Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads

Size: px
Start display at page:

Download "Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads"

Transcription

1 Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Nabhendra Bisnik, Alhussein Abouzeid Abstract Mobility of nodes may cause routing protocols to incur large overheads in order to maintain reliable paths between source destination pairs. These overheads diminish the capacity available for transmitting useful data over a mobile wireless ad hoc network. Understanding the lower bounds of the protocol overheads incurred by routing protocols in a mobile ad hoc network is important for developing efficient routing protocols, and for understanding the actual capacity available for network users. In this paper we use an information-theoretic approach for characterizing the lower bounds of protocol overhead associated with geographic routing. We formulate the minimum overhead problem as a rate distortion problem. The formulation may be applied to any traffic arrival process, mobility model and location service schemes. We evaluate a lower bound on the minimum protocol overhead, in terms of mobility pattern and packet/session arrival process, that is required for routing packets with desired level of reliability. We evaluate expressions for the lower bound for various packet arrival processes. We then characterize the deficit in transport capacity caused by the protocol overheads. We also characterize the critical network size, above which the capacity available to network users diminishes to zero because of the protocol overheads. I. INTRODUCTION Efficient routing of data packets is one of the fundamental challenges associated with mobile wireless ad hoc networks. Unlike wired communication networks, wireless ad hoc networks are highly dynamic in nature, which increases the complexity of finding and maintaining optimal routes. Due to fading and multipath effects the quality of paths changes over time [8], [35], [9]. The nodes in ad hoc networks may leave or join the network at random leading to frequent changes in possible routes to a destination. The routing problem in ad hoc networks in further exacerbated by node mobility [6], [5], which is an essential element of untethered networks. Due to node mobility the paths and neighborhoods of a node may change in an unpredictable manner. A routing protocol in ad hoc network is not only required to discover paths to the destination but also make the routing resilient against the above mentioned fluctuations in the state of an ad hoc network. Since the ad hoc networks lack any kind of infrastructure or centralized control, the routing decisions have to be made by the nodes in a completely distributed manner. The primary goal of a routing protocol is to gather state information from the network and make an informed forwarding decision in order to enable data packets to be received by the intended destination. The state information may comprise of node locations, link states, velocity and direction of node motion, queue lengths etc. The objective of the forwarding decision may be optimize delay, throughput, network lifetime or load balance while making sure that the packets eventually reach their destinations. There is a trade-off between the overhead incurred while collecting state information and the performance of a routing protocol - more state information that a routing protocol gathers, better forwarding decisions it may take. If infinite bandwidth is available and nodes communicate at arbitrarily high bit rate, it is possible to maintain accurate global information at all the nodes. Optimal forwarding decisions may then be made using routing algorithms, such as modified Dijkstra s algorithm, with link costs that reflect the quality of link [7] or any other metric of interest. However capacity of ad hoc networks is limited, thus routing protocols may have only limited or stale information which may lead to poor performance. For maintaining performance of a routing protocol above a certain threshold, the overhead incurred would increase with the rate at which the state information of the network changes. For a highly dynamic network, this overhead may consume a sizeable fraction of the network capacity leaving very little or no residual capacity for transmitting useful. We refer to the decrease in capacity available for transmitting data packets as capacity deficit caused by routing overheads In this paper we characterize the minimum routing overhead incurred in order to route packets with desired level of reliability. We investigate the dependence of the overhead on node mobility and rate at which the data packets are generated in the network. The family of routing protocols considered in this paper is geographical routing [8], [46], where each node maintains its location information at one or more location servers and this location information is used to route packets to the nodes. The node mobility model considered in this paper is the Brownian motion model [74]. Geographic routing protocol overheads may be divided into two categories i) Location update overhead: The overhead incurred by a node in order to maintain its location information at the location servers. ii) Beacon overhead: The overhead incurred by a node in order to allow neighbors to maintain consistent neighborhood tables and neighbor locations. The former overhead is critical for packets to be routed to their destination. If the accurate location information of a destination is not available at its location server then packets destined to the destination may never be delivered. The later overhead is critical for the source and intermediate nodes to make local forwarding decisions. If consistent neighborhood information is not maintained then an intermediate node may try to forward packet to a node that is no longer within its communication range. Thus in order to characterize the minimum routing overhead associated with geographical routing we investigate the following questions: i) What is the minimum rate at which a node must transmit in order to ensure that the location

