CiComm: A Communication Protocol to Facilitate Ad Hoc Context Resources and Services Discovery

Size: px
Start display at page:

Download "CiComm: A Communication Protocol to Facilitate Ad Hoc Context Resources and Services Discovery"

Transcription

1 CiComm: A Communication Protocol to Facilitate Ad Hoc Context Resources and Services Discovery Qi Liu and Nigel Linge Q.Liu@pgr.salford.ac.uk, N.Linge@salford.ac.uk Informatics Research Institute, University of Salford Abstract In this paper, a novel context communication protocol (CiComm) is presented in order for each device within an ad hoc network to exchange context information stored within a Context information Database (CiB). The CiComm separates the process of communication into two phases such that context attributes and service parameters can be advertised proactively and retrieved on demand. A platform containing both CiB and CiComm is constructed in the NS2 environment; the simulation results of a particular scenario are analysed demonstrating the functionality of the CiComm. The CiComm, working with/underneath the CiB module offers a new approach to the discovery of context information in an ad hoc network. Index Terms Context Awareness, Services Discovery Protocol, Mobile Ad Hoc Networks C I. INTRODUCTION ONTEXT awareness has been under development since 1990s and applied in computer science relevant research areas, e.g. Human Computing Interface (HCI), Guidance applications, Pervasive Network Computing [1 4], etc. Different approaches are presented to recognise and represent context information including profiles [3], structured tuples [5], web semantic languages such as XML, OWL and RDF [6], abstract ontology representation [7,8], etc. Ad hoc networks have identical characters to traditional wireless networks (e.g. infrastructure-less), and therefore require specific needs on context storage, maintenance and exchange; these include a generic definition and a common model for context information in each node of an ad hoc network, as well as a protocol for the communication between these nodes. In this paper, a Context Communication Protocol (CiComm) is introduced along with the context information base (CiB) module [7, 8] to construct a platform for managing and sharing of context information in an ad hoc network. The next section of this paper reviews related literature relevant to the proposed protocol. In section 3, the details of the CiComm protocol are discussed, followed by the experimental results produced using the simulation tool, NS2 [12] in section 4. A conclusion and areas of further work are presented at the end. A. Context information Base II. RELATED WORK Context information Base (CiB) is an information base designed for the containment and management of context information in Mobile Ad Hoc Networks (MANET). The concept of CiB was first presented in [7] where a CiB retrieves, maintains and provides both local context information and remote information obtained from its direct neighbours. The introduction of CiB aims to offer rich information to nodes in an ad hoc network such that more appropriate decisions can be made under certain circumstances. Figure 1 supposes that two nodes in an ad hoc network have the same applications loaded. Their behaviour will be exactly the same in response to a common event. However, based on their own CiB, these nodes can now make their own independent decisions depending upon the context in which they are operating. Applications CiB x Figure 1: Nodes with CiBs integrated [7]. CiB y Direct calls CiB-referred calls Ad Hoc Environment Within a CiB, a generic table is designed where context information is defined as parameters and organised using reference numbers. Equally, every context parameter is indexed using more than one digit separated by one or more dot marks, e.g. the parameter Time has the reference number 2.1. In this way, all context parameters will be unique from others and together form a hierarchical tree to make grouping and tracing the context information convenient. The single-table design, however, suffers from disadvantages with regard to the redundancy of the table, the size of ISBN: PGNet

