Reliable Mobile Ad Hoc P2P Data Sharing
|
|
- Tamsin Cross
- 5 years ago
- Views:
Transcription
1 Reliable Mobile Ad Hoc P2P Data Sharing Mee Young Sung 1, Jong Hyuk Lee 1, Jong-Seung Park 1, Seung Sik Choi 1, and Sungtek Kahng 2 1 Department of Computer Science & Engineering, University of Incheon {mysung, hyuki, jong, sschoi}@incheon.ac.kr 2 Department of Information & Telecommunication Engineering, University of Incheon s-kahng@incheon.ac.kr Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method for guaranteeing reliable P2P data sharing mainly deals with the problem of disconnection due to the sudden disappearance of one or more nodes involved in the active transmission route. The routing scheme of our system allows for reliable transmission of data via mobile devices. It does this using our reconnection mechanism that finds emergency routes in instances of abrupt disconnection using our scanning table and lookup table. The experiments lead us to conclude that our communication method is effective and assures reliable P2P data sharing over mobile ad hoc networks. In addition, our system allows for finding directly connectable devices at the overlay networks, therefore the application program can distinguish whether the target node is directly accessible or not with the aid of our scanning table. 1 Introduction Mobile ad hoc networks (MANETs) are envisioned to become key components in 4G (fourth-generation) wireless network architecture. MANETs inherit common characteristics found in most wireless networks, and add characteristics specific to ad hoc networking, such as wireless, ad-hoc-based, autonomous, infrastructureless, multihop routing, and mobility [1]. Peer-to-Peer (P2P) networks act independent from the underlying network infrastructure. The TCP/IP only provides a communication platform protocol and does not supply information about the location of requested content or participants. P2P nodes independently maintain P2P networks and show characteristics of a free infrastructure and decentralized network [2]. P2P as well as mobile ad hoc networks follow the same idea of creating a network without the help of central entities. A combination of both, produces synergies and creates new possibilities, but also poses several problems. The mobile ad hoc P2P paradigm attempts to create open and collaborative networks of a very diverse functionality and nature. Such functionality extends from the most popular data sharing protocols, like Gnutella, up to P2P instant messengers and chat applications, etc. However, regardless of its various applications, P2P P. Lorenz and P. Dini (Eds.): ICN 2005, LNCS 3421, pp , Springer-Verlag Berlin Heidelberg 2005
2 Reliable Mobile Ad Hoc P2P Data Sharing 773 networking always involves unstable transmission due to the mobility of some nodes which were engaged in the transmission. This means that P2P computing needs to assure stable data transmission until the successful termination of services. A mobile ad hoc P2P data sharing system autonomously connects a dynamically changing set of nodes to allow the discovery and transfer of information among them. Together, a mobile ad hoc P2P data sharing system exhibits common characteristics that come with having rapidly and unpredictably changing users and not set infrastructure. Moreover, mobile devices are constrained by battery energy and computation capabilities, and communicate via low bandwidth wireless links [3]. Therefore, it is important to guarantee the stable and efficient transmission of information even though some service nodes suddenly disappear because of the movement of users or power shortage of the battery. In this paper, we propose a reconnection mechanism for finding the emergency routes that guarantee reliable P2P data sharing over mobile ad hoc networks. By the term emergency route we define a new route which can substitute the broken route of the current service. The paper is organized as follows: In the following section we briefly present the related work. Subsequently, we describe our ongoing development of mobile ad hoc P2P data sharing system. In Section 4, we discuss our proposed routing scheme for mobile ad hoc P2P data sharing application. In Section 5, we describe our experimental setup and discuss the results obtained in terms of their reliability as well as the throughput (reconnection or transmission time). Finally, we conclude in the last section. 