Cooperative Caching Strategies for MANETs and IMANETs

Size: px
Start display at page:

Download "Cooperative Caching Strategies for MANETs and IMANETs"

Transcription

1 Cooperative Caching Strategies for MANETs and IMANETs Atul Rao, Prashant Kumar and Naveen Chauhan Department of Computer Science and Engineering National Institute of Technology, Hamirpur, India Abstract Caching in mobile computing environment is a capable technique that can improve data access performance and reduce the heavy communication between client and server. Cooperative caching allows sharing and coordination of cached data between mobile hosts. In this paper all the caching schemes for wired, Ad hoc and internet mobile Ad hoc network are discussed and compared in terms of cache resolution and cache replacement policy. Keywords: Cooperative caching, Internet-based mobile adhoc network, cache Introduction The term Mobile Adhoc Networks (MANETs) refers to a multi hop packet based wireless network composed of a set of mobile nodes that can communicate and move at the same time, without using any kind of fixed wired infrastructure. MANETs are actually self-organizing and adaptive networks that can be formed and deformed on-the-fly without the need of any centralized administration. The main two characteristics of MANETs are mobility and multi hop communication. MANETs usage areas: Military scenarios Sensor networks Rescue operations Students on campus Free Internet connection sharing Conferences With the recent advent in wireless technologies and mobile devices, wireless networks have become a ubiquitous communication infrastructure. In addition, growing interest in accessing the wired network or Internet has fueled the development of mobile wireless networks, which can be used in many realistic applications. It is envisaged that in the near future, users will be able to access the Internet services and information anytime and anywhere. Internet-based mobile Ad hoc networks (IMANETs) [3, 8] are an emerging technique that combines a wired network (e.g. Internet) and a mobile Ad hoc network (MANETs) for developing a ubiquitous communication infrastructure. Internet-based Mobile Ad hoc Networking is a technology that supports selforganizing, mobile networking infrastructures, and is one which appears well-suited for use in future commercial and military applications. Thus, to put the MANET technology into the context of real life, we consider an Internet-based MANET (IMANETs), which is an evolving communication infrastructure that combines the wired Internet and wireless mobile Ad hoc networks. IMANET is getting more attention and is applied to realistic Internet applications because of its flexible accessibility and information availability. The followings are some of the applicable uses for IMANETs: Case1: During events such as Olympic Games the demand from users to access the Internet and communicate among themselves are very high. While a fixed infrastructure may be in place, it is challenging to accommodate all the users due to limited wireless bandwidth. With an IMANET, users can either access the required information directly or indirectly (through relays). Case2: In a battle field or emergency site, one MT may be connected to the Internet by a satellite and serve as a proxy for other MTs. The accessed information and services can be shared by the other MTs via local Ad hoc communication. Figure 1: System Model for IMANET. Caching is an important technique to improve the performance of wireless or wired network. Aim of various caching schemes is to reduce the web traffic, congestion control, bandwidth management and data accessibility in internet and in IMANETs. The rest of paper is organized as follows. Section II describes the different cooperative schemes in wired and adhoc networks. Section III describes the comparison of various caching scheme and section IV gives [Page No. 89]

