Sunteți pe pagina 1din 49

Computer Networks 55 (2011) 3032–3080

Contents lists available at ScienceDirect

Computer Networks
journal homepage: www.elsevier.com/locate/comnet

Survey Paper

Routing protocols in ad hoc networks: A survey


Azzedine Boukerche a,1, Begumhan Turgut b,2, Nevin Aydin c,3, Mohammad Z. Ahmad d,4,
Ladislau Bölöni d,5, Damla Turgut d,⇑
a
University of Ottawa, School of Information Technology and Engineering (SITE), 800 King Edward Avenue, Ottawa, Ontario, Canada K1N 6N5
b
Rutgers, The State University of New Jersey, Department of Computer Science, 110 Frelinghuysen Road, Piscataway, NJ 08854-8019, United States
c
Istanbul Arel University, Department of Industrial Engineering, Sefaköy, Küçükçekmece, Istanbul, Turkey
d
University of Central Florida, Department of Electrical Engineering and Computer Science, P.O. Box 162362, Orlando, FL 32816-2362, United States

a r t i c l e i n f o a b s t r a c t

Article history: Ad hoc wireless networks perform the difficult task of multi-hop communication in an
Received 19 February 2010 environment without a dedicated infrastructure, with mobile nodes and changing network
Received in revised form 6 March 2011 topology. Different deployments exhibit various constraints, such as energy limitations,
Accepted 12 May 2011
opportunities, such as the knowledge of the physical location of the nodes in certain sce-
Available online 25 May 2011
Responsible Editor: A. Al-Dhelaan
narios, and requirements, such as real-time or multi-cast communication. In the last
15 years, the wireless networking community designed hundreds of new routing protocols
targeting the various scenarios of this design space. The objective of this paper is to create a
Keywords:
Ad hoc networks
taxonomy of the ad hoc routing protocols, and to survey and compare representative
Sensor networks examples for each class of protocols. We strive to uncover the requirements considered
Routing protocols by the different protocols, the resource limitations under which they operate, and the
design decisions made by the authors.
Ó 2011 Elsevier B.V. All rights reserved.

1. Introduction networks and time-tested networking protocols. In such


networks, all the nodes connect to an access point which
Wireless local area networks based on the 802.11a, b, g usually has a wired connection to the Internet. From the
and n standards became one of the most ubiquitous ways point of view of the network and higher layers, this first
of networking with mobile nodes. Most of these networks, hop can be approximated as an Ethernet-type shared med-
however, are deployed in the configuration which can be ium. In this scenario the nodes connected to the same
called ‘‘wired everywhere, except the first hop’’. If the goal wireless LAN communicate with each other only indirectly.
of the user of the mobile computer is to connect to a web- There are, however, many important applications
site located halfway around the world, the best strategy is where this model is not applicable. First, even if the goal
to escape as quickly as possible from the challenges of is Internet access, the access point might not be able to
wireless domain and enter the reliability of fiber optic cover all the relevant mobile nodes due to limitations in
transmission range, cost or access rights considerations.
Another case is when Internet access is not desired (or is
⇑ Corresponding author. Tel.: +1 407 823 6171; fax: +1 407 823 5835.
secondary importance), the main application being to com-
E-mail addresses: boukerch@site.uottawa.ca (A. Boukerche), bturgut@
cs.rutgers.edu (B. Turgut), nevinaydin@arel.edu.tr (Nevin Aydin), municate locally among a group of (potentially mobile)
zubair@eecs.ucf.edu (M.Z. Ahmad), lboloni@eecs.ucf.edu (L. Bölöni), nodes.
turgut@eecs.ucf.edu (D. Turgut). These scenarios can be serviced only if we allow some
1
Tel.: +1 613 562 5800x6712; fax: +1 613 562 5664. (possibly all) routing hops to be performed in the wireless
2
Tel.: +1 732 445 3546; fax: +1 732 445 0537.
3 domain. Such networks can be set up in any location in an
Tel.: +90 0212 540 96 96; fax: +90 0212 540 97 97.
4
Tel.: +1 407 823 3327; fax: +1 407 823 5835. ad hoc manner, without the need of an existing wired
5
Tel.: +1 407 823 2320; fax: +1 407 823 5835. infrastructure.

1389-1286/$ - see front matter Ó 2011 Elsevier B.V. All rights reserved.
doi:10.1016/j.comnet.2011.05.010
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3033

These networks are known as ad hoc wireless networks too expensive to be considered disposable and too large
[92], other proposed names being infrastructureless wireless to be deployed by random spreading.
networks, instant infrastructure [8] and mobile-mesh net- In the following we briefly survey some application
working [140]. areas of interest for ad hoc networks. There are some
One of the major technological challenges of such net- applications where ad hoc networks are the only possible
works is that they require new types of routing protocols. solution, for instance, networking in areas where no
As opposed to the wired infrastructure, there are no infrastructure is available. Early work in ad hoc networks
dedicated router nodes: the task of routing needs to be per- frequently assumed such radical scenarios. Beyond these
formed by the user nodes, which can be mobile, unreliable applications, however, there is a much larger field of po-
and have limited energy and other resources. tential applications where ad hoc networks compete with
The goal of this paper is to review the collection of tech- other possible technical solutions. Finally, there are appli-
nologies which have been proposed for routing in ad hoc cation areas where ad hoc networks must be part of a com-
networks. There are literally hundreds of different ad hoc bination of technologies.
routing protocols proposed. We strive not for a simple enu- Network extension: In this application area, the net-
meration of this extensive literature, but we try to uncover working infrastructure exists, but it has insufficient cover-
the design decisions behind the various protocols, their age. The goal of the participants of the network is internet
interrelationship, and the specific requirements taken into access, that is, their main communication partners are out-
consideration by the designers. side the ad hoc network. The goal of the ad hoc network is
This way, we hope to provide the student and research- to extend the internet connectivity beyond the reach of the
er with a more clear description of the state of the art. We access points. Most routes of the ad hoc network will con-
hope that this systematic approach will help the researcher nect the access points to the nodes.
understand the open challenges of the field, as well as Local interconnection networks: In this application
those which have been satisfactorily solved. This can help area, no infrastructure is available (or the nodes choose
a researcher position its work in the context of the state not to use it). For instance, when networking in remote areas
of the art, assess its originality and avoid duplication of (such as in a scenario involving a camp of archaeologists in
existing work. The survey can also help the practitioners the Central American forest), the infrastructure might not
choose the most adequate technology for a specific have been there to begin with. In other applications, such
deployment. as disaster response, the previously existing infrastructure
Early ad hoc routing protocols have been classified into has collapsed due to a natural disaster. In these applications,
on-demand and table-driven protocols. Between these two, the communication partners of most nodes are within the
several hybrid approaches have been developed. The network. Example applications include point-to-point mes-
increasing size of the ad hoc networks considered made saging and audio and video conferencing.
necessary the use of techniques such as geographical rout- Ubiquitous computing: This area covers networking
ing and hierarchical routing. Finally, in many deployments between devices embedded in the environment. Commu-
of ad hoc networks, the problem of energy conservation nication patterns in ubiquitous computing are strongly
takes precedence from all the other performance metrics, influenced by the physical location and proximity – de-
thus power aware routing protocols will be treated as a vices which are close to each other are more likely to com-
separate class. municate then remote devices. In contrast, on the wired
internet, physical location is almost irrelevant. Ad hoc net-
works are a particularly good match for proximity based
2. Applications of ad hoc networks communication. Note, however, that in areas where a per-
vasive infrastructure is available, ad hoc networks compete
Ad hoc networks, defined in the broad sense by of the with solutions which rely on the convenience of the default
term as wireless networking in the absence of a wired infrastructure, even when technologically suboptimal. A
infrastructure, have a wide range of potential applications. recent example involves solutions where a TV set-top
Some of these applications have been already identified in box is controlled from a smartphone, through an internet
early ad hoc literature [92]. Other applications, however, connection traversing dozens of routers, even when the
were enabled only recently by the shifting landscape of two devices are several feet from each other.
computing and communication. In the last decade, for in- Urban sensing: This application area exploits the sens-
stance, the default method for first hop internet access ing and computation capabilities of smartphones, together
shifted from the Ethernet line to the WiFi connection. In with the wide range of their deployment in urban areas. Ur-
the last three years, smartphones and tablets emerged as ban sensing is characterized by distributed sensing or data
a multi-purpose computing platform, relying exclusively collection, and, in many cases, by distributed data custom-
on wireless connectivity and replacing personal digital ers. Smartphones can use both infrastructure based access
assistants and (in some cases) low-end mobile computers. and as well as ad hoc connections. Ad hoc approaches have
These technological advances have enabled applications the advantage of lower energy consumption, lower overall
such as urban sensing which could not have been predicted bandwidth consumption and improved privacy – but they
ten years ago. On the other hand, some wireless technolo- inevitably involve more complex interaction patterns.
gies progressed at a slower pace than predicted: vehicle to Vehicular networking: This area covers applications
vehicle technologies are still in the prototype phase, home where one of the communication partners is a vehicle. This
automation systems are rare, and sensing devices are still definition covers a very wide range of technologies.
3034 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

One type of vehicular networking involves the short loss, control overhead and energy usage. However, the rel-
range communication between the vehicle and personal ative priorities of these criteria differ among application
devices carried by the passengers. The most widely de- areas. In addition, in some applications, ad hoc networking
ployed systems rely on Bluetooth, but other technologies, is really the only feasible solution, while in other applica-
such as WiFi have also been suggested and implemented. tions, ad hoc networking competes with other technolo-
Note that many devices, while connected to the local net- gies. Thus, the performance expectations of the ad hoc
work of the vehicle, can also maintain long range wireless networks differ from application to application and the
connections, for instance through 3G cellular telephony, architecture of the ad hoc network, thus each application
and, increasingly, WiMAX and LTE. area and ad hoc network type must be evaluated against
Another area of vehicular networking is vehicle to vehi- a different set of metrics (although some metrics can be
cle (V2V) communication. Due to the high relative speed of applied across several protocol categories).
the participants, the short duration of the encounters and In the reminder of this paper, we organize the discussed
the peer-to-peer nature of the communication, V2V tech- routing protocols into nine categories based on their
nologies are a good match for ad hoc networking. V2V underlying architectural framework as follows (also shown
has applications in convoy driving, accident pre-emption, in Fig. 1).
and lane changes with pre-negotiated lane clearance. One
significant obstacle of the deployment of V2V technologies  Source-initiated (Reactive or on-demand) (Section 3.1).
relate to achieving a critical mass of deployment – a single  Table-driven (Pro-active) (Section 3.2).
V2V-capable surrounded with vehicles which cannot  Hybrid (Section 3.3).
understand it cannot achieve any of the benefits of the  Location-aware (Geographical) (Section 3.4).
technology.  Multipath (Section 3.5).
A final area of vehicular networking is vehicle-to-infra-  Hierarchical (Section 3.6).
structure (V2I) communication. Calling a V2I system an  Multicast (Section 3.7).
‘‘ad hoc network’’ appears to be self-contradictory – as we  Geographical Multicast (Section 3.8).
defined the lack of infrastructure the defining characteristic  Power-aware (Section 3.9).
of ad hoc networks. Yet, vehicles have a high relative speed
with respect to any specific access point in the infrastruc- 3.1. Source-initiated protocols
ture – the communication needs to be either very brief, or
the system needs to handle very fast connection hand-offs, Source-initiated routing represents a class of routing
or it needs to be able to communicate through intermittent protocols where the route is created only when the source
connections. Thus, the infrastructure in V2I communica- requests a route to a destination. The route is created
tions has more in common with the typical mobile interac- through a route discovery procedure which involves flood-
tion partner in ad hoc networks, than the highly reliable, ing the network with route request packets are flooded to
quasi-permanent connections characterizing infrastructure starting with the immediate neighbors of the source. Once
in traditional networking. The most popular applications of a route is formed or multiple routes are obtained to the
V2I are currently toll collection systems. However, these destination, the route discovery process comes to an end.
systems will also offer significant support for the emerging A route maintenance procedure maintains the continuity
intelligent transportation systems. of the route for the timespan it is needed by the source.
Personal area networks: This application area refers to Dynamic source routing (DSR) [57]: Johnson et al. pro-
networking among the portable devices carried by a single pose one of the most widely known routing algorithms,
user. As long as these devices move with the user, this sys- called Dynamic Source Routing which is an ‘‘on-demand’’
tem can be considered as a local area network with the algorithm and it has route discovery and route maintenance
individual components being in a fixed relative position. phases.
The most popular current PAN technology is based on the Route discovery contains both route request and route
Bluetooth standards. Quite often, one or more of these de- reply messages. In the route discovery phase, when a node
vices has its own internet connectivity through long range wishes to send a message, it first broadcasts a route re-
communication. Very similarly with the vehicular net- quest packet to its neighbors. Every node within a broad-
works, aspects of ad hoc networking come into play when cast range adds their node id to the route request packet
the personal networks of different users will need to inter- and rebroadcasts. Eventually, one of the broadcast mes-
act, or when devices of one users’ PAN needs to establish a sages will reach either the destination or a node which
short range communication with infrastructure elements has a recent route to the destination. Since each node
(such as when performing payment processing through maintains a route cache, it first checks its cache for a route
near-field communication). that matches the requested destination. Maintaining a
route cache in every node reduces the overhead generated
by a route discovery phase. If a route is found in the route
3. Ad hoc routing protocols and comparisons cache, the node will return a route reply message to the
source node rather than forwarding the route request mes-
Mirroring the diversity of applications areas, research- sage further. The first packet that reaches the destination
ers have proposed a wide range of routing protocols for node will have a complete route. DSR assumes that the
ad hoc networks. The basic goals of these protocols are path obtained is the shortest since it takes into consider-
the same: maximize throughput while minimizing packet ation the first packet to arrive at the destination node. A
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3035

Routing protocols in ad hoc networks

Source-
Hybrid Multi-path Multicast Power-aware
initiated

DSR ZRP CHAMP DCMP DEAR

AODV FSR AOMDV ADMR Singh et. al

TORA LANMAR Location- SMR AMRoute Geographical Scott & Bombos


Table-driven Hierarchical
aware Multicast
ABR RDMAR NTBR Li et al. Chang & Tassiulas

SSBR DSDV SLURP LAR Das et al. HSR QMRPCAH DGR CLUSTERPOW & MINPOW

Goff et al. R-DSDV ZHLS DREAM TMRP CEDAR Wu & Jia GAMER Mahmood & Comaniciu

Randaccio &
AQOR OLSR DST GPSR Liu et al. Eriksson et al. GeoGRID MEHDSR
Atzori

ARA HOLSR DDR DRM SMORT H-LANMAR Fireworks GeoTORA Liang & Liu

ROAM CGSR A4LP Colagrosso et al. SecMR PPMA Karayiannis & Nadella

FORP WRP HOPNET ALARM Ramasubramanian et al. Gui & Mohapatra Mohanoor et al.

Gong et al. GSR LRHR REGR REEF ALMA

SCaTR STAR FZRP LAKER MuSeQoR Sun & Li

DAR Tam et al. ANSI Blazevic et al. AQM

FDG QOLSR Bamis et al. MORA CBM

LLR Souihli et al. OGRP DDM

Beraldi Song et al. ROMANT

OD-PFS SOLAR EraMobile

QMRB LBLSP

Abdulai et al. GLR

AODV-ABR MER

Yu et al. TBR

LBAQ

LSR

SWORP

RPR

GRP

SLR

Beraldi et al.

LDR

DBR2P

RBR

Fig. 1. Categories of ad hoc routing protocols.

route reply packet is sent to the source which contains the an acknowledgement. This route error packet is sent to the
complete route from the source to the destination. Thus, source in order to initiate a new route discovery phase.
the source node knows its route to the destination node Upon receiving the route error message, nodes remove
and can initiate the routing of the data packets. The source from their route caches the route entry using the broken
caches this route in its route cache. link.
In the route maintenance phase, route error and Ad hoc on-demand distance vector (AODV) [94]: The
acknowledgements packets are used. DSR ensures the valid- AODV routing protocol was developed by Perkins and
ity of the existing routes based on the acknowledgements Royer as an improvement to the Destination-Sequenced
received from the neighboring nodes that data packets Distance-Vector (DSDV) routing algorithm [93]. AODV
have been transmitted to the next hop. Acknowledgement aims to reduce the number of broadcast messages for-
packets also include passive acknowledgements as the node warded throughout the network by discovering routes
overhears the next hop neighbor is forwarding the on-demand instead of keeping a complete up-to-date route
packet along the route to the destination. A route error information.
packet is generated when a node encounters a transmis- A source node seeking to send a data packet to a desti-
sion problem which means that a node has failed to receive nation node checks its route table to see if it has a valid
3036 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

route to the destination node. If a route exists, it simply In TORA control messages are localized to a small set of
forwards the packets to the next hop along the way to nodes nearby the topological change. Nodes maintain rout-
the destination. On the other hand, if there is no route in ing information about their immediate one-hop neighbors.
the table, the source node begins a route discovery process. The three basic functions of the protocol are route creation,
It broadcasts a route request (RREQ) packet to its immediate route maintenance, and route erasure.
neighbors and those nodes broadcast further to their Nodes use a ‘‘height’’ metric to establish a directed cyc-
neighbors until the request either reaches an intermediate lic graph (DAG) rooted at the destination during the route
node with a route to the destination or the destination creation and route maintenance phases. The link can be
node itself. The route request packet contains the IP ad- either an upstream or downstream based on the relative
dress of the source node, current sequence number, the height metric of the adjacent nodes. TORA’s metric con-
IP address of the destination node and the last known se- tains the unique node ID, the logical time of a link failure,
quence number. Fig. 2 illustrates the forward and reverse the unique ID of a node that defined the new reference
path formation in the AODV protocol. An intermediate level, a reflection indicator bit, and a propagation ordering
node can reply to the route request packet only if it has a parameter. Establishment of DAG resembles the query/re-
destination sequence number that is greater than or equal ply process in Lightweight Mobile Routing (LMR) [34].
to the number contained in the route request packet head- Route maintenance is necessary when any of the links in
er. When the intermediate nodes forward route request DAG is broken. Fig. 3 describes the control flow of route
packets to their neighbors, they record in their route tables maintenance in TORA.
the address of the neighbor from which the first copy of the The main strength of the TORA protocol is its approach
packet has arrived. This recorded information is later used to handling the link failures. TORA’s reaction to link fail-
to construct the reverse path for the route reply (RREP) ures is optimistic: it reverses the links to re-position the
packet. If the same RREQ packets arrive later on, they are DAG for searching an alternate path. Effectively, each link
discarded. When the RREP packet arrives from the destina- reversal sequence searches for alternative routes to the
tion or the intermediate node, the nodes forward it along destination. This search mechanism generally requires a
the established reverse path and store the forward route single-pass of the distributed algorithm since the routing
entry in their route table by the use of symmetric links. tables are modified simultaneously during the outward
Route maintenance is required if either the destination or phase of the search mechanism. Other routing algorithms
the intermediate node moves away and it is performed such as LMR use a two-passes search for the same task,
by sending a link failure notification message to each of its while both DSR and AODV use a three-pass procedure.
upstream neighbors to ensure the deletion of that particu- TORA achieves its single-pass procedure with the assump-
lar part of the route. Once the message reaches to source tion that all the nodes have synchronized clocks (via GPS)
node, it then re-initiates the route discovery process. to create a temporal order of topological change of events.
Temporally ordered routing algorithm (TORA) The ‘‘height’’ metric is dependent on the logical time of a
[89,139]: Park and Corson proposed TORA, an adaptive link failure.
and scalable routing algorithm based on the concept of link Associativity-based routing (ABR) [116]: Toh proposes
reversal. It finds multiple routes from a source to a destina- the ABR algorithm which considers route stability as the
tion in a highly dynamic mobile networking environment. most important factor in selecting a route. Routes are dis-
covered by broadcasting a broadcast query request packet.
Using these packets, the destination becomes aware of all
possible routes between itself and the source.
The ABR algorithm maintains a ‘‘degree of associativity’’
D by using a mechanism called associativity ticks. Each node
D
maintains a tick value for each neighbors, which is increase
by one every time a periodic link layer HELLO message is
received from the neighbor. Once the tick value reaches a
specified threshold value, it means that the route is stable.
If the neighbor goes out of the range, then the tick value is
reset to zero. Hence a tick level above the threshold value
is an indicator of a rather stable association between these
two nodes. Once a destination has received the broadcast
query packets, it has to decide which path to select by
S S checking the tick-associativity of the nodes. The route with
Timeout
the highest degree of associativity is selected since it is
considered the most stable of the available routes.
(a) (b) Signal stability-based adaptive routing (SSBR) [37]:
Dube et al. propose the SSBR protocol in which the main
Fig. 2. (a) Reverse path formation: the reverse path is set up from all the routing criteria are the signal and location stability. As in
nodes back to the source through RREQ message traveling in the network. other on-demand routing protocols, the route request is
(b) Forward path formation: the forward path is constructed as the RREP
message from the destination node D to source node S. The source node
broadcast throughout the network, the destination replies
start sending data when it received the first RREP message to the sender with the route reply message and then the sender sends
[94]. data through the selected route. Additionally, the signal
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3037

Node i loses its last


downstream link

YES Was the link


NO
lost due to a
failure?

Case 1:
Generate new Do all the neighbors NO
reference level YES
have the same reference
level?

NO Case 2:
YES Is the reflection bit (r) in the Propagate the highest
reference level set to 1 ? neighbor's reference level

YES Did this node originally NO Case 3:


define that reference level Reflect back a
(oid = i)? higher level

Case 4: Case 5:
Partition detected, Generate new
erase invalid routes reference level

Fig. 3. Flow diagram of route maintenance in TORA [89]. The only routes with a height greater than NULL value are maintained. The figures shows all five
possible paths in the form of a decision tree which is based on the state of the node and the preceding event.

strength (link quality) between neighboring nodes plays a The paper also discusses two further enhancements to
major role in the route selection process in this protocol. the route selection process. The first selection concerns
SSBR consists of two sub-protocols: the Dynamic Rout- the selection of alternative routes from a set which In the
ing Protocol (DRP) and the Static Routing Protocol (SRP). first case, the link strength is added for each hop into the
DRP interacts with the network interface device driver route request packet and then forwarded towards the des-
through an API to determine the actual strength of a re- tination. In this case, the destination does not select the
ceived signal. Using this signal information the DRP main- first route request packet received, but waits for a period
tains a signal stability table which categorizes each link of time to choose the best route among all the route re-
with the neighboring nodes as strong or weak. This table quests within a set time interval. The second improvement
is updated with every new packet received. For instance, suggests that any intermediate node can make a gracious
if a HELLO packet is received, the signal strength is moni- route reply for a route it already has a prior information
tored and the signal stability table is upgraded while for about.
other packets such as route update packets, data packets, Preemptive routing in ad hoc networks [47]: In con-
and so on, the packet is sent to the SRP for further process- ventional protocols, a path is considered broken only after
ing. The SRP performs the routine tasks such as forwarding several retransmissions have timed out. The algorithm
packets according to the existing routing table, replying to introduced by Goff et al. attempts to initiate the discovery
route requests, and so on. process of an alternate route just before the probable route
The route request is given an option on the type of link failure. The algorithm generates a preemptive warning
it requests, i.e., strong, weak or a combination of both. If when the signal power of the packet received drops below
the route request specifies only strong links, all the route a predefined preemptive threshold. The correct setting of
request packets coming from a perceived weaker link are the preemptive threshold is the main challenge of the algo-
dropped. Thus, the final discovered path consists of only rithm. If the value is too high, unnecessary warnings may
strong links. If there are multiple paths from source to des- be generated which can lead to greater overhead, unneces-
tination using strong links, the destination can choose sary route discoveries, and switches to possibly lower
among them (or it might simply choose the first path it re- quality paths. On the other hand, if the value is too low,
ceives). If no strong links are found, the protocol could fall the path breaks much earlier than the alternate route is
back on other available weaker links. selected. This leaves a short time period for building an
3038 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

alternate path. As temporary channel fading can often by using concepts of swarm intelligence and the ant colony
create a weak reception without leading to route failure, meta-heuristic. This class of algorithms aims to solve the
the algorithm uses successive ‘‘query’’ packets to decide complex optimization and collaboration problems without
whether the generated warnings are valid. direct communication among the participants. Indirect
Ad hoc QoS on-demand routing (AQOR) [132]: Xue communication is achieved by stigmergy, the process of
and Ganz propose AQOR, an on-demand routing protocol leaving traces in the environment, similar to the behavior
enabling QoS support in terms of bandwidth and end-to- of ants leaving pheromone signals.
end delay. The AQOR mechanism estimates the bandwidth The route discovery phase uses two types of control
and end-to-end delay requirements and use these metrics packets: the forward ant (FANT) and the backward ant
to make admission and resource reservation decisions. (BANT). The FANT establishes the pheromone track to the
The AQOR integrates on-demand route discovery, sig- source node while the BANT establishes the pheromone
naling functions for resource reservations, and hop-by- track to the destination. When the route is required, the
hop routing to provide QoS support in ad hoc networks. source broadcasts FANT packets to all its neighbors. A node
Since most QoS violations are detected at the destination which receives a FANT for the first time creates a routing
node, the routing overhead generated can be reduced by table record which contains the destination address, next
initiating the route recovery process at the destination hop, pheromone value. The source address of the FANT is
node. Route maintenance is accomplished by sending peri- taken as the destination address, the previous node ad-
odic HELLO messages. Routes are discovered on-demand dress as the next hop, and the pheromone value is calcu-
by a limited flooding mechanism. The requested band- lated based on the total number of hops required by the
width and end-to-end delay values are specified within FANT to reach a particular node. When the FANT reaches
the route request packet. The bandwidth requirements the destination, the node updates its own information
are calculated based on the available link capacity and and sends the BANT back. Once, the BANT reaches the
the bandwidth used by the flow. If this request is accepted, source, the path can be used. Figs. 5 and 6 show the for-
the node updates its routing table with an explored status ward and backward ants’ route discovery phases.
and broadcasts it to all its neighbors. However, if no reply The ARA algorithm doesn’t need special route mainte-
is received in a specified time, the route entry is removed nance packets since it uses the transmitted data packets
from the node’s table and late-arriving replies are simply to maintain the route. The pheromone value of the path
ignored. Route caching is not used since the route request is increased by d/ each time a data packet is forwarded
packets are forwarded from the node to the destination to along the path, but decreases in time when no packets
determine the bandwidth and end-to-end delay require- are transmitted.
ments. To further reduce control overhead, the packets Routing on-demand acyclic multipath (ROAM) [98]:
have a time-to-live (TTL) parameter which stops the pack- ROAM algorithm by Raju and Garcia–Luna–Aceves coordi-
ets from traveling unnecessarily throughout the network. nates among nodes in directed acyclic subgraphs. It is an
ARA-The ant-colony based routing algorithms [50]: extension of the DUAL [41] routing algorithm. The ROAM
Gunes et al. present a novel technique for ad hoc routing algorithm guarantees that route search query will fail to
return a destination path only is all the routers agree that
Path 4 the destination is unreachable.
Each router in ROAM maintains distance, routing, and link
Path 3 cost tables. While the distance table maintains the distances
of nodes for each destination and neighbors from the respec-
tive node, the routing table contains the distance to each
destination, the feasible distance and the reported distance.
Nest Food
The link cost table provides the link costs to each of the adja-
cent neighbors of the router. A router updates its routing ta-
Maximum pheromone ble for a destination when it needs to: (i) add an entry for a
Path 1 Path 2 concentration on the particular destination; (ii) modify its distance to the desti-
shortest path
nation; and (iii) erase the entry for the destination.
Fig. 4. Pheromone concentration along the shortest path used by ants to The routers in ROAM are either in active or passive states.
discover food from their nest [50]. If a router has send queries to all its neighbors and awaiting

5
F
2 F

F 4 D
F
s
F
F
F F
1 3 6

Fig. 5. Forward ant route discovery phase. A forward ant (F) is send from the sender (S) toward the destination node (D). The forward ant is relayed by other
nodes, which initialize their routing table and the pheromone values [50].
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3039