2 information available at the location servers at the time the location server is queried) is within a distance ɛ of the accurate location? ii) What is the minimum rate at which a node must transmit beacons such that whenever a node needs to forwards a packet, the forwarding node knows with probability at least δ if the node belongs to its neighborhood or not? We use an information theoretic approach for answering the above questions. More precisely, both the problems are formulated as rate-distortion problems [9], [8]. For the former the measure of distortion is the squared error in the location information stored at location servers squared error distortion measure) while in the later problem the distortion measure is the probability that a perceived neighbor is not a actual neighbor of the node Hamming distortion measure). It should be noted that for reliable routing it is not required that accurate location information or consistent neighborhood information is maintained at all time instances. For reliably forwarding a packet, the source or intermediate nodes require consistent neighborhood information only when they have a packet to forward. Similarly the location servers are required to have accurate location information of the nodes they serve only when they are queried by source nodes for the location information. Thus in addition to the degree of mobility and parameters ɛ and δ, the minimum routing overhead also depends upon the packet arrival process. We compare the minimum geographic routing overhead with the transport capacity of multihop wireless networks evaluated in [3]. It is observed that when the node mobility is high and the average packet inter-arrival time is sufficiently small, complete transport capacity of an ad hoc network may be consumed by the routing overheads only. We derive an upper bound on the critical network size above which all the transport capacity of the network would be consumed by the routing overheads and no useful communication would be possible. In this paper we only consider the scenario where the routing protocol initiates the forwarding process as soon as a packet arrives at the source. Thus the capacity improvement due to node mobility achieved at cost of delay associated with waiting for the destination to move to a nearby location) pointed out in [3], [8] is not applicable to our work. A. Main Contributions The main contributions of this paper may be summarized in the following manner: ) We present a novel information-theoretic formulation for evaluating the minimum routing overhead incurred by the geographic routing. The formulation is very general, that is, it may be applied to any node distribution and may be extended to any location service scheme and mobility model. ) For the Brownian mobility model and various packet inter-arrival time distributions, we evaluate the lower bounds for the minimum rate at which a node must transmit its location information and beacons such that the packets are routed with desired level of reliability. Combining both overheads we find the lower bound on the capacity deficit caused by geographic routing overheads in wireless ad hoc networks. 3) For a given packet arrival process, standard deviation of Brownian motion and reliability parameters ɛ, δ), we evaluate the upper bound on the number of nodes the ad hoc network can support such that the complete transport capacity of the network is not used up by routing overhead. 4) We characterize the effective transport capacity of an ad hoc network after taking into account the minimum routing overheads that must be incurred for reliable routing. B. Paper Outline The rest of the paper is organized in the following manner. We review the related work in Section II. The network model is described in Section III. The lower bound of overhead associated with maintaining location information is evaluated in IV. The lower bound of minimum beacon rate required for maintaining consistent neighborhood information is evaluated in Section V. The capacity deficit caused by the routing overheads, the upper bound on the maximum number of nodes that may be deployed and the effective transport capacity is characterized in Section VI. The strengths and shortcomings of the approach used in this paper to characterize the routing overhead are discussed in Section VII. We conclude the paper with a discussion of future research direction in Section VIII. II. RELATED WORK In this paper we deal with many issues related to wireless ad hoc networks, namely routing protocols and their overheads, capacity of wireless networks and using information-theoretic approach to study communication networks. In this section we review previous works that have studied the above-mentioned issues. A. Routing Protocols and Their Overheads A lot of routing algorithms have been proposed for wireless ad hoc networks during the last two decades [], [36], [44], [75]. The routing algorithms may be broadly divided into topology based and position based or geographic routing protocols [57]. The topology based routing protocols make routing decisions based on the links that exist in the network. The topology based routing protocols may be further divided into the following three categories []: i) Proactive routing protocols - Information for routing packets between any node pairs is maintained within the network irrespective of whether the nodes are communicating or not e.g. [5], [6], [9], [37], [47], [6], [66], [67], [69]). ii) Reactive routing protocols - Information for routing packets between a source-destination is gathered only when source has packets to send to the destination e.g. [], [], [39], [4], [48], [65], [7], [7], [87]). iii) Hybrid routing protocols - Routing information for a subset of node pairs is maintained in proactive manner while routing information for other pairs is gathered in a reactive manner e.g. [4], [34], [6], [7], [9]). Since reactive routing maintains routes for nodes pairs that have an active session, the overhead of reactive routing protocols is smaller than that

3 3 of the proactive routing protocols when only few node pairs have active sessions at any given time. However since the source has to gather routing information when a new session arrives, the reactive routing protocols may lead to higher delays. The hybrid routing protocols try to achieve the best of both worlds. Since the routing information for a subset of nodes pairs is maintained in a proactive manner, source nodes may gather routing information for a new session with smaller delays. Thus on an average hybrid routing algorithms incur less overhead and delay than proactive and reactive routing protocols respectively. However in worst case the routing overhead incurred by all topology based routing protocols is similar. In contrast to topology based routing protocols, the geographic routing protocols use position of the destination nodes in order to make routing decisions [57]. Geographic routing requires nodes to know their locations. This may be accomplished using GPS [45] or other mechanisms [4]. Also geographic routing requires a distributed location service which allows source nodes to discover the location of the destination nodes []. All geographic routing protocols function in the following manner. When a new session/packet arrives at a source node, it queries the location service in order to discover the current position of the destination. The position of the destination is added to packet headers and the source and intermediate nodes forward the packet to a neighbor that is closer to the destination than them. If no such neighbor exists then the intermediate node resorts to a recovery mechanism in order to discover alternate paths to the destination. Due to the availability of additional information in the form of geographical locations of the nodes, the geographic routing protocols is free from the overhead caused link failure and hence has higher scalability than topology based routing protocols. The overhead of geographic routing largely depends on the overhead incurred by the underlying location service and the overhead required to maintain consistent neighborhood information. The location services may be categorized into flooding based and rendezvous based services []. The flooding based location services may be proactive or reactive. In proactive flooding based location services each node periodically floods its location throughout the network [8]. On the other hand, in reactive flooding based location services a source floods the location query for the destination when a new session/packet arrives and the source does not have fresh information about the location of the destination node [48]. In rendezvous based location services, each node maintains its location information at a one or more than one nodes using periodic updates. In contrast to flooding based location services the location information is never propagated throughout the network. The rendezvous based location services may be quorum-based or hashing-based schemes. In quorum based schemes, a node maintains its location at a subset of nodes. A source node queries another subset of nodes whenever it needs to know the location of the destination. The quorum rules decides which subset is chosen for maintaining location information and which subsets are queried by the source nodes. Partial overlap of the two subsets is necessary for proper functioning of quorum-based services. Examples of quorum-based services are [33], [85]. Hashing-based services use a well known hashing function in order to determine its location servers. When a node needs to discover the location of a destination, it uses the hash function in order to find out which nodes have the location information of the destination. The hash function may either map a node to another node s IDs or to a geographical locations, which may then be used to choose location servers. The hashing-based services may be flat [3], [83], [9] or hierarchical [54], [96]. A performance comparison of location services for geographic routing is presented in []. The effect of location errors and uncertainty on the performance of geographic routing protocols has been considered in [79], [8], [86]. The effect of error in location information on the packet delivery ratio and the power consumed at the nodes in an ad hoc networks in studied in [79]. It is observed that % error in node s location information may cause substantial loss in performance. An improvement, comprising of maintaining two hop neighborhood information, is proposed which makes geographic routing tolerant to 4% error in location. Similar observations regarding loss in performance due to location errors induced by increased mobility and beacon interval are made in [8]. The authors propose neighbor and destination location prediction schemes in order to mitigate the performance loss. The effect of uncertainty in location information on delay of geographic routing is studied in [86]. The uncertainty may be due to random GPS errors, coarse location information or availability of location information at only subset of node while other nodes randomly forward the packet. It is observed that the delay performance of geographic routing in presence of uncertain location information is within a factor of the delay performance of geographic routing using perfect routing information. The overhead incurred by routing protocols and their scalability properties has been studied in [3], [], [38], [4], [64], [76], [9], [93], [97], [98], [99], [], []. The initial studies [3], [], [4], [64] are mainly simulation based. The routing overhead incurred by DSDV [69], TORA [65], DSR [4] and AODV [7] is studied in [3] using detailed packet level simulations. It is observed that none of the routing protocol is the best across all scenarios. Instead each protocol performs well in some scenario and bad in others. It is found that TORA incurs the highest routing overhead and scales worst with the number of sources. Although DSR and AODV perform better than DSDV and TORA under moderate to high mobility, the routing overhead increases steadily with mobility. The performance of TORA is compared with that of ideal link state ILS) routing, a modification of OSPF [6] for mobile wireless networks, in [64]. It is observed that as the network becomes more dynamic the performance of TORA surpasses that of ILS in terms of both delay and routing overhead incurred. A exhaustive performance comparison of two most popular ad hoc routing protocols, DSR and AODV, is performed in []. It is observed that in most scenarios AODV performs well under low mobility while DSR performs well when mobility is high. Similar observations regarding performance of AODV, DSR and DSDV are made in [4].