2 5 th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011] ISBN overview of IMANETs and available caching schemes. Section V concludes the paper. Cooperative Caching A number of data replication schemes and caching schemes have been proposed in order to facilitate data access in mobile Ad hoc networks (MANETs). Data replication studies the issue of allocating replicas of data items to meet access demands. These techniques normally require a priori knowledge of the network topology. Caching schemes however do not facilitate data access based on the knowledge of distributed data items. In Simple Cache the requested data item has always been cached by the requester node. The node uses the cached copy in order to serve subsequent requests when they arrive. The requester node has to get the data from the data center in case of cache miss. However increasing the hop distance between the requester node and caching node will increase the response time for the request. In the research area of mobile Ad hoc networks have been developed a number of caching protocols. Why Cooperative Caching? Caching of frequently accessed data in multi-hop adhoc environment is a potential technique that can improve the data access performance and availability. Cooperative caching allows the sharing and co-ordination of cached data among different clients and groups. Due to mobility and constraints on resources like bandwidth, computational resources and limited battery power in mobile adhoc networks, some cooperative cache management schemes need to be designed. Cooperative Caching in Wired Network: Squirrel Cache Squirrel is a decentralized peer-to-peer web cache [15]. It is scalable, self-organizing and resilient to peer failures. Without the need for additional hardware or administration it is able to achieve the functionality and the performance of a traditional centralized web cache. It is proposed to run in a corporate LAN type environment, located e.g. in a building, a single geographical region. Squirrel is build up on Pastry, an object location and routing protocol for large scale peer-to-peer systems, which provides the mentioned features. The goals and the motivation for web caching are decline of load on external web servers, corporate routers and of course external traffic (traffic between the corporate LAN and the internet) which is expensive, especially for large organizations. Squirrel is a possibility to achieve these goals without the use of a centralized web cache or even clusters of web caches. Squirrel uses Pastry as a location and routing protocol. When a client1 requests an object it first sends a request to the Squirrel proxy running on the client s machine. If the object is unreachable then the proxy forwards the request directly to the origin Web server. Otherwise it checks the local cache. If a fresh copy of the object is not found in this cache, then Squirrel tries to locate one on some other node. To do so, it uses the distributed hash-table and the routing functionalities provided by Pastry. First, the URL of the object is hashed to give a 128-bit Object Id from a circular list. Then the routing procedure of Pastry forwards the request to the node with the Node Id (assigned randomly by Pastry to a participating node) numerically closest to the Object Id. This node then becomes the home node for this object. Squirrel then proposes two schemes named: Home-store Directory schemes The home-store scheme is the one to be used in reality and approaches the performance of a centralized web cache with infinite storage while using e.g. 100 MB cache size per node. Disadvantages of Squirrel Cache: In decentralized caching churn arises from continued and rapid arrival and failure (or departure) of a large number of participants in a peer-to-peer system. This will increase host loads and block a large fraction of normal insert and lookup operations in the system. There is no cooperation between the mobile hosts or peers. Summary Cache In the summary cache scheme [5], each proxy stores a summary of its directory of cached document in every other proxy. When a user request misses in the local cache, the local proxy checks the stored summaries to see if the requested document might be stored in other proxies. If it appears so, the proxy sends out requests to the relevant proxies to fetch the document. Otherwise, the proxy sends the request directly to the Web server. The key to the scalability of the scheme is that summaries do not have to be up-to-date or accurate. A summary does not have to be updated every time the cache directory is changed; rather, the update can occur upon regular time intervals or when a certain percentage of the cached documents are not reflected in the summary. The sharing of caches among Web proxies is an important technique to reduce Web traffic and alleviate network bottlenecks A summary only needs to be inclusive (that is, depicting a superset of the documents stored in the cache) to avoid affecting the total cache hit ratio. That is, two kinds of errors are that may occur: False misses: The document requested is cached at some other proxy but its summary does not reflect the fact. In this case, a remote cache hit is not taken advantage of, and the total hit ratio within the collection of caches is reduced. False hits: The document requested is not cached at some other proxy but its summary indicates that it is. The proxy will send a query message to the other proxy, only to be notified that the document is not cached there. In this case,a query message is wasted. The errors affect the total cache hit ratio or the inter proxy traffic, but do not affect the correctness of the caching scheme. For example, a false hit does not result in the wrong document being served. In general we strive for low false misses, because false misses increase traffic to the Internet and the goal of cache sharing is to reduce traffic to the Internet. Two factors limit the scalability of summary cache: the network overhead (the interproxy traffic), and the memory required storing the summaries (for performance reasons, the summaries should be stored in DRAM, not on disk). The network overhead is determined by the frequency of summary [Page No. 90]

