# Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 Routing Metric Designs for Greedy, Face and Combined-Greedy-Face Routing Yujun Li, Yaling Yang, and Xianliang Lu School of Computer Science and Engineering, University of Electronic Science and Technology of China, China Dept. of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, USA Abstract Different geographic routing protocols have different requirements on routing metric designs to ensure proper operation. Combining a wrong type of routing metric with a geographic routing protocol may produce unexpected results, such as geographic routing loops and unreachable nodes. In this paper, we propose a novel routing algebra system to investigate the compatibilities between routing metrics and three geographic routing protocols including greedy, face and combined-greedyface routing. Four important algebraic properties, respectively named odd symmetry, transitivity, source independence and local minimum freeness, are defined in this algebra system. Based on these algebraic properties, the necessary and sufficient conditions for loop-free and delivery guaranteed routing are derived when greedy, face and combined-greedy-face routing serve as packet forwarding schemes or as path discovery algorithms respectively. Our work provides essential criterions for evaluating and designing geographic routing protocols. Index Terms geographic routing, routing algebra, loopfreeness, delivery guarantee. I. INTRODUCTION Geographic routing, also called position-based routing, has received significant attention since it was originally proposed in [] [] in the 980s. Compared with topology-based routing [3] [7], geographic routing has two unique benefits, especially for large-scale, highly dynamic and energy-constraint wireless networks. First, in geographic routing, a forwarding node transmits a packet only based on the positions of the destination node and its one-hop neighbors. The size of routing tables and the overhead of routing control messages are minimal. Second, the convergence time for geographic routing can be neglected. This is very attractive for highly dynamic wireless networks since it is extremely difficult to design fast-convergent topology-based routing protocols. These two benefits coupled with the progress on Global Positioning System (GPS) and self-configuring localization mechanisms [8] [0] have promoted geographic routing as a promising solution for many wireless networks. The dominant design of geographic routing, which is also the focus of this paper, is Combined-Greedy-Face (CGF) routing, which is a combination of two routing schemes: greedy routing and face routing. Greedy routing tries to bring the message closer to the destination in each step using only local information. Thus, each node forwards the message to the neighbor that is most suitable from a local point of view. Face routing helps to recover from dead end situation, where greedy routing hits a void and cannot find a suitable neighbor to the destination. Various methods can be used to define the most suitable neighbor for greedy routing, the time to switch between greedy routing and face routing, and the faces to be traversed by face routing. These methods are named routing metrics in this paper. Besides location information, many performance-affecting characteristics have been taken into account in the design of routing metrics for CGF routing recently. The performance of wireless networks can improve a lot due to these more complicated routing metrics [] [4]. However, the design of routing metrics cannot be arbitrary due to potential incompatibility with CGF routing, which may greatly degrade network performance and even create routing loops. For example, it has been pointed out in [5] that a projected-distance-based routing metric can create routing loops between two intermediate connected nodes in CGF routing. Unfortunately, despite the potential serious impact of routing metric designs on greedy, face and CGF routing, systematic analysis of such impact is still lacking in the current literature. The goal of this paper, hence, is to fill in this void and present an in-depth analysis about greedy, face and CGF routing s compatibility constraints on the design of routing metrics. This paper will focus on two aspects of the compatibility: loop-freeness and delivery guarantee. Loop-freeness refers that a routing protocol should never create any forwarding loop in any network topology at its stable state, and a forwarding loop indicates that a packet will be endlessly forwarded among several nodes which form a circle until the packet will be forcedly dropped due to lifetime is expired. Delivery guarantee refers that a packet initiated from any source node must be relayed to its destination by a routing protocol as long as there does exist a path between the source and the destination. To realize this goal, this paper proposes a novel routing algebra for greedy, face and CGF routing analysis. Using this algebra, four important routing algebraic properties, including odd symmetry, transitivity, source independence and local minimum freeness, are identified. These algebraic properties determine the compatibility between routing metrics and greedy, face and CGF routing. The remainder of this paper is organized as follows. Section II briefly introduces greedy, face and CGF routing. Section III establishes network model and proposes a routing algebra. Section IV systematically analyzes the requirements for realizing compatibilities when greedy, face and CGF routing are used as packet forwarding schemes. If greedy, face and CGF routing are regarded as path discovery schemes, the requirements for realizing compatibilities when combined with source routing and hop-by-hop routing are discussed in section V and VI respectively. Section VII illustrates the application of our theoretical resluts. Section VIII concludes our work and discusses the future directions.

