PAPER ID: IJIFR/V 1/E 2/016

Size: px
Start display at page:

Download "PAPER ID: IJIFR/V 1/E 2/016"

Transcription

1 Dynamic Topology Maintenance in Unstructured Peer to Peer Overlay Networks J. Vijitha Ananthi 1, R.Hari Priya 2, R.Nithya 3, R.Karthikeyan 4 Assistant professor 1, Indus college of Engineering, Coimbatore, India Graduate Student 2, Indus college of Engineering, Coimbatore, India Graduate Student 3, Indus college of Engineering, Coimbatore, India Faculty of ECE 4, Indus college of Engineering, Coimbatore, India Abstract P2P networks are used for instant message communication, distributed computing and files sharing. In the present Internet world, computing communication is very difficult in centralized network compared to distributed system. Topology maintenance in MANET using Peer to Peer algorithm is used for maintaining the topology without any link failure in wireless networks. Here maintaining the topology in mobile ad hoc network via peer to peer overlay nodes. When mobility occurs, localization of node and node movement are the major issues. To overcome these issues proposed a new algorithm which is named as TPP- Topology Maintenance in Partial mesh in P2P overlay nodes will maintain the location of the mobile nodes in a distributed network and also easy to find out the location of node in a defined topology. The performance of this algorithm is compared with the existing algorithm which is analyzed in mobile condition with the speed of 20m/s. Keywords: Hop count, Unstructured overlay, Peer to peer network, QoS parameters 1 INTRODUCTION P2P overlay networks used for many features like easily can select the nearby peers, storage data, searching and finding a location, data permanence or guarantees, hierarchical structure, security and safely transmit the data through authentication. P2P network has existed for quite some time, it has only been popularized recently and will probably be subject to even bigger revolutions in the near future There are two types of peer to peer overlay one is structured and another one is unstructured overlay. Unstructured network do not provide any algorithm for organization or optimization of network connections. Structured peer-to-peer system is the pure network consists solely of equipotent peers. It s having only one routing protocol; it does not prefer nodes for any infrastructure. In structured peer-to-peer networks, connections in the overlay are fixed. In proposed algorithm we are using unstructured overlay, existing algorithm uses structured overlay. To overcome the issues of structured overlay, unstructured peer to peer network is used which is shown in figure1. Mesh topology will form like a full mesh topology or partial mesh topology. In Full Mesh topology each node is connected to every other node in the network. In Partial Mesh topology every node is not connected to each node in the network. Due to many interconnections much of the cable is required for implementation of mesh topology so it is quite expensive which is shown in figure 2. Here one node fails, remaining nodes maintain the connection. It doesn t bother about the node failure. So it s reliable and also it can easily coupled with star or ring topology to form a hybrid topology. Wireless mesh networks were originally developed for military applications and are typical of mesh architectures. Over the past decade 52

2 the size, cost, and power requirements of radios has declined, enabling more radios to be included within each device acting as a mesh node. Unstructured node Figure 1: Unstructured Network Mesh node Figure 2: Partial Mesh Network Peer to peer mobile mesh networks which form like a hybrid topology, in these individual nodes on each network connected to each other devices through radio range. The major problem occur in this are scalability. To reduce that here using partial mesh network. In fully mesh network occurs in optimal path due to this, it will produce scalability. 2 RELATED WORK Moscibroda et al. [1-7] extends the work of Fabrikant et al., examining the effect of the network creation game on P2P topologies. The hop count is replaced by the stretch as the distance metric and overlay links are directional; otherwise the model remains the same. The authors provide an upper and lower bound on the price of anarchy. They go on to prove that there exist cases for which no Nash equilibrium exists, meaning that even in the absence of peer churn, the topology will never stabilize. Chun et al. [8-11] simulate a P2P overlay creation game using Fabrikant et al. s model. The cost to each neighbor may be different (e.g., congested links have a higher cost), and the number of neighbors is bounded. The authors use a heuristic random local search algorithm to calculate the Nash equilibrium graphs. They show that without constraining the node degree, the resulting topologies are near-star configurations, in which a small number of nodes will maintain a large number of connections. This allows other nodes to free ride off of those nodes by connecting to them and achieving both a small number of connections and also a low distance Hassam Hossain et.al [12-15] Suggest the effects of using network coding in a P2P file sharing overlay in a cooperative mobile ad hoc network. Because there is no centralized authority and no infrastructure, a tracker node cannot be used, as is commonly done in P2P networks. Instead we make use of multicasting for efficient communication within the overlay. The algorithm presented, called Deluge, and uses the idea of a server node multicasting block, something that is impractical on the Internet, but is possible in MANETs. Therefore, nodes download files from the closest servers, which reduce overall network energy consumption. 53