4 4 Although simulation-based studies provide useful information about the performance of routing protocols, the observations may not be generalized to all scenarios. Therefore it is important to have analytical results for the performance of routing protocols in order to be able to develop a deep and general understanding of the trade-offs involved. In [38], [9], the authors present an analytical framework for characterizing the routing overhead for ad hoc routing protocols. Asymptotic results are provided for the overhead of proactive and reactive protocols in terms of network and routing protocol parameters such as packet arrival rate, hello packet transmission rate, hello packet size, size of route request packet, topology broadcast rate etc. The scalability properties of various routing protocols is studied in [76]. The authors find answers to the question that which routing protocol scales best with networks size, traffic intensity and mobility. The scalability of a routing protocol with respect to a parameter is defined as the maximum exponent of the parameter appearing in the asymptotic expression of overhead for that protocol. It is found that flooding and ZRP [34] scale best with mobility, link state [6] and ZRP scale best with traffic load while HSLS [77] is found to scale best with respect to the network size. The impact of traffic pattern on scalability of reactive routing protocols in ad hoc networks with unreliable but stationary nodes is studied in [], []. It is found that the reactive routing protocols may scale infinitely i.e. the routing overhead does not tend to infinity) with respect to network size for some traffic patterns. The analysis is extended to and similar results are obtained for cluster-based routing algorithms in [93]. In [97], [98], [99], the authors use an information-theoretic approach to characterize the minimum routing overhead and memory requirements of a topology-based proactive) twolevel hierarchical routing protocols for ad hoc networks. The entropy rate of topology change and the entropy of ad hoc network topologies is used to find the above mentioned bounds. Our work is along the same line. Instead of characterizing the overhead incurred by an implementation of a particular routing protocol, we present an information-theoretic analysis for finding the minimum cost, in terms of routing overhead, that must be paid in order to ensure that packets are routed with certain level of reliably using any implementation of geographic routing protocol. Similar to the impact of Shannon s work [8] on improving data communication and compression techniques, such bounds on performance of routing protocols may be helpful in better understanding and improvements of routing techniques for mobile ad hoc networks. B. Capacity of wireless ad hoc networks The characterization of the capacity of mobile wireless ad hoc network using a comprehensive model that takes into account mobility, delay, topology, energy, multiuser issues and characteristics of wireless channel is still a challenge. However in past few years a significant progress has been made in this direction. In their seminal work, Gupta and Kumar [3] used the concept transport capacity in order to characterize the throughput capacity of wireless ad hoc networks. The transport capacity of a network in bit-meters per second) is defined as the supremum over the set of feasible rate vectors of the distance weighted sum of rates [95]. It is shown in [3] for uniformly distributed stationary nodes, the transport capacity of wireless networks is Θ W ) An bit-meters per second, where W is the bandwidth of wireless channel and A is the area over which the network is deployed. This implies that W transport capacity per node is Θ A n ). Also it is shown that for random node-destination pairs the per-node throughput W scales as Θ n log n ). Both these results indicate that as the number of nodes deployed in an ad hoc network tends to infinity, the per-node throughput capacity of the network tends to. In other words, the wireless ad hoc networks at least with stationary nodes) do not scale well with network size. Following Gupta and Kumar s work, the capacity of wireless ad hoc networks has been investigated for various scenarios. A simulation based study of the capacity of multihop wireless ad hoc networks with IEEE 8. MAC has been done in [5]. It is found that with IEEE 8. MAC, the per-node ) capacity of multihop ad hoc network scales as O n more precisely as.47 n ). In [88] it is shown that under general model of fading channel ) the per-node throughput capacity scales as Θ. Similar bound for capacity is found when the nlog n) 3 nodes are mobile. However if On d ) delay is tolerable then n the per-node capacity is shown to scale as Θ d log n) ). 5 The capacity of arbitrary wireless networks with probabilistic receptions is evaluated in [58]. The capacity is expressed in terms of the packet reception probability density function and the distance between the source destination pairs. The authors then evaluate closed form expression of the capacity in regular networks in [59]. For Manhattan grid network the capacity is found to scale as O ) N, where N is the size of the Manhattan grid. The delay-throughput trade-off for the Gupta-Kumar model is investigated in [4] and it is found that D = Θ nt ), where D and T denote delay and throughput and delay respectively. A queuing theoretic approach for characterizing end-to-end delay and capacity of random access MAC based ad hoc networks is used in [] and []. It is shown that in presence with the collision avoidance mechanism, the maximum achievable per-node throughput scales as o nlogn ). The upper bound is not achievable because some of the network capacity is wasted due to the collision avoidance mechanism of the MAC protocol. The effect of TCP regulated traffic on the capacity of ad hoc networks is studied in [4] and [7]. In [7], it) is observed that RT T p the throughput of TCP scales as Θ, where RT T is the round trip time and p is the packet loss probability. Both RT T and p decrease with increase in the communication range transmission power) and thus TCP throughput also increases. However the increase in communication radius also leads to increase in MAC level interference and subsequent loss in capacity. Thus there exists an optimal communication radius that maximizes the capacity of ad hoc network with TCP regulated traffic. Simulations are used to verify the existence of such an optimal communication radius. Similar optimal communication radius is shown to exist in [4] even when

