CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING

Size: px
Start display at page:

Download "CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING"

Transcription

1 99 CHAPTER 5 AN AODV-BASED CLUSTERING APPROACH FOR EFFICIENT ROUTING 5.1 INTRODUCTION Dynamic network topology and limited system resources characterize mobile ad hoc networking. Many routing protocols were proposed for routing in MANETs (Chakeres and Belding-Royer 2004; Jiang et al 1998). In MANETs, performance decreases when network s size exceeds a certain threshold, resulting in many routing algorithms performing only when network s size is small. To overcome bandwidth and battery power limitations and reduce routing overhead, it is mandatory to make network organization smaller and manageable (Garcia et al 2003). A clustering architecture provides MANET environments with three features: network scalability, fault tolerance and communication overhead reduction. Many clustering algorithms have geographical regions as clusters or form new ones unnecessarily. (Chiang et al 19997; Lin and Gerla 1997). An algorithm by Chatterjee et al (2000) creates necessary clusters without using routing protocol maintained information. It has been proved that cluster architecture ensures basic performance achievement in MANETs with many mobile terminals. A cluster structure provides at least three benefits, as an effective topology control measure. First, it facilitates spatial resources reuse to increase system capacity. With the non-overlapping multi-cluster structure, two clusters can use the same frequency/code set if they are not neighbours. Also, a cluster

2 100 coordinates transmission events better with a special mobile node, with a cluster head, inside. This saves retransmission resources resulting in lower transmission collisions. The second benefit is in routing, as a cluster head set and cluster gateways normally are the virtual backbone for inter-cluster routing which in turn restricts creation and spread of routing information. Last, a cluster structure shrinks an ad hoc network and makes it more stable with every mobile terminal. When a mobile node changes its cluster attachment, the information is updated only in those nodes in corresponding clusters. Thus, local changes do not need updation by the whole network as this greatly reduces information stored by each mobile node. 5.2 CLUSTERING Clustering technique is not a routing protocol; it aggregates nodes into groups to ensure easier network management. An ad hoc network s cluster organization is impossible to be achieved in fixed infrastructure, offline. Clustering scheme implementation ensures better protocol for Media Access Control (MAC) through improvement of spatial reuse, throughput, scalability and power consumption. MANETs have multiple benefits from clustering. To begin with, cluster structure ensures MANETs scalability and load balancing, increases system capacity facilitating spatial resources reuse. In a multi cluster structure, two non-overlapping clusters can have similar frequency if they are not adjacent. It also elects a mobile host with special features called cluster head for enhanced transmission activities coordination which in turn alleviates collision of mobile nodes, saving both energy and resources. Second, it limits creation and spreading routing information through formation of a inter-cluster routing backbone consisting of cluster heads and cluster gateways. Lastly, it provides a stable and smaller vision of ad hoc network when a mobile node changes its attaching cluster so that the whole

3 101 network need not be aware of local changes in a node set. Only mobile nodes in a corresponding cluster reflect such changes. Hence each node stores and processes a fraction of total network routing information saving resources. Clustering aims to be connected and nodes play various roles in clustering techniques. The three node types are defined as follows: 1. Ordinary nodes 2. Cluster head 3. Cluster gateways Cost Involved with Clustering Construction and maintenance of a cluster structure requires additional cost compared to flat structure MANETs. Cost of clustering analysis is carried out either quantitatively or qualitatively to outline both clustering techniques benefits and drawbacks. Clustering associated cost is explained below: 1. Due to Frequent network topology changes cluster related information varies drastically in a dynamically changing cluster structure. Transfer of message packets subsequently eats up massive bandwidth, depleting mobile nodes energy and further disabling upper layer applications that are unable to be implemented with meagre resources. 2. Re-clustering occurs in some clustering schemes due to abrupt local instance like mobile nodes moving to other clusters or due to the demise of a mobile node or shutting down of cluster heads, resulting in other cluster heads reelection. This is re clustering ripple effect which stimulates a re-clustering effect over the full network.

4 Clustering stages are divided into two: cluster formation and maintenance. The first stage assumes that mobile nodes are static. Every mobile node obtains information from neighbouring nodes in a specific period which might prove impractical in a real time scenario. 5.3 CLUSTER MANAGEMENT Clustering architecture provide network scalability, fault tolerance resulting in increased use of network resources. It could be used for resource management, routing and location management to lower communication and computational overheads. This section discusses cluster formation and maintenance Clustering Algorithm Design Goal It is intended to integrate clustering with routing functions. The design aims of the clustering scheme include: An algorithm using a routing protocol s control messages to form clusters with limited overhead. An algorithm operating in localized and distributed manners and intertwining with nodes using only AODV. The algorithm incurring limited cluster formation/ maintenance overhead and supporting formation of ondemand clusters. The algorithm minimizing network-wide flooding and being scalable.