3 Cooperative Caching Strategies for MANETs and IMANETs updates and by the number of false hits and remote hits. The memory requirement is determined by the size of individual summaries and the number of cooperating proxies. Since the memory grows linearly with the number of proxies, it is important to keep the individual summaries small. In summary cache, cache sharing under finite cache sizes, a number of schemes are explored for the evaluation of summery cache. Different scheme are as under: No Cache Sharing. Simple Cache Sharing Single-Copy Cache Sharing Global Cache Two questions are answered whether simple cache sharing significantly reduces traffic to Web servers, and whether the more tightly coordinating schemes lead to a significantly higher hit ratio. Here the hit ratio includes both local hits and remote hits. Local hits are those requested documents found in the proxy s cache; remote hits are those documents found in the neighboring proxies cache. Both kinds of hit avoid traffic to web servers. Impact of update delays is also studied in the summary cache. Cooperative Proxy Caching: Mainly a cache is defined as a fast, temporary store for commonly used items. High speed memory units on microprocessor chips cache data from main memory; main memory units cache sections of disk files; and local disks cache documents from the network file server. Cooperating proxy caches [4] are groups of HTTP proxy servers that share cached objects. Client caching on the Web succeeds at the browser level (L1) and the local proxy level (L2) for the same reasons that memory and disk caches succeed; specifically Local disk and network transfers are faster than remote network transfers from the Web server Web documents are often re-requested by the same user or by other users on the same local network. At the next level of Web caching (L3), proxy servers cooperate to share their cached documents. If a cache miss occurs at the local proxy server, that proxy may forward the request to a remote proxy instead of to the origin Web server. However, the viability of cooperative proxy caching is unclear because, unlike browser and local proxy caches, a remote proxy is not inherently faster than the origin Web server. Retrieving objects from either a remote cache or a remote server involves wide-area network transfers, and there is no guarantee that the remote cache will have faster server hardware, higher bandwidth, or better routes to the client. When cache and server have similar resources and communication costs, cooperative proxy caching actually increases response time due to cache overhead. In cache hierarchies, L3 proxy caches are separate physical sites such as national caches. In cache meshes, the same site serves as a local L2 proxy cache to its clients and as a remote L3 proxy cache to its cooperative peers. Cooperating caches have three separate functions: Discovery Dissemination Delivery of cache objects Figure 3: Cooperating proxy caches organized as a mesh a hierarchy Discovery refers to how a proxy locates cached objects. Dissemination is the process of selecting and storing objects in the caches. Delivery defines how objects make their way from the Web server or a remote proxy cache to the requesting proxy. Cooperative Caching in MANETS Push and Pull Based Approach These two are the basic cache sharing techniques in MANET [1, 4]. With push-based cache sharing, when a node acquires and caches a new data, it actively advertises the caching event to the nodes in the neighborhood. Mobile nodes in the vicinity will record the caching information upon receiving such an advertisement and use it to direct subsequent requests for the same item. This scheme enhances the usefulness of the cached contents. The cost we have to pay is the communication overhead for the advertisement; an advertisement is useless if no demands for the cached item arise in the neighborhood. In the push-based scheme, the caching information known to a node may become obsolete due to node mobility or cache replacement. The pull-based approach may overcome this problem. Withpull based cache sharing, when a mobile node wants toaccess a data item that is not cached locally it will broadcast a request to the nodes in its vicinity. A nearby node that has cached the data will send a copy of the data to the request originator (a pull operation) unlike pushing; pulling allows the node to utilize the latest cache contents. Zone Based Cooperative Caching Scheme In Zone Cooperative caching scheme[1, 12], one hop neighbor of a mobile client form a cooperative cache zone since the cost for communication with them is low both in terms of energy consumption and message exchange. Zone cooperative caching scheme is for data retrieval in mobile Ad hoc networks. The design rationale of ZC caching is that it is considered advantageous for a client to share cache with its neighbors lying in the zone (i.e., mobile hosts that are accessible in one hop) Mobile hosts belonging to the zone of a given host then form a cooperative cache system for this host. In ZC caching Cache discovery is a problem. During Cache Discovery Process When a dataa request is initiated in an MH, it first looks for the data item in its own cache. If there is a local cache miss, the MH checks if the data item is cached in other MHs within its home zone. When an MH receives the [Page No. 91]

