A Review and Comparison of Reliable Unicast Routing Protocols For Mobile Ad Hoc Networks
A Review and Comparison of Reliable Unicast Routing Protocols For Mobile Ad Hoc Networks
A Review and Comparison of Reliable Unicast Routing Protocols For Mobile Ad Hoc Networks
1, January 2009
Wireless Routing Research Group, Department of Computer and Communication Systems Engineering
Faculty of Engineering, University Putra Malaysia, 43400 Serdang, Selangor, Malaysia
Key words:
Reliable routing protocols, Unicast routing, Mobile Ad-hoc
Networks.
1. Introduction
Fig. 1 Classification of MANET routing protocols
The mobile ad hoc network (MANET) allows a more
flexible communication model than traditional wire line Proactive Routing Protocols: A proactive routing protocol
networks since the user is not limited to a fixed physical is also called "table-driven" routing protocol. Using a
location [1]. It is a new special network that does not have proactive routing protocol, nodes in a mobile ad hoc
any fixed wired communication infrastructure or other network continuously evaluate routes to all reachable
network equipments. With no pre-existing fixed nodes and attempt to maintain consistent, up-to-date
infrastructure, MANETs are gaining increasing popularity routing information. Therefore, a source node can get a
because of their ease of deployment and usability anytime routing path immediately if it needs one. When a network
and anywhere. So they are viewed as suitable systems topology change occurs, respective updates must be
which can support some specific applications as virtual propagated throughout the network to notify the change.
classrooms, military communications, emergency search So if we noted to network topology changes in MANETs,
and rescue operations, data acquisition in hostile the control overhead to maintain up-to-date network
environments, communications set up in Exhibitions, topology information is relatively high. Wireless Routing
conferences and meetings, in battle field among soldiers to Protocol (WRP) [3], the Destination Sequence Distance
coordinate defence or attack, at airport terminals for Vector (DSDV) [4] and the Fisheye State Routing (FSR)
workers to share files etc. [5] are all proactive routing protocols.
Host mobility can cause unpredictable network topology Reactive Routing Protocols: Reactive routing protocols for
changes in MANETs. Hence, a highly adaptive routing mobile ad hoc networks are also called "on-demand"
scheme to deal with the dynamic topology is required. routing protocols. In a reactive routing protocol, routing
Many unicast routing protocols have been proposed for paths are searched only when needed. When a source node
MANETs to achieve efficient routing [2]. wants to send packets to the destination but no route is
available, it initiates a route discovery operation. In the route is generally not involved as a requirement for its
route discovery operation, the source broadcasts route selection. Consequently, route breakups will frequently
request (RREQ) packet. When the destination or a node occur, induced by nodal mobility and/ or nodal and link
that has a route to the destination receives the RREQ failures as well as by fluctuations in the communications
packet, a route reply (RREP) packet is created and transport quality experienced across the network’s
forwarded back to the source. Each node usually uses hello communications links. The latter are caused by signal
messages to notify its existence to its neighbours. interferences, fading and multi-path phenomena and other
Therefore, the link status to the next hop in an active route causes producing ambient and environmental noise and
can be monitored. When a node discovers a link signal interference processes. On the other hands, route
disconnection, it broadcasts a route error (RERR) packet to breakups lead the frequent operation of rebuilding routes
its neighbours, which in turn propagates the RERR packet that consume lots of the network resources and the energy
towards nodes whose routes may be affected by the of nodes.
disconnected link. Then, the affected source can re-initiate Many efforts have been made to design reliable routing
a route discovery operation if the route is still needed. protocols that enhance network stability. In this paper, we
Compared to the proactive routing protocols, less control review and compare some recent published reliable unicast
overhead is a distinct advantage of the reactive routing routing protocols. This paper has organized as following;
protocols. Thus, reactive routing protocols have better in section 2, some reliable routing protocols are described
scalability than proactive routing protocols. However, briefly. Section 3 presents the comparisons on the
when using reactive routing protocols, source nodes may reviewed protocols, and finally conclusion of paper comes
suffer from long delays for route searching before they can in section 4 as well.
