TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks

Size: px
Start display at page:

Download "TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks"

Transcription

1 TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic of Korea {kimjaebum, daeuky, Abstract Content Centric Networking, which has simple data delivery procedures without using IP addresses, can improve content dissemination in wired networks and wireless Mobile Ad Hoc Networks (MANETs). However, the performance of CCN can be constrained in MANETs due to broadcast storming during content dissemination. Moreover, multiple content providers existing in MANET increase content announcement overhead. To solve these problems, we propose a TOPology aware CCN protocol (TOP-CCN). TOP-CCN employs the Multiple Point Relay (MPR) based packet flooding, the Publisher MPR (PMPR) based merged content announcement, and the expected hop count based flooding range control algorithm to reduce multiple content announcement overhead and broadcast storming problem. The simulation results show that TOP-CCN outperforms not only the pure CCN but also its variation in terms of content availability, network overhead, and content downloading time. (Abstract) Keywords Content Centric Networking; Content Announcement; Broadcast Storming; MANETs (key words) I. INTRODUCTION Multimedia data and consumer-generated data traffic are rapidly growing day by day due to the increasing population of smart, mobile devices. Despite these advancements in multimedia applications, the traditional IP-based Internet protocols are still utilized to service these overflowing amounts of data transactions. The problem is that the current Internet protocols do not effectively handle content requests from customers due to the address-content binding process overhead such as domain name service, end-to-end session based data delivery architecture [1]. In order to overcome this problem, several Information Centric Networking (ICN) architectures have been proposed in recent years. The Content Centric Networking (CCN) [2] is one of the famous ICN approach that does not use the IP address and endto-end sessions for data dissemination. When a consumer node wants to get a content item, the node broadcasts an interest packet containing the content name. If a provider node has the requested content item, it transmits the content item as a reply to the requester through the incoming face 1 of the interest packet. Otherwise, it rebroadcasts this interest packet to search for another node that may possess the content item. Throughout these content request and delivery procedures, intermediate nodes between the content provider node(i.e., source node of the content item) and the consumer node are able to temporally store (i.e., cache) the delivered content item to reduce the path length and the downloading time. To ensure 1. The notation of the face includes legacy network interfaces as well as the interface with application(s) in the node [2]. these advantages in wireless networks, CCN over MANET has been demonstrated in a few works of recent years [3-6]. In tactical and emergency MANET, every node can generate unique contents such as surveillance video, voice, emergency message, etc. Thus, every node can be a content provider. To advertise their contents, each node generates considerable amounts of content announcement messages and content discovery messages, which in turn causes broadcast storming and duplication in packet transmission. However, various existing works in CCN cannot exploit these problems to support more efficient data dissemination in these MANET environments. In this paper, we propose a novel topology aware CCN, called TOP-CCN to support multiple content providers in MANETs. TOP-CCN employs Multiple Point Relay (MPR) based packet forwarding, publisher MPR (PMPR) based proactive content discovery, and flooding range control algorithms based on 1-hop and 2-hop neighbor information. In TOP-CCN algorithm, every node periodically elects its MPR, and PMPR through 1-hop broadcast content announcement message. Multi-hop content announcement message from the selected PMPR is broadcasted through MPR to reduce the number of flooding messages of the network. Based on a simulation study using ndnsim [13], we show the improved performances of our proposal in terms of content availability, network overhead, and content downloading time, compared to other related works. II. BACKGROUND: CONTENT CENTRIC NETWORKING The CCN has two packet types of interest and content [2]. Also, it defines three types of data structure: the Forwarding Information Base (FIB), the Pending Interest Table (PIT), and the Content Store (CS). The FIB has a content prefix of content provider and the list of outgoing faces that are configured by a content prefix announcement from the content provider to forward interest packets. The PIT keeps track of the forwarded interest packet towards the content provider. By using the PIT, a content packet can be delivered to the content requester node called a consumer. Whenever an intermediate node receives a content packet, it stores the packet in its CS. In CCN, the interest and content forwarding process consists of content discovery, content delivery and content caching. A. Content discovery If a consumer wants to receive a content item, the consumer broadcasts interest packet with the content name that contains /13/$ IEEE ICON 2013