2 Fig.. Most Forward Face Routing Fig.. Baseline for MFF Routing II. OVERVIEW OF GREEDY, FACE AND CGF ROUTING In this section, we first briefly discuss the design of greedy, face and CGF routing, and then discuss their roles in a routing system. A. The Design of of Greedy, Face and CGF Routing At each relaying node, greedy routing selects the locally optimal next hop from a set of candidate neighboring nodes, in the hope that it can approximate global optimal path. Although greedy routing is simple, it does not provide delivery guarantee. Different from greedy routing, face routing itself can be delivery guaranteed in a planar graph constructed using various existing methods (see a survey in [6]). There are several different variants of face routing which mainly differ in the decision about when and which face to traverse next. Due to space limitation, we just discuss a simple face routing scheme in this paper. Others can be analyzed in a similar way. In this routing scheme, the best neighboring face to the destination will be the next to traverse after the current face is completely explored. We called this routing scheme as Most Forwarding Face (MFF) routing. The face switching process of MFF can be illustrated by the following example. Assume there is a flow f s,d that needs to be delivered in a wireless network G(V, E). The reduced planar graph from G(V, E) is illustrated as Fig.. As a complete routing scheme, MFF routing starts at node s, and ends at node d. The dashed line sd is the baseline which decides the faces to be traversed by MFF routing. Face f is the first intersected face by sd. There are 3 intersection points y, y and y 3 between sd and the edges of face f. According to the well-known right hand rule, MFF routing first traverses all the edges of face f in clockwise order su, u u,..., u 5 u 6 and u 6 s, and then finds y 3 is the best intersection point to the destination d based on a routing metric definition. Hence, f 4 becomes the next explored face by MFF routing, and u 3 u 8 is the first traversed edge in f 4. MFF routing is similar to compass routing II [7]. The only difference is that the baseline joining MFF routing s starting node and destination may not be a straight line segment. For instance, consider a wireless sensor network with a compromised zone as illustrated in Fig.. It is undesirable to route flows into the compromised zone. Hence, the solid curve is much better than the dashed straight line as a baseline for MFF routing, since the chance of passing nodes located in the compromised zone is much higher if the dashed straight line is used as a baseline. How to choose between all the possible baselines is the design issue of face routing s metrics. As a packet forwarding scheme, greedy routing is simple but provides no packet delivery guarantee. On the other hand, MFF routing provides packet delivery guarantee but is complicated and may create very inefficient paths. Hence, greedy routing and MFF routing often are combined together to form CGF routing where MFF routing is used as a recovery scheme for greedy routing and starts at dead ends for greedy routing. Note that MFF routing s routing metric may be different from greedy routing. B. The Roles of Greedy, Face and CGF Routing The compatibility between greedy, face and CGF routing schemes and routing metrics depends on how these geographic routing schemes are used in a routing system. There are two fundamentally different ways of applying these routing schemes. The first approach is to treat these routing schemes as packet forwarding schemes so that for every arriving packet, a relaying node locally decides and forwards the packet to this next-hop neighbor. The benefit of this approach is that a node does not need to keep any routing state regarding destinations or flows. On the other hand, since no routing state is kept in each node, techniques [8] that can shorten pure CGF routing s paths cannot be used. In the second approach, these geographic routing schemes can be used as on-demand route discovery mechanisms and be combined with different traditional packet forwarding schemes to form various routing systems. By maintaining a small amount of routing states, various techniques [8] can be used to optimize pure geographic routing paths. Two widely used packet forwarding schemes can be combined with geographic routing. The first scheme is source routing, where a source node caches paths discovered by geographic routing and includes path information in its packet headers. Intermediate nodes then relay the flow based on the path information carried in forwarded packets. The second scheme is hop-by-hop routing, where soft states about the next hop is set along the path discovered by geographic routing. A source node only appends the destination address of a flow in its packet headers, and an intermediate node relays the flow based on its local soft states about the next-hop to reach the destination node. For both packet forwarding schemes, while a small number of soft states of discovered paths have to be maintained in either source nodes or relaying nodes, the benefit of reduced per-packet computation and message overhead as well as the enabling of path optimization techniques can be significant. III. NETWORK MODEL AND ROUTING ALGEBRA Greedy, face and CGF routing schemes have different compatibility requirements on routing metric design and their requirements also depend on their roles in a routing system. In this section, we introduce our network model and a novel routing algebra. They will be used to systematically analyze these compatibility requirements in the remainder of this paper.