5
B
2 B

4 D
s B
B B
B B
1 3 6

Fig. 6. Backward ant route discovery phase. The backward ant (B) has the same task as the forward ant. It is send by the destination node toward the source
node [50].

a reply, it is in active state, otherwise in passive state. Selec- On-demand routing and channel assignment in mul-
tion of loop-free paths allows a router to select a neighbor ti-channel mobile ad hoc networks [48]: Gong et al. con-
as its successor only if it is a feasible successor. This provides centrates mainly on designing an efficient channel
a shortest loop-free path to the destination. A when it re- assignment algorithm at the MAC layer to be used with
quires a path to a destination, the source router starts a dif- most on-demand routing strategies at the network level.
fusion search, with the packet propagated through routers The authors state that there are intra-flow and inter-flow
which have no entry of the node. The first router with an interferences due to adjacent nodes on the same or differ-
available route to the destination responds to the source ent channels respectively. To mitigate the interference
with the distance to the node. At the end of the search, problems, the authors implement two enhanced versions
either the source has a finite distance to the destination of the AODV routing protocol: Enhanced 2-hop CA-AODV
or the destination is unreachable. and Enhanced k-hop CA-AODV. In these algorithms, the
The flow oriented routing protocol (FORP) [113]: The RREQ and RREP messages are similar to AODV with the dif-
FORP protocol proposed by Su and Gerla aims to transmit ference of the neighbor table at each node consisting of
real-time data streams in ad hoc networks, which require both the route and the indices of the channels already cho-
in-order delivery of packets with tight delivery bounds. If sen. If the node is not assigned to a channel, a channel is
alternate routes are not available to immediately redirect randomly chosen and assigned from the available list
the data packets in case of route failures, real-time packets (see Fig. 7). RREP messages also carry channel information
may be dropped. FORP introduces the ‘‘multi-hop handoff’’ which is updated by each node receiving the RREP. At the
mechanism in which the nodes use their mobility informa- end of the RREQ-RREP cycle, every node in the route is as-
tion to determine future route changes resulting in signed a channel which is different from any of its k-hop
rebuilding of an alternate routes much sooner. (for the k-hop extension of the algorithm) neighbors on
Similarly to other on-demand schemes, FORP maintains the same route.
routing information only for active source/destination Space-content adaptive time routing (SCaTR) [17]:
pairs. The protocol predicts the link expiration time (LET) Boice et al. present a routing framework which takes into
for each hop on the route to calculate the route expiration consideration the possibility of intermittent connectivity
time (RET). During the route discovery phase, the source in a mobile ad hoc network. SCaTR uses past connectivity
broadcasts a Flow-REQ message containing a sequence information by defining proxy nodes to route traffic to-
number, source ID, and destination ID. Each node appends wards the destination when no direct route is available.
its own ID and the LET of the last link in which the message It is built upon the existing AODV protocol in such a way
was received before forwarding to the next hop. When the that when the network is fully connected, it works identi-
Flow-REQ arrives at the destination, it contains the list of cal to AODV. When a network partition occurs, proxy
all the routes travelled and the LETs for each hop. Using nodes are created based on the distance of a node to the
this information, the destination calculates the RET by destination. A node closer to the destination advertizes it-
selecting the minimum LET value for the route. The nodes self as the proxy destination and buffers messages on the
are assumed to have a common time reference from GPS route until the final destination is discovered or another
for instance. Once the route is selected, a Flow-SETUP node is selected as a better proxy. This design feature en-
message travels to the source along the chosen path. ables the protocol to behave no worse than the standard
While the connection is in progress, the intermediate AODV in most cases (when the network is entirely con-
nodes continue adding the LETs to the forwarded packets nected). During the route discovery phase if a route to
to enable the destination to keep track of the RET predic- the destination is not established, a proxy request (PREQ)
tion. If the destination determines that a ‘‘critical time’’ is is forwarded to find the nearest proxy destination. PREQ
reached, i.e. the route is close to expire, a Flow-HANDOFF could also request for multiple destinations and a proxy re-
message is generated and propagated throughout the net- ply (PREP) is sent back by the responding node. Each proxy
work. These Flow-HANDOFF messages reach the source node has a finite buffer to store different messages from
and based on their LETs and RET, the source determines varying source–destination pairs. The PREP message con-
the new route. The ‘‘critical time’’ is calculated as Tc = RET tains updated information of the proxy’s contact value
– Td where RET is the route expiration time and Td is the for the destination, its remaining buffer space, and number
delay experienced by the last packet arrived on the same of messages stored for the particular source–destination
route. pair from which it has received the PREQ. Each node also
3040 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Init

Wait

recvRREQ recvRREP

Update set A Update set A

No No
Am I an active node? Channel conflict?

Pick a random Yes Yes


channel
Keep my channel Update my channel

No Yes
Know a route to destination? Am I the source?

Yes No Route
sendRREQ
established
sendRREP sendRREP

Fig. 7. Algorithm flowchart of CA-AODV [48]. This figure shows that if the node does not have a pre-assigned channel, the channel will be chosen randomly
from the list of available channels.

has a separate buffer for its own messages. The source the forwarding dilemma game (FDG), is composed of the
node collects all the PREPs, compares the contact values number of players receiving the packet, the forwarding
obtained and updates its table with the highest value along cost and the network gain factor and it offers primarily
with the route where the data packets are forwarded. two strategies – forwarding or dropping the packet. Using
Distributed ant routing (DAR) [104]: Rosati et al. pro- a mixed strategy Nash equilibrium, the probability of for-
pose a distributed routing algorithm based on ant behavior warding the flooding messages are calculated. The FDG is
in colonies. Ant colony optimization algorithms have been implemented in AODV with the existing HELLO messages
widely used in MANETs and the authors aim to design an used in neighbor discovery. Since the HELLO messages
algorithm incorporating the salient features of many exist- are forwarded only to the winners of the game, the number
ing approaches. The main design goal of DAR is to mini- of nodes participating in the route discovery process is re-
mize the computation complexity. Each node contains duced. The structures of the RREQ and RREP packets of
routing tables which are stochastic with the next hop AODV have been modified for the calculation of the prob-
being selected based on weighted probabilites. These prob- ability of packet forwarding.
abilities are calculated based on pheromone trails left by Long lifetime route (LLR) [28]: Cheng and Heinzelman
ants. Forward ants are used to find new paths. If multiple argue that many routes in ad hoc networks are short lived,
paths are available at a node, the next hop could be se- triggering frequent route discovery processes, which in
lected either randomly or the most optimal one. DAR turn account for extra control overhead and packet latency.
mostly uses hop-by-hop optimal forwarding with the for- They propose two techniques which allow the network to
ward ant routed at each node based on probabilites for select long lifetime routes (LLR).
the next hop. Data packets are forwarded deterministically The g-LLR approach is a global approach where the opti-
by selecting the highest probability at every node on the mal LLRs are computed in a centralized manner. As such
path. Thus, a global route is created by using local hop- information is not normally available to the nodes in a net-
by-hop information. work, its importance is mostly as benchmark. The d-LLR
Forwarding Dilemma game (FDG) [85]: Naserian and approach selects long lifetime routes in a distributed man-
Tepe propose a game theoretic approach to forwarding ner, using only local information. The authors show that
flooding packets in MANET with AODV as the underlying the performance of d-LLR closely matches that of g-LLR.
routing protocol. The game is played within the network From a practical implementation point of view, the LLR
only when a node receives a HELLO or any other flooding approach can be used to enhance most existing ad hoc
message since the nodes are the players. The game, called routing algorithms. In addition, having longer lifetime
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3041

routes at the network layer, also improves the performance ple packet forwarding using the well-known route request
of the transport layer protocols built upon them: UDP, TCP (RREQ) and route reply (RREP) cycle. The path includes
as well as wireless-specific variations on TCP such as TCP- the direction of the packet to be forwarded. For example,
NB (no-backoff). N-W-W-S-W-N-N-N-E is a sample path. A transitive
Polarized gossip protocol for path discovery [12]: closure approach is used where each CH maintains an adja-
Beraldi looks at gossip protocols for path discovery, where cency matrix of neighboring CHs with alive links. By calcu-
a node forwards a packet with some predetermined prob- lating successive transitive closures of the adjacency
ability. In contrast to classical gossip algorithms which for- matrix, path existence between a pair of nodes can be com-
ward each message with the same probability, this work puted. The local path restoration in VGA is shown in Fig. 9.
considers the probability dependent on node locations QoS routing with traffic distribution (QMRB) [52]:
and distances between each other. We have the polarizing Ivascu et al. use a mobile routing backbone to support
node n with two gossiping probabilities: pF (the forward QoS in a MANET. The mobile routing backbone (MRB)
probability) and pB (the backward probability). The mes- dynamically distributes traffic within the network and
sage is forwarded with probabilty pF when the node re- selects the route with the best QoS between a source–des-
ceives this message from at least one node which is tination pair. The proposed scheme classifies the nodes in
farther from the destination node than the node itself. the network into QoS routing nodes (QRN), simple routing
Otherwise, it forwards the message with probability pB nodes (SRN) or transceiver nodes (TN). QRNs possess QoS
(see Fig. 8). Distances between nodes can be found by sim- guarantees, SRNs simply route packets through the net-
ple estimates of relative positions between neighbor nodes work while TNs send and receive packets but cannot relay
which can be determined by using periodic beaconing them. The MRB is formed by these different types of nodes
schemes. while it is not essential that all nodes in the network join
On-demand packet forwarding scheme (OD-PFS) [4]: the MRB. Nodes not joining the MRB may still communi-
Al-Karaki and Kamal propose a clustering approach fol- cate with it through a working link.
lowed by a routing protocol exploiting the clustering Node classification for the MRB is computed by the four
framework in MANETs. A fixed and scalable virtual wire- QoS support metrics (QSMs) for each pair of nodes.
less backbone, called the virtual grid architecture (VGA),
is created. The physical network topology is mapped onto  Static resources capacity (SRC): computed by the
a virtual grid topology. The routing is then carried out weighted sum of the size of the node packet queues,
using a combination of hierarchical and virtual backbone speed of the CPU, power of the battery and the maxi-
routing. Nodes are divided into fixed clusters (also called mum available bandwidth.
zones) which require few virtual topology updates. The  Dynamic resources availability (DRA): indicates the cur-
authors show that the virtual topology is stable as long rent load in the resource usage of a node. The usage rate
as at least one mobile node is present in each cluster. With of the static resources are used to calculate the available
clusters being fixed, the architecture becomes simple and dynamic resources.
scalable. Network zoning is accomplished by dividing the
network into disjoint but adjacent regular shape zones.
Zone lengths in homogeneous MANETs are chosen such
that two mobile nodes in adjacent zones can always com- 1 2 3 1 2 3
municate directly with each other. In heterogeneous MAN-
ETs, network topology can be changed by varying the 4 5 6 4 5 6
nodes transmission range. Clusterheads (CHs) are selected
either by periodic elections using an eligibility factor (EF)
7 8 9 7 8 9
or dynamically when needed. CHs can also be elected on-
demand. A simple on-demand packet forwarding scheme
(OD-PFS) is implemented over the VGA. Four standard
directions (North, South, East and West) are used for sim-
(a) (b)
Local

1 2 3 1 2 3
z

4 5 6 4 5 6
s p > p_c Global
d

7 8 9 7 8 9

p < p_c

(c) (d)
Fig. 8. A sketch of the partition of the node of a network. The forwarding clusterhead mobile node
probability for the nodes belonging to Z is higher than the critical value pc.
The nodes outside Z forward a packet with probability lower than pc. [12]. Fig. 9. The illustration of local path restoration in VGA [4].
3042 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

 Neighborhood quality (NQ): the number of nodes in the N = 25


neighborhood of a node which can successfully forward n=6 n=3
packets. n=4
 Link quality and stability (LQS): the power of signal
C
received and the statistical stability of its links.
A B
The node aptitude is computed based on the node clas-
sification by following the formula:
E
MNaptitude ¼ lSRC þ gDRA þ rNQ þ xLQS þ /BW;
n=5 D
where l, g, r, x and / are coefficients and BW is the avail- n = 10
able bandwidth. Once the MRB is set up, route discovery is
initiated using RREQs along the MRB.
Adjusted probabilistic route discovery [1]: Abdulai
et al. observe that rebroadcasting route request packets
Fig. 10. Illustration of two logical groupings of 25 nodes located in sparse
in a MANET leads to extensive control overhead and high and dense regions of a network for the 2P-Scheme algorithm [1].
levels of channel contention. This work proposes two prob-
abilistic methods aiming to reduce the number of RREQ transmissions. These nodes are actually potential candi-
packets using a predetermined fixed-value forwarding prob- dates for replacing a node on the main route in case of a
ability. Unlike other similar algorithms, the proposed failure. These candidate nodes are recorded in the packet
mechanism does not use GPS based devices for location headers and used during the route reconstruction in the fu-
tracking but mainly relies on basic topology information. ture. The route construction uses a main route request
It also uses the minimum connected dominating set (MREQ) packet initially, similar to a RREQ packet in AODV.
(MCDS) requiring global topological information of a net- The MREQ is flooded throughout the network and once it
work. In case of receiving duplicate packets at a node, the arrives at the destination, the main route reply (MRRP) is
forwarding probability is adjusted. The first probabilistic sent back. The MRRP keeps track of the hop count between
route discovery scheme is called the 2P-Scheme in which the source and destination. This hop count is used during
the nodes are categorized into two groups based on their route repair when a particular link on the main route goes
current neighborhood information. If the node is situated down. A repair query (REPQ) packet with the hop count of
in a sparse region, it gets assigned to Group-1 and if in a that node is forwarded in case of the main route failure. A
dense region, it is assigned to Group-2 (see Fig. 10). Nodes node receiving the REPQ checks to see if it has a saved
in Group-1 are allocated a higher forwarding probability route to the destination. If so, it sends a repair reply
than those in Group-2. In the second scheme, 3P-Scheme, (REPR); otherwise, the hop count value is compared with
the nodes are classified into three groups: Group-1 for its own hop count. If its hop count is smaller, it propagates
sparse regions, Group-2 for medium dense regions and the REPQ packet towards the destination, else the packet is
Group-3 for dense regions. For this scheme, the forwarding dropped. This enables nodes closer to the destination to re-
probabilities are assigned in non-decreasing order. ceive the REPQ and reply with a valid backup route.
Adaptive backup routing (AODV-ABR) [65]: Lai et al. Link availability-based QoS-aware (LBAQ) routing
provide an extension to the AODV-BR scheme which used [136]: Yu et al. propose the LBAQ routing protocol based
the concept of backup routes to AODV. It sets up a mesh on node mobility prediction and link quality measurement.
and multipath routing using RREP messages and aims to While a node moves, it may experience varying capacity,
reduce control overhead. The mesh structure is created reliability and bandwidth availability. Instead of trying to
by overhearing data packets transmitted from the nodes predict the mobility patterns of the mobile links, the link
in the neighborhood (see Fig. 11). This helps in reducing availability is incorporated into the routing metrics to help
control messages and also react faster to the topology choose the link with the highest availability in the route.
changes. Whenever a link break is detected at a node, the The expected transmission count (ETX) along with power
node itself initiates a handshake procedure with its neigh- consumption is also used as a route metric. The route met-
bors and repair the broken route. Backup route request rics used are:
(BRRQ) and backup route reply (BRRP) messages are used
in the route repair process. The authors also suggest com-
bining AODV-ABR with local route repair once the route
breaks by broadcasting a RREQ message from the node
with the broken link. D S
Low overhead dynamic route repairing [135]: Yu et al. Destination Source
repair broken routes dynamically by using information
from overhearing the nodes. Once the route is down, the
proposed protocol intelligently replaces the failed links
Primary route
with backup links along the main route. An initial main
Alternate route
route is constructed between a source and destination pair
along which the data packets are transmitted. While these Fig. 11. A fish bone structure formed by the primary route and alternate
packets are forwarded, neighboring nodes overhear these routes [65].
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3043

 Link availability: probability that two nodes of a link with a source node initiating a RREQ message. The destina-
stay directly connected at a time t0 + t provided that tion node sends the RREP when it receives an RREQ for it-
they were connected at time t0. self. When multiple RREQs are received from different
 Link quality: the number of retransmissions required to paths, the destination node calculates the RET, the EC
send a packet on a link between two nodes (ETX). This is and the HC for each path. With these metrics, the weight
computed by measuring the loss rate of broadcast pack- values for each path is calculated by the destination node
ets between the node pairs. and the route with the largest value is chosen as the pri-
 Energy consumption: power consumption at each hop. mary route. The RET is computed by the destination node
using the GPS signal strength to determine when the link
Using the metrics above, a combined cost function is between a pair of moving nodes may be disconnected.
designed based on which the route is constructed. The EC denotes the number of link failures caused by a mo-
bile node while the hop count is the distance from the node
Di ðT i Þ ¼ c0 ðEi Þ þ c1 ðQ i Þ þ c2 ð1  Li ðtÞÞ;
in terms of hops. Using these values, the weight function
where c0, c1 and c2 = 1  c0  c1 are the weighting coeffi- calculates the weight for each path using the following
cients, Li and Qi are availability and quality of link i, Ei is equation:
the energy consumed on link i, Ti is the traffic carried on
RET i EC i HC i
path i, and Di is the final cost of the route. A source node W i ¼ C1  þ C2  þ C3  ;
sends a RREQ packet during route discovery. When an
MaxRET MaxEC MaxHC
intermediate node receives this RREQ packet, it calculates where C1, C2 and C3 are the weighing factors with their sum
its own cost from the equation above and forwards the equal to one. Other important routing protocol functions
packet with this new information. The total cost to the des- such as route maintenance is carried out similar to DSR
tination is computed when the RREQ reaches the destina- and AODV with a RERR packet generated when a link is
tion node. At the destination, the node waits for a fixed broken.
number of RREQs before selecting the route with the least Recycled path routing (RPR) [38]: Eisbrener et al. pres-
cost. If a link breaks, then an alternate route is selected for ent a new strategy towards broadcasting route request
data transmission. (RREQ) packets in MANETs during route discovery. It uses
Labeled successor routing (LSR) [101]: Rangarajan and expired routes stored in the route cache to make an edu-
Garcia–Luna–Aceves notice that many modern on-demand cated decision on forwarding RREQ packets towards the
protocols are built on top of AODV, using the same destina- destination. The authors implement controlled flooding in
tion sequence numbers. Thus, they inherit the performance the direction of the destination node but without any prior
problems of AODV: (a) most route requests are answered location information. RPR propagates RREQs without
by the destination and (b) it can suffer from temporary flooding every node and uses the hot or cold concept. Nodes
loops, de facto partition and count-to-infinity. The LSR ap- closer to the destination are considered hotter than the
proach is an attempt to overcome these problems by using nodes farther away. These hot or cold values are based
the information already needed in route requests to estab- on the route request for a particular destination node.
lish and maintain loop-free routes and allows other nodes Hot nodes rebroadcast the RREQ message while cold nodes
than the destination to initiate route replies. LSR uses un- discard it. The reasoning behind this forwarding strategy is
ique source-sequenced labels (SSLs) of flooded route re- the fact that a broken or expired route can be used towards
quest (RREQ) messages to build loop free paths within finding the new route. Essentially, expired route caches are
the network. Directed acyclic graphs (DAGs) from source reused unlike other on demand protocols. If the destina-
to destination are created and route replies are forwarded tion node is within the expired route cache of a node
to the source through the reverse paths. In LSR, the desti- receiving the RREQ, that node is also considered hot. On
nation must answer every RREQ it receives since every the other hand, if the node is colder than a pre-defined
node relaying a RREQ associates a relay sequenced label threshold, the RREQ is not forwarded at all. Initially, the
(RSL) with the SSL of the forwarded RREQ. The RREPs take nodes have empty route caches, meaning no hot or cold
different paths along the DAG built by the RREQs. There settings. During the network initiation, all nodes broadcast
could be multiple DAGs through the same node due to dif- packets using traditional flooding and setup the routes.
ferent RREQs forwarded through the node. To avoid path Timers are used to maintain the expired routes. Once this
loops, nodes use the RSL to select only a unique RREP with timer expires, the expired routes are purged from the route
an SSL and drop the others. The LSR creates unique route cache to free up memory and remove redundancy.
request labels (RRLs) derived from the SSL of the RREQ for- Gathering based routing protocol (GRP) [3]: Ahn pre-
warded. A source floods a RREQ SSL and the participating sents the gathering based routing protocol which collects
nodes on this DAG store the SSL as the RRL for that partic- network information during route discovery to be used la-
ular destination. The source can then forward packets ter by the source node. Initially, the source node broadcasts
through any of these nodes towards the destination. a destination query (DQ) packet which is continuously for-
Stable weight based on demand routing protocol warded towards the destination. This process is similar to
(SWORP) [123]: Wang et al. propose a weight based mech- the route discovery process in DSR or AODV using RREQs.
anism for routing in MANETs. Weights are assigned to dif- When the DQ reaches the destination node, a network
ferent routes during route discovery using the route information gathering (NIG) packet is forwarded by the
expiration time (RET), the error count (EC) and the hop destination. This NIG packet is then propagated over the
count (HC). Route discovery in SWORP is similar to DSR entire network collecting information. Every NIG packet
3044 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

is assigned a sequence number. Nodes receiving a NIG provided in terms of hints at each node. A hint, hid,
packet with a new sequence number attach network infor- computed by node i with respect to the destination node
mation to this packet and forward it along effective outgo- d, is represented by a positive value indicating the chance
ing links (EOLs). EOLs are those links in which the NIG of node i residing in the neighborhood of node d. A lower
packets are not received. Once the NIG packet arrives at hint value equates to a higher probability with hid = 0 when
the source node, the optimal path is calculated by the nodes i and d are one-hop neighbors.
source node based on the collected network information. When a node forwards a packet to the destination d it
Data packets are then transmitted through this calculated will try sending to the neighbor with the best hint which
route. has not been tried before for the same packet (effectively
Source routing with local recovery (SLR) [108]: Sengul trying various alternatives in the order of the hint). If no
and Kravets start from the observation that although on- such neighbor exist, the packet is discarded. All the nodes
demand routing reduces the cost of routing in high mobil- broadcast periodic heartbeat packets which are then used
ity environments, the route discovery process, which is to create a vector of time information for each neighbor.
typically done through network-wide flooding, consumes This time information vector is utilized to calculate the
a significant amount of bandwidth. This is especially hint values. Hints are disseminated by broadcasting the
expensive if the route discovery must be repeated due to control messages through the periodic beacon messages.
links broken due to node mobility. To alleviate this prob- Every node receives hints from nodes at most L hops
lem, the authors propose bypass routing, a process which around it. This is the lookahead value for the protocol.
patches a route using local information acquired on-de- The authors show that a small lookahead value is sufficient
mand, without the need of network-wide flooding. The for a node to gather correct hints. Smaller lookahead values
SLR protocol is an implementation example of the bypass also have an added advantage of lower control overheads.
routing approach. Labeled distance routing (LDR) [40]: LDR, by Garcia–
Bypass routing in SLR localizes the reaction to a route Luna–Aceves et al., is based on AODV but uses distance la-
failure and initiates only a local recovery procedure. Using bels instead of sequence numbers to ensure loop freedom
link state information from the MAC layer, a local patch on in the network. It utilizes a loop free invariant for each des-
the route is created bypassing the broken link. By using lo- tination with the sequence numbers which can only be
cal recovery with link state information, the chances of incremented by the destinations. The sequence numbers
recovering from a broken route increases. When a route are used for path resets. An advertisement denotes an offer
fails, first the local route cache is searched for an alternate for a route to the destination while a solicitation denotes a
route. If no route is available, bypass recovery is initiated request for information to a destination. To ensure loop
by querying the neighbors. Based on replies from these freedom, RREQs are disseminated within a tree which en-
nodes, the path is again reconstructed. MAC caches provide forces a strict ordering of feasible distances along successor
the connectivity information to immediate one-hop neigh- paths. The tree is created by the regular reverse-path flood-
bors and the state is updated by each node whenever any ing as in AODV. Ordering of feasible distances from source
communication is heard in the neighborhood. MAC caches to destination is attained by adhering to the following
also help determine the validity of the routes in the route constraints: i) numbered distance condition, ii) feasible
caches. Error recovery is initiated by salvaging used route distance condition, and iii) start distance condition. Since
caches, bypass recovery and error reporting (see Fig. 12). LDR is dynamic, the computed path graph must also
The node looks for alternative routes to the destination dynamically adapt to changing node positions and link
in its cache to salvage a packet. If the salvaged packet conditions. A route discovery is initiated by a source node
reaches its destination, the source receives an enhanced with a solicitation for a destination. Nodes relaying the
route error message from the destination stating that the solicitation participate in the route computation by cach-
salvaged route is in fact an alternate to the broken route. ing the path data for a fixed period of time. The destina-
Hint based probabilistic protocol [13]: Beraldi et al. tions or nodes having a path to the destination then send
propose a probabilistic forwarding framework which uses the RREPs along the reverse path.
meta-information to forward packets towards the general Dynamic backup routes routing protocol (DBR2P)
direction of the destination. The meta-information is [125]: Wang and Chao present an on-demand routing

U
V
Connectivity
T
Original route of the packet
R
D Salvage path
M P
S Local recovery path

L
N
X
Y

Fig. 12. Error recovery example [108].