forward data packets. Hence these protocols are not
suitable for real –time applications. The Dynamic Source
Routing (DSR) [6] and Ad hoc On-demand Distance 2. MANET Reliable unicast routing protocols
Vector routing (AODV) [7] are examples for reactive
routing protocols. 2.1 Energy Aware Reliable Routing (EARR)
Hierarchical Routing Protocols: Typically, when wireless
network size increase (beyond certain thresholds), current EARR is a cross-layer reactive routing protocol that
“flat” routing schemes become infeasible because of link reduces the route-reconstructions due to residual energy
and processing overhead. One way to solve this problem shortages [14].
and to produce scalable and efficient solutions is It is assumed that all nodes in EARR are equipped with a
hierarchical routing. Wireless hierarchical routing is based residual energy detection device and some energy
on the idea of organizing nodes in groups and then consumption model is offered for each node to estimate
assigning nodes different functionalities inside and outside whether its remaining battery capacity is sufficient to relay
of a group. The Zone Routing Protocol (ZRP) [8], Zone- the traffic. Also the traffic load from application layer is
based Hierarchical Link State routing (ZHLS) [9] and carried in the RREQ packet. In this protocol, only nodes
Hybrid Ad hoc Routing Protocol (HARP) [10] are with sufficient residual energy to complete the task will
examples for hybrid routing protocols. take part in the propagation of RREQ packet.
Position Based Routing Protocols : The advances in the Finally after all RREP packets received, source node pick
development of Global Positioning System (GPS) the optimum path with maximal bottleneck energy to route
nowadays make it possible to provide location information data packets. (Bottleneck energy refers to the minimal
with a precision in the order of a few meters. They also residual energy of all nodes along one path)
provide universal timing. While location information can In EARR, when a source node wants to send packets, if it
be used for directional routing in distributed ad hoc has already kept at least one route to the destination, then
systems, the universal clock can provide global for each path it will check whether each node on the path
synchronizing among GPS equipped nodes. In position has sufficient residual energy to complete the forwarding
based routing protocols, instead of using routing tables and task. Only when all nodes on the path have enough battery
network addresses, the routing decisions are made on the the path can be thought as valid one. Like the previous
basis of the current position of the source and the state, if several paths are valid, the one with maximal
destination nodes. Location Aided Routing (LAR) [11] bottleneck energy is chosen to transmit data packets.
and Distance Routing Effect Algorithm for Mobility Both periodical information exchange and error report are
(DREAM) [12] are typical position based routing used in EARR to maintain routes, as in many conventional
protocols proposed for mobile ad hoc networks. According reactive routing protocols. The only difference lies in that
to several experimental works, routing schemes that use when nodes exchange information with neighbours, not
positional information scale well [13]. only address information but also current residual energy
In all of the unicast routing protocols, the robustness of the info are carried by hello messages, so that each node is
188 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009
able to obtain the most up-to-date energy information of amount of time to receive other RREQ packets. Then node
neighbours. D computes the weight value using the weight function.
Afterwards, node D selects the path with the maximum
weight value as the primary routing path among all
2.2 Stable Weight-based On-demand Routing feasible paths. Finally, node D sends a RREP packet to
Protocol (SWORP) source node S along the primary routing path.
Another form of this protocol (SWORP-BR) also is
SWORP is a reactive routing protocol that uses the weight- proposed for selecting alternative paths. When a link
based route strategy to select a stable route in order to failure occurs, the alternative path selection algorithm is
improve routing quality in MANETs. The basic idea is to triggered. The method is to overhear RREP packets
select a stable routing path to reduce the routing overhead transmitted by a neighbouring node. It records this
and packet loss [15]. neighbouring node as a next hop to the destination node in
The weight of a route is decided by three factors: the its alternate route table. For example, Figure 2 shows the
Route Expiration Time (RET), the Error Count (EC), and process of constructing the primary and alternate routes.
the Hop Count (HC).
The RET is the minimum Link Expiration Time (LET) for
a feasible path. The LET can be obtained by using the
principle that two neighbours in motion will be able to
predict future disconnection time. Such a prediction can be
accomplished by the following method.
The motion parameters of two neighbouring nodes can be
obtained by using the Global Positioning System (GPS). A
free space propagation model is assumed which signal
strength solely depends on the distance to the transmitter.
Also it is considered that all nodes have their clocks
synchronized using the GPS clock. On the other hand, by
considering the motion parameters of two nodes, the
duration of time which these two nodes remain connected
can be calculated. The speed and heading of a mobile node
can be obtained from the mobile node’s own instruments
and sensors (e.g., compass, odometer, speed sensors).
