Improving lifetime and availability for ad hoc networks to emergency and rescue scenarios

Size: px
Start display at page:

Download "Improving lifetime and availability for ad hoc networks to emergency and rescue scenarios"

Transcription

1 Improving lifetime and availability for ad hoc networks to emergency and rescue scenarios Rommel Torres, Francisco A. Sandoval, Liliana Enciso, and Samanta Cueva Departamento de Ciencias de la Computación y Electrónica Universidad Técnica Particular de Loja {rovitor,fasandoval,lenciso,spcueva}@utpl.edu.ec Abstract. A mobile ad hoc network is a temporary, self-configuring network composed of nodes that communicate through wireless interfaces that can change their geographic location randomly. It is ideal for emergency and rescue scenarios in which an immediate action is necessary and when it may be the first form of communication available. Therefore, it is necessary for the network to be active as long as possible. Additionally, the communication between network nodes must be efficient. The present research demonstrates, E, a proactive, hierarchical routing protocol in which, by using the association and support strategies of the main nodes, the performance of the mobile ad hoc network improves and its lifetime is extended compared with. Keywords: Ad Hoc networks, rescue and emergency scenarios, Ad Hoc routing protocols, hierarchical routing protocols 1 Introduction Ad hoc MANET (Mobile Ad Hoc Networks) mobile networks are temporary and self-configurable networks. The nodes of such a network are its sources, destinations, and bridges for information. It has finite resources (bandwidth, battery, and processing) that must be well-used to improve the performance of the entire network. In this type of network, it is important to maximize the availability, speed, and state of the network as a whole. For example, if a node has insufficient battery or its processor is saturated, to avoid compromising the availability of the entire network, its participation must be limited to acting as a router in the exchange of information [1]. A MANET network is ideal in emergency and rescue scenarios where there is a need for the immediate implementation of a communications network that will be able to promptly support rescue actions and response to emergency incidents. The operation, lifetime, and availability of an ad hoc network depend on the nodes operating time. Using this logic, we propose a routing protocol called the ad hoc Enhanced Backup Cluster Head Protocol (E). This protocol is based on and presents an improvement to [1]. It uses association and hierarchy This work has been supported in part by SENESCYT (Ecuador).

2 2 Rommel Torres, Francisco A. Sandoval, Liliana Enciso, and Samanta Cueva routing techniques and support cluster heads to improve network availability. Unlike its predecessor, E uses a proactive approach as a function of the nodes power to improve the network lifetime in the process of cluster maintenance. This research is organized as follows. Section 2 describes the related work. Section 3 reports the specifications of the proposed protocol (E). Section 4 validates the two objectives of this research (i.e., network lifetime and availability). Finally, the conclusions present details of the advantages of our proposal with respect to its predecessor. 2 Hierarchical Routing The mobile Ad Hoc networks have some challenges that must be taken into account for the information exchange. First, the nodes that make up the network have the ability to autonomously change their geographic position, and each node can move at its own speed and direction. Second, they depend on a power source for their operation. Additionally, network nodes are heterogeneous, and each node has its own software and hardware characteristics and capabilities. Some strategies for dealing with the challenges related to this heterogeneity have been detailed previously [2]. For the purposes of our study, we will assume that all nodes have characteristics and sufficient capacity to support the requirements of E and that they function under similar conditions to initialize their activity in the network. The hierarchical routing protocols divide the network into subsets [3] of nodes called clusters, in which a cluster head (CH) is used to concentrate and distribute the information generated within the cluster. Hierarchical routing enhances network availability because it limits the broadcasting of messages within the cluster. Figure 1 depicts the components of our proposed hierarchical routing protocol. Fig. 1: Model proposed for the MANET routing protocol Cluster head Backup cluster head Gateway node Source node Destination node Managed node C1 BCH CH GN C3 GN BCH CH GN C2 CH BCH GN C4 GN GN BCH CH

