WASNSemester 8

Unit 1: Introduction to Ad Hoc Networks

MANET Characteristics, Applications, Challenges, and Routing Algorithms (Topology-based, Position-based, and Other Routing)

Author: Deepak Modi
Last Updated: 2026-05-10

Syllabus:

Introduction to Ad Hoc Networks: Characteristics of MANETs, Applications of MANETs and challenges of MANETs - Routing in MANETs: Criteria for classification, Taxonomy of MANET routing algorithms, Topology based routing algorithms, Position based routing algorithms, Other routing algorithms.


🎯 PYQ Analysis for Unit 1

PYQs will be added after analysis β€” check back soon.


Section 1: Introduction to Ad Hoc Networks

1.1 What is an Ad Hoc Network?

Definition:

An Ad Hoc Network is a self-organizing, decentralized wireless network in which mobile nodes communicate with each other directly (or via intermediate nodes) without relying on any fixed infrastructure such as base stations, access points, or wired backbones.

The term "ad hoc" is Latin for "for this purpose" β€” implying the network is formed on-the-fly, temporarily, for a specific purpose.

Key Idea:

In a traditional infrastructure-based network (e.g., Wi-Fi with a router), every device connects to a central access point. In an ad hoc network, there is no central controller β€” every node participates in routing and forwarding packets.

Traditional vs Ad Hoc Network:

INFRASTRUCTURE-BASED (Wi-Fi):

   Node A ──────► Access Point ──────► Node B
                  (Fixed AP)

AD HOC NETWORK:

   Node A ──────► Node C ──────► Node B
                  (No AP β€” nodes relay for each other)

Formal Definition:

An ad hoc network is a collection of wireless mobile nodes that dynamically form a temporary network without the use of any existing network infrastructure or centralized administration.


1.2 Types of Ad Hoc Networks

There are three primary types of ad hoc networks, each suited for a different use case:

                      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                      β”‚   Ad Hoc Networks        β”‚
                      β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                   β”‚
             β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
             β–Ό                     β–Ό                      β–Ό
    β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
    β”‚  MANET         β”‚   β”‚  VANET            β”‚   β”‚  WSN                β”‚
    β”‚ (Mobile Ad Hoc)β”‚   β”‚ (Vehicular Ad Hoc)β”‚   β”‚ (Wireless Sensor)   β”‚
    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
  General-purpose        Vehicles as nodes       Tiny sensor nodes
  mobile networks        on roads/highways       monitoring environment

1. MANET (Mobile Ad Hoc Network)

  • Most general form.
  • Mobile nodes (laptops, smartphones) move freely.
  • Topology changes rapidly.
  • No fixed infrastructure.
  • Example: Soldiers communicating on battlefield.

2. VANET (Vehicular Ad Hoc Network)

  • Nodes are vehicles (cars, buses, trucks).
  • Nodes move at high speed along roads.
  • Special challenges: very high mobility, frequent disconnections.
  • Applications: traffic management, collision avoidance, GPS-free navigation.

3. WSN (Wireless Sensor Network)

  • Nodes are small sensor devices with limited battery, memory, and CPU.
  • Deployed in an area to monitor physical phenomena (temperature, pressure, humidity).
  • Nodes are often stationary (unlike MANET).
  • Data flows toward a sink/gateway node.
  • Applications: environmental monitoring, smart agriculture, healthcare.

1.3 Infrastructure vs Ad Hoc Networks β€” Comparison

FeatureInfrastructure NetworkAd Hoc Network
Central AuthorityYes (Access Point / Base Station)No (fully distributed)
Fixed InfrastructureRequired (routers, APs, towers)Not required
Setup TimeLong (hardware installation)Quick (plug-and-play)
ScalabilityGood (hierarchical)Limited
RoutingDone by routersDone by each node
CostHigh (infrastructure required)Low
Mobility SupportLimited (handoff needed)High (nodes move freely)
ReliabilityHigh (controlled environment)Lower (interference, fading)
SecurityEasier to controlHarder (no central authority)
ExampleWi-Fi, 4G/5G cellularMilitary mesh, disaster networks

Section 2: Characteristics of MANETs

2.1 Overview

A MANET (Mobile Ad Hoc Network) is a special class of wireless ad hoc network where all participating nodes are mobile. Understanding its characteristics is essential to appreciate why standard network protocols cannot be directly applied.


2.2 Key Characteristics

1. Dynamic Topology

  • Nodes in a MANET move freely and unpredictably in any direction.
  • As nodes move, links between them appear and disappear constantly.
  • The network topology (map of connections) changes rapidly and continuously.
  • This makes routing very challenging because routes that were valid a moment ago may no longer exist.
Time T1:         Time T2 (nodes moved):
A──B──C          A    B──C
      |               |
      D          A──D
(A can reach D)  (B disconnected from A)

2. Distributed Operation (No Central Authority)

  • There is no dedicated router, server, or base station.
  • Every node acts simultaneously as a host (source/destination) and a router (forwarder).
  • All network functions (routing, security, addressing) are distributed among nodes.
  • This is both a strength (no single point of failure) and a weakness (harder to coordinate).

3. Multi-hop Routing

  • In a MANET, two nodes that want to communicate may not be within direct wireless range.
  • Data must travel through multiple intermediate nodes, each forwarding the packet to the next.
  • This is called multi-hop communication.
Source ──► Node A ──► Node B ──► Node C ──► Destination
            hop1       hop2       hop3
  • Each hop introduces delay and potential packet loss.
  • Wireless links have much lower bandwidth than wired links.
  • The shared wireless medium causes interference when multiple nodes transmit simultaneously.
  • Bandwidth is further reduced by multipath fading, noise, and signal attenuation.
  • This limits the throughput available to each node.