2 Related Work The primary objective of an ad hoc network routing protocol is the correct and efficient route establishment between a pair of nodes so that messages can be delivered reliably and in a timely manner. In general, ad hoc network routing protocols can be divided into two broad categories: proactive routing protocols and reactive on-demand routing protocols [4]. The most representative proactive protocol is DSDV (Destination-Sequenced Distance-Vector). The most representative reactive protocol is AODV (Ad-hoc on-demand Distance Vector). A P2P network structure can be classified in two ways: a centralized structure and a decentralized structure. A decentralized networking structure can in turn be classified again as structured or unstructured. The unstructured architecture does not manage any linkage information of peers and the locations of files until explicit requests are made. Peers update their networking information only when it is requested. The structured architecture always retains the information about a network whenever a node joins and leaves. An example of a structured type is Chord [5] and an example of an unstructured type is ORION (Optimized Routing Independent Overlay Network) [6]. ORION is a file discovery algorithm based on keyword searching. ORION combines application-layer query processing with the network layer process of route discovery. Chord is based on the DHT (Distributed Hash Table)
3 774 M.Y. Sung et al. algorithm which uses the distributed hash values of nodes and keys. Chord solves the problem of storing the lookup data in a decentralized manner. Note that ORION, Chord, and our work can be classified as reactive routing protocols. From a structuring point of view, our work can be classified as both structured and unstructured (The scanning table of our work is composed in structured manner and the lookup table of our work is composed in unstructured manner). 3 Mobile Ad Hoc P2P Data Sharing System Our mobile ad hoc P2P data sharing system allows users to share any information on files. What distinguishes our system from others is that it provides an automatic configuration of ad hoc networking modes without manual setting or execution of software by users. It also automatically generates the private IPs without any user intervention. Our system starts with the establishment of ESSID (Extended Service Set IDentifier). If one of the peers is started, any other peers with the same ESSID will be started and discover other mobile devices. Once peers are connected to each other, they share information about each other s routing tables and then update their own routing tables. Our system is implemented using the embedded Linux development kits. On the development kit, the embedded Linux kernel is installed and we used airo.o as a PCMCIA wireless LAN card, libiw.so.26 as our wireless network library, and Qt library ver.3.07 for user interfaces. Main components of our system are as follows: A Discovery Engine: It recognizes BSSID (Basic Service Set IDentifier) or ESSID (Extended Service Set IDentifier), translates the MAC addresses into IPs, and creates the scanning table and the lookup table which will be discussed in the following section. A Reconnection Engine: It is responsible for connection management and it provides the reestablishment of alternate routes or queries. A Transmission Engine (composed of a Packet Manager, a Control Socket, and a Data Socket): It takes charge of data transmission and it is implemented using Linux sockets. The Packet Manager controls the routing, and the actual file transmission is processed by Data Socket. A Management Module: It supports the QoS based data buffering for efficient data transmission. Presentation Module: It corresponds to the GUI (Graphical User Interface) part of the system and it is implemented using the Qt library. Any manipulation events entered through the GUI are processed by the Controller in Management module. 4 Routing Scheme Many routing mechanisms and communication protocols are studied in the field of mobile ad hoc networks [7], [8], [9]. In general, a mobile ad hoc P2P data sharing
4 Reliable Mobile Ad Hoc P2P Data Sharing 775 system consists of a search mechanism to transmit queries (lookup) and search results, and a transfer protocol to download files matching a query. Recent studies on mobile ad hoc P2P computing are mainly focused on the efficient search of nodes that store the desired data item. One of the pioneering works is Chord which aims for a good hit ratio. One other work is ORION, which searches mobile devices that hold target information whilst using the least bandwidth. Both discovery algorithms combine application layer query processing with the network layer process of route discovery. Our routing algorithm is composed of the following two mechanisms: An efficient discovery mechanism: This mechanism discovers the devices first and searches routing information for locating the target item. It is provided by our discovery engine which creates the routing table which is composed of a scanning table and a lookup table. Once the target is found, our reliable transmission algorithm starts to process. A reliable transfer mechanism: This takes charge of reliable