4 4 Fig. 3. Greedy Routing A. Greedy Routing s Compatibility Requirement Theorem : As a packet forwarding scheme, a greedy routing algorithm GR is loop-free if and only if the routing metric has two properties: odd symmetry and transitivity. We prove the sufficient conditions by contradiction. Assume that when a flow f s,d initiated by node s is routed to its destination node d by GR, a loop consisting of links u u, u u 3,..., u k u k and u k u (k ) is created in the packet forwarding process. Based on the principle of greedy routing, for flow f s,d, the weight of each link in the loop is strictly less than φ, i.e. w g (l u u, f s,d ) φ, w g (l u u, f 3 s,d ) φ,..., w g (l u k u, f k s,d ) φ and w g (l u k u, f s,d ) φ. Based on the transitivity property, we can conclude that w g (l u u, f k s,d ) φ is satisfied. Then, both w g (l u u, f k s,d ) φ and w g (l u k u, f s,d ) φ are satisfied, which contradicts the fact that the routing metric has the odd symmetry property. Hence, the loop cannot be created by greedy routing. We prove the necessary conditions by simple examples. If the routing metric does not have the odd symmetry property, a routing loop may be created between two relaying nodes by GR. Consider a simple network in Fig. 3, Due to the lack of the odd symmetry property, for a flow f s,d, both w g (l uv, f s,d ) φ and w g (l vu, f s,d ) φ are satisfied. In addition, uv and vu are respectively the lightest out-going links for nodes u and v based on this routing metric. According to greedy routing, once a packet of flow f s,d reaches node u, node u will send it to node v since uv is the local optimal and w g (l uv, f s,d ) φ. For the same reason, each packet of f s,d at node v will be immediately forwarded to node u. Hence, a routing loop is formed between nodes u and v for flow f s,d. If the routing metric has the odd symmetry property, but lacks the transitivity property, routing loops consisting multiple nodes can also be created by GR. Still considering Fig. 3, assume that the links satisfy the following inequalities: w g (l su, f s,d ) φ w g (l sv, f s,d ), w g (l uv, f s,d ) φ w g (l us, f s,d ) and w g (l vs, f s,d ) w g (l vw, f s,d ) φ w g (l vu, f s,d ). Obviously, the odd symmetry property is satisfied but there is a lack of the transitivity property. Hence, for flow f s,d, GR creates a routing loop comprised of nodes s, u and v. B. MFF Routing s Compatibility Requirement In order to discuss MFF routing with our algebra, we need formally define the baseline of MFF routing, and then build a relationship between the baseline and the corresponding algebra property. Definition 5: baseline: f s,d F, a directed curve sd from s to d is called a baseline if and only if it has the following property: for any two segments su and sv of sd (i.e. su, sv sd), w f (l sv, f s,d ) w f (l su, f s,d ) is satisfied if and only if su sv. Essentially, a baseline is a monotonically decreasing curve from node s to node d. Lemma : A baseline exists if and only if the routing metric has the local minimum free property. Sufficient condition: The gradient of routing metric w f ( ) essentially constructs a vector field in the plane. If the routing metric w f ( ) is local minimum free with a global minimum at d, for any node s in the plane, its field line can serve as the baseline to node d and is monotonically decreasing. Necessary condition: If the routing metric has a local minimum point y d for a flow f s,d, then there exists a disk around y such that for any node y in the disk, w f (l sy, f s,d ) w f (l sy, f s,d ). Hence, any directed curve that traverses y and goes to d cannot be monotonically decreasing in terms of w f ( ). To prove the sufficient condition for the delivery guarantee of MFF routing, we introduce the following lemma which has been proved in [6]. Lemma : Let f i be a face in a planar graph G(V, E) and let d be a node located in the interior of f i. There exists no path in G(V, E) which connects d with a node on the face boundary. In order to ensure loop-freeness and guaranteed delivery for MFF routing, the routing metric must have an algebra property described in the following theorem. Theorem : As a packet forwarding scheme, a MFF routing algorithm F R is loop-free and delivery guaranteed if and only if the routing metric has the local minimum free property. Consider that a flow f s,d initiated by node s is routed to its destination node d by F R in a planar graph G(V, E), and there exists a path from s to d in G(V, E). Assume F R starts to traverse a face f i from an edge e that intersects with sd at point t. It is obvious that there is a path from t to d since s has a path to both t and d. We next prove that F R can always find an edge that intersects sd in a point p t to switch to the next face after F R fully explores face f i. Note that based on the right hand rule, f i must contain a segment of td sd, which implies that sd traverses into face f i at point t. Suppose that td sd does not intersect f i s boundary at any other point. Then, d must be located in the interior of f i. By lemma, t and d cannot reach each other and, hence, contradicts the fact that there exists a path from t to d. Therefore, td must intersect with f i on other points besides t. Denote the lightest of these