5. Energy-Constrained Nodes (Battery-Powered)

  • MANET nodes are typically battery-powered devices (laptops, smartphones, sensors).
  • Every operation β€” transmission, reception, processing β€” consumes battery.
  • Nodes must conserve energy to extend network lifetime.
  • A node with dead battery is completely lost from the network.
  • Routing protocols must be energy-aware to avoid draining certain nodes faster.

6. Limited Physical Security

  • Wireless links broadcast signals in all directions β€” anyone nearby can intercept them.
  • Nodes can join or leave the network without authentication.
  • There is no physical perimeter (like a locked server room) to secure the network.
  • Common attacks: eavesdropping, replay attacks, man-in-the-middle, Sybil attacks, blackhole attacks.

7. Self-Organizing and Self-Healing

  • Self-organizing: Nodes automatically discover neighbors, form routes, and configure themselves β€” no manual setup.
  • Self-healing: If a node fails or a link breaks, the network automatically finds alternate routes.
  • This makes MANETs resilient and fault-tolerant in theory.

8. Scalability Challenges

  • As the number of nodes increases, routing overhead (control messages) grows significantly.
  • More nodes = more movement = more topology changes = more route updates.
  • Protocols that work for 50 nodes may collapse with 500 nodes.
  • Designing scalable MANET protocols is an active research area.
  • Link quality in a MANET is not constant β€” it fluctuates based on:
    • Distance between nodes
    • Obstacles (walls, buildings)
    • Interference from other devices
    • Relative speed (Doppler effect)

10. Heterogeneous Devices

  • MANET can include devices with very different capabilities:
    • Old smartphones with slow CPUs
    • Modern tablets with fast GPUs
    • Embedded sensors with tiny memory
  • Protocols must work with the weakest common capability.

2.3 Summary Table β€” MANET Characteristics

CharacteristicDescriptionChallenge Caused
Dynamic topologyNodes move freelyRoutes break frequently
Distributed operationNo central controlHard to coordinate
Multi-hop routingIntermediate nodes relay dataIncreased delay, routing complexity
Bandwidth constrainedWireless has low capacityCongestion, packet loss
Energy constrainedBattery-poweredNodes die, uneven load
Limited securityOpen wireless mediumAttacks, eavesdropping
Self-organizingAuto-configurationProtocol design complexity
Scalability issuesRouting overhead growsPerformance degrades at scale

Section 3: Applications of MANETs

3.1 Military / Battlefield Communication

This is the original motivation for MANET research.

  • Soldiers carry radio devices and need to communicate in the field.
  • No time or resources to set up infrastructure (antennas, base stations).
  • Commanders need real-time information about troop positions.
  • MANETs allow instant formation of secure communication networks.

Use Cases:

  • Battlefield coordination between soldiers
  • Communication between tanks, drones, and command centers
  • Surveillance data relay from unmanned vehicles
Soldier A ──► Soldier B ──► Command Center
   (relay)       (relay)

3.2 Emergency / Disaster Relief

When natural disasters (earthquakes, floods, hurricanes) destroy existing infrastructure, MANETs provide communication where nothing else works.

  • After an earthquake, cell towers and landlines may be destroyed.
  • Rescue teams use MANET-capable devices to communicate.
  • First responders can form a temporary network instantly.

Use Cases:

  • Search and rescue coordination
  • Hospital-to-hospital emergency communication
  • Police and fire department coordination

3.3 Personal Area Networking (PAN)

  • Small-scale ad hoc networks among personal devices.
  • Example: Connecting your phone, tablet, and laptop without a Wi-Fi router.
  • Bluetooth-based PANs (piconets) are a form of ad hoc networking.
  • Sharing files between nearby devices.

3.4 Vehicular Networks (VANET)

  • Vehicles on roads form a MANET β€” called VANET (Vehicular Ad Hoc Network).
  • Each car communicates with nearby cars (V2V β€” Vehicle to Vehicle) and with roadside infrastructure (V2I β€” Vehicle to Infrastructure).

Use Cases:

  • Collision avoidance warnings ("car ahead braking hard!")
  • Traffic congestion information sharing
  • Automatic toll collection
  • Emergency vehicle priority at intersections
  • Internet access in tunnels via multi-hop relay

3.5 Commercial Applications

  • Conference/Meeting Networks: Attendees at a conference connect instantly without a Wi-Fi router.
  • Trade Shows: Temporary networks for product demonstrations.
  • Stadium/Concert Networking: Large crowds sharing data.
  • Retail: Wireless inventory tracking in warehouses.

3.6 Education

  • In remote or rural areas without internet access, MANET can be used to share educational content.
  • Students and teachers form a local ad hoc network.
  • Example: One Laptop per Child (OLPC) project used mesh networking for schools.

3.7 Other Applications

  • Healthcare: Wireless monitoring of patients in hospitals. Sensor nodes on patients send data to nurses' devices.
  • Environmental Monitoring: Deploying sensor nodes in forests, oceans, or disaster zones to monitor conditions.
  • Mining / Underground Operations: Communication in areas where radio towers cannot be installed.
  • Space / Remote Exploration: Communication between rover units on another planet.

