Wireless Networking & Mobile Computing

Size: px
Start display at page:

Download "Wireless Networking & Mobile Computing"

Transcription

1 Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science

2 The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

3 The OSI Communication Model Page 3 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

4 MANET Mobile Ad Hoc Networks Collection of mobile nodes connected by wireless links, forming an autonomous network Nodes run on batteries power consumption is an issue Thus routing is multi-hop each node also acts as a router Scalability is an issue A B H S C I E G F K J D M Page 4 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

5 MANET vs Cellular MANET Cellular Communications No infrastructure, lack of centralized control Fixed, pre-located base stations Frequent topology changes due to node mobility All communications over wireless medium Static backbone network topology Reliable backbone links; only last link is wireless Page 5 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

6 Applications Civilian environments meeting rooms smart homes multimedia classrooms Emergency operations disaster relief search and rescue law enforcement Military applications Page 6 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

7 Challenges Limited wireless transmission range Broadcast nature of the wireless medium Packet losses due to transmission errors Mobility-induced route changes Mobility-induced packet losses Battery constraints Potentially frequent network partitions Ease of snooping on wireless transmissions (security hazard) 7 Page 7 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

8 Topology Challenges Network connectivity defined by node proximity and wireless medium characteristics Due to mobility the network topology undergoes rapid changes Page 8 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

9 MAC Challenges Hidden terminal problem Unreliable physical layer multi-path fading high Bit Error Rate (BER) other impairments Mobility Page 9 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

10 Routing Schemes Broadcast Unicast Geocast Multicast Anycast Page 10 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

11 Unicast Routing in Mobile Ad Hoc Networks Page 11 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

12 Routing in MANET Why is routing in MANET challenging? Without (necessarily) using a pre-existing infrastructure Main culprit: mobility network topology is changing rapidly (link failure/repair) Rate of link failure/repair may be high when nodes move fast Main challenge: maintain and distribute up-to-date routing information without saturating the network Page 12 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

13 Routing in MANET Numerous protocols have been proposed Flavors: adapted from protocols previously proposed for wired networks invented specifically for MANET Major approaches Proactive: routing information is maintained proactively regardless of communication requests e.g. traditional link-state and distance-vector routing protocols are proactive Reactive: a route to a destination is found and maintained only when the route is needed Page 13 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

14 Proactive vs Reactive Latency of route discovery proactive protocols may have lower latency since routes are maintained at all times reactive protocols may have higher latency because a route from X to Y will be found only when X attempts to send to Y Overhead of route discovery/maintenance reactive protocols may have lower overhead since routes are determined only if needed proactive protocols can (but not necessarily) result in higher overhead due to continuous route updating Which approach is better depends on traffic and mobility patterns Page 14 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

15 Sample Routing Protocols Pure flooding DSR AODV LAR Page 15 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

16 Flooding (1/5) Sender S broadcasts data packet P to all its neighbors Each node receiving P forwards P to its neighbors Sequence numbers are used to avoid forwarding the same packet more than once The destination D does not forward the packet Page 16 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

17 Flooding (2/5) Broadcast transmission Y Z A B H S C I E G F K J D M N L Represents a node that receives packet P for the first time Represents transmission of packet P Page 17 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

18 Flooding (3/5) Y Z A B H S C I E G F K J D M N L Node H receives packet P from two neighbors: potential for collision Page 18 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

19 Flooding (4/5) Y Z A B H S C I E G F K J D M N L Node C receives packet P from G and H, but does not forward it again, because node C has already forwarded packet P Page 19 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

20 Flooding (5/5) Y Z A B H S C I E G F K J D M N L Flooding completed Nodes unreachable from S do not receive packet P (e.g., node Z) Nodes for which all paths from S go through the destination D also do not receive packet P (example: node N) Page 20 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

21 Flooding: Summary Advantage: simplicity Potentially, very high overhead data packets may be delivered to too many nodes who do not need to receive them Potentially lower reliability of data delivery flooding uses MAC broadcasting -- hard to implement reliable broadcast delivery without significantly increasing overhead Broadcasting in IEEE MAC is unreliable Need end-to-end reliability Page 21 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

