# Bandwidth Efficient Distant Vector Routing for Ad Hoc Networks

Size: px
Start display at page:

Transcription

4 A E 2 B G F 3 H C D Table entries of A Æ Î A B 2 B A C 4 E F D 5 E C E E A F 3 E E G 3 E E H 2 E E Figure : Path recovery in tree exchange routing by and must be positive. Nodes with ½ are called neighbours. If there is no direct way of communication between nodes the distance is assumed to be infinity ½. The distance of a node to itself is assumed to be zero ¼. 2. Data Structure All nodes have an identity and the status of a node is defined by tables: The routing table, showing best available distance to destination. The successor table Æ, showing the id of the neighbour which is used to forward to destination. The predecessor table Î, showing the predecessor node of the chosen shortest path to. The next two tables store all collected information available by messages of neighbours. These tables are later used to calculate the routing tables described above. The neighbour distance table Æ shows the best available distance to destination offered by neighbour. The neighbour predecessor table ÆÎ shows the predecessors in the shortest path to offered by node. Table Æ can be recalculated by backtracing all paths through Î, so that table Æ need not be forwarded to neighbours. 4

5 2.2 Initialisation All communication between nodes is described in an event-based manner. The state of any node is described by Øµ Æ Øµ Î Øµ Æ Øµ and ÆÎ Øµ. At startup Ø ¼ each node initalisizes its tables: ¼µ ½, and Æ ¼µ ÒÓÒ¼¼ Î ¼µ ÒÓÒ¼¼ Æ ¼µ ½ ÆÎ ¼µ ÒÓÒ¼¼ ¼ 2.3 Updating Neighbours After initialisation, the iteration is started. In the first step, all nodes send the tables, Î to their neighbours. At startup, these tables contain only one valid element, the sending node itself. Every node stores the received information in the tables Æ and ÆÎ. If node receives tables Ø ½µ Î Ø ½µ from neighbour containing the minimum spanning tree used for routing by neighbour, the tables of are updated as follows. First, all old entries have to be deleted. Æ Øµ ½ ÆÎ Øµ ÒÓÒ¼¼ After that, the new tree is inserted. All distance reported by neighbour must be increased by the distance from to neighbour : Æ Øµ Ø ½µ. The predecessors remain unchanged ÆÎ Ø ½µ. Øµ Î After that, a predecessor entry must be corrected. This is necessary because the root of a received minimum spanning tree has no predecessor entry. But at node, the new root of all received trees is node. ÆÎ Øµ Finally node recalculates a new minimum spanning tree using the information stored in Æ Øµ and ÆÎ Øµ. The new minimum spanning tree is stored in tables Øµ, Æ Øµ and Î Øµ. 5

6 If a calculation results in different tables compared to results from previous iteration, the tables Øµ, Î Øµ must be sent to all neighbours which are ½. All kind of distant vector algorithms use this iteration process which causes information distribution in a step by step manner. With each iteration the information about remote neighbours travels one hop forward through the network. Because of the recalculation in each node, only important information will be sent to neighbours, this is the first step to bandwidth efficiency in routing. It is not necessary to always resend a full minimum spanning tree if an update occurred, there are algorithms available to reduce update messages to minimal size [6] and still guarantee consistency of trees among the communicating nodes. The description of message compression is out of the scope of this paper. 2.4 Calculation of Minimum Spanning Trees A recalculation of the minimum spanning tree is done with an adapted shortest path algorithm of Dijkstra. Every node has a collection of reported minimum spanning trees of its neighbours stored in table Æ and ÆÎ. The trees have been altered during reception to be sub-trees under the root of node. The algorithm of Dijkstra can be immediately applied to extract the minimum spanning tree regarding node. The algorithm of Dijkstra is executed at each node, all calculations are done at one point in time, so indices regarding status Ø are omitted. First the tables, Æ, Î of node are cleared: ½, Æ ÒÓÒ ¼¼ and Î ¼µ. ÒÓÒ¼¼ Table lists the estimated distances to all destinations. These estimations may change during calculation if a better path to a certain destination is found. All nodes with unchangeable distance are members of a list of permanent nodes È. The algorithm also uses a candidate list which contains the identity of all nodes which are candidates for becoming permanent. At start, the destination of the root node is set to zero ¼ and È. The list of candidates is filled with the identities of neighbours of node : ½ and the distance estimation is set to all existing links of node : ½. The successors are set to the neighbours Æ ½. The predecessors are set to : Î ½. The calculation of the minimum spanning tree is done in a loop until there are no more nodes which can get permanent: The candidate with minimal distance offer is searched ÑÒ ¾ 6