2 transmitted context information, and the complexity of maintenance of the table. Two Tables are therefore designed in a refined CiB model, CiSchma and CiData [8]. The former is used to maintain the structure of the context information; while the latter is used to store particular values of the context information. The separation of values of context information from their syntax and relations reduces the seriousness of the weaknesses in the single-table design. The schemas of the two tables are shown in Table 1. TABLE I SCHEMAS OF CIDATA AND CISCHEMA Tables Fields Description CiSchema CiData Refno (PK) Name Syntax Refno (PK) Value Reference number of the context information; the primary key of the table; Name of the context information; Data type of the context information; Same as in CiSchema; Actual values of the context information; B. Services Discovery Architecture and Protocols The development of the Internet has motivated the progress of conventional network services, which now focus on the provision of shared resources from a server, involving identification (allocation of IP addresses in DHCP servers, for example), authentication, services, etc. Additionally, with the emergence of wireless networks, new network protocols, technologies and architectures on services discovery and provision have been introduced to concentrate on the relationship between services and clients, and on the process of services sharing. Jini Network Technology [9] is a representation of network technologies that provide an open network environment for creating distributed services and/or components based on JAVA and JVM environments. As one of the core services, Lookup Service is designed in the Jini technology as the registrar of other services. It gets the proxies from Jini service providers and stores them in an internal directory. When a client requires a particular service, it seeks it in all connected Lookup Services. The Lookup Service that maintains the registration of the service will reply to the client. The process of the Lookup Service is shown in the Figure 2. The service proxy (Marked as P ) in this figure represents an instance of a network service, which contains the service s attributes, its communication parameters, methods, etc. A Look-up Service is designed as a network service directory or a service proxy table, where service proxies of network services can be registered and categorised. Once a client finds the preferred service proxy in the Look-up Service, he/she downloads this proxy and communicates with the original service directly. 4 Network Service 1 P Network Client Look-up Service Figure 2: The work flow diagram of Jini Lookup Service (source: Jini [9]) A Distributed Service Discovery Protocol (DSDV) is proposed in [12] to simulate a service discovery architecture in an ad hoc network. Two phases are designed involving Backbone Management phase (BBM) and Distributed Service Discovery phase (DSD). In the BBM phase, some of the ad hoc network nodes are selected as backbone nodes which have responsibilities to maintenance of topology changes, relationship with other backbone nodes, as well as the management of a Neighbourhood information Table (NIT) and a routing table. The definition of backbone nodes designates directories for other nodes so they can register their services (as servers) or request services (as clients) during the DSD phase. Other network technologies or models for services provision being researched include an Agent Network for Bluetooth Devices (ANBD) system, which has been built, where services are regarded as the smallest entities within an ANBD framework [10]. E-government services are also adapted in an ad-hoc manner [11], through which three-tier views have been designed to separate the existing e-government services and adapt the ubiquitous government services. III. CICOMM: THE CONTEXT COMMUNICATION PROTOCOL A. Protocol Position and its Relationship to others The CiComm protocol provides a new approach to communication of context information between nodes in an ad hoc network. As shown in Figure 3, it resides in the upper data link layer providing interfaces to the CiB module and the Logic Link Control (LLC) layer only. P 3 1. Register services 2. Look-up services 3. Download proxy 4. Communication 2

3 Figure 3: position of CiB and CiComm and relation to other protocols B. Packet Format Every packet transmitted in CiComm can be divided into a packet header and packet body. The length of a packet header is fixed to 13 bytes; its structure is shown as Figure bytes IP LL CiB_src CiB_dst Flag Figure 4: Packet header of CiComm UPPER APP MAC PHY CiB CiComm Packet Body cctype bctype cftype bits CiB_src and CiB_dst are 6 bytes respectively; they are the source and destination address of the device which initially sends and receives CiComm packets. In the implementation of CiB and CiComm in NS2, MAC addresses are employed as appropriate CiB addresses; therefore both addresses, though they are in different packet headers, match to each other in certain cases. Yet, CiB addresses differ from MAC addresses. First of all, CiB addresses are the identifier of context which is integrated within ad-hoc network nodes, so any form of addressing schemes, as well as MAC addressing, can be manipulated. Furthermore, the CiB address of a particular packet does not always match to the MAC one. If a CiComm packet is forwarded, its MAC source address will be replaced with the intermediate node s, whereas the CiB source will be kept the same. Also, if context information of a neighbour in a node is distributed through UPGRADE packets, the MAC source address is taken from the node, while the CiB source address is from the neighbour. The Flag field is a byte to carry necessary attributes of a CiComm packet, shown in Table 2. Full functionalities of each type of packets will be discussed in the Operation section. - cctype: identify the frame type of CiComm packets set by 4 bits; - bctype: identify the beacon type of CiComm packets, i.e. the Beacon_HeartBeat and the Beacon_Request; - cftype: identify if a packet is directly sent by the original node, or forwarded through an intermediate node. Flag Type cctype bctype cftype C. Operations TABLE II FLAG OF CICOMM PACKETS Packets Type Hexadecimal Value BEACON 0x1000 SHARE 0x0001 REQUEST 0x0010 REPLY 0x0011 UPGRADE 0x0100 Beacon_Heart_Beat 0x01 Beacon_Request 0x10 Direct 0x01 Forward 0x10 The process of communication of context information using the CiComm protocol has two phases; the Deployment Phase and the Retrieval Phase. No strict dependencies are set on either of the phases; that is either of two phases can be started without the completion of the other one. However, partial completion of the Deployment Phase in a node can cause its neighbours to fail to retrieve values of the node because of insufficient provision of the context information. The, Beacon_RQ and SHARE packets are transmitted in the Deployment Phase. A has no packet body and is generated periodically (e.g. the interval is set to once per second in NS2). When a is received, the host checks if the transmitter has been recorded in the local CiB; a Beacon_RQ will be replied if it has not. Once a Beacon_RQ packet is received, a SHARE packet containing all local context information and those of registered neighbours will be sent. By the end of Deployment Phase, each node will receive its active neighbour s sharing information. The Retrieval Phase aims to get exact values of particular context information from specified nodes and to then distribute this to other nodes. A REQUEST packet is generated to acquire detailed context information. In NS2, this enquiry can be raised by a Tcl script, an upper application or a random code based on the content of the local CiB. A REPLY packet is then generated with the requested value. The reception of the REPLY packet will update the CiB and generate UPGRADE packets to the nodes other neighbours. Figure 5 depicts a scenario in which two nodes have their context information deployed, retrieved and upgraded by a third node. Although the nodes are started and prepared at different times, the timeout interval ensures neighbours can hear from the host in time so as to start the Deployment Phase. In the Retrieval Phase, node A s context is requested and its value is returned to node B. This information is not only recorded in the CiData and CiSchema of node B, but sent to the third node as well.