When each node sends a RREQ packet, the packet
appends its location, direction, and speed. So, the next hop
of the node that receives the RREQ packet can predict the
link expiration time between itself and the previous node.
The EC is the maximum node error count for a feasible
path. The error count is used to indicate the number of
link failures caused by a mobile node.
The SWORP effectively combines all the three parameters
in a weight function with weighing factors C1, C2, and C3,
the values of which can be chosen according to the system
requirements. As an illustration, route expiration time is
very important in MANETs. Thus, the weight of that
factor can be made larger. The flexibility of changing the
factors helps in using this algorithm to select a optimum
routing path. A larger route expiration time represents
higher reliability, as do a lower error count and lower hop
count.
In the route discovery process source node S broadcasts a
RREQ packet to its neighbouring nodes. If the node is
within the transmission radius, it forwards the RREQ
packet to its own neighbouring nodes and adds its ID, the
route expiration time, the error count, and the hop count of
the RREQ packet to the packet entry. When destination
node D receives a RREQ packet, it waits for a certain
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 189
Fig. 2 Multiple route construction of stable weight-based on-demand service determines how routing between two nodes of the
routing protocol with backup routes (SWORP-BR): (a) destination node
D sends a route reply (RREP), (b) node L forwards the RREP, (c) the
network is performed, based on the information provided
primary route and alternate routes are established and (d) the data packet by the first service (MCS) and the software components of
is transmitted via an alternate route when the primary route is the available routing protocols. It is called the strategy
disconnected. selection service (SSS). The third service is the actual
routing service offered to the other software agents
With the proposed method, when the RREQ packet running in the mobile node, and ‘‘looks’’ like a routing
reaches the destination node D, the primary route (S, A, C, protocol. It is called the routing service (RS).
F, I, L, D) is selected. Then destination node D sends a For a graphical representation of the interconnection of the
RREP to node L. At this time, nodes Y and Z that are three services (MCS, SSS, and RS) with the lower (MAC)
within the transmission range of node D overhear the and higher (Network) layers, as well as the routing
RREP packet and insert an entry into their alternate route protocols (see Fig. 3).
table. This process is shown in Figure 2.a. Similar
processes are executed at the next hops backwards until
the RREP packet reaches the source node S. Figure 2.c
shows the state when the RREP reaches the source node S.
The protocol then builds the primary and the alternate
routes. Figure 2.d illustrates the use of an alternate path
when the primary route gets disconnected. Node i move
out of the transmission range of its neighbouring node L. It
cannot transmit data from node F to node L. Therefore,
node I must broadcast the packet to its neighbouring nodes
to salvage the data. When node W receives the packet, it
looks up its alternative route table and finds node L as its
next hop toward the destination node D. Then node W
unicast the packet to node L and builds the new connection.
initiated, and when the newly discovered LLRs are done through the use of a normalized cumulative path
returned, the old LLRs can be replaced. reliability factor that is calculated by the destination.
Link lifetime can be estimated through the link break In this protocol, the source node sends the RREQ packet
probability (probability that a link is broken at time t) which is similar to other reactive routing protocols but
given an estimation rule, such as from now to when the contains the following different fields: (1) RMIN: The
link break probability is higher than a certain threshold. minimum value for the reliability factor required in the
The quality of a link can be thus quantified using this path from source to destination. (2) RCUM: The
estimated link lifetime. Using this quantified link lifetime cumulative reliability factor of the path that is being
estimations, the route lifetime is simply the minimum discovered. (3) NH: It contains a list of the next hop host
lifetime of the n links. candidates that satisfy the reliability requirements for the
The main procedure of DLLR is similar to a typical path that is being discovered. (4) MAX NH: Maximum
reactive on-demand routing protocol. The difference lies in number of nodes in the NH list. This parameter is intended
the implementation details such as RREQ packet format, to control the flooding of the RREQ packet during route
routing update rules and RREQ forwarding delay rules. discovery. (5) BACKUP PATHS: This is the maximum
In DLLR, RREQ packet contains a primary route that number of backup paths that can be included in the routing
expands while the RREQ propagates throughout the table of the source node.