7 , Á identity of best node with distance. the best candidate is made permanent È È Á the candidate is removed from the candidate list Ò Á all successors of Á become candidates ¾ È Ò ÆÎ Æ Á µ Á the distance for these new candidates must be set Î Æ Á µ ¾ È Ò ÆÎ Æ Á µ Á the successors for these new candidates must be set Æ Æ Á µ ¾ È Ò ÆÎ Æ Á µ Á the predecessors for these new candidates must be set Î ÆÎ Æ Á µ ¾ È Ò ÆÎ Æ Á µ Á After the loop is finished, a new minimum spanning tree regarding node is available in tables Øµ, Æ Øµ, Î Øµ. Now the new tables are compared against the table of the previous calculation, to check if distance of nodes, or their position within a tree has changed. 2.5 Update criteria With unrestricted shortest path calculation, the tables neighbours if at least one of these criteria is true: Øµ Ø ½µ Æ Øµ Æ Ø ½µ Î Øµ and Î Øµmust be sent to all Øµ Î Ø ½µ () Updates are optimised by changing these criteria, thus not allowing every small change to be forwarded immediately. So updates may be limited beyond a threshold which defines the maximum tolerable change in distance that can be suppressed. The criteria with reduced path optimisation is then Øµ Ø ½µ Øµ Æ Øµ Æ Ø ½µ (2) The criteria Æ Øµ Æ Ø ½µ remains unchanged because any variation in Æ is a substantial tree modification that cannot be ignored. This term also guarantees that information about new or vanished nodes are immediately forwarded to neighbours. 7

8 2.6 Route Maintenance There are two major events that must be handled by the routing algorithm during network operation: including new destinations into the routing tables and deleting lost destinations from it Adding nodes If a new neighbour is detected by node, some corrections at Æ and ÆÎ are required to integrate the new link into route calculation. First, the new neighbour with identity Ò must be inserted into table by Æ Ò Ò Ò and a predecessor must be set to link this neighbour as a new sub-tree with ÆÎ Ò Ò. A new minimum spanning tree must be calculated now, as described in section 2.4. If the new neighbour offers some better paths, the check of update criteria described in section 2.5 will be positive and this new information is sent to all neighbours Deleting routes A connection loss from node to a neighbour Ò will change the link cost Ò to infinity. Node must update its tables to check if current routes include forwarding to the unreachable neighbour. Table Æ Ò must bet set to ½ and table must be set to ÒÓÒ¼¼. Then a new minimum spanning tree is calculated by node ÆÎ Ò as described in section 2.4. If the update criteria check described in section 2.5 detects that routes must be corrected, the neighbours are updated with this information. 3 Simulation Results We have performed some simulations to examine the degree of possible message reduction and to measure the effects of message reduction to reachability. The simulation is executed with 00 nodes placed in a rectangular area. All nodes are allowed to move and have an equal fixed transmission range. An practical example for this kind of setup is an large construction area, where people with mobile communication devices are moving around. The transmission range of a single devices is limited to 25 or 80 meters, covering only a small part of the area. All people on the area are working together and are well organised, which allows the use of cooperating networks. In this example machines can also be equipped with communication devices to allow remote control of, for example cranes. The movement speed of the nodes ranges from 0. to 3 meters per second which is around 0 kilometres per hour. This range was chosen because we assumed some moving machines in the area. A more detailed description of our simulation system is given in [3]. The results are listed in table. The simulations count the total number of packets required for routing including the beaconing for neighbour detection. During simulation, which is 8

