single-jc.php

JACIII Vol.29 No.1 pp. 64-78
doi: 10.20965/jaciii.2025.p0064
(2025)

Research Paper:

Balancing Act: A Comparative Study of Routing Protocol Trade-Offs in MANETs

Mourad Kezai* ORCID Icon, Rafik Dembri** ORCID Icon, and Djamel Eddine Boukhari*** ORCID Icon

*University of Batna 1
Route de Biskra 05000, Algeria

**Department of Electrical Engineering, University of Sétif 1
El Bez Campus, Sétif 19000, Algeria

***Laboratoire de Génie Electrique et des Energies Renouvelables d’El Oued, Department of Electrical Engineering, University of El Oued
El Oued 39000, Algeria

Received:
February 25, 2024
Accepted:
October 17, 2024
Published:
January 20, 2025
Keywords:
mobile ad hoc network (MANET), AODV, DSR, DSDV, TORA
Abstract

Mobile ad hoc networks (MANETs) are decentralized networks of mobile devices connected by wireless links, enabling various applications across domains. Research on MANETs often relies on simulations for efficient and replicable evaluations due to the absence of central administration and complex real-world scenarios. Effective simulation necessitates the integration of mobility models to orchestrate node movement. In this study, we explore existing mobility models, propose evaluation metrics, and conduct simulations to characterize, compare, and rank these models. Additionally, we analyze ad hoc routing protocols, focusing on packet delivery ratio, average packet arrival time, and total control packets. Notable protocols such as AODV, DSR, DSDV, and TORA are scrutinized, considering factors like node count and mobility, to provide comprehensive insights into their performance and efficacy.

