CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS

Size: px
Start display at page:

Download "CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS"

Transcription

1 89 CHAPTER 5 MULTICAST GEOGRAPHY BASED ROUTING IN AD HOC NETWORKS 5.1 INTRODUCTION Efficient routing in MANET is a tough task due to their highly dynamic network topology, bandwidth controlled links and resource controlled nodes. Routing protocols, developed during advanced stages, depend on the topology information, which used the knowledge about the links between the nodes to begin and maintain end-to-end paths for routing. Topology-based routing has important overhead in maintaining up-to-date paths between source and destination, when the topology changes regularly. Moreover, it has scalability issues, as the overhead increases according to the number of nodes in the network. Routing based geographic information has gained significant attention, with the availability of logically priced and low-power GPS receivers or further localization systems. In geographic routing, a node uses the position of the sender, its adjacent nodes and the destination node, to forward the packet toward the destination at each hop. The simplest variety of geographic routing is, too greedy forwarding the message to the node, which minimizes a local forwarding metric. An easy example of such a metric is the space to the destination. In this case, the message is forwarded to the neighbor node which reduces the space to the destination.

2 90 In the greedy routing algorithm, each node in the route forwards packets to the neighbor which is the closest to the destination among its neighbors. Only the neighbors that are closer to the destination than the current node are considered. In this case, greedy routing has to stop and an alternative routing node called invalid handling has to be used to avoid the invalid regions. Invalid handling based on routing in planar geometric graphs attracted a main amount of research attempt, due to its stateless property and assured delivery in planar graph models. The planar graph algorithms use graph traversal rules (right hand rule and face changes rules) to find a path from the source to the destination on planar graphs next to the margins of the void regions. Existing geographic greedy routing and void handling methods do not want the concern and protection of end-to-end paths. This work presented an ECGMRR, which presented the method for energy efficient geographic routing for wireless ad hoc network, that discovers network redundancy and measures network mobility, leading to energy conservation. 5.2 GEO ROUTING SCHEME FOR SCALABLE AD HOC NETWORK In large networks or in networks where nodes travel at high speeds, the routing order for source destination pairs is likely to become very fast. This occurs in big networks, because longer paths have a shorter time to failure (a path fails when any link on it breaks). In both of these environments, caches have reduced lifetime which in turn implies that finding or keeping correct routing order can be exclusive. In this approach, for developing a scalable routing protocol is to regularly maintain estimated location information about nodes in the network and only to find accurate routes to specific nodes when there are packets to be sent to them.

3 91 Particularly, when a node needs to send a packet to some destination, it first decides the destination's fairly accurate position and then uses a simple geographic routing protocol. This approach allows reducing the cost of maintaining routing information and at the same time, providing the capability to find relatively cheap when needed. Thus, future method is based on a mixture of approximate geographical routing and an easy static mapping procedure to maintain the approximate location of the nodes. Source S Geographic routing Efficient path Encounter Voids Destination D1 Local minimum problem Can t apply greedy forwarding Destination D2 Figure 5.1 Geographic Routing Geographic routing attains an efficient path from source S to destination D1 (Figure 5.1). However, nodes are not always homogeneously populated in ad hoc networks. Networks may contain areas without any nodes; these areas are called voids or communication holes. When geographic routing encounters a void, it cannot apply greedy forwarding because there are no neighbor nodes that are closer to the destination than the current node. The straight line connecting source S and another destination D2 crossing a void, and greedy forwarding cannot further move at node x. This problem of not being able to apply greedy forwarding is called the local minimum