3 Enhanced backup cluster head protocol 3 Several studies [4] identify and group hierarchical routing protocols, these center on the choice of CH and the maintenance of the clusters. and others research [5][6] use a reactive approach for cluster maintenance. Here, the backup cluster head (BCH) takes the cluster responsibility when a problem with the CH exists. Therefore, there is a time interval in which the cluster is without the CH; thus, the network loses convergence and, as a result, its availability is reduced. This research focuses on improving the cluster maintenance process of an ad hoc network using a proactive approach to achieve the greatest possible availability for the communication processes. This research also improves the network lifetime by allowing the CH to pass its responsibility to the BCH prior to being without power. We use a residual energy level like a threshold to switch the BCH-CH responsibility. Other authors [7][8][9] use the energy level for CH selection exclusively. A previous study [1] demonstrates that enhances the network s availability compared to CBRP and AODV; however it does not increase its lifetime. To solve this problem, we propose E, which we detail below. 3 Enhanced Backup Cluster Head Protocol The main difference between the E and the BHCP is the improved availability and lifetime of the network via the inclusion of a proactive procedure between the CH and BCH nodes. Both the E and share the same cluster creation strategy, CH selection, and the same components and interfaces. They differ specifically in the process of cluster maintenance. Node initialization At the start of node initialization, the nodes do not belong to any cluster; each node obtains its metrics as a function of velocity, location within the cluster, and battery power status characteristics. This metric is sent in conjunction with the UNDECIDED state by sending HELLO broadcasting messages to its neighbors. Cluster formation In the event that the node is inactive and receives no HELLO message from any neighbor, it will remain in the UNDECIDED state. If a node receives several HELLO messages from its neighbors, it proceeds to update its table of neighbors, including each neighboring node ID, link type, metric, and state. Each node reviews its neighbor table, and the node that has the best metric becomes the CH, the one with the second lowest metric becomes BCH, and the remaining nodes change to the state. Discovery of the adjacent cluster The CH exchanges HELLO cluster messages via the gateway node, GN, to build an adjacent cluster table with the information of the CH and the GN that allows for communication. Cluster maintenance To maintain the cluster hierarchy and improve the network behavior, the CH and the BCH exchange messages periodically, the BCH determines the CH en-

4 4 Rommel Torres, Francisco A. Sandoval, Liliana Enciso, and Samanta Cueva ergy residual level Q when the CH energy residual level is less than the threshold level T defined for the change. The CH becomes the and informs the BCH to become the new CH and proceeded to select the new BCH. This behavior is defined in the respective algorithms. Additional procedures that are displayed are inherited from the and define the behavior of the possible operation scenarios of the E. When the CH is not available, the BCH takes its place and a new BCH is chosen according to the second best metric. When the BCH is not available, the CH broadcasts to the neighbors for the selection of a new BCH. When an ceases to receive updates from the CH, it means that it left the cluster and changed its state to UNDECIDED. When joining multiple clusters, a period of contention is expected. It then proceeds to choose from the CHs of each cluster and its metric, the new CH, the BCH, and the remaining nodes will become the. When a new node with the UNDECIDED state appears, it receives a HELLO message from the CH and depending on its metric decides whether to change state to BCH or. In an Ad hoc network, each node has batteries with different capacities. A node can have battery capacity n times greater than the battery capacity of another node. In this study we assume that all nodes have equal battery capacity. Therefore, we define the threshold T to be expressed as a percentage of use. 4 Validation of the proposal 4.1 Network lifetime validation A network is modeled by a directed graph G = (N, L) where N denotes the set of nodes {1, 2,..., n} (each node represents a wireless device). L (edges) denotes the set of wireless links between the nodes. Therefore, a node j within the broadcasting range of node i is connected to i by a directional link expressed by (i, j). All nodes broadcast at a constant power level. Indeed, each node is assumed to have an initial power E i (E i >, i N), and the energy required by node i to broadcast a unit of information is expressed by e i. For low-power devices that operate in the 2.4 GHz ISM band, the broadcasting and receiving currents are similar [1]. Therefore, it is assumed that energy is consumed when a node broadcasts (alternatively, the power consumed when it receives information can be included in e i. However, because the power necessary to receive a message is not negligible, it can be assumed that even though a few nodes are capable of receiving the same message, only the node that is intended to receive the complete message and resend it is considered. It is assumed that all other nodes are in standby (sleep mode) or communicating with some of its other neighbors. Let F ij be the average flow for a link (i, j) (F ij, (i, j) L), and f ij (flow rate) the relation between F ij and the maximum flow 1 possible in a nodes connection gateway ( f ij < 1). 1 For example, in IEEE the maximum data rate (maximum flow possible) is 2, 4 or 25 Kb/s) is 2, 4 o 25 Kb/s.