Mobile ad hoc network routing protocol

Mobile ad hoc network routing protocol

Cite this article as:
M. Kezai, R. Dembri, and D. Boukhari, “Balancing Act: A Comparative Study of Routing Protocol Trade-Offs in MANETs,” J. Adv. Comput. Intell. Intell. Inform., Vol.29 No.1, pp. 64-78, 2025.
Data files:
References
  1. [1] S. Puri and V. Arora, “Performance of MANET: A review,” Int. J. of Engineering Trends and Technology (IJETT), Vol.9, No.11, pp. 544-549, 2014. https://doi.org/10.14445/22315381/IJETT-V9P305
  2. [2] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers,” ACM SIGCOMM Computer Communication Review, Vol.24, No.4, pp. 234-244, 1994. https://doi.org/10.1145/190809.190336
  3. [3] S. Murthy and J. J. Garcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” Mobile Networks and Applications, Vol.1, No.2, pp. 183-197, 1996. https://doi.org/10.1007/BF01193336
  4. [4] T.-W. Chen and M. Gerla, “Global state routing: A new routing scheme for ad-hoc wireless networks,” Proc. of IEEE Int. Conf. on Communications (ICC ’98), Vol.1, pp. 171-175, 1998. https://doi.org/10.1109/ICC.1998.682615
  5. [5] A. Iwata, C.-C. Chiang, G. Pei, M. Gerla, and T.-W. Chen, “Scalable routing strategies for ad hoc wireless networks,” IEEE J. on Selected Areas in Communications, Vol.17, Issue 8, pp. 1369-1379, 1999. https://doi.org/10.1109/49.779920
  6. [6] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” IETF RFC 3561, 2003. https://doi.org/10.17487/RFC3561
  7. [7] D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” The Kluwer Int. Series in Engineering and Computer Science, Vol.353, pp. 153-181, 1996. https://doi.org/10.1007/978-0-585-29603-6_5
  8. [8] M. Jiang, J. Li, and Y.-C. Tay, “Cluster based routing protocol,” IETF Internet-Draft, draft-ietf-manet-cbrp-pec-01.txt, 1999.
  9. [9] V. Park and S. Corson, “Temporally-ordered routing algorithm (TORA) version 1 functional specification,” IETF Internet-Draft, draft-ietf-manet-tora-spec-04.txt, 2001.
  10. [10] Z. J. Haas, M. R. Pearlman, and P. Samar, “The zone routing protocol (ZRP) for ad hoc networks,” IETF Internet-Draft, draft-ietf-manet-zone-zrp-04.txt, 1997.
  11. [11] M. Joa-Ng and I.-T. Lu, “A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks,” IEEE J. on Selected Areas in Communications, Vol.17, Issue 8, pp. 1415-1425, 1999. https://doi.org/10.1109/49.779923
  12. [12] D. N. Kanellopoulos, “QoS routing for multimedia communication over wireless mobile ad hoc networks: A Survey,” H. Lin (Ed.), “Digital Multimedia,” IGI Global, pp. 841-872, 2018. https://doi.org/10.4018/978-1-5225-3822-6.ch042
  13. [13] J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, “A performance comparison of multi-hop wireless ad hoc network routing protocols,” Proc. of 4th Annu. ACM/IEEE Int. Conf. Mobile Computing and Networking (MobiCom ’98), pp. 85-97, 1998. https://doi.org/10.1145/288235.288256
  14. [14] S. R. Das, C. E. Perkins, and E. M. Royer, “Performance comparison of two on-demand routing protocols for ad hoc networks,” Proc. of IEEE INFOCOM 2000, pp. 3-12, 2000. https://doi.org/10.1109/INFCOM.2000.832168
  15. [15] A. Boukerche, “A performance comparison of routing protocols for ad hoc networks,” Proc. of 15th Int. Parallel and Distributed Processing Symp. (IPDPS 2001), pp. 1940-1946, 2001. https://doi.org/10.1109/IPDPS.2001.925188
  16. [16] A. Boukerche, “Performance evaluation of routing protocols for ad hoc wireless networks,” Mobile Networks and Applications, Vol.9, No.4, pp. 333-342, 2004. https://doi.org/10.1023/b:mone.0000031592.23792.1c
  17. [17] S. Ahmed and M. Alam, “Performance evaluation of important ad hoc network protocols,” EURASIP J. on Wireless Communications and Networking, Vol.2006, Article No.078645, 2006. https://doi.org/10.1155/WCN/2006/78645
  18. [18] B. Divecha, A. Abraham, C. Grosan, and S. Sanyal, “Impact of node mobility on MANET routing protocols models,” J. of Digital Information Management, Vol.5, No.1, pp. 19-23, 2007.
  19. [19] B. R. A. Kumar, L. C. Reddy, and P. S. Hiremath, “Performance comparison of wireless mobile ad-hoc network routing protocols,” Int. J. of Computer Science and Network Security, Vol.8, No.6, pp. 337-343, 2008.
