An Efficient Backbone Aware Shortest Path Selection Protocol in Zigbee Wireless Networks
|
|
- Delphia Palmer
- 5 years ago
- Views:
Transcription
1 An Efficient Backbone Aware Shortest Path Selection Protocol in Zigbee Wireless Networks Ms. S.Shoba #1, Mrs. S. Raja Rajeswari *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional Centre of Anna University Tirunelveli (T.N) India Abstract The zigbee tree routing is wide used in several resource restricted devices and applications. Since it doesn t need any routing table and route discovery overhead to send a packet to the destination. But the ZigBee tree routing has the elemental limitation that a packet follows the tree topology. Therefore, it cannot provide the optimum routing path. The shortcut tree routing protocol that provides the close to best routing path also as maintains the advantages of the ZigBee tree routing like no route discovery overhead and low memory consumption. in a very tree-structured ZigBee wireless network, nodes near the basis of the tree (i.e., hot-spot nodes) could exhaust their power sooner than those distant from the basis attributable to serious hundreds on packet forwarding. This hot spot downside is inherent in tree-structured networks and should demand additional energy to live through failures of hot-spot nodes. The backbone-aware topology formation (BATF) theme is planned to alleviate the hot-spot downside. BATF utilizes power-rich nodes to create a backbone tree that doesn't suffer from the new spot downside. To prolong the period of time of a ZigBee network and improve its knowledge assortment capability introduced a backbone-aware topology formation (BATF) theme. Keywords ZigBee, Tree routing, Shortcut tree routing, STR, Neighbor table, MANET, WSN, IEEE ,BATF,PN Introduction ZigBee is used in applications that require a low data rate, long battery life, and secure networking. ZigBee has a defined rate of 250 kbit/s, best suited for periodic or intermittent data or a single signal transmission from a sensor or input device. ZigBee is a specification for a suite of high level communication protocols used to create personal area networks built from small, low-power digital radios.applications include wireless light switches, electrical meters with in-home-displays, traffic management systems, and other consumer and industrial equipment that requires short-range wireless transfer of data at relatively low rates. The technology defined by the ZigBee specification is intended to be simpler and less expensive than other WPANs, such as Bluetooth or Wi-Fi. ZigBee networks are secured by 128 bit symmetric encryption keys. In home automation applications, transmission distances range from 10 to 100 meters line of sight, depending on power output and environmental characteristics. The reactive routing protocol in ZigBee is derived from AODVjr which is one of the representative routing protocols in MANET (Mobile Ad-hoc Networks).Similar with other MANET routing protocols ZigBee reactive routing protocol provides the optimal routing path for the arbitrary source and destination pair through the on-demand route discovery. It requires the route discovery process for each communication pair, so the route discovery overhead and the memory consumption proportionally increases with the number of traffic sessions. Moreover, route discovery packets are flooded to the overall network, which interfere with transmission of other packets even in the spatially uncorrelated area with the route discovery. The tree routing protocol uses only parent and child relationship for routing, ignoring neighbor nodes. As a result,packets may be routed through several hops towards the destination even if this is within sender s 1-hop transmission In many cases, the routing overhead of tree routing algorithm cannot be avoided if only parent-child relationships are considered in the routing. In order to overcome such problem, each node should consider its neighbor nodes as next hop nodes. On the other hand, ZigBee tree routing (ZTR) prevents the route discovery overhead in both memory and bandwidth using the distributed block addressing scheme. In ZTR, since each node is assigned a hierarchical address, a source or an intermediate node only decides whether to forward a packet to the parent or one of the children by comparing its address with the destination address. The most benefit of ZTR is that any source node can transmit a packet to an arbitrary destination in a network without any route discovery overheads. Due to this efficiency, ZTR is considered as a promising protocol for resource constrained devices in diverse applications such as smart grid project and Internet of Things. However, in ZTR, packets are forwarded along the tree topology to the destination even if the destination is located nearby. Thus, ZTR cannot provide the optimal routing path, while it does not require any route discovery overhead. In this paper propose the BATF algorithm The hotspot problem is inherent in tree-structured networks and may demand extra energy to recover from failures of hot-spot nodes. The backbone-aware topology formation (BATF) scheme is proposed to alleviate the hot-spot problem. BATF ISSN: Page 127