network. In addition, it contains an auxiliary route (backup When an intermediate node receives a RREQ packet from
route) which does not have any effect on RREQ another node, it builds the NH list with all of the
forwarding decisions. Also, included in the RREQ are the neighbours whose reliability factor is above RMIN. It then
primary and auxiliary route lifetimes. These route lifetimes adds its reliability factor to the cumulative path reliability
are calculated at each intermediate node by choosing the factor RCUM and propagates the RREQ packet to its
minimum from the composed estimated link lifetimes. The neighbours. Each of the neighbours whose ID is in the NH
source node broadcasts this RREQ packet, which initially, list will further propagate the RREQ packet according to
the two routes only contain the source node and their the same algorithm.
lifetimes are set as 0. When and if the destination receives the RREQ packets, it
When an intermediate node receives an RREQ for the first selects the path with the highest normalized path reliability
time, it appends itself into the prim/aux routes in the factor PRF=RCUM/n, where n is the number of
packet and records the request locally. Then it adjusts the intermediate nodes in the path (not including the source
lifetimes by choosing the minimum of the previous route and destination nodes), and unicast a RREP packet back to
lifetime and its link lifetime with the previous node. Next, the source. If backup paths are required then the paths with
it schedules a local delay time for forwarding this modified the highest reliability factors will have their corresponding
RREQ. When the delay time is up, it forwards this RREQ RREP packets sent to the source.
packet. If the intermediate node receives a duplicate Figure 4 shows a detailed example that illustrates the route
RREQ, it will update the prim/aux routes in its recorded discovery process using the RAS routing protocol between
RREQ based on the LLR update rule (the node picks the the source node A and the destination node G.
one with the longest lifetime from the shortest routes as
the primary route, and it picks the one with the longest
lifetime from the second shortest routes as the auxiliary
route).
When destination node receives RREQ, it waits enough
time for receiving other RREQs and then it will unicast an
RREP packet to the source node using the primary route
with the auxiliary route attached, just as in the normal
reactive procedure.
minimum reliability factor RMIN = 5, and MAX NH = 2. table driven routing strategy. A special and natural
Node A propagates the RREQ packet to nodes B and P. In switching mechanism is adopted in LRHR. LRHR mostly
turn, each of the nodes further propagates the RREQ works in the table-driven state. If all the following
packet according the above algorithm and accumulates the conditions are met, LRHR will transit from table-driven
reliability factor for each node in the path cumulative path state to on-demand state. In other words, the route
reliability factor. Finally, the RREQ packet, arrives at the discovery procedure will be initiated: I) Source node S has
destination node G with the discovered path A − B − H − I packet sending to destination node D, but S has no route to
− G and a final cumulative reliability factor of 27. D. II) the interval between the new route discovery and the
Similarly, a RREQ packet is propagated through nodes latest one is bigger than the minimum route request
A−P −N −T −O −G with a cumulative reliability factor of interval. (When there is no route to the destination node,
28. When the destination node G receives both RREQ instead of simply dropping the packet, LRHR will buffer
packets for the two discovered paths, it divides each path’s the packet and initiates route discovery)
final cumulative reliability factor with the number of In LRHR, the node operates in a promiscuous receive
nodes in the path to calculate the normalized path mode. In the promiscuous mode, a node can overhear a
reliability factor PRF = RCUM/n. Here, the destination packet that is not destined for it. Therefore, it can obtain
node G determines that the discovered paths A−B−H−I−G, more routes than a node that operates in the ordinary mode.
and A − P − N − T − O − G have normalized reliability LRHR mainly consists of the following modules: route
factors of 27/3 = 9 and 32/4 = 8 respectively. Therefore it discovery, route maintenance, route advertisement and
chooses the more reliable path A − B − H − I − G with the edge weight management. Figure 5 shows the relationships
higher normalized path reliability factor of 9. So, unicast a among these modules.
RREP packet back to the source node A along the
discovered intermediate nodes in the path list.
The reliability factor of a particular node is a measure of
its past performance in being a part of successful data
transmissions. There are several different algorithms that
can be used to maintain the reliability factor:
Self maintenance of the reliability factor by the node: Each
time a node successfully transmits a number of packets to
another node along the path it increases its reliability
factor.
