unit 2 material
unit 2 material
Routing protocols for ad hoc wireless networks face several significant challenges due to the
inherent characteristics of these networks, such as node mobility, limited resources, and
environmental constraints. Below is a detailed discussion of these challenges:
Mobility
Dynamic Topology: The frequent movement of nodes leads to highly dynamic network
topologies, causing ongoing sessions to suffer from frequent path breaks.
Path Disruption: Path breaks occur due to the movement of intermediate or end nodes,
unlike in wired networks with stationary nodes.
Inefficiency of Wired Protocols: Traditional wired network routing protocols are
inadequate for ad hoc networks as they cannot adapt quickly to topology changes. Ad hoc
routing protocols must provide effective mobility management.
Bandwidth Constraint
Time-Varying Links: Wireless links have variable capacities and high error
probabilities, requiring the routing protocol to interact with the MAC layer for selecting
better-quality routes.
Collisions: The shared nature of the wireless medium leads to frequent collisions of data
and control packets, necessitating protocols to address congestion and ensure reliable data
transfer.
Resource Constraints
Past Temporal Information: Decisions rely on historical or current link status, which
may not account for rapid topology changes.
Future Temporal Information: Incorporates predictions of link or node status (e.g.,
battery life, mobility) to improve stability and efficiency.
Routing Topology:
Operation of DSDV:
Consider the example as shown in Figure 7.5 (a). Here node 1 is the source node and node 15
is the destination. As all the nodes maintain global topology information, the route is already
available as shown in Figure 7.5 (b). Here the routing table of node 1 indicates that the
shortest route to the destination node (node 15) is available through node 5 and the distance
to it is 4 hops, as depicted in Figure 7.5 (b).
Consider the case when node 11 moves from its current position, as shown in Figure 7.6. When a
neighbor node perceives the link break, it sets all the paths passing through the broken link with
distance as ∞. For example, when node 10 knows about the link break, it sets the path to node 11
as ∞ and broadcasts its routing table to its neighbors. Those neighbors detecting significant
changes in their routing tables rebroadcast it to their neighbors. In this way, the broken link
information propagates throughout the network. Node 1 also sets the distance to node 11 as ∞.
When node 14 receives a table update message from node 11, it informs the neighbors about the
shortest distance to node 11. This information is also propagated throughout the network. All
nodes receiving the new update message with the higher sequence number set the new distance
to node 11 in their corresponding tables. The updated table at node 1 is shown in Figure 7.6,
where the current distance from node 1 to node 11 has increased from three to four hops.
Advantages:
Disadvantages:
1. Purpose:
Like DSDV, WRP ensures each node has an up-to-date view of the network with the
shortest distance to all destination nodes.
2. Count-to-Infinity Problem Prevention:
WRP counters the count-to-infinity problem and achieves faster convergence by
maintaining additional detailed information about the network.
3. Tables Maintained by Nodes:
Unlike DSDV, which uses a single topology table, WRP uses four types of tables for
accuracy:
o Distance Table (DT): Stores neighbor-reported distances and penultimate nodes
for each destination.
o Routing Table (RT): Maintains the shortest distance, predecessor, successor, and
path status for all destinations.
o Link Cost Table (LCT): Tracks the cost of links and monitors the number of
update intervals since the last successful update.
o Message Retransmission List (MRL): Maintains messages to be retransmitted
and their acknowledgment status.
4. Retransmission Mechanism:
o Nodes retransmit update messages until acknowledgments are received or the
retransmission counter expires.
o Missed updates trigger retransmission to ensure convergence.
5. Convergence Speed:
By simultaneously considering the distances reported by other neighbors during an
update, WRP converges faster than DSDV.
Route Maintenance
Consider the example shown in Figure 7.7, where the source of the route is node 1 and the
destination is node 15. As WRP proactively maintains the route to all the destinations, the route
to any destination node is readily available at the source node. From the routing table shown in
Figure 7.7, the route from node 1 to node 15 has the next node as node 2. The predecessor node
of 15 corresponding to this route is node 12. The predecessor information helps WRP to
converge quickly during link breaks.
Advantages of WRP
1. Faster Convergence:
o The use of predecessor information accelerates recovery from link breaks.
2. Reduced Table Updates:
o Fewer table updates compared to DSDV.
