Survey: Proactive and Reactive Routing Protocols

Authors

  • Prapulla G Dept of Computer Science and Engineering, East West Institute of Technology, VTU, Bangalore, India
  • Prasanna Kumar M Dept of Computer Science and Engineering, East West Institute of Technology, VTU, Bangalore, India

Keywords:

DV, LSR, RIP, DSR,, AODV

Abstract

Routing is a mechanism to build links or connections between two or more nodes with or without the infrastructure. A Routing algorithm is a method for determining the routing of packets in a node. For each node of network, the algorithm determines a routing table, which in each destination, matches an output line. The algorithm should lead to a consistent routing, that is to say without loop. This means that you should not route a packet a node to another node that could send back the package.There are three main types of routing algorithms- Vector (distance-vector routing),To link state (link state routing), Path to vector (pathvector routing).This paper focus on the survey of reactive and proactive routing protocols like OLSR, AODV, RIP, OSPF, DSR.

References

[1] The AODV protocol is basically flat routing protocol so it does not require any inner organizational methodto handle the routing process.

[2] In AODV routes established on demand and that destination sequence numbers are applied for find the latest route to thedestination.

[3] The connection setup delay islower.

[4] The AODV protocols are a loop free and avoid the counting to infinityproblem.

[5] At most one route per destination maintain at each node.

[6] It can lead to heavy controloverhead.

[7] MorigereSubramanya Bhat, Shwetha .D, Manjunath .D and DevarajuJ.T.”Scenario Based Study of on denmand Reactive Routing Protocol for IEEE-802.11 and 802.15.4 Standards”ISSN: 2249-57 Vol 1(2), 128-135 published in October-november2011.

[8] Ashish Bagwari,RamanJee,PankajJoshi,SourabhBisht “Performance of AODV Routing Protocol with increasing the MANET Nodes and it’s effects on QoS of Mobile Ad hoc Networks” 2012 International ConferenceonCommunicationSystemsandNetworkTechnologies.

[9] XuHuang,MuhammadAhmedandDharmendraSharma”Protectingfrom Inside Attacks in Wireless Sensor Networks” 2011 Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[10] Naveen Bilandi and Harsh K Verma “Comparative Analysis of Reactive, Proactive and Hybrid Routing Protocols in MANET” International Journal of Electronics and Computer Science Engineering 1660 ISSN- 2277-1956.

[11] Fan-Hsun Tseng, Li-Der Chou and Han-Chieh Chao “A survey of black hole attacks in wireless mobile ad hoc networks” Tseng et al. Human- centric Computing and Information Sciences 2011, a Springer open journal.

[12] Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala “DoS Attacksin Mobile Ad-hoc Networks: A Survey” 2012 Second International ConferenceonAdvancedComputing&CommunicationTechnologies.

[13] Ashok M.Kanthe, Dina Simunic and Ramjee Prasad Comparison of AODV and DSR on-Demand Routing Protocols in Mobile Ad hoc Networks.

[14] PremChandandM.K.Soni“PerformancecomparisonofAODVandDSR ON-DemandRoutingprotocolsforMobilead-hocnetworks”Published in July2012.

[15] Michel Healy, Thomas News and Elfed Lewis “Security for Wireless Sensors Networks: A Review”.in Feb2009.

[16] Harmandeep Singh, Gurpreetsingh and Manpreet Singh “Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack”International Journal of Computer Applications (0975 – 8887) Volume 42– No.18, March2012.

[17] IrshadUllahShoia Ur Rehman “Analysis of Black Hole Attack on MANETs Using Different MANET RoutingProtocols”.

[18] ShailyMittel and Prabhjot Kaur “Performance comparison of AODV, DSRandZRPRoutingprotocolinMANET’s”Publishedin2009.

[19] NicklesBeijar “Zone Routing Protocol” Networking Laboratory, Helsinki University ofTechnology.

[20] HimaniYadavandRakeshKumar“IdentificationandRemovalofBlack Hole Attack for Secure Communication in MANETs” Volume 3, Issue 9, September 2012, ISSN2047-3338.

Downloads

Published

2025-11-26

How to Cite

[1]
P. G and P. M. Kumar, “Survey: Proactive and Reactive Routing Protocols”, Int. J. Comp. Sci. Eng., vol. 7, no. 15, pp. 334–338, Nov. 2025.