5 103 The proposed scheme constructs/updates clustering architecture when clusters alone service is required. The on-demand nature of AODV s is utilized for the scheme. Nodes participating in clustering are known from CHs maintained topological information and individual nodes Cluster Formation The aim of clustering is to ensure efficient use of network resources, enhance availability, reduce overheads and give scalable architecture (Jiang et al 1998; Garcai et al 2003). The clustering algorithm choice affects clusters stability. The proposed work divides a network into several two-hop clusters where in each cluster a node can play one of five roles: cluster head, ordinary node, secondary cluster head, undecided node or gateway. A gateway is a node that communicates directly with more than two clusters. A Cluster Head (CH) is elected in every cluster and it is responsible for maintaining inter and intra-cluster communication. Every CH maintains two tables in addition to a routing table, an intra-cluster node table and a k- hop cluster table. The intra-cluster node table has the IDs of cluster nodes. The k-hop table has the IDs of CHs of other clusters in a 2-hop neighborhood. The CHs coordinate every cluster and store shared information. All nodes regularly broadcast a hello message to ensure information about neighbors. To reduce the periodic broadcasting overhead, new/undecided nodes learn of their nearest CH on demand by forwarding a cluster head request packet. The nodes act as either ordinary nodes or a gateway based on present location. A Secondary Cluster Head (SCH) is also chosen to avoid the CH from becoming into a bottleneck (Lu and Denko 2004). The SCH stores backup routing and cluster information, with the role being rotated among

6 104 ordinary nodes. This election needs no extra overheads as any node wishing to serve as a SCH informs the CH and the latter informs cluster members Cluster Head Election Many distributed algorithms were suggested for CH election in MANETs. Chiang et al (1997) revealed that the Lowest ID (LID) algorithm performed better than cluster head election algorithms based on Highest Connectivity (HC). The proposals in Chatterjee et al (2000), Garcia et al (2003) use varied criteria for CH election. As cluster heads are responsible for maintenance and intra and inter-cluster communication, they were expected to work for long durations when elected. Node mobility and link failure are the chief reasons for cluster head re-election and changes in cluster membership. Node Gateway Cluster Figure 5.1 Cluster head election Denko (2003), proposed a mobility-based clustering algorithm where a node is elected as CH only when the mobility index is below a specific threshold. This index is computed based on cluster membership and CH changes. When there is a tie, the lowest ID node is selected. In cluster election algorithm, lowest ID clustering is first used to form clusters. Hence, a node is elected CH when it has the lowest ID. This forms the initial node configuration. Later, a node with a mobility index lower than its neighbors is used as criteria. In Figure 5.1, every node broadcasts mobility information to

7 105 neighbors during a CH election. Once information is collected from neighbors every node checks to see if it is the node with the lowest mobility index. Once this is confirmed it becomes a CH itself and informs all neighbors. In this study, the CH is selected based on the lowest ID and mobility index Cluster Maintenance cluster maintenance. Cluster maintenance consists of two parts: intra-cluster and inter Intra-cluster maintenance To keep the neighbor table and CH information updated, nodes exchange hello messages at periodic intervals. A hello message has information about a node s ID and roles. If no hello message is received from a neighbor during the ALLOW_HELLO_LOST interval, the neighbor is thought lost and removed from the table. An ordinary node checks the neighbor table to check whether the CH is still alive. When no CH is found to exist, a new CH is elected in the neighborhood. Local maintenance is carried out, when a CH fails Inter-cluster maintenance Every cluster head has a k-hop cluster table, containing all network k-hop CHs information. Each CH then informs neighboring CHs that it is active by forwarding a HeadAlive message. For example, CH1 receives a HeadAlive message from CH2. If CH1 discovers that CH2 exists in the CH table, CH2 s expiration time is updated. Otherwise, a new CH entry for CH2 could be inserted and its expiration time would be set by improving CH update time to the present. When no HeadAlive message is received from cluster heads during a HEAD_UPDATE_INTERVAL interval, such a cluster

8 106 is assumed to be unavailable. When no HeadAlive message is received during ALLOW_HEADALIVE_LOST interval, then that CH is removed from the CH table. 5.4 IMPLEMENTATION OF THE AODV CLUSTERING AND ROUTING SCHEMES A k-hop CH table maintains k-hop neighbor cluster information. In this study k=2, where only two hop clusters are considered. The K-hop CH table maintains fields such as CH ID, CH status, cluster size, CH expiration time and number of times the hello message has been lost. The CH s expiration time is the current time plus the HeadAliveUpdate interval. A CH s status could be either alive or not alive. A CH s status will be marked as not alive when its HeadAlive message is not received by other CHs within its expiration time. A CH entry will be removed from a k-hop CH table if the number of times that the HeadAlive message has not been received exceeds three. In the following section, the various data structure added to the AODV to implement the proposed clustering architecture is presented Hello Message and Neighborhood Maintenance Prior to a hello message being forwarded the sender node adds status information to it. The hello message sender can be a CH, a gateway, ordinary node or undecided node. The hello message s extension includes the following: source address, lifetime and current status. A neighbor table stores the neighbor s ID, expiration time, status and the many times a hello message was lost. A node on receipt of a hello message from neighbors, checks whether the neighbor is alive in the neighbor table. If existence is confirmed, the neighbor s expiration time is updated or else a new entry is added. When a node has not received a hello message from