Disadvantages of WRP
1. Resource Intensive:
o Requires more memory and processing power due to multiple tables.
2. Unsuitability for High Dynamics:
o At high mobility, control overhead becomes comparable to DSDV, limiting its
scalability.
3. Not Ideal for Large Networks:
o Control overhead increases with network size, making WRP unsuitable for very
large ad hoc networks.
Key Features:
1. Cluster-Head Election:
o Elected dynamically using the Least Cluster Change (LCC) algorithm.
o Ties are resolved using lowest ID or highest connectivity.
o A node stops being a cluster-head if it comes under the range of another cluster-
head.
2. Cluster Coordination:
o Cluster-heads manage bandwidth allocation and channel access using token-
based polling protocols.
o Communication between clusters occurs via gateways, which are nodes
belonging to multiple clusters.
3. Routing Mechanism:
o Extends the Destination Sequenced Distance-Vector (DSDV) protocol.
o Each node maintains a cluster member table and a routing table.
o Packets are routed through cluster-heads and gateways, ensuring hierarchical
path establishment.
4. Route Maintenance:
o Managed by table updates for stale entries.
o LCC algorithm handles cluster-head changes to minimize disruptions.
Figure 7.9 shows the clusterheads, cluster gateways, and normal cluster member nodes in an
ad hoc wireless network. A path between node 11 and node 16 would follow 11 - 6 - 12 - 5 -
16. Since the cluster-heads gain more opportunities for transmission, the clusterheads, by
means of a dynamic scheduling mechanism, can make CGSR obtain better delay
performance for real-time flows. Route reconfiguration is necessitated by mainly two factors:
firstly, the change in cluster-head and secondly, the stale entries in the cluster member table
and routing table.
Advantages:
Disadvantages:
Path Length Increase: Routing through cluster-heads and gateways can lengthen paths.
Instability at High Mobility: Frequent cluster-head changes lead to instability.
Resource Demands: Gateways require additional interfaces to avoid conflicts.
Battery Drain: High energy consumption at cluster-heads causes frequent changes.
ON-DEMAND ROUTING PROTOCOLS
Unlike the table-driven routing protocols, on-demand routing protocols execute the path-finding
process and exchange routing information only when a path is required by a node to
communicate with a destination.
The Dynamic Source Routing (DSR) protocol is an on-demand routing protocol specifically
designed for ad hoc wireless networks. The primary goal of DSR is to reduce the bandwidth
consumed by control packets by eliminating the need for periodic table-update messages, which
are typical in table-driven protocols. Here’s a detailed explanation:
1. On-demand Routing: DSR operates by creating routes only when needed, rather than
maintaining constant routes like in table-driven protocols. This is achieved through the
exchange of RouteRequest (RREQ) and RouteReply (RREP) packets.
2. Beacon-less Operation: Unlike other on-demand protocols, DSR does not rely on
periodic beacon or hello packets (which are used to inform neighbors of a node's
presence), reducing overhead.
3. Route Discovery Process:
o When a source node has data to send to a destination but doesn’t have a route, it
initiates a RouteRequest (RREQ) packet.
o This RREQ is flooded throughout the network. When a node receives a RREQ, it
rebroadcasts it to its neighbors, unless it is the destination node or has already
forwarded the packet.
o Each RREQ contains a sequence number and the path traversed by the request,
which helps to avoid routing loops and duplicate transmissions. A node forwards
the RREQ only if it has not received the same request before.
o The destination node, upon receiving the RREQ, responds with a RouteReply
(RREP) packet. This RREP includes the full path back to the source.
4. Route Cache:
o Each node keeps a route cache, which stores previously learned routes. This
cache is used to reply to RREQ when a node has an existing route to the
destination.
oIf a node has a route in its cache to the destination, it can immediately send a
RREP to the source, skipping the route discovery process.
5. Promiscuous Mode:
o In promiscuous mode, nodes can overhear packets not addressed to them. This
allows nodes to gather information about the routes that other data packets are
following. This helps in maintaining an up-to-date route cache and facilitates
quicker route replies.
Optimizations in DSR:
1. Route Cache Utilization: Intermediate nodes can use the route cache to respond to
RREQ packets, thereby reducing the need to flood the network with route discovery
requests.