3.8 Summary Table β€” MANET Applications

Application AreaUse CaseWhy MANET?
MilitaryBattlefield communicationNo fixed infrastructure possible
Disaster ReliefEmergency coordinationInfrastructure destroyed
Personal NetworksDevice-to-device file sharingConvenience, no router needed
VANETTraffic safety, navigationVehicles are moving nodes
CommercialConferences, warehousesTemporary, quick setup
EducationRural connectivityNo internet infrastructure
HealthcarePatient monitoringMobility of patients

Section 4: Challenges of MANETs

4.1 Routing Challenges

Routing is the most fundamental challenge in MANETs.

Why routing is hard:

  • Topology changes due to node mobility β€” routes become invalid quickly.
  • A route valid now may be broken in seconds.
  • Routing tables must be updated constantly, consuming bandwidth and energy.
  • Multi-hop routing introduces cumulative delays.

Key problems:

  • Route discovery overhead β€” finding a new route takes time and bandwidth.
  • Stale routes β€” old routes in tables lead to packet drops.
  • Loop formation β€” routing loops waste bandwidth.
  • Route maintenance β€” detecting broken links and finding alternates.

4.2 Security Challenges

MANETs are inherently vulnerable due to the open wireless medium and lack of centralized control.

Common Attacks:

AttackDescription
Blackhole AttackA malicious node claims shortest route to drop all packets
Wormhole AttackTwo colluding attackers create a fake fast tunnel to divert traffic
Sybil AttackA node pretends to be multiple nodes to gain influence
Flooding Attack (DoS)Attacker floods network with fake route requests to exhaust resources
EavesdroppingPassively listening to wireless transmissions
Man-in-the-MiddleIntercepting and modifying packets between two nodes
Replay AttackRe-sending old valid packets to confuse the network

Why security is harder in MANETs:

  • No central authentication server.
  • Nodes may be captured by enemies (especially in military).
  • Wireless medium is accessible to all.

4.3 QoS (Quality of Service) Challenges

QoS refers to guaranteeing certain performance metrics (bandwidth, delay, jitter) for applications.

  • In wired networks, QoS is managed by dedicated routers.
  • In MANETs, the dynamic topology means QoS guarantees can collapse at any moment.
  • Multimedia applications (voice, video) require low and consistent delay (jitter) β€” hard to guarantee in MANETs.
  • Bandwidth reservation is difficult when the network topology keeps changing.

4.4 Power / Energy Constraints

  • Battery-powered devices have limited energy.
  • Transmitting data is the largest energy consumer in a wireless node.
  • Nodes that are relay points carry traffic for others β€” their batteries drain faster.
  • A "selfish node" may refuse to relay to save its own battery.
  • Energy-aware routing is needed to balance the load and maximize network lifetime.

Energy Trade-off:

More Hops = More Energy (each relay drains multiple batteries)
Fewer Hops = Higher transmission power per hop (also drains fast)
Optimal = balance between number of hops and power per hop

4.5 Scalability

  • A routing protocol may work perfectly for 10–20 nodes.
  • With 100+ nodes, routing control traffic (HELLO messages, route requests) can consume most of the bandwidth.
  • The problem worsens because: more nodes β†’ more movement β†’ more topology changes β†’ more routing updates.
  • Flat routing (where every node knows every other) doesn't scale.
  • Hierarchical routing (zones, clusters) helps but adds complexity.

4.6 Bandwidth Limitations

  • Wireless medium has much lower capacity than fiber/copper.
  • Shared medium: only one node in an area should transmit at a time to avoid collision.
  • MAC layer must handle access control β€” adds overhead.
  • Hidden node problem, exposed node problem (see below) reduce effective bandwidth.

4.7 Hidden Node Problem

         A ──────────────► B ◄───────────── C
         |        range    |       range    |
         └── A cannot hear C β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
  • Node A and Node C are both in range of Node B, but out of range of each other.
  • Both A and C sense the channel as idle (they cannot hear each other).
  • Both transmit to B simultaneously β†’ collision at B.
  • This reduces throughput significantly.
  • Solution: RTS/CTS (Request to Send / Clear to Send) mechanism.

4.8 Exposed Node Problem

         A ◄──────────── B ────────────► C ────────────► D
              (B transmitting to A)        (C wants to send to D)
  • Node B is transmitting to Node A.
  • Node C senses the channel as busy (it hears B) and waits.
  • But C could safely transmit to D without interfering with Bβ†’A (because D is out of B's range).
  • C is unnecessarily blocked β€” this reduces throughput.
  • This is the exposed node problem.

4.9 Summary Table β€” MANET Challenges

ChallengeRoot CauseImpact
RoutingDynamic topologyBroken routes, high overhead
SecurityOpen medium, no central authorityAttacks, data theft
QoSChanging topologyCannot guarantee delay/bandwidth
EnergyBattery-powered nodesNetwork partitioning, node death
ScalabilityRouting overhead grows with nodesPerformance collapse
BandwidthShared wireless mediumCongestion, low throughput
Hidden nodeNodes cannot detect all transmissionsCollisions at receivers
Exposed nodeNodes overhear irrelevant transmissionsUnnecessary blocking

Section 5: Routing in MANETs

5.1 Why Routing in MANETs is Different

In wired networks (like the Internet), routing is done by dedicated routers with:

  • Stable, known topology
  • High-bandwidth links
  • Unlimited power
  • Centralized routing tables (BGP, OSPF)

In MANETs, routing must be done by every mobile node with:

  • Unpredictable, frequently changing topology
  • Low-bandwidth, lossy wireless links
  • Limited battery power
  • No centralized routing table authority

Consequences:

  • Standard routing protocols (OSPF, RIP) cannot be used directly.
  • MANET-specific protocols must handle link failures gracefully.
  • Protocols must be lightweight (small overhead) to save battery and bandwidth.