4 92 problem. Several schemes have been proposed to solve this problem. The routing performed to solve the local minimum problem is called fallback or recovery routing. The geographic routing is performed on an overlay network of topological multi-hop clusters. The CH constitute the vertices of the overlay graph. The CH collects and keeps information about their neighboring clusters and establishes links towards the neighboring CH. These links constitute the edges of the overlay graphs. Since the cluster hop counts are limited, Geo remains a localized routing algorithm. Using topology-based multi-hop clustering to create a robust overlay graph for geometric routing is a novel idea. Terminodes need a global map of the anchor nodes or path discovery protocols to obtain the anchored path. Contrary to these works that create geographic clusters or geographic cells, this work is based on the idea of topological clustering. Terminode routing combines hierarchical and geographic routing. The hierarchy created in Terminodes is by using anchor nodes, whereas in Geo, the hierarchy is created by topological clustering. Topological cluster based geographic routing has three different processes, namely 1) Multi-hop clustering and CH selection, 2) Overlay network formation and 3) Geo routing. Geo uses any multi-hop clustering algorithm, e.g, k-hop connectivity ID algorithm, for clustering and CH selection. After the clustering process, virtual nodes are created at the center of gravity of the clusters. These nodes are chosen as the vertices of the overlay graph, as they are more location fault tolerant, than the real CHs. In principle, a node close to the location of virtual cluster head (VCH) or the real cluster head (RCH)

5 93 itself serves the functions of the VCH. Now, virtual links are created between neighboring VCHs. After the overlay graph formation, the Geo routing process is executed. Geo routing uses topological information of the cluster member nodes for routing within the clusters. During the clustering process, each CH collects topology information about its member nodes. The cluster member nodes keep information about the path to reach their CH. This information is used in the topology-based intra-cluster routing. For routing beyond the source node cluster, Geo uses geographic routing. In geographic routing, the typical GFG type protocol is used to route packet along the edges of the overlay graph. In the proposed framework, greedy-forwarding method performs various optimization techniques to choose the next-hop node neighboring to the target node. Face routing is one of the essential methods for routing packets using compass routing on geometric networks. The intention is to choose the best path along the faces overlapped by the line fragments between a source and a destination. To keep away from loops using face routing, a planar graph of the original network is necessary. A planar graph is a sub- graph without crossing edges, which signifies the similar connectivity as the original network. Hence, face routing ensures to attain the destination, as long as the network topology is a planar graph. Existing geographic greedy routing and void handling methods, do not want the concern and protection of end-to-end paths. The planar graph algorithms use graph traversal rules to find a path from the source to the destination on planar graphs next to the margins of the void regions. In the greedy-forwarding mode of the protocol, each CH forwards the packets to its neighboring CH based on any forwarding criterion that

6 94 guarantees loop-free paths; e.g., the most-advance based forwarding criterion. When the packets get stuck at voids during greedy-forwarding, they use the planar graph traversal, based on face routing for void handling. This helps the packets to circumvent the void region. Once they circumvent the void region, the routing is switched back to the greedy-forwarding mode. When the packets reach the CH of the destination node, the local topology routing protocol is used to forward the packets to the recipient node. 5.3 ENERGY CONSERVED AD HOC NETWORK GEO MULTICAST SCHEME The proposed ECGMRR presented the scheme for energy efficient geographic routing for wireless ad hoc network which identifies network redundancy and measures network mobility more accurately, so that more energy can be conserved. The scheme includes the process of minimizing network redundancy by cluster formation, adapting to node mobility and energy consumption pattern for multicast service provisioning Cluster Formation to Minimize Network Redundancy ECGMRR organizes nodes into overlapping clusters that are interconnected to each other as shown in Figure 5.1. A cluster is defined as a subset of nodes that are mutually reachable in at most 2 hops. A cluster can be viewed as a circle around the CH with the radius equal to the radio transmission range of the CH. Each cluster is identified by one CH, a node that can reach all nodes in the cluster in 1 hop. A gateway is a node that is a member of more than one cluster. The gateway nodes connect all clusters together to ensure overall network connectivity. A node is ordinary if it is neither a CH nor a gateway node and is thus redundant.

