Reliable Mobile Ad Hoc P2P Data Sharing

Size: px
Start display at page:

Download "Reliable Mobile Ad Hoc P2P Data Sharing"

Transcription

1 Reliable Mobile Ad Hoc P2P Data Sharing Mee Young Sung 1, Jong Hyuk Lee 1, Jong-Seung Park 1, Seung Sik Choi 1, and Sungtek Kahng 2 1 Department of Computer Science & Engineering, University of Incheon {mysung, hyuki, jong, sschoi}@incheon.ac.kr 2 Department of Information & Telecommunication Engineering, University of Incheon s-kahng@incheon.ac.kr Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method for guaranteeing reliable P2P data sharing mainly deals with the problem of disconnection due to the sudden disappearance of one or more nodes involved in the active transmission route. The routing scheme of our system allows for reliable transmission of data via mobile devices. It does this using our reconnection mechanism that finds emergency routes in instances of abrupt disconnection using our scanning table and lookup table. The experiments lead us to conclude that our communication method is effective and assures reliable P2P data sharing over mobile ad hoc networks. In addition, our system allows for finding directly connectable devices at the overlay networks, therefore the application program can distinguish whether the target node is directly accessible or not with the aid of our scanning table. 1 Introduction Mobile ad hoc networks (MANETs) are envisioned to become key components in 4G (fourth-generation) wireless network architecture. MANETs inherit common characteristics found in most wireless networks, and add characteristics specific to ad hoc networking, such as wireless, ad-hoc-based, autonomous, infrastructureless, multihop routing, and mobility [1]. Peer-to-Peer (P2P) networks act independent from the underlying network infrastructure. The TCP/IP only provides a communication platform protocol and does not supply information about the location of requested content or participants. P2P nodes independently maintain P2P networks and show characteristics of a free infrastructure and decentralized network [2]. P2P as well as mobile ad hoc networks follow the same idea of creating a network without the help of central entities. A combination of both, produces synergies and creates new possibilities, but also poses several problems. The mobile ad hoc P2P paradigm attempts to create open and collaborative networks of a very diverse functionality and nature. Such functionality extends from the most popular data sharing protocols, like Gnutella, up to P2P instant messengers and chat applications, etc. However, regardless of its various applications, P2P P. Lorenz and P. Dini (Eds.): ICN 2005, LNCS 3421, pp , Springer-Verlag Berlin Heidelberg 2005

2 Reliable Mobile Ad Hoc P2P Data Sharing 773 networking always involves unstable transmission due to the mobility of some nodes which were engaged in the transmission. This means that P2P computing needs to assure stable data transmission until the successful termination of services. A mobile ad hoc P2P data sharing system autonomously connects a dynamically changing set of nodes to allow the discovery and transfer of information among them. Together, a mobile ad hoc P2P data sharing system exhibits common characteristics that come with having rapidly and unpredictably changing users and not set infrastructure. Moreover, mobile devices are constrained by battery energy and computation capabilities, and communicate via low bandwidth wireless links [3]. Therefore, it is important to guarantee the stable and efficient transmission of information even though some service nodes suddenly disappear because of the movement of users or power shortage of the battery. In this paper, we propose a reconnection mechanism for finding the emergency routes that guarantee reliable P2P data sharing over mobile ad hoc networks. By the term emergency route we define a new route which can substitute the broken route of the current service. The paper is organized as follows: In the following section we briefly present the related work. Subsequently, we describe our ongoing development of mobile ad hoc P2P data sharing system. In Section 4, we discuss our proposed routing scheme for mobile ad hoc P2P data sharing application. In Section 5, we describe our experimental setup and discuss the results obtained in terms of their reliability as well as the throughput (reconnection or transmission time). Finally, we conclude in the last section. 2 Related Work The primary objective of an ad hoc network routing protocol is the correct and efficient route establishment between a pair of nodes so that messages can be delivered reliably and in a timely manner. In general, ad hoc network routing protocols can be divided into two broad categories: proactive routing protocols and reactive on-demand routing protocols [4]. The most representative proactive protocol is DSDV (Destination-Sequenced Distance-Vector). The most representative reactive protocol is AODV (Ad-hoc on-demand Distance Vector). A P2P network structure can be classified in two ways: a centralized structure and a decentralized structure. A decentralized networking structure can in turn be classified again as structured or unstructured. The unstructured architecture does not manage any linkage information of peers and the locations of files until explicit requests are made. Peers update their networking information only when it is requested. The structured architecture always retains the information about a network whenever a node joins and leaves. An example of a structured type is Chord [5] and an example of an unstructured type is ORION (Optimized Routing Independent Overlay Network) [6]. ORION is a file discovery algorithm based on keyword searching. ORION combines application-layer query processing with the network layer process of route discovery. Chord is based on the DHT (Distributed Hash Table)

