Virtual Subnet Internetworking with IPv6 Multicast Membership for Mobile Ad Hoc Networks.

Size: px
Start display at page:

Download "Virtual Subnet Internetworking with IPv6 Multicast Membership for Mobile Ad Hoc Networks."

Transcription

1 Virtual Subnet Internetworking with IPv6 Multicast Membership for Mobile Ad Hoc Networks Tzu-Chiang Chiang *, Yueh-Min Huang * and Fenglien Lee *** * Department of Engineering Science, National Cheng-Kung University, Taiwan, ROC ** Department of Information Management, Hisng-Kuo University of Management *** National Center for High-Performance Computing Taiwan n @ccmail.ncku.edu.tw ABSTRACT Mobile ad hoc networks need the flexibility to collect more than two devices equipped with wireless communication and networking capability. In recent years, the wireless network has been attracting a lot of attention, and due to this wireless devices have enjoyed a tremendous rise in popularity. However, the broadcast storm becomes a very serious problem for ad hoc networks to migrate into the third generation (3G) telecommunication for the application of group conferences. The main concept of virtual local area network (VLAN) technology is the capability to group users into broadcast domains, which divides a LAN into logic, instead of physical, segments and reduces the traffic overhead. With this characteristic, we propose a novel interoperability network model integrating a self-organizing ad hoc network and Internet/a conventional network with the same virtual local area network. Moreover, we describe a protocol to establish the VLAN broadcast domains by using the IPv6 multicast-membership in ad hoc networks and perform IP-based network communications in a multi-switch backbone. Since the VLAN technology functions by logically segmenting the network into different broadcast domains, packets can only be delivered between fixed/mobile nodes with the same VLAN identity (group member). Therefore we can prevent the broadcast storm problem in MANET. The emulations show the proposed protocol in ad hoc network environment from 20 to 80 nodes with different size of VLANs groups. The result shows that the throughput of our protocol delivering packets to all nodes in the same VLAN group is more than 84% of all the cases. Furthermore, compared with the flooding, the efficiency of communication is improved up to 51%. Key Words: Virtual Local Area Network, VLAN, IPv6 multicast, ad hoc networks. 1. INTRODUCTION Ad hoc networks can deploy rapidly and freely comparing with the traditional wireless networking systems, it does not need the pre-existing network infrastructures. In recent years, the wireless network has been attracting a lot of attention, and due to this wireless devices have enjoyed a tremendous rise in popularity. A few of the applications are absorbing greater amounts of bandwidth. Therefore today s corporations routinely buy the fastest computers and fastest network equipment on the market and want these machines to run on the fastest safest network possible Author and year[1][2][3]. An ad hoc network is a collection of mobile nodes 187

2 that want to communicate to each other, but has no fixed links like wireless infrastructure network. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with. The network topology of an ad hoc network changes frequently and unpredictable, so routing and multicast become extremely challenging [4][5]. The goal for developing multicast is that there are applications that need to send a packet from a multicast source to a group of nodes (multicast receivers). There are two types of configurations [6] for an ad hoc wireless multicast protocol. One of the configuration type is a tree-based protocol (e.g., adhoc Multicast Routing (AMRoute) [7], and Ad hoc Multicast Routing protocol utilizing Increasing id-numbers (AMRIS) [8]), and the other is a mesh-based protocol (e.g., On-Demand Multicast Routing Protocol (ODMRP) [9], and Core-Assisted Mesh Protocol (CAMP) [10]). However, the broadcast storm becomes a very serious problem for ad hoc networks to migrate into the third generation (3G) telecommunication for the application of group conferences. The main concept of virtual local area network (VLAN) technology is the capability to group users into broadcast domains, which divides a LAN into logic, instead of physical, segments and reduces the traffic overhead. The network switch was invented to assist networks to improve this situation. The LAN switch network permits users to be combined into as Virtual LANs. A VLAN is a logical, rather than a physical connectivity, collection of network devices. In the router-based network devices are recognized by their physical location in the network. The network-layer address is used to inform the router physical segment where must send data to. A VLAN behaves like an ordinary LAN, but connected devices don't have to be physically connected to the same segment. The VLAN allows a flexible mechanism; simply grouping physical ports together, or can combine existing hubs, routers and backbone with dedicated switched ports, wide area networks, and more. While clients and servers may be distributed anywhere on a network, they are grouped together by VLAN technology, and broadcasts are sent to devices within the same VLAN. With this characteristic, we propose a novel interoperability network model integrating a self-organizing ad hoc network and Internet/a conventional network with the same virtual local area network. Moreover, we describe a protocol to establish the VLAN broadcast domains by using the IPv6 multicast-membership in ad hoc networks and perform IP-based network communications in a multi-switch backbone. Since the VLAN technology functions by logically segmenting the network into different broadcast domains, packets can only be delivered between fixed/mobile nodes with the same VLAN identity (group member). Therefore we can prevent the broadcast storm problem in MANET. 1.1 Research contributions We consider a core network of 802.1Q-liked switches interconnected by trunk lines. This network can span one or more small towns in sparsely populated areas, interconnecting communities as well as company LANs. The intent is to provide both telephony and data 188

