What is the ad hoc routing protocol?
ad hoc routing protocol is a method for sending communication over a network with mobile elements where access occurs on the basis of ad hoc or "as needed". A solid routing protocol suitable for a cable network does not work for a mobile network as it can quickly reconfigure and change. If the network does not remain stable as the nodes appear and disappear, the network participants may lose data and other problems. For this reason, a better method of communication is required.
There are two wide approaches to ad hoc routing. One is a controlled table. The network keeps the table of active nodes that constantly updates in response to new information. As the nodes appear and disappear, the network can calculate the shortest data for data. Because users interact with the network, they consult the table to determine how and where to send their information.Metimes respond slowly to changes. As the nodes drop and out, the tables may not be updated in time and may not be sent as quickly as the nodes need information. As a result, sometimes zaoIt becomes a protocol on ad hoc routing controlled by a table, especially when multiple nodes or other problems fail. The tables cannot always keep up with the network changes.
The second option for configuring ad hoc routing is a system on request, which regularly sends a wave of packets of route requests to nodes in the network. Uses a response to routing decision -making. Such networks can be set slowly because the network must communicate with nodes before it can work. There may also be a phenomenon known as an excess flood, where packets of requests for a route are suffocated by additional data and slowly or off the network.
Sometimes ad hoc can direct the protocol of both Approtahy best suits the needs of network and users. Such protocols allow networks to reconfigure because the nodes appear, communicate and assign priorities based on responses. The network can quickly set up and disassemble this protocol and inYets access at different locations. Mobile networks may be vulnerable to some types of interference and the routing protocol may need to include security measures to protect network and users. They may include access locks that maintain unauthorized devices outside the network.