3 3 PRELIMINARIES P2P networking has existed for quite some time; it has only been popularized recently and will probably be subject to even bigger revolutions in the near future. Napster was the first P2P application which really took off. The way it worked was quite simple: a server indexed all the files each user had. When a client queried Napster [12] for a file, the central server would answer with a list of all indexed clients who already possessed the file. Napster-like networks are known now as first generation networks. Such networks didn t have a complicated implementation and often relied on a central server (hybrid P2P). The central server model makes sense for many reasons: it is an efficient way to handle searches and allows retaining control over the network. However, it also means there is a single point of failure. When lawyers decided Napster should be shut down, all they had to do was to disconnect the server. a. Existing approach An existing algorithm which is TMP algorithm used to maintain the topology in mobile ad hoc networks. From this algorithm to find the minimum cost between the two peers using this below equation, (1) Where, Cn is the minimum cost between the two peers. E is the energy level of the neighboring peer and D is the stretch distance between the selected peer and initial peer. Distance based on the stretch. Stretch is defined as the ratio of number of physical hops to the shortest physical distance. The total cost is the sum of all peer costs b. TMP Algorithm 1. Connected graph G (V, E) 2. Overlay network graph G 1 (V, E) 3. Divide G (V, E) into G 1 (V, E) & G 11 (V, E) 4. G 1 Distributed of (V, E); G 1 G 5. G 11 Cluster MANET of (V, E); G 11 G 6. From G 11 (V, E), V 1 act as intermediate node 7. From G 1 (V, E) any node sends P to V 1 ; 8. If it receives A, it will form as G 1 (V, E) 9. Else it select V 2 node in G 11 (V, E) TMP Algorithm explains that G (V, E) is a whole network which is our input and G 1 (V, E) is overlay network which is our output. From that G (V, E), we have to split the networks as peer to peer network G 1 (V, E) and mobile ad hoc network G 11 (V, E). The peer to peer overlay, P2P network and MANET used to connect with one intermediate node. We used to select the MANET nodes for P2P overlay through that intermediate node alone. So we have to concentrate more on that intermediate node. They are using this intermediate link repeatedly for selecting the nodes in mobile ad hoc networks. When the intermediate node fails due to energy, we have to change the link to other node. In this paper, we have to find the minimal cost between the two peers, overlay the two networks we have to maintain the energy level of the intermediate nodes and maintain the topology. 54

4 4 PROPOSED WORK In proposed work estimates the new algorithm named as topology maintenance in partial mesh in P2P overlay (TPP) algorithm. Mesh networking has recently become popular in deploying wireless networks. Similarly with the growth of internet browsing, implementation of a P2P overlay for web caching has identified as a major requirement to reduce the latency of the web connect delivery and the network bandwidth. So emerging these two concepts together facilitates to overcome dynamic and mobility issues and deliver advantages to all the stake holders in the TPP algorithm which explains clearly below: c. TPP Algorithm 1. G 1 Unstructured overlay of (V, E); G 1 G 2. G 11 Wireless partial Mesh of (V,E);G 11 G 3. FromG 11 (V,E), node G 11 (E 1 ) as mobile node 4. G 11 (E 1 ) sends P to G 1 (E 1 ) G 1 (V,E) 5. From G 1 (E 1 ) sends A to G 11 (E 1 ) G 11 (V, E). 6. Instead of G 11 (E 1 ) as replace a new node as G 1 (E 1 ). TPP Algorithm explains the peer to peer overlay in wireless partial mesh network (POW). Input is unconnected graph G (V, E) which is divided into two networks one is unstructured overlay G 1 (V, E) another one is wireless partial mesh network G 11 (V, E). Here, both different networks having mobile nodes. The wireless mesh node change starts to move from one place to another place, the link will be failure between the mobile nodes. After a particular time new unstructured mobile node replace instead of mesh node and also it handover the link and starts to transmit the message which is shown in figure 3. Figure 3: Peer to Peer Overlay in Partial Mesh In figure 3 explains the peer to peer overlay in wireless partial mesh network, from this two different networks are bootstrapping each other, and to produce new network. Here, mesh and unstructured peer to peer networks having advantages and disadvantages. To overcome the issues of both network and to make the entire network useful. Here proposed TPP algorithm using unstructured peer to peer network for file 55

