB protocol. All
[1] J. Broch, D. Maltz, D. Johnson, Y.-C. Hu, and J. Jetcheva, “A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols,” in Proceedings of the Fourth Annual International Conference on Mobile Computing and Networking (MobiCom'98), ACM, Dallas, TX, pp. 56-67, Oct. 1998. [2] S. Guo and O. W. Yang, “Performance of Backup Source Routing in Mobile Ad Hoc Networks,” in Proceedings of the 2002 IEEE Wireless Communications and Networking Conference, Orlando, FL, USA, pp.440-444, Mar. 2002. [3] D. B. Johnson, D. A. Maltz, and Josh Broch. “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks,” in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139-172, Addison-Wesley, 2001. [4] S.-J. Lee and M. Gerla, “AODV-BR: Backup Routing in Ad hoc Networks,” in Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, Vol.3, pp.1311-1316, Chicago, IL, Sep. 2000. [5] M. K. Marina and S. R. Das, “On-demand Multipath Distance Vector Routing in Ad Hoc Networks,” in Proceedings of the 2001 IEEE International Conference on Network Protocols, pp. 14-23, Riverside, California, 2001. [6] A. Nasipuri, R. Castaneda, and S. R. Das, “Performance of Multipath Routing for On-demand Protocols in Mobile Ad Hoc Networks,” in ACM/Kluwer Mobile Networks and Applications (MONET) Journal, Vol. 6, No. 4, pp. 339-349, 2001. [7] V. D. Park and M. S. Corson, “A Performance Comparison of the Temporally-Ordered Routing Algorithm and Ideal Link-State Routing,” in Proceedings of IEEE Symposium on Computers and Communication '98, Athens, Greece, pp.592-598, Jun. 1998. [8] C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance Vector Routing (DSDV) for Mobile Computers,” in Proceedings of ACM SIGCOMM’94, London, UK, pp. 234-244, September 1994. [9] C. E. Perkins and E. M. Royer, “Ad-Hoc On-Demand Distance Vector Routing,” in Proceedings of 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, Louisiana, USA, pp. 90-100, Feb. 1999.