  20. [20] A. H. A. Rahman and Z. A. Zukarnain, “Performance comparison of AODV, DSDV and I-DSDV routing protocols in mobile ad hoc networks,” European J. of Scientific Research, Vol.31, No.4, pp. 566-576, 2009.
  21. [21] N. Qasim, F. Said, and H. Aghvami, “Mobile ad hoc networking protocols’ evaluation through simulation for quality of service,” IAENG Int. J. of Computer Science, Vol.36, No.1, pp. 76-84, 2009.
  22. [22] M. S. Islam, M. A. Riaz, and M. Tarique, “Performance analysis of the routing protocols for video streaming over mobile ad hoc networks,” Int. J. of Computer Networks & Communications (IJCNC), Vol.4, No.3, pp. 133-150, 2012. https://doi.org/10.5121/ijcnc.2012.4310
  23. [23] R. Beaubrun and B. Molo, “Using DSR for routing multimedia traffic in MANETs,” Int. J. of Computer Networks & Communications (IJCNC), Vol.2, No.1, pp. 120-138, 2010.
  24. [24] K. Vats, M. Sachdeva, K. Saluja, and A. Rathee, “Simulation and performance analysis of OLSR routing protocol using OPNET,” Int. J. of Advanced Research in Computer Science and Software Engineering, Vol.2, Issue 2, pp. 180-188, 2012.
  25. [25] S. Gharge and A. Valanjoo, “Simulation based performance evaluation of TCP variants and routing protocols in mobile ad-hoc networks,” Proc. of 2014 Int. Conf. on Advances in Engineering & Technology Research (ICAETR2014), 2014. https://doi.org/10.1109/ICAETR.2014.7012810
  26. [26] M. Elboukhari, “Performance comparison of routing protocols in mobile ad hoc networks,” SSRN Electronic J., 2015. https://doi.org/10.2139/ssrn.3606911
  27. [27] S. Memon, P. Kumar, U. A. Khan, and T. Kumar, “Performance evaluation of mobile ad hoc routing mechanisms,” Wireless Personal Communications, Vol.85, No.2, pp. 377-392, 2015. https://doi.org/10.1007/s11277-015-2744-0
  28. [28] A. Russoniello and E. Gamess, “Evaluation of different routing protocols for mobile ad-hoc networks in scenarios with high-speed mobility,” Int. J. of Computer Network and Information Security, Vol.10, No.10, pp. 46-52, 2018. https://doi.org/10.5815/ijcnis.2018.10.06
  29. [29] M. Abdelhaq, R. Hassan, and M. Ismail, “Performance evaluation of mobile ad hoc networks under flooding-based attacks,” Int. J. of Communication Systems, Vol.27, Issue 12, pp. 4328-4345, 2013. https://doi.org/10.1002/dac.2615
  30. [30] A.-A. Hashim, M. M. Farhan, and S. Alshybani, “Performance evaluation of OLSR and AODV routing protocols over mobile ad-hoc networks,” 2019 1st Int. Conf. of Intelligent Computing and Engineering (ICOICE), 2019. https://doi.org/10.1109/icoice48418.2019.9035171
  31. [31] A. Guillen-Perez, A.-M. Montoya, J.-C. Sanchez-Aarnoutse, and M.-D. Cano, “A comparative performance evaluation of routing protocols for flying ad-hoc networks in real conditions,” Applied Sciences, Vol.11, No.10, Article No.4363, 2021. https://doi.org/10.3390/app11104363
  32. [32] A. A. Chavan, D. S. Kurule, and P. U. Dere, “Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack,” Procedia Computer Science, Vol.79, pp. 835-844, 2016. https://doi.org/10.1016/j.procs.2016.03.108
  33. [33] Y. Bai, Y. Mai, and N. Wang, “Performance comparison and evaluation of the proactive and reactive routing protocols for MANETs,” 2017 Wireless Telecommunications Symp. (WTS), 2017. https://doi.org/10.1109/wts.2017.7943538
  34. [34] N. Goyal, “MANET: Simulation analysis and performance evaluation of routing protocol using NS-3,” Int. J. of Advanced Research in Computer Science and Software Engineering, Vol.7, No.4, pp. 398-406, 2017. https://doi.org/10.23956/ijarcsse/v7i4/0204
  35. [35] J. Burbank, “An introduction to network simulator 3, 1st ed.,” Wiley-IEEE Press, 2018.
  36. [36] J. Kumar, A. Singh, M. K. Panda, and H. S. Bhadauria, “Study and performance analysis of routing protocol based on CBR,” Procedia Computer Science, Vol.85, pp. 23-30, 2016. https://doi.org/10.1016/j.procs.2016.05.172
  37. [37] A. M. Soomro, M. F. Bin Fudzee, M. Hussain, and H. M. Saim, “A hybrid routing approach comparison with AODV protocol regarding speed for disaster management in MANET,” J. of Computer Science, Vol.18, No.3, pp. 204-213, 2022. https://doi.org/10.3844/jcssp.2022.204.213
  38. [38] K. Wane, N. Chopade, and G. Rahate, “A comprehensive survey of routing techniques in MANETs,” SSRN Electronic J., 2021. https://doi.org/10.2139/ssrn.3883344