5 transferring. The main application is use as a network creation game. It doesn t have connectivity issue and it has a high throughput. 4 EXPERIMENTAL RESULTS The performance of our proposed TPP algorithm, and compare its performance to that of the benchmark algorithms. The heuristic algorithm was implemented in the network simulator ns The underlay topologies resulting from the simulation were then fed into the benchmark algorithms solver, which are written in the C++ programming language, to determine the minimum cost and TMP algorithm. d. PARAMETERS AND RESULTS In our simulations, we use 50 partial mesh nodes, with the number of nodes participating in a P2P overlay varying from 50 to 100 in increments of 10. The network area is 1000m 1000 m, the transmission rate is 54 Mbps, and the communication range is 240 m by default. The two-ray ground radio propagation models along with an omnidirectional antenna are used by all nodes. We use the random waypoint mobility model, with all nodes evenly distributed in the simulation area. Nodal velocities are distributed according to a uniform distribution, with a minimum 1m/s and a maximum 30m/s, and a uniformly distributed pause time with mean 60 s, thus mimicking a moderate walking pace with infrequent stops. The AODV [2] routing protocol is used for unicast routing. Goodput is defined as the ratio of number of data packets received to time. Mostly, goodput is lesser than compared to throughput. Throughput calculates all the messages including control packets but goodput analyze only the data packets. Figure 4: Goodput Figure 4 shows TMP algorithm having little much lesser because of ad hoc network transfer the messages based on hop count, during this delay increases packet delivery rate was reduced. In TPP algorithm having lesser amount packets delivered compared to TMP algorithm, because it supports the access point it reduces the packet delivery rate. 56

6 Figure 5: Packet Delivery Ratio Figure 5 shows the analysis of packet delivery ratio between two algorithms. Packet delivery ratio is defined as the ratio of number of received packets to the number of transmitted packets. In this PDR, when the number of nodes increases packet delivery ratio decreases due to mobility. Compared to peer to peer overlay in mobile ad hoc network, peer to peer overlay in partial mesh network have packet delivery ratio as very less. Initially each algorithm having 100% packet delivery ratio when the node starts to increase the size it will reduce up to 20%. Figure 6: Packet Dropping Ratio Figure 6 shows that the packet drop occurs due to the traffic, congestion or network failure. Here transmitting number of messages at that time topology may change, due to that link failure occur it produce number of packet loss. From this analysis, TPP algorithm has more drop rate compared to TMP algorithm. Initially each algorithm having 40% packet drop rate, size of the network increases, it starts to increase the dropping level. Figure 7: End to End Delay Figure 7 shows the end-to-end delay is the time it takes a packet to travel across the network from source to destination. In peer to peer overlay in mobile ad hoc network algorithm increasing the end to end delay when 57

7 the number of nodes increases. But in peer to peer overlay in unstructured overlay reducing the end to end delay when the number of node increasing. In TMP algorithm having end to end delay as constant, when the number of nodes increases because of MANET used to transmit the packets using hop-hop analysis and also when the mobile nodes moves out of coverage area it uses the marking scheme. Partial mesh network have more delay, because all the nodes in this algorithm are in mobile state. Figure 8: Hop count Figure 8 shows the hop count refers to the number of path through which messages pass between sender and receiver. Each router along the data path constitutes a hop, as the data is moved from one Layer 3 network to another. Hop counts are often useful to find faults in a network, or to discover if routing is indeed correct. In peer to peer overlay in partial mesh network having more hop count needed to reach the destination because of cluster head. In peer to peer overlay in mobile ad hoc network (TMP) algorithm reduced the hop count needs due to MANET act as intermediate node between peer to peer overlay. 5 CONCLUSION These two algorithms provide an examination of overlay construction and thus resilient from the maintenance of intermediate link energy between the peer to peer network and mobile ad hoc network. Mostly peer to peer networks have co-operative nodes in mobile ad hoc network, but in this algorithm some of the nodes act as selfish peers to minimize the energy consumption and also reduce the distance to their destinations. From this identify the QOS parameter of this proposed algorithm. The performance of this algorithm is compared to benchmark algorithm. Peer to peer overlay in Mobile ad hoc network (TMP) algorithm using only less amount of hop count between the source and destination. Compared to Topology Maintenance in P2P overlay in MANET (TMP) algorithm, Topology maintenance in P2P overlay in Partial Mesh network (TPP) algorithm is more stable and feasible in throughput, packet delivery ratio and hop count. This approach uses the link based on minimum cost and high level energy. It is efficient topology maintenance for peer to peer overlay in partial mesh network. It may reduce the total cost network-wide. It reduce the energy consumption and to improve the response time and reliability. 58