4 5 th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011] ISBN request and has the data item in its local cache (i.e., a zone cache hit), it will send a reply to the requester to acknowledge that it has the data item. In case of a zone cache miss, the request is forwarded to the neighbor along the routing path. If the data item is not found on the zones along the routing path (i.e., a remote cache miss), the request finally reaches the data source and the data source sends back the requested data. that the cache space can be used to accommodate more distinct data items. Authors categories cached data copies based on whether they are already available in the neighborhood or not. A data copy is primary if it is not available within the neighborhood. Otherwise the data copy is secondary. Cache misses the main factor for differentiating between primary and secondary data.cache miss cost is directly proportional to the travel distance of a data request. The inter-category and intra-category rules are used to decide caching priorities of primary and secondary data. Figure 2: Cache Discovery Process in ZC caching. COOP-A Cooperative Caching service in MANET It is a novel cooperative caching scheme for on-demand data access applications in MANETs. The objective is to improve data availability and access efficiency by getting together local resources of mobile nodes. The cooperation of caching nodes is twofold. First, a caching node can answer the data requests from other nodes. Second, a caching node stores the data not only on behalf of its own needs, but also based on other nodes needs. COOP addresses two basic problems for cooperative caching in MANETs: Cache resolution Cache Resolution addresses how to restore a data request with minimal cost of time, energy and bandwidth. COOP S cache resolution is a cocktail scheme, which consists of three basic schemes: Adaptive Flooding: It calculates proper flooding range based on the cost to fetch the requested data. Limited flooding is used for cache resolution, not only because it has potential to discover the closest cache around the requested, but also because flooding can serve as an announcement in the neighbourhood and effectively segment the whole network into the cluster, with in which they can share and manage cached contents. Profile Based Resolution: It maintains a historical profile of previously received data request and determines a closer data sources for user s request based on the profile. Roadside Resolution: If a data request cannot get resolved using these two schemes the data. Request is forwarded to the original data source. The Roadside Resolution is used to resolve the data request along the forwarding path. Cache management In COOP cache management scheme we have to decide which data item to keep in a node s local cache.the aim is to increase the cache hit ratio, which largely depends on the capacity of the cache. To enhance the capacity of cooperative caches, COOP tries to reduce duplicated caching within short distance neighborhood, such Limitations of Coop To improve data availability and access performance, COOP addresses two basic problems of cooperative caching. For cache resolution, COOP uses the cocktail approach which consists of two basic schemes: hop-by-hop resolution and zone-based resolution. By using this approach, COOP discovers data sources which have less communication cost. For cache management, COOP uses the inter- and intra- duplications between the category rules to minimize caching nodes within a same cooperation zone and this improves the overall capacity of cooperated caches. The disadvantage of the scheme is that flooding incurs high discovery overhead and it does not consider factors such as size and consistency during replacement. Semantic Caching: Semantic caching [6] is used to manage the location dependent data in mobile computing environment. Location dependent data (LDD) is the data whose value is determined by the location to which it is related. Examples include local yellow pages, traffic reports, weather information, and maps and so on. A location dependent query is a query that is processed on location dependent data, and whose result depends on the location criteria explicitly or implicitly specified. The idea of semantic caching is that the mobile client maintains both the semantic descriptions and associated answers of previous queries in the cache. If a new query is totally answerable from the cache, no communication with the server is necessary; if it can only be partially answered, the original query is trimmed and the trimmed part is sent to the server to be processed. Semantic caching is by nature an ideal cache scheme for location dependent applications due to the following reasons: Semantic caching is built on the semantic locality among queries, which just fits the LDD applications where much semantic rather than temporal or spatial locality is exhibited. Continuous LDD queries can be incrementally processed by semantic caching. With each successive request, a much smaller trimmed LDD query is processed at the server side and only the differences are transmitted over thewireless link. Semantic caching makes cache management more flexible. The cache can be managed based on temporal or location information. Semantic caching also facilitates disconnections even though the data at current location cannot be obtained, the mobile user might still be able to learn the information for other neighbour locations from the local cache. Semantic caching has been widely used in centralized systems, client-server environment, OLAF systems mobile [Page No. 92]