22 Flooding Control Packets Many protocols perform limited flooding of control packets, instead of data packets Control packets are used to discover routes or to send linkstate updates Discovered routes are subsequently used to send data packet(s) Overhead of control packet flooding is amortized over data packets transmitted between consecutive control packet floods Page 22 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

23 Dynamic Source Routing (DSR) [Johnson96] When source S wants to send a packet to node D, but does not know a route to D, it initiates a route discovery Source node S floods a Route Request (RREQ) Each node appends own identifier when forwarding the RREQ Page 23 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

24 DSR: Route Discovery (1/3) Broadcast transmission Y A B H S [S] C I E G F K J D M Z N L Represents transmission of RREQ [X,Y] Represents list of identifiers appended to RREQ Page 24 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

25 DSR: Route Discovery (2/3) Y A B H S E C [S,C] I [S,E] G F K J D M Z N L Page 25 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

26 DSR: Route Discovery (3/3) Y Z A B H S C I E G F [S,E,F,J] M J D K [S,C,G,K] N L Nodes J and K both broadcast RREQ to node D Since nodes J and K are hidden from each other, their transmissions may collide Page 26 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

27 DSR: Route Reply (1/2) Destination D upon receiving the first RREQ, sends back to S a Route Reply (RREP) RREP is sent on the route obtained by reversing the route appended to the received RREQ RREP includes the route from S to D on which RREQ was received by node D Page 27 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

28 DSR: Route Reply (2/2) Y A B H S C I E RREP [S,E,F,J,D] F J G K D M Z N L Represents RREP control message Page 28 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

29 DSR: Data Delivery (1/2) S upon receiving RREP, caches the route included in the RREP When S sends a data packet to D, the entire route is included in the packet header hence the name source routing Intermediate nodes use the source route included in a packet to determine to whom the packet should be forwarded Page 29 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

30 DSR: Data Delivery (2/2) Y A B H S DATA [S,E,F,J,D] E F C G K I J D M Z N L Packet header size grows with route length Page 30 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

31 DSR Optimization: Route Caching Each node caches a new route it learns by some means When S finds route [S,E,F,J,D] to node D, S also learns route [S,E,F] to node F When node K receives the Route Request [S,C,G], K learns route [K,G,C,S] to S When node F forwards Route Reply RREP [S,E,F,J,D], F learns route [F,J,D] to D When node E forwards Data [S,E,F,J,D], it learns route [E,F,J,D] to node D A node may also learn a route when it overhears data packets Page 31 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

32 DSR: Route Caching (1/3) Advantages: can speed up route discovery can reduce propagation of route requests (RREQ) Page 32 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

33 DSR: Route Caching (2/3) [S,E,F,J,D] [E,F,J,D] Y A B H S C [C,S] I E [G,C,S] G F [K,G,C,S] [F,J,D],[F,E,S] RREQ [J,F,E,S] M J D K Z RREP N L Route Reply (RREP) from node K limits flooding of RREQ In general, the reduction may be less dramatic Page 33 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

34 DSR: Route Caching (3/3) Stale caches can adversely affect performance With passage of time and host mobility, cached routes may become invalid In some cases, a sender may try several stale routes (obtained from its local cache, or from cache of some other node), before finding a good route Page 34 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

35 DSR: Route Maintenance - Route Error (RERR) Y A B H S C I E RERR [J-D] F G K J D M Z N L When J s attempt to forward a data packet (with route S-E-F-J-D) on link (J-D) fails, J sends a route error (RERR) to S along route J-F-E-S Nodes hearing RERR update their route cache to remove link (J-D) When node S receives the RERR, it initiates a new RREQ Page 35 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

36 Summary of DSR Routes maintained only between nodes who need to communicate Route caching can further reduce route discovery overhead A single route discovery may yield many routes to the destination, due to intermediate nodes replying from local caches Complicated Cache Management mechanisms Packet header size grows with route length due to source routing Page 36 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

37 Ad-hoc On-Demand Distance Vector Routing (AODV) Route Requests (RREQ) are forwarded in a manner similar to DSR When a node re-broadcasts a Route Request, it sets up a reverse path pointing towards the source When the intended destination receives a Route Request, it replies by sending a Route Reply Route Reply travels along the reverse path set-up when Route Request is forwarded Page 37 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