A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3045

protocol which does not require any routing table. Destina- cols from the wired domain, reactive routing is specific to
tion nodes send back entire routes to the source node while ad hoc networks. Furthermore, reactive routing is best
setting up multiple backup routes dynamically. These back- adapted to the most challenging incarnations of the ad
up routes are used in the event of a link failure. Intermediate hoc networks: situations where the mobility of the nodes
nodes also receive and transmit request packets from the is so high that any route found between a source and a des-
source nodes to gather more information in order to create tination will inevitably be temporary in nature. Not only
the backup routes. During route discovery, the source that routes are created on-demand, but the probability of
sends an RD-request packet with a unique sequence a route failing is so high that the efficiency of responding
number and a route content field storing the addresses of to failures is a major design consideration.
all the nodes in the path. The sequence number distin- The baseline for this class of protocols is set by AODV
guishes between route discoveries from different source and DSR, both of them have several independent imple-
and destination pairs. RD-request packets received with mentations for various operating systems. A large number
duplicate sequence numbers are discarded. Route mainte- of other protocols in this class can be seen as attempts to
nance uses acknowledgment packets at the data link layer improve the performance of these protocols under various
to detect lost or corrupted packets. Passive acknowledg- operating scenarios. Some of these scenarios involve addi-
ments, where a node hears the packet forwarded by its tional assumptions about the nodes capabilities, for in-
neighbor to the next node, can also be used by the protocol. stance the ability to possess a way to accurately measure
On link failure, data packets are buffered at the failed node location, such as a GPS, or the ability to measure the
till a backup route comes from an upstream node which strength of a received signal.
caches backup routes. These backup routes are saved at One of the main improvement directions have been
specific backup nodes on the route during path discovery. about the handling of recovery of failed routes. This can
Refinement based routing (RBR) [75]: Liu and Lin pro- be approached from several directions:
pose a refinement based route maintenance mechanism
which adds proactive route selection and maintenance to  Improving the speed of rebuilding the routes: protocols
on-demand routing approaches. RBR consists of two mech- of this class are TORA [89], AODV-ABR[65] (rebuilding
anisms: passive probe route-redirection (P  PR2) and with backup routes), low overhead dynamic route
active probe route-redirection (A  PR2). P  PR2 dynami- repair [135], SLR [108] (using bypass routing), DBR2P
cally repairs broken routes through a node called a pas- [125] (backup routes), RBR [75] (using route
sive-redirector that redirects the broken source to itself redirectors).
before connecting it to a new node located in the vicinity  Choosing paths which are predicted to be more stable:
of the redirector and close to the broken path. A  PR2 uses ABR [116] (based on associativity), SSBR [37] (based
an active redirector which searches for available shorter on signal stability), FORP [113] (by predicting future
paths progressively by overhearing two nodes on the origi- changes), LLR [28] (favoring long lifetime routes), QMRB
nal path. These nodes should be two-hops away and within [52] and LBAQ [136] (based on prediction of future link
the vicinity of the active-redirector. These two mecha- availability).
nisms are incorporated into AODV routing protocol.  Based on prediction of failure and preemptive rebuild-
Fig. 13 illustrates the concept of the vicinity of a node. ing of routes: the preemptive routing by Goff et al.
[47], SWORP [123] (using a GPS signal to predict when
3.1.1. Comparison a pair of moving nodes might disconnect).
Source routing protocols have been a research topic of
high interest for the ad hoc community. There are several Another direction of optimization is the lowering of the
reasons for this. First, while table driven protocols can be cost of route discovery. One immediate way to perform
perceived as extensions or adaptations of existing proto- this is by taking advantage of location information. This
way, these protocols represent a bridge towards location-
vicinity of node X aware routing. From the protocols discussed in this section,
polarized gossip [12] and OD-PFS [4] fall in this category.
Other protocols work to lower the cost of route discovery
without relying on location: Adjusted probabilistic route
X discovery [1] and recycled path routing (RPR) [38].
B
A HCj(X) = 1 Another direction of work is to improve upon the tran-
sitory behavior of the baseline protocols – for instance LSR
C [101] and LDR [40] improve upon AODV’s behavior with
Y regards to temporary loops and the phenomena of count-
D to-infinity.
HCj(Y) = 2
Finally, there are some protocols which extend upon the
baseline by considering various additional networking
vicinity of node Y challenges, such as Quality of Service (LBAQ [136] and
QMRB [52]), interference and channel assignment [48] or
intermittent connectivity (SCaTR [17]).
The novel nature of source originated routing encour-
Fig. 13. Vicinity of node [75]. aged researchers to branch out from the traditional
3046 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

comfort zone of networking (which implies reliance on tinations in the network together with their distance in
graph theory and flow optimization as the mathematical hop counts. Each entry also stores a sequence number
background). A number of innovative and interdisciplinary which is assigned by the destination. Sequence numbers
approaches have been applied to source originated routing. are used in the identification of stale entries and the avoid-
In the papers surveyed in this section, we have two ap- ance of loops. In order to maintain routing table consis-
proaches based on ant colony optimization (ARA [50] and tency, routing updates are periodically forwarded
DAR [104]), an approach based on game theory FDG [85] throughout the network. Two types of updates can be em-
as well as a probabilistic routing approach [13]. ployed; full dump and incremental. A full dump sends the
Table 3.1.1 summarizes the papers reviewed in this sec- entire routing table to the neighbors and can require mul-
tion and compares some of their key features. tiple network protocol data units (NPDUs). Incremental
updates are smaller (must fit in a single packet) and are
3.2. Table-driven protocols used to transmit those entries from the routing table
which have changed since the last full dump update. When
Table driven protocols always maintain up-to-date a network is stable, incremental updates are forwarded
information of routes from each node to every other node and full dump are usually infrequent. On the other hand,
in the network. Routing information is stored in the rout- full dumps will be more frequent in a fast moving network.
ing table of each node and route updates are propagated In addition to the routing table information, each route up-
throughout the network to keep the routing information date packet contains a distinct sequence number assigned
as recent as possible. Different protocols keep track of dif- by the transmitter. The route labeled with the most recent
ferent routing state information; however, all of them have (highest number) sequence number is used. The shortest
the common goal of reducing route maintenance overhead route is chosen if any two routes have the same sequence
as much as possible. These types of protocols are not suit- number.
able for highly dynamic networks due to the extra control Analysis of a randomized congestion control scheme
overhead generated to keep the routing tables consistent with DSDV routing in ad hoc wireless networks [20]:
and fresh for each node in the network. Boukerche et al. describe a randomized version of the
Destination-Sequenced Distance-Vector (DSDV) [93]: DSDV protocol (R-DSDV) where the control messages are
Perkins and Bhagwat introduced Destination-Sequenced propagated based on a routing probability distribution.
Distance-Vector (DSDV), one of the earliest ad hoc routing Local nodes can tune their parameters to the traffic and
protocols. As many distance-vector routing protocols, it re- route the traffic through other routes with lighter load.
lies on the Bellman-Ford algorithm. Every mobile node This implies implementing a congestion control scheme
maintains a routing table which contains the possible des- from the routing protocol’s perspective.

Table 3.1.1
Reactive routing protocols comparison.

Protocol MR Route metric Route repository Route rebuilding CO


DSR Yes SP or next available RC New route and notify source High
AODV No Newest route and SP RT Same as DSR or local repair High
TORA Yes SP or next available RT Reverse link and repair route High
ABR No Strongest associativity RT Local broadcast Medium
SSBR No Strongestquit signal strength RT New route and notify source Medium
Goff et al. Yes SP RT Path discovery before probable route failure Medium
AQOR No Link bandwidth RT Initiated from destination Medium
ARA Yes SP RT Alternate route or backtrack Medium
ROAM Yes SP RT Erase route, start new search Low
FORP No First created route RT at clusterhead New route and notify source Medium
SCaTR Yes Proxy contact value RT Proxy requests High
DAR Yes Weighted probabilities Stochastic RT New route by sending forward ants Medium
Beraldi No Forwarding probability – Broadcast High
QMRB No QoS metrics RT Same as DSR or local repair High
Yu et al. No SP or backup route RC Local backup Medium
LABQ Yes LA, Q, and E RC Same as DSR or local repair High
LSR Yes Relay sequenced label (RRL) RT Same as DSR or local repair High
OD-PFS No VBR and CH RT Local repair Medium
SWORP No RET, EC, HC RT Same as DSR or local repair High
RPR No Newest route and SP RT Local repair High
GRP Yes SP RC Backup route High
SLR Yes SP or next available RC New route and notify source High
Beraldi et al. Yes Hint value RC Local broadcast High
LDR No Newest route and SP RT Same as DSR or local repair High
DBR2P No SP None Local repair Low

MR = Multiple routes.
Route metric: SP = Shortest path; LA = Link availability; Q = Quality; E = energy used; RET = Route expiration time; EC = Error count; HC = Hop count;
VBR = Virtual backbone routing; CH = clusterhead.
Route repository: RC = Route cache; RT = Routing table.
CO = Communication overhead.
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3047

The randomization of the algorithm is with respect to The HOLSR network arranges the nodes in three topol-
the routing table advertisement packets and the rate at ogy levels, depending on their capabilities. The low capa-
which they are forwarded. In DSDV, whenever there is bility nodes at topology level 1 have only one wireless
any change in the routing table, advertisement packets network interface and communicate with nearby nodes.
are propagated to update the state information at each Nodes on topology level 2 are assumed to have two wire-
node. R-DSDV sends these update messages only at a prob- less interfaces, possibly relying on different wireless stan-
ability Prn,adv for a node n in the network. This can reduce dards, allowing them to communicate with nodes at
the control packet overhead; however, there may be a cor- topology levels 1 and 2. Finally, the nodes at topology level
responding delay in updating all the nodes. If there is a 3 are the most powerful (e.g. airborne nodes) and can have
routing table update at node n, the node can send a regular up to three wireless interfaces, allowing them to commu-
message with a probability 1  Prn,adv or an update mes- nicate with nodes at topology levels 1, 2 and 3. At each le-
sage with probability Prn,adv. The sending rate of the table vel, the mobile nodes can self-organize into clusters, with
advertisement is qn = Fsendx Prn,adv, where Fsend is the fre- each node participating in multiple topology levels auto-
quency at which a node is allowed to send a message. matically becoming a clusterhead at the lower level.
The scheme allows the piggybacking of the routing table Each cluster node maintains a routing table with rout-
updates on the regular messages. ing information about nodes in the cluster. Higher cluster-
Optimized link state routing (OLSR) [31]: Clausen heads contain bigger routing tables since they have to
et al. designed the OLSR algorithm which improves on maintain routes to all nodes at lower clusters. For lower le-
the classical link state protocols through several optimiza- vel nodes, this overhead is minimal. A hierarchical topol-
tions targeted towards wireless ad hoc networks. These ogy control (HTC) message is used to send cluster
optimizations are centered on specially selected nodes membership information from a lower to higher level.
called multipoint relays (MPR). First, only MPR’s forward Topology control is carried out using these control mes-
messages during the route information flooding process, sages using the clusterheads as the gateway nodes.
substantially reducing the total number of messages for- Clusterhead gateway switch routing (CGSR) [23]: The
warded. In addition, link state information is generated CGSR protocol, by Chiang et al., uses a distributed algorithm
only by the MPRs, further reducing the amount of data called the Least Cluster Change (LCC). By aggregating nodes
which needs to be disseminated. Finally, the MPRs might into clusters controlled by the clusterheads, a framework is
choose to report only links between themselves and their created for developing additional features for channel ac-
MPR selectors. This last technique of partial link state cess, bandwidth allocation and routing. Nodes communi-
information is a departure from the customary approach cate with the clusterhead which in turn communicates
of link state protocols which relay on the dissemination with other clusterheads within the network (see Fig. 14).
of the full link state. The selection process of a clusterhead is an important
The multipoint relay aims to reduce retransmissions task since changing clusterheads frequently adversely af-
within the same region. Each node selects a set of one- fect the resource allocation algorithms. Thus, cluster stabil-
hop neighbors which are called the multipoint relays ity is of primary importance in this scheme. The LCC
(MPR) for the node. The neighbors of the node which are algorithm is considered stable since the clusterheads will
not MPRs process the packets but do not forward them change only under two conditions: when two clusterheads
since only the MPRs forward the packets. The multipoint come within the range of each other or when a node gets
relay set must be chosen such that its range covers all disconnected from any other cluster.
the two-hops neighbors. This set must also be the mini- CGSR is an effective way for channel allocation within
mum set to broadcast the least number of packets. The different clusters by enhancing spatial reuse. Each cluster
multipoint relay set of a node N should be such that every is defined with unique CDMA code and hence each cluster
two-hops neighbors of N has a bi-directional link with the is required to utilize spatial reuse of codes. Within each
nodes in the MPR set of N. These bi-directional links can be cluster, TDMA is used with token passing.
determined by periodic HELLO packets containing infor- Gateway nodes are members of more than one cluster;
mation about all neighbors and their link status. Thus, a therefore, they need to communicate using different CDMA
route is a sequence of hops from a source to a destination codes based on their respective clusterheads. The main fac-
through multipoint relays within the network. The source tors affecting routing in these networks are token passing
does not know the complete routes only next hop informa- (in clusterheads) and code scheduling (in gateways). A
tion to forward the messages. packet is routed through a collection of these clusterheads
A hierarchical proactive routing mechanism for mo- and gateways in this protocol.
bile ad hoc networks (HOLSR) [119]: Villasenor-Gonzalez Wireless routing protocol (WRP) [83]: Murthy and
et al. networks where some nodes have significantly higher Garcia–Luna–Aceves propose WRP which builds upon the
resources (transmission range, bandwidth, directional an- distributed Bellman-Ford algorithm. The routing table con-
tenna and so on). The authors notice that traditional, flat tains an entry for each destination with the next hop and a
routing protocols cannot efficiently exploit the capabilities cost metric. The route is chosen by selecting a neighbor
of the nodes with high resources. For this scenario, the node that would minimize the path cost. Link costs are also
authors propose the HOLSR algorithm which builds upon defined and maintained in a separate table and various
the OLSR protocol by introducing a hierarchical architec- techniques are available to determine these link costs.
ture with multiple ad hoc networks at distinct logical lev- To maintain the routing tables, frequent routing update
els within the network. packets must be forwarded to all the neighbors of a node
3048 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Node
5
Clusterhead

4 Gateway

1
3 6
8
2 7

Fig. 14. Cluster Gateway Switch Routing [23].

and contain all the routes in which the node is aware of. and least overhead routing (LORA). The ORA approach ob-
Since these are just update messages, only the recent path tains the shortest path to the destination while LORA min-
changes are included instead of the whole routing table. To imizes the packet overhead. STAR also requires a neighbor
keep the links updated, empty HELLO packets are for- protocol to make sure that each node is aware of its active
warded at periodic intervals only if no other update mes- neighbors. The STAR protocol has been further developed
sages need forwarding. as SOAR [105].
Global state routing (GSR) [27]: Chen and Gerla pro- OLSR with quality of service (QOLSR) [82]: Munaretto
pose the GSR protocol, where the control packet size is ad- and Fonseca design the QOLSR protocol by adding the QoS
justed to optimize the MAC throughput. parameters of delay and bandwidth to the standard OLSR.
Each node maintains the neighbor list and three routing Three new heuristics, QOLSR1, QOLSR2 and QOLSR3, are
tables containing the topology, the next hop, and the dis- proposed for multipoint relay selection (see Fig. 15). These
tance respectively. The neighbor list contains all neighbors heuristics select multipoint relays (MPRs) within the net-
of the current node. The topology table contains the link work based on various QoS parameters. QOLSR1 chooses
state information and a timestamp indicating the time in the neighbor node which can reach the largest number of
which the link state information is generated. The next nodes (node with the maximum degree). The priority is gi-
hop table contains a list of next hop neighbors to forward ven to the neighbor with smallest delay in the case of mul-
the packets while the distance table maintains the shortest tiple neighbors with identical maximum degrees. QOLSR2
distance to and from the node to various destinations. A prioritizes the neighbor with the smallest delay. If multiple
weight function computes the distance of a link which nodes have the same minimum delay, then the node with
may be replaced by other QoS routing parameter. the highest degree is chosen. The final heuristic selects the
Initially each node in the network starts with an empty node with the smallest delay among neighbors within a
neighbor list and a topology table. It learns about its neigh- two hop distance.
bors by the sender field of the incoming packets. By pro-
cessing these packets to obtain link state information, the
best route to the destination is computed. After all the
routing messages are processed, the routing table is cre-
x
ated and shared with other nodes by broadcasting it to y

the next hop neighbors. This process is carried out period- v


ically to maintain the most up-to-date information. a
b
z
Source-tree adaptive routing (STAR) [43]: Garcia– c
Luna–Aceves and Spohn propose STAR where each node s j
m
maintains a source tree which contains preferred links to d
all possible destinations. Nearby source trees exchange i
w
information to maintain up-to-date tables. A route
e
selection algorithm is executed based on the propagated t h
topology information to the neighbors. The routes are g f
maintained in a routing table containing entries for the q
destination node and the next hop neighbor. The link state r
k
update messages are used to update changes of the routes
in the source trees. Since these packets do not time out, no Node selecting MPR h One-hop neighbor 2-hop neighbor
periodic messages are required. The STAR protocol pro-
vides two distinct approaches: optimum routing (ORA) Fig. 15. Example for multipoint relay selection [82].
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3049

3.2.1. Comparison 3.3. Hybrid protocols


In contrast to source initiated routing, table driven
routing has extensive precedents in the research done for The hybrid routing schemes combine elements of on-
routing in the wired domain. Nevertheless, the require- demand and table-driven routing protocols. The general
ments of the ad hoc routing are such that none of the wired idea is that area where the connections change relatively
routing protocols could be successfully transferred into the slowly are more amenable to table driven routing while
ad hoc wireless domain. areas with high mobility are more appropriate for source
On the other hand, the two main classes of wired rout- initiated approaches. By appropriately combining these
ing protocols have inspired their own classes of protocols two approaches the system can achieve a higher overall
in table driven ad hoc routing. performance.
One of these classes is the distance vector protocols, Zone routing protocol (ZRP) [106]: The ZRP protocol,
where the nodes maintain only a local topology, and use designed by Samar et al. is designed to be used in large
the distributed Belman-Ford algorithm (or its variations) scale networks. The protocol uses a pro-active mechanism
to maintain the routing tables. In the wired Internet this of node discovery within a node’s immediate neighbor-
class contains protocols such as RIP and IGRP. In the ad hood while inter-zone communication is carried out by
hoc network domain the most popular protocol of this using reactive approaches.
class is DSDV [93], another protocol being WRP [83]. The Local neighborhoods, called zones, are defined for nodes
other class of protocols is the link state routing protocols (see Fig. 16). The size of a zone is based on q factor defined
where the routers exchange full topology information, as the number of hops to the perimeter of the zone. There
and then use a graph-theoretic shortest path algorithm may be various overlapping zones which helps in route
(such as Dijkstra’s) on the resulting graph. On the wired optimization.
Internet this class is represented by algorithms such as Neighbor discovery is accomplished by either Intrazone
OSPF and IS-IS. The most representative example in the Routing Protocol (IARP) or simple Hello packets. IARP is
ad hoc wireless domain is the OLSR [31] protocol. Between pro-active approach and always maintains up-to-date
these two classes we find protocols which transfer a partial routing tables. Since the scope of IARP is restricted within
topology, such as STAR [43]. a zone, it is also referred to as ‘‘limited scope pro-active
Most of the recent work on table-driven protocols can routing protocol’’. Route queries outside the zone are prop-
be seen as improvements on these baseline distance vector agated by the route requests based on the perimeter of the
and link state approaches. zone (i.e. those with hop counts equal to q), instead of
One direction of research is the adaptation of the rout- flooding the network. The Interzone Routing Protocol
ing decisions to the traffic, proposed in the randomized (IERP) uses a reactive approach for communicating with
congestion control scheme for DSDV [20]. Another class nodes in different zones. Route queries are forwarded to
of protocols aim to improve the scalability of table-driven peripheral nodes using the bordercast resolution protocol
protocols. The subnetwork approach, successfully applied (BRP). The ZRP architecture can be seen in Fig. 17.
on the wired Internet, cannot be directly applied in ad Fisheye state routing (FSR) [90]: Pei et al. propose the
hoc networks due to the much more variable connection FSR protocol which takes inspiration from the ‘‘fisheye’’
structure. On the other hand, the connections in ad hoc technique of graphic information compression proposed
networks are strongly correlated with the physical proxim- by Kleinrock and Stevens. When adapted to a routing table,
ity, which allows the development of clustering ap- this technique means that a node maintains accuracy dis-
proaches (e.g. CGSR [23]), possibly integrated with a tance and path quality information about its immediate
hierarchical model (such as in HOLSR [119]). Another vecinity, but the amount of detail retained decreases with
direction of research is the consideration of quality of ser- the distance from the node. Each node considers a number
vice, as in QOLSR [82]. of surrounding fish-eye scopes, areas which can be reached
Table 3.2.1 summarizes the protocols reviewed in this with 1, 2, . . . hops. A higher frequency of update packets
section and compares some of their key features. are generated for nodes within smaller scope while the

Table 3.2.1
Proactive routing protocols comparison.

Protocol Tables Update interval Critical node Routing metric CO


DSDV 2 Periodic – SP L
R-DSDV 2 Probabilistic – SP L
OLSR 3 Periodic – SP H
HOLSR 3 Periodic – SP H
CGSR 2 Periodic Clusterhead SP L
WRP 4 Periodic – SP L
GSR 3 Periodic only with neighbors – SP L
STAR 1 Only at specific events – SP L
QOLSR 3 Periodic – Degree, delay, & HC H

Routing metric: SP = Shortest path; HC = hop count.


CO = Communication overhead [High = H; M = Medium; L = Low].
3050 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

the routing tables entries with smaller sequence numbers


are replaced with larger ones.
9
Relative distance micro-discovery ad hoc routing
1 8 (RDMAR) [2]: RDMAR, by Aggelou and Tafazolli, has dis-
tinct route discovery and route maintenance phase. How-
S
3 ever, the route discovery broadcast messages are limited
2
by a maximum number of hops calculated using the rela-
7 tive distance between the source and the destination. Each
6 node also maintains a routing table containing the next
4 hop neighbor of each known destination, an estimated rel-
ative distance between all known source and destination
nodes, a timestamp at which the current entry was made,
5 a timeout field indicating the time at which a particular
route is no longer active and a flag specifying if a route still
Fig. 16. Example routing zone with q = 2 [106]. exists or not.
The estimated distances are measured by the source
nodes using the last known distance between the respec-
tive nodes and the estimated speed of the destination
node. Each node also maintains–a data retransmission buf-
IARP IERP Packet flow
fer which queues data being transmitted until an explicit
Interprocess acknowledgment is received and a route request table
communication
which stores all necessary information pertaining to the
most recent route discovery.
BRP
Route discovery and route maintenance is carried out
by broadcasting route request packet and expecting a route
reply packet from the destination. Each node also occasion-
NETWORK LAYER ally probes for bi-directional links by sending a packet on
the link where it has just received a packet. Route mainte-
nance is performed when a route failure occurs and the
MAC LAYER NDP
node re-sends the data up to a maximum number of re-
tries. This is why the intermediate nodes buffer data pack-
ets until they receive link level acknowledgments from the
Fig. 17. ZRP architecture [106].
next-hop node. When a link failure occurs at an intermedi-
ate node close to the destination, this node sets the ‘‘emer-
updates are fewer in general for farther away nodes. Each gency’’ flag in its route request packets such that it
node maintains a local topology map of the shortest paths increases the possibility of a faster recovery time. If the
which is exchanged periodically between the nodes. With route has failed, the intermediate node forwards a failure
an increase in size of the network, a ‘‘graded’’ frequency notification to the source node by unicasting it to all neigh-
update plan can be adopted across scopes to minimize boring nodes. When a node receives a failure notification, it
the overall overhead. updates its routing tables accordingly.
This approach makes FSR an implicit hierarchical proto- Scalable location update based routing protocol
col. Its main advantage is the significant reduction of the (SLURP) [127]: SLURP, by Woo and Singh, develops an
control overhead. architecture scalable to large size networks. A location up-
Landmark ad hoc routing (LANMAR) [91]: Pei et al. date mechanism maintains location information of the
propose LANMAR which builds subnets of groups of nodes nodes in a decentralized fashion by mapping node IDs to
which are likely to move together. A landmark node is specific geographic sub-regions of the network where any
elected in each subnet, similar to FSR [90]. The LANMAR node located in this region is responsible for storing the
routing table consist of only the nodes within the scope current location information for all the nodes situated
and landmark nodes. During the packet forwarding pro- within that region. When a sender wishes to send a packet
cess, the destination is checked if it is within the forward- to a destination, it queries nodes in the same geographic
ing node’s neighbor scope. If so, the packet is directly sub-region of the destination to get a rough estimate of
forwarded to the address in the routing table. If a packet its position. It then uses a simple geographic routing proto-
on the other hand is destined to a farther node, it is first col to send the data packets. Since the location update cost
routed to its nearest landmark node. As the packet gets clo- is dependent on the speed of the nodes, for high speeds,
ser to its destination, it acquires more accurate routing more number of location update messages are generated.
information, thus in some cases it may bypass the land- By theoretical analysis, it is shown that the routing over-
mark node and routed directly to its destination. During head scales as O(v) where v is the average node speed,
the link state update process, the nodes exchange topology and O(N3/2) where N is the number of nodes within the
updates with their one-hop neighbors. A distance vector, network.
which is calculated based on the number of landmarks, is Zone based hierarchical link state routing protocol
added to each update packet. As a result of this process, (ZHLS) [56]: Joa-Ng and Lu propose ZHLS routing protocol
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3051

where a hierarchical structure is defined by non-overlapping out the need of a root node. Periodic beacon messages are
zones with each node having a node ID and a zone ID. exchanged among neighboring nodes to construct a strat-
These IDs are calculated using an external location tool such egy tree. These trees within the network form a forest with
as GPS. The hierarchy is divided into two levels: the node the created gateway nodes acting as links between the trees
level topology and the zone level topology. There are no in the forest. These gateway nodes are regular nodes
clusterheads in ZHLS. belonging to separate trees but within transmission range
When a route is required for a destination located in an- of each other. A zone naming algorithm is used to assign a
other zone, the source node broadcasts a zone-level loca- specific zone ID to each tree within the network. Hence,
tion request to all other zones. Once the destination the overall network now comprises of a number of overlap-
receives the location request, it replies with the path. In ping zones (if each tree is considered to be a zone).
this technique, only the node and zone IDs of a node is re- The DDR algorithm comprise of the following six
quired to discover a path. There is no need for updates as phases: (i) preferred neighbor election; (ii) intra-tree clus-
long as the node stays within its own region and the loca- tering; (iii) inter-tree clustering; (iv) forest construction;
tion update is required only if the node switches regions. (v) zone naming; and (vi) zone partitioning. Initially, each
The only drawback of ZHLS is that all nodes should have node starts with the preferred neighbor election phase in
a preprogrammed static zone map to recognize the zones which the preferred neighbor is the one with the highest
created in the network. This may not be possible in scenar- number of neighbors. A forest is constructed by connecting
ios where the network boundaries are dynamic in nature. each node to their preferred neighbor after which the in-
On the other hand, it is suitable for the networks deployed tra-tree clustering scheme is used to generate the zone
with fixed boundary lines. structure. It also helps set up the intra-zone routing table
Distributed spanning tree (DST) routing [96]: for communication within the tree itself. Through the in-
Radhakrishnan et al. present a routing algorithm which ter-tree clustering, connectivity between trees is achieved.
uses distributed spanning trees. There can be regions of The zone naming algorithm is executed to assign zone IDs
different stability in the network and a backbone network to each of the zones, resulting of partitioning the network
must be created within the stable regions. All the nodes into the various zones based on the assigned zone IDs. This
in the network are aggregated into a number of trees rooted work is extended in [86] by introducing a routing frame-
at a particular node. These trees are composed of root and work which uses the intra and inter zone routing tables
internal nodes. The root node can make various decisions created in DDR.
such as whether the current tree could join with another A4LP routing protocol [120,121]: A4LP, by Wang et al.,
tree, whether other nodes could join at appropriate posi- is specifically designed to work in networks with asym-
tions within the tree, and so on. The other nodes in the tree metric links. The routes to In-, Out-, and In/Out-bound
are considered regular nodes with no extra or unique func- neighbors are maintained by periodic neighbor update
tionality. Each node can be in three different states: router, and immediately available upon request, while the routes
merge, and configure. DST proposes two strategies to deter- to other nodes in the network are obtained by a path dis-
mine a route between a source and a destination pair: covery protocol. A4LP proposes an advanced flooding tech-
nique – m-limited forwarding. Receivers can re-broadcast a
1. Hybrid Tree Flooding (HTF): In this scheme, the source packet only if it qualifies a certain fitness value specified by
sends the control packets to all the neighbors and the sender. The flooding cost is reduced and shortest high
adjoining bridges in the spanning tree. Each packet is quality path is likely to be selected by using m-limited for-
remained static at these places for a specific holding warding. Moreover, the metrics used to choose from multi-
time. This serves as a buffering strategy for these nodes ple paths are based on the power consumed per packet and
to send the packets as network connectivity increases transmission latency. A4LP, is also both location- and power-
with time. Hence, the network becomes gradually more aware routing protocol supporting asymmetric links that
stable and lesser number of packets are dropped due to may be suitable for heterogeneous MANET.
link failures. Hybrid ant colony optimization (HOPNET) [122]:
2. Distributed Spanning Tree (DST) shuttling: In this Wang et al. present a hybrid routing algorithm based on
approach, the source sends the control packets to the Ant Colony Optimization (ACO) and zone routing. It consid-
tree edges till each of them reaches a leaf node. When ers the scenario of ants hopping from one zone to the next
a packet reaches the leaf node, it is forwarded to a shut- with local proactive route discovery within a zone and reac-
tling level, i.e. a particular height on the tree. When the tive communication between zones. The algorithm borrows
packet arrives at the shuttling level, it is sent down the features from ZRP and DSR protocols and combines it with
adjoining bridges. This helps to selectively forward the ACO based schemes. The forward ants are sent only to bor-
control packets within the network. der nodes. These forward ants are then directed towards
the destination node by using the nodes’ local routing table.
The drawback with such an architecture is the existence The ants move from one zone to another via border nodes
of a single point of failure for the entire tree. If the root node and by using available local routing information. The zone
fails, the entire routing structure falls apart. Also the hold- approach achieves the scalability. Link failures are handled
ing time metric may factor in some additional delays and within a zone without flooding the network. Inter and intra
may not be suitable for transmitting real-time data. zone routing tables are always maintained which can effi-
Distributed dynamic routing (DDR) Algorithm [87]: ciently rediscover a new route in case of a link failure. An
Nikaein et al. propose a tree-based routing protocol with- example scenario is shown in Fig. 18.
3052 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Link reliability based hybrid routing (LRHR) [129]: rithms which allows the maintenance of multiple routes to
Xiaochuan et al. observe that frequent topology changes a destination. In ANSI, the nodes using proactive routing
in MANETs may require the dynamic switching of table- perform stochastic routing to select the best path, while
driven and on demand routing strategies. The LRHR proto- those performing reactive routing use the extra routes in
col achieves this switching in a smooth and adaptive the event of route failure. The pheromone trail concept al-
fashion. Each node operates in a promiscuous receive mode lows selecting the routes to the destination from every
to overhear any packet transmission in the neighborhood node. Nodes using reactive routing first broadcast a for-
and setup multiple routes from the source to the destina- ward reactive ant towards the destination. Once the desti-
tion. The LRHR assigns edge weights between links based nation receives the forward ant, it replies with a
on the link reliability. The higher the value of edge weight, backward reactive ant which updates routing tables for all
the greater the reliability. It finally selects the route which nodes in the path. If route failure occurs at an intermediate
has the maximum edge weight sum as the main route. The node, that node buffers the packets which could not be
LRHR primarily operates in the table-driven mode and routed and sends a forward ant initiating route discovery.
switches to on demand mode when a source either has Nodes which are part of a less dynamic, infrastructured
no route to a destination or when the time interval be- network maintains routes proactively by periodic routing
tween a new route discovery and the previous route dis- updates using proactive ants. Proactive ants are not re-
covery phase is larger than the minimum route request turned as the reactive ants, rather they help reinforce the
interval. The route discovery process in LRHR is similar to path taken by the ant. Local route management is achieved
DSR. The route maintenance operations are carried out by reinforcement due to movement of data packets and an
based on the edge weights between the nodes. explicit neighbor discovery mechanism (see Fig. 20). HEL-
Fisheye zone routing protocol (FZRP) [133]: Yang and LO messages are also broadcast periodically through which
Tseng combine the zone routing protocol with the fisheye network state information is easily exchanged.
state routing mechanism. By using the concept of a fisheye, Mobility aware protocol synthesis for efficient rout-
a multi-level routing zone structure is created where dif- ing [9]: Bamis et al. propose a new stability metric to deter-
ferent levels are associated with different link state update mine the mobility level of nodes in a network. Using this
rates (see Fig. 19). The source node generates a RREQ pack- metric, the nodes can be classified into different mobility
et which is bordercast to nodes till the destination is classes in which they in turn determine the most suitable
reached. These packets are forwarded along the border of routing technique for a particular source–destination pair.
the zone. The nodes at the periphery of the zones forward Stability uses the concept of associativity, which is the to-
the RREQ to a different zone if the destination node is not tal time for which nodes are connected through beacons.
located within the current zone. A time to live (TTL) field With the level of stability defined, a protocol framework
is used within the forwarding packets to cover the zone is designed, which operates above the network layer on
in which the update packets are forwarded. The routing ta- the protocol stack, determines the optimal routing tech-
ble at each node contains entries for nodes within its own nique. Minimal changes are needed to the original routing
zone and for those in an extended zone. An extended zone protocols to ensure ease of integration.
is a zone located beyond the inner (basic) zone. Extended Load balancing in MANET shortest path routing
zone entries are generally not very accurate due to differ- [112]: Souihli et al. achieve load balancing to enable effi-
ent update frequencies in different zones. Other proce- cient routing in MANETs. It has been observed that the load
dures such as local route repair in case of a broken link is maximal at the center while it decreases farther from the
are similar to ZRP. center of the network. Essentially, the load becomes mini-
Ad hoc networking with swarm intelligence (ANSI) mal at the network edges. The authors state that such a
[97]: Rajagopalan and Shen propose a hybrid routing pro- load imbalance takes place due to shortest-path routing
tocol utilizing swarm intelligence (SI) to select good routes
in a network. SI allows self-organizing systems and helps
maintain state information about the network. ANSI em-
ploys a highly flexible cost function which uses informa-
tion collected from local ant activity. The protocol takes
advantage of the basic principles of ant based routing algo-

