We are independent & ad-supported. We may earn a commission for purchases made through our links.
Advertiser Disclosure
Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.
How We Make Money
We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently of our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.
Networking

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

What Is an Ad Hoc Routing Protocol?

Mary McMahon
By
Updated: May 16, 2024
References

An ad hoc routing protocol is a method for sending communications over a network with mobile elements, where access occurs on an ad hoc or “as needed” basis. The fixed routing protocol suitable for a wired network doesn't work for a mobile network, because it can rapidly reconfigure and change. If the network doesn't remain stable as nodes appear and disappear, participants on the network can experience data loss and other problems. For this reason, a better method for communication is necessary.

There are two broad approaches to ad hoc routing protocol design. One is table-driven. The network maintains a table of active nodes which it continuously updates in response to new information. As nodes appear and disappear, the network can calculate the shortest paths for data. As users interact with the network, it consults the table to determine how and where to send their information.

Maintenance of a table-driven network requires data storage capability, and the network sometimes reacts slowly to changes. As nodes drop in and out, the tables may not update in time, and may not be sent out as quickly as nodes need the information. Consequently, sometimes a table-driven ad hoc routing protocol lags, especially when multiple nodes failure or other problems arise. The tables cannot always keep up with changes to the network.

The other option for configuring an ad hoc routing protocol is an on demand system which periodically sends out a wave of route request packets to the nodes in the network. It uses the response to make routing decisions. Such networks can be slow to set up, because the network needs to communicate with the nodes before it can work. A phenomenon known as excess flood can also occur, where the route request packets choke out other data and slow or shut down the network.

Sometimes an ad hoc routing protocol may contain mixtures of both approaches to best suit the needs of the network and users. Such protocols allow networks to reconfigure as nodes discover each other, communicate, and assign priorities on the basis of the responses. A network can quickly set up and break down with this protocol to create access in a variety of locations. Mobile networks can be vulnerable to some types of interference, and the routing protocol may need to include security measures to protect the network and the users. These can include access locks to keep unauthorized devices off the network.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Link to Sources
Mary McMahon
By Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a EasyTechJunkie researcher and writer. Mary has a liberal arts degree from Goddard College and spends her free time reading, cooking, and exploring the great outdoors.

Discussion Comments
Mary McMahon
Mary McMahon

Ever since she began contributing to the site several years ago, Mary has embraced the exciting challenge of being a...

Learn more
Share
https://www.easytechjunkie.com/what-is-an-ad-hoc-routing-protocol.htm
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.