4 Preparation Timeout Interval :: B :: {B} DEPLOYMENT RETRIEVAL CiB A A Beacon_RQ SHARE ({B} 3.1.1) Beacon_RQ SHARE ({A} 1.1.1, ) REQUEST ({A} ) CiB B B Preparation Beacon_RQ SHARE ({B} 3.1.1) :: A :: {A} 1.1.1, rd Device Preparation :: B :: {B} REPLY ({A} :75) CiSchema Upgraded: 1.3.1:: A :: A :: {A} 1.1.1, :: 75 UPGRADE ({A} ) :: B :: {B} 3.1.1, {A} Figure 5: CiComm Packets and the process of communication D. Platform Construction in NS-2 The CiB and CiComm protocol are simulated using NS2 [12]. A schematic of mobile nodes in an ad hoc network environment with the CMU monarch s wireless extensions is shown in Figure 6, where the platform of CiB and CiComm (though it s shown as CiB only) is integrated. As the figure demonstrates, the platform offers its interface (cib_) to the Logic Link only; meanwhile it gets instances from the Mobile Node, the Logic Link and the Mac for the purposes of context collection and addressing resolution. The platform applies the full features of CiB and CiComm to NS2 involving the construction of CiB in each node and both Deployment and Retrieval phases of CiComm. Additionally, more configuration settings are performed by the platform for the better integration to the NS2 environment; these include construction of the CiComm packet header, registration of the CiComm packet type, and initial parameters in CiB and CiComm. IV. EXPERIMENT RESULTS AND ANALYSIS A. Randomness in CiB & CiComm Simulations To present a fair simulation pattern and prevent simulation results from certain circumstance settings, randomness is employed in CiB and CiComm simulations; it includes: - random position and movement of nodes The positions of all nodes are designated randomly within a given area. Their movements during the simulation time also follow no order and are unpredictable. - random CiB loading and releasing time

5 Upper Apps Routing Model Entry_ Mobile Node target_ mhost_ Logic ll CiB mac_ Link cib_ Upper Apps Routing Model Entry_ Mobile Node target_ mhost_ ll Logic CiB cib_ Link mac_ IFq mac_ mac_ IFq MAC NetIF The CiB in each node is loaded and stopped at a different time. This exposes the potential problem that later switched/joined nodes may find it difficult or unable to share and request context information. - random selection of local context information and requirement of remote context information This setting prevents simulations on narrow scenarios (e.g. same context information requested, etc.). Furthermore, choosing the local context information by chance reduces the complexity in the process of preparing distinct information for every single node. B. Particular Scenario Simulation Radio Propagation Model Figure 6: Implementation of CiB and CiComm in NS2 Channel In this section, a CiB-integrated ad hoc network is simulated where 11 nodes are randomly placed in a 20 X 20 metre area. All nodes have the same communication range of 10 metres. Ten of them (numbered 1 to 10) are static at their initial positions; while Node 0 ([17.22, 19.62]) acts as a visitor getting through the network to the specified destination ([1.59, 1.35]) with continuous requirement of its neighbours positions (reference number 3.1.1). Figure 7 depicts the movement of Node 0 and the consequence changes in its CiB. In (a), the initial topology of the network is shown. Curved circles are drawn to show nodes communication range. The dashed line with an arrow at the end illustrates the moving trace of Node 0 and its destination. Six critical points are selected from the simulation based on the movement of Node 0; the alteration of the network topology and content of CiSchema in Node 0 at these moments is shown in Figure 7 (b) and (c). MAC Radio Propagation NetIF Model (a) (6.3s) (7.1s) (10.2s)