G Q N
F A R=4 R=2
H
E U

S C I M O T
D
B
L R Basic zone
P
J
K
Extended zone

Fig. 18. Example scenario [122]. If the radius of the zone is 2, for node S,
nodes A, D, F, G are boundary nodes, and nodes B, C, E are interior nodes
while all other nodes are considered exterior nodes. Fig. 19. Two level routing zone in FZRP [133].
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3053

S
The approaches which classify nodes into zones are
usually counting the zones from the perspective of the
source node. The zones are usually defined based on hop
count in protocols such as ZRP [106], FSR [90] and RDMAR
[2] although we also have protocols where the zone is
j j
based on physical location such as in SLURP [127] and ZHLS
i i [56]. In some cases, the zones might be mobile zones of
nodes moving together, as in LANMAR [91].
D
In backbone based approaches a subset of nodes which
Fig. 20. Local reinforcement in ANSI. (a) Reinforcement by data packets.
have more stable connections form a backbone which is
Node i, upon receiving a data packet from S via node j, reinforces the path frequently organized into a tree structure. The assumption
to node j via j and the source S via j. (b) Reinforcement in neighbor is that nodes in the backbone will use table driven routing,
discovery mechanisms. Upon receiving a HELLO beacon from j all nodes i while nodes outside the backbone will be reached with
reinforce trails via j [97].
source initiated routing. Example protocols are DST [96]
and DDR [87]. The A4LP protocol [120,121] form a special
and propose a new routing metric, the node’s centrality, case as it is designed to work in networks with asymmetric
when choosing the best route. Thus, instead of selecting connections.
the shortest routes, nodes with longer distances from the A separate class of protocols are those which we could
center of the network are chosen. A new routing metric call explicit hybridization. In these protocols there are two,
is proposed as follows: clearly separable routing models, which are frequently full
featured routing protocols on their own. The main chal-
1X n
lenge of these protocols, naturally, is the appropriate
Minimize gðkÞ choice between the two protocols as well as their integra-
n k¼1
tion in the systems – the basis of this decision is frequently
where n is the number of nodes in the network and g(k) the defining factor of the protocol. For instance, LRHR [129]
represents the centrality of node k. The g(k) value is calcu- takes the decision based on link reliability, while Bamis
lated based on the size of the node’s routing table. A great- et al. [9] makes the decision based on mobility classes.
er size denotes closer to the center of the network while a There is also a wide variety among the protocols com-
lower size indicate otherwise. bined: Zone routing with ant colony optimization in HOP-
NET [122], FSR with ZRP in FZRP [133], reactive ants with
3.3.1. Comparison proactive ants in ANSI [97].
Hybrid approaches are, in general, justified for large Table 3.3.1 summarizes the protocols reviewed in this
networks – if a network is small, we can usually make a section and compares some of their features. (See Tables
clear decision between source driven or table driven ap- 3.4.1 and 3.5.1)
proaches. Similarly, hybrid approaches cover a very wide
range of approaches and intellectual ideas. Still we can 3.4. Location-aware protocols
identify several guiding ideas.
First, there is a group of approaches which performs a Location-aware routing schemes in mobile ad hoc net-
differential treatment of the network nodes based on works assume that the individual nodes are aware of the
either (a) zones or (b) the nodes participation in a locations of all the nodes within the network. The best
backbone. and easiest technique is the use of the Global Positioning

Table 3.3.1
Hybrid routing protocols comparison.

Protocol MR Route metric Route repository Route Rebuilding CC


ZRP No SP IntraZ and InterZ RTs Start repair at failure point M
FSR No Scope range RTs Notify source L
LANMAR No SP RTs at landmark Notify source M
RDMAR No SP RT New route and notify source H
SLURP Yes MFR: InterZ, DSR: IntraZ RC at location Notify source H
ZHLS Yes SP IntraZ and InterZ RTs Location request sent M
DST Yes Tree neighbor forwarding RTs Pause times/Shuttling L
DDR Yes Stable routing IIntraZ and InterZ RTs Notify source L
A4LP Yes Power consumed RTs Notify source M
HOPNET No SP IntraZ and InterZ RTs Start repair at failure point H
LRHR Yes Edge weight RC, RT Route discovery H
FZRP No SP IntraZ and InterZ RTs Start repair at failure point M
ANSI Yes SP RT Start repair at failure point M

MR = Multiple Routes.
Route metric: SP = Shortest path; InterZ = Intrazone; IntraZ = Intrazone.
Route repository: RC = Route cache; RT = Routing table.
CC = Communication Complexity [High = H; M = Medium; L = Low].
3054 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Table 3.4.1
Geographical routing protocols comparison.

Protocol Forwarding strategy Route metric Loop-free Scalability Robustness CO


LAR Directional flooding Hop count No No No Medium
DREAM Flooding Hop count No No No Low
GPSR Greedy SP Yes Yes No High
Colagrosso et al. Directional flooding Hop count No No No Low
ALARM Directional flooding Hops and mobility Yes Yes No Medium
REGR Directional flooding SP Yes No No Low
LAKER Directional flooding Hop count No No No Low
Blazevic et al. Multipath flooding Hop count Yes Yes Yes High
MORA Greedy Weighted hop count No No No High
OGPR Source routing SP Yes Yes Yes Low
Song et al. Greedy and directional forwarding Hop count No No No Medium
SOLAR Greedy geographic forwarding SP No No No Medium
LBLSP Greedy geographic forwarding LSP and WDG Yes Yes Yes Low
GLR Source routing SP Yes Yes No Low
MER Greedy geographic forwarding Max. expectation No Yes Yes Low

Route metric: SP = Shortest path; LSP = Local shortest path; WDG = Weighted distance gain.
CO = Communication overhead.

Table 3.5.1
Multipath routing protocols comparison.

Protocol Proactive/Reactive Loops Route metric Route cache


CHAMP Reactive Yes Shortest path Yes
AOMDV Reactive No Advertised hopcount No
SMR Reactive No Least delay No, table at source
NTBR Reactive Yes Link active Yes
Das et al. Reactive No Least delay Yes
TMRP Reactive No Auction winner No
Liu et al. Reactive No Shortest path Yes
SMORT Reactive No Shortest path Yes
Ramasubramanian et al. Proactive No Preferred neighbor RT
MuSeQoR Reactive No Shortest Path Yes

System (GPS) to determine exact coordinates of these request packets. In some cases, the nodes outside the re-
nodes in any geographical location. This location informa- quest zone may also be included. If the source node is
tion is then utilized by the routing protocol to determine not inside the destination node’s expected zone, the re-
the routes. quest zone must be increased to accommodate the source
Location-aided routing (LAR) [62,63]: Ko and Vaidya node. Also, a situation may occur where all neighboring
present the LAR protocol which utilizes location informa- nodes of the destination node may be located outside the
tion to minimize the search space for route discovery to- request zone. In this case, the request zone must be in-
wards the destination node. LAR aims to reduce the creased to include as many neighboring nodes as possible.
routing overhead for the route discovery and it uses the LAR defines two schemes to identify whether a node is
Global Positioning System (GPS) to obtain the location within the request zone (see Fig. 21).
information of a node.
The intuition behind using location information to route  Scheme 1: The source node simply includes the smallest
packets is very simple and effective. Once the source node rectangle containing the current location of the source
knows the location of the destination node and also has node and the expected zone of the destination node
some information of its mobility characteristics such as based on its initial location and current speed. The
the direction and speed of movement of the destination speed factor may be varied to either include the current
node, the source sends route requests to nodes only in speed or the maximum obtainable speed within the
the ‘‘expected zone’’ of the destination node. Since these network. This expected zone will be a circle centered
route requests are flooded throughout the nodes in the ex- at the initial location of the destination node with a
pected zone only, the control packet overhead is consider- radius dependent on its speed of the movement. The
ably reduced. If the source node has no information about source node sends the route request packets with the
the speed and the direction of the destination node, the en- coordinates of the entire rectangle. The nodes receiving
tire network is considered as the expected zone. these packets check to see whether their own locations
A source node before sending a packet determines the are within the zone. If so, they forward the packet using
location of the destination node and defines its ‘‘request the regular flooding algorithm, otherwise the packets
zone’’, the zone in which it initiates flooding with the route are simply dropped.
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3055

Fig. 21. LAR routing protocol. The diagrams (a) and (b) present LAR1 and LAR2 schemes [62,63].

 Scheme 2: The source node calculates the distance


between itself and the destination node based on the
GPS coordinates and includes these values within the
route request packets. An intermediary node receiving D

this packet calculates its distance from the destination.


If its distance from the destination is greater than that S
of the source, the intermediary node is not within the
Y
request zone and hence drops the packet. Otherwise,
it forwards the packet to all its neighbors.
Fig. 22. Y is S’s closest neighbor in greedy forwarding [59].
LAR essentially describes how location information
such as GPS can be used to reduce the routing overhead
in an ad hoc network and ensure maximum connectivity. to selectively forward the packets based on the distance.
Distance Routing Effect Algorithm for Mobility The forwarding is carried out on a greedy basis by selecting
(DREAM) [11]: Basagni et al. propose the DREAM protocol the node closest to the destination (see Fig. 22). This pro-
which also uses the node location information from GPS cess continues until the destination is reached. However,
systems for communication. DREAM is a part proactive in some scenarios, the best path may be through a node
and part reactive protocol where the source node sends which is farther in geometric distance from the destina-
the data packet ‘‘in the direction’’ of the destination node tion. In this case, a well known right hand rule is applied
by selective flooding. Each node maintains table with the to move around the obstacle and resume the greedy for-
location information of each node and the periodic location warding as soon as possible.
updates are distributed among the nodes to keep this Let us note that the location information is shared by
information as up-to-date as possible. Collectively updat- beacons from the MAC layer. A node uses a simplistic beac-
ing location table entries indicates the proactive nature oning algorithm to broadcast beacon packets containing
of the protocol while the fact that all intermediate nodes the node ID and its x and y co-ordinates at periodic inter-
in a route perform a lookup and forward the data packet vals, helping its neighbors to keep their routing tables up-
in the general direction of the destination, reflects dated. With greater mobility, the beaconing interval must
DREAM’s reactive properties. be reduced to maintain up-to-date routing tables; how-
DREAM is based on two classical observations: the dis- ever, this results in greater control overhead. To reduce
tance effect and the mobility effect. The distance effect states this cost, the sender node’s location information is piggy-
that the greater the distance between two nodes, the backed with the data packets.
slower they appear to move with respect to each other. Dynamic route maintenance (DRM) for geographic
Hence, the location information tables can be updated forwarding [30]: Chou et al. propose a dynamic beaconing
depending on the distance between the nodes without scheme to be used in geographic forwarding algorithms in
making any concessions on the routing accuracy. Two MANETs. In beacon based protocols, each mobile node
nodes situated farther apart view the other to be moving transmits periodic beacons to its neighbors to update and
relatively slowly, requiring less frequent location updates maintain its routing table. The beacons are generally for-
compared with nodes closer to each other. The mobility ef- warded at fixed intervals of time. During low mobility, a
fect determines how often the location information pack- longer interval would be the best as it would reduce con-
ets can be generated and forwarded. In an ideal scenario, trol overhead while providing accurate location informa-
whenever a node moves, it should update entire the net- tion. However, in cases of higher mobility, determining
work but not generate any packets if it remains idle. The an appropriate beacon interval is rather difficult. In DRM,
nodes with higher mobility generate more frequent loca- beacon interval and route information are carried out
tion update messages. This allows each node to send con- dynamically. Based on the node’s mobility information,
trol packets based on their mobility and helps to reduce its beacon interval is computed while the route manage-
the overhead by a great extent. ment function updates the routing table entries. The
Greedy Perimeter Stateless Routing (GPSR) [59]: DRM algorithm is applied to GPSR forwarding algorithm.
GPSR, by Karp and Kung, also uses the location of the node The results show that usage of DRM reduced the cost of
3056 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

route maintenance in scenarios with low mobility and im- Once the pre-routing region is selected, all nodes within
proved packet delivery rates where mobility among the this region engage in forwarding route request packets.
nodes is higher. The two main characteristics of this protocol include a re-
Improvements to location-aided routing through gion based route creation and a region based route update.
directional count restrictions [32]: Colagrosso et al. aims While the route creation is carried out by using existing
to reduce the control packet overhead by reducing dupli- broadcast schemes, it is followed by creation of a routing
cate route formation packets. The enhancements are pro- region in the neighborhood of this preliminary route.
posed to the LAR Box algorithm which is based on count When a route update is needed, this routing region is used
restriction [126] of rebroadcasts. A node after receiving to propagate the route update packets. Route creation con-
the route request packet waits for an assessment delay sists of the following phases:
(AD) time interval before deciding whether to rebroadcast Destination discovery: A destination location packet
the packet or simply drop it. This decision is base on the (DLOC) is first broadcast by the source node. Any existing
number of duplicate broadcasts received during the AD broadcast algorithm can be employed in this phase. All
interval and if this number is greater than a count thresh- nodes forwarding the DLOC store the path, so when the
old, then the packet is simply dropped. Using the count destination is reached a preliminary route is ready.
threshold value, the number of control packets can be re- Formation of the pre-routing region: Once the prelimin-
duced by not rebroadcasting them. ary route is selected, the destination broadcasts the Region
Adaptivelocation aided mobile ad hoc network rout- Definition (RDEF) packets which contain the address of the
ing (ALARM) [19]: The Adaptive Location Routing (ALARM) previous hop from the preliminary route and a REGION-
algorithm, by Boleng and Camp, uses feedback for adapta- WIDTH value which defines the maximum number of hops
tion and location information for performance improve- from the nodes on the route. The nodes receiving the for-
ments. While using location information has shown to warded RDEF packets check whether they fall within this
increase efficiency, feedback is suggested as a mobility range or not. If so, they are included within the region.
metric assisting ad hoc network protocols adapt to the cur- In-region route discovery: A short period after the RDEF
rent network scenario [18]. Link duration is considered as a packet is broadcast, the destination again broadcasts a
suitable mobility metric since constant links for long peri- RREQ packet. Those nodes which are marked within the re-
ods denote low mobility while links experiencing shorter gion by the RDEF packets re-broadcast the RREQ packets.
average durations represent high mobility scenario. Essen- Such a technique helps in limiting the route discovery pro-
tialy, the link duration feedback agent allows the proposed cedure to a specific region resulting in decreased control
protocol to become adaptive. The ALARM protocol aims to overhead.
optimize the existing protocols and devise techniques to Since the route selected is currently in use, the route
combine multiple protocols into a hybrid protocol where discovery process is not needed. Route update packets
more suitable techniques based on the present network are flooded throughout the accepted region to update the
conditions can be employed. route changes.
ALARM uses the link duration feedback at each of the Location aided knowledge extraction routing for mo-
mobile node to determine the appropriate forwarding bile ad hoc networks (LAKER) [70]: Li and Mohapatra The
scheme. A threshold duration is provided to make further LAKER protocol, by Li and Mohapatra, minimizes the net-
decisions. ALARM forwards the packets on the specified work overhead during the route discovery process by
path if the link duration of the source node is larger than decreasing the zonal area in which route request packets
the threshold, otherwise it performs a directed broadcast. are forwarded. During this process, LAKER extracts knowl-
In such a scheme, even though a broadcast flood is initi- edge of the nodal density distribution of the network and
ated, this flood may be ‘‘damped’’ by nodes closer to the remember a series of ‘‘important’’ locations on the path
destination if they have stronger links. Hence, the propaga- to the destination. These locations are named ‘‘guiding
tion method of the packets is selected based on the mobil- routes’’ and with the help of these guiding routes the route
ity metric, the link duration. The important thing is to discovery process is narrowed down.
deliver the packet through regions of ‘‘high instability’’ LAKER uses the same forwarding strategy as DSR and
and it does not matter whether the packet reaches the final caches the forwarding routes and also creates its own guid-
destination via flooding or through the original route se- ing routes. While a forwarding route is a series of nodes
lected. The flood horizon parameter limits the number of from the source to the destination, the guiding route con-
hops to flood a packet, keeping the floods within a specific tains a series of locations along this route where there
horizon. No route repairs are required in this scheme since may be a cluster of nodes. Even though individual nodes
the packets can be forwarded over network ‘‘hot-spots’’ by may move around a bit, the basic cluster topology gener-
directed flooding resulting in decreased overall end-to-end ally remains similar for an extended period of time. Thus,
delay. the information found in the first route discovery round
A region-based routing protocol for wireless mobile is stored and used during the subsequent route discoveries.
ad hoc networks (REGR) [76]: The REGR protocol, pro- Since LAKER uses the guiding route caches in route discov-
posed by Liu et al., dynamically creates a pre-routing region ery, the mobility model chosen becomes very important.
between the source and the destination, hence control the The restricted random waypoint mobility model [15],
flooding of route request packets within this region. The which is an extension of [21] is used. LAKER uses an
correct selection of the region, which should not be too on-demand request-reply mechanism for route discovery
small, is important for the discovery of the optimal routes. (see Fig. 23). The control packet format in LAKER contains
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3057

requires an extra overhead of distributing the maps in


the network.
P2 D Movement-based algorithm for ad hoc networks
(MORA) [16]: MORA, by Boato and Granelli, takes into ac-
count the direction of the movement of the neighboring
P1 nodes in addition to forwarding packets based on the loca-
tion information. The metric for making the forwarding
Expected zone decision is a combination of the number of hops which
S have an arbitrary weight assigned and a function indepen-
LAKER request zone dent of each node.
While calculating this function F, the primary goal re-
mains to make full use of the directions of the neighboring
LAR Request zone nodes’ movement in selecting the optimal path from
Network Area source to destination. The function F should depend upon
the distance of the node from the line joining the source
Fig. 23. Request zone LAKER vs LAR [70]. It can be seen that the request and destination (sd) and the direction it is moving towards.
zone in LAKER is more specific in comparison with LAR; therefore, there is
a greater probability of accuracy in determining the exact location of the
The function should reach the maxima when the node is
destination node. moving on sd and should decrease with an increase in
the distance from this line. The MORA protocol has two
versions:
its forwarding route and guiding route metrics in order to
decrease the forwarding area of these route request 1. UMORA: This is the Unabridged-MORA version since it
packets. Knowledge extraction is achieved by keeping is very similar to source routing on IP networks. Here,
track of the number of neighbors of each node till a certain a short message (called a probe) is used to localize the
threshold value is reached. The route reply packet forwards position of the destination. The destination sends a
the forwarding and guiding routes to the source. probe along various different routes. Each node receiv-
A location-based routing method for mobile ad hoc ing this packet keeps updating its own weight function
networks [14]: Blazevic et al. propose Terminode Routing, accordingly. After a fixed period of time, the source has
a combination of a location-based routing protocol called all the paths to the destination and corresponding
Terminode Remote Routing (TRR) and a link state routing weight functions and selects the most suitable path
called Terminode Local Routing (TLR). TRR is used for based on this information.
nodes located some distance away from the source node, 2. D-MORA: The Distributed MORA is a scalable algorithm
while TLR is used for local nodes. Terminode routing also and uses a single path from source to destination. A
uses a unique flooding scheme called Restricted Local short probe message is also forwarded from the desti-
Flooding (RLF) for flooding control packets during route nation to the source. In every k hops, the node receiving
discovery. Anchors are geographical points serve as point- the packet polls for information from the neighboring
ers for source nodes to route the packets. nodes. The packet is then forwarded to the node with
Naturally, the location independent addressing is used the higher link weight. The path information is attached
by TLR; on the other hand, TRR uses direct paths, perimeter to the packet header and forwarded to the next node.
modes and anchors. A direct path is an approximation of a
straight line from the source to the destination while On-demand geographic path routing (OGPR) [46]:
perimeter modes help to turn around obstacles if the pack- Giruka and Singhal propose a geographic path routing pro-
et is ‘‘stuck’’ at a location with no neighbor node closer to tocol which does not depend on a location service to find
the destination than itself. the position of the destination. OGPR is stateless and uses
Perimeter modes often result in the discovery of subop- greedy forwarding, reactive route discovery and source-
timal paths since there may be multiple routing loops cre- based routing. It is a hybrid protocol incorporating the
ated. The usage of anchors can avoid this problem. Anchors effective techniques of other well known routing protocols
are referred as imaginary static geographical locations, not for MANETs. OGPR constructs geographic paths to route
the nodes within the network. These locations are written packets between a source and a destination node. A geo-
to the packet header and the packet is forwarded accord- graphic path is termed as a collection of geographic positions
ingly to the intermediate node closest to the anchor. A well from source to destination which decouple node IDs from
chosen set of anchors could decrease the total number of the path, meaning that explicit node IDs are not used to
hops in the route. An addtional technique is proposed to al- construct a path. The addressing scheme is implemented
low the source node to check whether anchors are needed by using a grid-based position encoding strategy. The en-
or not depending on an estimate of the number of hops on tire network area is divided into square grids with a unit
the direct, non-anchored path. Anchors are selected using square grid assigned as an order-1 grid. Four adjacent or-
the Friend Assisted Path Discovery (FAPD) or the Geo- der-1 grids form an order-2 grid and so on. With the grid
graphical Map-Based Path Discovery (GMPD). While FAPD structure set up, a unique binary address is assigned to
responders have a stable view of the network, GPMD all order-1 grids. Such a technique helps decouple node
assumes the availability of the network density maps to IDs from the addressing scheme and enables any node
the source nodes. Even though GPMD performs better, it along the geographic path to forward data packets.
3058 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Path discovery is carried out on-demand by the source balanced routing around obstacles and hotspots. Static
using a flooding path request (PREQ) message. This mes- nodes with lifetimes longer than the time required to route
sage accumulates the grid addresses of the intermediate around an obstacle are considered.
nodes till it reaches the destination node. The path reply The goal is to find the non-Euclidian metrics which are
(PREP) containing the geographic path is forwarded back distributed, stateless and conform to Euclidian distances.
to the source node. If path breaks, the nodes use a path- To achieve this, the network traffic is routed from a source
healing technique. Every packet traces the geographic path to its destination further from an obstacle on the path in-
followed from source to destination. By greedy forwarding stead of routing along the obstacle boundary. In the LSP
along the geographic path, multiple paths may be discov- metric, only a single such obstacle is considered even
ered and when the destination receives a packet from a though there may be multiple obstacles in the network.
newer path, it sends a path update (PUPD) message. Con- The source and destination nodes are first determined
trol overhead in OGPR is low and paths found are also loop whether they are in line of sight of each other. If so, the
free. LSP is the Euclidian distance, otherwise, it is calculated as
Secure position-based routing protocol [111]: Song a sum of three distances. Each distance is calculated as
et al. propose a secure geographic forwarding (SGF) algo- the shortest path around an obstacle. Load balancing is
rithm which provides source authentication, neighbor achieved by pushing traffic away from the obstacle bound-
authentication, and message integrity. It is combined with ary and avoid creating local hotspots. The WDG metric is
a secure grid location service (SGLS) to enable any receiver used to provide various levels of importance of either using
to verify the correctness of the location messages. SGF uses a straight line route or an obstacle avoidance route. By
both greedy and directional flooding with unicast mes- assigning different magnitudes of weight to either of these
sages being encrypted with pair-wise shared keys between routes, the WDG metric combines distance gains instead of
source and destination. The SGLS provides additional secu- absolute distances between source and destination.
rity mechanisms to the original GLS, incoporates secure The LBLSP routing algorithm combines both the LSP and
location querying and secure HELLO message exchanges. WDG. A packet initially starts in greedy mode and may
The additional security features prevents message tamper- change its mode to recovery mode till it reaches its desti-
ing, dropping, falsified injection, and replay attacks. nation. In greedy mode, the forwarding node calculates
Sociological orbit aware location approximation and LSP values for itself and its neighbors. For nodes with lower
routing (SOLAR) [45]: Ghosh et al. first propose a macro- LSP values, their respective WDG values are computed and
level mobility framework termed ORBIT. It is a determinis- the one with the largest WDG value is chosen as the next
tic orbital movement pattern of mobile users along specific hop. If there are not any nodes with lower LSP values, then
places called hubs. The movement pattern is based on the the packet mode is changed to recovery mode. In this
fact that most mobile nodes are not truly random in their mode, perimeter routing is carried out till a node with a
movements but actually move around in an orbit from lower LSP value is found.
hub to hub. Each hub may be a rectangle and movement Geographic landmark routing (GLR) [84]: The GLR
may take place either inside a hub or in between hubs. algorithm, by Na and Kim, solves the blind detouring prob-
Example orbital models discussed are random orbit, uni- lem and the triangular routing problem in MANETs. The
form orbit, restricted orbit, and overlaid orbit. blind detouring problem occurs when a packet arrives at
The SOLAR protocol uses the ORBIT framework and the a dead-end when the next node is blindly selected (see
spatial/temporal locality of the nodes around these hubs. It Fig. 24). This could result in a longer detour path even
uses the concept of peer collaboration among acquaintances when there are actually shorter paths available. GLR solves
(nodes whose hub lists are cached by the node). Each node this by discovering two paths bypassing the void area. One
only needs to know the terrain in terms of hub locations of the paths is from source to destination while the other
and its own location. Periodic HELLO messages are for- path is in the reverse direction. These paths are compared
warded to neighbor nodes for both neighbor discovery and the shorter path is selected.
and sharing of hub lists. When a source needs to send data
to an acquaintance whose hub list is at the source, the
t
packet is forwarded to the center of the hub. Packet for- t

warding is achieved in a greedy fashion. If nothing is


known about the destination’s hub list, a new query is for- Open void
Closed
warded to the hubs in the acquaintance’s hub list. This is void X X
called a logical hop. The query is forwarded along logical
l
hops till either the destination’s hub list is obtained or
the number of logical hops exceeds a given threshold. If
the query reaches the destination, it responds with its
own hub list and its current hub where the packet is
S S
forwarded.
Load balanced local shortest path (LBLSP) routing
[25]: Carlsson and Eager propose a distributed routing (a) (b)
algorithm which uses both local shortest path (LSP) and
weighted distance gain (WDG) to finalize the forwarding Fig. 24. The blind detouring and triangular routing problems, (a) closed
node. The two non-Euclidian distance metrics provide load void, (b) open void [84].
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3059