5 Cooperative Caching Strategies for MANETs and IMANETs computing and heterogeneous systems. The cache is composed of a set of items attached with the related Semantic descriptions, which are called semantic regions in, semantic segments in and so on. While logically the cache is always organized using an index which maintains the semantic as well as physical storage information for every cached item, there are various ways to physically store the data. The commonly used cache replacement strategies are built on temporal locality, such as LRU, MRU and CLOCK. Semantic cache organizes data by semantic metrics; it makes cache management more flexible. Other Caching Techniques Yin and Cao [13] propose three schemes: CachePath, CacheData and HybridCache. In CacheData, intermediate nodes cache the data to serve future requests instead of fetching data from the data center. In CachePath, mobile nodes cache the data path and use it to redirect future requests to the nearby node which has the data instead of the faraway data center. To further improve the performance [10, 11] a hybrid approach (HybridCache), is given by taking advantage of CacheData and CachePath while avoiding their weaknesses. A cooperative caching scheme, called CoCa, was proposed by C.Y.Chow [17]. The CoCa framework facilitate mobile nodes to share their cached contents with each other in order to reduce the number of server requests and the number of access misses in a single hop wireless mobile network. The authors extended CoCa with a group-based cooperative caching scheme, called GroCoCa [18]. According to GroCoCa, the decision of whether a data item should be cached depends on two factors: Access affinity on the data items and The mobility of each node. Papadopouli suggested the 7DS architecture [16] in which a couple of protocols are defined to share and disseminate information among users. It operates either on a prefetches mode, based on the information and user s future needs or on an on-demand mode, which searches for data items in a singlehop multicast basis. Hassan Artail proposed a caching scheme COACS [11] which stands for Cooperative and Adaptive Caching System. The idea is to create a cooperative caching system that minimizes delay and maximizes the likelihood of finding data that is cached in the Ad hoc network, all without inducing excessively large traffic at the nodes. COACS is a distributed caching scheme that relies on the indexing of cached queries to make the task of locating the desired database data more efficient and reliable. Comparison of Cooperative Caching Schemes Table 1 Schemes Cache Resolution Cache Replacement Summary Directory-Based LRU Squirrel Hash-Based LRU COOP Cock Tail Scheme Inter-category and intra category Rules Yin CacheData, LRU CachePath, HybridCache N.Chand ZC LUV Semantic No Specification Temporal locality such as LRU, MRU Cooperative Directory-Based No Specification Proxy Caching S.Lin Aggregate Two factors: 1.Distance 2.Access frequency Caching In IMANETs To combine MANETs with the wired network or Internet, we consider the Imanet infrastructure and come across the problem of information search and access under this environment. In IMANETs the routing protocols such as Destination Sequenced Distance Vector (DSDV), Dynamic Source Routing (DSR), Ad hoc On Demand Distance Vector (AODV), Zone Routing Protocol (ZRP), and Temporally Ordered Routing Algorithm (TORA) are explored. They are similar as in MANETs. These protocols based on the model that a sender MT knows the location of receiver MT based on the route information, which is accumulated and analyzed by a route discovery or route maintenance algorithms. A Route discovery operation captures the current network topology and related information. It has to be executed when an MT needs to transmit a data item. To avoid repetitive route discovery, the MTs can cache the old route information. Why Caching in IMANETs? IMANETs [3, 8] has several constraints. First, all the MTs cannot access the Internet. Second, due to mobility, a set of MTs can be separated from the rest of the MTs and get disconnected from the Internet. Finally, an MT requiring multi-hop relay to access the Internet may incur longer access latency than those which have direct access to the Internet. To address these constraints, an aggregate caching mechanism for IMANETs is proposed. The basic idea is that by storing data items in the local cache of the MTs, members of the IMANETs can efficiently access the required information. Thus, the aggregated local cache of the MTs can be considered as a unified large cache for the Imanet. The proposed aggregate cache can alleviate the constraints of IMANETs discussed above. When an MT is blocked from direct access to the Internet, it may access the requested data items from the local cache of nearby MTs or via relays. If an MT is isolated from the Internet, it can search other reachable MTs for the requested data item. Finally, if an MT is located further from the Internet, it may request the data items from [Page No. 93]