2 utilizes power-rich nodes to form a backbone tree that does not suffer from the hot-spot problem II RELATED WORK A Distributed and Efficient Flooding Scheme using 1-hop Information in MobileAdHocNetworks [1] by H.Lu,et al(2007) is implemented in 1-hop neighbor information. The objective of this work is the sufficient and necessary condition of 100 percent deliverability for flooding scheme. Flooding is one of the most fundamental operations in mobile ad hoc networks (MANETs). Flooding is a very frequently invoked utility function in MANETs. Therefore, an efficient implementation of flooding scheme is crucial in reducing the overhead of routing protocols and improving the throughput of networks. Pure flooding, or blind flooding, where every node in the network retransmits the flooding message when it is its first time to receive it. This simple scheme guarantees that a flooding message can reach all nodes if there is no collision and the network is connected. However, it generates an excessive amount of redundant network traffic because all nodes in the network transmit the flooding message. This will consume a lot of the energy resources of mobile nodes and cause congestion of the network. Dynamic Source Routing in Ad Hoc Wireless Networks [2] by D.B. Johnson and D.A. Maltz is implemented in Mobile Computing. An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its destination, due to the limited range of each mobile host s wireless transmissions. This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing. The protocol adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently. Based on results from a packet-level simulation of mobile hosts operating in an ad hoc network, the protocol performs well over a variety of environmental conditions such as host density and movement rates. For all but the highest rates of host movement simulated, the overhead of the protocol is quite low, falling to just 1% of total data packets transmitted for moderate movement rates in a network of 24 mobile hosts. In all cases, the difference in length between the routes used and the optimal route lengths is negligible, and in most cases, route lengths are on average within a factor of 1.01 of optimal. Distributed Throughput Optimization for ZigBee Cluster Tree Networks [3] by Y. Huang, et al is implemented in zigbee networks. ZigBee, a unique communication standard designed for low-rate wireless personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, ZigBee clustertree is especially suitable for low- power and low-cost wireless sensor networks because it supports power saving operations and light-weight routing. In a constructed wireless sensor network, the information about some area of interest may require further investigation such that more traffic will be generated. However, the restricted routing of a ZigBee clustertree network may not be able to provide sufficient bandwidth for the increased traffic load, so the additional information may not be delivered successfully. In this paper, we present an adoptive-parent- based framework for a ZigBee cluster-tree network to increase band- width utilization without generating any extra message exchange. T.Kim,D.Kim,N.Park,S.Yoo,andT.S.Lopez [4]. The objective of this work is to find the optimal next hop node that has the smallest remaining hop count to the destination. ZigBee is the emerging industrial standard for ad hoc networks based on IEEE Due to characteristics such as low data rate, low price, and low power consumption, ZigBee is expected to be used in wireless sensor networks for remote monitoring, home control, and industrial automation. Since one of the most important goals is to reduce the installation and running cost, ZigBee stack is embedded in small and cheap microcontroller units. Since tree routing does not require any routing tables to send the packet to the destination, it can be used in ZigBee end devices that have limited resources. However, tree routing has the problem that the packets follow the tree topology to the destination even if the destination is located nearby.the shortcut tree routing protocol to reduce the routing cost of ZigBee tree routing by using the neighbor table that is originally defined in the ZigBee standard Chengfa Li, Mao Ye, Guihai Chen and Jie Wu [5].Clustering provides an effective way for prolonging the lifetime of a wireless sensor network. Current clustering algorithms usually utilize two techniques, selecting cluster heads with more residual energy and rotating cluster heads periodically, to distribute the energy consumption among nodes in each cluster and extend the network lifetime. However, they rarely consider the hot spots problem in multihop wireless sensor networks. When cluster heads cooperate with each other to forward their data to the base station, the cluster heads closer to the base station are burdened with heavy relay traffic and tend to die early, leaving areas of the network uncovered and causing network partition. To address the problem, here propose an Energy Efficient Unequal Clustering (EEUC) mechanism for periodical data gathering in wireless sensor networks. It partitions the nodes into clusters of unequal size, and clusters closer to the base station have smaller sizes than those farther away from the base station. Thus cluster heads closer to the base station can preserve some energy for the inter cluster data forwarding. Here also propose an energy aware multihop routing protocol for the inter cluster communication. Simulation results show that unequal clustering mechanism balances the energy consumption well among all sensor nodes and achieves an obvious improvement on the network lifetime. ISSN: Page 128