38 AODV: Route Request (1/5) Broadcast transmission Y Z A B H S C I E G F K J D M N L Represents transmission of RREQ Page 38 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

39 AODV: Route Request (2/5) Y Z A B H S C I E G F K J D M N L Represents links on Reverse Path Page 39 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

40 AODV: Route Request (3/5) Y Z A B H S C I E G F K J D M N L Represents links on Reverse Path F sets up a reverse path entry in its routing table: reverse path entry Destination S Next Hop E Page 40 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

41 AODV: Route Request (4/5) Y Z A B H S C I E G F K J D M N L Page 41 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

42 AODV: Route Request (5/5) Y Z A B H S C I E G F K J D M N L D does not forward RREQ, because it is the intended target of the RREQ Page 42 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

43 AODV: Route Reply (1/2) Y Z A B H S C I E G F K J D M N L Represents links on path taken by RREP Page 43 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

44 AODV: Route Reply (1/2) An intermediate node may also send a Route Reply (RREP) provided that it knows a more recent path than the one previously known to sender S To determine whether the path known to an intermediate node is more recent, destination sequence numbers are used Forward links are set up when RREP travels along the reverse path Page 44 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

45 AODV: Forward Path Setup Y Z A B H S C I E G F K J D M N L F adds a forward path entry in its routing table: forward path entry Destination Next Hop S E Page 45 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing D J

46 AODV: Data Delivery Y A B H S DATA E C I G F K J D M Z N L Represents a link on the forward path Routing table entries used to forward data packet Route is not included in packet header Page 46 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

47 AODV: Route Maintenance - Route Error (RERR) When node X is unable to forward packet P (from node S to node D) on link (X,Y), it generates a RERR message Node X increments the destination sequence number for D cached at node X The incremented sequence number N is included in the RERR When node S receives the RERR, it initiates a new route discovery for D using destination sequence number at least as large as N Page 47 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

48 Information Freshness Assured Each originating node maintains a monotonically increasing sequence number. Used by other nodes to determine the freshness of the information. Every nodes routing table contains the latest information available about the sequence number for the IP address of the destination node for which the routing information is maintained. Updated whenever a node receives new information about the sequence number from RREQ, RREP, or RERR messages received related to that destination. Page 48 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

49 Information Freshness Assured AODV depends on each node in the network to own and maintain its destination sequence number. A destination node increments its own sequence number immediately before it originates a route discovery A destination node increments its own sequence number immediately before it originates a RREP in response to a RREQ The node treats its sequence number as an unsigned number when incrementing accomplishing sequence number rollover. Destination information is assured by comparing the sequence number of the incoming AODV message with its sequence number for that destination. Page 49 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

50 ADOV: Summary Nodes maintain routing tables containing entries only for routes that are in active use Routes are not included in packet headers At most one next-hop per destination is maintained at each node DSR may maintain several routes for a single destination Page 50 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

51 Flooding of Control Packets How to reduce the scope of the route request flood? LAR [Ko98Mobicom] Query localization [Castaneda99Mobicom] How to reduce redundant broadcasts? The Broadcast Storm Problem [Ni99Mobicom] Page 51 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

52 Location-Aided Routing (LAR) [Ko98Mobicom] Exploits location information to limit scope of route request flood Location information may be obtained using GPS Expected Zone is determined as a region that is expected to hold the current location of the destination Expected region determined based on potentially old location information, and knowledge of the destination s speed Route requests limited to a Request Zone that contains the Expected Zone and location of the sender node Page 52 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

53 Expected Zone in LAR X = last known location of node D, at time t0 Y = location of node D at current time t1, unknown to node S r = (t1 - t0) * estimate of D s speed r X Y Expected Zone Page 53 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

54 Request Zone in LAR Network Space Request Zone A B r X Y S Page 54 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

55 LAR Only nodes within the request zone forward route requests Node A does not forward RREQ, but node B does (see previous slide) Request zone explicitly specified in the route request Each node must know its physical location to determine whether it is within the request zone If route discovery using the smaller request zone fails to find a route, the sender initiates another route discovery (after a timeout) using a larger request zone the larger request zone may be the entire network Page 55 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