2 prefix of the content provider. In addition, the outgoing face information of the content provider is utilized to broadcast interest packet. If the node has not any content prefix and outgoing information of the content item in its FIB, then the interest packet is discarded [2]. The information of the FIB can be updated by various approaches such as proactive content announcement, reactive content discovery schemes, or manual setup by network managers [2, 7]. B. Content delivery and caching Content packet simply follows the chain of PIT entries to the requester node. Upon content packet arrival, each node lookups the content name of content packet using longestprefix matching [2]. If the node already has the same content packet in its CS, the packet is discarded. If the node has outgoing face information of the received content packet in its PIT, the content packet will be rebroadcasted through face information. In addition, the content packet is stored to CS of the node to ensure content cache effect. CCN provides innetwork caching functionality to achieve efficient content delivery [8]. In the CCN, every node has own CS to reduce the path length between the content provider and each consumer nodes. If a node receives a content packet from the neighbor, then content is stored in its CS using a caching policy that considers content popularity, freshness, etc [2]. III. RELATED WORKS The CCN can be a promising solution for content dissemination not only in wired networks but also in wireless networks such as MANET. In MANET environments, network robustness is dynamically changed due to interference, fading, and node mobility. Thus, end-to-end session based data dissemination and location or IP address based content path is frequently disconnected. The advantages of the CCN over MANET are as follow. First advantage is a mobility support without IP re-assigning. In traditional IP based wireless network, a mobile node that moves from a contended gateway another gateway must change or re-obtain new IP address to avoid IP conflict problem. Thus, IP address and end-to-end session based data communication services suffer from route disconnections. The CCN eliminates the complexity of IP reassignment and disconnection problems in mobile wireless networks by removing IP address. The other advantage is the reduced transmission overhead by in-network caching described in section II-C. To ensure these advantages in MANET, a few works have been presented in recent years. Soon Y. Oh designed a CCN for tactical and emergency MANETs [5], called MANET CCN. To solve broadcast storming problem, MANET CCN utilizes the overhearing mechanism. When a node overhears a neighbor s interest packet, then the node aggregates the interest information. In addition, content reply mechanisms help to avoid packet collision. There are two types of messages, such as Reply and Request. A provider sends a Reply in response to the interest packet, and waits for a Request from the consumer before delivering the content. In MANET CCN, content items can be classified as situation based (e.g., temporal and spatial) items and topic based content items. Situation content items have higher priority than topic content items because they includes location and time information. Thus, situation content items are quickly disseminated even though there are no request. M. Varvello et al. [7] analyzed the content availability performance and the routing cost of the various design of CCN over MANET approaches such as reactive, proactive and geographical through analytical model. According to this study, the optimal performance of reactive flooding approaches has the best content availability performance and the highest routing overhead. However, this result does not consider node mobility, interference, traffic size, and multiple content provider environments. M. Amadeo et al. [6] present a CCN based MANET protocol named E-CHANET that performs reactive based routing, forwarding, and reliable transport functions. In contrast with above algorithms, E-CHANET tries to solve not only the broadcast storming problem but also the channel unreliability and disruption through the extended content request and delivery procedures of the pure CCN. In E- CHANET uses counter-based suppression mechanism before the packet transmission. When a node hears the same packet that has the same content prefix or content item, then packet is discarded for eliminating duplicated transmission. However, the consumer node does not effectively receives content packet in mobile environment due to topology dynamicity of the node caused by node mobility, and eliminated duplication packet. In addition, E-CHANET considers only a fixed single content provider. It is unsuitable assumption for MANETs. P. Sharma et al. [3] proposed a MANET-aware CCN algorithm on Android smartphones using Wi-Fi and Optimized Link State Routing (OLSR). This algorithm focuses on the message dissemination efficiency in highly mobile environments. To provide the higher probability of message delivery, MANET-aware CCN selects MPRs as content forwarding delegate. MPR can provide higher and optimized reachability to other nodes. MANET-aware CCN is based on CCN overlays because it brings the MANET optimizations for neighbor node reachability. Authors implemented two CCN overlays over OLSR using Haggle [10]. For the first overlay, they kept Haggle s native algorithm for message forwarding. However, they removed link sensing and neighbor discovery function from Haggle CCN because OLSR already provides these functions. For the second overlay, the first overlay is extended by proposed MPR-aware forwarding algorithm. However, MANET-aware CCN uses the IP address to maintain neighbor information. IV. THE PROPOSED SCHEME Our TOP-CCN is designed to reduce the broadcast storming problem and to enhance the stability of content delivery in IEEE based MANETs. To ensure robust content discovery, the TOP-CCN utilizes a proactive MANET routing approach [7]. Every node in TOP-CCN periodically broadcasts a content announcement (CA) packet, which contains the prefix information of the neighbor and sender. Thus, every node periodically updates its FIB table, 1-hop neighbor and 2-hop neighbor information to improve the accuracy of the face information. Moreover, TOP-CCN reduces the amount of packet flooding by employing three