communication thus guaranteeing the successful completion of requested services. It includes a reconnection engine in cases where a sudden disappearance of service nodes occurs because of the movement of users or a shortage of battery energy. Our reconnection engine is based on the combined usage of the following two reconnection algorithms: A dynamic-alternate algorithm: It tries to find an alternate route in searching the lookup table. The lookup table of our system is similar to the file routing table of ORION. However, our lookup table contains information about the final destination of the target item, while ORION only keeps information about the node who knows the location of the target item. Our dynamic-alternate algorithm allows for finding the alternate route which is directly accessible. A dynamic-recruiting algorithm: It first selects one other neighbor node from amongst the nodes on the scanning table (which holds the directly accessible nodes in the active transmission range of a peer) and it retries until it finds a new route for accessing the target item. Whenever a peer is connected to another neighbor node, their lookup tables will be updated by sharing each other s information. 4.1 Automatic Configuration of Ad Hoc Networks Our system allows for automatic configuration of ad hoc networks. Once a mobile device starts, the mode of each mobile device within an active transmission range has to be changed into the ad hoc mode and each device is set with the same ESSID (Extended Service Set IDentifier). Then the mobile device becomes accessible within the active ad hoc network. However, the application program cannot connect to mobile devices without IP addresses. Therefore, we need to provide a private IP for each mobile device. Our system automatically allocates private IPs to mobile devices in an active transmission range at the moment of initial ad hoc network configuration. Our algorithm is designed for overlay networks. It assumes that the target information is within two hops and constructs the routing table using a scanning table
5 776 M.Y. Sung et al. and a lookup table. The scanning table is constructed when the ad hoc network is initially configured and it contains mobile nodes which are directly connectable. It is possible to find directly connectable devices at the level of link layer using MANET routing algorithms such as AODV. However, the application program still needs to know the IPs for data transmission. Therefore, we build the scanning table containing directly accessible IPs and the corresponding flags at the overlay network level. We distinguish three values of flags: 0 means a node itself, 1 means the directly connectable node, and 2 means the node out of active area. Whenever a node appears within active transmission range, it can define its own flag. The node with flag 2 is not directly accessible. Only the nodes with flags 0 or 1 remain in the scanning table. Once node A starts to work, it broadcasts a message to discover its neighbors. If node A receives no answers, it takes an IP and sets its flag to 0. If node B comes in the active area of node A and broadcasts a message for discovering then it receives a response (the content of the scanning table) from node A. In this case, node B sets its IP, which is not the same as node A s IP and its flag to 0, and keeps the reply from node A. If node C enters the active area of node B which is not accessible from node A. Node C receives the content of the scanning table from node B and comes to know about the existence of nodes B and A. Node C sets its IP and its flag to 0 and sets node B s flag to 1 because it is accessible. As node C cannot receive any response from node A, it sets node A s flag to Scenarios of Discovery and Transmission To illustrate the operation of our discovery and transmission algorithm, we should consider the six-node scenario shown in Figure 1. Nodes are connected by an arrow and the rectangles near the nodes show parts of the lookup table. The large circle corresponds to the boundary of an active wireless transmission range. In Figure 1, node A can find 5 nodes (B~F) which are bound with the same ESSID. Once a connection is made between two nodes, they update their lookup tables by referencing the lookup table of the counter part. Fig. 1. Six-node Scenario Fig. 2. Scenario 1 Fig. 3. Scenario 2 Our routing table is composed of two parts: one is the scanning table and the other is the lookup table. The scanning table contains all of the mobile devices which are
