An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to routepackets between computing devices in a mobile ad hoc network.
In ad hoc networks, nodes are not familiar with the topology of their networks. Instead, they have to discover it: typically, a new node announces its presence and listens for announcements broadcast by its neighbors. Each node learns about others nearby and how to reach them, and may announce that it too can reach them.
Note that in a wider sense, ad hoc protocol can also be used literally, to mean an improvised and often impromptu protocol established for a specific purpose.
The following is a list of some ad hoc network routing protocols.
This type of protocols maintains fresh lists of destinations and their routes by periodically distributing routing tables throughout the network. The main disadvantages of such algorithms are:
This type of protocol combines the advantages of proactive and reactive routing. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding. The choice of one or the other method requires predetermination for typical cases. The main disadvantages of such algorithms are:
Advantage depends on number of other nodes activated.
Reaction to traffic demand depends on gradient of traffic volume.
Examples of hybrid algorithms are:
ZRP (Zone Routing Protocol) ZRP uses IARP as pro-active and IERP as reactive component.
ZHLS (Zone-based Hierarchical Link State Routing Protocol) [7]
With this type of protocol the choice of proactive and of reactive routing depends on the hierarchic level in which a node resides. The routing is initially established with some proactively prospected routes and then serves the demand from additionally activated nodes through reactive flooding on the lower levels. The choice for one or the other method requires proper attributation for respective levels. The main disadvantages of such algorithms are:
Advantage depends on depth of nesting and addressing scheme.
Reaction to traffic demand depends on meshing parameters.
^Johnson, David B.; Maltz, David A. (1996). "Dynamic Source Routing in Ad Hoc Wireless Networks". Mobile Computing. The Kluwer International Series in Engineering and Computer Science. Vol. 353. pp. 153–181. doi:10.1007/978-0-585-29603-6_5. ISBN978-0-7923-9697-0.
^Djenouri, Djamel; Badache, Nadjib (2009). "On eliminating packet droppers in MANET: A modular solution". Ad Hoc Networks. 7 (6): 1243–1258. doi:10.1016/j.adhoc.2008.11.003.
^{B. S. Manoj, R. Ananthapadmanabha and C. S. R. Murthy, "Link life based routing protocol for ad hoc wireless networks," Proceedings Tenth International Conference on Computer Communications and Networks (Cat. No.01EX495), Scottsdale, AZ, USA, 2001, pp. 573-576, doi:10.1109/ICCCN.2001.956324.}
^ abJoa-Ng, M.; i-Tai Lu (1999). "A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks". IEEE Journal on Selected Areas in Communications. 17 (8): 1415–1425. doi:10.1109/49.779923.