3 III PROPOSED SYSTEM System design or system architecture is the conceptual design that defines the structure and/or behavior of a system.. Topology creation creation Routing tree calculation Neighborhood table Address scheme Back bone tree Packet transmission Destination address Power rich node device in a network, whereas a network conforming to a tree topology uses a distributed scheme (Cskip) to assign a 16-bit address to each device. Every node is assigned a unique 16 bit short address dynamically using either distributed addressing or stochastic addressing scheme. The routing protocols of ZigBee are diverse so that a system or users can choose the optimal routing strategy according to the applications. D.Neighbor Table First, each node needs to determine what other ports it is connected to, over fully working links; it does this using a reach ability protocol which it runs periodically and separately with each of its directly connected neighbors. Each node independently runs an algorithm over the map to determine the shortest path from itself to every other node in the network; generally some variant of Dijkstra's algorithm is used. This is based around a link cost across each path which includes available bandwidth among other things. E.Position Identifier Position of the node is identified to increase the performance of the system and to collect better node for Communication level information Path selection Transmission Verification F.Power Node Selection To Identify an efficient back bone network and to collect the best path node energy levels is identified so that based on the power node information the Back bone Network can be easily identified. Power Node are identified using the energy information of the Node and based on the energy information color transition are performed for the system. A.Topology Creation Fig 1.Architecture diagram Once the node of the given type has been configured as shown in the previous subsection sec:node comfit, the next step is to create the nodes. The node-creation API basically looks very similar to the old node creation API. In case of hierarchical addressing the node address has to be passed as an argument as shown below: set node [$ns_ node] ## or set node [$ns_ node $node address] ;# incase of hierarchical ;# addressing. B.Routing Tree Calculation Tree based collection protocol. Some number of nodes in a network advertises themselves as tree roots. Nodes form a set of routing trees to these roots. TP is address in that a node does not send a packet to a particular root; instead, it implicitly chooses a root by choosing a next hop. Nodes generate routes to roots using a routing gradient. C.Address Scheme 16 bit The function of the network layer is to assign a 16-bit address to each device joining the network and to route packets to their destination. ZigBee PRO uses a stochastic (nondeterministic) scheme to assign the address of each G.Packet transmission For a variety of reasons data in networks is transmitted in packets, which are sequences of octets (i.e. bytes). Usually packets are transmitted asynchronously, so we need to know when the packet starts and when it ends [in the case of RS232 characters we had a start and an end bit. In general the problem of recognizing start and end of a packet is called the framing problem. H.Path Selection via tree routing Routing is the process of selecting best paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching).a local network administrator, in special cases, can set up host-specific routes to a particular device which provides more control over network usage, permits testing and better overall security. This can come in handy when debugging network connections or routing tables. I.Path verification Two major types of routing protocols exist, internal protocols that route information within an organization and external protocols that route information between networks.igp is the Interior Gateway Protocol used to exchange routing information within an autonomous system. RIP and IGRP are ISSN: Page 129
4 examples of IGPs.EGP are the Exterior Gateway Protocol used to exchange routing information between autonomous systems. Border Gateway Protocol version 4 (BGP4) is an example of an EGP. path is verified whether it is shortest or not. If the path is shortest means take that path for consideration. Other takes the alternative path for path verification. IV SIMULATION AND RESULTS In this module the calculation of ancestor at each node. Using programming, the ZTR Protocol is modified for the detection of the tree and the tree based addressing scheme is used at each node deployment and front/back ancestor are calculated at individual node section. Some number of nodes in a network advertises themselves as tree roots. Nodes form a set of routing trees to these roots. TP is address in that a node does not send a packet to a particular root. Instead, it implicitly chooses