7 95 Figure 5.2 Cluster Formation for Geographic Multicast Routing Figure 5.2 shows the cluster formation for geographic multicast routing in which all nodes have the same estimated network operational lifetime. Nodes 1 and 10 can directly decide they are the CHs because they have the lowest ID of all of their neighbors. Node 7 becomes a CH after nodes 2 and 3 choose node 1 as their CH. Nodes 2 and 3 are primary gateway nodes because they are neighbors of two CHs: nodes 1 and 7. Note that one of nodes 2 and 3 is redundant. Nodes 9 and 11 are secondary gateway nodes between clusters 7 and 10. In order to elect CHs and gateway nodes, each node periodically broadcasts a discovery message that contains its node ID, its cluster ID, and its estimated lifetime. A node s estimated lifetime can be conservatively set by assuming that the node will constantly consume energy at a maximum rate until it runs out of energy. While forming clusters, Energy conserved Geo-Routing Protocol (EGRP) first elects CHs, then elects gateways to connect clusters. A node selects itself as a CH if it has the longest lifetime of all its neighbor nodes, breaking ties by node ID. Each node can independently make this decision, based on exchanges discovery messages. Each node sets its cluster ID to be the node ID of its CH. Among the gateway nodes, those nodes that can hear multiple CHs are primary gateway nodes and

8 96 those that can hear a combination of CHs and primary gateway nodes are secondary gateway nodes. When multiple gateway nodes exist between two adjacent clusters, EGRP suppresses some of them in order to conserve energy since these gateway nodes are redundant. Gateway selection is determined by several rules. First, primary gateway nodes have higher priority than secondary gateway nodes, since at least two secondary gateway nodes, instead of just one primary gateway node, are needed to connect adjacent clusters. Second, gateway nodes with more CH neighbors have higher priority, since this will require fewer nodes to be kept awake. Third, gateway nodes with longer lifetimes, have higher priority in order to balance node energy. Note that the gateway selection algorithm does not guarantee that only one or one pair of gateway nodes exists between adjacent clusters. In order to support gateway selection, EGRP extends the basic discovery message to include the IDs of the clusters that a gateway node can connect Adapting to Node Mobility and Energy Conservation Levels With only a subset of the nodes active, it is possible that network mobility could cause a loss of connectivity. If a CH moves then it might no longer be able to serve as a CH. ECGMRR uses mobility prediction in order to maintain network connectivity. By estimating how soon a CH will leave its current cluster and inform all nodes in the cluster of that time, the clustered nodes can power themselves on before the CH leaves its cluster. This time is estimated as R/s where s is the CH s current speed and R is its radio transmission range. Suppose if the R/s estimate is too large, the connectivity between the moving CH and some nodes might be lost before this time. However, if this estimate is too small, ECGMRR will not be able to conserve any energy.

9 97 In EGRP implementation, set the estimate as R/4s to balance energy conservation and connectivity. To extend the basic discovery message to include the predicted cluster-leaving time. All nodes in a cluster should wake up to reconfigure clusters before the shorter of Ts and the cluster-leaving time of its current CH. The cluster-leaving time estimate is used analogously in the gateway node selection process. For the speed of mobile nodes in the network, each mobile node moves at a different speed and the maximum node speed is considered as another critical factor deciding the level of inaccuracy. The mobility pattern of mobile nodes are considered. If the node movement exhibits a different pattern, the effect of node mobility on the geographic routing protocol will be different. To estimate the effect of inaccurate location information caused by node mobility on the geographic routing protocol, conducted simulations with NS2 varying the beacon interval and the maximum speed of mobile nodes for each mobility model. Geographic routing is selected for the simulation, because it uses greedy-forwarding with face routing that are generally accepted schemes for geographic routing in sensor networks. The experiments were carried out in NS2 with each experiment running for 900 seconds. The results given here are averaged over six runs, each using a different random speed. Fifty nodes are placed randomly in the 1500m X 300m field and the combination of beacon intervals of 0.25, 0.5, 1.0, 1.5, 3.0, 6.0 sec and maximum node speed of 10, 20, 30, 40, 50 m/sec are simulated. The radio range of each node was assumed to be 250 meters. The nodes move according to the random waypoint model. Constant Bit Rate (CBR) traffic sources with each source generating four packets per second is used. The size of data packets was 64 bytes and selected 15 random sourcedestination pairs as the traffic flows.