7 7 w g (l v v, f s,d ) w g (l v u, f s,d ), w g (l, f wd s,d ) φ w g (l wv, f s,d ) w g (l wv, f s,d ). Hence, the path s uv v wd is discovered by the greedy routing algorithm for flow f s,d, while the path s uv v wd is discovered for flow f s,d due to the lack of source independence property. Assume flows f s,d and f s,d occur simultaneously. The route reply messages for f s,d and f s,d are respectively M sd and M sd. After setting up the routing table in node v as destination = d, next hop = w, M sd leaves for node v. At the same time, M sd sets up the routing table in node v as destination = d, next hop = w, and leaves for node v. After M sd reaches node v, the routing table in node v is renewed as destination = d, next hop = v. The same thing happens when M sd arrives at node v, and the routing table in node v is updated as destination = d, next hop = v. After the route discovery phases of these two flows are finished, a loop between nodes v and v is created for both f s,d and f s,d. Considering the complications of traffic flows, this case is possible to happen in real networks. Theorem 8: A greedy routing based forward building hopby-hop routing protocol GR is loop-free if and only if the routing metric has two properties: odd symmetry and transitivity. The proof for necessary condition is straightforward since without odd symmetry and transitivity, a loop may be created in the route discovery phase as illustrated in the proof of theorem. To prove that a loop cannot exist, we next show that any forwarding path created by nodes routing entries must be in the increasing order of these entries latest setup times. Take any routing entry E i,d in node u i as an example, where E i,d specifies node u i s next hop denoted as u i+, to destination d. Assume that the latest setup time of E i,d is t i and the latest setup time for u i+ s entry E i+,d is t i+. This implies that at t i, a route confirmation message M sxd caused by flow f sx,d visited u i and set up E i,d. Message M sxd then would be forwarded to the next hop u i+ and set the routing entry E i+,d at a time t i+. We always have t i+ > t i since a message M sxd itself cannot create a routing loop with the odd symmetry and transitivity properties. The latest setup time of E i+,d, possibly done by another confirmation message M syd caused by a different flow f sy,d, hence is lower bounded by t i+. Hence, we have t i+ t i+ > t i. Given a cycle of forwarding path u, u,..., u k, u, their corresponding forwarding entries latest set up times must satisfy t < t, t < t 3,..., t k < t k and t k < t. We can then desire the contradiction that t < t k and t > t k. Hence a cycle does not exist. Theorem 9: A MFF routing based backward building hopby-hop routing protocol F R may create routing loops even if the routing metric has local minimum free property. We prove it through a simple example. Consider the example in Fig. 5 which is a planar graph. Assume flows f s,d and f s,d occur simultaneously. The curves s d and s d are the baselines for MFF routing, and they are local minimum free with d as the global minimum point. The curve s d only intersects one face, i.e., the exterior face f 4. According to the right hand rule, the path s s u u u 3 d is discovered for flow f s,d. The curve s d intersects 3 faces, i.e., f, f and f 3. Based on the right hand rule, the simple path s s u 5 d is discovered for flow f s,d. Hence, the route reply message M sd to the source node s carries the path s s u u u 3 d, and the route reply message M sd to the source node s carries the path s s u 5 d. In the routing tables building process, consider the possibility that M sd arrives at node s and M sd reaches node s at the same time. Hence, the routing table in node s is set to destination = d, next hop = u and then M sd leaves for node s. At the same time, the routing table in node s is set to destination = d, next hop = u 5 and then M sd leaves for node s. Once M sd reaches node s, the routing table in node s is renewed as destination = d, next hop = s. The same thing happens when M sd arrives at node s, and the routing tables in node s is updated as destination = d, next hop = s. After the route discovery phase of these two flows finishes, a loop between nodes s and s is created for both f s,d and f s,d. Considering the complications of traffic flows, this case is possible to happen in real networks. Theorem 0: A MFF routing based forward building hopby-hop routing protocol F R is loop-free and packet delivery guaranteed if and only if the routing metric has the local minimum free property. Obviously, if the routing metric lacks the local minimum free property, a loop may be created or MFF routing will incorrectly end in route discovery phase. Hence, we only need to prove the sufficient condition. Based on the theorem, a path can be discovered by MFF routing F R between any two nodes in a wireless network if the routing metric has the local minimum free property. Furthermore, packet delivery guarantee can be proved in a similar way as the proof in theorem 8. In a similar discussion, we can draw the following conclusion. Theorem : A CGF routing based forward building hopby-hop routing protocol R is loop-free and packet delivery guaranteed if and only if the routing metric for its greedy routing algorithm GR has the odd symmetry and transitivity properties, and the routing metric for its MFF routing algorithm F R has the local minimum free property. VII. CASE STUDIES In this section, we show how to use our theoretical results to analyze routing metrics by using four routing metrics as examples. A. Most Forward within Radius (MFR) MFR metric is originally designed for greedy routing where a packet is forwarded to the closest node to the destination among all the neighbors of the forwarding node that are closer to the destination than the forwarding node [].