3 novel algorithms such as MPR, PMPR, and flooding range control. A. TOP-CCN packet types TOP-CCN extends several attributes of the pure CCN packet format, which are interest and content packets. In addition, we introduce a new CA packet as shown in Table 1. This new packet has nine fields such as content prefix, ID, type, neighbor prefix list (NBR-PL), neighbor list (NBR-L), neighbor type list (NBR-TL), HOP count, cache hit ratio, and CA type. Content prefix is the name of the content provider that is assigned by the network manager or the prefix assignment algorithm [2]. ID is unique identifier of the node such as MAC address. Type attribute represents the type of the relay policy of the node. Its default value is non-mpr, which means that the CCN packet cannot be rebroadcasted. If some node is elected as a MPR by neighbor(s), then the node can rebroadcast the received CCN packet, and its type attribute is set to MPR notifying the flooding policy of the node. NBR-L is a ID list of the neighbor(s) gathered by the received CA message from neighbor(s). NBR-TL represents the type list of neighbor(s) such as MPR or not. More details of each type will be described later in Section IV-C. NBR-PL is a list of content prefixes of the entire neighbors. HOP count is the forwarded count of the packet that is increased by each forwarding node. Every node periodically measures a cache hit ratio during a period of time t. Cache-hit ratio is shown as the content reply ratio among the entire requested content items. When a node has fresh or popular content items in its CS, then the cache-hit ratio will be measured as a high value. When a node receives a CA packet from one of its neighbors, then 1-hop neighbor table, 2-hop neighbor table, and FIB are being sequentially updated. CA type attribute represents the type of the flooding policy of the CA message such as 1-hop limit and TABLE 1. TOP-CCN PACKET TYPES Content Announcement Packet Content prefix (n) Content Prefix of the node ID (48bit) Node identifier (MAC address, etc.) Type (1bit) MPR or not Neighbor prefix list (n) Content prefix list of the neighbor(s) Neighbor ID list (n) ID list of the neighbor(s) Neighbor type list (n) Type list of the neighbor(s) HOP count (8bit) Number of forwarded hops of the packet Cache-hit ratio (8bit) Cache-hit ratio of the node CA type (1bit) Flooding type (0:single-hop / 1:multi-hop) Content data packet Cons: Consumer node, Prov: Content provider node Content name (n) Signature (n) Signed info (n) ID (48bit) Expected HOP (8bit) HOP count (8bit) Data payload (n) Interest Packet Content Name (n) Selector (n) Nonce (n) ID (48bit) Expected HOP (8bit) HOP count (8bit) Full prefix of the content item Digest algorithm, witness, etc Publisher ID, Key locator, etc... Node identifier of the content requester HOP distance between Cons and Prov. Number of forwarded hops of the packet Actual Data, length is variable Cons: Consumer node, Prov: Content provider node Full prefix of the content item Order preference, publisher filter, etc. Duplication prevention code Node identifier of the consumer HOP distance between Cons and Prov. Number of forwarded hops of the packet n): The size is variable depending on the number of neighbors and prefix multi-hop flooding. Both interest and content packets of the TOP-CCN have three extended fields such as the ID, expected hop, and the hop count. ID is the unique identifier of the sender such as consumer or provider of the packet. The expected hop represents the distance between the consumer and the content provider. The expected hop in the interest packet and the content packet are updated by the sender and relay nodes to limit the flooding range of the packet. B. Topology information tables update To ensure stable content delivery and discovery in wireless MANET environments, TOP-CCN defines the two tables for maintaining 1-hop and 2-hop neighbor information, respectively. The 1-hop neighbor table contains ID and lifetime of the node, whereas the 2-hop neighbor table includes 2-hop neighbor ID, connected 1-hop neighbor ID, and lifetime of the 2-hop neighbor. Both table information are periodically updated from the information of the received CA packets. The lifetime of the neighbor information is periodically initialized by CA message from the neighbor. When a lifetime of neighbor is expired, then the relative 1-hop and 2-hop neighbor information is removed. In addition, face information in the FIB and PIT is removed to prevent any wrong content delivery. C. MPR selection to reduce packet flooding overhead In CSMA/CA based wireless MANET environments, broadcast transmissions may incur potential problems such as the congestion and collision due to the shared medium characteristics [4]. However, CCN only considers the broadcasting approach to transmit packets. To mitigate the collision and congestion problem in CCN over MANET, TOP- CCN selects a MPR set that can disseminate its received packets such as interest, content, and multi-hop CA packets. To select MPR, every node periodically calculates MPRcost using equation (1), MPRcosti = (1 α) 2hRatio i + α ChachehitRatio i (1) (0 α ) where i is the neighbor number, 2hRatio i represents the ratio of the 2-hop neighbor connectivity ratio of the neighbor i. For example, a node has six 2-hop neighbors and its neighbor i has three neighbors, then 2hRatio of interface i is 0.5. If a neighbor i has the same number of neighbors as the number of 2-hop neighbors of the node, 2hRatio i is 1. CachehitRatio i is given by CA packet from the neighbor i. We use an exponential weighted moving average (EWMA) method to reflect not only network connectivity but also cache effect in MPRcost [6]. When a node needs to remove or add an entry in the 1-hop and 2-hop neighbor tables, then the MPR selection procedure will be invoked. The MPR selection algorithm is shown as algorithm 1. MPR nodes are elected among 1-hop neighbors of the node. First, a node selects its MPR node that has the highest MPRcost between neighbors. After selection of the MPR, all 2-hop neighbors that are connected through MPR are removed from the 2-hop neighbor list. When a node find remaining 2-hop neighbor, then additional MPR nodes are elected until 2-hop neighbor list is empty. If the node does not have any remaining 2-hop neighbors, then the selected MPR