3 774 M.Y. Sung et al. algorithm which uses the distributed hash values of nodes and keys. Chord solves the problem of storing the lookup data in a decentralized manner. Note that ORION, Chord, and our work can be classified as reactive routing protocols. From a structuring point of view, our work can be classified as both structured and unstructured (The scanning table of our work is composed in structured manner and the lookup table of our work is composed in unstructured manner). 3 Mobile Ad Hoc P2P Data Sharing System Our mobile ad hoc P2P data sharing system allows users to share any information on files. What distinguishes our system from others is that it provides an automatic configuration of ad hoc networking modes without manual setting or execution of software by users. It also automatically generates the private IPs without any user intervention. Our system starts with the establishment of ESSID (Extended Service Set IDentifier). If one of the peers is started, any other peers with the same ESSID will be started and discover other mobile devices. Once peers are connected to each other, they share information about each other s routing tables and then update their own routing tables. Our system is implemented using the embedded Linux development kits. On the development kit, the embedded Linux kernel is installed and we used airo.o as a PCMCIA wireless LAN card, libiw.so.26 as our wireless network library, and Qt library ver.3.07 for user interfaces. Main components of our system are as follows: A Discovery Engine: It recognizes BSSID (Basic Service Set IDentifier) or ESSID (Extended Service Set IDentifier), translates the MAC addresses into IPs, and creates the scanning table and the lookup table which will be discussed in the following section. A Reconnection Engine: It is responsible for connection management and it provides the reestablishment of alternate routes or queries. A Transmission Engine (composed of a Packet Manager, a Control Socket, and a Data Socket): It takes charge of data transmission and it is implemented using Linux sockets. The Packet Manager controls the routing, and the actual file transmission is processed by Data Socket. A Management Module: It supports the QoS based data buffering for efficient data transmission. Presentation Module: It corresponds to the GUI (Graphical User Interface) part of the system and it is implemented using the Qt library. Any manipulation events entered through the GUI are processed by the Controller in Management module. 4 Routing Scheme Many routing mechanisms and communication protocols are studied in the field of mobile ad hoc networks [7], [8], [9]. In general, a mobile ad hoc P2P data sharing

4 Reliable Mobile Ad Hoc P2P Data Sharing 775 system consists of a search mechanism to transmit queries (lookup) and search results, and a transfer protocol to download files matching a query. Recent studies on mobile ad hoc P2P computing are mainly focused on the efficient search of nodes that store the desired data item. One of the pioneering works is Chord which aims for a good hit ratio. One other work is ORION, which searches mobile devices that hold target information whilst using the least bandwidth. Both discovery algorithms combine application layer query processing with the network layer process of route discovery. Our routing algorithm is composed of the following two mechanisms: An efficient discovery mechanism: This mechanism discovers the devices first and searches routing information for locating the target item. It is provided by our discovery engine which creates the routing table which is composed of a scanning table and a lookup table. Once the target is found, our reliable transmission algorithm starts to process. A reliable transfer mechanism: This takes charge of reliable communication thus guaranteeing the successful completion of requested services. It includes a reconnection engine in cases where a sudden disappearance of service nodes occurs because of the movement of users or a shortage of battery energy. Our reconnection engine is based on the combined usage of the following two reconnection algorithms: A dynamic-alternate algorithm: It tries to find an alternate route in searching the lookup table. The lookup table of our system is similar to the file routing table of ORION. However, our lookup table contains information about the final destination of the target item, while ORION only keeps information about the node who knows the location of the target item. Our dynamic-alternate algorithm allows for finding the alternate route which is directly accessible. A dynamic-recruiting algorithm: It first selects one other neighbor node from amongst the nodes on the scanning table (which holds the directly accessible nodes in the active transmission range of a peer) and it retries until it finds a new route for accessing the target item. Whenever a peer is connected to another neighbor node, their lookup tables will be updated by sharing each other s information. 4.1 Automatic Configuration of Ad Hoc Networks Our system allows for automatic configuration of ad hoc networks. Once a mobile device starts, the mode of each mobile device within an active transmission range has to be changed into the ad hoc mode and each device is set with the same ESSID (Extended Service Set IDentifier). Then the mobile device becomes accessible within the active ad hoc network. However, the application program cannot connect to mobile devices without IP addresses. Therefore, we need to provide a private IP for each mobile device. Our system automatically allocates private IPs to mobile devices in an active transmission range at the moment of initial ad hoc network configuration. Our algorithm is designed for overlay networks. It assumes that the target information is within two hops and constructs the routing table using a scanning table