3 services over the same technology (Ethernet), stack (IP), with seamless integration with the Internet. Our work chooses to distribute the bandwidth according to a hierarchical link sharing model. The rest of this paper is organized as follows. We describe the Virtual Local Area Network in Section 2. Section 3 in detail for the infrastructure of virtual LAN internetworking in ad hoc networks, Section 4 simulated the constructing VLAN successful rate with NS2 simulation. Finally, section 5 provides our concluding remarks and futures works. 2. PROBLEM DESCRIPTION The motivation behind our approach is that network partitioning can improve critical functions such media access, routing, mobility management and virtual circuit set-up, while reducing signaling/ control overhead. It can be observed in this type of network that portioning may result also in lower congestion compared to one large network. This paper discuss an architecture based on a specific logical topology superimposed over a physical topology (determined by transmission coverage of network nodes); the architecture selects links to be activated (logical links) out of a pool of physical links. Our main concern is finding an efficient logical topology and a suitable routing procedure which result in high performance and reliability. In this architecture, network nodes are grouped into two types of clusters (subnets): physical and virtual, and may dynamically change their affiliation with these subnets due to their mobility. Each node is allocated an address based on its current subnet affiliation. We consider networks that have several tens to several hundreds mobile nodes. It is assumed that there exists a channel access protocol which resolves contentions and/or interference in the network. [A mobile radio network architecture with dynamically changing topology using virtual subnet] Broadcasting in a shared wireless medium may result in multiple nodes receiving a transmission destined for a single node, and ultimately, in multiple transmission mutually interfering at a single node. Nodes can reduce the chances of interference by separating transmissions in time, space, frequency, or spreading code. By coordinating this separation instead of acting independently, nodes can further reduce the chances of interference and hence increase network throughput. The cluster-based control structure provides a natural organization of network nodes that simplifies coordination of transmission among neighboring nodes. [Ad Hoc Networking book] With the fast development of wireless technology, ad hoc network is walking out from research papers and becoming more and more closer to the common consumers. For example, in order to save battery power and reuse spectrum, the forth generation (4G) wireless communication is considering using low-powered ad hoc mesh networks instead of traditional star networks. In this case, end-user wireless handsets form a peer-to-peer network in which 189

4 they act as both end terminals and wireless routers that are part of the overall network infrastructure. Broadcasting is one of the basic communication methods for ad hoc networks and has many applications. Unlike wired networks, ad hoc networks are usually formed and maintained in a dynamic manner. This means a node will have no knowledge about other nodes or services in an ad hoc network when it joins the network. To discover other devices and services, nodes usually have to broadcast query/request packets to find out what is out there in the network. Besides service and device discovery, data distribution across all network nodes can take advantage of broadcasting for efficiency. In network layer, broadcasting is a fundamental component for many routing protocols. [A Border-aware Broadcast Scheme for Wireless Ad Hoc Network] However, the simple broadcasting without a rebroadcasting bounding mechanism at each node may result in an excess of redundancy, channel contention, and collisions. This phenomenon is called the Broadcast Storm Problem [The Broadcast Storm Problem in a Mobile Ad Hoc Network]. Redundancy indicates a situation where a node hears the same messages from more tha n one neighbors. Channel contention is due to the different nodes which are simultaneously trying to rebroadcast the received messages thus contending for the shared media, increasing the probability of collisions. To address redundancy, the decision whether or not rebroadcast must be controlled at each node receiving the message. For contention and collision, all nodes trying to rebroadcast rely on backoff mechanism with randomly selected slots. Y.-C. Tseng et al. [6] suggested several schemes to alleviate the broadcast storm problem, namely: the counter-based scheme, the distance-based scheme, and the location-based scheme. Although the authors indicates the location-based scheme as the best alternative, it requires all nodes to be equipped with a global positioning system (GPS) device to provide the appropriate accuracy of longitude and latitude. The distance-based scheme provides an higher level of reachability with respect to the counter-based scheme but it does not offer the same reduction of rebroadcast as its counterpart. [A Bounding Algorithm for the Broadcast Storm Problem in Mobile Ad Hoc Networks] 2. VIRTUAL LOCAL AREA NETWORK In a local area network, data link-layer broadcast and multicast traffic is delivered to all devices, but this traffic cannot go beyond the LAN boundary. In the past, shared cabling or hubs were the boundaries for LANs. A VLAN is an administratively configured LAN or broadcast domain. VLANs facilitate easy administration of logical groups of stations that can communicate as if they were on the same LAN. They also facilitate easier administration of moves, adds, and changes in members of these groups [14]. VLANs configured by using Media Access Control addresses can recognize when a device has been moved to another port 190