The triangular routing problem occurs due to path advancement on curve (MAC) algorithm and if the trajec-
refraction at dead-end nodes. GLR solves this problem by tory must be strictly obeyed then the lowest deviation
using the concept of landmark nodes which are special from curve (LDC) can be implemented. In this case, the
intermediate nodes identified during path discovery. This route deviates from the trajectory as little as possible.
landmark node reclaims greedy forwarding after escaping
from a dead-end. GLR computes straight sub-paths be- 3.4.1. Comparison
tween the landmarks. GLR has two sub-layers: basic and The research on location-aided routing has evolved
optimization. GLR uses a regular geographic routing algo- from the design of the generic routing frameworks to their
rithm such as GPSR to forward packets to target nodes in optimization and the solution of specific problems posed
its basic sub-layer. In the optimization sub-layer, informa- by certain ad hoc network configurations.
tion about forward and backward paths such as hop counts The earliest proposed protocols were designed to im-
and landmark nodes is collected. Then, it selects the short- prove on the generic ad hoc routing protocols by taking
er detour path and utilizes a loose source routing with the advantage of the knowledge of the physical location of
landmarks. the nodes. Most of these protocols can be classified as
Maximum expectation within transmission range source originated, reactive routing: LAR [62,63], DREAM
(MER) [64]: Kwon and Shroff propose a packet forwarding [11], GPSR [59], but they also require the distribution of
algorithm for location aware networks. In most cases, loca- the location information (and in some cases, movement
tion estimates have significant error rates which may be information as well).
overlooked in most location based routing protocols. These In this respect, these protocols are proactive in distrib-
location errors could induce either transmission failures or uting location information. However, location information
backward progress in greedy mode. The former occurs involves less data than full topological connectivity and
when the selected node is out of transmission range while has a more predictable and continuous change pattern.
the latter takes place when the next hop node is actually Nevertheless, the distribution of the location information
farther than the destination. This leads to looping within is a significant overhead and the DRM [30] and improve-
the network. ment to LAR [62,63] approaches are directed towards
The proposed MER algorithm utilizes an error informa- reducing it.
tion field in its messages which is used by the objective Another group of protocols are based on the general ap-
function. The greedy routing scheme (GRS) is improved proach that location based routing is used to get to the
by the authors where they mitigate the impact of the loca- general vicinity (‘‘region’’) of the destination, where the
tion errors. Using the error statistic, the objective function routing will be shifted to a different approach. Examples
calculates a maximum expectation for each node in which of this group are REGR [76], LAKER [70], and Terminode
the nodes with the highest expectation are chosen as the routing [14].
next node for packet forwarding. Another group involves algorithms which resemble
Implementation framework for trajectory based source routing from the wired IP networks, but with the
routing (TBR) [137]: Yuksel et al. study various implemen- explicit list of IP addresses to be traversed replaced with
tation issues of TBR in this work. A proposed method en- the geographical path that needs to be followed or approx-
codes trajectories into packets at the source node before imated by the packet. Examples of this approach are on de-
sending them to the destination. Bezier curves are utilized mand geographic path routing (OGRP) [46] and trajectory
as possible path trajectories to efficiently forward the based routing (TBR) [137].
packets. These curves provide flexibility in the greedy for- Finally, one of the most recent focus on location aided
warding of TBR with the possibility of multiple types of routing was an increasing attention paid to the actual dis-
curves. With a given node neighborhood and a trajectory tribution of the nodes in the physical space. The particular-
for packet forwarding, TBR specifies the following ities of the network occasionally include aspects which are
objectives: helpful for routing – for instance the SOLAR [45] algorithm
which exploits the recurrent movement pattern of the
 Obey the trajectory: The packet stays within the given nodes. In many cases, however, the physical space of the
trajectory and does not deviate at all. ad hoc network contains obstacles or simply areas where
 Reach the destination: If application is more sensitive to no forwarding nodes are present. Following a greedy loca-
packet loss, then the packets should be forwarded tion-based scheme would lead the packets into a dead end
directly to the destination node instead of following in this situation. Protocols such as LBLSP [25] and GLR [84]
the given trajectory. have been designed to address exactly these challenges,
 Reach quickly: The packets are forwarded such that while MER [64] is designed to reduce the impact of loca-
they reach the destination with the minimal delay. tion estimation errors.
Fig. 4 summarizes the protocols surveyed in this
Forwarding nodes on the curve may be selected at ran- section.
dom or the nodes closest to the curve (CTC). For flooding
applications, the least advancement on curve (LAC) ensures 3.5. Multipath protocols
that the maximum nodes receive the packet while a com-
bining CTC and LAC may be another possibility for packet Multipath routing protocols create multiple routes from
forwarding. To reduce delivery delay, the packet may be source to destination instead of the conventional single
forwarded to the farthest node on the curve with most route discovered by other protocols. The main advantage
3060 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

of discovering multiple paths is that the bandwidth be-


tween links is used more effectively with greater delivery
reliability. It also helps during times of networks conges-
tion which may arise due to bursty traffic within the net-
work. Multiple paths are generated on-demand or using a
pro-active approach and is of great significance as routes
generally get disconnected quickly due to node mobility.
Caching and multipath routing protocol (CHAMP)
[118]: Valera et al. propose the CHAMP protocol which
uses data caching and shortest multipath routing. It also
reduces packet drops in the presence of frequent route
breakages. Every node maintains a small buffer for caching
Fig. 25. Example of a potential routing loop scenario with multiple path
the forwarded packets. This technique is helpful in the case
computation [79].
when a node close to the destination encounters a for-
warding error and cannot transmit the packet. In such a
situation, instead of the source retransmitting again, an packet is checked whether it provides a node-disjoint path
upstream node which has a cached copy of the packet to the source.
may retransmit it, thereby reducing end-to-end packet de- Split multipath routing (SMR) [68]: The SMR protocol,
lay. In order to achieve this, multiple paths to the destina- by Lee et al., establishes and uses multiple routes of max-
tion must be available. imally disjoint paths from source to destination. Multiple
In CHAMP, each node maintains two caches; a route routes are discovered on-demand and the route with the
cache containing forwarding information and a route re- shortest delay is selected.
quest cache which contains the recently received and pro- When a node wants to send a packet to a destination for
cessed route requests. Those entries which have not been which a route is not known, it floods a RREQ packet into the
used for a specific route lifetime are deleted from the route network. Due to flooding, several duplicate RREQ messages
cache. A node also maintains a send buffer for waiting reach the destination along various different paths. Source
packets and a data cache for storing the recently forwarded routing is used since the destination needs to select multi-
data packets. A route discovery is initiated when there is ple disjoint paths to send the RREP packet.
no available route. The destination replies back with a cor- Unlike the conventional routing protocols such as AODV
responding route reply packet. There may be multiple and DSR, the intermediate nodes in SMR are not allowed to
routes of equal length established, each with a forwarding send back RREPs even if they have the route to the desti-
count value which starts with a zero from the source and is nation. This is because the destination can only make a
increased by one with every retransmission. decision on the validity of maximally disjoint multiple
Ad hoc on-demand multipath distance vector rout- paths from all of its received RREQ packets. If the interme-
ing (AOMDV) [79]: Marina and Das present the AOMDV diate nodes reply back, it is almost impossible for the des-
protocol, which uses the basic AODV route construction tination to keep track of the routes forwarded to the
process, with extensions to create multiple loop-free and source. Intermediate nodes also use a different packet for-
link-disjoint paths. AOMDV mainly computes the multiple warding approach. Instead of dropping all duplicate RREQs,
paths during route discovery process and it consists of two each node only forwards those RREQ packets arrived using
main components: a rule for route updates to find multiple a different link from the first RREQ packet and having a hop
paths at each node, and a distributed protocol to calculate count lower than the first RREQ packet.
the link-disjoint paths. The destination considers the first received RREQ packet
In this protocol, each route request and route reply as the path with the shortest delay. It immediately sends a
packet arriving at a node is potentially using a different RREP back to minimize the route acquisition latency. To
route from the source to the destination. All of these routes find the maximal disjoint path to the already replied route,
cannot be accepted since they can lead to creation of loops it waits for additional time to determine all possible route
(see Fig. 25). The proposed ‘‘advertised hop count’’ metric instances. In some cases, there may be more than one max-
is used in such a scenario. The advertised hop count for a imal disjoint route and if so, the shortest hop distance
particular node is the maximum acceptable hop count for route is selected.
any path recorded at that node. A path with a greater Neighbor table based multipath routing (NTBR)
hop count value is simply discarded and only those paths [134]: Yao et al. present an initial theoretical analysis
with a hop count less than the advertised value is accepted. showing that non-disjoint multipath routing has a higher
Values greater than this threshold means the route most route reliability than the conventional disjoint multipath
probably has a loop. routing. This study has led to the development of a neigh-
The following proven property allows to have disjoint bor table based multipath protocol which does not require
routes [79]: Let a node S flood a packet m in the network. the disjoint routes. In NTBR, every node maintains a neigh-
The set of copies of m received at any node I (not equal S) each bor table which records routing information related to its k
arriving via a different neighbor of S, defines a set of node-dis- hop neighbors. While k can be set to any value, the control
joint paths from I to S. This distributed protocol is used in overhead also increases accordingly.
the intermediate nodes where multiple copies of the same The NTBR protocol has a route discovery and route
route request packet is not immediately discarded. Each maintenance mechanisms. It also maintains a route cache
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3061

at each node in the network. The route caches are main- the route lifetime should be valid as long as the data is for-
tained by the neighbor tables which also serve to make warded from source to destination. If the path is not stable
an estimate of the lifetime of the wireless links. This infor- enough, then a route maintenance scheme is required to
mation is used to keep track of the route lifetime. Every either repair the path or suggest an alternative path. Once
node transmits periodic beacon packets to its two-hop the alternative set of paths are decided, the total volume of
neighbors. The neighbor table is established based on the data is divided into blocks and forwarded along all the dif-
information from the beacon packet by using any of the ferent routes to the destination.
following approaches: Truthful multipath routing protocol (TMRP) [124]:
Wang et al. present a multipath routing protocol which
 Time driven: In this approach each node essentially can be used in networks with non-cooperative nodes, also
waits for a predefined timeout interval before deciding termed as selfish nodes. These nodes are characterized by
whether a link is active or not. The node waits for a bea- the fact that they agree to forward packets only for a re-
con packet from either its one-hop or two-hop neigh- turn/payment. The cost of forwarding a packet is measured
bors and adds the information to its neighbor routing in terms of resources available at each node. A node using
table. However, the problem is that there is always a the forwarding services of another node would like to min-
timeout between the actual topology change and the imize its own cost of forwarding while the selfish node
time in which this information is realized by the node. may not advertise its true cost. The authors hence design
 Data-driven: This approach alleviates the problem aris- a truthful mechanism to ensure that a node’s payoff is max-
ing from the time driven mechanism. In this scheme, imized only when it reveals its true cost.
one field of the beacon packet is used to inform whether A generic truthful multipath routing protocol (GTMR) is
a node is unreachable or not. The address of the presented which can be used to make any table-driven mul-
unreachable node is added into the beacon packet and tipath routing protocol a truthful one without additional
all nodes receiving the packet update their neighbor control overhead. It only requires the multipath routing
routing tables accordingly. protocol to be loop-free and table-driven. The GTMR builds
a coordination between the neighbor table and the routing
The route cache contains all the routing information for table of the multipath routing protocol and is followed by
a particular node and it is updated by monitoring any an auction based approach to select the next hop for packet
packet passing through the network. To extract individual forwarding. The second-price sealed bid auction, the Vick-
routes, the route extraction reason mechanism is used rey auction, is used by a forwarding node when it receives
which simply prioritizes the routes extracted from differ- a packet to forward. All one-hop neighbors of the node are
ent packets. The routes from route replies are assigned qualified bidders who advertise their bids in their HELLO
the highest priority while the routes from route request messages. Based on the lowest cost, the winner is selected
packets or neighbor tables become second followed by and the packet is forwarded.
the routes from data packets. These priorities are used dur- The authors implement the GTMR over the AOMDV
ing the route selection process. The route discovery and multipath routing protocol and call it the TMRP. The TMRP
route maintenance are similar to the other routing has two variations depending on whether the node
algorithms. changes its packet forwarding cost over time or not. In
Adaptive QoS routing framework through multiple the case of varying the cost, the node varies the cost pro-
paths [36]: Das et al. observe that when communication portionally to the number of packets forwarded until the
takes place between source–destination pairs, an interrup- cost reaches an upper bound. At this moment, the cost is
tion may occur in case of a link breakage due to various reduced to its lower bound. Nodes use the routing table
reasons. This interruption leads to degraded QoS as the and the packet forwarding auction approach suggested in
user has to wait till another route is discovered. To solve GTMR to decide the next hop where to forward the packet.
this problem, an adaptive framework for computing multi- On-demand discovery of node-disjoint paths [74]: Liu
ple paths in both temporal and spatial domains is pro- et al. design an algorithm to find node-disjoint paths in a
posed. The data transmission in the spatial domain multipath routing protocol for MANETs. A theoretical
balances the traffic load in the network, while the temporal framework proves the equivalence between multipath dis-
domain ensures continuity of data transfer. covery and network flow assignment. The aim is to guaran-
Two different aspects are considered within this frame- tee discovery of node-disjoint paths, a characteristic which
work: (i) preemptive route rediscoveries are performed be- is overlooked by other multipath routing protocols in the
fore route errors occur as data packets are forwarded from literature. The authors first show that this problem of find-
one node to the other. Multiple paths are computed in the ing node-disjoint paths in a MANET is equivalent to the
temporal domain and in the event of a route error, one of flow assignment problem in flow networks. A typical flow
the alternate paths is selected; (ii) multiple paths are also assigment algorithm (the Ford-Fulkerson method) is con-
computed in the spatial domain to ensure forwarding of sidered and with the aid of reverse mapping, the augment-
data at any instant of time. These packets are transferred ing path in the flow network is mapped to an auxillary path
sequentially in blocks over the multiple paths computed, in the ad hoc network (see Fig. 26).
helping to reduce further congestion and link delay. Multiple node-disjoint paths (MNDP) is propose which
The concepts of link stability and path stability are also is an incremental algorithm where an auxillary path is
proposed based on the employed route discovery and route computed and merged with the existing path set between
maintenance schemes. Path stability metric depending on a given source–destination pair. In addition, the auxilary
3062 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

t t Secure multipath routing (SecMR) [80]: Mavropodi


et al. propose a multipath routing protocol with various
security enhancements to guard against collaborating
malicious nodes. The SecMR is an on demand routing pro-
tocol designed to protect against denial of service (DoS) at-
tacks from malicious nodes. Multiple paths may be
affected by several vulnerabilities such as man-in-the-
middle attacks, lack of authentication or the racing phe-
nomenon. The SecMR guards against these vulnerabilities
and discovers existing non-cyclic, node-disjoint paths be-
tween a source and destination. In the path selection pro-
cess, the number of hops is required not to exceed a
G G specific maximum. The SecMR is divided into two main
s s phases: neighborhood authentication and route discovery
and maintenance. The former implements the asynchro-
Fig. 26. Equivalent graphic representation of an ad hoc network [74].
nous mutual authentication of nodes in the neighborhood
using a pair of public secret keys. Each secret key also
path discovery protocol (APDP) is introduced and inte- needs to be certified through a certifying authority (CA).
grated with the MNDP algorithm for discovery and mainte- Signed messages are broadcast to immediate neighbors
nance of multiple paths. The APDP is a derivation of DSR by each node at periodic time intervals containing the cur-
and its route discovery is carried out in three phases. rent time and its unique identifier. In the route discovery,
the maximum hop count is determined before the random
 Phase 1: Initial path from source (s) to destination (t) is key selection. The encrypted key is calculated before the
discovered using DSR and is termed the reference path. message construction and then the message is broad-
 Phase 2: Auxilary path is discovered based on the refer- casted. Every route request query comprises of a different
ence path. independent thread received at the destination. The desti-
 Phase 3: Reference and auxilary paths are merged to nation node decrypts the message with the secret key to
give two node-disjoint paths. check the validity of the received message. The communi-
cation is initiated through node-disjoint routing paths.
To compute k node-disjoint paths, the phases 2 and 3 Disjoint multipath routing using colored trees [99]:
need to be executed k times. Route maintenance is also Ramasubramanian et al. develop a multipath routing pro-
achieved by executing phases 2 and 3 with an existing va- tocol using a pair of colored trees. The proposed red and
lid path as the reference path. blue trees are either link disjoint or node disjoint (see
Scalable multipath on-demand routing (SMORT) Fig. 27). Every node in the network maintains two pre-
[102]: Reddy and Raghavan propose a multipath routing ferred neighbors for every destination. These neighbors
protocol with the aim of minimizing route break recovery compose the respective red and blue colored trees. The
overhead. A primary path from source to destination is distributed algorithm uses only local information to com-
chosen and multiple intermediate nodes are selected on pute multiple disjoint paths to a destination node. The
the primary path to provide multiple paths. The primary drain node, an intermediate or final destination is the
path is most often the shortest path. SMORT has no node in which the data is forwarded along the trees.
requirements on discovering node-disjoint paths and aims Any packet transmitted from the source is marked with
to find multiple fail-safe paths. A fail-safe path is auxillary either red or blue colors. The intermediate node receiving
to the primary path and bypasses at least one intermediate this packet forwards it to the preferred neighbor based on
node on the primary path. Multiple fail safe paths differ the color of the packet. The colored trees are constructed
from the node-disjoint and link-disjoint paths by the fact using the depth first search (DFS) technique. A node in
that they may have common nodes and links. These fail- the network could be in one of the following states at
safe paths reduce route recovery time and path mainte- any point of time: unvisted, visited, cycle, token and fin-
nance overhead more than the node-disjoint routing ish. Nodes in the cycle state belong to both trees and
protocols. This is because in the latter case, route error those in the token state initiate path searches. Once a
packets need to be forwarded to the source node every a node receives a token message, it initiates a path search
link breakage occurs. In fail-safe paths, a new path is se- by sending out search messages. These messages are for-
lected right away thereby keeping the control overhead warded sequentially to every node in the neighbor list
and delay minimal. Route discovery in SMORT is similar until a success message is received from the neighbor. A
to AODV with the only difference being each node is al- node in the cycle state sends this success message. Token
lowed to accept multiple copies of route request packets. messages are then sent to select nodes from which the
To avoid end-to-end routing loops from occurring, SMORT success message was received and the neighbor list tra-
does not allow extra route reply packets from the interme- versed in the reverse direction. Every node finishing the
diate nodes to be relayed back to the source node. Perfor- operation sends a return message denoting the end of
mance evaluation of SMORT shows an average of fifty the operation. After all neighbors send the return mes-
percent reduction in control overhead in comparison to sages, a final return message is sent to the parent node
AODV and forty percent with DMRP. initiating the path search with a token message. This
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3063

procedure results in the creation of a pair of colored trees warded a predefined number of times after link and band-
from the originating source to the drain node. width availability on the path is recalculated. Once the
Reliable and efficient forwarding (REEF) [33]: Conti destination receives multiple REQUEST packets, each path
et al. propose an efficient forwarding, based on reputation is sorted by their failure probabilities. Using the position
and reliability, scheme to be used in conjunction with an and velocity information of the last node that forwarded
existing multipath routing protocol in MANETs. The mech- the packet, link availability is estimated. Once a set of
anism is trustworthy and builds the reputation of each paths is obtained, each path receives a RESERVE packet.
node with a set of forwarding policies while avoiding unre- The source begins data transmission along the path in
liable routes and balance network utilization simulta- which the RESERVE is received. However, the destination
neously. REEF uses only the node’s internal knowledge. sends a RESERVE packet only if a set of node-disjoint paths
The basic principle followed states that cooperation prob- are found.
lems should not be solved by using cooperation. This means
that each node trusts only itself. REEF uses an existing mul- 3.5.1. Comparison
tipath routing protocol to obtain information such as the Multipath protocols find multiple paths between the
next hop and the number of hops towards the destination. source and the destination and use these paths to improve
Packets are forwarded on a route using either a probabilis- on specific performance metrics. The papers discussed in
tic scheme or simply the best/most reliable route. The pro- this section cover a very wide range of approaches. There
tocol basically forwards the packet on the route with the are, however, several discernible trends.
highest success probability. The novelty of this protocol A certain group of papers are striving to add multipath
lies in the fact that the data forwarding is accomplished extensions to existing protocols. Thus, AOMDV [79],
in a lightweight manner with no additional overhead. TMRP[124] and SMORT [102] build on AODV, while the
Multipath security-aware QoS routing (MuSeQoR) work on on demand discovery of node disjoint paths [74]
[103]: Reddy et al. propose a multipath routing protocol and MuSeQoR [103] build on DSR. Note that both are
with QoS guarantees ensuring secure and reliable commu- source originated protocols – in general, most of the
nication even in the case of multiple path failures. Multiple approaches in this class had chosen a source originated
paths are selected based on the current state of the net- approach. Several approaches are also using source routing
work and the number of possible paths present between (such as split multipath routing (SMR) [68]), giving the
source and destination nodes. MuSeQoR considers two source complete freedom over the path to be followed by
types of channel models: erasure channels and corruption the individual packets.
channels. The former deals with channels susceptible to The paths in the multipath protocols must meet indi-
path loss due to link failures while the latter considers vidually performance requirements, similar to single path
channels which may be corrupted by malicious nodes. protocols. In addition, the routes have specific constraints
The protocol is a modification of DSR with no global topol- on their relationship: they must be either link-disjoint or
ogy information maintenance at the nodes. Sessions are di- node-disjoint, although other criteria are also possible,
vided into time frames during which it is assumed that the such as described in NTBR [134]. This is a much more com-
network state remains constant. Based on the network plex optimization problem than, for instance, finding a sin-
state during a session, paths are computed. During route gle shortest path. Among the papers surveyed, several are
discovery, route request (REQUEST) packets are sent by using sophisticated mathematical models for optimizing
the source. These packets contain a sequence number, multiple paths: e.g. Lagrangian relaxation and subgradient
the path traversed and the reliability of the path traversed heuristics (Adaptive QoS routing [36]), network flow the-
till now, the source and destination IDs, the path band- ory (on demand discovery of disjoint paths [74]) and col-
width and the required bandwidth for this session, the ored tree graphs [99].
path failure metric, eavesdropping ratio for this session. We get a different cross-section of the field if we con-
Intermediate nodes keep checking the packet route to sider the ultimate goal of building multiple paths. Surpris-
make sure no loops are created. REQUEST packets are for- ingly, relatively few paper consider load balancing as one
of the primary goals (for instance, SMR [68] and adaptive
QoS routing [36]). For most papers surveyed, the main
objective of the multipath approach is fault tolerance
A A
and/or quick recovery from route failures: CHAMP [118],
NTBR [134], adaptive QoS routing [36] and SMORT [102].
A somewhat different approach is taken by papers
C
Drain
C
Drain which use multipath routing to improve the overall secu-
rity of the transmission and to defend against malicious
nodes (SecMR [80] and MuSeQoR [103]) or to improve
the efficiency of the forwarding in networks with unreli-
B B able nodes (REEF [33]).