5 776 M.Y. Sung et al. and a lookup table. The scanning table is constructed when the ad hoc network is initially configured and it contains mobile nodes which are directly connectable. It is possible to find directly connectable devices at the level of link layer using MANET routing algorithms such as AODV. However, the application program still needs to know the IPs for data transmission. Therefore, we build the scanning table containing directly accessible IPs and the corresponding flags at the overlay network level. We distinguish three values of flags: 0 means a node itself, 1 means the directly connectable node, and 2 means the node out of active area. Whenever a node appears within active transmission range, it can define its own flag. The node with flag 2 is not directly accessible. Only the nodes with flags 0 or 1 remain in the scanning table. Once node A starts to work, it broadcasts a message to discover its neighbors. If node A receives no answers, it takes an IP and sets its flag to 0. If node B comes in the active area of node A and broadcasts a message for discovering then it receives a response (the content of the scanning table) from node A. In this case, node B sets its IP, which is not the same as node A s IP and its flag to 0, and keeps the reply from node A. If node C enters the active area of node B which is not accessible from node A. Node C receives the content of the scanning table from node B and comes to know about the existence of nodes B and A. Node C sets its IP and its flag to 0 and sets node B s flag to 1 because it is accessible. As node C cannot receive any response from node A, it sets node A s flag to Scenarios of Discovery and Transmission To illustrate the operation of our discovery and transmission algorithm, we should consider the six-node scenario shown in Figure 1. Nodes are connected by an arrow and the rectangles near the nodes show parts of the lookup table. The large circle corresponds to the boundary of an active wireless transmission range. In Figure 1, node A can find 5 nodes (B~F) which are bound with the same ESSID. Once a connection is made between two nodes, they update their lookup tables by referencing the lookup table of the counter part. Fig. 1. Six-node Scenario Fig. 2. Scenario 1 Fig. 3. Scenario 2 Our routing table is composed of two parts: one is the scanning table and the other is the lookup table. The scanning table contains all of the mobile devices which are

6 Reliable Mobile Ad Hoc P2P Data Sharing 777 found through the scanning broadcasting at the link layer. The scanning broadcasting is implemented using libiw.so.26, which is a C-language library at the MAC layer of IEEE The lookup table is created at the application level and it contains pairs of the target item and the node which holds the target item. There are two types of transmission method. One is to get information in multiple parallel channels from many peers. Another is to get the information from only one peer. To get information in parallel is effective in wired networks. However, it is not desirable to use in wireless networks due to the lack of transmission capability of mobile nodes and the difficulties to allocate a large bandwidth for every channel. Therefore, we limit the number of peers that are connected at the same time to 10 peers and the number of peers transmitting data in parallel to 3. As mentioned before, our discovery and transmission algorithms assume that a connection between two nodes implies sharing and updating of each other s lookup tables. In Scenario 1 as shown in Figure 2, node A is connected to node B which is not connected to any node. Node A is downloading the target item from node B. In this situation, if node B is removed in the middle of transmission, node A has to try to connect to other nodes in the scanning table because there is no other information concerning the location of the target item in A s lookup table. Scenario 2 illustrated in Figure 3 corresponds to a situation where node A is connected to node B which is connected to another node C. Node A shares the lookup table of node B and already knows that C contains the target item. If node B disappeared in the middle of transmission, node A could directly connect to node C for downloading the target item. In Scenario 3 demonstrated in Figure 4, node A is connected to node B which is connected to many other nodes. Node A shares the lookup table of node B which includes information about the node that responded first to the lookup query. Assume that node E responded first in this example, and if node B is removed in the middle of transmission, node A can directly connect to node E for downloading the target item. Fig. 4. Scenario 3 Fig. 5. Scenarios 4 Scenario 4 presented in Figure 5 is similar to Scenario 3. Node A is connected to node B which is connected to many other nodes. Node A shares the lookup table of node B which includes information about the node that responded first to the lookup query for the target item. Assume that node F responded first. Node F is within the