5 on a switch. VLAN management software can then automatically reconfigure that device into its appropriate VLAN without the need to change the device's MAC or IP address. Traffic between VLANs is restricted. Bridges forward unicast, multicast and broadcast traffic only on LAN segments that serve the VLAN to which the traffic belongs. So the packets are only switched between ports that are designated for the same VLAN. By confining packet broadcast on a particular LAN only to the LANs within the same VLAN, switched virtual network avoid wasting bandwidth, a fault in traditional switched network where packets are often forwarded to LANs that even do not require them. Hence offers benefits in term efficiency use of bandwidth, flexibility, performance and security [16][17][18][19]. The IEEE 802.1Q standard defines the operation of VLAN Bridges that permit the definition, operation and administration of Virtual LAN topologies within a Bridged LAN infrastructure. The IEEE's 802.1Q standard was developed to address the problem of how to break large networks into smaller parts so broadcast and multicast traffic would not grab more bandwidth than necessary. The mechanisms support VLAN in Bridged LAN environment including the frame format and how the frames are relayed to destinations. Any frame has a VLAN-tagged to associate with the incoming port s VID (VLAN ID). The Filtering Database (FDB) stored addressing information and frame-filtering information in the form of Mac addresses and VLAN entries. Switches are one of the core components of VLAN communication. Switches provide the intelligence to make filtering and forwarding decisions by packet and to communicate to other switches and routers within the network Q-compliant switch ports can be configured to transmit tagged or untagged frames. The switch implementing the standard is as following typical operations: First, when a frame enters the switch it is checked for errors. An error-free frame will be associated with a VID as described above so that frame s learning and forwarding is relative to the VLAN it belongs to. If the Ingress Filtering set to enable and the incoming port is not a member of this VALN, the frame will be rejected. Second, an accepted frame will be submitted to the forwarding process to be relayed to other ports, and at the same time the switch observes its source MAC address, source port, VID associated and other necessary addressing information and automatic using them to update the FDB. The process of forwarding uses the MAC address and VID of the frame to index into the FDB to find out where the frame shall be relayed. And eventually the frame is sent through those corresponding outbound ports if not filtered out by Egress Filter, which also decide whether the outgoing frame should carry a VID. The logical interrelationships are illustrated in Figure

6 Figure 1. The VALN logical interrelationships It is obvious that LANs switches afford essential improvement in performance and dedicated bandwidth across the networks, with the intelligence necessary for VLAN segmentation. 3. INFRASTRUCTURE OF VIRTUAL SUBNET INTERNETWORKING As shown in Figure 2, three groups of mobile nodes form an internetworking wireless ad hoc network with IP-based Internet. The communication between each node in this network infrastructure is established by using VLAN-enabled multi-route equipments and wireless multi-hop paths. Some MNs in this ad hoc network want to access the Internet. 加入一些為何使用 VLAN 的關念與想法 First, in order to access the IP-based Internet and form the virtual network, a set of VLAN-enabled Multi-route Routers (VMR) is established in advance. The VMR are connected to the Internet and communicate with the mobile nodes in wireless ad hoc networks via wireless transceivers. The VMR consists of three components: 1.) IP-based component with traditional IP-based protocol suite installed is designed to connect with IP-based Internet (either wired or wireless); 2.) Ad hoc component with ad hoc related protocols installed is connected with ad hoc networks through a wireless interface; 3.) VLAN component with virtual LAN related core component of VLAN communication providing the intelligence to make filtering and forwarding decisions. 192

7 Figure 2. An internetworking wireless ad hoc network with IP-based Internet The protocol architecture stacks for mobile nodes and VMRs are represented in Fig. X. In the physical layer, a mobile node uses by all the variants, including infrared, FHSS, DSSS, OFDM and HR-DSSS, provides one of the five permitted transmission techniques to send a MAC frame among those mobile nodes. The standard techniques detail operational specifications for wireless connectivity for infrastructure and ad hoc networks within a local geographical area. The physical layer corresponds to the OSI physical layer, but the data link layer is split into two sublayers. Medium Access Control (MAC) sublayer controls the channel allocation details two operational modes: the Distributed Coordination Function (DCF) and the Point Coordination Function (PCF). The Logical Link Control (LLC) sublayer corresponds to hide the differences between the different 802 variants and makes the network layer transparent. Besides the wireless LAN standards IEEE02.11, some extended versions, HiperLan or Bluetooth could also serve this communication. The network layer is concerned with getting packets from the source to the destination. Besides an IP-based ad hoc routing protocol (e.g., proactive protocols and reactive protocols) is used, we also retool the protocol to enlarged IP address fields from 32 bit to 48 bit or 128 bit for virtual subnet using at layer 2, or handling ad 193