6 Reliable Mobile Ad Hoc P2P Data Sharing 777 found through the scanning broadcasting at the link layer. The scanning broadcasting is implemented using libiw.so.26, which is a C-language library at the MAC layer of IEEE The lookup table is created at the application level and it contains pairs of the target item and the node which holds the target item. There are two types of transmission method. One is to get information in multiple parallel channels from many peers. Another is to get the information from only one peer. To get information in parallel is effective in wired networks. However, it is not desirable to use in wireless networks due to the lack of transmission capability of mobile nodes and the difficulties to allocate a large bandwidth for every channel. Therefore, we limit the number of peers that are connected at the same time to 10 peers and the number of peers transmitting data in parallel to 3. As mentioned before, our discovery and transmission algorithms assume that a connection between two nodes implies sharing and updating of each other s lookup tables. In Scenario 1 as shown in Figure 2, node A is connected to node B which is not connected to any node. Node A is downloading the target item from node B. In this situation, if node B is removed in the middle of transmission, node A has to try to connect to other nodes in the scanning table because there is no other information concerning the location of the target item in A s lookup table. Scenario 2 illustrated in Figure 3 corresponds to a situation where node A is connected to node B which is connected to another node C. Node A shares the lookup table of node B and already knows that C contains the target item. If node B disappeared in the middle of transmission, node A could directly connect to node C for downloading the target item. In Scenario 3 demonstrated in Figure 4, node A is connected to node B which is connected to many other nodes. Node A shares the lookup table of node B which includes information about the node that responded first to the lookup query. Assume that node E responded first in this example, and if node B is removed in the middle of transmission, node A can directly connect to node E for downloading the target item. Fig. 4. Scenario 3 Fig. 5. Scenarios 4 Scenario 4 presented in Figure 5 is similar to Scenario 3. Node A is connected to node B which is connected to many other nodes. Node A shares the lookup table of node B which includes information about the node that responded first to the lookup query for the target item. Assume that node F responded first. Node F is within the
7 778 M.Y. Sung et al. active transmission range of B, however it is out of the transmission range of A. In this situation, if node B disappeared in the middle of transmission, node A has to download the target item from the destination node (node F in this example) via the relay node B. 4.3 What Distinguishes Our Algorithm Although some features of our routing algorithm are similar to those of ORION, our algorithm distinguishes itself from ORION in the following ways: Our method for creating the routing table is different from that of ORION. ORION creates a response routing table (which contains routing information as well as lookup results), instead we separate the routing table into two parts: a scanning table and a lookup table. Processing lookup queries require more bandwidth than creating a simple routing table, therefore constructing the lookup table is more time consuming than constructing a scanning table for a direct connection and the lookup table for the location of items. In addition, our lookup table contains information about the final destination of the target item, while ORION only keeps the information of the relay node who knows the location of target item. Therefore, our dynamic-alternate algorithm allows for discovery and connection to a directly accessible emergency route. Our relaying method is also different. Our system provides direct connections to nodes as often as possible and tries to avoid connection to them indirectly. The efficiency of our system comes from the scanning table which contains directly accessible nodes. If the direct connection is not possible, the lookup table is searched for a relayed connection. 5 Experiments Using the real testbed based on our mobile ad hoc P2P data sharing system, we undertook some experiments for validating the effectiveness of our reconnection mechanism for assuring the successful accomplishment of the current service. We can make diverse scenarios of experiments according to the different numbers of intermediate nodes in the route for on-going transmission service. However, any scenario of experiments can be classified in the following two ways: The disappearance of a node in the current transmission route and the system knows the alternate route (for example, let each of A, B, C, and D correspond to a node in an ad hoc network, A wants D s information and A already knows two routes to reach D; the first one is from A to B then from B to D, and the second one is from A to C then from C to D, while communicating through the first route, B is removed and tries to reconnect to D). In this case, our system applies a dynamic-alternate algorithm for reconnection. The disappearance of a node in the current transmission route and the system does not know about the alternate route (for example, A wants C s information and A knows B and B knows C, while A communicating with C through B, B is