8 8 For MFR metric, the label of a link l uv is defined as l uv = (x u, y u ), (x v, y v ), where (x u, y u ) and (x v, y v ) are the geographic position of nodes u and v respectively. The w( ) function of MFR metric is defined as: w(l uv, f s,d ) = v, d u, d = (x v x d ) + (y v y d ) (x u x d ) + (y u y d ) () where v, d is the Euclidean distance between nodes v and d. The preference operator is the common less than or equal to ( ) operator for real numbers. The threshold φ for greedy routing is 0, i.e., it is only when w(l uv, f s,d ) < 0 is satisfied that a packet of f s,d can be relayed through link uv. The baseline for face routing is the straight line segment joining the MFF routing s starting node and the destination, which is local minimum free and the global minimal point is the destination. It is easy to know that MFR metric has odd symmetry, transitivity, source independence and local minimum freeness properties. Hence, we can conclude as follows: i: As packet forwarding schemes, greedy routing with MFR metric is loop-free. MFF routing and CGF routing with MFR metric are loop-free and packet delivery guaranteed. ii: Treating greedy routing as the path discovery algorithm, its combination with source routing and MRF metric is loopfree. MFF routing or CGF routing coupled with MFR metric and source routing is loop-free and packet delivery guaranteed. iii: Treating greedy routing as the path discovery algorithm, its combination with backward building hop-by-hop routing and MRF metric is loop-free. The combination of either MFF routing or CGF routing with MFR metric and backward building hop-by-hop forwarding scheme may create routing loops. iv: Treating greedy routing as the path discovery algorithm, its combination with forward building hop-by-hop routing and MRF metric is loop-free. The combination of either MFF routing or CGF routing with MFR metric and forward building hop-by-hop forwarding scheme is loop-free and packet delivery guaranteed. Same conclusions can be drawn for NFR [], GRS [4], GEAR [], the best P RR distance [] and NADV [3] metrics through similar analysis. B. Random Progress Forwarding (RPF) RPF metric is a greedy routing metric [5]. In RPF, a packet is forwarded to the neighbor who has the maximum positive projected progress on the straight line segment joining the forwarding node and the destination. In another word, the w( ) in RPF is: w(l uv, f s,d ) = u, v cos ud, uv ud, uv () = (x v x u ) + (y v y u ) cos ud, uv is the angle from the edge ud to uv, and the where is the operator in real numbers. The threshold φ for greedy routing is also 0. We can show that RPF metric lacks the odd symmetry property by Fig. 6. ' ' Greedy Routing Loop Based On RPF Metric Fig. 6 where both w(l uv, f s,d ) = u, v < 0 and w(l vu, f s,d ) = v, u < 0 are satisfied. However, RPF metric has the local minimum free property. For any two nodes, the straight line segment joining these two nodes has no local minimum and the destination node is the global minimum point based on RPF metric. Hence, we can conclude as follows: i: Either as packet forwarding schemes or as path discovery algorithms, greedy routing and CGF routing with RPF metric are not loop-free. That is to say, RPF is not a usable metric for greedy routing and CGF routing. ii: Either as a packet forward scheme or as a path discovery algorithm combined with source routing or forward building hop-by-hop routing, MFF routing with RPF metric is loopfree and packet delivery guaranteed. However, if combined with backward building hop-by-hop routing, MFF routing with RPF metric may create routing loops. C. Line Progress Forwarding (LPF) LPF metric is also based on the projected distance, however, other than RPF metric, it is a usable metric for greedy routing in some cases. The only difference between LPF and RPF is that, for LPF metric, it is the straight line segment joining the source and the destination where the progress is projected. Hence, the w( ) function of LPF metric is: w(l uv, f s,d ) = u, v cos sd, uv = (x v x u ) + (y v y u ) cos sd, uv (3) where sd, uv is the angle from the edge sd to uv. It is easy to know that LPF metric has odd symmetry, transitivity and the local minimum freeness properties, but lacks source independence property. Hence, we can conclude as follows: i: As packet forwarding schemes, greedy routing with LPF metric is loop-free, and both MFF routing and CGF routing with LPF metric are loop-free and packet delivery guaranteed. ii: As on-demand path discovery algorithms, greedy routing with LPF metric and source routing is loop-free, and both MFF routing and CGF routing with LPF metric and source routing are loop-free and packet delivery guaranteed. iii: As on-demand path discovery algorithms combined with backward building hop-by-hop routing, greedy routing, MFF routing and CGF routing may create routing loops when they are coupled with LPF metric. iv: As on-demand path discovery algorithms combined with forward-building hop-by-hop routing, greedy routing with LPF metric is loop-free, and both MFF routing and CGF routing with LPF metric are loop-free and packet delivery guaranteed.