8 6 REFERENCES [1] Afzal Mawji, Hossam S. Hassanein. Efficient Multipoint P2P File Sharing in MANETs. GLOBECOM'2009. pp.1~6. [2] Andersen D, Balakrishnan H, Kaashoek F, Morris R. Resilient overlay networks. In: Proceedings of the eighteenth ACM symposium on operating systems principles. ACM Press; P [3] Andrzejak A, Xu Z. Scalable efficient range queries for grid information services. In: Proceedings of second international conference on peer-to-peer computing. IEEE Computer Society; P [4] Chawathe Y, Ratnasamy S, Breslau L, Lanham N, Shenker S. Making Gnutella-like P2P systems scalable. In: Proceedings of the 2003 conference on applications technologies architectures and protocols for computer communications (SIGCOMM). ACM Press; P [5] Cheng A-H, Joung Y -J. Probabilistic file indexing and searching in unstructured peer-to-peer networks. Computer Networks 2006; 50(1): [6] Chung F R K, Graham R L. Erdosongraphs: his legacy of unsolved problems. A K Peters, Ltd.; [7] Ganesan P, Gummadi K, Garcia-Molina H. Canon in G major: designing DHTs with hierarchical structure. In: Proceedings of the twenty-fourth international conference on distributed computing systems. IEEE Computer Society; p [8] Garces-Erice L, Biersack E W, Ross K W, Felber P A, Urvoy Keller G. Hierarchical P2P systems. In: Proceedings of the ninth European conference on parallel processing science (Euro-Par). Lecture notes in computer science, vol Berlin: Springer; P [9] Joung Y-J, WangJ-C.Chord2: A two-layer chord for reducing maintenance overhead via heterogeneity. Computer Networks 2007; 51(3): [10] Kermarrec A-M, Massoulie L,GaneshA J. Probabilistic reliable dissemination in large-scale systems. IEEE Transactions on Parallel and Distributed Systems 2003; P: [11] Kostoulas D, Psaltoulis D, GuptaI, Birman K, Demers A. Decentralized schemes for size estimation in large and dynamic groups. In: Proceeding of the 4th IEEE international symposium on network computing and applications (IEEENCA), July 2005: p [12] Liben-Nowell D, Balakrishnan H, Karger D R. Analysis of the evolution of peer-to- peer systems. In: Proceedings of the twenty-first annual symposium on principles of distributed computing. ACMPress; P [13] Liben Nowell D, Balakrishnan H, Karger D R. Observations on the dynamic evolution of peer-to-peer networks. In: Proceedings of the first international workshop on peer-to-peer systems. Lecture notes in computer science, vol Berlin: Springer; P [14] Loo B T, Huebsch R, StoicaI, Hellerstein J M. The case for a hybrid P2P search infrastructure. In: Proceedings of the 3 rd international workshop on peer-to-peer systems, February 2004: p [15] Lu E J L, Huang Y F, Lu S C. M l chord: A multi-layered p2p resource sharing model. Journal of Network and Computer Applications 2009; 32(3): P:

9 About Authors Ms. J. Vijitha Ananthi received the Master s degree in communication System from Karunya University, India. Currently she is working as an Assistant Professor at Indus College of engineering, Coimbatore, India. Her interests are in overlay in wireless networks. She publishes more research articles in the journals. R. Haripriya is a PG Scholar of Indus College of Engineering, Coimbatore, India. Her research interests are in the field of Networking, VLSI, Signal Processing, Bio- Medical, and Image Processing. R. Nithya is a PG Scholar in Indus College of Engineering, Coimbatore, India. Her research interests are in the field of Networking, VLSI, Signal Processing, Bio-Medical, and Image Processing. R. Karthikeyan is a lecturer of Indus College of Engineering, Coimbatore, India. His research interests are in the field of Networking, VLSI, Signal Processing, Bio-Medical, and Image Processing. 60

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

An Adaptive and Optimal Distributed Clustering for Wireless Sensor

An Adaptive and Optimal Distributed Clustering for Wireless Sensor An Adaptive and Optimal Distributed Clustering for Wireless Sensor M. Senthil Kumaran, R. Haripriya 2, R.Nithya 3, Vijitha ananthi 4 Asst. Professor, Faculty of CSE, SCSVMV University, Kanchipuram. 2,

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

Characterizing Traffic Demand Aware Overlay Routing Network Topologies

Characterizing Traffic Demand Aware Overlay Routing Network Topologies Characterizing Traffic Demand Aware Overlay Routing Network Topologies Benjamin D. McBride Kansas State University Rathbone Hall Manhattan, KS Email: bdm@ksu.edu Caterina Scoglio Kansas State University

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS

IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS IMPLEMENTING P2P RESOURCE SHARING APPLICATIONS IN WIRELESS MESH NETWORKS Dr.N.Kumareshan 1, Mr.N.Prakash 2 2 Assistant Professor (SG), 2 Assistant Professor 1,2 Department of ECE, 1 Sri Shakthi Institute

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol Original Article Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol P. Kalaivani* 1, G. Sathya 1 and N. Senthilnathan 2 1 Assistant Professor, SNS College of Engineering,

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks , pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization

An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization 214 An Intelligent Mesh Based Multicast Routing Algorithm for MANETs using Particle Swarm Optimization E. Baburaj 1, and V. Vasudevan 2 1. Research Scholar, Anna University 2. Professor, Department of

More information

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET

Performance Evaluation of DSDV, DSR AND ZRP Protocol in MANET Performance Evaluation of, AND Protocol in MANET Zaiba Ishrat IIMT Engg college,meerut Meerut, India Pankaj singh Sidhi vinayak Group of College,Alwar Alwar,Rajasthan Rehan Ahmad IIMT Engg college,meerut

More information

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different

and coverage as the nodes can act both as clients and routers. In this paper, the clients are distributed using four different ISSN: 0975-766X CODEN: IJPTFI Available Online through Research Article www.ijptonline.com PERFORMANCE ANALYSIS FOR WIRELESS MESH NETWORK CONSIDERING DIFFERENT CLIENT DISTRIBUTION PATTERNS S.Dhivya #1,

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011

Lecture 6: Overlay Networks. CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 Lecture 6: Overlay Networks CS 598: Advanced Internetworking Matthew Caesar February 15, 2011 1 Overlay networks: Motivations Protocol changes in the network happen very slowly Why? Internet is shared

More information

Making Gnutella-like P2P Systems Scalable

Making Gnutella-like P2P Systems Scalable Making Gnutella-like P2P Systems Scalable Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, S. Shenker Presented by: Herman Li Mar 2, 2005 Outline What are peer-to-peer (P2P) systems? Early P2P systems

More information

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique P. Rathiga Research Scholar, Department of Computer Science, Erode Arts & Science College,

More information

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

More information

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

More information

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network

Impact of Pause Time on the Performance of DSR, LAR1 and FSR Routing Protocols in Wireless Ad hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 2, February 2015,

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Performance Evaluation of ASMR with QRS and RZLSR Routing Scheme in Mobile Ad-hoc and Sensor Networks

Performance Evaluation of ASMR with QRS and RZLSR Routing Scheme in Mobile Ad-hoc and Sensor Networks , pp. 43-50 http://dx.doi.org/10.14257/ijfgcn.2014.7.6.05 Performance Evaluation of ASMR with QRS and RZLSR Routing Scheme in Mobile Ad-hoc and Sensor Networks Anna Saro Vijendran 1 and J. Viji Gripsy