4 Fig. 1. An example of MPR selection for reducing packet flooding of the CCN list is notified through NBR-TL in the CA message. Thus, every node in the network can decide the node type, which are MPR or not through the NBR-TL of the CA message from the neighbor(s). Fig. 1 shows an example of the MPR selection using CA packets. In Fig. 1(a), node 0 selects MPR nodes 1 and 4 to cover its 2-hop neighbors of nodes 2, 3, 7, and C. Following the same reason, every node selects its own MPR set as Fig. 1(b) to (c), respectively. After MPR selection, the entire MPR set of the topology is selected as Fig. 1 (d). All broadcast messages are relayed only by the MPR nodes. Thus, broadcast storming and duplicated transmission can be far relieved. D. PMPR selection to reduce CA flooding overhead In TOP-CCN, a CA packet has two types of prefix information such as content prefix of the sender and the neighbor content prefix list of the sender. When a node receives a CA packet, the content prefix list and the neighbor prefix list in the CA are inserted to FIB with received face information. In addition, 1-hop and 2-hop neighbor tables are updated using NBR-L, NBR-TL, and NBR-PL in the CA as describe in Section IV.B. Thus, a neighbor who receives a CA packet from its 1-hop or multi-hop neighbors can get the several prefix information of the neighbors of the sender. However, the proactive CA flooding increases network overhead such as packet collision, and congestion [11]. To Algorithm 1 MPR selection for limited flooding CA, interest and content packet of the TOP-CCN MPR{n} = Set of MPR CN{n}= Set of connected neighbor by MPR 2HOPNBR{n} = set of 2hop neighbor node MPR={ } CN={ } Repeat MPR {n} 1hop_neighbor that has the highest MPRcost among 1hop_neighbors CN{n} connected neighbors by MPR{n} Remove CN{n} from 2HOPNBR{n} until size of 2HOPNBR{n} == Fig. 2. An example of PMPR selection and aggregated prefix information of the multi-hop CA in TOP-CCN reduce the number of CA packet flooding, TOP-CCN selects PMPR nodes who are allowed to broadcast multi-hop CA messages. If the flooding type attribute of the received CA has single-hop value as 0, then the CA is not rebroadcasted. Multihop CA is generated only by the PMPR who has the largest number of neighbors among 1-hop MPRs. If the MPR node does not receive its neighbors prefix information during t, then the MPR is changed as PMPR to notify neighbor(s) prefix information to the network. Thus, content prefix information of the entire content provider in the network can be announced by only few multi-hop CA messages generated by PMPR. The PMPR selecting algorithm is started by 1-hop and 2- hop table information change, and deals with three cases as shown in algorithm 2. The first is the absolute case. If a MPR node cannot find any MPR neighbor in its 1-hop neighbor table, then the MPR node itself becomes a PMPR for broadcasting multi-hop CA packet to the network. The second is the recovery case. If the MPR node cannot find content prefixes of the neighbor(s) from received CA packets during 6 seconds, then MPR also becomes a PMPR to notify neighbor(s) prefixes. The third is the competition case. When a MPR finds neighbor MPR list from its 1-hop neighbor table, it compares the number of neighbors between MPR and MPR list. If the MPR has the largest number of neighbors than all the neighbors, the MPR node will become the PMPR. Fig. 2 shows an example of PMPR selection. In this figure, PMPR set is 4, C, and 5 because they have the largest number of neighbors between each neighbor MPRs, respectively. Thus, Algorithm 2 PMPR selection for minimized CA flooding MPRNBR{n} = set of the entire MPR type neighbors MPR = MPR type neighbor NofNeighbors = The number of neighbors of the current node CA flooding type of the node = MPR: single_hop:0 if (current node type is MPR MPRNBR{n} == ) CA flooding type of the node=pmpr:multi_hop:1 then return; if (does not receive prefix information of neighbor until t) CA flooding type of the node=pmpr:multi_hop:1 then return; Repeat MPR first neighbor in the MPRNBR{n} if (The number of neighbors of the MPR < NofNeighbors) Remove MPR from MPRNBR{n} else CA flooding type of the node=pmpr:multi_hop:1 then return; until MPRNBR {n} ==