a root by choosing a next hop. Once the node of the given type has been configured the next step is to create the nodes. The node creation API basically looks very similar to the old node creation API.The Communication Node with all specification parameters like protocol,range, buffer,wireless IEEE like definitions are carried and created for the basic communication. In this module ZTR based protocol creation will defined and the protocol deployment is carried. Fig. 4 Ancestor at each node Fig. 2 Node creation In this module ZTR based protocol is designed and the addressing mechanism are deployed. An efficient 16 bit address mode is deployed.tree structure is created and the addressing schemes are deployed for the individual system..every node is assigned a unique 16 bit short address dynamically using either distributed addressing or stochastic addressing scheme. This figure shows the Individual node neighborhood log creation and the log include the information regarding its two hop neighbor description and the neighborhood list is created with detailed information description about the node capability is displayed. First, each node needs to determine what other ports it is connected to, over fully working links. It does this using a reach ability protocol which it runs periodically and separately with each of its directly connected neighbors. Fig. 5 Neighborhood node collection Fig.3 Block Address Scheme This figure shows the power node selection. To Identify an efficient Back bone network and to collect the best path Node Energy levels is identified so that based on the power node information the Back bone Network can be easily identified. Power Node are identified using the energy information of the Node and based on the energy information color transition are performed for the system. ISSN: Page 130
5 Fig. 6 N Power node selection In this module shows the Backbone network awareness. To prolong the lifetime of a ZigBee network and improve its data collection capability, we propose a backbone-aware topology formation (BATF) scheme, where one ZigBee tree network can be rooted at each PN. All PNs form a backbone that connects all independently-developing ZigBee trees to one network. In BATF, all PNs and ZNs are required to share the same 16-bit address space to uniquely identify every PN and ZN in the network. Furthermore, tree-based routing used by ZigBee, which is tightly-coupled with addressing, is required to work in each PN-rooted ZigBee tree. Fig. 7 Backbone network awareness In this module shows the packet transmission.usually packets are transmitted asynchronously, so we need to know when the packet starts and when it ends. In general the problem of recognizing start and end of a packet is called the framing problem. One possible way to represent a packet is by starting it with a special character, say SOH = 0x01, and ending it with a special character, say EOT=0x04. Then one can recognize a packet by looking for these characters. Of course, we need to make sure that SOH and EOT appear only two major types of Routing protocols exist, internal protocols that route information within an organization and external protocols that route information between networks. Fig. 8 Packet Transmission Routing is the process of selecting best paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network (circuit switching).a local network administrator, in special cases, can set up host-specific routes to a particular device which provides more control over network usage, permits testing and better overall security. This can come in handy when debugging network connections or routing tables Comparison table for performance evaluation A.Comparison table for end to end delay and packet delivery and routing send control packet Table 1: End to end delay, packet delivery and send control packet Routing End to End delay(msec) Routing Packet Delivery(msec) Routing Send Control Packets(msec) No. of nodes No. of nodes No. of nodes BATF STR BATF STR BATF STR This table shows the comparison for end to end delay, packet delivery and send control packet. The end-to-end latency is mainly affected by the hop distance between a source and a destination. Whereas STR shows long end-to-end latency about 32~47msec, BATF show short end-to end latency about 18msec per session. The packet delivery ratio is mainly affected by the number of hops the packet delivery ratio decreases for the increasing network traffic. It results from that the network congestion causes the collision and drops of the packets ISSN: Page 131