56 LAR Variations: Adaptive Request Zone Each node may modify the request zone included in the forwarded request Modified request zone may be determined using more recent/accurate information, and may be smaller than the original request zone B S Request zone adapted by B Request zone defined by sender S Page 56 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

57 Location Aided Routing (LAR) Advantages reduces the scope of route request flood reduces overhead of route discovery Disadvantages Nodes need to know their physical locations Does not take into account possible existence of obstructions for radio transmissions 57 Page 57 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

58 Other Routing Protocols Plenty of other routing protocols Geographic Distance Routing (GEDIR) Energy-aware routing QoS routing Routing with Guaranteed Delivery Page 58 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

59 MANET Routing: Issues How to compare these protocols fairly? Message overhead Routing delays Throughput Energy Consumption Comparisons are based mainly on empirical results Lack of analytical results Interaction with MAC protocols Scalability: >200 nodes is already a problem A possible solution for scalability: hierarchical organization of ad hoc networks Page 59 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

60 MANET Routing: Many Variations Fully Symmetric Environment all nodes have identical capabilities and responsibilities Asymmetric Capabilities transmission ranges and radios may differ battery life at different nodes may differ processing capacity may be different at different nodes speed of movement Asymmetric Responsibilities only some nodes may route packets some nodes may act as leaders of nearby nodes (e.g., cluster head) Page 60 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

61 MANET Routing: Many Variations Traffic characteristics may differ in different ad hoc networks bit rate timeliness constraints reliability requirements unicast / multicast / geocast host-based addressing / content-based addressing / capability-based addressing May co-exist (and co-operate) with an infrastructure-based network Page 61 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

62 MANET Routing: Many Variations Mobility patterns may be different people sitting at an airport lounge New York taxi cabs kids playing military movements personal area network Mobility characteristics speed predictability direction of movement pattern of movement uniformity (or lack thereof) of mobility characteristics among different nodes Page 62 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

63 Research on Mobile Ad Hoc Networks Variations in capabilities & responsibilities X Variations in traffic characteristics, mobility models, etc. X Performance criteria (e.g., optimize throughput, reduce energy consumption) = Significant research activity Page 63 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

64 Questions Page 64 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

65 More on IEEE DCF Collision Avoidance Mechanism CSMA + RTS/CTS (physical/virtual carrier sensing) Collision Resolution Mechanism Binary Exponential Backoff (BEB) Does IEEE DCF work well in multi-hop networks? Answer: No! (has known fairness problems) Page 65 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

66 What is Fairness? What does fairness mean in a multi-hop environment? Max-min fairness an allocation is max-min fair if there is no way to give more bandwidth to a flow without decreasing the allocation of a flow of lesser or equal bandwidth Practical approach ensure that each flow gets a minimum share of the bandwidth allow those flows that are not interfering with the current transmitting flows to send simultaneously Page 66 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

67 Unfairness in IEEE DCF f0 f1 f2 f3 f4 A B C D E F Throughput of each flow: f0: 1298 f1: 684 f2: 47 f3: 1173 f4: 1913 Page 67 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

68 The Flow Contention Graph f0 f1 f2 f3 f4 A B C D E F Nodes represent flows Two flows connected by an edge means they conflict with each other f1 f3 f0 f2 f4 Page 68 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

69 An example of scheduling f1 f3 f0 f2 f4 Flow Contention Graph Scheduling: Slot 1: f0 + f3/f4 Slot 2: f1 + f4 Slot 3: f2 Slot 4: f3 + f0 Slot 5: f4 +f0/f1 Slot 6: f0 + f3/f4 Slot 7: f1 + f4 Slot 8: f2 Slot 9: f3 + f0 Slot 10: f4 +f0/f1 Each flow is guaranteed to be scheduled once in every 5 slots! Page 69 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

70 One can do better f1 f3 f0 f2 f4 Flow Contention Graph Improved schedule: Slot 1: f0 + f3 Slot 2: f1 + f4 Slot 3: f2 Slot 4: f0+f3 Slot 5: f1+f4 Slot 6: f2 Each flow is guaranteed to be scheduled once in every 3 slots! Page 70 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