5 5 mobility is taken into account. The impact of multiple channels, multiple interfaces and directional antennas on the capacity of ad hoc networks is studied in [49], [53], [68]. OPNET simulations are used in [53] to characterize the guaranteed capacity for linear and grid network topologies with single and multiple channels. When RTS/CTS mechanism of MAC are enabled, it is found that for single channel case the per-node throughput scales as.67 n.744 in grid network. The use of multiple channels is observed to increase by per-node throughput by approximately 9.3 times. The impact of ratio of number of available channels to number of interfaces available at a node on transport capacity of ad hoc networks is studied in [49]. It is shown that if the ratio is below a certain threshold Olog n) for random networks and On) for arbitrary networks) then the transport capacity is worse than that of a network with single channel and interface. However if the ratio is above the threshold then capacity is improved. In [68] the capacity problem is formulated as network flows problem [3] and min-cut/max-flow theorem [6] is used to evaluate maximum stable throughput for wireless networks with omni-directional antennas, simple directional antennas and complex directional antennas. It is found that using arbitrarily complex signal processing techniques along with directional antennas, the throughput capacity is scaled by at most Θ log n) ). Although use of direction antennas and signal processing leads to some improvement in the throughput capacity of ad hoc networks, the network still cannot scale with number of nodes deployed. The above mentioned results regarding the capacity of multihop ad hoc networks are discouraging since they all indicate that ad hoc networks cannot scale with network size. However a few encouraging results have been found recently which indicate that it may be possible to construct scalable ad hoc networks. The transport capacity of wireless networks with fading channels is studied in [95]. It is shown that even when the channel state information is available the transport capacity grows as On). However if the network assumptions are relaxed to include independence and non-zeroness condition on the fading channel, the transport capacity of Ωn) may be achieved even without knowledge of channel state information. The transport capacity of ad hoc networks in terms of geographical locations of the nodes is evaluate in [43]. The transport capacity is shown to be c n, where c is a constant independent of n. These results are encouraging as they indicate that under certain conditions it is possible to obtain optimal capacity scaling of Θn) in wireless ad hoc networks. In [3], it is shown that if arbitrarily large delays are tolerable then the throughput capacity of mobile ad hoc network scales as O), that is the capacity is independent of the network size. This result is very important as it provides some optimism for designing scalable ad hoc network. The mobility of nodes, which was previously considered a nuisance in ad hoc networks, can be exploited in order to increase capacity. However the increased capacity is at the cost of delay which depends on the node mobility. This has triggered a large number of investigations into the delay-throughput trade-offs in mobile ad hoc networks. In [4], it is shown that for a Brownian n ) motion based mobility model the delay scales as Θ vn) in order to achieve O) throughput. Here vn) is the velocity of the nodes. The authors later extend their analysis to a more realistic random walk model in [3]. It is shown that in order to achieve any capacity improvement the delay scales as Θ n log n). In [56], it is shown that even if the mobility is restricted to one dimension the delay still scales as Θ n log n). Similar delay-capacity trade-offs are studied in [55], [8]. In [55], it is shown that in order to achieve throughput of Θ), an expected delay cost of Ω log n σ ) has to be paid, where σ is the standard deviation of the Brownian motion performed by the nodes. Also it is shown that any scheme that leads to a lower ) expected delay degrades the per-node throughput to O n The problem of finding the critical delay below which no capacity improvement is possible is also studied in [8]. In order to allow mobility models to be more realistic, the authors introduce hybrid mobility models. In this paper we are not concerned with capacity improvement achieved by increasing delay, since in most practical scenarios such a high delay may not be tolerable. Instead we are primarily concerned with the scenario where the routing protocol tries to send out a packet as soon as possible. In this case, the instantaneous transport capacity of a mobile ad hoc network is same as that of a static network. Thus we use Gupta-Kumar s result on transport capacity in order to characterize the capacity deficit, critical node density and resultant transport capacity. C. Information theory and communication networks So far information theory has not significantly influenced the design and understanding of communication network protocols. This unconsummated union is highlighted in [5] and several topics that may benefit from an information-theoretic insight are reviewed. One of the earliest attempts in using information theory to enhance the understanding of communication networks was made in [7]. In [7], Gallager used information-theoretic approach in order to characterize the lower bound on the amount of protocol information required to keep track of the sender, receiver and timing of messages in a communication network. Gallager analyzed a simple network consisting of two node with multiple synchronous sources and receivers. He also analyzed the effect of delay on the protocol information, i.e. how does delaying the transmission of message effect the amount of protocol information. It is found that although introduction of message delay decreases the protocol information, small average message length and high message arrival rate may lead to prohibitively high protocol information overhead. A information-theoretic investigation of transport capacity of wireless ad hoc networks is done in [94]. This study differs from previous studies in that the asymptotic bounds of transport capacity are found by taking position of nodes into account and without considering the interfering transmissions as noise. The distinction between interference and noise is particularly important. Although for the current technologies the interference is a nuisance that leads to packet collisions, use