2. Route Maintenance and Error Handling:
o If a link in the route breaks (due to node movement), a RouteError (RERR)
message is generated by the adjacent node and sent to the source, informing it of
the broken link. The source node then reinitiates the route discovery process.
o Route Cache Updates: Intermediate nodes and the source can update their cache
based on new route information received via RREQ or RREP packets.
3. Exponential Backoff: To prevent frequent flooding of RREQ packets during network
partitions (when the destination is unreachable), exponential backoff is used to reduce
the frequency of route requests.
4. Piggybacking: DSR allows piggybacking of data packets onto the RREQ. This means
that a data packet can travel along with the route request, improving efficiency.
1. Reduced Overhead: Since routes are only discovered when needed, there’s no
continuous table updating as in table-driven protocols, leading to lower overhead.
2. Efficient Route Cache: Intermediate nodes use the route cache to respond to route
requests, reducing the need for full-scale route discovery every time a source needs to
send data.
3. Flexible: It works well in environments with relatively low mobility or static networks,
where route discovery is infrequent.
Disadvantages of DSR:
1. No Local Repair: When a link in the route breaks, DSR cannot locally repair the route.
The source must restart the route discovery process. This can cause delays, especially in
highly dynamic networks.
2. Stale Cache Information: Route cache can become outdated, leading to potential route
inconsistencies. If cache entries are stale, it can result in routing failures or inefficiencies
during route reconstruction.
3. Higher Setup Delay: In comparison to table-driven protocols, DSR has a higher
connection setup delay, as routes must be discovered during data transmission.
4. Scalability Issues: DSR may not scale well in large or highly mobile networks because
the routing overhead increases with the number of hops and the dynamic nature of the
nodes. As mobility increases, the overhead and delay due to route discoveries become
more significant.
5. Routing Overhead: DSR uses source routing, which means the complete route is
included in the header of each data packet. This increases the packet size, especially in
networks with long routes, leading to higher overhead proportional to the path length.
The Ad Hoc On-Demand Distance Vector (AODV) routing protocol is an on-demand routing
mechanism used in ad hoc networks, where routes are established only when needed by a source
node for data transmission. AODV employs destination sequence numbers to ensure the most
recent path is used, distinguishing it from protocols like Dynamic Source Routing (DSR), which
uses source routing. Below is a comprehensive understanding:
Example Scenarios:
1. Route Establishment:
o A source floods a RouteRequest in the network.
o Intermediate nodes forward the request or reply if they have valid routes.
o If multiple RouteReplies reach the source, the most recent and shortest path is
selected.
2. Route Maintenance:
o When a link breaks, RouteError messages notify nodes.
o End nodes remove broken path entries, and the source starts a new route
discovery.
Route Establishment
Consider the example depicted in Figure 7.12. In this figure, source node 1 initiates a path-
finding process by originating a RouteRequest to be flooded in the network for destination
node 15, assuming that the RouteRequest contains the destination sequence number as 3 and
the source sequence number as 1. When nodes 2, 5, and 6 receive the RouteRequest packet,
they check their routes to the destination. In case a route to the destination is not available,
they further forward it to their neighbors. Here nodes 3, 4, and 10 are the neighbors of nodes
2, 5, and 6. This is with the assumption that intermediate nodes 3 and 10 already have routes
to the destination node, that is, node 15 through paths 10-14-15 and 3-7-9-13-15,
respectively. If the destination sequence number at intermediate node 10 is 4 and is 1 at
intermediate node 3, then only node 10 is allowed to reply along the cached route to the
source. This is because node 3 has an older route to node 15 compared to the route available
at the source node (the destination sequence number at node 3 is 1, but the destination
sequence number is 3 at the source node), while node 10 has a more recent route (the
destination sequence number is 4) to the destination. If the RouteRequest reaches the
destination (node 15) through path 4-12-15 or any other alternative route, the destination also
sends a RouteReply to the source. In this case, multipleRouteReply packets reach the source.
All the intermediate nodes receiving a RouteReply update their route tables with the latest
destination sequence number. They also update the routing information if it leads to a shorter
path between source and destination.
Route Maintenance:
Consider the example illustrated in Figure 7.13. When a path breaks, for example, between nodes
4 and 5, both the nodes initiate RouteError messages to inform their end nodes about the link
break. The end nodes delete the corresponding entries from their tables. The source node
reinitiates the path finding process with the new BcastID and the previous destination sequence
number.