7 778 M.Y. Sung et al. active transmission range of B, however it is out of the transmission range of A. In this situation, if node B disappeared in the middle of transmission, node A has to download the target item from the destination node (node F in this example) via the relay node B. 4.3 What Distinguishes Our Algorithm Although some features of our routing algorithm are similar to those of ORION, our algorithm distinguishes itself from ORION in the following ways: Our method for creating the routing table is different from that of ORION. ORION creates a response routing table (which contains routing information as well as lookup results), instead we separate the routing table into two parts: a scanning table and a lookup table. Processing lookup queries require more bandwidth than creating a simple routing table, therefore constructing the lookup table is more time consuming than constructing a scanning table for a direct connection and the lookup table for the location of items. In addition, our lookup table contains information about the final destination of the target item, while ORION only keeps the information of the relay node who knows the location of target item. Therefore, our dynamic-alternate algorithm allows for discovery and connection to a directly accessible emergency route. Our relaying method is also different. Our system provides direct connections to nodes as often as possible and tries to avoid connection to them indirectly. The efficiency of our system comes from the scanning table which contains directly accessible nodes. If the direct connection is not possible, the lookup table is searched for a relayed connection. 5 Experiments Using the real testbed based on our mobile ad hoc P2P data sharing system, we undertook some experiments for validating the effectiveness of our reconnection mechanism for assuring the successful accomplishment of the current service. We can make diverse scenarios of experiments according to the different numbers of intermediate nodes in the route for on-going transmission service. However, any scenario of experiments can be classified in the following two ways: The disappearance of a node in the current transmission route and the system knows the alternate route (for example, let each of A, B, C, and D correspond to a node in an ad hoc network, A wants D s information and A already knows two routes to reach D; the first one is from A to B then from B to D, and the second one is from A to C then from C to D, while communicating through the first route, B is removed and tries to reconnect to D). In this case, our system applies a dynamic-alternate algorithm for reconnection. The disappearance of a node in the current transmission route and the system does not know about the alternate route (for example, A wants C s information and A knows B and B knows C, while A communicating with C through B, B is

8 Reliable Mobile Ad Hoc P2P Data Sharing 779 removed and tries to reconnect to node C). In this case, our system uses a dynamic-recruiting algorithm. According to four diverse scenarios presented above, we calculated the reconnection time for the target information and the average transfer rate for downloading the target information. For the average transfer rate, we compared the performance of direct transmission (one-to-one, without relays) for mobile ad hoc P2P data sharing of a 1.5 Mbytes mp3 file and that of relayed transmission. We measured the throughput using the following formulas: SearchTime = ST, TransmissionTime = T TransmissionCapacity = TC TC Throughput = ST + T The experiment on the reconnection time showed that the time for reconnection increases in proportion to the number of shared files (in average, it takes 1.6 msec more per file). When measuring the performance of transmission, the average direct transfer rate (169 Kbytes/second) is approximately twice that of relayed transmission (83 Kbytes/second) as illustrated in Figure 6 (a) and Figure 6 (b). ª ª ª ª ª ª Fig. 6. Average Transfer Rates: (a) Average Transfer rate of direct transmission for downloading a 1.5Mbyte-mp3 file, (b) Average Transfer rate of relayed transmission for downloading a 1.5Mbyte-mp3 file 6 Conclusion We believe that the most important factor to consider when designing mobile ad hoc applications is to guarantee the completeness of services. Therefore, we developed a mobile P2P data sharing system which assures reliable and stable data transmission even though some service nodes suddenly disappear because of the movement of users or the shortage of power. Our system allows for configuring a MANET without intervention of users by allocating the IPs automatically. The routing scheme of our system selectively applies two reconnection methods; one is the dynamic-alternate algorithm and the other is the dynamic-recruiting algorithm, for finding emergency routes in the case of the abrupt disconnection. Our routing algorithm needs to create a

9 780 M.Y. Sung et al. scanning table (which contains the directly connectable nodes) as well as a lookup table (which contains the information about the location of target data) for augmenting reliability in data sharing services. Creating those tables requires some overheads, however it is necessary to eliminate unnecessary transmission relays. Through some experiments, we confirmed that our routing scheme for assuring reliable P2P data sharing over mobile ad hoc networks is effective. Acknowledgement. This work was supported by the Korea Science and Engineering Foundation (KOSEF) through the Multimedia Research Center at the University of Incheon. References 1. J.J.-N. Liu and I. Chlamtac, Mobile Ad hoc Networking with a View of 4G Wireless: Imperatives and Challeges, Mobile Ad Hoc Networking, Chapter 1, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Eds., Wiley, 2004, pp R. Schollmeier, I. Gruber, and F. Niethammer, Protocol for Peer-to-Peer Networking in Mobile Environments, Proceedings on the IEEE International Conference on Computer Communications and Networks (ICCCN) 2003, pp , A. Duran and C.C. Shen, Mobile Ad hoc P2P File Sharing, Proceedings on the IEEE Wireless Communications and Networking Conference (WCNC) 2004, vol.1., pp , E.M. Royer and C.-K. Toh, A Review of Current Routing Protocols for ad-hoc Mobile Wireless Networks, IEEE Personal Communications, April I. Stoica, R. Morris, D. Lieben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: a Scalable Peer-to-Peer Lookup Protocol for Inrternet Applications, IEEE/ACM Transactions on Networking, vol.11, No.1, pp.17-32, February A. Klemm, C. Lindemann, and O. Waldhorst, A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad hoc Networks, Proceedings on the Vehicular Technology Conference (VTC) 2003, vol.4, pp , October 6-9, G. Anastasi, M. Conti, and E. Gregori, IEEE Ad Ho Networks: Protocols, Performancem, and Open Issues, Mobile Ad Hoc Networking, Chapter 3, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Eds., Wiley, 2004, pp J.P. Macker and M. Scott Corson Mobile Ad Hoc Networks (MANETs): Routing Technology for Dynamic Wireless Networking, Mobile Ad Hoc Networking, Chapter 9, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Eds., Wiley, 2004, pp M. Conti, E. Gregori, and G. Turi, Towards Scalable P2P Computing for Mobile Ad Hoc Networks, Proceedings on the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 04), 2004.