6 6 of cooperative transmission and relaying [5], [63], [78] may allow the interference to be exploited for useful purposes. It is observed that for realistic propagation models the transport capacity scales as On). This result implies that no routing or node cooperation scheme can yield a transport capacity greater than cn, for some n. In this paper we are concerned with using information theory as a tool to analyze routing overhead in a mobile wireless network. The major portion of the overhead is incurred because topology of a mobile networks changes over time. Thus the routing overhead is directly related to entropy of node locations and therefore the entropy of network topology. A few papers have used information theory to understand the effects of node mobility on wireless networks. An analytical framework, based on entropy of node location, for characterizing delay and overhead associated with paging and routing a call to a mobile station in a cellular environment is provided in [73]. The complexity of tracking a mobile user in a cellular environment is studied using a information-theoretic approach and a position update and paging scheme is proposed in [9], []. An entropy based modeling framework for evaluating and supporting route stability in mobile ad hoc networks is proposed in [5]. In [89], the authors propose the entropy of link change as the metric for mobility models against which performance of wireless network protocols must be evaluated. III. NETWORK MODEL The ad hoc network consists of n nodes. The nodes perform Brownian motion with variance σ. In a multi-dimensional space, say with dimension k, the Brownian motion may be decomposed as independent Brownian motion in each dimension with variance σ /k. Let X i t) = {X i t), X i t),... X ik t)} denote the location of destination node i in a k-dimensional space at time t, where X ij t) denotes the coordinate of node i corresponding to the j th dimension. Let ˆXi t) = { ˆX i t), ˆX i t),... ˆX ik t)} denote the location information of destination i available at its location server at time t. Initially the location information of each destination is accurately known at its location server, i.e. X i ) = ˆX i ). In the following two sections, we first analyze overheads for k =. We then extend the results for k =. Note that k = and k = are cases of the most practical importance. However using similar approach the -dimensional results may be extended to any arbitrary k. The j th packet destined to destination i arrives at a node source of the j th packet) in the network at time T j. For all j >, S j = T j T j the packet inter-arrival time) is independently and identically distributed according to an arbitrary distribution with pdf f S t). In this study we first present results for an arbitrary f S t) and then investigate the special cases of deterministic, uniform and exponential interarrival time distributions. Similarly let τ i k) denote the time at which k th packet to be forwarded by node i arrives. The forwarded packets include both the packets generated by node i and the packets for which the node acts as an intermediate relaying node. The inter-arrival time of the forwarded packets τ i k + ) τ i k), k > ) is identically and independently distributed according to pdf denoted by f τ t). The communication radius of each node is r meters. Rendezvous based location service is used for maintaining locations of destinations at a subset of nodes acting as location servers. When a new packet arrives at a source node, it queries the location server of the packet destination for the location of the destination. The packet is routed to the destination according to greedy geographic forwarding using location of the destination returned by its location server. It is assumed the position of a destination does not change significantly while the location server is being queried by the source and the packet is being forwarded through the network. In other words the time scale of forwarding a packet is much smaller than that required for a significant change in position. Also the source node is always able to communicate with the location server and vice versa. IV. OVERHEAD ASSOCIATED WITH LOCATION INFORMATION UPDATES In this section we find a lower bound of the minimum rate at which each destination node must update its location servers such that the average squared error of the position available at the location server at the time when the location servers are queried is less than ɛ. We first introduce the notations and the rate distortion formulation for the minimum update rate problem. We then present the analysis for the one dimensional cases and extend it to the case of two dimensional network. A. Notation and rate-distortion formulation Definition : D i t) is the squared-error in the location information of destination i available at its location server at time t i.e. D i t) = X i t) ˆX i t) ) where X i t) ˆX i t) = l=k l= X il t) ˆX il t)). Definition : Xi N = {X i T ), X i T ),..., X i T N )} is the vector of locations of destination i at time instances T j, j N. Similarly ˆX i N = { ˆX i T ), ˆX i T ),..., ˆX i T N )} is the vector of location information at the location server of destination i at time instances T j, j N. Definition 3: Xi N and ˆX i N are defined as sets of all possible vectors Xi N and ˆX i N respectively. Definition 4: P N [x N i ; ˆxN i ] denote the probability that Xi N = x N i and ˆX i N = ˆx N i, where xn i ˆX i N and ˆx N i ˆX i N. Definition 5: D in is defined as D in = N N E[D i T j )] ) j= where E[D i T j )] is given by E[D i T j )] = x N i X i N ˆx N i ˆX i N P N [x N i ; ˆx N i ]D i T j ) 3) Definition 6: P N ɛ ) is defined as the family of probability distribution functions P N [x N i ; ˆxN i ] for which D in ɛ. Now we will present a rate-distortion theory based formulation to find the minimum number of bits required to represent the location information such that D in ɛ.

7 7 Definition 7: R N ɛ ) is defined as the minimum rate in terms of bits per packet) at which a destination must transmit its location information to its location server such that D in ɛ. According to [9], R N ɛ ) is given by R N ɛ ) = min P N P N ɛ ) N I P N Xi N ; ˆX i N ) 4) where I PN Xi N ; Xˆ i N ) is the mutual information between X i N and ˆX i N. The minimum rate at which a destination must update its location information such that a large fraction of packets are delivered, represented by Rɛ ), is given by Rɛ ) = lim N min R N ɛ ) 5) In the next two sections we characterize the lower bound of Rɛ ) for one and two-dimensional networks. B. Rate-Distortion Analysis for -Dimensional Network Lemma : The mutual information between Xi N satisfies the following relationship and ˆX N i inf I PN Xi N ; ˆX i N ) NR ɛ ) 6) P N P N Proof: This proof is very similar to the proof of [7, Theorem 3]. Using the standard definition of mutual information we get I PN X N i ; ˆX N i ) = HX N i ) HX N i ˆX N i ) 7) Now consider HX N i ˆX N i ) HXi N ˆX i N ) = HX i T ) ˆX i N ) N HX i T j ) X i T ), X i T ),..., X i T j ), ˆX i N ) j= Since conditioning cannot increase the entropy, we have From the above Lemma and definition of rate distortion HXi N ˆX i N ) HX it ) ˆX N i N ) + X function 4) and 5) it follows that HX i T j ) X i T j ) ˆX i T j )) 8) j= Rɛ ) R ɛ ) 9) 9) follows from 8) since HX i T j ) X i T j ) ˆX i T j )) is already conditioned on X i T j ), subtracting it from X i T j ) is similar to translating the random variable by a scalar. Define a new random variable, Y j j N ), such that Y j = ˆX i T j ) X i T j ) ) Since Y j depends only on ˆX i T j ) and X i T j ), we have HX i T j ) X i T j ) X i T j ), ˆX i T j )) = HX i T j ) X i T j ) Y j, X i T j ), ˆX i T j )) ) HX i T j ) X i T j ) Y j ) ) Equation ) follows from ) because conditioning does not increase entropy. Thus we get the following upper bound for HX N i ˆX N i ) HXi N ˆX i N ) HX i T ) ˆX i T )) + N HX i T j ) X i T j ) Y j ). 3) j= Now consider HXi N ), since X it j ) X i T j ) are independent of each other, we have HX N i ) = HX i T )) + N HX i T j ) X i T j )) j= Combining 7), 3) and 4), we get 4) I PN Xi N ; ˆX i N ) = IX i T ); ˆX i T )) + N IX i T j ) X i T j ); Y j ) 5) j= Notice that, the squared error in the location information may also be written as D i T j ) = Y j X i T j ) X i T j )) = X i T j ) ˆX i T j ) 6) Let d j = E[D i T j )]. Since X i T ) has the same distribution as X i T j ) X i T j ), and 6) is satisfied, therefore we have IIX i T j ) X i T j ); Y j ) R d j ) j 7) Define d i E[ X i T ) ˆX i T ) ], then by substituting 7) in 5) and using the convexity of the rate distortion function R, we get I PN Xi N ; ˆX N i N ) R d j ) NR N d j 8) N j= j= Now since P N P N, /N) N j= d j = D in ɛ, therefore from 8) we have I PN X N i ; ˆX N i ) NR ɛ ). = HX i T ) ˆX N i N ) + X HX i T j ) X i T j ) X i T j ), ˆX i T j )) The 9) following theorem provides a lower bound of the minimum rate at which a destination must update its location j= information. Theorem : In order to ensure high delivery ratio, the lower bound on the location update rate in bits per packet) is given by Rɛ ) hx i T )) log πeɛ ) where hx i T )) is the differential entropy of the location of destination i at the time when the first packet destined to it arrives in the network. Proof: From 9) we know that the minimum update rate is bounded by R ɛ ), which in turn is defined as R ɛ ) = inf I P X i T ); ˆX i T )) P P

