Ad Hoc Routing Protocol: What is it?

Print anything with Printful



Ad hoc routing protocols are necessary for mobile networks, as fixed routing protocols are not suitable. Two approaches are table-based and on-demand, but both have drawbacks. A combination of both can be used to reconfigure networks quickly and include security measures.

An ad hoc routing protocol is a method of sending communications over a network with mobile elements, where access occurs on an ad hoc or “as needed” basis. The fixed routing protocol that is suitable for a wired network doesn’t work for a mobile network, because it can reconfigure and change rapidly. If the network does not remain stable as nodes appear and disappear, network participants can experience data loss and other problems. This is why a better method of communication is needed.

There are two general approaches to designing ad hoc routing protocols. One is led by the table. The network maintains a table of active nodes which it continually updates in response to new information. As nodes appear and disappear, the network can calculate the shortest paths for the data. As users interact with the network, consult the table to determine how and where to submit their information.

Maintaining a table-based network requires data storage capacity, and the network sometimes reacts slowly to changes. As nodes move in and out, the tables may not update in time and may not be sent as quickly as the nodes need the information. As a result, sometimes a table-based ad hoc routing protocol lags, especially when multiple node failures or other problems occur. Tables can’t always keep up with network changes.

The other option for configuring an ad hoc routing protocol is an on-demand system that periodically sends a wave of route request packets to network nodes. Use the response to make routing decisions. Such networks can be slow to set up, because the network has to communicate with the nodes before it can function. A phenomenon known as overflow can also occur, in which routing request packets choke out other data and slow down or shut down the network.

Sometimes an ad hoc routing protocol can contain combinations of both approaches to best meet the needs of the network and users. Such protocols allow networks to reconfigure themselves as nodes discover, communicate, and prioritize based on responses. A network can be quickly set up and broken down with this protocol to create access in a variety of locations. Mobile networks can be vulnerable to some types of interference, and the routing protocol may need to include security measures to protect the network and users. These can include access lockouts to keep unauthorized devices off the network.




Protect your devices with Threat Protection by NordVPN


Skip to content