71 Challenges Which scheduling is better? Trade-off between fairness and overall throughput How to implement a fair scheduler in a fully distributed way? Page 71 Spring 2012 CS 752/852 - Wireless Networking and Mobile Computing

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues

Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Mobile Ad Hoc Networks: Routing, MAC and Transport Issues Nitin H. Vaidya University of Illinois at Urbana-Champaign nhv@uiuc.edu http://www.crhc.uiuc.edu/~nhv 2004 Nitin Vaidya 1 Notes Names in brackets,

More information

Mobile Ad-Hoc Networks & Routing Algorithms

Mobile Ad-Hoc Networks & Routing Algorithms Mobile Ad-Hoc Networks & Routing Algorithms EMMANOUIL G. SPANAKIS, PhD. spanakis@csd.uoc.gr COLLABORATING RESEARCHER, COMPUTATIONAL BIOMEDICINE LABORATORY, FORTH-ICS VISITING LECTURER, COMPUTER SCIENCE

More information

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone

Politecnico di Milano Facoltà di Ingegneria dell Informazione. WI-7 Ad hoc networks. Wireless Internet Prof. Antonio Capone Politecnico di Milano Facoltà di Ingegneria dell Informazione WI-7 Ad hoc networks Wireless Internet Prof. Antonio Capone Acknowlegments o This class notes are mostly based on the teaching material of:

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 5 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Wireless Mul*hop Ad Hoc Networks

Wireless Mul*hop Ad Hoc Networks Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial. Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP)

More information

Lecture 4: Mobile Ad Hoc and Sensor Networks (I)

Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Lecture 4: Mobile Ad Hoc and Sensor Networks (I) Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Courtesy of G.G. Richard III for providing some of the slides Mobile Ad Hoc Networks May need to traverse

More information

Part I. Wireless Communication

Part I. Wireless Communication 1 Part I. Wireless Communication 1.5 Topologies of cellular and ad-hoc networks 2 Introduction Cellular telephony has forever changed the way people communicate with one another. Cellular networks enable

More information

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks. EEC173B/ECS152C, Winter Mobile Ad Hoc Networks (MANET) 173/152, Winter 2006 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Properties ormed by wireless hosts which may be mobile Without (necessarily) using a pre existing infrastructure

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Mobile Ad Hoc Networks

Mobile Ad Hoc Networks Mobile Ad Hoc Networks Tutorial at CIT 2000 Bhubaneshwar, Dec 20 23 Sridhar Iyer IIT Bombay http://www.it.iitb.ernet.in.in/~sri sri@it.iitb.ernet.in Acknowledgements Many figures, slides and reference

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks

Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks Redes Inalámbricas Tema 4. Mobile Ad Hoc Networks A. Specific properties B. Flooding as a basic mechanism C. Basic routing protocols DSR AODV y DYMO OLSR y OLSRv2 D. Advanced protocols and techniques Acknowledgments

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

Routing protocols in Mobile Ad Hoc Network

Routing protocols in Mobile Ad Hoc Network Routing protocols in Mobile Ad Hoc Network Presented By :- Nitesh Jain Date:-26/10/2005 SCHOOL OF INFORMATION TECHNOLOGY INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR KHARAGPUR Types of Wireless Networks Infrastructure

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET)

Page 1. Mobile Ad Hoc Networks EEC173B/ECS152C. Mobile Ad Hoc Networks (MANET) 173/152 obile d oc etworks (T) obile d oc etworks (T) ntroduction Unicast Routing Reactive Protocols: R, R, OV Proactive Protocols Properties ormed by wireless hosts which may be mobile Without (necessarily)

More information

Wireless Mesh Networks

Wireless Mesh Networks Wireless Mesh Networks COS 463: Wireless Networks Lecture 6 Kyle Jamieson [Parts adapted from I. F. Akyildiz, B. Karp] Wireless Mesh Networks Describes wireless networks in which each node can communicate

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT

AD HOC NETWORKS. RAJINI M 2 ND SEM M.Tech DECS PESIT AD HOC NETWORKS RAJINI M 2 ND SEM M.Tech DECS PESIT OUTLINE Introduction Features of Ad hoc network Types of ad hoc network MANETs Network architecture MAC protocols Routing protocols Denial of service