### Void Traversal for Guaranteed Delivery in Geometric Routing

Void Traversal for Guaranteed Delivery in Geometric Routing Mikhail Nesterenko and Adnan Vora Computer Science Department Kent State University Kent, OH, 44242 mikhail@cs.kent.edu, avora@cs.kent.edu arxiv:0803.3632v

### An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

### ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing

ViTAMin: A Virtual Backbone Tree Algorithm for Minimal Energy Consumption in Wireless Sensor Network Routing Jaekwang Kim Department of Electrical and Computer Engineering, Sungkyunkwan University, Suwon,

### (INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

### 3D Wireless Sensor Networks: Challenges and Solutions

3D Wireless Sensor Networks: Challenges and Solutions Hongyi Wu Old Dominion University Ph.D., CSE, UB, 2002 This work is partially supported by NSF CNS-1018306 and CNS-1320931. 2D PLANE, 3D VOLUME, AND

### Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

### On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

### Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes

Energy Efficient Routing of Wireless Sensor Networks Using Virtual Backbone and life time Maximization of Nodes Umesh B.N 1, Dr G Vasanth 2 and Dr Siddaraju 3 1 Research Scholar, 2 Professor & Head, Dept

### A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks

A Survey on Geographic Routing Protocols for Mobile Ad hoc Networks Atekeh Maghsoudlou, Marc St-Hilaire, and Thomas Kunz Department of Systems and Computer Engineering Carleton University, Ottawa, ON,

### Replica Distribution Scheme for Location-Dependent Data in Vehicular Ad Hoc Networks using a Small Number of Fixed Nodes

Replica Distribution Scheme for Location-Dependent Data in Vehicular d Hoc Networks using a Small Number of Fixed Nodes Junichiro Okamoto and Susumu Ishihara Graduate School of Engineering, Shizuoka University,

### Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

### A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

### GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS. Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani

GATEWAY MULTIPOINT RELAYS AN MPR-BASED BROADCAST ALGORITHM FOR AD HOC NETWORKS Ou Liang, Y. Ahmet Şekercioğlu, Nallasamy Mani Centre for Telecommunication and Information Engineering Monash University,

### A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

### CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

### Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

### PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS

PERFORMANCE EVALUATION OF CONSUMED- ENERGY-TYPE-AWARE ROUTING (CETAR) FOR WIRELESS SENSOR NETWORKS Shinya Ito 1 and Kenji Yoshigoe 1 BeachHead, Inc., 37899 W. 1 Mile Rd, Suite 100 Farmington Hills, MI

### Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks

RESEARCH Open Access Efficient load balancing and QoS-based location aware service discovery protocol for vehicular ad hoc networks Kaouther Abrougui 1,2*, Azzedine Boukerche 1,2 and Hussam Ramadan 3 Abstract

### PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

### On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

### Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

### Overhead Analysis of Query Localization Optimization and Routing

Overhead Analysis of Query Localization Optimization and Routing Wenzheng Xu School of Inform. Sci. and Tech. Sun Yat-Sen University Guangzhou, China phmble@gmail.com Yongmin Zhang School of Inform. Sci.

### Energy aware geographic routing in wireless sensor networks with anchor nodes. Mircea Cretu Stancu Utrecht University Computing Science May 2013

Energy aware geographic routing in wireless sensor networks with anchor nodes Mircea Cretu Stancu Utrecht University Computing Science May 2013 Overview Introduction Current paradigm EAGR preliminaries

### A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR)

INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A COMPARITIVE STUDY ON COST AWARE SECURE ROUTING (CASER) PROTOCOL WITH SLEEP WAKE STATE ROUTING PROTOCOL (SWSR) R.Sudha

### Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain

Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University

### 6. Concluding Remarks

[8] K. J. Supowit, The relative neighborhood graph with an application to minimum spanning trees, Tech. Rept., Department of Computer Science, University of Illinois, Urbana-Champaign, August 1980, also

### The Geometry of Carpentry and Joinery

The Geometry of Carpentry and Joinery Pat Morin and Jason Morrison School of Computer Science, Carleton University, 115 Colonel By Drive Ottawa, Ontario, CANADA K1S 5B6 Abstract In this paper we propose

### Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

### Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding

Improving Performance in Ad hoc Networks through Location based Multi Hop Forwarding v.vallinayagi research scholar, manonmanium university tirunelveli-11 Dr.G.M.Nasira Assistant professor dept of computer

### Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks

Energy-Efficient Forwarding Strategies for Geographic Routing in Lossy Wireless Sensor Networks K. Seada, M.Zuniga, A. Helmy and B. Krishnamachari Department of Electrical Engineering University of Southern

### On Pairwise Connectivity of Wireless Multihop Networks

On Pairwise Connectivity of Wireless Multihop Networks Fangting Sun and Mark Shayman Department of Electrical and Computer Engineering University of Maryland, College Park, MD 2742 {ftsun, shayman}@eng.umd.edu