6 (12.5s) (14.1s) (16.1s) (b) (6.3s) (10.2s) (7.1s) (12.5s) (14.1s) (16.1s) (c) Figure 7: Simulation on a particular scenario with one wandering node. (a) initial topology; (b) changes at critical points; (c) changes of CiSchema in Node 0 at critical points. Through these snapshots, the process of Deployment and Retrieval Phase, as well as the removal of context information in Node 0 is demonstrated. At 6.3s, 7.1s and 10.2s, Node 0 enters the range of Node 3, Node 8, and Node 9 and 10 respectively, so their relevant context information is added correspondingly. Then at the moment of 12.5s, Node 6 and 7 are out of the range of Node 0 and therefore removed from the CiSchema of Node 0. After that, at 14.1s and 161s, Node 8 and Node 5 are removed from Node 0 since it leaves from them respectively. The context of Node 0 has been updated with its movement and the consequent change of its neighbours. V. CONCLUSION In this paper, a context information communication (CiComm) protocol is presented realising context discovery/provision in a CiB-based ad hoc network. As a protocol located in the Logic Link Control Layer, the CiComm has a common packet header through which key attributes of a packet are identified, including the source and destination address at CiB level, the type of a packet, etc. Two processing phases, Deployment Phase and Retrieval Phase, are defined for the communication of context information. The CiComm provides similar functionalities to a service discovery protocol (e.g. Jini). Both protocols focus at the information/data processing and aim to adapt to changes within a dynamic networking environment. However, they are also contrasted with each other. Jini has an infrastructure supported architecture (Lookup Service) and therefore is centralised. The CiComm on the other hand is infrastructure-less and purely distributed. The CiComm protocol, together with the CiB model is implemented in the NS2 simulation environment. According to the simulation results, the platform of CiComm and CiB offers the abilities of maintaining, advertising and acquiring context information. The completion of the simulation and its results also proves that the CiComm can provide an alternative way to share context information. The performance of the platform in terms of its response times and consumption of network bandwidth will be measured and evaluated as the next task. REFERENCES [1] Dey A., Understanding and Using Context, Personal Ubiquitous Comput. Vol 5, Issue 1, pp 4-7, [2] Abowd, G., et. al., Cyberguide: A mobile context-aware tool guide, ACM Wireless Networks, Vol 3, Issue 5, pp , [3] Battazzi, D., et al, Context Aware Middleware Solutions for Anytime and Anywhere Emergency assistance to elderly people. Communications Magazine, IEEE,Vol 44, Issue 4, pp 82-90, [4] Anind K. Dey, Masayasu Futakawa, Daniel Salber, and Gregory D. Abowd. The Conference Assistant: Combining Context-Awareness with Wearable Computing. In Proceedings of the 3 rd International Symposium on Wearable Computers (ISWC '99), pages 21-28, San Francisco, CA, October [5] Julien, C. and Roman, G., EgoSpaces: Facilitating Rapid Development of Context Aware Mobile Applications, Software Engineering, IEEE, Transactions on, Vol 32, Issue 5, pp , [6] Gold, R. and C. Mascolo. Use of context-awareness in mobile peer-to-peer networks. in Distributed Computing Systems, FTDCS Proceedings. The Eighth IEEE Workshop on Future Trends of [7] Liu, Q. and Prof. Linge, N., Context-Driven Ad-Hoc Networks, doctoral consortium of the 12th international Conference on Natural Language Applications to Information Systems, [8] Liu, Q. and Prof. Linge, N., Context-Driven Ad-Hoc Networks, PGNET 2007, 8 th Postgraduate Symposium on the Convergence of Telecommunication, Networking and Broadcasting, June [9] Jini Network Technology, last access: 20 April [10] Chiu, D. K. W., et al., Towards Ubiquitous Government Services through Adaptations with Context and Views in a Three-Tier Architecture, in the System Sciences, HICSS th Annual Hawaii International Conference on, p94, [11] Yu, Z., et al., Supporting Context-Aware Media Recommendations for Smart Phones, Pervasive Computing, IEEE, Vol 5, Issue 3, pp68 75, [12] The Network Simulator 2, last access: 21 April 2008.