  39. [39] D. Kanellopoulos and F. Cuomo (Eds.), “Recent developments on mobile ad-hoc networks and vehicular ad-hoc networks,” MDPI AG, 2021. https://doi.org/10.3390/books978-3-0365-1163-4
  40. [40] A. M. Shantaf, S. Kurnaz, and A. H. Mohammed, “Performance evaluation of three mobile ad-hoc network routing protocols in different environments,” 2020 Int. Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), 2020. https://doi.org/10.1109/hora49412.2020.9152845
  41. [41] A. A. Mahamune and M. M. Chandane, “Evaluating routing protocols for mobile ad hoc networks under varying network scenarios,” 2021 3rd Int. Conf. on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 220-225, 2021. https://doi.org/10.1109/icicv50876.2021.9388574
  42. [42] A. M. Eltahlawy, H. K. Aslan, E. G. Abdallah, M. S. Elsayed, A. D. Jurcut, and M. A. Azer, “A survey on parameters affecting MANET performance,” Electronics, Vol.12, No.9, Article No.1956, 2023. https://doi.org/10.3390/electronics12091956
  43. [43] C. Lin, F. Dong, and K. Hirota, “Fuzzy inference based vehicle-to-vehicle network connectivity model to support optimization routing protocol for vehicular ad-hoc network (VANET),” J. Adv. Comput. Intell. Intell. Inform., Vol.18, No.1, pp. 9-21, 2014. https://doi.org/10.20965/jaciii.2014.p0009
  44. [44] L. D. Hieu, B. T. Tung, P. T. Giang, T. Q. Vinh, and L. Nam, “Improving fairness in IEEE 802.11 EDCA ad hoc networks based on fuzzy logic,” J. Adv. Comput. Intell. Intell. Inform., Vol.24, No.5, pp. 615-620, 2020. https://doi.org/10.20965/jaciii.2020.p0615
  45. [45] A. R. Yeruva, E. S. Alomari, S. Rashmi, A. Shrivastava, M. Kathiravan, and A. Chaturvedi, “A secure machine learning-based optimal routing in ad hoc networks for classifying and predicting vulnerabilities,” Cybernetics and Systems, 2023. https://doi.org/10.1080/01969722.2023.2166241
  46. [46] A. R. Patil and G. M. Borkar, “Route optimization in MANET using swarm intelligence algorithm,” Comprehensive Metaheuristics, pp. 313-324, 2023. https://doi.org/10.1016/b978-0-323-91781-0.00016-8
  47. [47] T.-N. Tran, T.-V. Nguyen, K. Shim, D. B. da Costa, and B. An, “A deep reinforcement learning-based QoS routing protocol exploiting cross-layer design in cognitive radio mobile ad hoc networks,” IEEE Trans. on Vehicular Technology, Vol.71, Issue 12, pp. 13165-13181, 2022. https://doi.org/10.1109/tvt.2022.3196046
  48. [48] T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for ad hoc network research,” Wireless Communications and Mobile Computing, Vol.2, No.5, pp. 483-502, 2002. https://doi.org/10.1002/wcm.72
  49. [49] E. Hyytiä and J. Virtamo, “Random waypoint model in n-dimensional space,” Operations Research Letters, Vol.33, Issue 6, pp. 567-571, 2005. https://doi.org/10.1016/j.orl.2004.11.006
  50. [50] X. Lin, R. K. Ganti, P. J. Fleming, and J. G. Andrews, “Towards understanding the fundamentals of mobility in cellular networks,” IEEE Trans. on Wireless Communications, Vol.12, Issue 4, pp. 1686-1698, 2013. https://doi.org/10.1109/twc.2013.022113.120506
  51. [51] S. Sadr and R. S. Adve, “Handoff rate and coverage analysis in multi-tier heterogeneous networks,” IEEE Trans. on Wireless Communications, Vol.14, Issue 5, pp. 2626-2638, 2015. https://doi.org/10.1109/twc.2015.2390224
  52. [52] J. Yoon, M. Liu, and B. Noble, “Random waypoint considered harmful,” Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM), Vol.2, pp. 1312-1321, 2003. https://doi.org/10.1109/INFCOM.2003.1208967
  53. [53] A. Vyas and M. Suthar, “Development of modify random waypoint mobility model of routing protocol for the mobile ad-hoc network,” Preprints.org, 2022. https://doi.org/10.20944/preprints202201.0021.v1
  54. [54] P. Nain, D. Towsley, B. Liu, and Z. Liu, “Properties of random direction models,” Proc. of the IEEE 24th Annual Joint Conf. of the IEEE Computer and Communications Societies (INFOCOM), Vol.3, pp. 1897-1907, 2005. https://doi.org/10.1109/infcom.2005.1498468
  55. [55] P. Whigham, “The Vint Project, the Network Simulator–ns-2,” University of Southern California, 2003. https://www.isi.edu/nsnam/ns/ [Accessed January 5, 2016]

*This site is desgined based on HTML5 and CSS3 for modern browsers, e.g. Chrome, Firefox, Safari, Edge, Opera.

Last updated on Feb. 07, 2025