8 8 Now consider I P X i T ); ˆX i T )), Here ) follows from ) since conditioning does not increase entropy. 3) follows from ) since for a fixed variance, normal distribution has the highest differential entropy. 4) follows from 3) since for P P E[X i T ) ˆX i T )) ] ɛ. Thus R ɛ ) hx i T )) log πeɛ ) and ) follows directly from it. Theorem implies that the minimum update rate largely depends on hx i T ), which in turn depends on two factors: i) the mobility pattern of the destination node and ii) the packet inter-arrival time process. Let f X x) denote the pdf of X i T ) without loss of generality, X i T ) = ). For Brownian motion with variance σ and packet inter-arrival time distribution f S t), f X x) is given by f X x) = and Rɛ ) is given by where τ= x e σ τ f S τ)dτ 5) πσ τ Rɛ ) hf X x)) log πeɛ ) 6) hf X x)) = x= f X x) log f X x)) dx 7) The lower bound of the minimum overhead incurred by location update information in terms of bits/second,denoted by Uɛ ), is given by Uɛ ) E[S] hf X x)) log πeɛ )) 8) In the remaining part of this subsection we evaluate f X x) and Rɛ ) for deterministic, uniform and exponential interarrival time distributions. ) Deterministic inter-arrival distribution: We first consider the case of deterministic arrival case because it is easy to obtain closed form results for this case and therefore we can focus on gaining insights without bothering much about complicated analysis. Suppose that packet destined to destination i arrives in the network after every T seconds, that is f S t) = δt T ) For such an arrival process, f X x) is given by f X x) = πσ T e x σ T and hf X x)) is given by I P X i T ); ˆX i T )) = hx i T )) hx i T ) ˆX i T )) = hx i T )) hx i T ) ˆX i T ) ˆX hf X x)) = i T )) ) log πeσ T ) hx i T )) hx i T ) ˆX Therefore the minimum update rate in bits per packet for i T )) ) hx i T )) hx i N, E[X i T ) ˆX deterministic packet inter-arrival time is given by i T )) ]))3) hx i T )) log πeɛ ) 4) Rɛ ) σ ) log T ɛ bits/packet 9) For the deterministic inter-arrival time the lower bound is similar to the minimum number of bits required to represent a Gaussian random variable with variance σ T subject to the constraint that the expected squared-error is less than ɛ. This is because the chance in position of the node between during a packet arrival interval is indeed a Gaussian random variable with variance σ T. The equation 9) bounds the minimum number of bits that a destination node must send to the location server for each packet destined to it that arrives in the network. For the deterministic arrival, the the packet arrival rate equals /T packets per second, thus minimum update rate in bits/second, represented by Uɛ ), is given by Uɛ ) T log σ ) T bits/second 3) Notice that Rɛ ) increases with both σ and T. This is because larger σ and T would imply larger uncertainty in the change in position of the destination during the packet arrival duration and hence more bits are required to represent the destination s position for each new packet. Uɛ ) also increases with σ for the same reason. However, Uɛ ) decreases with increase in T. This is because the increase in update rate due to higher uncertainty associated with high T is over-compensated by the fact that larger T implies that updates have to be made less often. For deterministic inter-arrival time it is also quite easy to construct a strategy to update the location server that achieves the bound in 3). The following strategy achieves the bound: Each destination updates its location at time kt k =,,... ) seconds by encoding N, σ T ) Gaussian random variable corresponding to the change of position since last update such that the squared error distortion is less than ɛ. However in a real-life scenario the arrival times of packets destined to a particular destination is not known a priori, although we might have some estimate of the arrival rate. It is expected that such uncertainty in the packet arrival rate would further increase the update rate. ) Uniform inter-arrival time distribution: Among all continuous time distributions with a given finite base and mean the uniform distribution has the highest entropy. Thus uniform distribution maximizes the uncertainty of packet arrival instances and thus would lead to maximum position update rate among all distributions with the same finite base and mean. Consider inter-arrival time to be uniformly distributed between [, T ] such that the inter-arrival time distribution is given by { f S t) = T, t T 3), otherwise ɛ