6 B.Comparison table for received control packet and throughput Table 2 Received control packet and throughput Routing Received Control Packets(msec) Routing Throughput(msec) No. of nodes No. of nodes BATF STR BATF STR This table shows the comparison of the received control packet and throughput. Throughput of BATF is high when compared to STR routing overhead of link state maintenance in STR and the route discovery in STR. The routing overhead of STR is exponentially increased as the network density increases, because the RREQ (Route Request) packets are flooded into the whole network. [5] Bandyopadhyay, S., & Coyle, E. (2003). An energy-efficient hierarchical clustering algorithm for wireless sensor networks. In Proceedings of IEEE INFOCOM (Vol. 3, pp ). [6] Agbaria, et al, Efficient and Reliable Dissemination in Mobile Ad Hoc Networks by Location Extrapolation, Journal of Computer Networks and Communications, vol [7] W. Kiess, M. Mauve, A survey on real-world implementations of mobile ad-hoc networks, Ad Hoc Networks, v.5 no.3, p , April, 2007 [8] B.-R. Chen, K.-K. Muniswamy-Reddy, and M. Welsh, Ad-hoc multicast routing on resource-limited sensor nodes, The 2nd International Workshop on Multi-hop Ad Hoc Networks from theory to reality, Florence, It- aly, [9] A. Wheeler, Commercial Applications of Wireless Sensor Networks Using ZigBee, IEEE Communications Magazine, vol. 45, Issue. 4, pp , April, [10] O. Gnawali, R. Fonseca, K. Jamieson, D. Moss, and P. Levis, Collection tree protocol, The 7th ACM Conference on Embedded Networked Sensor Systems (SenSys), Berkeley, CA, [11] J. Ko, et al., Connecting low-power and lossy networks to the internet, IEEE Communications Magazine, pp [12] P. Levis, et al., TinyOS: An operating system for wireless sensor networks, Ambient Intelligence, Springer-verlag, [13] A.V. Aho, J.E. Hopcroft, and J.D. Ullman, On finding lowest common ancestors in trees, SIAM Journal of Computing, vol. 5, no. 1, pp , [14] H. Lu, et al, A Distributed and Efficient Flooding Scheme using 1-hop Information in Mobile Ad Hoc Networks, IEEE Transactions on Par- allel and Distributed Systems, vol. 18, no. 5, pp , V CONCLUSION Here presented BATF, a network infrastructure for treestructured ZigBee networks that utilizes PNs as virtual coordinators for regular ZigBee devices. BATF distributes the traffic load of hot-spot nodes by organizing all PNs into a backbone tree. Yet it is ZigBee-compatible from the perspective of ZNs. In other words, BATF demands no modification from regular ZigBee devices. REFERENCES [1] H. Lu, et al, A Distributed and Efficient Flooding Scheme using 1-hop Information in Mobile Ad Hoc Networks, IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, pp , [2] D.B. Johnson and D.A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, vol. 353, 1996, p [3] Y. Huang, et al, Distributed Throughput Optimization for ZigBee Cluster-Tree Networks, IEEE Transaction on Parallel and Distributed Systems, vol. 23, no. 3, pp , [4] Li, C. F., Ye, M., Chen, G., & Wu, J. (2005). An energy efficient unequal clustering mechanism for wireless sensor networks. In IEEE international conference on mobile ad-hoc and sensor systems (pp ). ISSN: Page 132
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks
Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless
More informationSECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK
SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering
More informationTo enhance Routing in ZigBee Wireless Networks
To enhance Routing in ZigBee Wireless Networks P.Chanthiya Assistant Professor Department of Computer Science & Engineering, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, India Abstract The
More informationTO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL
TO DESIGN ENERGY EFFICIENT PROTOCOL BY FINDING BEST NEIGHBOUR FOR ZIGBEE PROTOCOL 1 Mr. Sujeet D. Gawande, Prof. Amit M. Sahu 2 1 M.E. Scholar, Department of Computer Science and Engineering, G.H.R.C.E.M.,
More informationSTR: An efficient shortcut tree routing method for ZigBee Wireless Networks
STR: An efficient shortcut tree routing method for ZigBee Wireless Networks Shrishail Tengligi 1, Kiran Maka 2 1 P.G.Student, Department of Computer Science & Engineering, Appa Institute of Engineering
More informationImproving Selfish Node Detection in ZigBee Wireless Network with Shortcut Tree Routing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.51
More informationAN EFFICIENT POWER CONTROLLED ROUTING IN MANETs
AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET
More informationA Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks
A Study on Efficient Route Optimization using Border Gateway Protocol in Mobile Adhoc Networks N.vijay kumar T.Santhi Sri Dr.J.Rajendra Prasad Y.Vijayalakshmi II MCA II SEMESTER Department of CA Department
More informationIntra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network
Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College
More informationProbabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS
, pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,
More informationPerformance Evaluation of Various Routing Protocols in MANET
208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri
More informationEnergy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks
Energy Efficient Data Gathering For Throughput Maximization with Multicast Protocol In Wireless Sensor Networks S. Gokilarani 1, P. B. Pankajavalli 2 1 Research Scholar, Kongu Arts and Science College,
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationDISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS
International Research Journal of Engineering and Technology (IRJET) e-issn: 2395-56 DISTANCE BASED CLUSTER FORMATION FOR ENHANCING THE NETWORK LIFE TIME IN MANETS Haftom Gebrehiwet Kidanu 1, Prof. Pallam
More informationEnergy Efficient EE-DSR Protocol for MANET