5 Enhanced backup cluster head protocol 5 Definition 1: The lifetime of node i for a given flow, represented by T i, is given by [11]: T i = e i E i j Z(i) f ij (1) Where Z(i) denotes the set of neighboring nodes i. Definition 2: The network real lifetime for a given flow is the time until the first battery is discharged (i.e., the minimum lifetime on all nodes). This is expressed by T [11]: T = min T i = min i N i N e i E i j Z(i) f ij (2) The issue is to maximize the network lifetime taking into account an Ad Hoc network that uses both the and E protocols. Basic protocol model (Backup Cluster Head Protocol) A basic protocol model for the is presented under the following assumptions: A single cluster is considered (i.e., all existing nodes are neighbors). All nodes have the same initial energy (E i = K and i {1, 2,..., N}, where K is a constant). All nodes require the same power to broadcast a unit of information (i.e., e i = k and i {1, 2,..., N}, where k is a constant). According to the established assumptions and considering definition 1, we can conclude that the node lifetime i decreases only with the relation between the medium flow rate for a link F ij and the maximum flow possible in a connection, f ij. According to definition 2, the network lifetime depends on the first node to be completely discharged; therefore, it is necessary to evaluate the node that consumes the most battery and, from all of the above mentioned information, that node will also be the one with the highest average flow F ij among N nodes. If we consider a network under the premise of a single cluster, after the network is established there are four types of nodes. This includes the CH, the backup cluster head (BCH), the managed node (), and the gateway node (GN). Therefore, an average lifetime value can be determined for each type of node described above if deemed to have similar characteristics. Additionally, two options are considered with respect to the packet types (control packets and data packets) and three packets routing ways between nodes: If the receiving node is a neighbor (belongs to the same cluster) and reachable for the transmitting node, the packet is sent directly to the receiving node. If the receiving node is a neighbor (belongs to the same cluster) but is not reachable by the transmitting node, the packet is sent to the CH node and this node reroutes the packet to the receiving node.

6 6 Rommel Torres, Francisco A. Sandoval, Liliana Enciso, and Samanta Cueva If the receiving node is not a neighbor (belongs to another cluster) then the packet is sent to the CH node and this node routes the packet to the other cluster through GN. If one considers the number of packets sent per node (direct ratio in relation to the average flow per node) assuming only the period of data packet broadcasting and the possible packet routing ways (assuming an equal number of packets per node), it follows that the node with the greatest number of packets transmitted is the CH node, as the lifetime of the CH node T CH is less than the remaining nodes: T CH < T i CH i, i N. To represent the situation, consider the following example. The model of energy consumption is based on a previous publication [12] that describes an analytical model as a result of ACPI BIOS measurements that evaluate the energy consumption of a wireless network interface examining IEEE It is known that the network interface of a mobile host can assume four states: 1) transmission for communicating data; 2) data reception; 3) idle mode, in which the network interface allows to transmit or receive data (this is the default mode); and 4) sleep mode, in which the power consumption is extremely low, and the interface may not transmit or receive until it is awakened. It is also known that the transmission mode is of greater consumption than the reception mode. One study [12] determined that the power consumption is approximately 25% higher in reception mode than in idle mode, and it is approximately 63% higher in the transmission mode than in the idle mode. Two states are considered in the model of energy consumption: 1) a state of high consumption when the host is in forwarding mode (reception and transmission mode), and 2) low-power state when the host is not sending packets (passive reception or idle mode). Then, according to a previously presented mathematical model [12], in the state of high consumption the percentage of battery charge can be represented by an exponential equation defined as: y = % battery-unit e λ x (3) where λ is a function of the throughput. For the specific case of 2 Mbits/s and.5 Mbits/s of traffic, λ assumes values of.185 and.35, respectively. In the case of low-power state the relation is linear. In view of what was described, the particular model has a single cluster with N = 5(enough to analyze the model trend). It is considered to be in a state of high consumption and to have 1 to 4 managed nodes plus the CH (i.e., for a CH node the traffic is considered to be 2 Mbits/s, and for a managed node the traffic is.5 Mbit/s). Node 1 is considered to be the first CH and after his death in ascending order. Note that the BCH node has intermediate power consumption between the CH and the managed node; however, for this basic model it is ignored and is considered to be a managed node. Battery charge percentage over time is presented in Figure 2a for each node. Basic protocol model E (Enhanced Backup Cluster Head Protocol)