1. On-Demand Routing: Routes are established only when needed, reducing overhead
during idle periods.
2. Fresh Routes: Destination sequence numbers ensure the use of up-to-date paths.
3. Connection Setup Efficiency: Quick route establishment due to on-demand nature.
Disadvantages:
1. Inconsistent Routes: Intermediate nodes with outdated sequence numbers may create
stale routes.
2. Control Overhead: Multiple RouteReply packets in response to a single RouteRequest
increase control traffic.
3. Beaconing Overhead: Periodic beacons consume bandwidth unnecessarily.
TORA Operations:
1. Route Establishment:
o Triggered when a source node needs a path to the destination but does not have
one.
oUses a Query/Update mechanism:
The source sends a Query packet containing the destination address.
Intermediate nodes forward the Query until it reaches either the
destination or a node with a valid route to the destination.
The destination replies with an Update packet, setting its height to zero.
Each node that receives this packet sets its height to a value higher than
the sender's, creating a directed acyclic graph (DAG).
2. Route Maintenance:
o If an intermediate node detects a broken link:
It increases its height value and originates an Update packet.
Neighboring nodes receiving the Update packet adjust their links
accordingly to maintain the DAG.
o If no valid path exists, the source initiates a new Query/Update process.
o In case of network partition detection:
A Clear message is broadcasted to erase all route information in the
affected partition.
3. Route Erasure:
o When a partition is detected, TORA erases outdated routing information by
sending Clear messages.
Figure 7.14 shows the distance metric used in TORAwhich is nothing but the length of the
path, or the height from the destination. H(N) denotes the height of node N from the
destination.
Figure 7.14. Illustration of temporal ordering in TORA.
Consider the network topology shown in Figure 7.14. When node 1 has data packets to be sent to
the destination node 7, a Query packet is originated by node 1 with the destination address
included in it. This Query packet is forwarded by intermediate nodes 2, 3, 4, 5, and 6, and
reaches the destination node 7, or any other node which has a route to the destination. The node
that terminates (in this case, node 7) the Query packet replies with an Update packet containing
its distance from the destination (it is zero at the destination node). In the example, the
destination node 7 originates an Update packet. Each node that receives the Update packet sets
its distance to a value higher than the distance of the sender of the Update packet. By doing this,
a set of directed links from the node which originated the Query to the destination node 7 is
created. This forms the DAGdepicted in Figure 7.14. Once a path to the destination is obtained, it
is considered to exist as long as the path is available, irrespective of the path length changes due
to the reconfigurations that may take place during the course of the data transfer session.
When an intermediate node (say, node 5) discovers that the route to the destination node is
invalid, as illustrated in Figure 7.15, it changes its distance value to a higher value than its
neighbors and originates an Update packet. The neighboring node 4 that receives the Update
packet reverses the link between 1 and 4 and forwards the Update packet. This is done to update
the DAG corresponding to destination node 7. This results in a change in the DAG. If the source
node has no other neighbor that has a path to the destination, it initiates a fresh Query/Update
procedure. Assume that the link between nodes 1 and 4 breaks. Node 4 reverses the path between
itself and node 5, and sends an update message to node 5. Since this conflicts with the earlier
reversal, a partition in the network can be inferred. If the node detects a partition, it originates a
Clear message, which erases the existing path information in that partition related to the
destination.
Advantages of TORA:
Disadvantages of TORA:
1. Non-Optimal Routes:
Local reconfiguration may result in suboptimal paths between source and destination.
2. Transient Loops and Oscillations:
Concurrent partition detection and route deletions can temporarily cause routing loops or
instabilities.
Key Concepts:
1. Purpose:
LAR uses geographical location information to optimize routing by reducing control
overhead, improving efficiency, and limiting the propagation of control packets.
2. Mechanisms Used:
o Global Positioning System (GPS): Essential for determining nodes' locations.
o ExpectedZone: Region where the destination node is expected to be based on
past location and mobility.
o RequestZone: Defined area where control packets are forwarded to reduce
unnecessary flooding.
3. Routing Algorithms:
o LAR1:
The source node specifies the RequestZone explicitly, often as a
rectangular region that includes both the source and ExpectedZone.
Nodes outside the RequestZone discard packets.
Destination sends a RouteReply with location, time, and optionally, speed.
o LAR2:
The source node specifies its distance to the destination and the
destination's coordinates.