5.2 Criteria for Classification of Routing Protocols

MANET routing protocols can be classified based on several different criteria:

Criterion 1: Timing / Reactivity

TypeDescription
Proactive (Table-driven)Routes are maintained at all times; updates sent periodically
Reactive (On-demand)Routes are discovered only when needed
HybridProactive within a zone, reactive outside

Criterion 2: Route Initiator

TypeDescription
Source-initiatedThe source node starts route discovery (e.g., DSR)
Destination-initiatedThe destination node responds with routes

Criterion 3: Routing Information Used

TypeDescription
Topology-basedUses knowledge of the network graph (links, nodes)
Position-based (Geographic)Uses physical location (GPS coordinates) of nodes
Energy-basedUses remaining battery level of nodes
QoS-basedUses link quality metrics (delay, bandwidth)

Criterion 4: Number of Paths

TypeDescription
Single pathOnly one route is maintained at a time
MultipathMultiple routes are maintained simultaneously for redundancy

Criterion 5: Network Structure

TypeDescription
FlatAll nodes have equal role
HierarchicalNodes organized into clusters; cluster heads do routing

5.3 Taxonomy of MANET Routing Algorithms

                  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                  β”‚     MANET Routing Algorithms      β”‚
                  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                  β”‚
          β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
          β–Ό                       β–Ό                       β–Ό
  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”      β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
  β”‚ Topology-Basedβ”‚      β”‚ Position-Based β”‚      β”‚ Other          β”‚
  β”‚   Routing     β”‚      β”‚ (Geographic)   β”‚      β”‚ Algorithms     β”‚
  β””β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜      β””β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”˜
          β”‚                       β”‚                       β”‚
    β”Œβ”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”          GPS-based              β”Œβ”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”
    β–Ό     β–Ό      β–Ό          Greedy forward          β–Ό      β–Ό      β–Ό
Proactive Reactive Hybrid   GPSR               Power  Multipath  QoS
(DSDV,   (AODV,   (ZRP)                       Aware  Routing   Routing
 OLSR)    DSR)

Section 6: Topology-Based Routing Algorithms

Topology-based routing uses information about the network graph (which nodes exist and which links connect them) to make routing decisions. There are three main sub-types:

6.1 Proactive (Table-Driven) Routing

Definition:

Proactive routing protocols maintain up-to-date routing tables for every possible destination at all times. Nodes periodically exchange routing updates so that every node knows the full network topology.

Working Principle:

Every node maintains a routing table:
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Destinationβ”‚  Next Hop    β”‚  Cost    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  Node B    β”‚   Node C     β”‚   2      β”‚
β”‚  Node D    β”‚   Node A     β”‚   1      β”‚
β”‚  Node E    β”‚   Node C     β”‚   3      β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Nodes exchange updates periodically (e.g., every 5 seconds):
"Hello, my table has changed..."

Advantages: βœ… Routes are immediately available β€” no delay when data needs to be sent.
βœ… Good for applications requiring low latency route setup.
βœ… Simple to understand and implement.

Disadvantages: ❌ High control overhead β€” periodic updates consume bandwidth and energy even when no data is being sent.
❌ Stale routing entries β€” in highly mobile networks, tables may be outdated before data arrives.
❌ Does not scale well β€” overhead grows with number of nodes.


6.1.1 DSDV (Destination Sequenced Distance Vector)

Full name: Destination Sequenced Distance Vector

Based on: Bellman-Ford (Distance Vector) algorithm, with sequence numbers to prevent routing loops.

How it works:

  1. Each node maintains a routing table with:
    • Destination
    • Next Hop
    • Number of hops (metric)
    • Sequence number (even = from destination, odd = route broken)
  2. Nodes broadcast their routing tables periodically.
  3. On receiving an update, a node updates its table if:
    • The received sequence number is higher (more recent info), OR
    • Same sequence number but fewer hops (better route).
  4. Sequence numbers prevent count-to-infinity and loops.

Routing Table Example:

DestinationNext HopHopsSequence No.
BC2B-12
DD1D-8
EC3E-6

Two types of updates:

  • Full dump: Complete routing table (sent infrequently).
  • Incremental: Only changed entries (sent when changes occur).

Advantages: βœ… Loop-free routing (guaranteed by sequence numbers).
βœ… Routes always ready.
βœ… Simple implementation.

Disadvantages: ❌ High overhead for large networks.
❌ Slow convergence when topology changes rapidly.
❌ Wasteful when little data is transmitted.


Full name: Optimized Link State Routing

Based on: Link State routing (like OSPF), optimized using Multipoint Relays (MPR).

Key Concept β€” Multipoint Relay (MPR):

  • In standard flooding, every node re-broadcasts a message β€” huge overhead.
  • OLSR selects a small subset of neighbors (MPRs) to forward control messages.
  • Only MPR nodes re-broadcast, drastically reducing flooding overhead.
Without MPR (standard flooding):
A broadcasts β†’ B, C, D, E, F all re-broadcast (5 re-broadcasts)

With MPR:
A selects B and D as MPRs β†’ only B and D re-broadcast (2 re-broadcasts)

How OLSR works:

  1. Each node selects a set of MPR nodes from its 1-hop neighbors that can reach all 2-hop neighbors.
  2. Nodes broadcast Hello messages periodically to discover neighbors.
  3. MPR nodes send TC (Topology Control) messages to propagate link-state info.
  4. Each node builds a topology map and computes shortest paths using Dijkstra's algorithm.