5 only three nodes in the network generate multi-hop CA messages. In addition, a multi-hop CA message is only relayed through MPR nodes in the network. Thus, network overhead of the proactive content announcement can be reduced in TOP- CCN. E. Flooding range control using expected hop distance Generally, CCN packets are flooded to the entire network using FIB and PIT information for reliable content requests and deliveries. However, the unlimited packet flooding induces high network congestion and collision in MANET environments due to the inaccuracy of the FIB and PIT information caused by node mobility [12]. To solve this problem, we suggest an expected hop based flooding range control algorithm. Expected hop distance between the packet sender and the destination such as content provider and consumer is measured by multi-hop CA messages from the PMPR. When a node receives a multi-hop CA message from its neighbor(s), the receiver node updates the content prefix, outgoing face, and the expected HOP count information in the FIB table. Thus, the expected hop attribute of the interest and content packets can be filled using expected hop information in the FIB. If the node receives an interest or content packet from its neighbor, then it compares the expected hop count value between FIB and received packet. If the node has the same or lower expected hop count, the packet can be flooded into the network. When the expected hop count of the packet is lower than its own hop count, the packet will be discarded. V. PERFORMANCE EVALUATION In this section, we present performance evaluation studies such as reduced content dissemination delay, control message overhead, and increased accuracy of the face information in the PIT and FIB. To evaluate the performance of TOP-CCN comparing with pure CCN [2] and E-CHANET [7] in MANET environments, we utilize the ndnsim with ns-3 [13]. Simulation parameters are presented in Table 2. The content request rate (interest rate) of the consumer is fixed to 1,000 per second. In addition, each consumer requests different content items to multiple content providers in the network. A. Flow analysis using network simulator visualizer. In the first simulation scenario, we verify our implementation and performance of the proposed scheme TABLE 2. SIMULATION PARAMETERS Parameter Value PHY IEEE g 18Mb/s Content Providers/Consumers 16/16 nodes (32 nodes) Topology Size 500 x 500 m. Random topology Velocity 1 to 4 m/s (Random waypoint) MPRcost parameters t: 4 sec, : 0.5 CA interval 2 seconds Transmission Range 25 m (indoor model) Simulation Time 600 Seconds Number of Simulations 50 times per each scenario Chunk size / Content size Num.of Contents popularity dynamicity Cache replacement policy 10 kb / 1 MB 100 Zipf s distribution LRU (a) Pure CCN over MANET (b) TOP-CCN over MANET Figure 3. The number of flooding message (interest/data) comparison in single consumer scenario using ns-3 visualization tool through ns-3 network visualizer that can show the packet flow of the entire network with real-time simulation [13]. We use the 8x4 grid topology for the simplicity. Content requester is node 31 and content provider is node 5. Fig. 3 shows the flow snapshot of flooding packets in each scheme, which are pure CCN in MANETs, TOP-CCN without flooding range control and TOP-CCN with flooding control. A red circle represents a CCN node and a green arrow shows a packet flow. In Fig. 3- (a), packet flows of pure CCN should fill out entire network to find the content provider and to reply the requested content. However, TOP-CCN as Fig 3-(b) dramatically reduces the number of flow by exploiting MPR and PMPR strategy. In this figure, the almost edge nodes in the network do not rebroadcast interest and content packet. In addition, flooding range is effectively limited through the expected hop count measured by CA messages from the entire node. B. Content availability, overhead, and delay comparison. Content availability represents the accuracy of the face information, which is deeply depending on the velocity of the node. When a node receives an interest packet from one of its neighbors, the incoming face information is added to reply the corresponding content packet to sender. However, in wireless MANET environments, incoming face information is not stable due to the link disconnections. Fig. 4 shows the average content availability depending on the node mobility. In this figure, TOP-CCN shows the highest content availability through CA based topology information update. If a node does not receive any CA packet from the connected neighbor during 6 seconds, the corresponding face information of a neighbor is removed to prevent packet loss and transmission overhead. The performance of TOP-CCN with flooding range control algorithm is slightly decreased through the limited interest and content packet flooding. Fig. 5 shows the network wide