8 hoc networks of IPv6 addressable computers. In higher layers, conventional IP-based protocols are applied for wireless communications. The VMR contains protocols and acts as a default gateway to communicate between the conventional Internet and the wireless ad hoc networks. In response to the purpose for virtual subnet, VMRs are based on specially-designed Virtual-Subnet aware switches by identifying the virtual-subnet field in the frame header. Now let us take a look at the frame format with virtual-subnet tag, which is shown in Fig. #. The virtual protocol ID is adapted from 802.1Q and has the value 0x8100. The Tag field contains three subfields. The virtual-subnet identifier is the low-order 12 bits, representing which virtual-subnet does the frame belong to? On the conventional Internet side, it runs the usual Internet protocol and our adapted virtual-subnet protocol. On the ad hoc network side, it sends and receives packets using an ad hoc routing algorithm (e.g., AODV[ ], DSDV [], DSR [] and TORA []). To make the virtual-subnet function correctly, two different routing tables are used including configuration tables for mapping virtual-subnet identifier and access links. The VMR may also contain protocols in higher layers, in case there is a need for translation in these layers (e.g., conversion of usual TCP to TCP for wireless channels). The architecture partitions a mobile ad hoc network into logically independent subnetworks. Network nodes are members of physical and virtual subnets and may change their affiliation with these subnets due to their mobility. Initially, the network is partitioned into a set of disjoint clusters, which are termed physical subnet and are based on node locality. Members of different physical subnets are clustered together to form virtual subnets, each of which ideally spans all physical subnets and is used to provide communication paths among distant nodes. Figure #. The Virtual-Subnet frame format To connect the IP-based Internet communication, the mobile nodes need to discover the existence of the VMRs, which it belongs to, and join one of the VMRs first. This could be done either by listening to a VLAN-enabled Multi-route Router Advertisement (sending by VLAN-enabled Multi-route Router) or sending a VLAN-enabled Multi-route Router Request message (sending by mobile node) at the initial state as shown at Figure 3. After successful 194

9 VLAN-enabled Multi-route Router discovery, the mobile node registers with one of the discovered VLAN-enabled Multi-route Routers. We use Multicast Listener Discovery (MLD) with virtual LAN tag for IPv6 and Mobile IPv6 [20] to manage the multicast membership and macro-mobility in this internetworking system. Thus, when registers with a certain VMR, mobile node generates an IP care-of-address (CoA) with the IP prefix of the selected VMR. If an mobile node is approaching a new VMR which can serve it better than the currently registered VMR, a handover procedure is performed between old and new VMRs. After the switch to the new VMR is completed, the mobile node generates a new IPv6 CoA with the new network prefix. Thus, the CoA of a certain mobile node always contains the information of its current location. 195

10 Figure 3. A VLAN-enabled Multi-route Router Advertisement Due to the same IP prefix of CoAs, all of the nodes attaching to the VMR can be regarded as members of one IP subnet, and the attached VMR can be regarded as the default gateway for virtual subnet. In other words, the entire ad hoc network is logically separated into several virtual subnets (as identified in Figure 4 with different colours). These virtual subnets are connected to the core IP network through the gateway routers. Unicast routing in the ad hoc side is operated in a hierarchical way based on the subnet partitioning. I.e. packets addressed to a destination in the same subnet can be directly forwarded, while packets address to a destination in a different subnet must be routed through the VMR s (even if there is a direct wireless multi-hop link between the correspondent nodes). IP multicast routing is carried out among the multicast routers only. Hosts are transparent to the routing protocol. Each multicast routers should obtain the up-to-date information about the existence of any group member on its local link. The multicast tree is then built up to deliver the multicast datagrams among all routers connected to local group members. Hosts may join or leave a multicast group dynamically. To ensure that multicast packets are delivered to all links with active receivers, a protocol called Multicast Listener Discovery (MLD) was developed for membership management between routers and hosts in IPv6. Routers use MLD to learn which multicast address has listeners on each of their attached links. On each link, at least one of the routers keeps a list of multicast addresses having listener on this link. This list 196

11 is referred as membership list in the rest of this paper. As an asymmetric protocol, different behaviours for multicast listeners and routers are specified in MLD. Three types of MLD messages are defined: Query, Report and Done. Figure 4: The entire ad hoc network is logically separated into several subnets 197

12 198

13 4. SIMULATION ANALYSIS Numerous simulations of our proposed protocol have been performed using the NS2 simulation package. The mobility model used in each of the simulations is in a random direction. In each simulation, nodes are initially placed randomly within a predefined 600m x 600m grid area. Each node then chooses a random direction between 0 and 360 degrees and a speed from 0 to 20 meter/second. Once the node reaches the boundary of the area, it chooses a period of time to remain stationary. After the end of this pause time, the node chooses a new direction, this time between 0 to 180 degrees, adjusted relative to the wall of the area on which the node is located. This process repeats throughout the simulation, causing continuous changes in the topology of the underlying network. First, we compare the efficiency of the proposed method to Flooding using computer simulation. Networks are randomly generated within 600m x 600m grid. There are n nodes in the grid with k VLANs and nodes can communicate each other within transmission range. Each VLAN is formed with randomly members. The re-routing adapts the AODV algorithm. 199