9 9 According to 5), f X x) is given by T f X x) = T x = πσ T e σ T + x σ T erf τ= x e σ τ dτ πσ τ x σ T ) x σ T 3) Let h U denote differential entropy of f X x), then update rate per packet is given by Rɛ ) h U log πeɛ ) bits/packet 33) and update rate in bits per second is given by Uɛ ) h U T log πeɛ )) bits/second 34) 3) Exponential inter-arrival time distribution: Among all the continuous time distribution with base [, ) and a given mean, the exponential distribution has the highest entropy. Also exponential distribution is widely used to model external inter-arrival time of packets to a given destination. This acts as a motivation for characterizing lower bound for position update when the packet inter-arrival time is exponentially distributed. We consider an exponential distribution with mean /α, given by f S t) = αe αt According to 5), f X x) is then given by f X x) = = x e σ τ αe ατ dτ πσ τ α x e σ ατ τ dτ 35) πσ τ Unfortunately the closed-form expression for the above integral cannot be evaluated for the above integral. So we will use numerical methods to calculate its value. Let h E be the differential entropy of the distribution f X x) given in 35). Then the lower bounds on update rate per packet and update rate per second are given by Rɛ ) h E log πeɛ ) bits/packet 36) Uɛ ) α h E log πeɛ )) bits/second 37) C. Update rate analysis for -dimensional network The update rate analysis for the two-dimensional case is based on the analysis for the one-dimensional case. The approach used in this analysis may also be extended to the three and other higher dimension case. Brownian motion in two dimension space may be decomposed into two independent one dimensional Brownian motions along x and y coordinates each with a variance σ /. Thus if X i t) = {X i t), X i t)} be the coordinates of destination i at time t then the distribution of X i t) is independent of the distribution of X i t). Recall the rate distortion function is Rɛ ) = lim inf N P N P N ɛ ) N I P N X N i ; ˆX N i ) Now consider I PN Xi N ; ˆX i N ). For the two dimensional networks, this may be written as I PN X N i ; ˆX N i ) = I PN X N i, X N i ; ˆX N i ) = I PN X N i ; ˆX N i ) + I PN X N i ; ˆX N i X N i ) = I PN X N i ; ˆX N i ) + I PN X N i ; ˆX N i ) = I PN X N i ; ˆX N i ) + I PN X N i ; ˆX N i ˆX N i ) + I PN X N i ; ˆX N i ) + I PN X N i ; ˆX N i ˆX N i ) = I PN X N i ; ˆX N i ) + I PN X N i ; ˆX N i ) where X N i = {X i T ), X i T ),..., X i T N )}, X N i = {X i T ), X i T ),..., X i T N )}, ˆXN i = { ˆX i T ), ˆX i T ),..., ˆX i T N )} and ˆXN i = { ˆX i T ), ˆX i T ),..., ˆX i T N )}. We know that D in ɛ implies N N j= N E [X i T j ) ˆX i T j )) + X i T j ) ˆX i T j )) ] N j= [ E X i T j ) ˆX i T j )) ] + N N j= ɛ [ E X i T j ) ˆX i T j )) ] ɛ Thus the rate distortion function Rɛ ) may be written as where Rɛ ) = min k r R) k ) + R ) ɛ k ) 38) R ) ɛ ) = lim R ) ɛ ) = lim inf N P N P N k ) inf N P N P N ɛ k ) N I P N X N i ; ˆX N i ) 39) N I P N X N i ; ˆX N i ) 4) From Lemma and Theorem, it follows that R ) ɛ ) hx i T )) log πee [X i T ) ˆX i T )) ]) 4) R ) ɛ ) hx i T )) log πee [X i T ) ˆX i T )) ]) 4) For a large fraction of packets to be routed to the destination E [X i T ) ˆX ] i T )) + E [X i T ) ˆX ] i T )) ɛ. Thus we have following upper bound for Rɛ ) hx i T )) + hx i T )) max k [,ɛ ] log πek) + log πeɛ k) ) ) 43) The RHS of 43) is minimized for k = ɛ /. Thus we have the following Theorem. Theorem : In order to ensure that the error in location

10 information used for forwarding packets is less than ɛ, the lower bound on the location update rate in bits per packet) for a two-dimensional network is given by Rɛ ) hx i T )) + hx i T )) log πeɛ ) bits/packet 44) Again here hx i T )) and hx i T )) depend on the mobility pattern and distribution of packet inter-arrival time. We now present the lower bounds of the update rate for various inter-arrival time distributions. ) Deterministic packet arrival: For the deterministic packet arrival process, where packets arrive at t = kt, k =,,..., the probability distribution functions of X i T ) and X i T ) are given by f X x) = f X x) = x e σ T πσ T and hx i T )) and hx i T )) is given by hx i T )) = hx i T )) = log πeσ T ) Thus the lower bound on location update rate in bits/packet and bits/second is given by σ Rɛ ) T ) log bits/packet 45) ɛ Uɛ ) T log σ T ɛ ) bits/second 46) The behavior of Rɛ ) and Uɛ ) is similar to that observed in the one-dimensional case. In fact the minimum rate is simply the double of what was observed in the one dimensional case. This is not surprising since the change in x-coordinate of the destination node is independent of the change in the y- coordinate of the destination. The change has variance σ / rather than σ as in the case of one-dimensional motion thus one might expect the minimum rate in -D to be less than times the minimum rate in -D case. However this decrease in entropy due to decreased variance is compensated by the fact that allowable squared error in both the coordinates is also decreased, leading to a factor of. ) Uniform distribution of packet inter-arrival time: For the uniform packet arrival process described in 3), the probability distribution functions of X i T ) and X i T ) are given by 4 x f X x) = f X x) = πσ T e σ T + x σ T erf ) x x σ T σ T 47) Let h U denote the differential entropy of X i T ) and X i T ) i.e. h U hf X x)) = hf X x)), then the lower bound on update rate is given by Rɛ ) h U log πeɛ ) bits/packet 48) Uɛ ) T hu log πeɛ )) bits/second 49) 3) Exponential distribution of packet inter-arrival time: For the exponential packet arrival process, the probability distribution functions of X i T ) and X i T ) are given by α x f X x) = f X x) = πσ τ e σ +ατ τ dτ 5) Let h E denote the differential entropy of X i T ) and X i T ) i.e. h E hf X x)) = hf X x)), then the lower bound on update rate is given by Rɛ ) h E log πeɛ ) bits/packet 5) Uɛ ) α h E log πeɛ )) bits/second 5) 4) Comparison of minimum update rates for various arrival processes: Figure shows how the minimum update rate varies with the variance of the Brownian motion while Figure shows how the minimum update rate varies with the the average update inter-arrival time. The uniform packet interarrival time distribution requires highest update rate in order to have large delivery ratio followed by exponential distribution. As expected the deterministic packet arrival requires least update rate, which is equal to value of rate distortion function of Gaussian distribution, with squared error distortion measure, at epsilon. The behavior of update rate bits/second) in Figures b) and b) is particularly interesting. These figures show that the update overhead in bits/seconds may be arbitrarily large if σ is large and E[S] is small. Thus if the motion of destination has a high variance or the packets destined to the destination arrive at a high rate then the location update overhead for reliable routing may become prohibitively high. V. OVERHEAD ASSOCIATED WITH BEACON TRANSMISSION A beacon is a broadcast packet transmitted periodically by each node to advertise its presence. Beacon are necessary so that nodes maintain consistent neighborhood information. In the case of geographic routing, apart from the header information such as node id and timestamp, the beacon packet also consists of location service information of the nodes. This is because in geographical routing each node not only needs to know which nodes belong to its neighborhood but it also needs to know their locations so that it may make correct forwarding decision. Thus apart from the location information, another component of the routing overheads is the beacon overhead. In this section we evaluate a lower bound on the minimum rate at which the nodes need to transmit beacons so that neighbors maintain a consistent neighborhood information. We then bound overhead in terms of bits per second. We first consider Brownian motion in one dimension and later extend the results to two dimension case. A. Notation and minimum beacon rate formulation All the notations defined in subsections III and IV-A are used throughout this section. In this subsection we define some additional notations for the analysis. Definition 8: N i t) is the set of nodes that belong to the neighborhood of node i. That is N i t) = {j : X i t) X j t) r, j n, j i} 53)