6 5 th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011] ISBN other close by MTs to reduce access latency. Here, two issues are addressed for implementation of an aggregate caching mechanism in IMANETs: Efficient search: An efficient information search algorithm is fundamental for locating the requested data in IMANETs. Cache management: To reduce the average access latency as well as enhance the data accessibility, efficient cache admission control and replacement policies are critical. The cache admission control policy determines whether a data item should be cached, while the cache replacement policy intelligently selects a victim data item to be replaced when a cache becomes full. Information search in IMANETs is different from the search engine based approach used in the wired Internet. An MT needs to broadcast its request to the possible data sources (including the Internet and other MTs within the Imanet) in order to retrieve the requested data efficiently. An aggregate cache for IMANETs is proposed to address the issues of accessibility and latency. Conclusion In this paper we have discussed cache sharing issues, schemes related to mobile Ad hoc network environment and give analysis of some popular cooperative caching schemes. These caching schemes are useful in MANETs environment. Here we present how these schemes are advantageous in order to find a data item in a MANETs by using less resources (e.g. network bandwidth, energy etc.) and improves the performance(data availability and latency time). We also discussed the limitations of these techniques. As the cooperative caching is a useful technique to improve the data availability in the MANETs so these analyses will be helpful for the future research. References [1] N.Chand, R.C.Joshi and Manoj Misra, Cooperative caching in mobile Ad hoc networks based on data utility,mobile Information Systems pp ,2007. [2] Yu Du and S.Gupta, COOP-A Cooperative Caching service in MANETs, Proceedings of the IEEE ICAS/ICNS (2005), pp.58-63, [3] S. Lim, W. Lee, G. Cao and C. Das, A Novel Caching Scheme for Internet based Mobile Ad hoc Network Performance, Ad hoc Networks, vol.4, no.2 pp ,2006. [4] S.G.Dykes and K.A.Robbines, A Viability of Cooperative Proxy Caching, IEEE INFOCOM,pp ,2001. [5] L.Fan, P. Cao, J. Almeida, and A. Z. Broder, Summary Cache: A Scalable Wide Area Web Cache Sharing Protocol, IEEE/ACM Transaction on Networking,vol 8,no3,June [6] Qun Renet, Using Semantic Caching to Manage Location Dependent Data in Mobile Computing, IEEE MOBOCOM, pp ,2000. [7] T.Hara Data Replication for Improving Data Accessibility in Ad hoc Networks, IEEE Transaction on Mobile Computing,vol 5 no11,pp ,Nov [8] D. Barbara and T. Imielinksi Sleepers and Workaholics: Caching Strategies for Mobile Environments. In Proc. ACM SIGMOD, pp1 12, [9] S. Lim, W. Lee, G. Cao, and C. R. Das. A Novel Caching Scheme for Internet based Mobile Ad hoc Networks.In Proc. 12th International Conference on Computer Communications and Networks (ICCCN), pp 38 43, [10] F.Sailhan and V. Issarny. Cooperative Caching in Ad hoc Networks,In Proc. 4th International Conference on Mobile Data Management (MDM), pp 13 28, [11] H.Artail, H.Safa, "COACS: A Cooperative and Adaptive Caching System for MANETs," IEEE Transactions On Mobile Computing, Vol. 7, no. 8, pp Aug [12] N.Chand, R.C.Joshi and M.Misra. Cooperative caching strategy in mobile Ad hoc networks based on clusters, Wireless Personal Communications, 43(1):41 63, [13] L. Yin and G. Cao Supporting cooperative caching in adhoc networks,ieee Transactions on Mobile Computing, 5(1):77 89, [14] B.Tang, "Benefit-Based Data Caching in Ad hoc Networks" IEEE Transaction on Mobile Computing, vol 7, no3, pp , March2008. [15] SitaramIyer, Antony Rowstron,and Peter Druschel. Squirrel: a decentralized peer-to-peer web cache,in PODC 02:Proceedings of the twenty-first annual symposium on Principles of distributed computing, pages ACM Press, [16] M.Papadopouli and H. Schulzrinne Effects of Power Conservation,WirelessConverage and Cooperation on Data Dissemination among Mobile Devices,In Proceedings of MobiHoc, pages , [17] C.Y. Chow, H.V. Leong and A Chan, Peer-to-Peer Cooperative Caching in Mobile Environments Proceedings of 24 th International Conference on Distributed Computing Systems Workshop pp ,2004 [18] Chi-Yin Chow, Hong Va Leong "GroCoca: Groupbased Peer-to-Peer Cooperative Caching in Mobile Environment", IEEE Journal On Selected Areas In Communications, Vol. 25, no. 1, January [Page No. 94]