Advantages: βœ… Significantly reduced flooding overhead vs standard link-state.
βœ… Efficient for dense networks.
βœ… Loop-free, routes always available.
βœ… Supports QoS extensions.

Disadvantages: ❌ Still maintains tables for all destinations (overhead for sparse networks).
❌ MPR selection adds complexity.
❌ TC messages can become outdated in high-mobility scenarios.


6.2 Reactive (On-Demand) Routing

Definition:

Reactive routing protocols discover routes only when a source node needs to send data to a destination. No routing table is maintained when there is no data to send.

Working Principle:

1. Source wants to send to Destination.
2. Source floods a Route Request (RREQ) packet:
   RREQ: [Source=A, Dest=D, SeqNo=5, TTL=10]

3. Every intermediate node re-broadcasts RREQ.
4. Destination (or a node with a fresh route) sends a Route Reply (RREP):
   RREP: [Source=A, Dest=D, Route: A→B→C→D]

5. Source receives RREP and starts sending data.
6. If route breaks: Route Error (RERR) sent back.

Advantages: βœ… Zero routing overhead when no data is being sent.
βœ… Scales better for sparse or low-traffic networks.
βœ… Routes are always fresh (discovered just-in-time).

Disadvantages: ❌ Route discovery latency β€” data transmission is delayed until a route is found.
❌ RREQ flooding creates temporary overhead when route is needed.
❌ Poor for real-time applications that cannot tolerate setup delay.


6.2.1 AODV (Ad hoc On-demand Distance Vector)

Full name: Ad hoc On-demand Distance Vector

Type: Reactive, uses hop-count metric, maintains routing tables.

Key Messages:

  • RREQ (Route Request) β€” broadcast by source to find a route.
  • RREP (Route Reply) β€” unicast from destination (or intermediate node) back to source.
  • RERR (Route Error) β€” sent when a link breaks.

Detailed Working of AODV:

Step 1 β€” Route Discovery:

Source (S) wants to send to Destination (D).
S broadcasts RREQ:
  RREQ = {Source=S, Dest=D, SrcSeqNo=5, DestSeqNo=last known, BroadcastID=42, TTL=10}

Intermediate nodes:
  - Set up a reverse route to S (for sending RREP back).
  - Re-broadcast RREQ (if not already seen).
  - Discard duplicate RREQs (identified by Source + BroadcastID).

Step 2 β€” Route Reply:

Destination D (or intermediate node with fresh route) sends RREP back:
  RREP = {Source=S, Dest=D, DestSeqNo=10, HopCount=3, Lifetime=T}

Intermediate nodes:
  - Forward RREP toward S using reverse route entries.
  - Set up a forward route to D while forwarding.

Step 3 β€” Data Transmission:

S now has route: S β†’ A β†’ B β†’ D
Data packets are sent along this route.

Step 4 β€” Route Maintenance:

If a link breaks (e.g., A→B breaks):
  A sends RERR back to S.
  S can restart route discovery.

ASCII Diagram β€” AODV Route Discovery:

        S ──RREQ──► A ──RREQ──► B ──RREQ──► D
        β”‚                                    β”‚
        ◄─────────────RREPβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
        (reverse path: D→B→A→S)

After RREP received:
  Routing table at S: Dest=D, NextHop=A
  Routing table at A: Dest=D, NextHop=B
  Routing table at B: Dest=D, NextHop=D

Sequence Numbers in AODV:

  • Each node maintains a sequence number for itself.
  • Sequence numbers ensure freshness β€” higher sequence number = more recent route.
  • Prevents loops and stale routes.

Advantages: βœ… Loop-free (due to sequence numbers).
βœ… Supports both unicast and multicast.
βœ… Low overhead when network has low traffic.
βœ… Scales reasonably well.

Disadvantages: ❌ Route discovery adds latency before data can flow.
❌ RREQ flooding can cause broadcast storm.
❌ Route may break due to mobility (RERR cycle).


6.2.2 DSR (Dynamic Source Routing)

Full name: Dynamic Source Routing

Type: Reactive, uses source routing (the full path is embedded in each packet header).

Key Concept β€” Source Routing:

  • Instead of each intermediate node looking up a routing table, the source node specifies the complete path in every packet header.
  • Intermediate nodes simply forward the packet to the next node listed in the header.

Key Messages:

  • RREQ (Route Request) β€” flooded, each node adds its ID to the RREQ.
  • RREP (Route Reply) β€” sent back with the complete route.
  • RERR (Route Error) β€” sent when a link breaks.

Detailed Working of DSR:

Step 1 β€” Route Discovery:

S wants to send to D.
S broadcasts RREQ with path so far: [S]

Intermediate node A receives RREQ:
  Appends itself: [S, A]
  Re-broadcasts RREQ.

Node B receives RREQ:
  Appends itself: [S, A, B]
  Re-broadcasts RREQ.

Destination D receives RREQ: [S, A, B, D]
  D now knows the full path: S β†’ A β†’ B β†’ D

Step 2 β€” Route Reply:

D sends RREP back to S with the route:
  RREP = {Route: S→A→B→D}
S stores this in its Route Cache.

Step 3 β€” Data Transmission:

Packet header contains full route:
  [Data | Route: A, B, D]
A forwards to B; B forwards to D.