10 PARAMETRIC MEASURE ON GEOGRAPHIC MULTICASTING For evaluating the performance of ECGMRR, the metrics chosen are packet delivery ratio, energy, disatance, throughput and data loss Packet Delivery Ratio It is defined as the ratio between the total number of packets that have reached the destination node and the total number of packets created at the source node. The location information of the nodes builds the packets route, loop free which results in a high packet delivery ratio. On rising the mobility or speed of the nodes, the delivery ratio reduces since most of the nodes move away from each other. Raising the number of nodes increases the delivery ratio due to strongly attached cluster configuration Energy The multicast leader election is depending on the traditional termination-detection algorithm for diffusing computations and how this algorithm is able to be modified to a mobile node energy setting. When assuming MANET with n nodes, regard as the existence of a method that permits each node to be conscious of its own location and residual energy. These organize and energy values are replaced among nodes so that each node obtains the information about the other nodes in the network for routing purposes. To reduce network overhead, each node broadcasts a message about its ID and position, to any other nodes from time to time over a long period, T. On the other hand, every node transmits a message regarding its ID, location and residual energy value to its neighbor nodes occasionally over a short period, t. In this protocol, only the neighbors gain residual energy information about each other.

11 Distance The longer the distance between two nodes, the lesser the update frequency of information is reliable with the simulation. Each node maintains a location and energy table, which includes the above information and its time of informing. There is no need for each node in the EGR to be aware of all of the other nodes' information and can adopt any existing location service methods in the simulation. Consequently, the resource consumption is similar for all protocols Throughput This metric gives the number of bits which are successfully delivered to related destinations in unit time in the network. When mobility increases, throughput also increases first and when it reaches the mobility of 15, it starts reducing in both algorithms. When compared to zone-id based algorithm, throughput is high in the rank based algorithm. In zone-id based algorithm throughput is low which infers in the usage of the rank based algorithm for most of the multicasting applications in MANET Data Loss When compared to the rank based algorithm, data loss is higher in the zone-id based algorithm but rank based algorithm performs a little better in data loss, with the implication of better usage of the rank based algorithm in MANET multicast scenarios. Data loss is an error condition in which information is damaged by failures or ignores in storage, transmission, or processing. Systems realize backup and disaster recovery equipment and processes to avoid data loss or restore lost data.

12 100 Data loss is well-known from data unavailability, such as may happen from a network outage. Data loss is also separate from data fall, although the term data loss has been sometimes used in those incidents. Data loss incidents can, also be data spill incidents, in case media containing responsive information are lost and afterward acquired by another party. Conversely, data spills are possible without the data being lost in the originating side Forwarding Data Packet The following describes the model for this protocol: Update the latest location information of destination node D to its location server at t0. At t1 (t1 t0<t) a source node S wants to transmit a data packet P to D, and it acquires the location of D from D's location server (in this simulation, S gets the location from its own). Then S adds the location of D and itself as well as time difference t1 and t0 to P's header. The scheme for predicting the destination node's expected zone. The center of the zone is the coordinate of D at t0, and the radius of the zone is the upper boundary of the predicted distance of D's movement. The destination of a data packet should be an area. However, an attempt to make some optimization. If S is quite far away from D, the angle µ will be too small for S to find the next hop. Consequently, modify the former tangents to the outer tangent lines between the two circles. One circle is centered on S whose radius is the transmission distance of S. The other is the scope of the D's expected zone. 5.5 SIMULATION OF GEOGRAPHIC MULTICAST IN MANET Implemented the proposed ECGMRR in the NS2.27 simulator and used AODV to route packets. All the model on the same simulated scenarios