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

A Review of Cooperative Cache Management in MANETs

A Review of Cooperative Cache Management in MANETs A Review of Cooperative Cache Management in MANETs Prashant Kumar prashantkumar32@gmail.com Techniques Naveen Chauhan naveen@nitham.ac.in Department of Computer Science and Engineering National Institute

More information

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME

PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME 44 PREDICTING NUMBER OF HOPS IN THE COOPERATION ZONE BASED ON ZONE BASED SCHEME Ibrahim Saidu a, *,Idawaty Ahmad a,b, Nor Asila Waty Abdul Hamid a,b and Mohammed waziri Yusuf b a Faculty of Computer Science

More information

Cross-Layer System for Cluster Based Data Access in MANET S

Cross-Layer System for Cluster Based Data Access in MANET S Cross-Layer System for Cluster Based Data Access in MANET S Anand Nayyar Department of Computer Applications & IT, KCL Institute of Management and Technology, Jalandhar E-mail : anand_nayyar@yahoo.co.in

More information

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks * Naveen Chauhan 1, Lalit K. Awasthi 1, Narottam Chand 1, R.C. Joshi 2 and Manoj Misra 2 1 Department of Computer Science and Engineering National

More information

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks

A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks Sunho Lim, Wang-Chien Lee, Guohong Cao, and Chita R. Das Department of Computer Science & Engineering The Pennsylvania State University

More information

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010 Energy Efficient Cooperative Caching in Mobile Ad Hoc Networks Naveen Chauhan 1, Lalit K. Awasthi 1, Narottam Chand 1, R.C. Joshi 2 and Manoj Misra 2 1 Department of Computer Science and Engineering, National

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks

Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks Exploiting Correlation Among Data Items for Cache Replacement in Ad-hoc Networks Noman Islam Center for Research in Ubiquitous Computing National University of Comp. and Emerging Sciences Karachi, Pakistan

More information

Hybrid Cooperative Caching in a Mobile Environment

Hybrid Cooperative Caching in a Mobile Environment Hybrid Cooperative Caching in a Mobile Environment Hong Va Leong 1, Chi-yin Chow 2 1 Department of Computing, The Hong Kong Polytechnic University Hong Kong cshleong@comp.polyu.edu.hk 2 Department of Computing

More information

WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS

WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS WEB CACHE BASED DATA ACCESS IN WIRELESS ADHOC NETWORKS A.PAVANI, Dr. R.V.KRISHNAIAH 1. II.M.TECH-CS, D R K I S T. 2. PRINCIPAL, D R K I S T. Keywords: Data Caching, MANET, Cooperative caching, cache consistency,

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS

A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS 1 LILLY SHEEBA S, 2 YOGESH P 1 Assistant Professor, Department of Information Technology, Anna University, Jerusalem College of Engineering,

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Cooperative caching in mobile ad hoc networks based on data utility

Cooperative caching in mobile ad hoc networks based on data utility Mobile Information Systems 3 (2007) 19 37 19 IOS Press Cooperative caching in mobile ad hoc networks based on data utility Narottam Chand a,, R.C. Joshi b and Manoj Misra b a Department of Computer Science

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s

A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet s International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW

ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW ANALYSIS OF DIFFERENT REACTIVE, PROACTIVE & HYBRID ROUTING PROTOCOLS: A REVIEW Kirandeep Kaur 1, Mr.Pawan Luthra 2, Er.Gagandeep 3 1 Department of Computer Science and Engineering, Shaheed Bhagat Singh

More information

Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks

Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks Mrs. K.Shanmugavadivu 1 and Dr M.Madheswaran 2 ¹ Professor / Department of MCA/ K.S.Rangasamy College of Technology

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Collaborative Caching Architecture for Continuous Query in Mobile Database

Collaborative Caching Architecture for Continuous Query in Mobile Database American Journal of Economics and Business Administration 3 (1): 33-39, 2011 ISSN 1945-5488 2010 Science Publications Collaborative Caching Architecture for Continuous Query in Mobile Database Mohamed