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1

Chapter 7. Wireless Ad Hoc Networks. 7: Wireless Ad Hoc Networks 7-1 Chapter 7 Wireless Ad Hoc Networks 7: Wireless Ad Hoc Networks 7-1 What is an Ad Hoc Network? Definitions: An ad-hoc network is one that comes together as needed, not necessarily with any assistance from

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Quiz 5 Answers. CS 441 Spring 2017

Quiz 5 Answers. CS 441 Spring 2017 Quiz 5 Answers CS 441 Spring 2017 1. How does Flooding differ from the route discovery phase used in other reactive routing protocols such as DSR and AODV? [2] Flooding involves broadcasting of data packet

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology

Ad Hoc Networks. Advanced Mobile Communication Networks. Integrated Communication Systems Group Ilmenau University of Technology Ad Hoc Networks Advanced Mobile Communication Networks Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Medium Access Control (MAC) in Multi-Channel Scenario

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday

Lecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

Unicast Routing in Mobile Ad Hoc Networks

Unicast Routing in Mobile Ad Hoc Networks Unicast Routing in obile d oc etworks Routing problem 1 2 Responsibility of a routing protocol etermining an optimal way to find optimal routes etermining a feasible path to a destination based on a certain

More information

Energy Efficient EE-DSR Protocol for MANET

Energy Efficient EE-DSR Protocol for MANET Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com

More information

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0

White Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0 White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network

Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network Expected Path Bandwidth Based Efficient Routing Mechanism in Wireless Mesh Network K Anandkumar, D.Vijendra Babu PG Student, Chennai, India Head, Chennai, India ABSTRACT : Wireless mesh networks (WMNs)

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

A Review paper on Routing Protocol Comparison

A Review paper on Routing Protocol Comparison A Review paper on Routing Protocol Comparison Ms. Aastha kohli 1, Mr. Sukhbir 2 1 M.Tech(CSE) (N.C College of Engineering, Israna Panipat) 2 HOD Computer Science Dept.( N.C College of Engineering, Israna

More information

Analysis of Routing Protocols in MANETs

Analysis of Routing Protocols in MANETs Analysis of Routing Protocols in MANETs Musica Supriya, Rashmi, Nishchitha, Ashwini C Shetty, Sharath Kumar Student, Dept. of CSE, SMVITM Bantakal, Karnataka, India Student, Dept. of CSE, SMVITM Bantakal,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind)

Wireless Internet Routing. Review of Wireless Networking (with Routing in Mind) Wireless Internet Routing Review of Wireless Networking (with Routing in Mind) 1 Review of Wireless Networking Architecture of wireless networks Wireless PHY Wireless MAC o 802.11 PHY: physical layer /

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon

Gurinder Pal Singh Chakkal, Sukhdeep Singh Dhillon A Review on Mobile Ad-Hoc Networks (MANET) Routing Protocols Gurinder Pal Singh Chakkal 1, Sukhdeep Singh Dhillon 2 Computer Science & Engineering 1, 2 Institute of Engineering & Technology Bhaddal, Ropar

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

More information

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) RESEARCH ARTICLE International Journal of Computer Techniques - Volume 2 Issue 1, 2015 OPEN ACCESS A Survey on Wireless Routing Protocols (AODV, DSR, DSDV) Sejal D Mello 1, Priyanka B. Patil 2, Tarannum

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Wireless and Mobile Communications

Wireless and Mobile Communications Wireless and Mobile Communications Outline Overview MAC Routing Wireless in real world Leverage broadcasting nature Wireless security 2 From Wired to Wireless The Difference: # 1 The Difference #2 Unicast

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

A Survey of Vehicular Ad hoc Networks Routing Protocols

A Survey of Vehicular Ad hoc Networks Routing Protocols International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 3 July 2013, pp. 829-846 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ A Survey

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

15-441: Computer Networking. Wireless Networking

15-441: Computer Networking. Wireless Networking 15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols By Josh Broch, David A. Maltz, David B. Johnson, Yih- Chun Hu, Jorjeta Jetcheva Presentation by: Michael Molignano Jacob

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information