Route Cache:

  • Nodes overhear route information in passing packets and cache it.
  • Routes learned by overhearing can be used for future transmissions β€” reduces RREQ floods.

ASCII Diagram β€” DSR vs AODV Headers:

AODV packet header:
  [Data | Dest=D | NextHop=A]    ← Each node looks up its own table

DSR packet header:
  [Data | Route: A β†’ B β†’ D]     ← Full path carried in every packet

Advantages: βœ… Multiple routes cached β€” no need to rediscover immediately after failure.
βœ… Route caching reduces RREQ floods.
βœ… Does not require periodic updates β€” fully on-demand.
βœ… Nodes can passively learn routes from overheard packets.

Disadvantages: ❌ Packet header grows large with long routes (overhead proportional to path length).
❌ Stale cache entries can cause packet drops.
❌ Not suitable for large networks (header size becomes too big).
❌ Promiscuous mode required for route caching (high power consumption).


6.3 Hybrid Routing: ZRP

Full name: Zone Routing Protocol

Type: Hybrid β€” combines proactive and reactive strategies.

Core Idea:

ZRP divides the network into zones around each node. Within the zone, proactive routing is used. Between zones, reactive routing is used.

                 Zone of Node A (radius = 2 hops):
                 β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
                 β”‚   B ─── C              β”‚
                 β”‚   |     |              β”‚
                 β”‚   A ─── D ─── E ───── │── F (outside zone)
                 β”‚                        β”‚
                 β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                 (A knows routes to B,C,D,E proactively)
                 (To reach F: reactive discovery)

Zone Radius (ρ): The number of hops defining the zone boundary.

Two Sub-protocols:

  • IARP (Intrazone Routing Protocol): Proactive β€” maintains routes within the zone.
  • IERP (Interzone Routing Protocol): Reactive β€” discovers routes to nodes outside the zone.
  • BRP (Bordercast Resolution Protocol): Helps forward RREQs efficiently between zones.

How ZRP Works:

  1. Every node proactively knows all routes within its zone (radius ρ).
  2. When A wants to reach F (outside zone):
    • A broadcasts RREQ to its border nodes (nodes at the edge of its zone).
    • Border nodes check their zones for F.
    • If F is in a border node's zone, RREP is sent back.
    • Otherwise, the border nodes forward RREQ to their border nodes.

Advantages: βœ… Reduces route discovery latency vs pure reactive (nearby nodes found proactively).
βœ… Reduces overhead vs pure proactive (only local topology maintained).
βœ… Tunable β€” zone radius (ρ) can be adjusted for network conditions.

Disadvantages: ❌ More complex to implement than either pure approach.
❌ Zone maintenance overhead still exists (for intrazone routing).
❌ Optimal zone radius is hard to determine dynamically.


6.4 Comparison Table β€” Proactive vs Reactive vs Hybrid

FeatureProactive (DSDV, OLSR)Reactive (AODV, DSR)Hybrid (ZRP)
Route AvailabilityAlways readyDiscovered on demandPartly ready (within zone)
Latency to First PacketVery lowHigh (discovery delay)Medium
Control OverheadHigh (periodic updates)Low (only on demand)Medium
ScalabilityPoor (large networks)BetterGood
Bandwidth UsageHigh (even idle)Low (only when needed)Medium
Suitable ForLow mobility, frequent trafficHigh mobility, sparse trafficGeneral purpose
ExamplesDSDV, OLSRAODV, DSRZRP
Loop-Free?YesYesYes
Stale Routes?Risk with high mobilityLess risk (fresh discovery)Medium risk

Section 7: Position-Based Routing Algorithms

7.1 Why Position-Based Routing?

Problem with topology-based routing:

  • Maintaining global topology (who is connected to whom) requires significant overhead.
  • As network size and mobility increase, topology-based protocols struggle.

Solution β€” Position-Based (Geographic) Routing:

  • Instead of knowing the network topology, each node only needs to know its own geographic position (GPS coordinates) and the position of its immediate neighbors.
  • Each node also needs to know the position of the destination (obtained via a location service).
  • Routing decision: "Forward this packet to whichever neighbor is closest to the destination."

No routing tables needed. No global topology required.


7.2 Greedy Forwarding

Definition:

Greedy forwarding is the fundamental strategy in position-based routing. A node forwards a packet to the neighbor that is closest to the destination (in terms of Euclidean distance).

    Source (S)
       β”‚
       β”‚ neighbors of S: A, B, C
       β”‚
       S ────────────────────────────────── Destination (D)
      /|\
     A B C
     |
     A is closest to D β†’ forward to A

    A ────────────────────── D
   /|\
  E F G
     |
     F is closest to D β†’ forward to F

    F ──────────── D  (direct neighbor!)

Working:

  1. Each node knows:
    • Its own position (GPS).
    • Positions of all its 1-hop neighbors.
    • Position of the destination.
  2. The node selects the neighbor closest to the destination and forwards.
  3. This repeats hop by hop until the packet reaches the destination.

Problem β€” The Void (Local Maximum):

Greedy forwarding can get stuck in a void β€” a situation where none of the current node's neighbors are closer to the destination than the current node itself.

     S ──► A ──► B
                  B is stuck! No neighbor closer to D.
                       ↕         D
                  β”Œβ”€β”€β”€β”€β”˜         (D is in a void)
                  C (far from D)

Solution: When greedy forwarding fails, switch to perimeter routing (face routing).