Intermediate nodes forward packets only if their distance to the destination
is shorter than the distance between the source and the destination (with
allowance for an error margin δ\deltaδ).
4. RouteReply:
o Destination node responds with a RouteReply packet containing routing
information for future data transmission.
As per LAR1, as illustrated in Figure 7.16, the RequestZone is the smallest rectangle that
includes the source node (S) and the ExpectedZone, the sides of which are parallel to the X
and Y axes, when the node S is outside the ExpectedZone. When node S is within the
ExpectedZone,then the RequestZone is reduced to the ExpectedZone itself. Every
intermediate node that receives theRouteRequest packet verifies the RequestZone information
contained in the packet and forwards it further if the node is within the RequestZone;
otherwise, the packet is discarded. In Figure 7.16, the source node (node 1) originates a
RouteRequest, which is broadcast to its neighbors (2, 5, and 6). These nodes verify their own
geographical locations to check whether they belong to the ExpectedZone.Nodes 2 and 5 find
that they are inside the ExpectedZone and hence they forward the RouteRequest.But node
6 discards the packet. Finally, when the RouteRequest reaches the destination node (node 4),
it originates a RouteReply that contains the current location and current time of the node.
Also, as an option, the current speed of movement can be included in the RouteReply if that
information is available with the node. Such information included in the RouteReply packet is
used by the source node for future route establishment procedures.
In LAR2 algorithm (Figure 7.17), the source node S (node 5) includes the distance between itself
and the destination node D (node 8) along with the (X, Y) coordinates of the destination node D
in theRouteRequest packet instead of the explicit information about the Expected Region. When
an intermediate node receives this RouteRequest packet, it computes the distance to the node D.
If this distance is less than the distance from S to node D + δ, where δ is a parameter of the
algorithm decided based on the error in location estimation and mobility, then the RouteRequest
packet is forwarded. Otherwise, the RouteRequest is discarded.
Consider the example illustrated in Figure 7.17. Assume that the value of δ is 0 here. The
RouteRequest packet originated by node 5 is received by nodes 1, 2, 4, 6, and 10. Only nodes 4
and 10 find that the distance between
them and the destination is less than the distance between the node 5 and the destination node;
other nodes discard the RouteRequest. ARouteRequest packet is forwarded only once and the
distance between the forwarding node and D is updated in the RouteRequest packet for further
relaying. When node 4 forwards the RouteRequestpacket, it updates the packet with the distance
between itself and the destination node D. This packet, after being received at neighbor node 3,
is discarded due to the fact that the distance between node 3 and the node 8 is greater than the
distance between nodes 4 and 8. Once the RouteRequest reaches node 8, it originates a
RouteReply packet back to the source node 5, containing the path through which future data
packets are to be propagated. In order to compensate for the location error (due to the inaccuracy
of GPS information or due to changes in the mobility of the nodes), a larger RequestZonethat can
accommodate the amount of error that occurred is considered.
Advantages:
Disadvantages:
Signal Stability-Based Adaptive Routing Protocol (SSA) is an on-demand routing protocol that
prioritizes stable routes based on signal strength. It is beacon-based, using signal stability as the
main factor for route selection.
Key Components:
Working Mechanism:
1. Route Discovery:
o RouteRequest packets are broadcasted by the source.
o Only RouteRequest packets received over stable links are processed and
forwarded by intermediate nodes.
o Weak link packets are dropped.
o The destination selects the first RouteRequest received over a stable path and
sends a RouteReply.
2. Route Maintenance:
o When a link breaks, end nodes notify the source and destination.
o The source rebroadcasts a RouteRequest to establish a new stable path.
o If no stable path is found, weak links are considered after multiple failed attempts.