Energy Efficient EE- Protocol for MANET 1 Mr. Prakash Patel, 2 Ms. Tarulata Chauhan 1 Department of Computer engineering, 1 LJ Institute of Technology, Ahmedabad, India 1 prakashpmp1990@gmail.com, 2 taruchauhan114@gmail.com
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationRouting Protocols in MANET: Comparative Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119
More informationSimulative Investigation of Zigbee Network Coordinator Failure with Different QoS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationThe Impact of Clustering on the Average Path Length in Wireless Sensor Networks
The Impact of Clustering on the Average Path Length in Wireless Sensor Networks Azrina Abd Aziz Y. Ahmet Şekercioğlu Department of Electrical and Computer Systems Engineering, Monash University, Australia
More informationCROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION
CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering
More informationNovel Cluster Based Routing Protocol in Wireless Sensor Networks
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationSimulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol
Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationAN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS
AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationAn Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model. Zhang Ying-Hui
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) An Energy Efficiency Routing Algorithm of Wireless Sensor Network Based on Round Model Zhang Ying-Hui Software
More informationBattery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks
Battery Power Management Routing Considering Participation Duration for Mobile Ad Hoc Networks Masaru Yoshimachi and Yoshifumi Manabe movement of the devices. Thus the routing protocols for MANET need
More informationA Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET
A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant
More informationFig. 2: Architecture of sensor node
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationPresenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks
Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali
More informationEvent Driven Routing Protocols For Wireless Sensor Networks
Event Driven Routing Protocols For Wireless Sensor Networks Sherif Moussa 1, Ghada Abdel Halim 2, Salah Abdel-Mageid 2 1 Faculty of Engineering, Canadian University Dubai, Dubai, UAE. 2 Faculty of Engineering,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:
Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.
More informationA Literature survey on Improving AODV protocol through cross layer design in MANET
A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,
More informationEstimate the Routing Protocols for Internet of Things
Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationWSN NETWORK ARCHITECTURES AND PROTOCOL STACK
WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationPerformance Evaluation of MANET through NS2 Simulation
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationMOBILITY REACTIVE FRAMEWORK AND ADAPTING TRANSMISSION RATE FOR COMMUNICATION IN ZIGBEE WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationPerformance Analysis and Enhancement of Routing Protocol in Manet
Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and
More informationMultipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network
1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay
More informationAn Enhanced General Self-Organized Tree-Based Energy- Balance Routing Protocol (EGSTEB) for Wireless Sensor Network
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 239-7242 Volume 4 Issue 8 Aug 205, Page No. 3640-3643 An Enhanced General Self-Organized Tree-Based Energy- Balance Routing
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationBehaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model
Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,
More informationVaibhav Jain 2, Pawan kumar 3 2,3 Assistant Professor, ECE Deptt. Vaish College of Engineering, Rohtak, India. Rohtak, India
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Improved OLSR
More informationChapter 7 CONCLUSION
97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in
More informationMaximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication
Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of
More informationAd Hoc Networks: Issues and Routing
Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/
More informationA Survey on Path Weight Based routing Over Wireless Mesh Networks
A Survey on Path Weight Based routing Over Wireless Mesh Networks Ankush Sharma Assistant Professor, Dept. Of C.S.E, Chandigarh University Gharuan, India Anuj Gupta Head C.S.E and M.C.A Dept, RIMT Mandi
More informationA SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering
More informationICS 351: Today's plan. OSPF BGP Routing in general
ICS 351: Today's plan OSPF BGP Routing in general link-state routing in distance-vector (Bellman-Ford, Ford-Fulkerson, RIP-style) routing, each router distributes its routing table to its neighbors an
More informationEnhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu
More informationREVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS
REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationFigure 1. Clustering in MANET.
Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationENSC 427: COMMUNICATION NETWORKS
ENSC 427: COMMUNICATION NETWORKS Simulation of ZigBee Wireless Sensor Networks Final Report Spring 2012 Mehran Ferdowsi Mfa6@sfu.ca Table of Contents 1. Introduction...2 2. Project Scope...2 3. ZigBee
More informationInternational Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali
More informationCLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationAnalysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN
Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor
More informationIntroducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks
2013, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Introducing a Routing Protocol Based on Fuzzy Logic in Wireless Sensor Networks Mostafa Vakili
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationRouting Protocols in Mobile Ad-Hoc Network
International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana
More informationA Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET
A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute
More informationLiterature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review
More informationMulti-metrics based Congestion Control protocol in Wireless Sensor Network
e-issn 2455 1392 Volume 2 Issue 5, May 2016 pp. 536 543 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Multi-metrics based Congestion Control protocol in Wireless Sensor Network Sushma
More informationThe General Analysis of Proactive Protocols DSDV, FSR and WRP
Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.
More informationIntroduction to Mobile Ad hoc Networks (MANETs)
Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device
More informationA New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks
Contemporary Engineering Sciences, Vol. 8, 2015, no. 19, 859-864 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.57207 A New Energy-Aware Routing Protocol for Improving Path Stability
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationCACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department
More informationPerformance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationAvailable online at ScienceDirect. Procedia Computer Science 57 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient
More informationReliable and Energy Efficient Protocol for Wireless Sensor Network
Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India
More informationQUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi
QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,
More informationPerformance Comparison of MANETs Routing Protocols for Dense and Sparse Topology
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationChapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks
Chapter 6 Route Alteration Based Congestion Avoidance Methodologies For Wireless Sensor Networks Early studies shows that congestion avoid in wireless sensor networks (WSNs) is a critical issue, it will
More informationMultiHop Routing for Delay Minimization in WSN
MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationHigh Throughput in MANET Using relay algorithm and rebroadcast probability
RESEARCH ARTICLE OPEN ACCESS High Throughput in MANET Using relay algorithm and rebroadcast probability Mr. Marvin Mark M Dept of Electronics and Communication, Francis Xavier Engineering College, Tirunelveli-627003,
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationSTUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS
International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless
More informationPerformance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks
Performance Behavior of Unmanned Vehicle Aided Mobile Backbone Based Wireless Ad Hoc Networks Izhak Rubin and Runhe Zhang Abstract We introduce Unmanned Vehicles (UVs) to aid the operation of the mobile
More informationModulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1
Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1 Maryam Soltan, Inkwon Hwang, Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles, CA
More informationFairness Example: high priority for nearby stations Optimality Efficiency overhead
Routing Requirements: Correctness Simplicity Robustness Under localized failures and overloads Stability React too slow or too fast Fairness Example: high priority for nearby stations Optimality Efficiency
More informationSimulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model
Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer
More informationDefending MANET against Blackhole Attackusing Modified AODV
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student
More informationLocation Awareness in Ad Hoc Wireless Mobile Neworks
Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,
More informationPacket Routing using Optimal Flooding Protocol in Cluster based MANET
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 09 March 2016 ISSN (online): 2349-784X Packet Routing using Optimal Flooding Protocol in Cluster based MANET S.Bavani V.Aiswariya
More information