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor [Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

DESIGN OF DISTRIBUTED, SCALABLE, TOLERANCE, SEMANTIC OVERLAY CREATION USING KNOWLEDGE BASED CLUSTERING

DESIGN OF DISTRIBUTED, SCALABLE, TOLERANCE, SEMANTIC OVERLAY CREATION USING KNOWLEDGE BASED CLUSTERING DESIGN OF DISTRIBUTED, SCALABLE, TOLERANCE, SEMANTIC OVERLAY CREATION USING KNOWLEDGE BASED CLUSTERING Ms. V.Sharmila Associate Professor, Department of Computer Science and Engineering, KSR College of

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks

A Comparative Study of Routing Protocols for Mobile Ad-Hoc Networks Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

A Scheme of Multi-path Adaptive Load Balancing in MANETs

A Scheme of Multi-path Adaptive Load Balancing in MANETs 4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Peer-to-Peer Streaming Systems. Behzad Akbari

Peer-to-Peer Streaming Systems. Behzad Akbari Peer-to-Peer Streaming Systems Behzad Akbari 1 Outline Introduction Scaleable Streaming Approaches Application Layer Multicast Content Distribution Networks Peer-to-Peer Streaming Metrics Current Issues

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Implementation: Detection of Blackhole Mechanism on MANET

Implementation: Detection of Blackhole Mechanism on MANET Implementation: Detection of Blackhole Mechanism on MANET Mr. Vishwajith M V 1, Pratik Sanjel 2, Pranish Pokharel 3, Kshetiz Pokhrel 4 1 Assistant professor Information Science & Engineering Department,

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

QoS Based Evaluation of Multipath Routing Protocols in Manets

QoS Based Evaluation of Multipath Routing Protocols in Manets Advances in Networks 2017; 5(2): 47-53 http://www.sciencepublishinggroup.com/j/net doi: 10.11648/j.net.20170502.13 ISSN: 2326-9766 (Print); ISSN: 2326-9782 (Online) QoS Based Evaluation of Multipath Routing

More information

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS

CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS http:// CLUSTERING BASED ROUTING FOR DELAY- TOLERANT NETWORKS M.Sengaliappan 1, K.Kumaravel 2, Dr. A.Marimuthu 3 1 Ph.D( Scholar), Govt. Arts College, Coimbatore, Tamil Nadu, India 2 Ph.D(Scholar), Govt.,

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer 908 JOURNAL OF NETWORKS, VOL. 9, NO. 4, APRIL 2014 Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer Sri Wahjuni, A.A.Putri Ratna, and Kalamullah Ramli Department of

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Introduction to Peer-to-Peer Systems

Introduction to Peer-to-Peer Systems Introduction Introduction to Peer-to-Peer Systems Peer-to-peer (PP) systems have become extremely popular and contribute to vast amounts of Internet traffic PP basic definition: A PP system is a distributed

More information

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang

CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 21: Overlay Networks Chap 9.4 Xiaowei Yang xwy@cs.duke.edu Overview Problem Evolving solutions IP multicast Proxy caching Content distribution networks

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Al-Baadani, Faris., Yousef, S., Tapaswi, S., Patnaik, K. K., and Cole, M Faculty

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR) Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR) Amandeep Kaur 1, Jasmeet Kaur 2, Nishu Kansal 3 1, 2, 3 (ECE, Guru Nanak Dev Engineering College Ludhiana, India) ABSTRACT:

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK

STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,

More information

A Square Root Topologys to Find Unstructured Peer-To-Peer Networks

A Square Root Topologys to Find Unstructured Peer-To-Peer Networks Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 2 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today

Peer-to-Peer Systems. Network Science: Introduction. P2P History: P2P History: 1999 today Network Science: Peer-to-Peer Systems Ozalp Babaoglu Dipartimento di Informatica Scienza e Ingegneria Università di Bologna www.cs.unibo.it/babaoglu/ Introduction Peer-to-peer (PP) systems have become

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud

Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud 571 Co-operative Scheduled Energy Aware Load-Balancing technique for an Efficient Computational Cloud T.R.V. Anandharajan 1, Dr. M.A. Bhagyaveni 2 1 Research Scholar, Department of Electronics and Communication,

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information