9 done for one hour movement and networking for each tested speed, random source destination pairs are checked for correct routes. A summarised result on working routes is listed in the second part of each table. Speed 25 meters transmission range Number of required messages full opt. ¼ ¼ ¼ Speed Reachable destinations % 76.0% 75.% 74.9% % 76.8% 76.3% 76.3% % 74.2% 73.6% 73.7% % 73.2% 72.8% 72.7% % 72.0% 7.4% 7.4% Speed 80 meters transmission range Number of required messages full opt. ¼ ¼ ¼ Speed Reachable destinations % 95.49% 95.0% 95.2% % 94.45% 94.3% 94.09% % 93.62% 93.38% 93.34% % % 92.40% 92.44% Table : Evaluation of routing performance The second column of the tables shows the result with full path optimisation using our algorithm with criteria in section 2.5. Any standard distant vector algorithm will need this amount of messages for route calculation. The results using ¼ show clearly the effect of reduced path optimisation. For example at high moving speed of 3 meters per second and transmission range of 25 meters, the number of routing messages can be reduced from required for full path optimisation to at ¼. So, it is possible to reduce the number of required messages by up to 50%. At this level a path is 9

### Proactive Distance-Vector Multipath Routing for Wireless Ad Hoc Networks

Proactive Distance-Vector Multipath Routing for Wireless Ad Hoc Networks Ralph Jansen, Sven Hanemann and Bernd Freisleben Department of Mathematics and Computer Science, University of Marburg Hans-Meerwein-Str.,

### DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

### ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS Ganga S 1, Binu Chandran R 2 1, 2 Mohandas College Of Engineering And Technology Abstract: Wireless Ad-Hoc Network is a collection of wireless mobile

### Zone-based Proactive Source Routing Protocol for Ad-hoc Networks

2014 IJSRSET Volume i Issue i Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Science Zone-based Proactive Source Routing Protocol for Ad-hoc Networks Dr.Sangheethaa.S 1, Dr. Arun Korath

### Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols Mudit, Sachin Chaudhary Abstract In consideration of adaptability to the environment and flexibility in protocol construction,

### A Highly Effective and Efficient Route Discovery & Maintenance in DSR

A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan

### Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

### STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 155-158 STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS Monika ABSTRACT: In Many wireless

### A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

International Journal of Computer Science & Communication Vol. 1, No. 2, July-December 2010, pp. 185-189 A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols B.V. Manikyala Rao

### COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD

### Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols Sharma Shelja, Kumar Suresh and Rathy R. K. Department of CSE, FET, MRIU, Faridabad, India Email: sharma.shelja@gmail.com, enthusk@yahoo.com,

### Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

### Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Analysis

### Routing in Anhinga. Aakash Chauhan October 20th, Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall

Routing in Anhinga Aakash Chauhan October 20th, 2006 Chair: Hans-Peter Bischof Reader: Alan Kaminsky Observer: Sidney Marshall Agenda Introduction & Background Dynamic Source Routing Project Architecture

### Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

### Routing Protocols in MANET: Comparative Study

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

### A Survey of Routing Protocol in MANET

A Survey of Routing Protocol in MANET R.RagulRavi 1, V.Jayanthi 2 PG Student, Dept of CSE & IT, Coimbatore Institute of Technology 1 Asst.Professor, Dept of CSE & IT, Coimbatore Institute of Technology

### POWER AWARE ENERGY EFFICIENT ROUTING PROTOCOL

POWER AWARE ENERGY EFFICIENT ROUTING PROTOCOL NISHA SHARMA 1 AND SHILPA 2 2 M.TECH DCRUST MURTHAL SONEPAT (INDIA), 1 M.TECH YMCAUST FARIDABAD (INDIA) ABSTRACT Ad hoc network are defined as the category

### Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks

Performance Evolution of Proactive and Reactive Routing Protocols in Mobile Ad Hoc Networks E.Gnanamanoharan 1 and R. Bensraj 2 Department of Electrical Engineering 1, 2 Annamalai University 1, 2 Email:

### PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS

PERFORMANCE EVALUATION OF DSR AND AODV OVER UDP AND TCP CONNECTIONS Sunil Taneja Department of Computer Science Smt. Aruna Asaf Ali Government Post Graduate College, Kalka, India E-mail: suniltaneja.iitd@gmail.com

### Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

### Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

### PERFORMANCE EVALUATION & COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORKS

PERFORMANCE EVALUATION & COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORKS Sohan Garg 1, Dolly Tyagi 2 1 Department of MCA, RKGIT, Ghaziabad U.P., 2 Research Scholar Singhania University Abstract

### Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

Global Journal of Computer Science and Technology Volume 11 Issue 1 Version 1.0 February 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online

### Comparative Study for MCDS and DSR Which Are Used For Packet Forwarding In Ad Hoc Network

Vol.3, Issue.1, Jan-Feb. 13 pp--3 ISSN: 9-5 Comparative Study for and Which Are Used For Packet Forwarding In Ad Hoc Network Prof. Nirmala Chouhan Thorwe, 1 Dr. Dinesh. M. Yadav, Manoj Chouhan 3 1 Computer

### A Study on Routing Protocols for Mobile Adhoc Networks

A Study on Routing Protocols for Mobile Adhoc Networks R.Logambal 1, Dr.K.Chitra 2 Research Scholar, Dept of Computer Science, Bharathiar University, Coimbatore, India 1 Asst. Professor, Govt Arts College,

### REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS

REVIEW ON ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS G. Poornima 1, Mr. M. Rajasenathipathi 2, 1 Research Scholar, Department of Computer Science, NGM College, Pollachi 2 Assistant Professor, Department

### Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks

2009 International Conference on Intelligent Networking and Collaborative Systems Architecture of EHARP Routing Protocols in Ad Hoc Wireless Networks Saud Al otaibi Software Technology Research Laboratory

### Mobile Ad Hoc Network Routing Protocols: A Comparative Study

Mobile Ad Hoc Network Routing Protocols: A Comparative Study Charu Wahi 1, Sanjay Kumar Sonbhadra 2 1 Birla institute of Technology, Noida, India charu@bitmesra.ac.in 2 Shri Shankracharya Institute of

### PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,

### Performance Analysis of AODV, DSDV and DSR by using Different Mobility Models

Performance Analysis of AODV, DSDV and DSR by using Different Mobility Models Sukhwinder Kumar 1, Jasndeep Kaur 2 Lecturer, Dept. of ECE, Thapar University, Patiala, Punjab, India 1 PG Student [WC], Dept.

### PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

### A Survey on Performance Evaluation of MANET Routing Protocols

ISSN 2278 0211 (Online) A Survey on Performance Evaluation of MANET Routing Protocols Aviral Kumar Nishank Tyagi Vipin Kumar Abstract: The task of finding and sustaining routes in Mobile Ad-hoc Networks

### forward packets do not forward packets

Power-aware Routing in Wireless Packet Networks Javier Gomez, Andrew T. Campbell Dept. of Electrical Engineering Columbia University, N 10027, USA Mahmoud Naghshineh, Chatschik Bisdikian IBM T.J. Watson

### Dynamic AODV Backup Routing in Dense Mobile Ad-Hoc Networks *

Dynamic AODV Backup Routing in Dense Mobile Ad-Hoc Networks * Wen-Tsuen Chen and Wei-Ting Lee Department of Computer Science, National Tsing Hua University, Hsin-Chu, Taiwan 300, ROC Tel:+886-3-5742896

### Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MOBILE APPLICATIONS IJCSMA Performance Analysis of Broadcast Based Mobile Adhoc Routing Protocols AODV and DSDV Er. Sandeep Singh Khehra 1, Er. Abhinash Singla

### Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator

Performance Evaluation Of Ad-Hoc On Demand Routing Protocol (AODV) Using NS-3 Simulator Dr. S. K. Singh Professor, Department of EC, India Dr. R. Gupta Asst. Prof. Department of EC, India Abstract: The

### A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Contemporary Engineering Sciences, Vol. 8, 2015, no. 19, 859-864 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.57207 A New Energy-Aware Routing Protocol for Improving Path Stability

### Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

### Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

### A Comparative Analysis of Pro-active Routing Protocols in MANET

Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

### A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

### AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1424-1429 3 rd World Conference on Information Technology (WCIT-2012) Comparison of routing protocols in mobile ad-hoc wireless networks

### Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5

Study and Analysis of Routing Protocols RIP and DSR Using Qualnet V5 Nallamalla Anusha Department of Computer Science and Engineering Baba Institute of Technology and Sciences, Visakhapatnam, Andhra Pradesh-

### [Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

### IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS E. Gnanamanoharan and R. Bensraj Department of Electrical Engineering, Annamalai University, Tamil Nadu, India

### QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

### Current Project Work on Routing Protocols for MANET: A Literature Survey Mr. Chethan Chandra S Basavaraddi, Smt. Geetha N.B. M.Tech.