### On the Impact of Network Topology on Wireless Sensor Networks Performances - Illustration with Geographic Routing

On the Impact of Network Topology on Wireless Sensor Networks Performances - Illustration with Geographic Routing Tony Ducrocq, Michaël Hauspie, Nathalie Mitton To cite this version: Tony Ducrocq, Michaël

### CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

### Performance Analysis and Enhancement of Routing Protocol in Manet

Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

### Impact of Hello Interval on Performance of AODV Protocol

Impact of Hello Interval on Performance of AODV Nisha Bhanushali Priyanka Thakkar Prasanna Shete ABSTRACT The multi-hop ad hoc networks are self organizing networks with dynamic topology. The reactive

### M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks

M-Geocast: Robust and Energy-Efficient Geometric Routing for Mobile Sensor Networks Lynn Choi 1, Jae Kyun Jung 1, Byong-Ha Cho 1, and Hyohyun Choi 2 1 Korea University, Anam-Dong, Sungbuk-Ku, Seoul, Korea

### On Greedy Geographic Routing Algorithms in Sensing-Covered Networks

On Greedy Geographic Routing Algorithms in Sensing-Covered Networks Guoliang Xing; Chenyang Lu; Robert Pless Department of Computer Science and Engineering Washington University in St. Louis St. Louis,

### A QoS Based Routing Protocol for Wireless Sensor Networks

A QoS Based Routing Protocol for Wireless Sensor Networks Mirela Fonoage, Mihaela Cardei, and Arny Ambrose Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University

### Power Aware Routing using Power Control in Ad Hoc Networks

Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.

### Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks

Curve-based Planar Graph Routing with Guaranteed Delivery in Multihop Wireless Networks Hannes Frey Universität Paderborn Department of Computer Science Computer Networks Group Pohlweg 47-49, 33098 Paderborn,

### Algorithms for minimum m-connected k-tuple dominating set problem

Theoretical Computer Science 381 (2007) 241 247 www.elsevier.com/locate/tcs Algorithms for minimum m-connected k-tuple dominating set problem Weiping Shang a,c,, Pengjun Wan b, Frances Yao c, Xiaodong

### Internal node and shortcut based routing with guaranteed delivery in wireless networks

Internal node and shortcut based routing with guaranteed delivery in wireless networks Susanta Datta 1, Ivan Stojmenovic 1,2 and Jie Wu 3 1 SITE, University of Ottawa, Ottawa, Ontario K1N 6N5, Canada ivan@site.uottawa.ca

### Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector

### BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks

BIPAR: BImodal Power-Aware Routing Protocol For Wireless Sensor Networks Abstract HANY MORCOS IBRAHIM MATTA AZER BESTAVROS {hmorcos, matta, best}@cs.bu.edu Computer Science Department, Boston University

### Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

### A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Abstract Introduction

A Location-based Predictive Route Caching Scheme for Pure Reactive Zone-based Routing Protocol in Mobile Ad Hoc Networks Weibo Chen 1, Kun Yang 1 and Xueqi Cheng 2 1. University of Essex, School of Computer

### Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless Personal Area Networks

International Journal of Computer Applications (975 8887) Volume 55 No.1 October 1 Reducing Computation Complexity in Interference-aware Energy-efficient Geographical Routing for Low Rate Wireless ersonal

### An Exploration of Geographic Routing with k-hop Based Searching in Wireless Sensor Networks

An Exploration of Geographic Routing with k-hop Based Searching in Wireless Sensor Networks Chung Shue Chen, Yanjun Li, Ye-Qiong Song To cite this version: Chung Shue Chen, Yanjun Li, Ye-Qiong Song. An

### Data-Centric Query in Sensor Networks

Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1 Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed

### Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

### A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

### An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks Natarajan Meghanathan Jackson State University P. O. Box 18839, 1400 J. Lynch Street Jackson, MS 39217, USA ABSTRACT

### Monetary Cost and Energy Use Optimization in Divisible Load Processing

2004 Conference on Information Sciences and Systems, Princeton University, March 17 19, 2004 Monetary Cost and Energy Use Optimization in Divisible Load Processing Mequanint A. Moges, Leonardo A. Ramirez,

### Distributed Passive Routing Decisions in Mobile Ad-Hoc Networks

Distributed Passive Routing Decisions in Mobile Ad-Hoc Networks Primož Škraba Stanford, A 9435 Email: primoz@stanford.edu Hamid Aghajan Stanford, A 9435 Email: hamid@wsnl.stanford.edu Ahmad Bahai Stanford,

### Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

### Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

### An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

### Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,

### IN WIRELESS SENSOR NETWORKS

CONSTRUCTING K-CONNECTED M-DOMINATING SETS IN WIRELESS SENSOR NETWORKS Yiwei Wu, Feng Wang,MyT.Thai and Yingshu Li Department of Computer Science, Georgia State University, {wyw, yli}@cs.gsu.edu Department