Maintenance of the reliability factor by the Fig. 5 Framework of LRHR
acknowledgements: Using this policy, the destination
sends positive acknowledgments to the source. The
reliability factor is incremented when an intermediate node In LRHR, link reliability between nodes is quantified as an
receives positive acknowledgements from the destination. edge weight. (The link from one node to another is defined
Maintenance of the reliability factor by 1-hop neighbours: as an edge) Contrary to the well-known Dijkstra’s
Each node maintains a reliability factor for each of its n shortest-path algorithm, LRHR selects the route that has
neighbours. This set of reliability factors are a measure of the maximum edge weight sum as the primary route. In
the reliability of each of them in its view based on their this way, the selected route is of the maximum reliability.
past performance in successful data transmissions. In addition, unlike the traditional single path routing
Maintenance of the reliability factor using link-based strategy, multiple paths are established between a pair of
acknowledgement: If the next hop node did follow up and source-destination nodes.
forward the packet to its successor node, then it is In LRHR, each edge is assigned a value between 0 and 10.
rewarded by increasing its reliability factor in previous The value represents the reliability of the edge. (The
node. Otherwise, if that node did not forward the data, then greater the value, the higher the reliability) Edge weight
it is penalized by not increasing its reliability factor. management mainly consists of increasing and decreasing
the edge weight. Each new established edge is assigned the
weight of 10. If the edge is not used, with time elapsing,
2.6 Link Reliability based Hybrid Routing (LRHR) the edge reliability will be decreased gradually. So the
more frequently the edge is used, the higher the reliability.
LRHR is a hybrid routing protocol that contrary to the In the hybrid routing protocol LRHR, the link status
traditional single path routing strategy, multiple paths are database is periodically broadcasted to the neighbour
established between a pair of source-destination nodes [19]. nodes in route advertisement by one node. To reduce route
Hybrid routing protocols have to deal with the problem of advertisement overhead, LRHR divides route
how to switch between reactive on-demand and proactive advertisement into full route advertisement and partial
192 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009
route advertisement. The full route advertisement includes stable routes and uses power factor to determine active
the entire link status database, whereas, the partial route nodes to participate in routing.
advertisement only advertises the new edges. The period Selection of backbone nodes is made upon availability of
of partial route advertisement is comparably short. It is nodes and battery status and each route table has an entry
triggered on-demand in some sense. If no route for number of backbone nodes attached to it and their
advertisement is received in the predefined time interval battery status.
from a certain node X, node X is considered to be in the The proposed scheme is explained with the help of an
inactive state. example shown in Figure 7.
When each node forwards a packet (the packet may be the
data packet, route request or route reply), it can obtain
routing information from the source route list or route
reply list carried by the packet. Then the route table can be
updated. This is an active learning procedure. Also,
because the node operates in the promiscuous receive
mode, a node can overhear a packet that is not destined for
it. In this way, the node can obtain route information from
the overheard packet. This is a passive learning procedure.
As wireless networks are inherently less reliable than
wired networks, LRHR utilizes a hop-by-hop
acknowledgment to provide detection and retransmission
of lost or corrupted packets. After sending a packet to the
next hop node, the sender may be able to hear that node
transmitting the packet again, on its way further along the
path, if it operates in promiscuous receive mode. For Fig. 7 An Example of routing with SBNRP
example, in Fig.6, node X may be able to hear Y’s
transmission of the packet to Z. This type of Assume that the node with index 1 is the source while
acknowledgment is known as implicit acknowledgment. destination is the node with index 4. If the node with index
In the route table, there exists more than one path from a 3 is having power status in critical or danger zone, then
source to a destination. In general, two packets generated though the shortest path is 1—2—3—4 but the more stable
for a common destination by a source may be routed path 1—2—5—8—9—10—4 in terms of active power
through different paths. After arranging these paths status is chosen. This may lead to slight delay but
according to the edge weight sum along the path in improves overall efficiency of the protocol by sending
descending order, the path along which the edge weight more packets without link break than the state when some
sum is the maximum, called primary path. The other paths node is unable to process route due to inadequate battery
are called backup paths. power.
The process also helps when some intermediate node
moves out of the range and link break occurs, in that case
backbone nodes take care of the process and the route is
established again without much overhead. In Figure7 if the
node with index 8 moves out, the new established route
will be 1—2—5—11—9—10— 4. Here the node with
index 11 is acting as backbone node (BN) for the node
with index 5 and the node with index 8. Similarly the node
with index 12 can be BN for the nodes with indices 7, 10
and 4. BN has been selected at one hop distance from the
said node.
Fig. 6 Implicit acknowledgment The protocol is divided into three phases. Route Request
(REQ), Route Repair (REP) and Error Phase (ERR).