International Journal of Scientific & Engineering Research Volume 3, Issue 5, May-2012 1 Current Project Work on Routing Protocols for MANET: A Literature Survey Mr. Chethan Chandra S Basavaraddi, Smt.

### Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

### PERFORMANCE ANALYSIS OF MOBILE AD- HOC NETWORK ROUTING PROTOCOLS OVER TCP

PERFORMANCE ANALYSIS OF MOBILE AD- HOC NETWORK ROUTING PROTOCOLS OVER TCP Rahat Hossain Faisal 1, A. N. M. Tawhidul Islam 2, Md. Sadek Ali 3, Farruk Ahmed 4 1 Department of Electronics and Telecommunication

### EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS

EFFECT OF ROUTING PROTOCOLS OVER RENOVATED CONGESTION CONTROL MECHANISMS IN SINGLE-HOP WIRELESS 1 TANMAYA SWAIN, 2 PRASANT KUMAR PATTNAIK School Of Computer Engineering, KIIT University, Bhubaneswar E-mail:

### Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Abstract:

Routing Protocols Wireless for Ad Hoc Wireless Networks: Classifications of Protocols and A review of Table Driven Protocols Amr Ergawy aergawy@cc.hut.fi Abstract: Ad Hoc wireless networks have their own

### The General Analysis of Proactive Protocols DSDV, FSR and WRP

Volume 116 No. 10 2017, 375-380 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu The General Analysis of Proactive Protocols DSDV, FSR and WRP 1 Dr.

### Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks Salmu K.P 1, Chinchu James 2 1,2 Department of Computer Science, IIET, Nellikuzhi Abstract- ZigBee is a worldwide standard for wireless

### Performance Analysis of MANET Routing Protocols OLSR and AODV

VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

### A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

### Routing Protocols in MANETs

Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

### Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Contemporary Engineering Sciences, Vol. 7, 2014, no. 12, 559-567 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4436 Evaluation of Ad-hoc Routing Protocols with Different Mobility Models

### COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,

### Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

### A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

### Chapter-2 Routing Protocols of MANET

Chapter-2 Routing Protocols of MANET Chapter 2 Routing Protocols of MANET Routing is an important function for any network, whether it is for wired or wireless. The protocols designed for routing in these

### ESAR: An Energy Saving Ad Hoc Routing Algorithm for MANET

: An Energy Saving Ad Hoc Routing Algorithm for MANET Utkarsh 1, Mukesh Mishra 2 and Suchismita Chinara 3 Department of Computer Science and Engineering, National Institute of Technology Rourkela, Rourkela,

### Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

### Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach

ISSN : 2050-3021 Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach Dr. Anubhuti Khare 1, Manish Saxena 2, Raghav Shrivastava*

### Abstract 1.1. OVERVIEW

Operation of Dynamic Source Routing in Wireless Mobile Ad Hoc Networks Kestina Rai 1, Rubinder Kaur 2, Kanchan Aggarwal CSE/IT Department, PTU Chandigarh Engineering College, Landran(Punjab) cupids2@rediffmail.com,rubykhokhar@gmail.com

### Dynamic Source Routing Protocol for Ad Hoc Networks Using the Concept Intelligent Agent Fuzzy Logic

Volume-4, Issue-3, June-2014, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 80-86 Dynamic Source Routing Protocol for Ad Hoc

### Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

### A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network

A New Approach to Efficient Bluetooth Scatternet Formation In Adhoc Wireless Network Hemali Kotak 1, Hiteishi Diwanji 2 1 A.V.P.T.I. /Comp. Deptt, RAJKOT,INDIA Email: Hemali@yahoo.com 2 L.D. ENGG. College/Comp.

### Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

### Mr. Pradip A. Chougule 1, Mr. Rajesh A. Sanadi 2, Mr. U. H.Kamble 3

IOSR Journal of Computer Engineering (IOSR-JCE) ISSN: 2278-0661, ISBN: 2278-8727, PP: 01-05 www.iosrjournals.org COMPARATIVE STUDY OF TABLE DRIVEN ROUTING PROTOCOLS IN AD HOC WIRELESS NETWORKS Mr. Pradip

### SECURITY ISSUE ON AODV ROUTING PROTOCOL SUFFERING FROM BLACKHOLE ATTACK

SECURITY ISSUE ON AODV ROUTING PROTOCOL SUFFERING FROM BLACKHOLE ATTACK Mrs. Kritika Taneja, Asst. Professor, Manav Rachna International University, Faridabad Abstract- An adhoc network is a collection

### NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks

102 The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008 NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks Al-Sakib Pathan 1, Muhammad Monowar

### Power Aware Virtual Node Routing Protocol for Ad hoc Networks

Power Aware Virtual Node Routing Protocol for Ad hoc Networks A.Kush 1, R.Kumar 2, P.Gupta 3 1 Department of Computer Science, Kurukshetra University, Kurukshetra, INDIA, akush20@rediffmail.com 2 Department

### INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS

INVESTIGATING THE SCALABILITY OF THE FISH-EYE STATE ROUTING PROTOCOL FOR AD HOC NETWORKS 1 NATARAJAN MEGHANATHAN, 2 AYOMIDE ODUNSI 1 Asstt Prof., Department of Computer Science, Jackson State University,

### Performance Comparison and Analysis of Table- Driven and On-Demand Routing Protocols for Mobile Ad-hoc Networks

Vol:2, No:2, 28 Performance Comparison and Analysis of Table- Driven and On-Demand Routing Protocols for Mobile Ad-hoc Networks Narendra Singh Yadav, R.P.Yadav International Science Index, Electronics

### A Distributed Weighted Cluster Based Routing Protocol for MANETs

Wireless Sensor Network, 2011, 3, 54-60 doi:10.4236/wsn.2011.32006 Published Online February 2011 (http://www.scirp.org/journal/wsn) A Distributed Weighted Cluster Based Routing Protocol for MANETs Abstract

### IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Performance Comparison of ADSDV and DSDV in MANET Brahm Prakash Dahiya Shaym Lal College,New Delhi, India brahmprakasd@gmail.com

### Performance Evaluation of Various Routing Protocols in MANET

208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

### A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

### Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

* gateway advertisement scheme for connecting mobile ad hoc networks to the Internet Jeongkeun Lee (), Dongkyun Kim (2), J.J.Garcia-Luna-Aceves (3), Yanghee Choi (), Jihyuk Choi (4), Sangwoo Nam (4) ()

### AODV-PA: AODV with Path Accumulation

-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

### Routing Security in Mobile Ad Hoc Networks: An Extension of DSR

Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS) 2 (1): 155-159 Scholarlink Research Institute Journals, 2011 (ISSN: 2141-7016) jeteas.scholarlinkresearch.org Journal of Emerging

### A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

### Secure Routing for Mobile Ad-hoc Networks

Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)

### Comparative study and Performance Analysis of FSR, ZRP and AODV Routing Protocols for MANET

2nd International Conference and workshop on Emerging Trends in Technology (ICWET) 211 Comparative study and Performance Analysis of FSR, and Protocols for MANET Parma Nand Research Scholar Wireless Computing

### A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

### A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

### Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

### Performance Evaluation of Routing Protocols for MAC Layer Models

IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 4 (Mar. - Apr. 2013), PP 71-77 Performance Evaluation of Routing Protocols for MAC Layer Models Somya

### Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

### ECS-087: Mobile Computing

ECS-087: Mobile Computing Mobile Adhoc Networks and Routing in MANETS (most of the slides borrowed from Prof. Sridhar Iyer) Diwakar Yagyasen 1 Index Mobile Ad Hoc Networks (MANET) MAC in MANET MANET routing

### Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Performance Comparison of MANETs Routing Protocols for Dense and Sparse

### Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

### Maharishi Markandeshwar University

RESEARCH ARTICLE OPEN ACCESS Simulation Based Performance Comparison of Adhoc Routing Protocols Kushagra Agrawal*, Shaveta Jain** *Department of Computer Science,, Mullana, Ambala agrawal_kushagra@rediffmail.com

### Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

### Comparison of Various Routing Protocols & Brief of MANET

International Journal of Modern Trends in Engineering and Research www.ijmter.com Comparison of Various Routing Protocols & Brief of MANET Akashkumar Patel 1, Rakshitkumar Hirapara 2, Vivekkumar Dhamecha