A novel platform for context maintenance and discovery in a ubiquitous environment

A novel platform for context maintenance and discovery in a ubiquitous environment A novel platform for context maintenance and discovery in a ubiquitous environment Liu, Q and Linge, N http://dx.doi.org/10.1109/euc.2008.100 Title Authors Type URL Published Date 2008 A novel platform

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks

SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks SIPCache: A Distributed SIP Location Service for Mobile Ad-Hoc Networks Simone Leggio Hugo Miranda Kimmo Raatikainen Luís Rodrigues University of Helsinki University of Lisbon August 16, 2006 Abstract

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Advanced Network Approaches for Wireless Environment

Advanced Network Approaches for Wireless Environment Advanced Network Approaches for Wireless Environment Branislav JARÁBEK Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovakia beejay@orangemail.sk

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

A deployment procedure for wireless sensor networks

A deployment procedure for wireless sensor networks A deployment procedure for wireless sensor networks Tzu-Che Huang, Hung-Ren Lai and Cheng-Hsien Ku Networks and Multimedia Institute, Institute for Information Industry tzuche@nmi.iii.org.tw Abstract Since

More information

Some Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols

Some Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols Inf. Sci. Lett. 2, No. 2, 69-75 (2013) 69 Information Sciences Letters An International Journal http://dx.doi.org/10.12785/isl/020204 Some Ad Hoc Network Characteristics Effects on the Performance On-Demand

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator

Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Analysis of Cluster based Routing Algorithms in Wireless Sensor Networks using NS2 simulator Ashika R. Naik Department of Electronics & Tele-communication, Goa College of Engineering (India) ABSTRACT Wireless

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Geospatial Information Service Based on Ad Hoc Network

Geospatial Information Service Based on Ad Hoc Network I. J. Communications, Network and System Sciences, 2009, 2, 91-168 Published Online May 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Geospatial Information Service Based on Ad Hoc Network Fuling

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Multi-Tier Mobile Ad Hoc Routing

Multi-Tier Mobile Ad Hoc Routing Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET

More information

Involving tourism domain experts in the development of context-aware mobile services

Involving tourism domain experts in the development of context-aware mobile services Involving tourism domain experts in the development of context-aware mobile services David Martín a, Diego López de Ipiña b, Carlos Lamsfus a and Aurkene Alzua a a Human Mobility and Technology CICtourGUNE

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

MANET With ADMEN SIMULATION

MANET With ADMEN SIMULATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

SIP-Based Multimedia Services Provision in Ad Hoc Networks

SIP-Based Multimedia Services Provision in Ad Hoc Networks SIP-Based Multimedia Services Provision in Ad Hoc Networks Y. Rebahi, D. Sisalem, U. Depirianto Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 31 10589 Berlin, Germany {rebahi, sisalem, depirianto}@fokus.fraunhofer.de

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS

A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS A STUDY ON AODV AND DSR MANET ROUTING PROTOCOLS M.KRISHNAMOORTHI 1 Research Scholar in PG and Research Department of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India Krishnasmk004@hotmail.com

More information

Performance of DSDV Protocol over Sensor Networks

Performance of DSDV Protocol over Sensor Networks Performance of DSDV Protocol over Sensor Networks Khushboo Tripathi, Tulika Agarwal and S. D. Dixit Department of Electronics and Communications University of Allahabad, Allahabad-211002, India Khushboo83@live.com

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

II. ROUTING CATEGORIES

II. ROUTING CATEGORIES ANALYSIS OF ROUTING PROTOCOLS IN MANETS DIVYA GHOSH Researcher,Kolkata,India Abstract: The study of routing protocols in MANETs is one that requires a great deal of research due to the challenges it poses

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm A New Approach for Energy Efficient in MANETs Using Multi Objective Genetic Algorithm Neha Agarwal, Neeraj Manglani Abstract Mobile ad hoc networks (MANET) are selfcreating networks They contain short

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS

EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN MULTICHANNEL MOBILE ADHOC NETWORKS EFFICIENT ROUTING AND CHANNEL ASSIGNMENT IN Bhurewal, Prof. Ms. Sujata G. Tuppad, Journal Impact Factor (215): 8.9958 (Calculated by GISI) MULTICHANNEL MOBILE ADHOC NETWORKS Mayur N. Bhurewal 1, Prof.