6 smallest delay until 5 consumers scenario. However, 10 and 16 consumers environments, TOP-CCN with flooding range control shows the lowest delay due to the increased content availability and reduced network overhead. Fig. 4. Average content availability vs. velocity of the node. VI. CONCLUSION The future of CCN is very promising, as it is becoming the next-generation networking technology for efficient content dissemination in MANETs. Anticipating this trend, we present a topology aware CCN routing algorithm for MANETs. Our algorithm does not need TCP/IP stack to manage the topology and neighbor information. In addition, the suggested proactive based content discovery approach is used to improve content availability. Performance evaluation is conducted using ndnsim with ns-3. The simulation result shows that our proposal incurs more decreased flooding overhead, decreased content delivery time and increased content availability compared to other schemes. In the future, we will optimize TOP-CCN with CA interval control and content priority based rate control algorithms. Fig. 5. Request message (interest and content announcement) flooding overhead of the network in 4 m/s velocity environment. Fig. 6. Average content downloading time vs. consumers in 4 m/s velocity environment. overhead of the request message. In this figure, CCN over MANET shows the 8 Mb/s due to the uncontrolled message flooding. E-CHANET shows the highest performance until five consumers due to the overhearing and interest aggregation algorithm. However, its performance decreases in high congestion environment due to inaccuracy of the content availability. Thus, interest retransmission is dramatically increased in E-CHANET. Even if TOP-CCN uses the proactive CA approach, it shows the lowest overhead as 2.4 Mb/s in 15 consumer/provider environments due to the increased content availability. The average content downloading time is shown in Fig. 6. The performance is measured by a summation of 10 packet s delay because a content item is fragmented into 10 packets. The delay performance of the E-CHANET has the ACKNOWLEDGMENT This research was supported by the MSIP, Korea, under the ITRC support program supervised by the NIPA (NIPA (H ) and Basic Science Research Program through the NRF funded by the Ministry of Education (2012R1A1B ). REFERENCES [1] B. Ahlgren, et al., A Survey of Information-Centric Networking, Communications Magazine, Vol.50, pp.26-36, Jul [2] V. Jacobson, et al., Networking Named Content, CoNEXT, Dec [3] P. Sharma, et al., A Case for MANET-aware Content Centric Networking of Smartphones, WoWMoM, IEEE, Jun [4] M. Meisel, et al., Ad hoc Networking via Named Data, MobiArch, Sep [5] S.Y. Oh, et al., Content Centric Networking in Tactical and Emergency MANETs, WD, Oct [6] M. Amadeo, et al., E-CHANET: Routing, Forwarding and Transport in Information-Centric Multihop Wireless Networks, Computer Communications, Vol.36, pp , Apr [7] M. Varvello, et al., On the Design of Content-Centric MANETs, WONS, Jan [8] K. Katsaros, et al., MultiCache: An Overlay Architecture for Information-Centric Networking." Computer Networks Vol.55, pp , Mar [9] G. Tyson, et al., Towards an Information-Centric Delay-Tolerant Network." NOMEN, Apr [10] E. Nordström, et al., A Search-based Network Architecture for Content-Oriented and Opportunistic Communication, Uppsala University Technical Report, [11] M. Meisel, et al., Listen first, broadcast later: Topology-agnostic forwarding under high dynamics, Annual Conference of International Technology Alliance in Network and Information Science, Sep [12] C. Anastasiades, et al., Content Discovery in Opportunistic Content- Centric Networks, LCN, Oct [13] A. Afanasyev, et al., ndnsim: NDN Simulator for NS-3, University of California Technical Report, 2012

A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks

A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks A Hybrid Topology based Multicast Routing for Cognitive Radio Ad Hoc Networks Daewook Shin, Jaebeom Kim, and Young-Bae Ko Department of Computer Engineering Graduate School of Ajou University Suwon, Republic

More information

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications

More information

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services

Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Fast Location-based Association of Wi-Fi Direct for Distributed Wireless Docking Services Jina Han Department of Information and Computer Engineering Ajou University Suwon, South Korea hangn0808@ajou.ac.kr

More information

Hop-count Based Forwarding for Seamless Producer Mobility in NDN

Hop-count Based Forwarding for Seamless Producer Mobility in NDN Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract

More information

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads

Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Analysis of GPS and Zone Based Vehicular Routing on Urban City Roads Aye Zarchi Minn 1, May Zin Oo 2, Mazliza Othman 3 1,2 Department of Information Technology, Mandalay Technological University, Myanmar

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Named Data for Mobile AdHoc Networks

Named Data for Mobile AdHoc Networks 288 Intelligent Environments 2016 P. Novais and S. Konomi (Eds.) 2016 The authors and IOS Press. This article is published online with Open Access by IOS Press and distributed under the terms of the Creative

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks*

Enhanced Topolgoy Formation Protocol for IEEE WLAN based Mesh Networks* Enhanced Topolgoy Formation Protocol for IEEE 802.11 WLAN based Mesh Networks* Deepesh Man Shrestha Graduate School of Information and Communication Ajou University, Suwon, Republic of Korea deepesh@ajou.ac.kr

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK

ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK Chan-Min Park 1, Rana Asif Rehman 2, Tran Dinh Hieu 2, Byung-Seo Kim 3 ABSTRACT 1 Graduate School of Smart City Science Management, Hongik University,

More information

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT

Lecture 6: Vehicular Computing and Networking. Cristian Borcea Department of Computer Science NJIT Lecture 6: Vehicular Computing and Networking Cristian Borcea Department of Computer Science NJIT GPS & navigation system On-Board Diagnostic (OBD) systems DVD player Satellite communication 2 Internet

More information

IEEE s ESS Mesh Networking

IEEE s ESS Mesh Networking IEEE 802.11s ESS Mesh Networking Prof. Young-Bae Ko (youngko@ajou.ac.kr) Ubiquitous Networked Systems (UbiNeS) Lab (http://uns.ajou.ac.kr) KRnet 2006 Contents Introduction - Wireless Mesh Networks IEEE

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing , pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions Young-Mi Song, Sung-Hee Lee, and Young-Bae Ko College of Information and Communication, Ajou University,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

The Performance of MANET Routing Protocols for Scalable Video Communication

The Performance of MANET Routing Protocols for Scalable Video Communication Communications and Network, 23, 5, 9-25 http://dx.doi.org/.4236/cn.23.522 Published Online May 23 (http://www.scirp.org/journal/cn) The Performance of MANET Routing Protocols for Scalable Video Communication

More information

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power

Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power , pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

UCS-805 MOBILE COMPUTING Jan-May,2011 TOPIC 8. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala. Mobile Ad Hoc Networks: Routing TOPIC 8 UCS-805 MOBILE COMPUTING Jan-May,2011 ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala Email-alakroy.nerist@gmail.com Mobile Ad Hoc Networks (MANET) Introduction

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

' INRIA Rocquencourt, Domaine de Voluceau

' INRIA Rocquencourt, Domaine de Voluceau OPTIMIZED FLOODING AND INTERFERENCE-AWARE QOS ROUTING IN OLSR* Dang Quan ~ ~ u ~ and e n Pascale ' ~inet' ' INRIA Rocquencourt, Domaine de Voluceau Rocquencourt - B.P 105 78153 Le Chesnay Cedex, France

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks Contemporary Engineering Sciences, Vol. 8, 2015, no. 19, 859-864 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.57207 A New Energy-Aware Routing Protocol for Improving Path Stability

More information

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE) An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks Poonam kori, Dr. Sanjeev Sharma School Of Information Technology, RGPV BHOPAL, INDIA E-mail: Poonam.kori@gmail.com Abstract - Routing

More information

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR)

Performance Comparison of Mobility Generator C4R and MOVE using Optimized Link State Routing (OLSR) IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 06, Issue 11 (November. 2016), V1 PP 25-29 www.iosrjen.org Performance Comparison of Mobility Generator and MOVE using

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET

An Implementation of Cross Layer Approach to Improve TCP Performance in MANET An Implementation of Cross Layer Approach to Improve TCP Performance in MANET 1 Rajat Sharma Pursuing M.tech(CSE) final year from USIT(GGSIPU), Dwarka, New Delhi E-mail address: rajatfit4it@gmail.com 2

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh

A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh A Topology Based Routing Protocols Comparative Analysis for MANETs Girish Paliwal, Swapnesh Taterh Amity University Rajasthan, Jaipur, India Abstract MANET is a dynamic topology wireless network in which

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Keywords: AODV, MANET, WRP

Keywords: AODV, MANET, WRP Performance Analysis of AODV and WRP in MANET Sachchida Nand Singh*, Surendra Verma**, Ravindra Kumar Gupta*** *(Pursuing M.Tech in Software Engineering, SSSIST Sehore(M.P), India, Email: sesachchida@gmail.com)