7.3 GPSR (Greedy Perimeter Stateless Routing)

Full name: Greedy Perimeter Stateless Routing

Proposed by: Karp and Kung (2000).

GPSR combines two modes:

  1. Greedy mode β€” used when possible (forward to closest neighbor to destination).
  2. Perimeter mode β€” used when greedy fails (packet is stuck at a void).

Perimeter Mode β€” Right-Hand Rule:

When greedy fails (current node is a local maximum):

  • Switch to perimeter mode.
  • Use the right-hand rule to traverse the perimeter of the void.
  • Eventually, the packet finds a node from which greedy forwarding can resume.
Right-Hand Rule:
  When you arrive at a node via edge (u, v):
  Choose the next edge that is the first counterclockwise from (u, v).
  This traces the face of the planar graph.

Diagram:
           β”Œβ”€β”€A──┐
      S ────     β”œβ”€β”€β”€ D
           └──Bβ”€β”€β”˜
                C (stuck β€” local max)

  C uses perimeter (right-hand rule) to go around the void:
  C β†’ A β†’ D (GPSR found a path!)

Planarization:

  • GPSR first builds a planar graph (no crossing edges) using:
    • GG (Gabriel Graph) or
    • RNG (Relative Neighborhood Graph)
  • The right-hand rule only works correctly on planar graphs.

GPSR Modes Diagram:

                         Greedy Mode:
S ───────────────────────────────────────► D
         (each hop gets closer to D)

                         Perimeter Mode (when void found):
S ─────► ... ─────► LocalMax ─────────────► D
                        β”‚   (right-hand rule)
                        └──► A ──► B ──► D

Advantages: βœ… Stateless β€” no routing tables, no topology stored.
βœ… Scales to very large networks (no global state needed).
βœ… Guaranteed delivery in connected planar graphs.
βœ… Low overhead β€” only need neighbor position info.

Disadvantages: ❌ Requires GPS hardware on every node (may not always be available).
❌ GPS may be inaccurate indoors or in dense urban environments.
❌ Location service needed to map destination IDs to GPS coordinates.
❌ Planarization may disconnect the graph, causing delivery failure.
❌ Does not optimize for path length β€” greedy path may not be shortest.


7.4 Other Position-Based Protocols

ProtocolDescription
LAR (Location Aided Routing)Uses GPS to restrict RREQ flooding to a request zone β€” reduces overhead of reactive protocols
DREAM (Distance Routing Effect Algorithm for Mobility)Proactive position-based; update frequency proportional to node speed
FACE RoutingPure perimeter routing using face traversal
GFG (Greedy-Face-Greedy)Similar to GPSR β€” alternate between greedy and face routing

7.5 Comparison β€” Topology-Based vs Position-Based

FeatureTopology-BasedPosition-Based
Information neededNetwork topology (links, nodes)GPS coordinates of nodes
Routing tablesRequiredNot required
OverheadHigh (topology updates)Low (only neighbor positions)
ScalabilityLimitedHigh
GPS required?NoYes
Delivery guaranteeYes (if topology correct)Yes (if network connected + planar)
ExamplesDSDV, OLSR, AODV, DSRGPSR, LAR, DREAM

Section 8: Other Routing Algorithms

8.1 Power-Aware Routing

Motivation:

Standard routing protocols (AODV, DSR) use hop count or path length as the metric. They do not consider the remaining battery of intermediate nodes. This leads to:

  • Heavily used relay nodes exhausting their batteries quickly.
  • Network partitioning when critical relay nodes die.

Goal: Maximize overall network lifetime by balancing energy usage.

Strategies:

Strategy 1: Minimize Total Transmission Power

  • Choose paths that minimize the total power consumed to deliver a packet.
  • Not always the shortest hop path β€” may use longer paths with lower transmission power per hop.

Strategy 2: Maximize Minimum Node Battery

  • Choose paths that avoid nodes with low remaining battery.
  • Ensures no single node is drained prematurely.

Strategy 3: Minimize Maximum Node Energy

  • Minimize the maximum energy consumed by any single node on the path.
  • Prevents bottleneck nodes from dying quickly.

Strategy 4: Minimize Energy Γ— Delay

  • Trade-off between energy and delay.
  • Suitable for delay-tolerant applications.

Example Protocol β€” MTPR (Minimum Total Power Routing):

  • Selects the path with minimum sum of transmission powers.

Example Protocol β€” MMBCR (Minimum Maximum Battery Cost Routing):

  • Routes through nodes with maximum battery to avoid draining the weakest nodes.

Challenges:

  • Battery level is dynamic β€” a good route now may be bad in 5 minutes.
  • Nodes may lie about their battery level to avoid being used as relays.

8.2 Multipath Routing

Motivation:

Standard routing uses a single path between source and destination. If this path breaks, a new route must be discovered β€” causing delay. Multipath routing maintains multiple routes simultaneously.

Benefits:

  • Fault tolerance β€” if one path fails, switch to another immediately.
  • Load balancing β€” distribute traffic across multiple paths to avoid congestion.
  • Increased throughput β€” send data simultaneously on multiple paths.
  • Security β€” split a message across paths, making eavesdropping harder.