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Optimizing Random Walk Search Algorithms in P2P Networks

Optimizing Random Walk Search Algorithms in P2P Networks Optimizing Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik Rensselaer Polytechnic Institute Troy, New York bisnin@rpi.edu Alhussein A. Abouzeid Rensselaer Polytechnic Institute Troy, New

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Routing in Variable Topology Networks

Routing in Variable Topology Networks Routing in Variable Topology Networks Dr. Alhussein Abouzeid Electrical, Computer and Systems Engineering (ECSE) Rensselaer Polytechnic Institute Variable Topology Networks P2P networks for distributed

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité )

Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Final Exam: Mobile Networking (Part II of the course Réseaux et mobilité ) Prof. J.-P. Hubaux February 12, 2004 Duration: 2 hours, all documents allowed Please write your answers on these sheets, at the

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009 4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009 Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks Nianjun Zhou, Member, IEEE, Alhussein

More information

Draft Notes 1 : Scaling in Ad hoc Routing Protocols

Draft Notes 1 : Scaling in Ad hoc Routing Protocols Draft Notes 1 : Scaling in Ad hoc Routing Protocols Timothy X Brown University of Colorado April 2, 2008 2 Introduction What is the best network wireless network routing protocol? This question is a function

More information

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs Beacon Update for Greedy erimeter Stateless Routing rotocol in MANETs Abstract Dhanarasan 1, Gopi S 2 1 M.E/CSE Muthayammal Engineering College, getdhanarasan@gmail.com 2 Assistant rofessor / IT Muthayammal

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks

Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation

Packet-Level Diversity From Theory to Practice: An based Experimental Investigation Packet-Level Diversity From Theory to Practice: An 802.11- based Experimental Investigation E. Vergetis, E. Pierce, M. Blanco and R. Guérin University of Pennsylvania Department of Electrical & Systems

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Optimal Power Control, Scheduling and Routing in UWB Networks

Optimal Power Control, Scheduling and Routing in UWB Networks TECHNICAL REPORT IC/23/61 1 Optimal Power Control, Scheduling and Routing in UWB Networks Božidar Radunović and Jean-Yves Le Boudec bozidar.radunovic@epfl.ch, jean-yves.leboudec@epfl.ch EPFL, CH-11 Lausanne,

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM)

Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) CS230: DISTRIBUTED SYSTEMS Project Report on Implementation of Near Optimal Algorithm for Integrated Cellular and Ad-Hoc Multicast (ICAM) Prof. Nalini Venkatasubramanian Project Champion: Ngoc Do Vimal

More information

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks

Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik and Alhussein Abouzeid Electrical, Computer and Systems Engineering Department Rensselaer Polytechnic Institute Troy,

More information

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks

High-Throughput Multicast Routing Metrics in Wireless Mesh Networks High-Throughput Multicast Routing Metrics in Wireless Mesh Networks Sabyasachi Roy Dimitrios Koutsonikolas Saumitra Das Y. Charlie Hu TR-ECE-05-7 September, 2005 School of Electrical and Computer Engineering

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Suresh Gyan Vihar University, Jaipur Volume 2, Issue 2, 216 PERFORMANCE BASED EVALUATION OF, AODV AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

More information

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Presentation: Alexandros Manolakos EE 360 Stanford University February 13, 2012 Table of Contents What are we trying to solve?

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET Volume 1, Issue 4, 215 PERFORMANCE BASED EVALUATION OF, AND ROUTING PROTOCOLS IN MANET Ms Anuradha M.Tech, Suresh Gyan Vihar University Ms Savita Shivani Suresh Gyan Vihar University Abstract:A Mobile

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved.

Volume 2 No. 1 ISSN Journal of Emerging Trends in Computing and Information Sciences CIS Journal. All rights reserved. The Beaconless Node Velocity-based Stable Path Routing Protocol for Unicasting and Multicasting in Mobile Ad hoc Networks Natarajan Meghanathan Jackson State University, Jackson, MS 39217, USA natarajan.meghanathan@jsums.edu

More information

Wireless Multicast: Theory and Approaches

Wireless Multicast: Theory and Approaches University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering June 2005 Wireless Multicast: Theory Approaches Prasanna Chaporkar University of Pennsylvania

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

The Open System Interconnect model

The Open System Interconnect model The Open System Interconnect model Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 1 Layered network design Data networks are usually

More information

Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization

Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization Minimizing the Routing Delay in Ad Hoc Networks through Route-Cache TTL Optimization Ben Liang and Zygmunt J. Haas School of Electrical and Computer Engineering, Cornell University, Ithaca, NY 14853, USA

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET

PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET PERFORMANCE EVALUATION OF DSDV, AODV ROUTING PROTOCOLS IN VANET K. Venkateswarlu 1, G. Murali 2 1 M. Tech, CSE, JNTUA College of Engineering (Pulivendula), Andhra Pradesh, India 2 Asst.Prof (HOD), CSE,

More information

CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS

CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS John Sucec and Ivan Marsic Rutgers University ABSTRACT The throughput of mobile ad hoc networks (MANETs has been analyzed previously.

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Trail-Based Search for Efficient Event Report to Mobile Actors in Wireless Sensor and Actor Networks

Trail-Based Search for Efficient Event Report to Mobile Actors in Wireless Sensor and Actor Networks sensors Article Trail-Based Search for Efficient Event Report to Mobile Actors in Wireless Sensor and Actor Networks Zhezhuang Xu 1, *, Guanglun Liu 1, Haotian Yan 2, Bin Cheng 3 and Feilong Lin 4 1 School

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information