Survey: Proactive and Reactive Routing Protocols
Keywords:
DV, LSR, RIP, DSR,, AODVAbstract
Routing is a mechanism to build links or connections between two or more nodes with or without the infrastructure. A Routing algorithm is a method for determining the routing of packets in a node. For each node of network, the algorithm determines a routing table, which in each destination, matches an output line. The algorithm should lead to a consistent routing, that is to say without loop. This means that you should not route a packet a node to another node that could send back the package.There are three main types of routing algorithms- Vector (distance-vector routing),To link state (link state routing), Path to vector (pathvector routing).This paper focus on the survey of reactive and proactive routing protocols like OLSR, AODV, RIP, OSPF, DSR.
References
[1] The AODV protocol is basically flat routing protocol so it does not require any inner organizational methodto handle the routing process.
[2] In AODV routes established on demand and that destination sequence numbers are applied for find the latest route to thedestination.
[3] The connection setup delay islower.
[4] The AODV protocols are a loop free and avoid the counting to infinityproblem.
[5] At most one route per destination maintain at each node.
[6] It can lead to heavy controloverhead.
[7] MorigereSubramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T.”Scenario Based Study of on denmand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards”ISSN: 2249-57 Vol 1(2), 128-135 published in October-november2011.
[8] Ashish Bagwari,RamanJee,PankajJoshi,SourabhBisht “Performance of AODV Routing Protocol with increasing the MANET Nodes and it’s effects on QoS of Mobile Ad hoc Networks” 2012 International ConferenceonCommunicationSystemsandNetworkTechnologies.
[9] XuHuang,MuhammadAhmedandDharmendraSharma”Protectingfrom Inside Attacks in Wireless Sensor Networks” 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[10] Naveen Bilandi and Harsh K Verma “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET” International Journal of Electronics and Computer Science Engineering 1660 ISSN- 2277-1956.
[11] Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao “A survey of black hole attacks in wireless mobile ad hoc networks” Tseng et al. Human- centric Computing and Information Sciences 2011, a Springer open journal.
[12] Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala “DoS Attacksin Mobile Ad-hoc Networks: A Survey” 2012 Second International ConferenceonAdvancedComputing&CommunicationTechnologies.
[13] Ashok M.Kanthe, Dina Simunic and Ramjee Prasad Comparison of AODV and DSR on-Demand Routing Protocols in Mobile Ad hoc Networks.
[14] PremChandandM.K.Soni“PerformancecomparisonofAODVandDSR ON-DemandRoutingprotocolsforMobilead-hocnetworks”Published in July2012.
[15] Michel Healy, Thomas News and Elfed Lewis “Security for Wireless Sensors Networks: A Review”.in Feb2009.
[16] Harmandeep Singh, Gurpreetsingh and Manpreet Singh “Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack”International Journal of Computer Applications (0975 – 8887) Volume 42– No.18, March2012.
[17] IrshadUllahShoia Ur Rehman “Analysis of Black Hole Attack on MANETs Using Different MANET RoutingProtocols”.
[18] ShailyMittel and Prabhjot Kaur “Performance comparison of AODV, DSRandZRPRoutingprotocolinMANET’s”Publishedin2009.
[19] NicklesBeijar “Zone Routing Protocol” Networking Laboratory, Helsinki University ofTechnology.
[20] HimaniYadavandRakeshKumar“IdentificationandRemovalofBlack Hole Attack for Secure Communication in MANETs” Volume 3, Issue 9, September 2012, ISSN2047-3338.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