### RECENT ADVANCES in wireless communications and

520 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 23, NO. 3, MARCH 2005 On the Interdependence of Distributed Topology Control and Geographical Routing in Ad Hoc and Sensor Networks Tommaso Melodia,

* gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

Routing in Ad-Hoc Networks Ramesh Patil Computer Science Department, University of Texas at Arlington Abstract In this paper, we deal with the basic concept of ad-hoc networks and the need for it. We present

### PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

### Keywords-IEEE , multiradio wireless mesh networks (mr-wmns), Routing, selfreconfigurable networks, wireless link failures.

Autonomous Reconfiguration for Wireless Mesh Network B.Sindhu*, V.Bharathi**,N.Karthikeyan*** Department of Electronics and Communication Engineering, Sri Manakula Vinayagar Engineering College, Madagadipet

### Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

### Optimizing Query Injection from Mobile Objects to Sensor Networks

Optimizing Query Injection from Mobile Objects to Sensor Networks Shourui Tian and Sol M. Shatz Department of Computer Science University of Illinois at Chicago Chicago, IL 60607 USA {stian,shatz}@cs.uic.edu

### A Survey on Path Weight Based routing Over Wireless Mesh Networks

A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi

### Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

### ROUTING is an important issue that affects wireless

1 Virtual-Coordinate-Based Delivery-Guaranteed Routing Protocol in Wireless Sensor Networks Ming-Jer Tsai, Hong-Yen Yang, Bing-Hong Liu, and Wen-Qian Huang Abstract In this paper, we first propose a method,,

### Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

### Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

### Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

### Expanding Ring Search for Route Discovery in LOADng Routing Protocol

Expanding Ring Search for Route Discovery in LOADng Routing Protocol Antonin Bas, Jiazi Yi, Thomas Clausen Laboratoire d Informatique (LIX) Ecole Polytechnique, France) antonin@antonin-bas.fr, jiazi@jiaziyi.com,

### AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

### The Impact of Clustering on the Average Path Length in Wireless Sensor Networks

The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia

### Delay Efficient Data Gathering in Sensor Networks

Delay Efficient Data Gathering in Sensor Networks Xianjin Zhu, Bin Tang, and Himanshu Gupta Department of Computer Science, State University of New York at Stony Brook, Stony Brook, NY 11794 {xjzhu, bintang,

### AODV Multipath Extension using Source Route Lists with Optimized Route Establishment

INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,

### Connectivity Improvement for Inter-Domain Routing in MANETs

The 2010 Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track Connectivity Improvement for Inter-Domain Routing in MANETs You Lu *#, Biao Zhou &#, Ian

### Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

### TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

### ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

### Some Ad Hoc Network Characteristics Effects on the Performance of On-Demand Routing Protocols

Inf. Sci. Lett. 2, No. 2, 69-75 (2013) 69 Information Sciences Letters An International Journal http://dx.doi.org/10.12785/isl/020204 Some Ad Hoc Network Characteristics Effects on the Performance On-Demand

### Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

### EULER S FORMULA AND THE FIVE COLOR THEOREM

EULER S FORMULA AND THE FIVE COLOR THEOREM MIN JAE SONG Abstract. In this paper, we will define the necessary concepts to formulate map coloring problems. Then, we will prove Euler s formula and apply

### IN recent years, the amount of traffic has rapidly increased

, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

### 4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009 Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks Nianjun Zhou, Member, IEEE, Alhussein

### An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks

2009 Third International Conference on Sensor Technologies and Applications An Enhanced Cross-Layer Protocol for Energy Efficiency in Wireless Sensor Networks Jaehyun Kim Dept. of Electrical & Electronic

Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy

### ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 19-24 ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN 1 R. MANIKANDAN, 2 K. ARULMANI AND 3 K. SELVAKUMAR Department of Computer Science and Engineering,

### Energy-efficient Data Dissemination in Wireless Sensor Networks

Energy-efficient Data Dissemination in Wireless Sensor Networks Ji-Han Jiang 1 Kuo-Hua Kao 2 Singing ee 2 1 Department of Computer Science and Information Engineering National Formosa University, Yun-in,

### A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

### ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management

### Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

### The Maximum Throughput of A Wireless Multi-Hop Path

The Maximum Throughput of A Wireless Multi-Hop Path Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia Email: guoqiang@ee.usyd.edu.au Abstract In

### Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

### Route maintenance and Scalability improvement of DSR, based on Relay node identification after locating Link-failure over MANET

IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. III (May-Jun. 2014), PP 21-27 Route maintenance and Scalability improvement of DSR, based on

### STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,