14 In the simulation study, we vary n and k to compare how the network sizes and VLAN sizes affect the efficiency. Figure 5 shows the result for network sizes from 50 nodes to 80 nodes with 5 to 8 VLANs. As a consequence of the greater node density, our proposed method is sufficient to deliver packets to all nodes in a VLAN group. There are some nodes moving out of transmission range, which cannot re-route successfully. It shows that the percentage up to 84% in the 80 nodes existing 8 VLANs by our proposed method. In the same condition, original flooding achieves only 80%. The main impact of the improvement is that our proposed method re-routes successfully before nodes moving out of transmission range, original flooding has too many redundant transmissions (control packet flood) to reach destination in time. Similar results for the percentage of the overhead of our proposed method and original flooding are shown in Fig. 6. We assume the flooding overhead to be 100% for comparing basis. It shows that the overhead of our proposed method in 5 VLANs is from 50% to 39% when nodes number from 50 nodes to 80 nodes. And the overhead of our proposed method in 8 VLANs is from 39% to 32% when nodes number from 50 nodes to 80 nodes. It gives a clear result that the overhead improves up to 68% in the 80 nodes existing 8 VLANs. Furthermore, compared to different sizes of VLAN, our proposed method was still efficient when the sizes of VLAN changing. Figure 7 refers to a 60-node ad hoc network with 5 VLANs. It shows the percentage of successful multicast for nodes whose velocity varies from 0m/s to 20m/s (around 70km/h) using three different routing protocols, and all the nodes of the addressed multicast group received the packet more than 90% when the velocity is less than 10m/s (around 35km/h) for our proposed method. Furthermore, when the velocity of nodes is more than 4m/s, the packet delivery ratio of flooding will drop immensely as the velocity of nodes speeds up. Delay improvement ratio with respect to flooding is shown in Figure 8. As expected, simulations show that our proposed method improves on the average delay of successful packet completion up to 50%. 200

15 Figure 5. the percentage of successful deliver packets percentage of overhead VLAN FCVP 6 VLAN FCVP 7 VLAN FCVP 8 VLAN FCVP Flooding Nodes size Figure 6. The percentage of the overhead of our proposed method and original flooding 201

16 Packet Delivery Ratio 100 Packet Delivery Ratio (%) FCVP AODV Flooding Speed (meters/sec) Fig. 7: Packet delivery ratio for three different routing protocols Delay improvement with respect to flodding Ratio Delay improvement Ratio (%) Speed (meters/sec) FCVP AODV Fig. 8: Delay improvement ratio with respect to flooding 202

17 Average Route Acquisition Latency VLANs 10 VLANs 15 VLANs 20 VLANs 50 Delay (msec) Network sizes Fig. 9: Average route acquisition latency Control Overhead Packets Nodes 100 Nodes 150 Nodes 200 Nodes Speed (meters/sec) Fig. 10: Control overhead Figure 9 represents the average route acquisition latency for the simulations. It indicates that there is a significant different between the different network sizes and the numbers of VLAN. The delay is more a factor of the network sizes, topologies and the queuing delays experienced 203

18 at the individual nodes. Since using the forwarding cache routes can be discovered with minimal delay. Figure 10 shows that the amount of overhead in terms of CREQ, CREP and ACK message sent. The simulations presented utilize the forwarding cache algorithm with four phases. Each CREQ is broadcast across the entire VLAN network, so there are a large number of RREPs generated, specifically in the larger-sized network. The results present in this session quantify the improvement in our proposed method that results from the use forwarding cache table to reduce redundant transmissions. However, if the network increases greater nodes density, the improvement increases more obviously. 5. CONCLUSIONS AND FUTURE RESEARCH In this paper, we have described the adapted VLAN protocol for ad hoc networks. The main objective of our protocol is efficient to progress the behaviours of VLAN in ad hoc networks. We propose a novel interoperability network model integrating a self-organizing ad hoc network and Internet/a conventional network with the same virtual local area network. Moreover, we describe a protocol to establish the VLAN broadcast domains by using the IPv6 multicast-membership in ad hoc networks and perform IP-based network communications in a multi-switch backbone. Since the VLAN technology functions by logically segmenting the network into different broadcast domains, packets can only be delivered between fixed/mobile nodes with the same VLAN identity (group member). Therefore we can prevent the broadcast storm problem in MANET. We plan to identify the suitable cache table refreshing mechanism on the proposed method in the future works. We will also generalize the clustering method to progress the behaviours of VLAN so that they can be applied in ad hoc wireless networks. ACKNOWLEDGEMENT This research is supported by NICI IPv6 Infrastructure Development Division, Taiwan, Grant #I REFERENCES REFORMAT USING THE TEMPLATE A. Gupta and D. Ferrari, (1995), Resource Partitioning for Real-time Communication, IEEE/ACM Trans. on Networking, 3.5, [2] N. Kavak, (1995), Data Communications in ATM Networks, IEEE Network, vol.9, no.3,may/june