Types of Multipath Routing:

TypeDescription
Node-disjointMultiple paths share no intermediate nodes (highest redundancy)
Link-disjointPaths share no common links (but may share nodes)
Braided pathsPaths are not disjoint but are independent enough to provide redundancy

How Multipath Works (AOMDV β€” Ad hoc On-demand Multipath Distance Vector):

Source (S) sends RREQ.
Multiple copies of RREQ reach Destination (D) via different paths.
D sends RREP along each distinct path.
S maintains all valid paths:
  Path 1: S β†’ A β†’ B β†’ D
  Path 2: S β†’ C β†’ E β†’ D
  Path 3: S β†’ A β†’ F β†’ D

Data can be sent on all paths simultaneously (split) or
Path 1 used primarily; Path 2 as backup.

Challenges:

  • Maintaining multiple routes increases overhead.
  • Paths may become correlated (share nodes) in dense networks.
  • Synchronization of packets on multiple paths.

8.3 QoS Routing

Motivation:

Different applications have different network requirements:

  • Voice over IP (VoIP): Needs low delay (< 150 ms) and low jitter.
  • Video streaming: Needs high bandwidth (> 1 Mbps) and low jitter.
  • File transfer: Tolerates delay, needs reliable delivery.
  • Sensor data: May need very low energy, not concerned with delay.

Standard routing (shortest path) does not consider these requirements. QoS routing selects paths that satisfy specific quality constraints.

QoS Parameters:

ParameterDescription
BandwidthMinimum link capacity required
DelayMaximum end-to-end delay allowed
JitterMaximum variation in delay
Packet Loss RateMaximum fraction of packets that can be dropped
ReliabilityProbability of successful delivery

QoS Routing Approaches:

1. Ticket-Based QoS Routing

  • Source issues "tickets" β€” each ticket allows searching one path.
  • More tickets = more paths explored = higher chance of finding QoS path.
  • Trade-off between overhead and success rate.

2. Imprecise State Information QoS Routing

  • QoS routing typically needs global state (link bandwidth, delay) β€” expensive in MANETs.
  • Use approximate/imprecise state information to make routing decisions.
  • Good enough in practice without the full overhead.

3. CEDAR (Core Extraction Distributed Ad hoc Routing)

  • Builds a core (connected dominating set of nodes).
  • Core nodes propagate QoS state information.
  • Source initiates QoS path discovery through the core.

Challenges in QoS Routing for MANETs:

  • QoS guarantees collapse when routes change due to mobility.
  • Resource reservation (RSVP-style) is hard in dynamic networks.
  • Gathering accurate link state information costs energy and bandwidth.

8.4 Summary β€” Other Routing Algorithms

Algorithm TypeGoalMetric UsedKey Challenge
Power-awareMaximize network lifetimeRemaining battery, transmission powerDynamic battery levels, selfish nodes
MultipathFault tolerance, load balancingMultiple path metricsOverhead, path correlation
QoSMeet application requirementsDelay, bandwidth, jitter, lossDynamic topology breaks guarantees

Quick Revision Points

Ad Hoc Networks:

  • No fixed infrastructure, self-organizing, multi-hop.
  • Types: MANET (mobile), VANET (vehicles), WSN (sensors).

MANET Characteristics (remember with "DMBESS"):

  • Dynamic topology
  • Multi-hop routing
  • Bandwidth constrained
  • Energy constrained
  • Security limited
  • Self-organizing, Scalability challenges

MANET Applications:

  • Military, disaster relief, PAN, VANET, commercial, education, healthcare.

MANET Challenges:

  • Routing, security (blackhole, wormhole, Sybil), QoS, energy, scalability, hidden/exposed node.

Hidden Node vs Exposed Node:

Hidden:  A and C both transmit to B β†’ collision (A and C cannot hear each other)
Exposed: C delays transmission because it hears B→A, but C's transmission to D is safe

Routing Protocol Classification Criteria:

  • Timing (proactive / reactive / hybrid)
  • Initiator (source / destination)
  • Info used (topology / position / energy)
  • Number of paths (single / multipath)
  • Structure (flat / hierarchical)

Taxonomy:

MANET Routing
β”œβ”€β”€ Topology-Based
β”‚   β”œβ”€β”€ Proactive: DSDV, OLSR
β”‚   β”œβ”€β”€ Reactive: AODV, DSR
β”‚   └── Hybrid: ZRP
β”œβ”€β”€ Position-Based: GPSR, LAR
└── Other: Power-aware, Multipath, QoS

Proactive vs Reactive β€” Key Difference:

ProactiveReactive
Route ready?AlwaysOnly after discovery
OverheadConstant (periodic)Burst (on demand)
LatencyLowHigh (first packet)
ExamplesDSDV, OLSRAODV, DSR

AODV Key Points:

  • RREQ (flood) β†’ RREP (unicast back) β†’ Data β†’ RERR (on failure).
  • Sequence numbers prevent loops and stale routes.
  • Routing table per node (unlike DSR which embeds full route in header).

DSR Key Points:

  • Source routing β€” full path in every packet header.
  • Route cache β€” nodes store overheard routes.
  • Header overhead grows with path length.

GPSR Key Points:

  • Greedy mode: forward to neighbor closest to destination.
  • Perimeter mode: right-hand rule when greedy fails (void).
  • Stateless β€” no routing tables.
  • Requires GPS on every node.

Power-Aware Routing Goals:

  • Minimize total power, maximize minimum battery, balance energy load.

Multipath Routing Benefits:

  • Fault tolerance, load balancing, throughput, security.

QoS Parameters:

  • Bandwidth, delay, jitter, packet loss, reliability.

Expected Exam Questions

PYQs will be added after analysis β€” check back soon.


These notes were compiled by Deepak Modi
Last updated: May 2026

Found an error or want to contribute?

This content is open-source and maintained by the community. Help us improve it!