7 Enhanced backup cluster head protocol 7 1 Full discharge model in high consumption mode 1 Full discharge model in high consumption mode E % battery load % battery load Node 1 Node 1 2 Node 2 2 Node 2 Node 3 Node 3 1 Node 4 1 Node 4 Node 5 Node Time in seconds Time in seconds (a) Full discharge model in high(b) Full discharge model in high consumption mode for consumption mode for E Lives curves 6 5 numbers of alive nodes E Time in seconds (c) Lives Curves, protocol and E Fig. 2: Network lifetime validation In this protocol, due to the direct dependence of the network lifetime with respect to the CH node lifetime in the protocol, a limit is established to the minimum residual energy level of the CH. While maintaining the same assumptions for the protocol, it can be induced that the network lifetime for the case of using the E protocol is greater than using the protocol. This means that there are an equal or greater number of active nodes in the network at any point in time when comparing E and protocols, respectively. A replica of the particular example with the protocol is performed using the same parameters considering a minimum allowed battery discharge of 3% for the CH, at which point the current CH becomes managed node. Figure 2b displays the percentage of battery charge as a function of time for the E protocol. Finally, Figure 2c presents a comparison of the network lifetime curves in relation to Figures 2a and 2b. It should be noted that the case evaluated is among the worst-case scenarios, where there is a continuous data transmission, and it has several restrictions compared to real situations. In return, this case allows us to evaluate and confirm an increase of approximately 7% in the nodes lifetime for the E protocol compared to the protocol; moreover,

8 8 Rommel Torres, Francisco A. Sandoval, Liliana Enciso, and Samanta Cueva the value has a tendency to increase due to the nodes low power consumption because of the linear relationship [12]. 4.2 Network availability validation We used an area of Loja City, Ecuador (Figure 3) to simulate an urban area with emergency and rescue services. This same scenario has been used previously in [1]. We used the Network Simulator 2 ( for the simulation. To define the simulation scenarios, the parameters described previously [13] have been used. The values for each of these parameters are listed in Table 1. We used a connection oriented approach with the TCP protocol. To evaluate the E protocol and to measure the network availability, overload, average delay and the packet delay variation indicators have been selected. These indicators have been compared to those obtained for the protocol. Fig. 3: Simulated emergency and rescue scenario Table 1: General parameters for the simulation Parameters Values Simulation area 1m x 5m Mobility model Emergency and rescue Number of nodes 25, 3, 4, 5, 6, 7, 8, 9, 1 Number of connections 2 Simulation time 1 seconds Network layer protocols E, Transport layer protocol TCP MAC layer Propagation model TwoRayGround Type of antenna Omnidirectional Rate of sent packets

9 Enhanced backup cluster head protocol 9 This rate is calculated as the ratio between the number of sent packets and the number of packets received. The formation and maintenance of the cluster requires the exchange of packets to occur by updated routes; E performs better in all cases (Figure 4a). performs greater information exchange in the cluster maintenance phase when there are problems with the CH because, in that case, an exchange of messages occurs while the CH is not available until the BCH takes its place. The proactive approach of E allows for fewer broadcast packets because the cluster maintenance process is reduced relative to the. Routingnpackets/Applicationnpackets SentPpackets/ReceivedPpackets RatePofPsentPpackets 11 1 E Nodes (a) Rate of sent packets OverheadnProtocolnAverage E Nodes (c) Protocol Overhead.14 E.12 SentCpackets/ReceivedCpackets Time SentCpacketsCapplicationCrate E Nodes (b) Sent packets application rate AverageHend to endhdelay 1.9 E Nodes Jitter average (d) End to End delay.1 Time Nodes (e) Average of Packet delay Variation Fig. 4: Network availability validation