19 [3] Rajaravivarma, V.; (1997), Virtual local area network technology and applications, Proceeding of the Twenty-Ninth Southeastern Symposium on, 9-11 March 1997 Pages:49-52 [4] Internet Engineering Task Force (IETF) Mobile Ad Hoc Networks (MANET) Working Group Charter. [5] J. Jubin and J.D. Tornow, The DARPA Packet Radio Network Protocols, Proceeding of the IEEE, Vol.75, no. 1, Jan. a987, pp [6] Sung-Ju Lee; Su, W.; Hsu, J.; Gerla, M. and Bagrodia, R.; A Performance Comparison Study of Ad Hoc Wireless Multicast Protocols. INFOCOM 2000, Nineteenth Annual Joint Conference of IEEE Computer and communications Societies. Proceedings, IEEE vol:2 :2000, pages [7] E. Bommaiah, M. Liu, A. McAuley, and R. Talpade, AMRoute: Adhoc Multicast Routing Protocol, Internet-Draft, draft-talpade-manet-amroute-00.txt, Aug. 1998, Work in progress. [8] C. W. Wu, Y.C. Tay, and C.-K. Toh, Ad hoc Multicast Routing protocol utilizing Increasing id-numbers (AMRIS) Functional Specification, Internet-Draft, draft-ieft-manet-amris-spec-00.txt, Nov. 1998, Work in progress. [9] S.J. Lee, M. Gerla, and C.-C Chiang, On-Demand Multicast Routing Protocol, In Proceedings of IEEE WCNC 99, New Orleans, LA, Sep. 1999, pp [10] J.J. Garcia-Luna-Aceves and E.L. Madruga, Core-Assisted Mesh Protocol, IEEE Journal On Selected Areas in Communications, Vol. 17, no. 8, Aug. 1999, pp [11] D. J. Baker and A. Ephremides, (1981), The architectural organization of a mobile radio network via a distributed algorithm, IEEE Trans.Commun., pp , Nov [12] D. J. Baker, J. Wieselthier, and A. Ephremides, (1982), A distributed algorithm for scheduling the activation of links in a self-organizing, mobile, radio network, in Proc. IEEE ICC 82, pp. 2F.6.1 2F.6.5. [13] I. Chlamtac and S. S. Pinter, (1987), Distributed nodes organization algorithm for channel access in a multihop dynamic radio network, IEEE Trans.Comput., pp , June [14] IEEE Std 802.1Q, 2003 Edition. (2003), IEEE standards for local and metropolitan area networks, Virtual bridged local area networks. [15] J. Jubin and J.D. Tornow, (1987), The DARPA Packet Radio Network Protocols, Proceeding of the IEEE, Vol.75, no. 1, pp , Jan. a987. [16] M. Gerla and J. T.-C. Tsai, (1995), Multicluster, mobile, multimedia radio network, ACM-Baltzer J. Wireless Networks, vol. 1, no. 3, pp , [17] Royer, E. and Perkins, C., (1999) Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol, MobiCom 99, Seattle, WA, Aug, pp [18] Tzu-Chiang Chiang, Ching-Hung Yeh and Yueh-Min Huang,(2004) A Forwarding Cache VLAN Protocol (FCVP) in wireless Networks, 4th IASTED International Multi-Conference on Wireless and Optical Communications - WOC 2004, July 8-10, 2004,Banff,Canada 205

20 [19] Wu, C., Tay, Y., and Toh, C.,(1998), Ad Hoc Multicast Routing Protocol Utilizing Increasing id-numbers (AMRIS) Functional Specification, Internet-Draft, Nov [20]D.B. Johnson, C. E. Perkins, and J. Arkko, Mobility support in IPv6. IETF internet draft, June

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS

MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS MULTICASTING IN MANET USING THE BEST EFFECTIVE PROTOCOLS 1 R. INDIRANI, 2 ARUCHAMY RAJINI 1 M. Phil Research Scholar, 2 Associate Professor 1&2 PG & Research Department of Computer Science, 1&2 Hindusthan

More information

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances

Service Discovery and Invocation for Mobile Ad Hoc Networked Appliances Service Discovery and Invocation for Ad Hoc Networked Appliances Liang Cheng and Ivan Marsic Department of Electrical and Computer Engineering Rutgers The State University of New Jersey 94 Brett Rd., Piscataway,

More information

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS , pp.479-486 http://dx.doi.org/1.14257/astl.217.147.67 Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS G Parimala 1, B Suvarna 2, N Rajeswari 3 and Venkatesulu Dondeti 4 VFSTR University,

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Unicast Performance Analysis of the ODMRP in a Mobile Ad hoc Network Testbed

Unicast Performance Analysis of the ODMRP in a Mobile Ad hoc Network Testbed Unicast Performance Analysis of the ODMRP in a Mobile Ad hoc Network Testbed Sang Ho Bae, Sung-Ju Lee, and Mario Gerla Wireless Adaptive Mobility Laboratory Computer Science Department University of California

More information

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV)

Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV) Performance Comparison of MANET (Mobile Ad hoc Network) Protocols (ODMRP with AMRIS and MAODV) Aparna K Lecturer, Dept. of Master of Computer Applications BMS Institute of Technology, Bangalore, India.

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks

AMRIS: A Multicast Protocol for Ad hoc Wireless Networks of AMRIS: A Multicast Protocol for Ad hoc Wireless Networks C.W. Wu, Y.C. Tay National University of Singapore wuchunwei@alum.comp.nus.edu.sg,tay@acm.org Abstract This paper introduces AMRIS, a new multicast

More information

Multicast over Vehicle Ad Hoc Networks

Multicast over Vehicle Ad Hoc Networks 1 Multicast over Vehicle Ad Hoc Networks Alberto Gordillo Muñoz Abstract Vehicular networks may improve the safety and efficiency of road travel but there are many challenges that still need to be overcome.