13 101 to compare the effects of variations in node movement, traffic patterns and energy models on the performance of the protocols, as measured by energy use and data delivery quality. In geographical-based routing protocols is that every node knows the position of itself, the destination and all its neighbors. Stored in the routing table at each node are entries (pi, Si), where pi is the geographic position of some node and Si is one of its neighbors, which means the Si is closer to pi than the node itself. When source S wants to send data packets to destination D, S puts the geographical information of itself and D in the data packet, searches its routing table to find the nearest neighbor to D and forwards the packet to that neighbor. When another node A receives it, it will forward it to the neighbor to nearest D, as S does. However, if node A finds itself closer to D than any neighbors, but it has no entry for D in the routing table, it initiates a route discovery procedure (e.g., Depth First Searching). The entire path from A to D will be recorded in the route request packet when it arrives at D, so D can answer with an ACKnowledgement (ACK) to update the routing table at the nodes along the path from D to A. When A receives the ACK, the data packet flow can continue Traffic, Mobility and Radio Models Nodes in the simulation, move according to the RWM. Nodes pause and then move to a randomly chosen location at a fixed speed. Consider seven pause times: 0, 30, 60, 120, 300, 600 and 900 seconds and for each generate 10 sets of initial placements and random way-points. Nodes move at two different speeds, from uniform distributions between 0 and 20m/s and 0 and 1m/s. Nodes move in a 1500m by 300m area. In most scenarios 50 transit nodes are used that route data and 10 traffic nodes that act as sources and sinks. Then, vary node density, use 100 and 200 nodes, while keeping the area constantly. Traffic is generated by CBR sources spreading the traffic randomly among the 10 traffic nodes. The packet sizes are 512 and 1024

14 102 bytes and the packet rate is set to four different values: 1 pkt/s, 10 pkts/s, 20 pkts/s and 200 pkts/s. Note that when packet size is 1024 bytes and packet rate is 200 pkts/s, the traffic reaches the maximum link bandwidth of 2Mb/s. This model, a radio with a nominal range of 250 meters both with the two-ray-ground propagation model and a non-deterministic shadowing model Energy Model Energy consumption model contributed an extended version of DSR and a validated MAC layer with the simulation package. The proposed AODV implementation is an improved version of the AODV. Integration of ad hoc routing reproduces the similar standard results which have been verified and found that the simulation results of unmodified ad hoc protocols are consistent with other published results. The simulation used 1Mb/s Wave LAN (pre ) wireless LAN. They measured energy of 1.6W for transmitting, 1.2W for receiving, and 1.0W for listening. To this add an energy of 0.025W when sleeping. Since it is impossible to evaluate the behavior of the network, the traffic nodes run out of energy before the transit nodes, traffic node s infinite energy is given. Traffic nodes follow the same mobility model as transit nodes, but they do not run Geographical Adaptive Fidelity (GAF) or forward traffic. Because of traffic nodes speciality, do not count them when reporting the number of nodes in the simulation. Each transit node is given enough energy so that it can listen for about 450 seconds. In this home agent based EGRP simulations, a model intermediate node is consuming 0.033W, the amount of power necessary for reporting location every 8 seconds, since the home agent based node does not require constant position information. Do not turn off intermediate location based node, when turn off the radio in order to avoid modeling satellite acquisition time and because the energy function is quite small (about equal to radio sleep mode).

15 103 The simulation for home agent and grid based EGRP are conducted for comparison in two phases. In the first phase, it is simulated 50 nodes for 600s. The main goal in this phase is to show that the schemes do not reduce the quality of routing, but do in fact conserve energy and extend network operational lifetime. In the second phase, do the same comparison for 2400s while varying the number of nodes in order to see how long network operational lifetime is extended for different node deployment densities. In each phase consider 340 simulations and all being combinations of 2 protocols, 7 movement patterns, 10 placement initials, 3 traffic loads, and 2 movement speeds. The obtained results and the difference when running ECGMRR are presented in the next section. 5.6 RESULT AND DISCUSSION ON ENERGY METRICS ON GEO MULTICASTING In order to quantify energy consumption, the Mean Energy Consumption per Node (MECN) is defined as follows: At the start of the simulation, n nodes have a total initial energy Eo. After time t, the remaining total energy of m nodes is E t. The MECN equals (E0-Et) / n*t. The results show that EGRP uses almost half the energy of existing methods except in the scenario where nodes move at high speed (20m/s) constantly (zero pause time). EGRP saved 20-30% more energy and grid based ECGMRR saved 65-75% more energy than other methods. When nodes move at high speed, grid ECGMRR adjusts it by turning off nodes for shorter times, leading to more frequent cluster formations. Such overhead causes grid ECGMRR to use more energy than home agent based ECGMRR in this scenario, though still about 30% less. Varying the traffic load does not affect the energy conservation results.