8 Reliable Mobile Ad Hoc P2P Data Sharing 779 removed and tries to reconnect to node C). In this case, our system uses a dynamic-recruiting algorithm. According to four diverse scenarios presented above, we calculated the reconnection time for the target information and the average transfer rate for downloading the target information. For the average transfer rate, we compared the performance of direct transmission (one-to-one, without relays) for mobile ad hoc P2P data sharing of a 1.5 Mbytes mp3 file and that of relayed transmission. We measured the throughput using the following formulas: SearchTime = ST, TransmissionTime = T TransmissionCapacity = TC TC Throughput = ST + T The experiment on the reconnection time showed that the time for reconnection increases in proportion to the number of shared files (in average, it takes 1.6 msec more per file). When measuring the performance of transmission, the average direct transfer rate (169 Kbytes/second) is approximately twice that of relayed transmission (83 Kbytes/second) as illustrated in Figure 6 (a) and Figure 6 (b). ª ª ª ª ª ª Fig. 6. Average Transfer Rates: (a) Average Transfer rate of direct transmission for downloading a 1.5Mbyte-mp3 file, (b) Average Transfer rate of relayed transmission for downloading a 1.5Mbyte-mp3 file 6 Conclusion We believe that the most important factor to consider when designing mobile ad hoc applications is to guarantee the completeness of services. Therefore, we developed a mobile P2P data sharing system which assures reliable and stable data transmission even though some service nodes suddenly disappear because of the movement of users or the shortage of power. Our system allows for configuring a MANET without intervention of users by allocating the IPs automatically. The routing scheme of our system selectively applies two reconnection methods; one is the dynamic-alternate algorithm and the other is the dynamic-recruiting algorithm, for finding emergency routes in the case of the abrupt disconnection. Our routing algorithm needs to create a
9 780 M.Y. Sung et al. scanning table (which contains the directly connectable nodes) as well as a lookup table (which contains the information about the location of target data) for augmenting reliability in data sharing services. Creating those tables requires some overheads, however it is necessary to eliminate unnecessary transmission relays. Through some experiments, we confirmed that our routing scheme for assuring reliable P2P data sharing over mobile ad hoc networks is effective. Acknowledgement. This work was supported by the Korea Science and Engineering Foundation (KOSEF) through the Multimedia Research Center at the University of Incheon. References 1. J.J.-N. Liu and I. Chlamtac, Mobile Ad hoc Networking with a View of 4G Wireless: Imperatives and Challeges, Mobile Ad Hoc Networking, Chapter 1, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Eds., Wiley, 2004, pp R. Schollmeier, I. Gruber, and F. Niethammer, Protocol for Peer-to-Peer Networking in Mobile Environments, Proceedings on the IEEE International Conference on Computer Communications and Networks (ICCCN) 2003, pp , A. Duran and C.C. Shen, Mobile Ad hoc P2P File Sharing, Proceedings on the IEEE Wireless Communications and Networking Conference (WCNC) 2004, vol.1., pp , E.M. Royer and C.-K. Toh, A Review of Current Routing Protocols for ad-hoc Mobile Wireless Networks, IEEE Personal Communications, April I. Stoica, R. Morris, D. Lieben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: a Scalable Peer-to-Peer Lookup Protocol for Inrternet Applications, IEEE/ACM Transactions on Networking, vol.11, No.1, pp.17-32, February A. Klemm, C. Lindemann, and O. Waldhorst, A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad hoc Networks, Proceedings on the Vehicular Technology Conference (VTC) 2003, vol.4, pp , October 6-9, G. Anastasi, M. Conti, and E. Gregori, IEEE Ad Ho Networks: Protocols, Performancem, and Open Issues, Mobile Ad Hoc Networking, Chapter 3, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Eds., Wiley, 2004, pp J.P. Macker and M. Scott Corson Mobile Ad Hoc Networks (MANETs): Routing Technology for Dynamic Wireless Networking, Mobile Ad Hoc Networking, Chapter 9, S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, Eds., Wiley, 2004, pp M. Conti, E. Gregori, and G. Turi, Towards Scalable P2P Computing for Mobile Ad Hoc Networks, Proceedings on the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 04), 2004.
Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs
Back-Up Chord: Chord Ring Recovery Protocol for P2P File Sharing over MANETs Hong-Jong Jeong, Dongkyun Kim, Jeomki Song, Byung-yeub Kim, and Jeong-Su Park Department of Computer Engineering, Kyungpook
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationAdaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks*
Adaptive Neighbor Selection for Service Discovery in Mobile Ad Hoc Networks* Eunyoung Kang 1, Yongsoon Im 2, and Ungmo Kim 1 1 School of Computer Engineering, Sungkyunkwan University, 440-776, Suwon, Gyeonggi-do,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA
More informationA Comparative Analysis of Pro-active Routing Protocols in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationAn Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments
An Enhanced Super-Peer System Considering Mobility and Energy in Mobile Environments Sun-Kyum Kim, Kwang-Jo Lee, Sung-Bong Yang Departement of Computer Science Yonsei University Repubilc of Korea {skyum,
More informationAn Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols in MP2P Networks
2015 Fifth International Conference on Advanced Computing & Communication Technologies An Analysis of the Overhead and Energy Consumption in Flooding, Random Walk and Gossip based Resource Discovery Protocols
More informationA Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks
A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationAnalysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group
More informationImpact of Hello Interval on Performance of AODV Protocol
Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationPerformance Analysis of Three Routing Protocols for Varying MANET Size
Proceedings of the International MultiConference of Engineers and Computer Scientists 8 Vol II IMECS 8, 9- March, 8, Hong Kong Performance Analysis of Three Routing Protocols for Varying MANET Size N Vetrivelan,
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationDesign and Implementation of a Simulator for Ad Hoc Network Routing Protocols
Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,
More informationImproving Performance in Ad hoc Networks through Location based Multi Hop Forwarding
Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer
More informationAPSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing
APSALAR: Ad hoc Protocol for Service-Aligned Location Aware Routing ABSTRACT Warren Kenny Distributed Systems Group Department of Computer Science Trinity College, Dublin, Ireland kennyw@cs.tcd.ie Current
More informationPerformance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla
More informationEarly Measurements of a Cluster-based Architecture for P2P Systems
Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationIMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS
IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationGateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario
Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,
More informationRelative Performance Analysis of Reactive (on-demand-driven) Routing Protocols
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationA Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks
A Simple Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks Chun-Su Park, You-Sun Kim, Kwang-Wook Lee, Seung-Kyun Kim, and Sung-Jea Ko Department of Electronics Engineering, Korea
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationHeuristic Clustering Algorithms in Ad hoc Networks
Heuristic Clustering Algorithms in Ad hoc Networks Artvin Çoruh University e-mail: nevin.aydin@gmail.com Volume 3 No 3 (2014) ISSN 2158-8708 (online) DOI 10.5195/emaj.2014.39 http://emaj.pitt.edu Abstract
More informationKeywords: AODV, MANET, WRP
Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationAppointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks
Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University
More informationEvaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network
Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector
More informationPerformance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols
www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan
More informationPerformance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive And Hybrid) Based On Type Of Data
ISSN (e): 2250 3005 Volume, 08 Issue, 4 April 2018 International Journal of Computational Engineering Research (IJCER) Performance Analysis Of Qos For Different MANET Routing Protocols (Reactive, Proactive
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationPERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network
Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationResearch on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous Vehicular Cloud
2016 International Conference on Service Science, Technology and Engineering (SSTE 2016) ISBN: 978-1-60595-351-9 Research on the Checkpoint Server Selection Strategy Based on the Mobile Prediction in Autonomous
More informationExploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks
Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationA Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network
ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer
More informationPerformance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator
Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The
More informationPerformance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks
Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi
More informationHybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet
* gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationA REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS
A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen
More informationMANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014
Throughput Analysis of Proactive and Reactive MANET Routing Protocols Kiranveer Kaur 1 Surinderjit Kaur 2 Vikramjit Singh 3 Department of Computer Science, University College of Engineering, Department
More informationQoS Based Evaluation of Multipath Routing Protocols in Manets
Advances in Networks 2017; 5(2): 47-53 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20170502.13 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) QoS Based Evaluation of Multipath Routing
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationPerformance Evaluation of AODV and DSR routing protocols in MANET
Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and
More informationPerformance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationP2P over Mobile Ad-hoc Networks
P2P over Mobile Ad-hoc Networks António Marques Instituto Superior Técnico/UTL, Portugal antoniomarques@ist.utl.pt October 30, 2009 Abstract Peer-to-peer (P2P) networks and mobile ad-hoc networks (MANET)
More informationStudy of Route Reconstruction Mechanism in DSDV Based Routing Protocols
Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,
More informationPerformance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols
Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.
