REW

What Is Manet Routing?

Published Aug 29, 2025 6 min read
On this page

MANET (Mobile Ad-Hoc Network) routing is the process of finding and maintaining communication paths between mobile nodes in a decentralized, wireless network.

Unlike traditional wired or wireless networks that rely on fixed infrastructure like routers and access points, MANETs are self-organizing and dynamic. In a MANET, every node acts as a router, forwarding data for other nodes to ensure information reaches its intended destination.

This is a particularly challenging task because the network topology changes constantly and unpredictably as nodes move. An efficient MANET routing protocol must account for dynamic topologies, limited node resources (such as battery life and processing power), and the potential for unreliable wireless links. The primary goal is to provide a reliable, efficient, and scalable communication infrastructure for a wide range of applications, from military and disaster relief operations to sensor networks and vehicle-to-vehicle communications.

Key characteristics of MANETs

The unique nature of mobile ad-hoc networks presents a host of challenges that traditional routing protocols are not equipped to handle.

  • Dynamic topology: Nodes are free to move in any direction, causing frequent and unpredictable changes in the network's structure. This requires routing protocols to be highly adaptive.
  • Decentralized administration: There is no central authority or access point to manage the network. Instead, control and routing are distributed among the individual nodes.
  • Multi-hop communication: Due to the limited transmission range of wireless devices, communication often requires data to be relayed by intermediate nodes, or "hops," to reach its destination.
  • Energy constraints: Many MANET nodes, such as smartphones or sensors, are battery-powered. Routing protocols must be energy-efficient to maximize network lifespan.
  • Limited bandwidth: Wireless links have a lower capacity than wired connections and are susceptible to interference and transmission errors, which can degrade network performance.
  • Security vulnerabilities: The wireless, distributed nature of MANETs makes them vulnerable to various security threats and attacks.

Types of MANET routing protocols

To address the unique challenges of MANETs, several routing protocol categories have been developed, each with distinct mechanisms and trade-offs.

1. Proactive (table-driven) protocols

These protocols maintain up-to-date routing information about all other nodes in the network by periodically exchanging routing tables.

  • How they work: Every node maintains a consistent routing table containing routes to all known destinations. When the network topology changes, nodes broadcast updates to propagate the new routing information throughout the network.
  • Key advantages:
    • Low latency: Routes are immediately available when needed, resulting in minimal delay for data transmission.
    • Efficiency for stable networks: Works well in networks with low mobility, where the cost of periodic updates is less burdensome.
  • Key disadvantages:
    • High overhead: Frequent, periodic updates consume significant bandwidth and energy, especially in large networks or networks with high node mobility.
    • Scalability issues: Routing table size and update traffic can become unmanageable in large-scale networks.
  • Examples:
    • Destination-Sequenced Distance Vector (DSDV): A distance-vector protocol that uses sequence numbers to ensure loop-free routes and avoid the "count-to-infinity" problem.
    • Optimized Link State Routing (OLSR): A link-state protocol that uses a "multipoint relay" system to reduce the overhead of broadcasting topology information.

2. Reactive (on-demand) protocols

Also known as "on-demand" protocols, these only discover and establish a route when a node needs to send data.

  • How they work: When a source node wants to communicate, it initiates a "route discovery" process by flooding the network with a Route Request (RREQ) packet. When the RREQ reaches the destination or an intermediate node with a valid route, a Route Reply (RREP) is sent back to the source. The protocol also has a "route maintenance" phase to handle broken links.
  • Key advantages:
    • Low overhead: Control traffic is only generated when a route is required, conserving bandwidth and energy.
    • High scalability: Can handle a larger number of nodes compared to proactive protocols, as nodes don't need to maintain a complete network map.
  • Key disadvantages:
    • Higher latency: Initial route discovery can introduce a significant delay, especially in large networks.
    • Flooding overhead: The initial broadcast of RREQ packets can create significant network overhead, known as a "broadcast storm," particularly in high-traffic scenarios.
  • Examples:
    • Ad-hoc On-Demand Distance Vector (AODV): A popular protocol that establishes routes using RREQ/RREP messages and uses sequence numbers to prevent routing loops.
    • Dynamic Source Routing (DSR): The source node includes the complete path in the packet header. Intermediate nodes do not need to maintain routing tables but can use and share cached route information.

3. Hybrid protocols

Hybrid protocols combine the best features of both proactive and reactive protocols to balance performance trade-offs.

  • How they work: They typically use a proactive approach within a limited, local "routing zone" around each node and a reactive approach for destinations outside that zone. This reduces overhead while keeping routes to nearby nodes readily available.
  • Key advantages:
    • Balanced performance: Achieves lower latency than purely reactive protocols and lower overhead than purely proactive protocols.
    • Scalability: Provides a good balance of performance for various network sizes and mobility patterns.
  • Key disadvantages:
    • Increased complexity: The algorithms are more complex to implement and manage due to the combination of two different routing strategies.
  • Examples:
    • Zone Routing Protocol (ZRP): Divides the network into zones. A proactive protocol is used for intra-zone routing, and a reactive protocol is used for inter-zone routing.
    • Hybrid Wireless Mesh Protocol (HWMP): An advanced protocol used in mesh networks that blends proactive and reactive elements.

The challenge of selecting a MANET protocol

With a diverse range of protocols available, selecting the most suitable one depends heavily on the network's characteristics and application requirements. Key performance metrics used for comparison include:

  • Network load and overhead: Measures the amount of control traffic generated by the protocol.
  • Throughput: The amount of data successfully delivered over a period.
  • End-to-end delay: The time it takes for a packet to travel from the source to the destination.
  • Packet delivery ratio: The ratio of successfully delivered packets to the total number of packets sent.
  • Energy consumption: The total energy consumed by nodes during communication.

General guidelines for selecting a protocol:

  • Proactive protocols are best for scenarios with low mobility and a relatively stable topology, where low latency is critical, such as military operations with a static command structure.
  • Reactive protocols are better suited for large, dynamic networks with higher mobility and lower traffic, as they minimize overhead by discovering routes only when needed.
  • Hybrid protocols offer a strong middle ground, balancing overhead and latency and performing well in a wider range of network sizes and mobility conditions.

The future of MANET routing

As MANETs become integrated into new applications like the Internet of Things (IoT) and vehicular ad-hoc networks (VANETs), research into more intelligent and robust routing solutions continues. Future developments include:

  • Integration with artificial intelligence: Using machine learning and optimization algorithms to select the most stable and energy-efficient routes.
  • Cross-layer design: Creating protocols that allow different network layers (e.g., physical, MAC, and routing) to share information to make more intelligent routing decisions.
  • Improved security mechanisms: Developing more robust security protocols to protect against routing attacks and other threats in MANETs.
  • Integration with other networks: Enabling seamless internetworking between MANETs and fixed infrastructures.
Enjoyed this article? Share it with a friend.