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

TECHNICAL RESEARCH REPORT

TECHNICAL RESEARCH REPORT TECHNICAL REEARCH REPORT Multicast Routing in Mobile Ad Hoc Networks Using ource Grouped Flooding by Karthikeyan Chandrashekar, John. Baras CHCN TR 00-6 (IR TR 00-) The Center for atellite and Hybrid Communication

More information

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network

Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Efficient & Robust Multicast Routing Protocol in Mobile Adhoc Network Ishwari Singh Rajput Department of Computer Science and Engineering Amity School of Engineering & Technology, Amity University, Noida,

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing

QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing Vida Lashkari. O., Mehdi Dehghan Abstract Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET

A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET 2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN

Research Paper GNANAMANOHARAN ET AL., INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING TECHNOLOGY E-ISSN Research Paper PERFORMANCE ANALYSIS OF PROBABILISTIC BROADCAST ON DEMAND ROUTE DISCOVERY PROTOCOL FOR MOBILE AD HOC NETWORKS BASED ON NODE MOBILITY E.Gnanamanoharan 1, R.Bensraj 2 Address for Correspondence

More information

Dynamic Load-Aware Routing in Ad hoc Networks

Dynamic Load-Aware Routing in Ad hoc Networks Dynamic Load-Aware Routing in Ad hoc Networks Sung-Ju Lee Internet & Mobile Systems Labs Hewlett-Packard Laboratories Palo Alto, CA 9434-6 sjlee@hpl.hp.com Mario Gerla Computer Science Department University

More information

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 5 (June 2012), PP.12-17 www.ijerd.com A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical

More information

MAC RELIABLE BROADCAST IN AD HOC NETWORKS

MAC RELIABLE BROADCAST IN AD HOC NETWORKS MAC RELIABLE BROADCAST IN AD HOC NETWORKS KenTang,MarioGerla Computer Science Department University of California, Los Angeles {ktang, gerla}@cs.ucla.edu ABSTRACT Traditional wireless ad hoc medium access

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract: Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support

Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Application Layer Multicasting for Mobile Ad-Hoc Networks with Network Layer Support Jayanta Biswas and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 0 0, India {jayanta@cadl, nandy@serc}.iisc.ernet.in

More information

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

Zone-based Proactive Source Routing Protocol for Ad-hoc Networks 2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks

A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks A Protocol for Reducing Routing Overhead in Mobile Ad Hoc Networks Radhu.R.Nair #1 T. K Parani *2 # Student, M.E Communication Systems engineering, Anna University DSCE Coimbatore, India *Assistant professor,

More information

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet

Hybrid gateway advertisement scheme for connecting mobile ad hoc networks to the Internet * gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2

Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Performance analysis of aodv, dsdv and aomdv using wimax in NS-2 Madhusrhee B Department Computer Science, L.J Institute of Technology, Ahmedabad, India Abstract WiMAX (IEEE 802.16) technology empowers

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

Performance Comparison of Different Multicast Routing Protocols in Mobile Ad-hoc Networks

Performance Comparison of Different Multicast Routing Protocols in Mobile Ad-hoc Networks Performance Comparison of Different Multicast Routing Protocols in Mobile Ad-hoc Networks B. Ravi Prasad Dr.A.Damodaram Dr.G.Venkateswara Rao Research Scholar, CSE Department Professor in CSE Associate

More information

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols Performance Comparison of Ad Hoc Routing Protocols over IEEE 82.11 DCF and TDMA MAC Layer Protocols Govind. P. Gupta Computer Science Department R.K.G.I.T, Ghaziabad (India) er_gpgupta@yahoo.com A. K.

More information

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks

Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Implementation and simulation of OLSR protocol with QoS in Ad Hoc Networks Mounir FRIKHA, Manel MAAMER Higher School of Communication of Tunis (SUP COM), Network Department, m.frikha@supcom.rnu.tn ABSTRACT

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP

Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Multicasting in Ad-Hoc Networks: Comparing MAODV and ODMRP Thomas Kunz and Ed Cheng Carleton University tkunz@sce.carleton.ca Abstract. Multicasting can efficiently support a variety of applications that

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

MANET Architecture and address auto-configuration issue

MANET Architecture and address auto-configuration issue MANET Architecture and address auto-configuration issue Namhi Kang Catholic University E-mail: kang@catholic.ac.kr Contents Background Information Overview Common MANET misperception Multilink subnet issue

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Evaluating the Performance of a Demand-Driven Multicast Routing Scheme in Ad-Hoc Wireless Networks

Evaluating the Performance of a Demand-Driven Multicast Routing Scheme in Ad-Hoc Wireless Networks Evaluating the Performance of a Demand-Driven Multicast Routing Scheme in Ad-Hoc Wireless Networks Krishna Paul S.Bandyopadhyay & A.Mukherjee D.Saha Cognizant Technology Solutions PricewaterhouseCoopers