16 Network Lifetime The energy savings extend network s operational lifetime. The fraction of the network with remaining energy over time when nodes move at 20m/s (When nodes move at low speed, 1m/s, the grid ECGMRR plot is close to that of the 600s pause time EGRP curve, regardless of actual pause time). For both grid ECGMRR and EGRP, plot a zero pause time, representing constant node movement and a 600s pause time, representing almost no node movement. All nodes running plain AODV run out of energy at the same time, around 430s. Since AODV does nothing to conserve energy, this result reflects the energy of continuous listening. It can see that grid ECGMRR balances energy use more evenly among nodes than ECGMRR. For example, at time 600s at least 80% of EGRP nodes are still alive while at most 40% of Adaptive Location Aided Flooding (ALAF) nodes are alive except the scenario with a pause time of 0. ECGMRR is more effective at balancing energy because of its connectivity measurement based approach. It has developed a simulation environment in NS2 to evaluate the performance of grid ECGMRR and compared it with an ECGMRR algorithm for energy conservation. It is found that grid ECGMRR achieves higher energy savings when compared with ECGMRR. It also found that the nodes with a higher degree (i.e., Nodes with more one-hop neighbors) disseminate more data per unit energy. Thus, dense ad hoc networks are likely to benefit more from using the grid ECGMRR for data dissemination in terms of energy savings. Initially a set of 50 nodes is deployed in a 200mx200m ad hoc field using the location information given in the scenario file. The ad hoc field is divided into four uniform sized grids and each node associates itself with a grid. The nodes are assigned the grid ids 0, 1, 2 and 3 depending on their association. The nodes are further classified as either gateway nodes or internal nodes. Simulation has been done for the propagation time and data

17 105 dissemination by dividing the deployed area as 4 grids and 8 grids and the results are depicted in the following Figures 5.3 and 5.4. Data Dissem ination Propagation Time (sec) Without Grid 4 Grid Figure 5.3 Propogation Time Vs Data Dissemination for 4-grid 120 Data Dissemination Propagation Time (sec) Without Grid 8 Grid Figure 5.4 Propogation Time Vs Data Dissemination for 8-grid

18 106 Simulation has also been done for the propagation time and Energy consumption by dividing the deployed area as 4 grids and 8 grids and the results are depicted in Figures 5.5 and 5.6. Energy Consum ption(joules) Propagation Time(sec) Without Grid 4 Grid Figure 5.5 Propogation Time Vs Energy Consumption for 4-grid Energy Consum ption(joules) Propagation Time(sec) Without Grid 8 Grid Figure 5.6 Propogation Time Vs Energy Consumption for 8-grid

19 107 ECGMRR also shows a different trend from the grid based ECGMRR with regard to mobility. With Cluster-based Energy Conservation (CEC), more nodes survive under low mobility (600s pause time) and more nodes survive under high mobility (zero pause time). With grid EGRP, high mobility causes more frequent cluster formations and more overhead. With home agent EGRP, high mobility helps balance energy use, because changes in node location cause active node re-election within grids. In addition, ECGMRR is more efficient in predicting mobility due to its access to global location information. With the result, clearly observed that the time at which only 20% of the nodes remain alive against varying degrees of mobility. From this, it can be seen that grid ECGMRR extends the network operational lifetime almost two times longer than home agent ECGMRR, network operational lifetime increases with the pause time. As explained above, this is the effect of the adjustments of ECGMRR for high mobility. 5.7 SUMMARY The ECGMRR presented, is an energy-efficient geographic multicast routing, which utilized grid based geographic dissemination in wireless ad hoc networks. This mechanism is capable of measuring network mobility and network redundancy more accurately so that more energy can be conserved by minimizing subspace and initiating switch off the redundant node radio signal. ECGMRR determines redundant nodes and controls node duty cycle to extend network operational lifetime while maintaining network connectivity, independent of the involvement of ad hoc routing protocols. The rank based leader election introduced in multicast showed it to be self-stabilizing. The simulation process is carried for rank based multicast leader election which provides useful insights in group communication in case of varying topologies of the ad hoc network. ECGMRR substantially conserves energy (consumes 15% less energy than an unmodified ad hoc