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs

Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks*

Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Eunyoung Kang 1, Yongsoon Im 2, and Ungmo Kim 1 1 School of Computer Engineering, Sungkyunkwan University, 440-776, Suwon, Gyeonggi-do,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments

An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments Sun-Kyum Kim, Kwang-Jo Lee, Sung-Bong Yang Departement of Computer Science Yonsei University Repubilc of Korea {skyum,

More information

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks

An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks 2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Performance Analysis of Three Routing Protocols for Varying MANET Size

Performance Analysis of Three Routing Protocols for Varying MANET Size Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

More information

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

More information

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing

APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

More information

Heuristic Clustering Algorithms in Ad hoc Networks

Heuristic Clustering Algorithms in Ad hoc Networks Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data

Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud

Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud 2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014 Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department

More information

QoS Based Evaluation of Multipath Routing Protocols in Manets

QoS Based Evaluation of Multipath Routing Protocols in Manets Advances in Networks 2017; 5(2): 47-53 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20170502.13 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) QoS Based Evaluation of Multipath Routing

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information

P2P over Mobile Ad-hoc Networks

P2P over Mobile Ad-hoc Networks P2P over Mobile Ad-hoc Networks António Marques Instituto Superior Técnico/UTL, Portugal antoniomarques@ist.utl.pt October 30, 2009 Abstract Peer-to-peer (P2P) networks and mobile ad-hoc networks (MANET)

More information

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Available online at ScienceDirect. Procedia Computer Science 46 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 46 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 1209 1215 International Conference on Information and Communication Technologies (ICICT 2014) Improving the

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Local Recovery of Routes for Reliability using Backup Nodes in MANETs

Local Recovery of Routes for Reliability using Backup Nodes in MANETs Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The

More information

QoS for Energy Efficient Routing Protocols in Wireless Mobile Adhoc Network using Qualnet Simulator 6.1

QoS for Energy Efficient Routing Protocols in Wireless Mobile Adhoc Network using Qualnet Simulator 6.1 Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet QoS

More information

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network Hemali Kotak 1, Hiteishi Diwanji 2 1 A.V.P.T.I. /Comp. Deptt, RAJKOT,INDIA Email: Hemali@yahoo.com 2 L.D. ENGG. College/Comp.

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Balanced Load Sharing Protocol for Wireless Sensor Networks

Balanced Load Sharing Protocol for Wireless Sensor Networks Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com

More information

Performance Analysis of OLSR and QoS Constraint OLSR in MANET

Performance Analysis of OLSR and QoS Constraint OLSR in MANET RESEARCH ARTICLE OPEN ACCESS Performance Analysis of OLSR and QoS Constraint OLSR in MANET Mohit Gambhir*, Sapna Gambhir** *Research Scholar, JamiaMilliaIslamia, Delhi **Associate Professor, YMCA University

More information

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks

Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Shanping Li, Wei Shi, Xin Lin, and Channa Nizamuddin College of Computer Science Zhejiang University Hangzhou, P.R.China 310027 shan@cs.zju.edu.cn,

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network

An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.

Keywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree. Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Challenges

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Cross Layering in MANETs Design: The MobileMAN Approach

Cross Layering in MANETs Design: The MobileMAN Approach National Research Council - Pisa - Italy Cross Layering in MANETs Design: The MobileMAN Approach Marco Conti Italian National Research Council (CNR) IIT Institute Pisa, Italy marco.conti@iit.cnr.it Slide

More information