10 1 Rommel Torres, Francisco A. Sandoval, Liliana Enciso, and Samanta Cueva Sent packets application rate Figure 4b displays the sent rate of the packets on an application level. The protocol is better because this rate is closer to one. E is equal to or more efficient than the. In general, the E is more stable than the. The proactive E behavior allows a smaller number of not-retransmitted generated application packets compared to the. Protocol overload Protocol overload is defined as the total number of routing packets transmitted during the simulation divided by the number of application packets. This indicator measures ad hoc routing protocol efficiency. The E uses fewer routing packets for the application information transmission (Figure 4c). Average delay For our purpose, average delay is a very significant measurement because it is desirable to send and receive network management information as fast as possible. In figure 4d, the E protocol the average extreme delay is better and more stable than for the. Moreover, the E lag times are similar in all cases. Packet delay variation Packet delay variation is the difference in the delay between extreme-toextreme connections between selected packets. In an ad hoc network it serves to measure the network stability and convergence. The average packet delay variation has been obtained for the entire network (Figure 4e). In the majority of the experiments, the E exhibits more stable behavior than its predecessor. 5 Conclusion and future work A new hierarchical routing protocol, E, has been implemented. E uses a proactive approach to improve network availability. It has been demonstrated that, in general, E is more stable than its predecessor. E uses a residual energy level strategy for change the BCH node status to CH. Improving the availability and lifetime of ad hoc networks is a major challenge that must be solved to meet the needs of emergency and rescue scenarios. E accomplished the objectives of improving the network lifetime and convergence compared to its predecessor,. E improves the network lifetime through the use of a proactive strategy in the maintenance of the cluster. The implementation of the E in real devices is a task that we intend to address in forthcoming research. The study of time adaptive algorithms that enable calculation of the optimal power limit for each node in a network considering the type and traffic on the node will be determined in future studies. References 1. R. Torres, L. Mengual, O. Marban, S. Eibe, E. Menasalvas, B. Maza, A management ad hoc networks model for rescue and emergency scenarios, Expert Systems with Applications 39 (1) (212)

11 Enhanced backup cluster head protocol N. Fernando, S. W. Loke, W. Rahayu, Mobile cloud computing: A survey, Future Generation Computer Systems 29 (1) (213) 84 16, including Special section: AIRCC-NetCoM 29 and Special section: Clouds and Service-Oriented Architectures. doi: 3. A. Ramrekha, V. Talooki, C. Politis, Energy efficient and scalable routing protocol for extreme emergency ad hoc communications, Mobile Networks and Applicationsdoi:1.17/s S.-H. Wu, C.-M. Chen, M.-S. Chen, Collaborative wakeup in clustered ad hoc networks, IEEE Journal on Selected Areas in Communications 29 (8) (211) M. B. Yassein, N. Hijazi, Improvement on cluster based routing protocol by using vice cluster head, in: NGMAST 1, 21, pp H. Safa, H. Artail, D. Tabet, A cluster-based trust-aware routing protocol for mobile ad hoc networks, Wirel. Netw. 16 (4) (21) doi:1.17/s M. Saxena, N. Phate, K. Mathai, M. Rizvi, Clustering based energy efficient algorithm using max-heap tree for manet, 214, pp , cited By (since 1996). 8. D. Karia, S. Shinde, Clustering based routing strategies for energy management in ad-hoc networks, Communications in Computer and Information Science 42 CCIS (214) 79 9, cited By (since 1996). 9. R. Kodali, N. Aravapalli, Multi-level leach protocol model using ns-3, in: Advance Computing Conference (IACC), 214 IEEE International, 214, pp doi:1.119/iadcc J. Gutierrez, M. Naeve, E. Callaway, M. Bourgeois, V. Mitter, B. Heile, Ieee : a developing standard for low-power low-cost wireless personal area networks, Network, IEEE 15 (5) (21) doi:1.119/ J. H. Chang, L. Tassiulas, Energy Conserving Routing in Wireless Ad-Hoc Networks, Proc. IEEE INFOCOM. 12. E. Lochin, A. Fladenmuller, J. yves Moulin, S. Fdida, A. Manet, Energy consumption models for ad-hoc mobile terminals, in: In Med-Hoc Net, S. Kurkowski, W. Navidi, T. Camp, Discovering variables that affect manet protocol performance, in: Global Telecommunications Conference, 27. GLOBECOM 7. IEEE, 27, pp doi:1.119/glocom