20 108 routing protocol), allowing network operational lifetime to increase in proportion to node density. ECGMRR eliminates the dependency on location information node and its assumption about radio range. Grid ECGMRR measures local connectivity with low overhead and is thus able to dynamically adapt to a changing network. In addition to an analysis and simulation results, it has presented measurements from an experimental simulation. These results show that the proposed ECGMRR is effective with varying node mobility rate and maintaining the node energy levels for efficient multicast service provisioning.

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning Brad Karp Berkeley, CA bkarp@icsi.berkeley.edu DIMACS Pervasive Networking Workshop 2 May, 2 Motivating Examples Vast

More information

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing 309 Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing Sinchan Roychowdhury Instrumentation Control Engineering Calcutta Institute of Engineering & Management Kolkata, India

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION

CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 58 CHAPTER 4 SINGLE LAYER BLACK HOLE ATTACK DETECTION 4.1 INTRODUCTION TO SLBHAD The focus of this chapter is to detect and isolate Black Hole attack in the MANET (Khattak et al 2013). In order to do that,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Geographic Routing in Simulation: GPSR

Geographic Routing in Simulation: GPSR Geographic Routing in Simulation: GPSR Brad Karp UCL Computer Science CS M038/GZ06 23 rd January 2013 Context: Ad hoc Routing Early 90s: availability of off-the-shelf wireless network cards and laptops

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks

Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks Clustering Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks 1 Konda.Hari Krishna Ph.D -Research Scholar- Dept. of Computer Science & Engineering, Lingaya s Vidyapeeth University,

More information

Sleep Scheduling Technique for Geographic Routing in MANET

Sleep Scheduling Technique for Geographic Routing in MANET Sleep Scheduling Technique for Geographic Routing in MANET Asha L Nair 1, Dr S.Perumal Sankar 2 PG Student [WT], Dept. of ECE, TocH Institute of Science and Technology, Kochi, Kerala, India 1 Professor,

More information

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing Saumitra M. Das, Himabindu Pucha and Y. Charlie Hu School of Electrical and Computer Engineering Purdue University West

More information

Routing in Sensor Networks

Routing in Sensor Networks Routing in Sensor Networks Routing in Sensor Networks Large scale sensor networks will be deployed, and require richer inter-node communication In-network storage (DCS, GHT, DIM, DIFS) In-network processing

More information

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3.

Table of Contents. 1. Introduction. 2. Geographic Routing. 2.1 Routing Mechanisms. 2.2 Destination Location. 2.3 Location Inaccuracy. 3. Geographic Protocols in Sensor Networks Karim Seada, Ahmed Helmy Electrical Engineering Department, University of Southern California {seada, helmy}@usc.edu Table of Contents 1. Introduction 2. Geographic

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV Journal of Computer Science 8 (1): 13-17, 2012 ISSN 1549-3636 2011 Science Publications Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV 1 S. Deepa and 2 G.M. Kadhar

More information

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2 1 Nokia Research Center, Palo Alto 2 Computer and Information Science and Engineering Department, University of Florida, Gainesville

More information

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Reliable Routing In VANET Using Cross Layer Approach

Reliable Routing In VANET Using Cross Layer Approach Reliable Routing In VANET Using Cross Layer Approach 1 Mr. Bhagirath Patel, 2 Ms. Khushbu Shah 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 er.bhagirath@gmail.com,

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING

CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols

More information

CONCLUSIONS AND SCOPE FOR FUTURE WORK

CONCLUSIONS AND SCOPE FOR FUTURE WORK Introduction CONCLUSIONS AND SCOPE FOR FUTURE WORK 7.1 Conclusions... 154 7.2 Scope for Future Work... 157 7 1 Chapter 7 150 Department of Computer Science Conclusion and scope for future work In this