Consider Figure 7.20, where the source node (node 1) broadcasts a RouteRequest for finding
the route to the destination node (node 15). In Figure 7.20, solid lines represent the stable
links, while the dotted lines represent weak links. Unlike ABR, SSA restricts intermediate
nodes from forwarding aRouteRequest packet if the packet had been received over a weak
link. It forwards only RouteRequestpackets received over stable links. In Figure 7.20, when
the RouteRequest is initiated by the source, it is to be processed by all its neighbors. But
before processing, each neighbor node checks whether theRouteRequest packet was received
through a stable link. If the RouteRequest had been received through a stable link and had not
been sent
already (i.e., it is not a duplicate RouteRequest), it is forwarded by the node; otherwise, it is
dropped. For example, when the RouteRequest from node 1 reaches nodes 2, 5, and 6, it is
forwarded only by nodes 2 and 5 as the link between nodes 1 and 6 is weak. Similarly, the
RouteRequest forwarded by node 2 is rejected by nodes 3 and 5, while node 4 forwards it to
its neighbors, provided it has not already been forwarded. In this way, nodes forward
theRouteRequest until it reaches the destination. In this example, only one route is
established based on the strong link criterion. A RouteRequest propagated through path 1-5-
10-14-15 is rejected by the destination as it receives a RouteRequest from node 14 on a weak
link. The stable path consisting of strong links is 1- 2 (or 5)-4-8-13-15. The first
RouteRequest packet that reaches the destination over a stable path is selected by the
destination.
Figure 7.20. Route establishment in SSA.
As shown in Figure 7.21, when a link breaks, the end nodes of the broken link (i. e., nodes 2 and
4) notify the corresponding end nodes of the path (i. e., nodes 1 and 15). A source node, after
receiving a route break notification packet, rebroadcasts the RouteRequest to find another stable
path to the destination. Stale entries are removed only if data packets that use the stale route
information fail to reach the next node. If the link between nodes 2 and 4 breaks, a new strong
path is established through 1-5-4-8-13-15. If no strong path is available when a link gets broken
(e.g., link 8-13), then the new route is established by considering weak links also. This is done
when multiple RouteRequest attempts fail to obtain a path to the destination using only the stable
links.
Disadvantages:
Consider Figure 7.24 where the source is node 1 and the destination is node 15. The core
nodes in the network are nodes 3, 5, 11, 12, and 13. In this figure, node 5 is the dominator of
nodes 1 and 6. Similarly, node 12 is the dominator of node 15. When node 1 initiates a
RouteRequest to be flooded throughout the network, it intimates its core node the <source id,
destination id> pair information. If the core node 5 does not have any information about the
dominator of node 15, which is the destination node, it initiates a core broadcast. Due to this,
all nearby core nodes receive the request in the unicast transmission mode. This unicast
transmission is done on the virtual links. For core node 5, the virtual link with core node 3
comprises of the links 5-2 and 2-3, while the virtual link between core nodes 5 and 13 is
represented by path 5-4-8-13. When a core node receives the core broadcast message, it
checks whether the destination is its core member. A core node having the destination as one
of its core members replies to the source core node. In our case, core node 12 replies to core
node 5. The path between core nodes 12 and 5 constitutes a core path. Once a core path is
established, the feasibility of the path in terms of the availability of the required bandwidth is
checked. If the required bandwidth is available on the path, the connection is established;
otherwise, the core path is rejected.
Consider the network topology shown in Figure 7.25. When the link between nodes 12 and 15
breaks, node 12 tries to reconnect to the destination using an alternate path that satisfies the
bandwidth requirement. It also notifies the source node about the link break. The source node
tries to reconnect to the destination by reinitiating the route establishment process. In case node
12 does not have any other feasible path, then the alternate path 1-5-4-8-13-15 found by the
source node is used for the further routing of packets.
6. Advantages:
o Efficient routing with QoS support.
o Reliable core broadcast and propagation of stable, high-bandwidth link
information.
7. Disadvantages:
o High control overhead due to core node updates.
o Protocol performance depends on the stability of core nodes; their movement can
disrupt the network.
1. Hybrid Approach:
o ZRP utilizes both proactive and reactive routing schemes. It works by having a
proactive routing protocol within a local zone (the r-hop neighborhood) and a
reactive routing protocol for nodes beyond this zone.
2. Routing Zones:
o Every node in the network has a routing zone defined by a radius (r). The zone
consists of nodes that are reachable within r hops from the node.
o The zone is split into two parts:
Interior nodes: Nodes within the zone radius (e.g., nodes that are less
than or equal to r hops away).
Peripheral nodes: Nodes that are exactly r hops away from the central
node.
3. Intra-Zone Routing Protocol (IARP):
o Inside its zone, a node uses the IARP to maintain route information to all other
nodes within the zone. This is done by periodic route updates.
o Larger zones generate more control traffic because more route updates need to be
exchanged.