Improving availability of mobile networks using a cluster routing protocol with redundant cluster head

Improving availability of mobile networks using a cluster routing protocol with redundant cluster head Improving availability of mobile networks using a cluster routing protocol with redundant cluster head Rommel Torres Universidad Técnica Particular de Loja Email: rovitor@utpl.edu.ec Liliana Enciso Universidad

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network

Performance evaluation of reactive and proactive routing protocol in IEEE ad hoc network Author manuscript, published in "ITCom 6 - next generation and sensor networks, Boston : United States (26)" DOI :.7/2.68625 Performance evaluation of reactive and proactive routing protocol in IEEE 82.

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS

AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS AN ADAPTIVE GATEWAY DISCOVERY IN HYBRID MANETS F. D. Trujillo, A. Triviño, E. Casilari and A. Díaz-Estrella Department of Electronic Technology University of Malaga A. J. Yuste Department of Telecommunication

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 286 A SURVEY ON FACTORS EFFECTING ENERGY CONSUMPTION IN MANET Pooja Ph.D Scholar, Department of Computer Science

More information

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2

Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Mobile Ad-hoc and Sensor Networks Lesson 05 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 2 Oxford University Press 2007. All rights reserved. 1 Temporally ordered routing algorithm (TORA) A reactive

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR) Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR) Amandeep Kaur 1, Jasmeet Kaur 2, Nishu Kansal 3 1, 2, 3 (ECE, Guru Nanak Dev Engineering College Ludhiana, India) ABSTRACT:

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Dynamic bandwidth management for multihop wireless ad hoc networks

Dynamic bandwidth management for multihop wireless ad hoc networks Dynamic bandwidth management for multihop wireless ad hoc networks Sofiane Khalfallah Email: sofiane.khalfallah@insa-lyon.fr Cheikh Sarr Email: Cheikh.Sarr@insa-lyon.fr Isabelle Guerin Lassous Email: Isabelle.Guerin-Lassous@inrialpes.fr

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Al-Baadani, Faris., Yousef, S., Tapaswi, S., Patnaik, K. K., and Cole, M Faculty

More information

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS

DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

Neural Network Model Based Cluster Head Selection for Power Control in Mobile Ad-hoc Networks

Neural Network Model Based Cluster Head Selection for Power Control in Mobile Ad-hoc Networks Neural Network Model Based Cluster Head Selection for Power Control in Mobile Ad-hoc Networks Krishan Kumar,A.P.(CSE), Manav Rachna International University, Faridabad, Haryana, V.P.Singh,A.P.(CSE), Thapar

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks 1 Ravindra.E, 2 Pooja Agraharkar Asst Prof, Dept. of Electronics & Communication Engg, Mtech Student, Dept. of Electronics & Communication

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Research Manuscript Title A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK Jaichitra.I, Aishwarya.K, P.G Student, Asst.Professor, CSE Department, Arulmigu Meenakshi Amman College of Engineering,

More information

MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING

MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING MODIFIED DSR PROTOCOL FOR ENERGY EFFICIENCY IN MANET WITH LOAD SHARING Krishna Dilip Suchak Computer engineering, GEC, Gandhinagar, 382028, Gujarat, India. ABSTRACT Mobile ad hoc network (MANET) is an

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS

GROUP MANAGEMENT IN MOBILE ADHOC NETWORKS American Journal of Applied Sciences 11 (7): 1059-1064, 2014 ISSN: 1546-9239 2014 K.S. Kumar et al., This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/ajassp.2014.1059.1064

More information

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 3, Ver. II (May - Jun. 214), PP 82-86 GSM Based Comparative Investigation of Hybrid

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

New Data Clustering Algorithm (NDCA)

New Data Clustering Algorithm (NDCA) Vol. 7, No. 5, 216 New Data Clustering Algorithm () Abdullah Abdulkarem Mohammed Al-Matari Information Technology Department, Faculty of Computers and Information, Cairo University, Cairo, Egypt Prof.