More information

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange

OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange OPAX - An Open Peer-to-Peer Architecture for XML Message Exchange Bernhard Schandl, University of Vienna bernhard.schandl@univie.ac.at Users wishing to find multimedia material about interesting events

More information

Adaptive Data Dissemination in Mobile ad-hoc Networks

Adaptive Data Dissemination in Mobile ad-hoc Networks Adaptive Data Dissemination in Mobile ad-hoc Networks Joos-Hendrik Böse, Frank Bregulla, Katharina Hahn, Manuel Scholz Freie Universität Berlin, Institute of Computer Science, Takustr. 9, 14195 Berlin

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks 2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack

Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Attack Performance Evaluation of Routing Protocols (AODV, DSDV and DSR) with Black Hole Rozy Rana 1, Kanwal Preet Singh 2 1 Department of Computer Engineering, Master of Engineering, UCOE, Punjabi University

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India

Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India Simulation based performance of AODV (Reactive) and DSDV (Proactive) routing protocol for MANET Ashish Srivastava Information Technology, Rajkiya Engineering College, Azamgarh, India Abstract Mobile Ad

More information

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime

Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime 247 Ad Hoc WLAN Throughput Improvement by Reduction of RTS Range Emilia Weyulua, Taro Iwabuchib, Misu Takeshic, Masaki Hanadad, Moo Wan Kime acde b Graduate School of Informatics, Tokyo University of Information

More information

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com

More information

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET

ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET : An Energy Saving Ad Hoc Routing Algorithm for MANET Utkarsh 1, Mukesh Mishra 2 and Suchismita Chinara 3 Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela,

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks

Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Performance Evaluation of Route Failure Detection in Mobile Ad Hoc Networks Dimitri Marandin 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung" 27.-28. July 2004 www.ifn.et.tu-dresden.de/tk/

More information

IP Paging Considered Unnecessary:

IP Paging Considered Unnecessary: IP Paging Considered Unnecessary: Mobile IPv6 and IP Paging for Dormant Mode Location Update in Macrocellular and Hotspot Networks James Kempf DoCoMo USA Communications Labs 181 Metro Drive, Suite 3 San

More information

Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages

Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Gateway Discovery Algorithm for Ad-Hoc Networks Using HELLO Messages Matthias Rosenschon a, Tilmann Mänz a, Joachim Habermann a, Veselin Rakocevic b a FH-Giessen-Friedberg, University of Applied Sciences,

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN

INTERNATIONAL JOURNAL OF SCIENTIFIC & ENGINEERING RESEARCH VOLUME 5, ISSUE 3, MARCH-2014 ISSN 657 Performance Evaluation of DDSR via NS- 3 Simulation using RSU s in Vehicular Network Abhay Deep Seth, Ankit Khare Abstract: - Mobile Ad hoc Networks (MANET) are wireless networks without an infrastructure,

More information

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique

Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Improved Performance of Mobile Adhoc Network through Efficient Broadcasting Technique Vijay J Parmar Department of Computer Engineering,Sarvajanic College of Engineering and Technology Surat, Gujrat (India),E-mail

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture

Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Study on Ontology-based Multi-technologies Supported Service-Oriented Architecture GaiHai Li a, Gang Huang

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols

Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);

More information

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Mobile host protocols support host

Mobile host protocols support host INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2000; 10:191 214 Location update and routing scheme for a mobile computing environment By Anna Hać Ł and Yujing Huang We present a new hierarchical

More information

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip.

A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc Network 1 Haseena M. K., 2 Annes Philip. www.ijecs.in International Journal Of Engineering And Computer Science ISSN:239-7242 Volume 4 Issue 7 July 205, Page No. 3422-3425 A Fast and Reliable Tree based Proactive Source Routing in Mobile Adhoc

More information

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET)

ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) ANT COLONY OPTIMIZED ROUTING FOR MOBILE ADHOC NETWORKS (MANET) DWEEPNA GARG 1 & PARTH GOHIL 2 1,2 Dept. Of Computer Science and Engineering, Babaria Institute of Technology, Varnama, Vadodara, India E-mail

More information

IEEE Assisted Network Layer Mobility Support

IEEE Assisted Network Layer Mobility Support IEEE802.21 Assisted Network Layer Mobility Support Qazi Bouland Mussabbir *, Wenbing Yao ** and John Cosmas *** *School Of Engineering and Design, Brunel University Uxbridge, London, UB83PH, UK, qazi.mussabbir@brunel.ac.uk

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information