4. Inter-Zone Routing Protocol (IERP):
o For nodes outside the local routing zone, IERP is used. IERP relies on the
information available within the node's routing zone.
o If a node wants to send data to a node outside its zone, it sends a RouteRequest
to its peripheral nodes. If any peripheral node can find the destination within its
own zone, it responds with a RouteReply.
o The process of finding the destination can involve bordercasting, where the
RouteRequest is passed along to the neighboring peripheral nodes until the
destination is located.
Figure 7.26 illustrates routing zones of node 8, with r = 1 hop and r = 2 hops. With zone
radius = 2, the nodes 7, 4, 12, and 13 are interior nodes, whereas nodes 2, 3, 5, 9, 10, 13, and
15 are peripheral nodes (nodes with the shortest distance equal to the zone radius). Each node
maintains the information about routes to all nodes within its routing zone by exchanging
periodic route update packets (part of IARP). Hence the larger the routing zone, the higher
the update control traffic.
Disadvantages:
Higher Overhead in Large Zones: In cases where the routing zone is large, more
control traffic is required to exchange route updates, leading to higher overhead.
Duplicate RouteRequests: Without proper query control, there could be redundant or
duplicate RouteRequests forwarded within overlapping zones, causing additional control
traffic.
Impact of Zone Radius: The performance of the protocol depends heavily on the chosen
zone radius. If the radius is too large or too small, it can negatively affect the
performance by increasing control traffic or failing to maintain optimal routes.
1. Hierarchical Addressing: ZHLS uses a hierarchical addressing scheme where each node
has a unique zone ID and a node ID. Nodes are grouped into zones based on their
geographical location, which is determined using GPS or a similar positioning system.
2. Intra-Zone and Inter-Zone Routing:
o Intra-Zone Routing: Within a given zone, a proactive routing protocol is used,
which relies on exchanging link state packets to maintain up-to-date node-level
topologies. These updates are distributed using a shortest path algorithm within
the zone.
o Inter-Zone Routing: Between zones, a reactive routing protocol is employed. If
a node wants to communicate with a destination node outside its zone, it initiates
a location request that is forwarded to other zones. The gateway nodes of the
relevant zones provide the routing information.
3. Location Requests and Responses:
o When a source node needs to send a packet to a destination outside its zone, it
sends a location request packet. The request is propagated to other zones. If a
gateway node in another zone knows the location of the destination, it responds
with a location response packet, indicating the zone information of the
destination.
4. Gateway Nodes: Each zone has gateway nodes that serve as points of communication
between zones. These nodes help relay data and location information, ensuring routing
continuity even if some gateway nodes move away.
5. Route Maintenance: ZHLS is resilient to mobility, as multiple gateway nodes per zone
allow for continued routing even if one gateway node moves away. If a route between
two zones breaks due to mobility, the other gateways can continue the communication.
The zone-level topology is shown in Figure 7.28 (b). The zone link state packets originated by
every zone are shown inTable 7.1. Using the information obtained from zone link state packets, a
node can build the zone topology. The zone routing table can be formed for any destination zone
by executing the shortest path algorithm on the zone-level topology. The zone link state packets
are source sequence numbered and a time-stamp field is included to avoid stale link state
packets.
The association of the nodes to the respective zones helps in reducing routing overhead as in
ZRP, but it includes the additional requirement of determining a given destination node's present
location. If a source node Src wants to communicate with a destination node Dest, Src checks
whether Dest resides in its own zone. If Dest belongs to the same zone, then packets are
delivered to Dest as per the intra-zone routing table. If the destination Dest does not belong to the
zone, then the node Src originates a location request packet containing the sender's and
destination's information. This location request packet is forwarded to every other zone. The
gateway node of a zone at which the location request packet is received verifies its routing table
for the destination node for which the location request was originated. The gateway node that
finds the destination
node required by a location request packet originates a location response packet containing the
zone information to the sender.
Advantages:
Disadvantages:
Creation of Zone-Level Topology: The process of creating and maintaining the zone-
level topology incurs additional overhead, especially in terms of geographical data and
periodic updates.
Sub-optimal Path Selection: Routes are sometimes sub-optimal because the protocol
relies on zone-level topology, which may not always provide the most efficient routing
paths.
Dependence on Geographical Information: The protocol requires that nodes have
accurate geographical information (e.g., via GPS), which may not be available in all
environments.