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Efficient Routing Algorithm for MANET using Grid FSR

Efficient Routing Algorithm for MANET using Grid FSR 2011 International Conference on Advancements in Information Technology With workshop of ICBMG 2011 IPCSIT vol.20 (2011) (2011) IACSIT Press, Singapore Efficient Routing Algorithm for MANET using Grid

More information

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

More information

Data Communication. Guaranteed Delivery Based on Memorization

Data Communication. Guaranteed Delivery Based on Memorization Data Communication Guaranteed Delivery Based on Memorization Motivation Many greedy routing schemes perform well in dense networks Greedy routing has a small communication overhead Desirable to run Greedy

More information

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013 Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Zonal Rumor Routing for. Wireless Sensor Networks

Zonal Rumor Routing for. Wireless Sensor Networks Tarun Banka Department of Electrical and Computer Engineering tarunb@engr.colostate.edu Zonal Rumor Routing for. Wireless Sensor Networks Gagan Tandon Department of Computer Science gagan@cs.colostate.edu

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

Simulations of the quadrilateral-based localization

Simulations of the quadrilateral-based localization Simulations of the quadrilateral-based localization Cluster success rate v.s. node degree. Each plot represents a simulation run. 9/15/05 Jie Gao CSE590-fall05 1 Random deployment Poisson distribution

More information

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks

Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks Vol. 5, No. 5, 214 Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for Heterogeneous Wireless Sensor Networks MOSTAFA BAGHOURI SAAD CHAKKOR ABDERRAHMANE HAJRAOUI Abstract Ameliorating

More information

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET

Integrated Resource Adaptive On Demand Geographic Routing (IRA-ODGR) for MANET IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 6, 2013 ISSN (online): 2321-0613 Integrated Demand (IRA-ODGR) for MANET M J.Kalaiselvi 1 K.Sathishkumar 2 1 M.E. Student,

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS. X.Xiang X.Wang Y.Yang

SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS. X.Xiang X.Wang Y.Yang SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS X.Xiang X.Wang Y.Yang Introduction Multicasting: an efficient way to realize group communications(one to many or many to many).

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo

Mobile and Sensor Systems. Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo Mobile and Sensor Systems Lecture 3: Infrastructure, Ad-hoc and Delay Tolerant Mobile Networks Dr Cecilia Mascolo In this lecture In this lecture we will describe the difference in infrastructure and ad

More information

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract: Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

More information

Networking Sensors, I

Networking Sensors, I Networking Sensors, I Sensing Networking Leonidas Guibas Stanford University Computation CS428 Networking Sensors Networking is a crucial capability for sensor networks -- networking allows: Placement

More information

Chapter 11 Chapter 6

Chapter 11 Chapter 6 Routing Protocols References H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 2005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network

Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network Fault Tolerant, Energy Saving Method for Reliable Information Propagation in Sensor Network P.S Patheja, Akhilesh Waoo & Parul Shrivastava Dept.of Computer Science and Engineering, B.I.S.T, Anand Nagar,

More information

References. Forwarding. Introduction...

References. Forwarding. Introduction... References Routing Protocols H. Karl and A. Willing. Protocols and Architectures for Wireless Sensor Networks. John Wiley & Sons, 005. (Chapter 11) K. Sohraby, D. Minoli, and T. Znati. Wireless Sensor

More information

Survey on Location Based Routing Protocols in MANET

Survey on Location Based Routing Protocols in MANET Survey on Location Based Routing Protocols in MANET Vivek Nikam, Prof. G.T. Chavan Sinhgad College of engineering, University of Pune Abstract- Due to the infrastructure less and dynamic nature of mobile

More information

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks Lynn Choi 1, Jae Kyun Jung 1, Byong-Ha Cho 1, and Hyohyun Choi 2 1 Korea University, Anam-Dong, Sungbuk-Ku, Seoul, Korea

More information