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate

More information

Performance Improvement of Wireless Network Using Modern Simulation Tools

Performance Improvement of Wireless Network Using Modern Simulation Tools Performance Improvement of Wireless Network Using Modern Simulation Tools Ms. Nimisha Dinesh Deval 1, Prof. Mrs. S. P. Pawar 2 1ME student CSE Dept, SVERIs college of Engineering, Pandharpur, Maharashtra,

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Analyzing Routing Protocols Performance in VANET Using p and g

Analyzing Routing Protocols Performance in VANET Using p and g Analyzing Routing Protocols Performance in VANET Using 802.11p and 802.11g Rasha Kaiss Aswed and Mohammed Ahmed Abdala Network Engineering Department, College of Information Engineering, Al-Nahrain University

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India

Vaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日 Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols Akshay Shankar, Lavanya Chelle Information Science Engineering RNS Institute of Technology Bangalore, India Abstract- A Mobile

More information

WEAMR A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs

WEAMR A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs Sensors 2013, 13, 6295-6318; doi:10.3390/s130506295 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors WEAMR A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Networking Named Content: Content-Centric Networking. John Rula

Networking Named Content: Content-Centric Networking. John Rula Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)

More information

A Novel Geocasting Protocol for Multi-interface Tactical Ad Hoc Networks

A Novel Geocasting Protocol for Multi-interface Tactical Ad Hoc Networks A Novel Geocasting Protocol for Multi-interface Tactical Ad Hoc Networks Sun-Joong Yoon Sung-hee Lee Young-Bae Ko Department of NCW Samsung Electronics Department of Computer Eng. Ajou University Suwon

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

CS 268: Computer Networking. Taking Advantage of Broadcast

CS 268: Computer Networking. Taking Advantage of Broadcast CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks ICOIN 2014@Phuket Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi (mylee@mmlab.snu.ac.kr) Seoul National University 2014.02.11

More information

High Throughput in MANET Using relay algorithm and rebroadcast probability

High Throughput in MANET Using relay algorithm and rebroadcast probability RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,

More information

An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks

An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks Changsu Suh, Deepesh Man Shrestha, and Young-Bae Ko R & D Departments, Hanback Electronics Company, Republic of Korea College

More information

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity

Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Virtual Hierarchical Architecture Integrating Mobile IPv6 and MANETs for Internet Connectivity Hyemee Park, Tae-Jin Lee, and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Delay Tolerant Networks

Delay Tolerant Networks Delay Tolerant Networks DEPARTMENT OF INFORMATICS & TELECOMMUNICATIONS NATIONAL AND KAPODISTRIAN UNIVERSITY OF ATHENS What is different? S A wireless network that is very sparse and partitioned disconnected

More information

Fairness Example: high priority for nearby stations Optimality Efficiency overhead

Fairness Example: high priority for nearby stations Optimality Efficiency overhead Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency

More information

Broadcasting Techniques for Mobile Ad Hoc Networks

Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting Techniques for Mobile Ad Hoc Networks Broadcasting: It is the process in which one node sends a packet to all other nodes in the network. 1 Usefulness of broadcasting Broadcasting of net-wide

More information

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments

CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments CC-SCTP: Chunk Checksum of SCTP for Enhancement of Throughput in Wireless Network Environments Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

Distributed TDMA MAC Protocol with Source-Driven Combined Resource Allocation in Ad Hoc Networks

Distributed TDMA MAC Protocol with Source-Driven Combined Resource Allocation in Ad Hoc Networks Distributed TDMA MAC Protocol with Source-Driven Combined Resource Allocation in Ad Hoc Networks Myunghwan Seo, Hyungweon Cho Wireless Comm. Group Samsung Thales Co., LTD. Yongin, 449-885, South Korea

More information

DMQR: A Spatial Routing Protocol to Enable VoIP over High-Mobility Wireless Multihop Networks

DMQR: A Spatial Routing Protocol to Enable VoIP over High-Mobility Wireless Multihop Networks : A Spatial Routing Protocol to Enable VoIP over High-Mobility Wireless Multihop Networks Amir Aminzadeh Gohari and Volkan Rodoplu Department of Electrical and Computer Engineering, University of California,

More information

arxiv: v1 [cs.ni] 20 Apr 2017

arxiv: v1 [cs.ni] 20 Apr 2017 ADN: An Information-Centric Networking Architecture for the Internet of Things University of California at Santa Cruz Computer Engineering Department Santa Cruz, CA 95064 jj@soe.ucsc.edu arxiv:1704.06346v1

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information