More informationComputation of Multiple Node Disjoint Paths
Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes
More informationAvailable online at ScienceDirect. Procedia Computer Science 46 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 46 (2015 ) 1209 1215 International Conference on Information and Communication Technologies (ICICT 2014) Improving the
More informationAnalysis of Routing Protocols in MANETs
Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationAn Implementation of Cross Layer Approach to Improve TCP Performance in MANET
An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationLocal Recovery of Routes for Reliability using Backup Nodes in MANETs
Local Recovery of Routes for Reliability using Backup Nodes in MANETs Madhura Krishna R K 1, Megha T 2, Meghana M S 3, Dr. K Raghuveer (Professor and Head) 4 1,2,3,4 Dept. of Information Science and Engineering,The
More informationQoS for Energy Efficient Routing Protocols in Wireless Mobile Adhoc Network using Qualnet Simulator 6.1
Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet QoS
More informationA New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network
A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network Hemali Kotak 1, Hiteishi Diwanji 2 1 A.V.P.T.I. /Comp. Deptt, RAJKOT,INDIA Email: Hemali@yahoo.com 2 L.D. ENGG. College/Comp.
More informationShortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationPerformance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols
Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationA Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol
A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,
More informationBalanced Load Sharing Protocol for Wireless Sensor Networks
Balanced Load Sharing Protocol for Wireless Sensor Networks Maytham Safarª, Rabie Al-Mejbas b ªCollege of Engineering and Petroleum Kuwait University, Kuwait State ªE-mail: maytham@me.com, b mejbas@hotmail.com
More informationPerformance Analysis of OLSR and QoS Constraint OLSR in MANET
RESEARCH ARTICLE OPEN ACCESS Performance Analysis of OLSR and QoS Constraint OLSR in MANET Mohit Gambhir*, Sapna Gambhir** *Research Scholar, JamiaMilliaIslamia, Delhi **Associate Professor, YMCA University
More informationImproved Dominating Set Indices for Mobile Peer-to-Peer Networks
Improved Dominating Set Indices for Mobile Peer-to-Peer Networks Shanping Li, Wei Shi, Xin Lin, and Channa Nizamuddin College of Computer Science Zhejiang University Hangzhou, P.R.China 310027 shan@cs.zju.edu.cn,
More informationPerformance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV
MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationAn Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network
An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,
More informationPerformance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela
Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,
More informationIEEE s ESS Mesh Networking
IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE
More informationBuilding a low-latency, proximity-aware DHT-based P2P network
Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan
More informationEfficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks
Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,
More informationKeywords Minimum Spanning Tree, Mobile Adhoc Network (MANET), Multicast, Overhead, Scalability, Spanning Tree.
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Challenges
More informationA Novel Review on Routing Protocols in MANETs
Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract
More informationUAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks
UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,
More informationCross Layering in MANETs Design: The MobileMAN Approach
National Research Council - Pisa - Italy Cross Layering in MANETs Design: The MobileMAN Approach Marco Conti Italian National Research Council (CNR) IIT Institute Pisa, Italy marco.conti@iit.cnr.it Slide
More information