More information

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid.

II. CLASSIFICATION OF ROUTING PROTOCOLS MANET routing protocols are classified into three major categories: proactive, reactive and hybrid. A COMPLETE STUDY ON POWER AWARE ROUTING PROTOCOL FOR MOBILE ADHOC NETWORK A. Kumaravel 1, Dr. M.Chandrasekaran 2 1 (Electronics and Communication Engineering, Paavai Engineering College,India) 2 (Electronics

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which

More information

ENERGY PROFICIENT CLUSTER BASED ROUTING PROTOCOL FOR WSN 1

ENERGY PROFICIENT CLUSTER BASED ROUTING PROTOCOL FOR WSN 1 ENERGY PROFICIENT CLUSTER BASED ROUTING PROTOCOL FOR WSN 1 Shriom Maurya, 2 Shish Ahmad, 3 Mohd Haroon Dept. of Computer Sc. & Engg., Integral University Lucknow, India 1 Shriommaurya87@gmail.com, 2 shish@iul.ac.in,

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

Selection of Optimum Routing Protocol for 2D and 3D WSN

Selection of Optimum Routing Protocol for 2D and 3D WSN Selection of Optimum Routing Protocol for 2D and 3D WSN Robin Chadha Department of Electronics and Communication DAVIET, PTU Jalandhar, India. Love Kumar Department of Electronics and Communication DAVIET,

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

Sensors & Transducers Published by IFSA Publishing, S. L.,

Sensors & Transducers Published by IFSA Publishing, S. L., Sensors & Transducers Published by IFSA Publishing, S. L., 2016 http://www.sensorsportal.com Compromises Between Quality of Service Metrics and Energy Consumption of Hierarchical and Flat Routing Protocols

More information

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS

COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS COMPARATIVE PERFORMANCE ANALYSIS OF TEEN SEP LEACH ERP EAMMH AND PEGASIS ROUTING PROTOCOLS Neha Jain 1, Manasvi Mannan 2 1 Research Scholar, Electronics and Communication Engineering, Punjab College Of

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks Abdulrahman Issa Kh Shybub 1, Tarek Mosbah Abdala 2 1, Computer Department Higher Institute

More information

A Review Paper on Routing Protocols in Wireless Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,

More information

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET Performance Evaluation of AODV DSDV and OLSR Protocols with Varying FTP Connections in MANET Alok Upadhyay, Rupali Phatak Research Scholar, Asst. Professor -Department of Electronics & Communication Engineering

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol

Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol Ravneet Kaur M.Tech Scholar, Computer Science & Engineering (CSE), Lovely Professional University, India. ABSTRACT A Mobile

More information

Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks

Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks Study on Techniques for Cluster Head Formation over Mobile Ad Hoc Networks B.Sindhuja 1, Dr.J.Shanthini 2 PG Scholar, Department of Information Technology, SNS College of Technology, Coimbatore, Tamil

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK

ENERGY BASED AODV ROUTING PROTOCOL FOR WIRELESS MESH NETWORK International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 4, July - August 2018, pp. 77 83, Article ID: IJARET_09_04_007 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=4

More information

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS

IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS IMPROVING WIRELESS SENSOR NETWORK LIFESPAN THROUGH ENERGY EFFICIENT ALGORITHMS 1 M.KARPAGAM, 2 DR.N.NAGARAJAN, 3 K.VIJAIPRIYA 1 Department of ECE, Assistant Professor, SKCET, Coimbatore, TamilNadu, India

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information