(a) (b) 3.6. Hierarchical protocols

Fig. 27. Two node disjoint path from nodes A and B to the drain, While traditional internet routing is natively hierarchi-
computed independently by each node [99]. cal, in the first approximation ad hoc networks route over a
3064 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

flat collection of nodes. As the networks grow in size, these computations through waves of messages with dynami-
approaches lead to increased routing table sizes and con- cally limited propagation speed. The availability of in-
trol packet overhead. Hierarchical ad hoc routing protocols creased bandwidth is transmitted by slow propagating
build a hierarchy of nodes, typically through clustering increase waves, while information about decreased band-
techniques. Nodes at the higher levels of the hierarchy pro- width is transmitted by fast propagating decrease waves.
vide special services, improving the scalability and the effi- Routing in the CEDAR architecture happens as follows.
ciency of routing. The source node sends a route request packet containing
Hierarchical state routing (HSR) [53]: Iwata et al. the source, destination, and the requested bandwidth to
introduce a class of protocols based on multilevel cluster- its dominator, the local core node. The dominator then
ing. The goal is to replace the flooding of the control infor- computes and establishes a QoS route if feasible. The dom-
mation with a local collection of this information in the inator nodes in each cluster maintain local state informa-
clusterhead, followed by the propagation of this informa- tion and communicate with each other using virtual
tion to the other clusterheads. links. Route computation is carried out only on the core
First, nodes form level 0 clusters based on physical path.
proximity and elect a clusterhead. Clusterheads connect CEDAR aims more at robustness than optimality in
to each other using virtual links. Multiple clusterheads computing the routes. Each core node only knows about
can assemble themselves into higher level clusters. When the neighboring core node and has no global knowledge
a node changes its position, link state information is ex- about the core subgraph. This simplifies the maintenance
changed between clusterheads using the virtual links. of the core network which can be necessary due to topol-
The clusterhead collects link state information about the ogy changes induced by the mobility or failure of nodes.
nodes in its cluster and propagates it to other clusterheads Core paths are established on-demand for connection re-
through gateway nodes. quests and route computation is carried out only when a
Routing in HSR happens using a hierarchical addressing specific request for a route is received.
scheme, with the clusterhead acting as routers. When a Eriksson et al.’s dynamic addressing approach [39]:
node wants to send a packet, it sends it first to the local Eriksson et al. propose a dynamic addressing scheme to
clusterhead. The clusterhead looks up the destination and improve scalability in ad hoc networks. The approach is
sends the packet to its nearest gateway node. The gateway based on adding a location based dynamic address to the
node then propagates the packet to the nearest gateway node, in addition to its permanent identifier. A distributed
node at the next level of the hierarchy. The process contin- lookup table is used to map the permanent identifier to the
ues until the packet reaches the gateway node of the des- dynamic address (see Fig. 29). The main challenge is the
tination cluster. The final gateway node routes the packet assignment and maintenance of dynamic addresses, which
to the clusterhead of the destination cluster which then is done through a hierarchical address tree. The approach
forwards the packet to the destination node. had been shown to successfully scale to networks of sev-
Core-extraction distributed ad hoc routing (CEDAR) eral thousands of nodes.
[110]: The CEDAR protocol, proposed by Sivakumar et al. Hierarchical landmark routing (H-LANMAR) [131]:
is allows the consideration of QoS requirements in an ad An extension to the LANMAR scheme [91] is proposed by
hoc setting. The protocol selects a subset of nodes called Xu et al. The LANMAR protocol is logically hierarchical
the core of the network (see Fig. 28). Control messages will and uses landmarks which summarize routing information
only be broadcasted among the nodes of the core, which to remote nodes. H-LANMAR improves the scalability of
can use any existing ad hoc routing mechanism for com- LANMAR through the use of a backbone network. In the first
munication. The core is positioned as a ‘‘self-organizing step, nodes are grouped into dynamic multi-hop clusters,
routing infrastructure’’ which performs route availability with a clusterhead called the backbone node (BN). Backbone

1
11
3
3 6

11 10 8

2
3
4
10 1 11 6 10

1
8

5 9

6 8
7

Fig. 28. Example of a core broadcast. Nodes in black are the core nodes. Solid lines denote links in the ad hoc network. Dotted pipes denote virtual links in
the core graph [110].
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3065

1.
xxx SCENARIO

0xx 3. 2. B
A 1.
1xx

3. 2.
00x 01x 10x 11x
D C

A. C.
D. B. 1. B joins via A
2. C joins via B
000 3. D joins via A
010 100 110

Fig. 29. Address tree for a small network topology. The numbers 1–3 show the order in which the nodes were added to the network [39].

nodes are then connected using higher-level links and the A number of other comparison criteria has been sum-
process is continued recursively to create a multilevel marized in Table 3.6.1.
hierarchy.
In the original LANMAR protocol the packet is for- 3.7. Multicast protocols
warded to the nearest landmark. In contrast, H-LANMAR
routes the packet to the nearest BN which then forwards Multicasting is the simultaneous transmission of data
it along the backbone network to the other BNs until the from one sender to multiple receivers. Several widely used
packet reaches the BN of the destination node. This BN applications require multicasting at least at the logical le-
then sends the packet either directly to the remote location vel. Examples include audio–video teleconferencing, real-
or to its nearest landmark. This process helps in reducing time video streaming and the maintenance of distributed
the number of hops to the destination and the overall databases. In many cases it is advantageous to implement
packet delay. It is assumed that each node is simulta- multicasting at the level of the routing algorithm (other
neously running the LANMAR scheme locally in case of a approaches would be one-to-all unicast or the implemen-
failure in the backbone. tation of multicasting at the application layer). In the fol-
lowing we review several representative examples of
3.6.1. Comparison multicast ad hoc routing protocols.
Hierarchical routing protocols, in general are proposed Dynamic core based multicast routing (DCMP) [35]:
as a scalability approach. In contrast to wired IP routing, Das et al. introduces DCMP, a source-initiated multicast
the hierarchy has nothing to do with the hierarchical nat- protocol. DCMP has been designed from the ground up as
ure of the address, rather the hierarchy reflects a geograph- a multicast protocol, without relying on existing unicast
ical clustering of the nodes. protocols.
Eriksson et al. [39] is an unusual case in the sense that it DCMP classifies the sources into active, core active, and
introduces a second, dynamic address for the nodes, based passive as shown in Fig. 30. Active sources use the tradi-
on their geographical location. tional technique of flooding the network with JoinReq
Another interesting observation is that all the protocols control packets at regular intervals. Nodes which desire
we have reviewed create the hierarchy dynamically and in to join the multicast group as a destination, reply with a
a distributed manner. It is certainly possible to create a JoinReply packet along the reverse path to the source.
hierarchy in a centralized way – yet none of the ap- Passive nodes do not participate in the creation of the mul-
proaches have chosen to do so. ticast routes themselves. Instead, a subset of the active
Another way to think about these protocols is whether nodes, the core active nodes form a shared mesh through
the protocol have been a hierarchical adaptation of a previ- which the passive sources transmit their data packets. A
ously existing protocol (H-LANMAR [131]) or have been single core active source can support a maximum of Max-
designed from scratch to be hierarchical (all the other re- PassSize passive sources and the hop distance between
viewed protocols). these sources is limited by the MaxHop parameter.
Another aspect we need to consider is whether QoS Simulation results show that the control packet over-
considerations such as the current load affect the hierar- head of DCMP is up to 30% percent lower compared to mul-
chical routing or not. From the surveyed protocols only CE- ticast routing protocols not employing a core. This leads to
DAR [110] considers QoS considerations. an increase in scalability and multicast efficiency of about

Table 3.6.1
Hierarchical routing protocols comparison.

Protocol Routing tables Update frequency Hello message Critical node


HSR Yes Periodic Yes Yes
CEDAR Yes On demand No Yes
Eriksson et al. Yes Periodic No No
H-LANMAR Yes Periodic No Yes
3066 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

S1

S2
Node not in multicast
group
S3
Forwarding node

R Normal active
S
source
A S Passive source
S4

Core Active source

R Receiver

Fig. 30. Mesh topology in DCMP [35].

10–15%, with a slight tradeoff (2%) in the packet delivery the node decide whether it wants to retain it. ADMR de-
ratio for networks with light traffic loads. tects moments when the overall node mobility is very high
Adaptive demand-driven multicast routing (ADMR) and automatically starts flooding the network with data
[54]: Jetcheva and Johnson propose ADMR, an on-demand packets. After a short period of time, ADMR switches back
multicast routing algorithm with almost no periodic com- to the normal mode since within this time node mobility
ponents within its system. ADMR dynamically maintains may have reduced. Controlled flooding is highly beneficial
the multicast routing state for active groups of nodes. and its relation with regular flooding is shown in Fig. 31.
The protocol uses source-based forwarding trees and con- The novel features of the protocol are summarized [54]:
tinuously monitors the traffic pattern of the source. This al- (i) no periodic floods of control packets or routing table ex-
lows ADMR to detect broken links in a tree as well as to changes and it also does not require any core node; (ii) pas-
identify the sources which stopped sending data packets. sive acknowledgments are used to automatically adjust
The sender node will transmit ‘‘keep-alive’’ messages to trees; (iii) high node mobility can be detected by ADMR
maintain the forwarding tree. When the source wants to and in such a scenario it simply reverts to flooding of data
terminate the route, it stops sending the ‘‘keep-alive’’ mes- packets since routes become unstable and change fre-
sages, and the tree expires. Similarly, the receiver nodes quently; (iv) a limited number of keep-alive packets are
need to keep alive their respective branches by sending forwarded to bursty sources to ensure that their forward-
downstream passive ACK messages. If these messages are ing trees are maintained as often as possible and distin-
stopped, ADMR ‘‘prunes’’ the specific branches of the for- guish between lack of data or complete disconnection.
warding tree. Multicast data packets are forwarded from AMRoute: ad hoc multicast routing protocol [130]:
the sender to the multicast receivers using MAC layer mul- Xie et al. propose AMRoute which aims to avoid the high
ticast transmissions along the path of shortest delay. control packet overhead associated with the maintenance
In a network with highly mobile nodes the cost of main- of multicast trees in ad hoc networks with highly mobile
taining the quickly changing multicast trees is higher than nodes. It does not support guarantees for minimal band-
simply flooding the information to every node and letting width and packet latency; the main design objectives are

Tree flood

Network Flood

Fig. 31. Tree flood vs. network flood [54].


A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3067

robustness and scalability. A conventional unicast routing are deleted. Flooded messages also avoid these violating
protocol is used to keep track of the network dynamics. links.
AMRoute is independent of the underlying unicast proto- QoS multicast routing using multiple paths/trees
col, which can be chosen according to the specific network [128]: Wu and Jia propose a routing protocol using multiple
requirements. parallel paths or trees to ensure the bandwidth require-
Thus, AMRoute is only concerned with the dynamics of ment of a connection. The protocol is distributed and uses
the multicast groups. The protocol defines user-multicast standard route discovery and route reply techniques. The
trees composed of senders and receivers. Packet forward- QoS requirements include a bandwidth requirement for a
ing is carried out by the members of the groups over the route and a delay bound represented by the number of hops
unicast tunnels which form the links in the tree. Through from source to destination. Similar to other on demand pro-
this approach, in AMroute nodes which are not members tocols, RREQ packets are broadcast from the source and
of the multicast trees do not need to support any multicast RREP packets are returned by the destination. Since the
protocol and hence are not storing any state information. destination may receive multiple RREQ packets, it has mul-
AMRoute uses a logical core to discover new group tiple possible routes to the source. It runs a paths/tree
members, create and maintain the multicast tree. The log- selection algorithm to construct the multicast trees. Three
ical core is not fixed, it changes with the group dynamics. different tree selection algorithms are proposed:
Energy efficient multicast routing [69]: Li et al. focus
on developing an energy efficient multicast routing proto-  Shortest path tree based multiple-paths (SPTM): It com-
col. By assigning the transmission power of each node as a putes the shortest path in terms of hops between source
weight, the network graph is transformed to a new graph and destination. SPTM uses multiple paths from the
with weights between edges. The minimum energy multi- shortest path tree (SPT), that a branch in the SPT con-
cast (MEM) problem is to find the multicast tree whose total sists of several parallel paths.
energy cost is minimized. The problem now reduces to the  Least cost tree based multiple-paths (LCTM): It uses QoS
directed Steiner tree (DST) problem. This is a known NP- parameters such as bandwidth and delay to compute a
hard problem, and the authors show that it is unlikely that delay-bounded least cost tree. The source node is the
there is an approximation algorithm with a constant perfor- start of the tree and the destination node is added if it
mance ratio to the number of nodes in the network. The presents the least network cost.
authors show several heuristic approaches for the problem.  Multiple least cost trees (MLCT): The source searches
In the node-join-tree (NJT) algorithm a cover set con- for least cost trees (LCT) until the aggregate bandwidth
taining all non-leaf nodes is built incrementally by select- for all LCTs satisfy the net bandwidth requirement. Due
ing the shortest path from the source node to the nodes in to multiple parallel trees the delay variance could be
the uncovered set. The heuristic grows the multicast tree by large, but the highest delay value is maintained within
selecting the nodes with the highest energy efficiency. The the delay bound.
authors describe a distributed implementation of the algo-
rithm where nodes have information only about their Genetic algorithms for group multicast [100]: Ran-
neighbors. daccio and Atzori propose a genetic algorithm (GA) based
QoS multicast routing protocol for clustering mobile approach to the problem of finding multicast trees which
ad hoc networks (QMRPCAH) [67]: Layuan and Chunlin optimize bandwidth and delay parameters.
present a QoS aware multicast protocol for MANETs with The algorithm is initialized by building a population of
clustering. The proposed QMRPCAH protocol allows a node multicast trees in isolation by combining unicast paths be-
to maintain only local multicast information and a sum- tween the source and destination pairs. The unicast paths
mary of other clusters; it does not require knowledge of follow the shortest path in terms of hops, calculated using
the global network. The protocol supports soft QoS without Dijkstra’s algorithm. From this initial population, the GA
any hard guarantees. There may exist transient periods of algorithm generates various (possibly sub-optimal) combi-
time without the required QoS, for instance during periods nations and selects them for fitness. The fitness function
of congestion, link breakage or packet loss. used by the GA is based on the weighted average of trans-
In QMRPCAH every node periodically measures the de- mission delay and network resource utilization.
lay on its outgoing links and broadcasts it to the members Fireworks [66]: Law et al. propose a 2-tier multicast/
of its cluster. Thus, every node keeps its intra-cluster rout- broadcast routing protocol, Fireworks, which adapts itself
ing tables updated. Bridge nodes maintain the inter-cluster based on network topology and group density. At appropri-
routing tables in a similar fashion. When a mobile node en- ate times, it resorts to broadcast instead of multicast. Sen-
ters a new domain, it uses a remote subscription method to sor nodes are grouped together with local group leaders or
subscribe to the new domain and joins the local multicast cohort leaders corresponding to areas of high group mem-
tree. When a node wants to join a multicast tree a JoinReq ber affinity. These cohort leaders establish a sparse multi-
message is forwarded to the parent bridge node. The bridge cast tree between themselves and the source node while
appends its own address to the message and forwards it to they broadcast messages within the local group members
the top level bridge node if it is not aware of the multicast within their own cohort. The 2-tier hierarchical structure
tree itself. Multicast tree (MT) messsages are forwarded comprises of the upper tier formed the source and cohort
from the top bridge node to the local node. leaders (see Fig. 32). The lower tier consists of the members
QMRPCAH uses a receiver-initiated selection flooding in the cohort. The authors use a new metric termed
algorithm where links violating bandwidth constraints as cohesiveness which maintains the affinity of group
3068 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

C
Group source

Cohort leader
D

Group member

Ordinary node
A
Upper tier multicast structure
B

Cohort region

Fig. 32. Fireworks 2-tier multicast hierarchy structure [66].

members within a node’s k-hop radius. Individual group within its sub-group. The source nodes of each group and
members are discovered using special ADVERTISE mes- sub-roots form a special sub-group for upper level multi-
sages which contain the address, multicast address, cast which is used by the source node to deliver packets
hopcount and cohesiveness of the node. The joining node to the sub-roots.
then determines whether it should join as the cohort leader In the overlay-driven multicast scheme, a hierarchical
for its k-hop neighborhood. The node becomes a cohort overlay multicast protocol is used to construct the virtual
leader if it does not find any cohort leader and broadcasts multicast tree. In this framework, the upper level multicast
a LEADER message. The upper tier structure is constructed tree needs to be logically spanned over all the group mem-
by the source sending SOURCE-QUERY messages which are bers. Once the tree is constructed, each non-leaf node is
replied to by cohort leaders using SOURCE-REPLY mes- responsible to forward packets to its children in the tree.
sages. Within group members, Fireworks uses broadcasting This mechanism further improves the data delivery
to forward data while it uses multicasting between cohorts. efficiency.
Probabilistic predictive multicast algorithm (PPMA) Application layer multicast algorithm (ALMA) [44]:
[95]: The Probabilistic Predictive Multicast Algorithm Ge et al. propose an application-layer receiver-driven over-
(PPMA) proposed by Pompili and Vittucci improves the lay multicast protocol. As the ALMA protocol operates at
robustness and reliability of multicast trees in the event the application level, it can be used in conjunction with
of link and/or node failures. The algorithm defines a new any routing protocol.
way to quantify the suitability of a link, the probabilistic ALMA creates a tree of logical links between the group
link cost which is comprised of three terms: energy, dis- members. If node mobility or congestion makes it neces-
tance and lifetime. Using this new metric, the multicast sary, the tree can be dynamically reconfigured. Each edge
trees can be computed in the centralized or distributed of the logical multicast tree represents a logical link – a path
manner. In the centralized approach, the algorithm simply at the network layer (see Fig. 33). The members of the the
substitutes the new metric for the other metrics tradition- group can choose to allow zero, one or more children. A
ally used in the centralized Bellman-Form algorithm (such new member joins the group by sending join messages to
as hop count). multiple existing members. A member willing to take a
In distributed PPMA, the multicast tree is created based new child responds and accepts the new node within the
on a private and a public link costs. The private link cost is tree. If multiple replies are received by the new node, it
used by the nodes which are already added to the multi- chooses the member who replies the first. If a member
cast tree, while the reminder of the nodes in the network, wants to leave a group, it sends an explicit leave message
used the public link cost to aggregate paths and form mul- to its parents and children nodes. Node failures are treated
ticast trees. similarly to unannounced departures from the tree. Thus,
Hierarchical multicast techniques and scalability each member sends periodic hello messages to its parent
[49]: Gui and Mohapatra introduce a framework for hierar- and receives a return response. If no reply is received in a
chical multicasting in MANET. The proposed approaches pre-defined time interval, the nodes assumes the parent
include a domain-based and an overlay-driven. has failed and it tries to rejoin the tree. Hello messages also
In the domain-based scheme, a large multicast group of provide a mechanism to measure the quality of a path. Chil-
nodes is divided into sub-groups. Each sub-group is as- dren monitor the quality of the path to their parent and
signed as a sub-root, chosen based on topological optimal- may switch parents when required. With members joining,
ity. The sub-root uses its own lower-level multicast moving or leaving, the multicast structure is changing
protocol to create its tree and deliver packets to nodes and thus the tree requires constant reconfiguration. New
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3069

and distance d away from the current location of the node.


A
Nodes generate information about the movement, inten-
sity and location of threats. This information is multicast
through the network using a sensor-push receiver-pull ap-
X Y Z
proach. Here, sensors push the information into the net-
C
work while receivers pull the relevant information. The
B D
network is divided into geographic regions and a sensor
physical link
between
logical link between detecting a threat broadcasts it into one of these small re-
C and D
X and C gions. Individual receivers then pull threat warnings from
nodes that lie in the direction of travel. The broadcast mes-
Fig. 33. Logical links versus physical links [44].
sage is forwarded in the projected path of the threat to the
leader nodes of each region. Each leader receiving the mes-
parents are searched by nodes based on the average esti- sage broadcasts it within their groups. Whenever the
mated round-trip time (RTT) of a link. New parents should threat changes direction, a new message is created and re-
have an RTT less than a pre-specified RTT threshold. Loops broadcast. Nodes pull the messages containing the threat
can be detected in ALMA but not entirely avoided when two information to be warned. Using the PULL_REQUEST mes-
members decide to switch parents at the same time. sage, the node requests the leader of the block to send the
QoS aware multicast routing [114]: Sun and Li de- threat message after a certain time. The leader then sends
scribe a series of QoS extensions to the MAODV protocol. back all information it has about the threat. These pull re-
The approach uses the delay, bandwidth and packet-loss quests have a time to live (TTL) field during which the lea-
characteristics of MAODV with no additional signaling. It der sends back threat messages to the node issuing the pull
also incorporates multicast routing capability with the request. This ensures that pull requests are only used infre-
existing unicast. A source node sends a QoS route request, quently thereby not causing flooding in the network.
RREQ, which is forwarded by intermediate nodes until it Differential destination multicast (DDM) [55]: In the
reaches the destination. The destination sends back the DDM algorithm, proposed by Ji and Corson the source node
RREP packet with a delay time corresponding to a prede- of a multicast transmission encodes all the destination ad-
fined node traversal time (NTT). Intermediate nodes add dresses within each data packet header in an in-band fash-
their own NTTs to the delay value and update their routing ion. With this approach, no fixed multicast tree is created,
tables. Routes with the minimum delay are selected for the routing will be soft-state, similar to state routing algo-
data transmissions. A similar technique is applied for the rithms such as DSR. This allows a lower control overhead,
bandwidth requirement where source nodes indicate their as there is no need for extra packets to maintain multicast
bandwidth requirements and intermediate nodes compare forwarding state. Control overhead only occurs when there
their available bandwidth before forwarding the packet. is actual data to send. Nodes along the paths also do not
Ad hoc QoS multicasting (AQM) [22]: Bur and Ersoy need to maintain alternate backup routes. Once a node re-
propose the AQM protocol which tracks QoS availability ceives a data packet, it checks the DDM header to deter-
within the neighborhood of every node based on the mine which node to forward the packet. This information
requirements and announces it during the session initia- will be remembered to help in the forwarding of future
tion. In order to join a session, the nodes go through a re- packets in the same direction. If the destination node
quest-reply-reserve procedure that ensures the QoS changes, the upstream node informs all its immediate
information is updated and a possible route is selected. neighbors about the difference in the forwarding node.
A session is initiated by the initiator (MCN_INIT) node Robust multicasting in ad hoc networks using trees
by broadcasting a session initiation packet (SES_INIT). (ROMANT) [117]: The ROMANT algorithm proposed by
This packet consists of the identity number and QoS class Vaishampayan et al. uses a receiver-initiated group joining
of the new session while also setting the bandwidth and scheme which does not require any underlying unicast
hop count rules for the session. Active sessions are routing protocol or the pre-assignment of cores to groups.
maintained in a table (TBL_SESSION) at each node. A mem- The cores of the groups are determined as follows.
bership table (TBL_MEMBER) maintains the status of pre- When a receiver joins a group, it checks if it has ever re-
decessor nodes. The session information is maintained ceived a core announcement for that group. If it did, the
with periodic session updates keeping track of changes in node joins the group as a non-core node. Otherwise, the
the QoS conditions and node connectivity. Session update node considers itself to be the core of the group and starts
packets (SES_UPDATE) refresh the session information sending core announcement packets with a core ID. If sev-
periodically while session termination (SES_TERMINATE) eral receivers join the group simultaneously, the one with
closes a session. On session termination, nodes clean their the highest ID becomes the group core.
tables and free the reserved resources for that session. The periodically broadcasted core announcements are
Neighborhood maintenance is also carried out by broad- used to establish a connectivity list at each node, storing
casting periodic hello packets (NBR_HELLO) which informs information about the core and routes which lead to the
neighbors of the node’s current bandwidth usage. core. Router nodes use the core announcements received
Content based multicast (CBM) [138]: Zhou and Singh to determine where to route data packets. Data packets
present a multicast model for a scenario where nodes are are forwarded to nodes from which the core announce-
interested in obtaining information about specific threats ment with the highest ID has been received and the core
and resources. These threats and resources are a time t then forwards the data packet across the tree.
3070 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Epidemic-based reliable and adaptive multicast for and PPMA [95] where energy is part of the probabilistic
mobile ad hoc networks (EraMobile) [88]: Ozkasap link cost.
et al. propose a reliable and adaptive multicast protocol Most protocols use a distributed implementation, with
based on bio-inspired epidemic methods. Epidemic meth- the only exception being the genetic algorithm based ap-
ods are stateless, thus they are a good match for the rapidly proach [100].
changing, non-deterministic structure of MANETs. The Finally, there is a question whether the protocol consid-
algorithms takes advantage of the broadcast nature of the ers QoS features such as minimal bandwidth of the multi-
wireless medium to send gossip messages locally within cast. QoS assurance almost always conflicts with resource
a multicast group to neighboring nodes. conservation, as nodes with move advantageous locations
The traditional approach in gossip based protocols is to or higher bandwidth will tend to become overloaded. From
select a random node from a predefined list before unicast- the surveyed protocols, the ones considering QoS are:
ing the gossip message to the node. In EraMobile, the node QMRPCAH [67] (soft Qos), QoS multicast routing using
gossips with a random subset of one-hop neighbors, con- multiple paths/trees [128], QoS aware multicast routing
stantly changing with node mobility and changes in the lo- [114], AQM [22].
cal node density. The frequency of gossip messages are also
adjusted dynamically. 3.8. Geographical multicast (geocast) protocols
The periodic gossip messages allow nodes to recover
missing data packets and make the protocol robust against Geographical multicast (geocast) routing is a variant of
delivery failures. The gossip messages also reduce the multicast where the goal is to route the packets coming
bandwidth and energy usage and allow a lower control from a source to destinations located within a specific geo-
overhead compared to multicast flooding. graphical region. Naturally, for geocast to work, the nodes
need to rely on localization techniques (such as GPS). An
3.7.1. Comparison earlier survey on geocast protocols can be found in [78].
One of the important comparison terms is whether the In the following we survey some of the representative
multicast happens at the network layer or somewhere else. geocast algorithms. (To unify the terminology, we shall
Most protocols position the implementation of the multi- use the term geocast throughout this survey – different pa-
cast at the network layer. ALMA [44] implements it at pers use slightly different terminology).
the application layer (more exactly, at what the ISO model Direction guided routing (DGR) [6]: The DGR algo-
would call the session layer – but in our current 4-layer rithm, introduced by An and Papavassiliou relies on clusters
networking hierarchy would be the lowest sublayer of of nodes, roughly equivalent to the cells in cellular tele-
the application layer – with multiple applications being phony. The clusters are created and the clusterheads elected
able to be built on top of it). using dynamic techniques such as Mobile Clustering Algo-
Most multicast protocols are based on the receiver sub- rithm (MBC) [5]. DGR then creates a mesh structure on
scribing to the transmissions of a specific sender. An inter- top of the clusterheads, with the objective to deliver packets
esting exception is CBM [138], which performs multicast within the cluster using reduced overhead. The algorithm
based on the content rather than the source of the messages. for delivering the messages from a source to a specific
Almost all the protocols are based on building a multi- geocast zone can be described in the following steps:
cast tree, although there are some exceptions. CBM [138]
does not build a tree due to its radically different distribu- 1. The source formulates the geocast zone, calculates its
tion model. Differential destination multicast (DDM) [55] distance to the center of the zone and sends the geocast
performs an on-demand, soft state based multicasting messages to its own clusterhead.
without constructing an explicit tree. Finally, EraMobile 2. When the source clusterhead receives a geocast mes-
[88] replaces the multicast tree with a stateless approach sage, it creates and broadcasts a GeoJOIN REQUEST to
based on epidemic algorithms. neighboring clusterheads. This is achieved by using
Another question is whether the algorithm is consider- the Boundarycast and BoundaryCrosscast operations
ing the state of the underlying network in the choice of the [51]. When a boundary node receives the GeoJOIN
routing tree. There is an overall group of protocols whose REQUEST from its clusterhead, it executes the Boun-
approach is to select a core of the network. These nodes darycast operation, which is used for routing between
will serve as forwarding nodes (for instance, as the non- clusters.
leaf nodes of the multicast tree). Naturally, the nodes in 3. If a non clusterhead receives the GeoJOIN REQUEST, it
the core will be nodes with more resources (although other determines whether it is within the geocast zone of
criteria might also be considered – for instance, the fact the sender by checking the geographical location within
that the core must extend in all geographic areas of the the message packet header. If it is within the geocast
network). From the protocols reviewed, core based proto- zone, it simply accepts this message. Otherwise the
cols are DCMP [35], AMRoute [130] (‘‘logical core’’), Fire- node makes a decision to forward or not based on dis-
works [66] (‘‘cohort leaders’’), and ROMANT [117]. The tance calculations. These reduce the overhead associ-
latter is an example of those protocols where the choice ated with route discovery by limiting the region in
of the core is not based on resources (being simply based which control messages are forwarded.
on the highest id). Other protocols do not establish a core 4. When a clusterhead receives the GeoJOIN REQUEST, it
but consider the available resources of the nodes on a stores the clusterhead ID of the earlier clusterhead and
case-by-case basis: energy efficient multicast routing [69] performs geocast membership management strategies.
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3071

If such members are present, it sends GeoJOIN REPLY Since the area in this case is much smaller than the previ-
messages to its upstream clusterheads. When these ous case, a more sparse mesh is created. The CONE FA fur-
clusterheads receive the messages, they save the ther restricts the the forwarding zone to an area enclosed
clusterhead ID of the node where the message is by the source node acting as the vertex and the angle cre-
received and send the message further on upstream. ated from the tangential sides from this vertex (see
Finally, as the source clusterhead receives the GeoJOIN Fig. 34).
REPLY message, the operation is completed. If a mesh node receives a non-duplicate JD packet and it
is within the forwarding zone but not within the geocast
Geocast adaptive mesh environment for routing (GA- region, it adds its own address to the source route in
MER) [24]: Camp and Liu propose the GAMER protocol the header and forwards it to its neighbors. However, if
which creates a dynamic mesh based on the mobility prop- it is within the geocast region, it responds by sending a
erties of the nodes: highly mobile nodes create a dense JOIN-Table (JT) packet to its neighbors. This packet con-
mesh, while nodes with a limited mobility create a sparse tains the reverse source route from the JD packet which is
mesh. The mesh creation approach is based on the ap- then forwarded to the source which can start sending data
proaches by Chiang and Gerla [29] and by Garcia–Luna– packets.
Aceves and Madruga [42]. A geocasting protocol for mobile ad hoc networks
The geocast aspect of GAMER is based on the forward- based on GRID (GeoGRID) [73]: Liao et al. base GeoGRID
ing zone strategies used in LAR [61] and DREAM [11]. In on the unicasting routing protocol GRID [72]. GeoGRID
DREAM, a circle is created which is centered on the last uses location information to define the forwarding zone.
known location of the destination node. The radius of the The geographic area of the network is divided into logical
circle depends on the velocity of the destination node. grids of size d by d. In each grid area a gateway node is
After defining the forwarding zone, the source node sends elected, whose responsibility is to forward the geocast
the data packet to nodes within one-hop distance of this packets. GeoGRID uses two geocast forwarding methods:
zone. The nodes then repeat the process by creating their flooding based and ticket based.
own forwarding zones and forwarding the packets. There-
fore, instead of flooding the entire network, the nodes only  Flooding based GeoGRID: In this method, only gateway
flood their respective forwarding zones. nodes within the forwarding zone are allowed to broad-
GAMER uses a source routing approach based on cast the geocast packets.
DSR[57] to route geocast packets around the network.  Ticket based GeoGRID: In this technique, only selected
The main problem with source routing is the fact that large gateways are allowed to forward the geocast packets.
amounts of overhead is generated by storing the entire If the entire region is divided into an m by n region, a
route in the packet itself. Camp and Liu state that GAMER total of m + n tickets are first generated. The source then
could be modified to store only the local state information distributes these tickets evenly to neighboring gateway
instead of source routing information. nodes in the forwarding zone which are closer to the
Let us now describe the operation of the GAMER geocast region than the source.
protocol.
When the source node in GAMER wants to send geocast The election of the gateway is an important issue in the
packets to transmit, it periodically sends JOIN-DEMAND GeoGRID protocol. The initial gateway of the grid is the
(JD) packets to the geocast region. As all mesh nodes in node closest to the physical center of the grid. One way
the target region must join the group, the approach might in which the gateway of a grid might change is when the
be more correctly described as geo-broadcasting. The gateway node moves out of the grid. Alternatively, a gate-
source node chooses one of three possible forwarding ap- way node can silently turn itself to a non-gateway node
proaches (FAs): FLOOD FA, CORRIDOR FA or CONE FA. and relinquish control to the other more suitable node
FLOOD FA floods the network with the JD messages. In who is then elected as the gateway. Another method of
CORRIDOR FA, a rectangular forwarding zone is created electing gateways could be by using the concept of node
and the JD packets are forwarded through this corridor. weights as in [10].