More information

Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching

Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching Implementation study of Hybrid caching scheme in Wireless P2P networks with Asymmetric Cooperative caching B.S.V.N.L.GAYATRI,Dr M.H.M. KRISHNA PRASAD Dept of Information Technology, UCEV JNTUK, Vizianagaram,

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

Caching Strategies in MANET Routing Protocols

Caching Strategies in MANET Routing Protocols International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Caching Strategies in MANET Routing Protocols Narinderjeet Kaur, Maninder Singh Punjabi university, Department

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

A Novel Review on Routing Protocols in MANETs

A Novel Review on Routing Protocols in MANETs Robinpreet Kaur & Mritunjay Kumar Rai Department of Electronics and Engineering, Lovely Professional University, Phagwara, Punjab, India E-mail : robin_turna@yahoo.com, raimritunjay@gmail.com Abstract

More information

Efficient Cache Consistency in Server-Based MANET with Cache Replication

Efficient Cache Consistency in Server-Based MANET with Cache Replication Efficient Cache Consistency in Server-Based MANET with Cache Replication J. Bibiana Jenifer 1, M. Manikandan 2 Student, Computer Science and Engineering, Adhiyamaan College of Engineering, Hosur, India

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

IJMIE Volume 2, Issue 6 ISSN:

IJMIE Volume 2, Issue 6 ISSN: Network Simulation Based Parametric Analysis of AODV Protocol for Wireless Mobile Ad-hoc Network Mr. Amol V. Zade* Prof. Vijaya K. Shandilya** Abstract: A major aspect of ad-hoc networks is that the nodes

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Packet Routing using Optimal Flooding Protocol in Cluster based MANET

Packet Routing using Optimal Flooding Protocol in Cluster based MANET IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes Chetana K. Kamate, Dr. Santosh L. Deshpande Department P.G. Studies in Computer Network and Engineering,

More information

A local area network that employs either a full mesh topology or partial mesh topology

A local area network that employs either a full mesh topology or partial mesh topology and Ad Hoc Networks Definition A local area network that employs either a full mesh topology or partial mesh topology Full mesh topology each node is connected directly to each of the others Partial mesh

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India

ABSTRACT I. INTRODUCTION. Rashmi Jatain Research Scholar, CSE Department, Maharishi Dayanand University, Rohtak, Haryana, India ABSTRACT International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISSN : 2456-3307 Review on Congestion Control in MANET

More information

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS COMPARITIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS Er. Upasana garg 1, Dr. Vikram Singh 2 1 Student, Computer Science and Application Deptt, CDLU, Sirsa, Haryana, India,upasna.garg44@gmail.com

More information

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery

Review paper on performance analysis of AODV, DSDV, OLSR on the basis of packet delivery IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 1 (May. - Jun. 2013), PP 51-55 Review paper on performance analysis of AODV, DSDV, OLSR on the basis

More information

Comprehensive Study and Review Various Routing Protocols in MANET

Comprehensive Study and Review Various Routing Protocols in MANET 126 Comprehensive Study and Review Various Routing Protocols in MANET Prabhjot Kaur 1, Preet Bala 2 M-Tech Student(CSE), GZS PTU CAMPUS, Bathinda Prabhjot6996@gmail.com Dr. Shaveta Rani, Dr. Paramjeet

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Arvind Krishnamurthy Fall 2003

Arvind Krishnamurthy Fall 2003 Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Comparative Study of Routing Protocols in MANET

Comparative Study of Routing Protocols in MANET Comparative Study of Routing Protocols in MANET First Author-PrernaYadav 1 Student,Second Author-ShubhraSaxena 2 Professor Abstract-An ad hoc network is basically a collection of wireless nodes not having

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Protocol Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

More information

A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS

A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS A ROBUST AND EFFICIENT DATA TRANSMISSION IN ADHOC NETWORKS 1 V.Narayanarao, M.tech student, Aitam college, Tekkali, India 2 Promod kumar sahu, Associate professor, Aitam college, Tekkali, India 1 narayanarao.mtech@gmail.com

More information