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

OVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS

OVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS OVERVIEW OF UNICAST AND MULTICAST ROUTING PROTOCOLS 1 Anupam Jain, 2 Minakshi Halder 1 M.E. Scholar, 2 Assistant Professor Electronics and Communication Engineering (ECE) Acropolis Institute of Technology

More information

Location Awareness in Ad Hoc Wireless Mobile Neworks

Location Awareness in Ad Hoc Wireless Mobile Neworks Location Awareness in Ad Hoc Wireless Mobile Neworks Lijuan Ai Wenyu Wang Yi Zhou 11/14/2001 Mobile Computing, Fall 2001 1 PART I INTRODUCTION TO MANET & LOCATION-AWARE COMPONENTS 11/14/2001 Mobile Computing,

More information

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks

Comparison of proposed path selection protocols for IEEE s WLAN mesh networks Comparison of proposed path selection protocols for IEEE 802.11s WLAN mesh networks Sana Ghannay, Sonia Mettali Gammar and Farouk Kamoun CRISTAL lab, National School of Computer Sciences, ENSI, 2010, Manouba

More information

Glasgow eprints Service

Glasgow eprints Service Yassein, M. B. and Ould-Khaoua, M. and Papanastasiou, S. (25) On the performance of probabilistic flooding in mobile ad hoc networks. In, th International Conference on Parallel and Distributed Systems,

More information

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability

Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Reducing Routing Overhead For Multimedia Traffic in Manet Using Rebroadcast Probability Sivakumar.P, Sivaranjani.R, Srilakshmi.G, Subashini.R Abstract: Mobile ad hoc networks (MANET) have been proposed

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Performance Evaluation of Routing Protocols for MAC Layer Models

Performance Evaluation of Routing Protocols for MAC Layer Models IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya

More information

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks Won-Ik Kim Radio Performance Analysis Section Electronics & Telecommunications Research Institute 161 Kajong-dong,

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Switched Ethernet Virtual LANs

Switched Ethernet Virtual LANs Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland

Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland Routing in ad-hoc networks Marina Dupcinov, Srdjan Krco Applied Research Lab, EEI, Ericsson Ireland I Introduction Ad-hoc networks are formed by users or devices wishing to communicate, without the necessity

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent W. S. Wong and Victor C. M. Leung Department of Electrical and Computer Engineering The University of British

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting

Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Proposal of autonomous transmission timing control scheme for collision avoidance in ad hoc multicasting Katsuhiro Naito, Yasunori Fukuda, Kazuo Mori, and Hideo Kobayashi Department of Electrical and Electronic

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Network Layer: Ad Hoc Routing Tamer Nadeem Dept. of Computer Science The OSI Communication Model Page 2 Spring 2012 CS 752/852 - Wireless

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Reliable Multicast MAC Protocol for Wireless LANs

Reliable Multicast MAC Protocol for Wireless LANs Reliable Multicast MAC Protocol for Wireless LANs S. K. S. Gupta, V. Shankar, S. Lalwani Department of Computer Science and Engineering Arizona State University, Tempe, AZ - 85287 Email: Sandeep.Gupta@asu.edu

More information

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh

E-ODMRP: Enhanced ODMRP with Motion Adaptive Refresh E-: Enhanced with Motion Adaptive Refresh Soon Y. Oh, Joon-Sang Park, and Mario Gerla Computer Science Department, University of California, Los Angeles {soonoh, jspark, gerla}@cs.ucla.edu Abstract On

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System

An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System An Efficient Proactive Routing Method for Mobile Ad Hoc Networks using Peer-to-Peer and Cellular Communication System Hiroaki Morinot, Tadao 8aitot:j: and Mitsuo Nohara:j: t Research and Development Initiative

More information

Comparative Study of Mobility Models using MANET Routing Protocols under TCP and CBR Traffic

Comparative Study of Mobility Models using MANET Routing Protocols under TCP and CBR Traffic Comparative Study of Mobility Models using MANET Routing Protocols under TCP and CBR Traffic 1. Sunita (M Tech Scholar), 2. Ms. Kavita Choudhary (Associate Prof.) Department of computer Science and engineering,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Current Project Work on Routing Protocols for MANET: A Literature Survey Mr. Chethan Chandra S Basavaraddi, Smt. Geetha N.B. M.Tech.

Current Project Work on Routing Protocols for MANET: A Literature Survey Mr. Chethan Chandra S Basavaraddi, Smt. Geetha N.B. M.Tech. International Journal of Scientific & Engineering Research Volume 3, Issue 5, May-2012 1 Current Project Work on Routing Protocols for MANET: A Literature Survey Mr. Chethan Chandra S Basavaraddi, Smt.

More information

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks

Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Performance Analysis of Hierarchical Mobile IPv6 in IP-based Cellular Networks Sangheon Pack and Yanghee Choi School of Computer Science & Engineering Seoul National University Seoul, Korea Abstract Next-generation

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela

Performance Evaluation of Routing Protocols in Wireless Mesh Networks. Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Performance Evaluation of Routing Protocols in Wireless Mesh Networks Motlhame Edwin Sejake, Zenzo Polite Ncube and Naison Gasela Department of Computer Science, North West University, Mafikeng Campus,

More information