fail fail

CORRIDOR FLOOD

CONE succeed
succeed

Fig. 34. Flow of the FA used to transmit the next JD packet in GAMER [24].
3072 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Geocasting in mobile ad hoc networks (GeoTORA)  Minimize energy consumed per packet: Let us consider a
[63]: Ko and Vaidya propose the GeoTORA protocol which packet j traversing a path formed of the nodes
builds upon the unicast TORA [89] routing protocol. TORA n1,n2, . . . , nk. Let us denote the energy needed to trans-
uses the distributed ‘‘link reversal’’ algorithm and provides fer the packet from node a to b with T(a,b). The goal is to
Pk1
multiple routes to the destination. It also uses the concept minimize i¼1 Tðni ; niþ1 Þ for all packets j.
of ‘‘heights’’ to determine direction of the links. In GeoTO-  Maximize time for network partitioning: This require-
RA, the source node anycasts the geocast messages to the ment tries to balance the load on the network in such
geocast group by using TORA. Once any node in the geocast a way as to delay, as much as possible, the moment in
region receives the geocast packet, it floods the packet into which node failures leave the network as two or more
the region. This helps in limiting flooding only within its disjoint graphs, without interconnections.
own region.  Minimize variance in node power levels: This metric
directly relates to the extension of the network’s life
3.8.1. Comparison of geographical multicast protocols time. No node should be penalized with a higher energy
Geographical multicast involves multicasting to a collec- consumption than its peers, assuring that all nodes will
tion of nodes which are defined as destinations by their remain up and running together for as long as possible.
physical location. Many protocols in this class are building  Minimize cost per packet: The minimization of energy
upon other protocols: often on location aware protocols consumption might lead to situations where some
such as LAR, DREAM and GRID, but the starting point can nodes in specific locations will need to forward more
also be a non-location aware reactive protocol such as TORA. traffic, exhausting their energy supplies. To extend the
Despite their various roots, geocast protocols need to life time of the network we need to define a cost metric
solve a common set of challenges: how to define the geo- which can ensure that no node with low energy level
cast area and how to efficiently route the messages to all will participate too often in routes. We can define a
the nodes in that area. The approaches taken by the proto- function fi(xi) that estimates the ‘‘node cost’’ or ‘‘weight’’
cols are very varied. DGR [6] allows the geocast area to be of a node i (where xi is the total energy expended by i).
an arbitrary polygon, but for efficiency purposes it approx- This intuitively defines the node’s reluctance to forward
imates it with a circle, ellipse or a rectangle. GAMER [24] packets. Possible forms of this function include combi-
routes towards a rectangular geographic area using a mesh nations of inverse relations between the current battery
of paths which are either unconstrained, or constrained in life and the cost at that node (i.e., higher the battery life,
a rectangle or a cone. For GeoGRID [73] the destination re- lower the cost at that node).
gion is a rectangular subset of the grid. The routing can be  Minimize maximum node cost: If Ci(t) denotes the cost
either minimally constrained by a rectangle covering both to route a packet through node i at time t, and C0 (t)
the source and the destination rectangle or through a tick- denotes the maximum C(t) over all the nodes, the goal
eting approach where the number of tickets issued is con- is to minimize C0 (t). In other words, the aim is to mini-
trolled by the source. Finally, GeoTORA [63] takes an mize the maximum node cost after routing N packets to
approach where it first forwards the packet to any node their destinations or after T seconds. Using this metric
in the geocast region through unicast, followed by a local will delay the time point where the first node in the
flooding phase where the packet is flooded throughout network will fail and will implicitly reduce the variance
the geocast area. in the node power levels.

3.9. Power-aware protocols The paper shows through simulations that the pursuit
of these optimization criteria is possible and significant
Power-aware routing makes the routing decisions cost reductions can be achieved. Naturally, one cannot
dependent on considerations of the available energy of optimize simultaneously along all axes, as some of the cri-
the nodes. These considerations can be significantly more teria conflict with each other (for instance, for most net-
complicated than simply finding the route with the lowest works, the minimum energy consumption routes are not
energy consumption (in fact, the shortest path is almost al- the one with the lowest variance on the node energy
ways the one with the lowest energy consumption). The usage). The paper does not propose full fledged routing
protocols from this class take into consideration both the protocols, but offer a guidance with respect to what sort
heterogeneity of the energy resources of the nodes, as well of metrics future protocols would need to strive to, and
as the uneven energy consumption due to the topology of how these would be evaluated.
the network and the nature of the data flows. For many of More than a decade later, we can, with some confi-
these protocols, the ultimate objective is to maximize the dence, say that the authors were very optimistic when
lifetime of a network with nodes with limited and fixed en- stating that the integration of these metrics in routing pro-
ergy resources. tocols will be easy. Many subsequent papers in power
Power aware routing in mobile ad hoc networks aware ad hoc routing can be seen as attempts to find prac-
[109]: In an influential early paper from 1998, Singh tical solutions to the challenges outlined here.
et al. argue that routing protocols for ad hoc networks Device and energy aware routing (DEAR) [7]:
should possibly consider, in addition to the shortness of Avudainayagam et al. propose a protocol for a heteroge-
the paths, one or more from a collection of other metrics neous network where some nodes are on battery power
which impact power consumption. The paper proposes while other nodes are connected to a continuous supply
the following metrics: of power (or can be periodically recharged as needed).
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3073

The goal of the protocol is to rely on the latter type of aware of the power control since link quality mainly de-
nodes for most of the routing functionality, thus extending pends on the available battery power at each node.
the lifetime of the battery powered nodes. The CLUSTERPOW protocol uses a dynamic and implicit
The DEAR procol calls a node device-aware if it can dis- clustering of nodes in a network. The clustering criteria is
tinguish between whether it is battery powered or exter- the power levels of each node (in contrast to the traditional
nally powered and the cost of using a device of the latter clustering approaches based on addresses or geographical
type is zero. The routing table of device-aware nodes has placement of nodes). A route is selected by ensuring that
an additional field called DeviceType which indicates each hop in the route has a maximum transmit power
whether the destination node is on battery power or is level.
externally powered. An additional redirect table contains The tunneled CLUSTERPOW scheme augments this pro-
pairs of destination addresses and redirect addresses. tocol with the ability to perform packet encapsulation at
After every routing table update, the node calculates the low power levels instead of sending the packet directly
least cost to any externally powered device from its rout- to the next hop.
ing table and updates the redirect table accordingly as Finally, the MINPOW protocol relies on the distributed
well. During routing, the node compares the cost of reach- Bellman-Ford algorithm with sequence numbers, using
ing the destination versus the cost of reaching a powered the total power consumption as a metric instead of hop
node, and if the latter is cheaper, it will redirect the packet count. To calculate the shortest path, any of the existing
to a powered node. The DEAR protocol assumes that any shortest path algorithm can be used to calculate the small-
powered node can boost its transmission power such that est transmit power required to traverse the link. MINPOW
it is at a one-hop distance to any destination, thus the takes into consideration the total power consumed in com-
transmission from the powered node is considered to be munication instead of individual power levels.
of zero cost from an energy consumption point of view. Interference aware cooperative routing [77]: Mah-
Routing and channel assignment for low power mood and Comaniciu propose an algorithm specifically tar-
transmission in PCS [107]: Scott and Bombos propose a geted to CDMA-based ad hoc sensor (in contrast to the
technique for minimizing the transmission power in PCS collision-based physical layer models assumed by most
networks by the simultaneous choice of the route and other algorithms).
channel assignment (this combined problem is called ‘‘call CDMA networks almost always implement a variable
placement’’). The aim is to increase the lifetimes of the transmission power to prevent the ‘‘nearfar effect’’, where
individual nodes, and hence the network lifetime. The ap- the useful signal is drowned by strong interference from
proach chosen is similar to the frequency reuse factor in adjacent transmitters.
AMPS cellular service. The two algorithms proposed by Mahmood and
Due to the inherent complexity and the overhead in- Comaniciu maximize the throughput and minimize energy
volved with the continuous optimization of the entire net- consumption in ad hoc networks. The proposed strategies
work, the authors use an approach which is triggered only try to mitigate the near-far effect at the network layer by
when new calls are made. In this least disturbance ap- making appropriate selections of routes within the net-
proach, new calls are placed such that the total power re- work instead of using more sophisticated power control
quired to sustain the new call is minimal. This will techniques.
minimize the new call’s interference with the rest of the The first approach is based on minimum energy routing
network. with additional selection criterion based on the potential
Energy conserving routing in wireless ad hoc net- interference levels. Once a route has been selected, the
works [26]: Chang and Tassiulas start with the observation algorithm estimates the interference created by each node
that in general, the routes with the lowest energy cost are on the route to neighboring nodes. If this level is higher
the routes with the least hops. It would appear that calcu- than a threshold, the node, as a potential near-far effect
lating the shortest path would also minimize the energy hot spot, is removed from the route.
use. However, this technique leads to high energy con- The second approach is based on joint minimum energy
sumption of the nodes which are along the shortest paths, and near-far minimization routing, using a composite met-
while the battery power of the other nodes in the network ric. Several additive and multiplicative metrics are pro-
remain largely unutilized. Chang and Tassiulas introduce a posed and evaluated.
routing strategy to maximize the network lifetime based Simulation results show an increase in net throughput
on sets of source–destination pairs and the traffic genera- of the network of up to 60 percent in comparison with
tion rates on these flows. A class of flow augmentation the minimum energy routing.
and flow redirection algorithms are proposed which bal- Minimum energy hierarchical dynamic source rout-
ance energy consumption rates in relation to the energy re- ing (MEHDSR) [115]: Tarique and Tepe extend the well-
sources of the nodes. Simulation results show 60% increase known DSR protocol with two protocols which consider
of the system lifetime compared to the minimum transmit- energy consideration.
ted energy routing algorithm. The first protocol, minimum energy dynamic source
CLUSTERPOW and MINPOW [60]: Kawadia and Kumar routing (MEDSR), extends the well known DSR protocol
designed a series of energy aware algorithms specifically by modifying the control messages and using a link-by-link
targetting non-homogeneous ad hoc networks. The power adjustment strategy. Source nodes trying to find a
authors notice that the power control and routing is mutu- new path to the destination first try to find one traversing
ally dependent of each other; for instance routing must be exlusively links requiring a low power level. If the attempt
3074 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

n1 n2 n3 n4

(a)

n1 n2 n3 n4
n1 n2 n3 n4

(b) (c)
Fig. 35. (a) Minimum transmit power, (b) high transmit power, (c) low transmit power [115].

is unsuccessful, successively higher power levels can be work. The second algorithm is a heuristic solution based on
found. The different power levels are used to identify paths an exponential function of the energy utilization at the
which can return low energy routes (see Fig. 35). Multiple nodes. The minimum energy between two node/edge-
power levels also reduce the route discovery time and disjoint paths are computed and their sum compared with
overhead. Once the route discovery process is successful, a threshold to determine whether the connection request
the transmission power levels of these nodes are adjusted is accepted or not.
on a link-by-link basis to the minimum required level for Power conserving routing with entropy-constrained
each link. algorithms [58]: Karayiannis and Nadella develop a rout-
Although MEDSR is creates highly efficient routes (a ing algorithm which utilizes the information-theoretic
25% improvement in energy consumption has been mea- concept of entropy aiming to reduce the uncertainty asso-
sured), the flooding technique used for route discovery ciated with route discovery.
has both a large of overhead and is energy inefficient. The paper starts from the idea of entropy constrained
The second proposed protocol, HMEDSR, adopts a hierar- routing algorithms, which have been introduced by the
chical routing approach similar to Hierarchical Dynamic authors in several preceeding papers as a mean to imple-
Source Routing (HDSR). The reduction in the routing over- ment routing based on multiple performance criteria.
head packets provides an additional 12% energy The idea is that the optimization criteria is implemented
improvement. as a series of constraints on the chosen route. In an en-
On-line disjoint path routing for capacity maximiza- tropy constrained routing, the initial iteration of the
tion [71]: Liang and Liu aim to maximize the capacity of an route starts with a level of uncertainty: multiple possible
ad hoc network, defined as the number of successfully rou- nodes can compete for each position of the route. This
ted messages. The assumption is that the algorithms have uncertainty is gradually reduced by a deterministic
no knowledge of future path requests or the traffic on annealing process.
those paths (as a note, this is the normal operating condi- In [58] the authors apply this approach to the issue
tion in ad hoc networks). They are considering a network of power conserving routing. As the entropy con-
where the transmission power of every node can be ad- strained routing can possibly optimize for more than one
justed within the limit of a maximum transmission power. performance criteria, two specific implementations are
Thus, links can be added or removed to the topology by considered:
allowing the nodes to vary their transmission power. In
this setting, the routing problem requires both the choice  optimizing for a single performance metric, with the
of the nodes on the path as well as the selection of their metric chosen to be the link cost,
transmission power.  multiple performance metrics: the metrics chosen are
The authors are proposing two centralized on-line algo- link cost together with link reliability.
rithms for the problem. The first algorithm is based on
maximizing the local network lifetime thereby minimizing The authors are comparing the performance of the algo-
the transmission energy consumption throughout the net- rithms against traditional approaches using a Dijkstra’s
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3075

50 50 The shortest width constrained path algorithm allows the


b 40 b 185 user to trade off the width of the path for a lower energy
10 15
consumption. The used can specify the trade-off factor
90 35
100 a c 200 100 a c 200 eta which describes the acceptable trade-off ratio. The sec-
85 180
ond variation, the shortest fixed width path finds the mini-
15 d 20 60 d 55 mum energy path on the path which has a higher width
than a fixed value.
75 75
The authors show through simulation results that the
(a) (b) use of this class of power aware routing algorithms can re-
sult in significant improvements in the network lifetime.
Fig. 36. (a) A graph showing energy levels at nodes and energy required
to transmit at each edge. (b) Shows the corresponding energy graph [81].

3.9.1. Comparison
algorithm in a mobile ad hoc network and conclude that Power aware routing makes the decision of routes
entropy-constrained algorithms can increase the lifetime dependent on power consumption characteristics. In gen-
of the network (as measured by the time to the first node eral, the goal is to find routes for a collection of well spec-
exhausting its energy). ified flows. Thus, the routes need to be set up on-demand.
Online energy aware routing [81]: Mohanoor et al. Pre-emptive routing algorithms can be used only in con-
propose polynomial time combinatorial techniques to junction with an estimate of future flows.
compute energy efficient routes in MANETs. The aim is to This makes routing a multi-criteria optimization prob-
select a route which strikes a balance between the residual lem. For the papers surveyed, the number of criteria can
energy, the minimum energy level of any node in the path be usually considered two: one traffic related (shortest
and the energy consumed along a path. The network is con- path, bandwidth) and one energy related criteria. A possi-
sidered as a graph with the edge weights being the energy ble exception is the paper by Mahmood and Comaniciu
required to transmit (see Fig. 36(a)). The sum of all weights [77] which adds interference to the minimization criteria
along a path corresponds to the total energy consumed (although interference, in this case, is strongly tied to
along the path (see Fig. 36(b)). bandwidth).
The authors consider several algorithms, united by their One of the problems is that power-awareness can rarely
reliance on a two phase computation. The first technique, be compressed into a neat optimization criteria. The abso-
called the shortest widest path works as follows. First, a var- lute amount of power consumed network-wide is almost
iant of Dijstra’s algorithm is applied to the graph con- completely irrelevant, in fact, none of the routing algo-
structed as above, which searches for paths with the rithms discussed here optimizes for it. One reason for this
minimum residual energy (the ‘‘widest’’ paths). There can is that the minimization of energy consumption is quite of-
be several paths which satisfy this condition. In the second ten can be achieved by shortest path routing.
phase, the algorithm chooses from these paths the one The challenges instead are not simply to minimize the
which has the lowest energy consumption. energy consumption, but to manage it. The routing algo-
Starting from this approach, the paper also describes rithm can redistribute the routes over the network, such
several variations on the shortest widest path approach. that the overall power consumption is redistributed over

Table 3.7.1
Multicast and Geo-Multicast routing protocols comparison.

Protocol Core/broadcast Route metric Forwarding strategy Route repository


DCMP Core Newest Route Source routing RT
ADMR Neither Link breaks Tree based or flooding RT
AMRoute Core Unicast operation Shared trees Depends on unicast algo
Li et al. Neither Minimum energy Source routing RC
QMRPCAH Broadcast QoS Bordercast RT
Wu and Jia Neither SP and least cost Source routing RC
Randaccio and Atzori Neither SP, WBW & delay Source routing RC
Fireworks Both SP, Cohesiveness Multicast & broadcast RC
PPMA Core Distance & link cost Source routing RC
ALMA Neither Link breaks Tree based RT
AQM Core QoS Source routing RT
CBM Core Threat arrival Limited broadcast RC
DDM – SP Source routing –
ROMANT Core Connectivity Source routing RT
EraMobile – Randomly selected Local broadcast –
DGR Core SP Limited flooding RC
GAMER Core SP Source routing RC
GeoGrid Core Hop count Flooding or ticket based None
GeoTora Broadcast SP Limited flooding RT

Route metric: SP = Shortest path; WBW = Weighted bandwidth.


Route repository: RT = Routing table; RC = Route cache.
3076 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Table 3.8.1
Power aware routing protocols comparison.

Protocol Type Path strategy Routing metric Scalability Robustness


DEAR G – Based on ‘‘DeviceType’’ No Yes
Scott & Bombos C Single-path Multiple constrained SP Yes No
Chang & Tassiulas G Single-path Power cost No No
CLUSTERPOW Cl Shortest path Total consumed power Yes Yes
Mahmood & Comaniciu D Single-path Energy and interference No No
MEHDSR G Single-path SP or next available Yes No
Liang & Liu D Single-path Energy consumption Yes Yes
Karayiannis & Nadella D Single path Entropy Yes No
Mohanoor et al. D Single-path Constrained SP No

Type: C = Centralized; Cl = Clustered; D = Distributed; G = Global.


Routing metric: SP = Shortest path.

the network. As the paper of Singh et al. [109] argued in the 4. Conclusions
late 1990’s, this cost redistribution can be specified in sev-
eral alternative ways. In the majority of papers, the ulti- In this paper, we introduced a taxonomy of ad hoc rout-
mate objective is to extend the lifetime of the network. ing protocols. We have divided the ad hoc routing proto-
There are two dominant definitions for this. Some papers cols into nine categories: (i) source-initiated (reactive or
consider the moment when the first node in the network on-demand), (ii) table-driven (pro-active), (iii) hybrid, (iv)
fails such as Karayiannis and Nadella [58], while most of location-aware (geographical), (v) multipath, (vi) multi-
them consider the moment when the network looses con- cast, (vii) geographical multicast, (viii) hierarchical, and
nectivity Chang and Tassiulas [26], Liang and Liu [71], (ix) power-aware. For each of these classes, we reviewed
Mohanoor et al. [81]. and compared several representative protocols. While dif-
Another aspect is whether the algorithm is imple- ferent classes of protocol operate under different scenarios,
mented in a centralized [107,71,58,81] or a distributed they usually share the common goal to reduce control
way [7,60,115]. packet overhead, maximize throughput, and minimize
Similarly to QoS routing, one of the difficulties of en- the end-to-end delay. The main differentiating factor be-
ergy efficient routing is that the optimal route for one tween the protocols is the ways of finding and/or main-
particular flow of data cannot be determined, except by taining the routes between source–destination pairs.
considering other currently ongoing paths. Furthermore, The development of the ad hoc routing protocols over
theoretically, optimal allocation cannot be achieved by the last 15 years is an example of one of the most system-
allocating every new flow of data as they are started: atic explorations of a design space in the history of com-
we might possibly need to re-route the existing routes, puter science. Although, clearly, newer protocols have
such that a new optimum can be reached. Such a re- built upon the earlier ones, we cannot identify a single
routing of existing flows can lead to a better overall ‘‘best’’ protocol. Almost all the protocols we discussed in
route, but it also creates many problems. Thus some of this paper have their own sweet spot deployment scenar-
the considered algorithms are explicitly designed to min- ios and performance metric combinations where they out-
imize the disturbances, e.g. Scott and Bombos [107], perform their competitors.
while many others are designed to operate in an online From the point of view of the practitioner, this creates a
manner – that is, consider the new data flows as they serious problem. To deploy an ad hoc network with an opti-
appear. mal performance, it requires a very careful analysis of the
Another cross-cutting consideration concerns node het- scenario and its requirements, and the appropriate choice
erogeneity. Considering this is tricky because different of the routing protocol from the dozens applicable in the
authors mean different things by heterogeneity. First of context. We hope that the taxonomy presented in this pa-
all, even if we start with perfectly identical nodes, after a per will be a helpful instrument for making this decision.
while, they can become heterogeneous because of different
locations in the network, and implicitly, different battery
References
consumption. Some papers consider hard heterogeneity,
where the nodes are physically different, either by their [1] J.-D. Abdulai, M. Ould-Khaoua, L. Mackenzie, Adjusted probabilistic
energy resources, or by their transmission range: for in- route discovery in mobile ad hoc networks, Computers and
stance, DEAR [7]. Electrical Engineering 35 (1) (2009) 168–182.
[2] G.N. Aggelou, R. Tafazolli, RDMAR: A bandwidth-efficient routing
The paper by Liang and Liu [71] operates with an inter- protocol for mobile ad hoc networks, in: Proceedings of ACM
esting assumption: it assumes that any node can dynami- WOWMOM, August 1999, pp. 26–33.
cally extend its transmission power to cover the entire [3] C. Ahn, Gathering-based routing protocol in mobile ad hoc
networks, Computer Communications 30 (1) (2006) 202–206.
area (see Table 3.7.1). [4] J. Al-Karaki, A. Kamal, Efficient virtual-backbone routing in
A number of other comparison terms are summarized mobile ad hoc networks, Computer Networks 52 (2) (2008)
in Table 3.8.1. 327–350.
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3077