2.7 Stable and Energy efficient Routing (SBNRP) REQ phase is like route discovery operation of reactive
routing protocols. (Query and Reply procedure)
SBNRP is a reactive on demand routing protocol that uses An Intermediate node with an active route (in terms of
a new concept of backbone nodes with power factor [20]. power and Backbone Nodes), upon receiving a new RREQ
In this protocol two different concepts have been joined packet, records the previous hop and the source node
together to make an efficient protocol. (Stability and information in its route table i.e. backward learning. It then
Energy Efficiency) The scheme uses backbone nodes for broadcasts the packet or sends back a RREP packet to the
IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009 193
source if it has an active route to the destination. sessions or file transfers [22].
The destination node sends a RREP packet via the selected Under the RFAR scheme, the concept is to select a route
route when it receives the first RREQ or subsequent that will stay intact (with sufficiently high probability) for
RREQ packets that traversed a more stable route. Stability a certain period of time. This time duration represents the
of route depends upon two major aspects as: Lifetime and time it takes to transport across the network the data
Power status. associated with a transaction that is executed by an
Taking advantage of the broadcast nature of wireless underlying time critical application.
communications, a node promiscuously overhears packets For the calculation of the robustness indices along a route
that are transmitted by their neighbouring nodes. When a the RREQ packet of RFAR contains in its header Route
node that is not part of the route overhears a RREP packet Vulnerability Index (RVI) and underlying session holding
not directed to itself transmit by a neighbour (on the time H. At source node s, RVI set to 0.In each node the
primary route), it records that neighbour as the next hop to value of RVI updated according to the speeds of that node
the destination in its alternate route table. From these and the previous node and the effective communications
packets, a node obtains alternate path information and range(at an acceptable bit-error –rate level).
makes entries of these backbone nodes (BN) in its route In this protocol, a node receiving such a RREQ packet will
table. proceed to forward (flood) it to its neighbours (if it has not
When a node detects a link break, it performs a one hop yet forwarded such a RREQ packet) only if:
data broadcast to its immediate neighbours. The node a) Robustness control: it is desired for the selected
specifies in the data header that the link is disconnected route to exhibit a lifetime longer than the
and thus the packet is candidate for alternate routing. expected session holding time.
Upon receiving this packet route maintenance phase starts b) Capacity control: The link capacity (or delay, or
by selecting alternate path and checking power status. queue-size) level that it can offer to packets to be
During local repair data packets will be buffered at local generated by this flow, if admitted, is acceptable.
originator. Upon receipt of RREQ packets, the intermediate or the
If, at the end of the discovery period, the repairing node destination node waits for a prescribed period of time in
has not received a reply message REP it proceeds in by collecting several, if any, RREQ packets. It then proceeds
transmitting a route error ERR to the originating node. to examine the cumulative robustness status indices carried
in the header of these packets (indicating the
2.8 Cross-Layer Reliable Routing (CLRR) corresponding expected lifetime of the route travelled by
each RREQ packet), as well as other indices, such as the
CLRR is a cross-layer reactive routing protocol that used hop-length of the travelled route.
received signal strength information to choose reliable The destination node then, for example, selects an RREQ
links to form stable routes [21]. packet that provides acceptable robustness level while
In this cross-layer design, the received signal strength is offering the shortest route among all such received RREQ
measured at physical layer and transferred to the top layers. packets.
In CLRR, each node stored/ updated the received signal In the destination node, the selected RREQ packet induces
strength (RSS) of RREQ packet in Neighbour Table (NT) the issue of a route reply (RREP) packet that is transported
of routing protocol, against the address of the towards the source node across the selected route,
neighbouring node from which the RREQ is received. configuring at this phase the forwarding entries at the
Hence, whenever a node receives RREQ packet, by using nodes located along the route.
the current received signal strength and the previous value In the RFAR, if no acceptable route is discovered or
that is available in neighbour table, the moving direction calculated, the admission of the flow is rejected or blocked
of sending and receiving nodes can be found. That is, if by the source node.
current value is greater than previous one, the nodes are So if a route is selected in this protocol, the route lifetime
approaching; else they are moving apart. is sufficiently long to carry, with high probability, the
The RREQ packet forwarding decision is based on flow’s transaction without early interruption.
whether the sending and receiving nodes are approaching In addition, the selected route should offer the admitted
or moving away, in addition to having an adaptive signal flow packets with sufficient capacity resources so that
strength threshold with reference to moving speed of the prescribed (per application type) end-to-end packet delay
nodes. (mean and jitter) levels are met.