[5] B. An, S. Papavassiliou, A mobility-based clustering approach to [31] T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, A. Qayyum, L.
support mobility management and multicast routing in mobile ad- Viennot, Optimized link state routing protocol for ad hoc networks,
hoc wireless networks, International Journal of Network in: Proceedings of IEEE INMIC, December 2001, pp. 62–68.
Management 11 (6) (2001) 387–395. [32] M. Colagrosso, N. Enochs, T. Camp, Improvements to location-aided
[6] B. An, S. Papavassiliou, Geomulticast: architectures and protocols routing through directional count restrictions, in: Proceedings of
for mobile ad hoc wireless networks, Journal of Parallel Distributed International Conference on Wireless Networks (ICWN), June 2004,
Computing 63 (2) (2003) 182–195. pp. 924–929.
[7] A. Avudainayagam, W. Lou, Y. Fang, Dear: a device and energy [33] M. Conti, E. Gregori, G. Maselli, Reliable and efficient forwarding in
aware routing protocol for heterogeneous ad hoc networks, Journal ad hoc networks, Ad Hoc Networks 4 (3) (2006) 398–415.
of Parallel Distributed Computing 63 (2) (2003) 228–236. [34] M.S. Corson, A. Ephremides, A distributed routing algorithm for
[8] R. Bagrodia, M. Gerla, L. Kleinrock, J. Short, T. Tsai, A hierarchical mobile wireless networks, ACM/Baltzer Wireless Networks Journal
simulation environment for mobile wireless networks, Technical 1 (1) (1995) 61–81.
report, Dept. of Computer Science, University of California at Los [35] S.K. Das, B.S. Manoj, C.S.R. Murthy, A dynamic core based multicast
Angeles, 1996. routing protocol for ad hoc wireless networks, in: Proceedings of
[9] A. Bamis, A. Boukerche, I. Chatzigiannakis, S. Nikoletseas, A mobility ACM MobiHoc, June 2002, pp. 24–35.
aware protocol synthesis for efficient routing in ad hoc mobile [36] S.K. Das, A. Mukherjee, S. Bandyopadhyay, D. Saha, K. Paul, An
networks, Computer Networks 52 (1) (2008) 130–154. adaptive framework for QoS routing through multiple paths in ad
[10] S. Basagni, Distributed clustering for ad hoc networks, in: hoc wireless networks, Journal of Parallel Distributed Computing
Proceedings of IEEE ISPAN, June 1999, pp. 310–315. 63 (2) (2003) 141–153.
[11] S. Basagni, I. Chlamtac, V.R. Syrotiuk, B.A. Woodward, A distance [37] R. Dube, C.D. Rais, K.Y. Wang, S.K. Tripathi, Signal stability-based
routing effect algorithm for mobility (DREAM), in: Proceedings of adaptive routing (SSA) for ad hoc mobile networks, IEEE Personal
the ACM MOBICOM, October 1998, pp. 76–84. Communications Magazine (1997) 36–45.
[12] R. Beraldi, The polarized gossip protocol for path discovery in [38] J. Eisbrener, G. Murphy, D. Eade, C. Pinnow, K. Begum, S. Park, S.-M.
manets, Ad Hoc Networks 6 (1) (2008) 79–91. Yoo, J.-H. Youn, Recycled path routing in mobile ad hoc networks,
[13] R. Beraldi, L. Querzoni, R. Baldoni, A hint-based probabilistic Computer Communications 29 (9) (2006) 1552–1560.
protocol for unicast communications in MANETs, Ad Hoc [39] J. Eriksson, M. Faloutsos, S.V. Krishnamurthy, Scalable ad hoc
Networks 4 (5) (2006) 547–566. routing: The case for dynamic addressing, in: Proceedings of IEEE
[14] L. Blazevic, J.-Y.L. Boudec, S. Giordano, A location-based routing INFOCOM, vol. 2, March 2004, pp. 1108–1119.
method for mobile ad hoc networks, IEEE Transactions on Mobile [40] J. Garcia-Luna-Aceves, M. Mosko, C. Perkins, A new approach to on-
Computing 4 (2) (2005) 97–110. demand loop-free routing in networks using sequence numbers,
[15] L. Blazevic, S. Giordano, J.-Y.L. Boudec, Self organized routing in Computer Networks 50 (10) (2006) 1599–1615.
wide area mobile ad-hoc networks, in: Proceedings of IEEE [41] J.J. Garcia-Luna-Aceves, Loop-free routing using diffusing
GLOBECOM, November 2001, pp. 2814–2818. computations, IEEE/ACM Transactions on Networking 1 (1) (1993)
[16] G. Boato, F. Granelli, MORA: a movement-based algorithm for ad 130–141.
hoc networks, in: Proceedings of The Tenth International [42] J.J. Garcia-Luna-Aceves, E.L. Madruga, A multicast routing protocol
Conference on Distributed Multimedia Systems (DMS), 2004, pp. for ad-hoc networks, in: Proceedings of IEEE INFOCOM, March
171–174. 1999, pp. 784–792.
[17] J. Boice, J. Garcia-Luna-Aceves, K. Obraczka, Combining on-demand [43] J.J. Garcia-Luna-Aceves, M. Spohn, Source-tree routing in wireless
and opportunistic routing for intermittently connected networks, networks, in: Proceedings of IEEE ICNP, October–November 1999,
Ad Hoc Networks 7 (1) (2009) 201–218. pp. 273–282.
[18] J. Boleng, Exploiting location information and enabling adaptive [44] M. Ge, S. Krishnamurthy, M. Faloutsos, Application versus network
mobile ad hoc networking protocols, Ph.D. Thesis, Colorado School layer multicasting in ad hoc networks: the ALMA routing protocol,
of Mines, 2002. Ad Hoc Networks 4 (2) (2006) 283–300.
[19] J. Boleng, T. Camp, Adaptive location aided mobile ad hoc network [45] J. Ghosh, S. Philip, C. Qiao, Sociological orbit aware location
routing, in: Proceedings of IEEE International Performance, approximation and routing (solar) in manet, Ad Hoc Networks 5
Computing, and Communications Conference (IPCCC), April 2004, (2) (2007) 189–209.
pp. 423–432. [46] V. Giruka, M. Singhal, A self-healing on-demand geographic path
[20] A. Boukerche, S.K. Das, A. Fabbri, Analysis of a randomized routing protocol for mobile ad-hoc networks, Ad Hoc Networks 5
congestion control scheme with DSDV routing in ad hoc wireless (7) (2007) 1113–1128.
networks, Journal of Parallel and Distributed Computing 61 (7) [47] T. Goff, N.B. Abu-Ghazaleh, D.S. Phatak, R. Kahvecioglu, Preemptive
(2001) 967–995. routing in ad hoc networks, Journal of Parallel Distributed
[21] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva, A Computing 63 (2) (2003) 123–140.
performance comparison of multi-hop wireless ad hoc network [48] M. Gong, S. Midkiff, S. Mao, On-demand routing and channel
routing protocols, in: Proceedings of ACM MOBICOM, October 1998, assignment in multi-channel mobile ad hoc networks, Ad Hoc
pp. 85–97. Networks 7 (1) (2009) 63–78.
[22] K. Bür, C. Ersoy, Ad hoc quality of service multicast routing, [49] C. Gui, P. Mohapatra, Hierarchical multicast techniques and
Computer Communications 29 (1) (2005) 136–148. scalability in mobile ad hoc networks, Ad Hoc Networks 4 (5)
[23] W.L.C. Chiang, H. Wu and M. Gerla, Routing in clustered multihop, (2006) 586–606.
mobile wireless networks, in: Proceedings of IEEE SICON, April [50] M. Gunes, U. Sorges, I. Bouazizi, Ara-the ant-colony based routing
1997, pp. 197–211. algorithms for manets, in: Proceedings of IEEE ICPP Workshop on
[24] T. Camp, Y. Liu, An adaptive mesh-based protocol for geocast Ad Hoc Networks (IWAHN), August 2002, pp. 79–85.
routing, Journal of Parallel Distributed Computing 63 (2) (2003) [51] Z.J. Haas, A new routing protocol for the reconfigurable wireless
196–213. networks, in: Proceedings of IEEE ICUPC, October 1997, pp. 562–
[25] N. Carlsson, D. Eager, Non-euclidian geographic routing in wireless 566.
networks, Ad Hoc Networks 5 (7) (2007) 1173–1193. [52] G. Ivascu, S. Pierre, A. Quintero, QoS routing with traffic distribution
[26] J.-H. Chang, L. Tassiulas, Energy conserving routing in wireless ad- in mobile ad hoc networks, Computer Communications 32 (2)
hoc networks, in: Proceedings of IEEE INFOCOM, March 2000, pp. (2009) 305–316.
22–31. [53] A. Iwata, C. Chiang, G. Pei, M. Gerla, T. Chen, Scalable routing
[27] T.-W. Chen, M. Gerla, Global state routing: a new routing scheme strategies for ad hoc wireless networks, IEEE Journal on Selected
for ad-hoc wireless networks, in: Proceedings of IEEE ICC, vol. 1, Areas in Communications 17 (8) (1999) 1369–1379.
June 1998, pp. 171–175. [54] J. Jetcheva, D. Johnson, Adaptive demand-driven multicast routing
[28] Z. Cheng, W. Heinzelman, Discovering long lifetime routes in in multi-hop wireless ad hoc networks, in: Proceedings of ACM
mobile ad hoc networks, Ad Hoc Networks 6 (5) (2008) 661–674. MobiHoc, October 2001, pp. 33–44.
[29] C.-C. Chiang, M. Gerla, On-demand multicast in mobile wireless [55] L. Ji, M. Corson, Differential destination multicast-a manet
networks, in: Proceedings of IEEE ICNP, October 1998, pp. 262– multicast routing protocol for small groups, in: Proceedings of
270. IEEE INFOCOM, vol. 2, April 2001, pp. 1192–1201.
[30] C.-H. Chou, K.-F. Ssu, H. Jiau, Dynamic route maintenance for [56] M. Joa-Ng, I.-T. Lu, A peer-to-peer zone-based two-level link state
geographic forwarding in mobile ad hoc networks, Computer routing for mobile ad hoc network, IEEE Journal on Selected Areas
Networks 52 (2) (2008) 418–431. in Communications 17 (8) (1999) 1415–1425.
3078 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

[57] D.B. Johnson, D.A. Maltz, J. Broch, DSR: the dynamic source routing [84] J. Na, C.-K. Kim, Glr: a novel geographic routing scheme for large
protocol for multi-hop wireless ad hoc networks, in: C.E. Perkins wireless ad hoc networks, Computer Networks 50 (17) (2006)
(Ed.), Ad Hoc Networking, Addison-Wesley, 2001, pp. 139–172 3434–3448.
(Chapter 5). [85] M. Naserian, K. Tepe, Game theoretic approach in routing protocol
[58] N. Karayiannis, S. Nadella, Power-conserving routing of ad hoc for wireless ad hoc networks, Ad Hoc Networks 7 (3) (2009) 569–
mobile wireless networks based on entropy-constrained 578.
algorithms, Ad Hoc Networks 4 (1) (2006) 24–35. [86] N. Nikaein, C. Bonnet, HARP: hybrid ad hoc routing protocol, in:
[59] B. Karp, H. Kung, GPSR: Greedy Perimeter Stateless Routing for Proceedings of International Symposium on Telecommunications
Wireless Networks, in: Proceedings of ACM MobiCom, August 2000, (IST), 2001, pp. 56–67.
pp. 243–254. [87] N. Nikaein, H. Labiod, C. Bonnet, DDR: distributed dynamic routing
[60] V. Kawadia, P. Kumar, Power control and clustering in ad hoc algorithm for mobile ad hoc networks, in: Proceedings of ACM
networks, in: Proceedings of IEEE INFOCOM, vol. 1, March–April MobiHoc, August 2000, pp. 19–27.
2003, pp. 459–469. [88] O. Ozkasap, Z. Genc, E. Atsan, Epidemic-based reliable and adaptive
[61] Y. Ko, N. Vaidya, Geocasting in mobile ad hoc networks: Location- multicast for mobile ad hoc networks, Computer Networks 53 (9)
based multicast algorithms, Technical report, TR-98-018, Texas AM (2009) 1409–1430.
University, September 1998. [89] V.D. Park, M.S. Corson, A highly adaptive distributed routing
[62] Y. Ko, N. Vaidya, Location-Aided Routing (LAR) in mobile ad hoc algorithm for mobile wireless networks, in: Proceedings of
networks, in: Proceedings of ACM MobiCom, October 1998, pp. 66– INFOCOM, April 1997, pp. 1405–1413.
75. [90] G. Pei, M. Gerla, T.-W. Chen, Fisheye state routing in mobile
[63] Y.-B. Ko, N.H. Vaidya, GeoTORA: A protocol for geocasting in mobile ad hoc networks, in: Proceedings of IEEE ICDCS Workshop on
ad hoc networks, in: Proceedings of IEEE ICNP, November 2000, pp. Wireless Networks and Mobile Computing, April 2000, pp. D71–
240–249. D78.
[64] S. Kwon, N. Shroff, Geographic routing in the presence of location [91] G. Pei, M. Gerla, X. Hong, LANMAR: Landmark routing for large scale
errors, Computer Networks 50 (15) (2006) 2902–2917. wireless ad hoc networks with group mobility, in: Proceedings of
[65] W. Lai, S.-Y. Hsiao, Y.-C. Lin, Adaptive backup routing for ACM MobiHoc, August 2000, pp. 11–18.
ad-hoc networks, Computer Communications 30 (2) (2007) 453– [92] C. Perkins (Ed.), Ad hoc Networking, Addison Wesley, 2001.
464. [93] C. Perkins, P. Bhagwat, Highly dynamic destination-sequenced
[66] L. Law, S. Krishnamurthy, M. Faloutsos, A novel adaptive protocol distance-vector routing (DSDV) for mobile computers, in: ACM
for lightweight efficient multicasting in ad hoc networks, Computer SIGCOMM, August–September 1994, pp. 234–244.
Networks 51 (3) (2007) 823–834. [94] C. Perkins, E. Royer, Ad hoc On-demand Distance Vector Routing, in:
[67] L. Layuan, L. Chunlin, A QoS multicast routing protocol for Proceedings of the Second IEEE Workshop on Mobile Computing
clustering mobile ad hoc networks, Computer Communications Systems and Applications, 1999, pp. 99–100.
30 (7) (2007) 1641–1654. [95] D. Pompili, M. Vittucci, PPMA, a probabilistic predictive multicast
[68] S. Lee, M. Gerla, Split multipath routing with maximally disjoint algorithm for ad hoc networks, Ad Hoc Networks 4 (6) (2006) 724–
paths in ad hoc networks, in: Proceedings of the IEEE ICC, June 748.
2001, pp. 3201–3205. [96] S. Radhakrishnan, N. Rao, G. Racherla, C. Sekharan, S. Batsell, DST –
[69] D. Li, Q. Liu, X. Hu, X. Jia, Energy efficient multicast routing in ad hoc a routing protocol for ad hoc networks using distributed
wireless networks, Computer Communications 30 (18) (2007) spanning trees, in: Proceedings of IEEE WCNC, September 1999,
3746–3756. pp. 100–104.
[70] J. Li, P. Mohapatra, LAKER: Location aided knowledge extraction [97] S. Rajagopalan, C.-C. Shen, ANSI: A swarm intelligence-based
routing for mobile ad hoc networks, in: Proceedings of IEEE WCNC, unicast routing protocol for hybrid ad hoc networks, Journal of
March 2003, pp. 1180–1184. Systems Architecture 52 (8-9) (2006) 485–504.
[71] W. Liang, Y. Liu, On-line disjoint path routing for network capacity [98] J. Raju, J. Garcia-Luna-Aceves, A new approach to on-demand loop-
maximization in energy-constrained ad hoc networks, Ad Hoc free multipath routing, in: Proceedings of the Eight IEEE
Networks 5 (2) (2007) 272–285. International Conference on Computer Communications and
[72] W.-H. Liao, J.-P. Sheu, Y.-C. Tseng, GRID: a fully location-aware Networks (IC3N), April 1999, pp. 522–527.
routing protocol for mobile ad hoc networks, Telecommunication [99] S. Ramasubramanian, H. Krishnamoorthy, M. Krunz, Disjoint
Systems 18 (1-3) (2001) 37–60. multipath routing using colored trees, Computer Networks 51 (8)
[73] W.-H. Liao, Y. Tseng, K. Lo, J. Sheu, GeoGRID: a geocasting protocol (2007) 2163–2180.
for mobile ad hoc networks based on grid, Journal of Internet [100] L. Randaccio, L. Atzori, Group multicast routing problem: a genetic
Technology 1 (2) (2000) 23–32. algorithms based approach, Computer Networks 51 (14) (2007)
[74] C. Liu, M. Yarvis, W. Conner, X. Guo, Guaranteed on-demand 3989–4004.
discovery of node-disjoint paths in ad hoc networks, Computer [101] H. Rangarajan, J. Garcia-Luna-Aceves, Efficient use of route requests
Communications 30 (14-15) (2007) 2917–2930. for loop-free on-demand routing in ad hoc networks, Computer
[75] J.-S. Liu, C.-H.R. Lin, RBR: refinement-based route maintenance Networks 51 (6) (2007) 1515–1529.
protocol in wireless ad hoc networks, Computer Communications [102] L.R. Reddy, S. Raghavan, SMORT: scalable multipath on-demand
28 (8) (2005) 908–920. routing for mobile ad hoc networks, Ad Hoc Networks 5 (2) (2007)
[76] Y. Liu, X. Hu, M. Lee, T. Saadawi, A region-based routing protocol for 162–188.
wireless mobile ad hoc networks, IEEE Network 18 (4) (2004) 12– [103] T.B. Reddy, S. Sriram, B. Manoj, C.S.R. Murthy, MuSeQoR: multi-
17. path failure-tolerant security-aware QoS routing in ad hoc wireless
[77] H. Mahmood, C. Comaniciu, Interference aware cooperative routing networks, Computer Networks 50 (9) (2006) 1349–1383.
for wireless ad hoc networks, Ad Hoc Networks 7 (1) (2009) 248– [104] L. Rosati, M. Berioli, G. Reali, On ant routing algorithms in ad hoc
263. networks with critical connectivity, Ad Hoc Networks 6 (6) (2008)
[78] C. Maihöfer, A survey on geocast routing protocols, IEEE 827–859.
Communications Surveys and Tutorials 6 (2) (2004) 32–42. [105] S. Roy, J.J. Garcia-Luna-Aceves, Using minimal source trees for on-
[79] M.K. Marina, S. Das, On-demand multi path distance vector routing demand routing in ad hoc networks, in: Proceedings of IEEE
in ad hoc networks, in: Proceedings of IEEE ICNP, November 2001, INFOCOM, April 2001, pp. 1172–1181.
pp. 14–23. [106] P. Samar, M. Pearlman, S. Haas, Independent zone routing: an
[80] R. Mavropodi, P. Kotzanikolaou, C. Douligeris, SecMR – a secure adaptive hybrid routing framework for ad hoc wireless networks,
multipath routing protocol for ad hoc networks, Ad Hoc Networks 5 IEEE/ACM Transactions on Networking 12 (4) (2004) 595–608.
(1) (2007) 87–99. [107] K. Scott, N. Bombos, Routing and channel assignment for low power
[81] A. Mohanoor, S. Radhakrishnan, V. Sarangan, Online energy aware transmission in PCS, in: Proceedings of IEEE ICUPC, September–
routing in wireless networks, Ad Hoc Networks 7 (5) (2009) 918– October 1996, pp. 498–502.
931. [108] C. Sengul, R. Kravets, Bypass routing: an on-demand local recovery
[82] A. Munaretto, M. Fonseca, Routing and quality of service support for protocol for ad hoc networks, Ad Hoc Networks 4 (3) (2006) 380–
mobile ad hoc networks, Computer Networks 51 (11) (2007) 3142– 397.
3156. [109] S. Singh, M. Woo, C. Raghavendra, Power-aware routing in mobile
[83] S. Murthy, J.J. Garcia-Luna-Aceves, An efficient routing protocol for ad hoc networks, in: Proceedings of ACM MobiCom, October 1998,
wireless networks, MONET 1 (2) (1996) 183–197. pp. 181–190.
A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080 3079

[110] R. Sivakumar, P. Sinha, V. Bharghavan, CEDAR: a core-extraction [136] M. Yu, A. Malvankar, W. Su, S. Foo, A link availability-based QoS-
distributed ad hoc routing algorithm, IEEE Journal on Selected aware routing protocol for mobile ad hoc sensor networks,
Areas in Communications 17 (8) (1999) 1454–1465. Computer Communications 30 (18) (2007) 3823–3831.
[111] J.-H. Song, V. Wong, V. Leung, Secure position-based routing [137] M. Yuksel, R. Pradhan, S. Kalyanaraman, An implementation
protocol for mobile ad hoc networks, Ad Hoc Networks 5 (1) framework for trajectory-based routing in ad hoc networks, Ad
(2007) 76–86. Hoc Networks 4 (1) (2006) 125–137.
[112] O. Souihli, M. Frikha, M. Hamouda, Load-balancing in MANET shortest- [138] H. Zhou, S. Singh, Content based multicast (CBM) in ad hoc
path routing protocols, Ad Hoc Networks 7 (2) (2009) 431–442. networks, in: Proceedings of ACM MobiHoc, August 2000, pp. 51–
[113] W. Sum, M. Gerla, IPv6 flow handoff in ad-hoc wireless networks 60.
using mobility prediction, in: Proceedings of IEEE GLOBECOM, [139] Temporally ordered routing algorithm. Available from web
December 1999, pp. 271–275. page <http://wiki.uni.lu/secan-lab/temporally-ordered+routing+
[114] B. Sun, L. Li, QoS-aware multicast routing protocol for ad hoc algorithm.html>.
networks, Journal of Systems Engineering and Electronics 17 (2) [140] A survey of defense technology: The software revolution – to
(2006) 417–422. dissolve, to disappear, June 1995.
[115] M. Tarique, K. Tepe, Minimum energy hierarchical dynamic source
routing for mobile ad hoc networks, Ad Hoc Networks 7 (6) (2009)
1125–1135.
[116] C.-K. Toh, Associativity-based routing for ad-hoc mobile networks, Azzedine Boukerche is a full professor and
Wireless Personal Communications Journal 4 (2) (1997) 103–139. holds a Canada Research Chair position at the
Special Issue on Mobile Networking and Computing Systems. University of Ottawa (Ottawa). He is a fellow
[117] R. Vaishampayan, J. Garcia-Luna-Aceves, Efficient and robust of the Canadian Academy of Engineering and
multicast routing in mobile ad hoc networks, in: Proceedings of the founding director of the PARADISE
IEEE International Conference on Mobile Ad-hoc and Sensor Research Laboratory, School of Information
Systems, October 2004, pp. 304–313. Technology and Engineering (SITE), Ottawa.
[118] A. Valera, W.K.G. Seah, S.V. Rao, Cooperative packet caching and Prior to this, he held a faculty position at the
shortest multipath routing in mobile ad hoc networks, in: University of North Texas, and he was a senior
Proceedings of IEEE INFOCOM, vol. 1, April 2003, pp. 260–269. scientist at the Simulation Sciences Division,
[119] L. Villasenor-Gonzalez, Y. Ge, L. Lamont, HOLSR: a hierarchical Metron Corp., San Diego. He was also
proactive routing mechanism for mobile ad hoc networks, IEEE
employed as a faculty member in the School
Communications Magazine 43 (7) (2005) 118–125.
of Computer Science, McGill University, and
[120] G. Wang, Y. Ji, D.C. Marinescu, D. Turgut, A routing protocol for
power constrained networks with asymmetric links, in: taught at the Polytechnic of Montreal. He spent a year at the JPL/NASA-
Proceedings of the ACM Workshop on Performance Evaluation of California Institute of Technology, where he contributed to a project
Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN), centered about the specification and verification of the software used to
October 2004, pp. 69–76. control interplanetary spacecraft operated by JPL/NASA Laboratory. His
[121] G. Wang, D. Turgut, L. Bölöni, Y. Ji, D. Marinescu, Improving routing current research interests include wireless ad hoc and sensor networks,
performance through m-limited forwarding in power-constrained wireless networks, mobile and pervasive computing, wireless multi-
wireless networks, Journal of Parallel and Distributed Computing media, QoS service provisioning, performance evaluation and modeling of
(JPDC) 68 (4) (2008) 501–514. large-scale distributed systems, distributed computing, large-scale dis-
[122] J. Wang, E. Osagie, P. Thulasiraman, R. Thulasiram, Hopnet: a hybrid tributed interactive simulation, and parallel discrete-event simulation. He
ant colony optimization routing algorithm for mobile ad hoc has published several research papers in these areas. He served as a guest
network, Ad Hoc Networks 7 (4) (2009) 690–705. editor for the Journal of Parallel and Distributed Computing (special issue
[123] N.-C. Wang, Y.-F. Huang, J.-C. Chen, A stable weight-based on-
for routing for mobile ad hoc, special issue for wireless communication
demand routing protocol for mobile ad hoc networks, Information
and mobile computing, and special issue for mobile ad hoc networking
Sciences 177 (24) (2007) 5522–5537.
and computing), ACM/Kluwer Wireless Networks, ACM/Kluwer Mobile
[124] Y. Wang, V. Giruka, M. Singhal, Truthful multipath routing for ad
hoc networks with selfish nodes, Journal of Parallel and Distributed Networks Applications, and Journal of Wireless Communication and
Computing 68 (6) (2008) 778–789. Mobile Computing. He serves/served as an Associate Editor of IEEE
[125] Y.-H. Wang, C.-F. Chao, Dynamic backup routes routing protocol for Transactions on Parallel and Distributed systems, IEEE Transactions on
mobile ad hoc networks, Information Sciences 176 (2) (2006) 161– Vehicular Technology, Elsevier Ad Hoc Networks, Wiley International
185. Journal of Wireless Communication and Mobile Computing, Wiley’s
[126] B. Williams, T. Camp, Comparison of broadcasting techniques for Security and Communication Network Journal, Elsevier Pervasive and
mobile ad hoc networks, in: Proceedings of ACM MobiHoc, June Mobile Computing Journal, IEEE Wireless Communication Magazine,
2002, pp. 194–205. Elsevier’s Journal of Parallel and Distributed Computing, and SCS Trans-
[127] S.-C. Woo, S. Singh, Scalable routing protocol for ad hoc networks, actions on Simulation. He was the recipient of the Best Research Paper
Wireless Networks 7 (5) (2001) 513–529. Award at IEEE/ACM PADS 1997, ACM MobiWac 2006, ICC 2008, ICC 2009
[128] H. Wu, X. Jia, QoS multicast routing by using multiple paths/trees in
and IWCMC 2009, and the recipient of the Third National Award for
wireless ad hoc networks, Ad Hoc Networks 5 (5) (2007) 600–612.
Telecommunication Software in 1999 for his work on a distributed
[129] X. Xiaochuan, W. Gang, W. Keping, W. Gang, J. Shilou, Link
security systems on mobile phone operations. He has been nominated for
reliability based hybrid routing for tactical mobile ad hoc
network, Journal of Systems Engineering and Electronics 19 (2) the Best Paper Award at the IEEE/ACM PADS 1999 and ACM MSWiM 2001.
(2008) 259–267. He is a recipient of an Ontario Early Research Excellence Award (previ-
[130] J. Xie, R.R. Talpade, A. McAuley, M. Liu, Amroute: ad hoc multicast ously known as Premier of Ontario Research Excellence Award), Ontario
routing protocol, MONET 7 (6) (2002) 429–439. Distinguished Researcher Award, and Glinski Research Excellence Award.
[131] K. Xu, X. Hong, M. Gerla, Landmark routing in ad hoc networks with He is a cofounder of the QShine International Conference on Quality of
mobile backbones, Journal of Parallel and Distributed Computing Service for Wireless/Wired Heterogeneous Networks (QShine 2004). He
63 (2) (2003) 110–122. served as the general chair for the Eighth ACM/IEEE Symposium on
[132] Q. Xue, A. Ganz, Ad hoc QoS on-demand routing (AQOR) in mobile Modeling, Analysis and Simulation of Wireless and Mobile Systems, and
ad hoc networks, Journal of Parallel Distributed Computing 63 (2) the Ninth ACM/IEEE Symposium on Distributed Simulation and Real-Time
(2003) 154–165. Application (DS-RT), the program chair for the ACM Workshop on QoS
[133] C.-C. Yang, L.-P. Tseng, Fisheye zone routing protocol: a multi-level and Security for Wireless and Mobile Networks, ACM/IFIPS Europar 2002
zone routing protocol for mobile ad hoc networks, Computer
Conference, IEEE/SCS Annual Simulation Symposium (ANNS 2002), ACM
Communications 30 (2) (2007) 261–268.
WWW 2002, IEEE MWCN 2002, IEEE/ACM MASCOTS 2002, IEEE Wireless
[134] Z. Yao, J. Jiang, P. Fan, Z. Cao, V. Li, A neighbor-table-based
multipath routing in ad hoc networks, in: Proceedings of IEEE Local Networks WLN 03-04; IEEE WMAN 04-05, and ACM MSWiM 98-99,
VTC 2003-Spring, vol. 3, April 2003, pp. 1739–1743. and a TPC member of numerous IEEE and ACM sponsored conferences. He
[135] C. Yu, T.-K. Wu, R. Cheng, A low overhead dynamic route repairing served as the vice general chair for the Third IEEE Distributed Computing
mechanism for mobile ad hoc networks, Computer for Sensor Networks (DCOSS) Conference in 2007, as the program cochair
Communications 30 (5) (2007) 1152–1163. for GLOBECOM 2007-2008 Symposium on Wireless Ad Hoc and Sensor
3080 A. Boukerche et al. / Computer Networks 55 (2011) 3032–3080

Networks, ICC 11, and for the 14th IEEE ISCC 2009 Symposium on Com- Ladislau Bölöni is an Associate Professor at
puter and Commmunication Symposium, and as the finance chair for the Department of Electrical Engineering and
ACM Multimedia 2008. He also serves as a Steering Committee chair for Computer Science of University of Central
the ACM Modeling, Analysis and Simulation for Wireless and Mobile Florida. He received a Ph.D. degree from the
Systems Conference, the ACM Symposium on Performance Evaluation of Computer Science Department of Purdue
Wireless Ad Hoc, Sensor, and Ubiquitous Networks, and IEEE/ACM DS-RT. University in May 2000. He received an MS
He serves as the Vice Chair of the IEEE Technical Committee on Ad-Hoc degree from the Computer Sciences depart-
and Sensor Networks. ment of Purdue University in 1999 and BS
degree in Computer Engineering with Honors
from the Technical University of Cluj-Napoca,
Begumhan Turgut is a Ph.D. candidate at the Romania in 1993. He received a fellowship
Department of Computer Science at Rutgers from the Computer and Automation Research
University. She graduated Cum Laude from Institute of the Hungarian Academy of Sci-
the Department of Computer Science and at ences for the 1994–1995 academic year. He is a senior member of IEEE,
University of Texas at Arlington. Her research member of the ACM, AAAI and the Upsilon Pi Epsilon honorary society.
interests include localization in wireless net- His research interests include autonomous agents, grid computing and
working; clustering, MAC, routing, network wireless networking.
topology and connectivity in ad hoc networks;
modeling and enhancing the stealth level in
sensor networks, self-organization and mobile Damla Turgut is an Associate Professor at the
sinks in sensor networks. She has numerous Department of Electrical Engineering and
publications in these areas including a best Computer Science of University of Central
paper award in IEEE GLOBECOM 2009. She is a Florida. She received her BS, MS, and Ph.D.
student member of IEEE and the Upsilon Pi Epsilon honorary society. degrees from the Computer Science and
Engineering Department of University of
Texas at Arlington. Her research interests
Nevin Aydin is an Assistant Professor at the include wireless networking and mobile
Department of Industrial Engineering of computing, wireless communication and
Istanbul Arel University. She received her BS coordination in embodied agents, and urban
in Mathematics at Istanbul University, MS in sensing. Dr. Turgut has published over five
Mathematics at Ankara University, and Ph.D. dozens of refereed technical papers and book
degrees in Industrial Engineering at Istanbul chapters. Dr. Turgut serves as a member of the
Technical University. Her research interests editorial board and of the technical program committee of ACM and IEEE
include operations research, agent and holonic journals and international conferences. She is a member of IEEE, member
manufacturing, supply chain management, of the ACM, and the Upsilon Pi Epsilon honorary society.
wireless networking, mobile computing, and
object-oriented databases. Dr. Aydin has
published several technical papers in these
areas.

Mohammad Z. Ahmad is a Ph.D. candidate at


the Department of Electrical Engineering and
Computer Science of University of Central
Florida. He has received his BS degree from
Department of Information Science at Golden
Valley Institute of Technology and MS degree
from School of Electrical Engineering and
Computer Science at University of Central
Florida. His current research interests include
Internet measurements studying Internet
topology evolution due to exchange points
and the affects of the infrastructure growth on
inter-domain routing. He has previously
worked on ad hoc routing protocols, congestion avoidance and control
algorithms in sensor networks.

S-ar putea să vă placă și