9 107 another in three subsequent hello intervals, it is thought to be unconnected and is removed from the neighbor table Cluster Management Module The following three modules are used to implement an AODV based clustering algorithm Cluster initialization module A cluster formation module initializes clusters after initializing an AODV. The module is invoked through the CLUSTER_FORM_PERIOD, a predefined threshold. Before initialization, all nodes are set at status of undecided and broadcast hello message to neighbors. When a node receives all the hello messages from neighbors, it invokes a Cluster Head Election module to elect a CH. This stage uses a LID clustering algorithm. The new CH notifies neighbors and other CHs. The nodes on receipt of a CH existence notification, changes its status to an ordinary node and forwards hello messages to neighbors. When a node locates two different CHs in the neighbor table, that node changes into a gateway. After the execution of a cluster information module, all nodes belong to one cluster at least Cluster head election module A node invokes a Cluster Head Election module to elect cluster heads when there is no CH or when multiple CHs are in proximity to each other. The procedure involves the following steps: A node checks whether it has the lowest mobility index among non-gateway neighbors. When it has the lowest mobility index, it declares itself as CH and notifies other nodes. Otherwise, it changes its status to ordinary node.

10 108 Figure 5.2(a) reveals the topology of a hypothetical clusterednetwork at time t. In Figure 5.2(a), nodes 1, 3 and 6 are CHs. Nodes 8 and 9 are gateways while nodes 2, 4, 5 and 7 are ordinary nodes. Assuming that at time t2 the network s topology changes to Figure 5.2(b), where node 7 has moved from its original cluster. When node 7 checks the neighbor table, it cannot locate a cluster head. Thus node 7 uses the Cluster Head Election module to elect a new CH and the result is shown in Figure 5.2(c), where node 7 becomes a new CH and node 4 the new gateway (a) Node Gateway Cluster Head (c) (b) Figure 5.2 Cluster re-election when no cluster exists in the neighbor table

11 109 Figure 5.3 reveals a situation where many CHs exist in one cluster as shown in (a). When the network s topology changes from Figure 5.3(a) to Figure 5.3 (b) at time t 2, nodes 6 and 7 exchange positions. Node 6 and node 3 find two CHs among their neighbors, as shown in Figure 5.3 (b). Then both node 3 and node 6 invoke the Cluster Head Election Module to select a new cluster head. After cluster election, node 6 throws away its CH status and changes itself into an ordinary node. Node 3 remains a CH. Again, the cluster with nodes 5, 7, 8 and 9 elect node 5 as the new CH. Network topology after the CH reelection is seen in Figure 5.3(c) (c) Node (a) Gateway Cluster Head (b) Figure 5.3 Cluster re-election when more than one cluster head exists Figure 5.3 reveals a situation where many CHs exist in one cluster as shown in (a). When the network s topology changes from Figure 5.3(a) to

12 110 Figure 5.3 (b) at time t 2, nodes 6 and 7 exchange positions. Node 6 and node 3 find two CHs among their neighbors, as shown in Figure 5.3 (b). Then both node 3 and node 6 invoke the Cluster Head Election Module to select a new cluster head. After cluster election, node 6 throws away its CH status and changes itself into an ordinary node. Node 3 remains a CH. Again, the cluster with nodes 5, 7, 8 and 9 elect node 5 as the new CH. Network topology after the CH re-election is seen in Figure 5.3(c) Neighbor table purge module As all nodes are mobile and network topology s changes frequently, network may be unstable. Clusters size and nodes status varies at any time due to mobility. To ensure that the cluster information is fresh and updated, the neighbor table is purged Cluster AODV Based Routing The AODV protocol sends many packets in comparison to other reactive protocols like DSR. So, when network s size increases, node degree also increases proportionately, leading to congestion in the network. Clustering reduces this through localized route discovery and maintenance. The suggested Cluster AODV scheme uses clustering architecture and AODV functionalities for routing. This section discusses mechanisms used by Cluster-AODV to lower routing overhead and allows scalability while ensuring good packet delivery ratio Intra-cluster routing Intra-cluster routing is routing within a cluster. Each node has routing information on its cluster. When a node lacks a route to a destination that is in the cluster it sends a Local Route Request (LRREQ). When route failures ensure lack of reply to a RREP, local route maintenance is undertaken within a cluster.

13 Inter-cluster routing Inter-cluster routing is routing among clusters. The CH has a 2-hop cluster topology also maintained in a SCH to minimize one point of failure. When routes cannot be found in a cluster once a LRREQ message has been issued, a CH uses a RREQ message to locate a destination via a gateway to 2- hop neighbor clusters. To lower RREQ flooding packet overhead only gateways and CHs forward the RREQ. Ordinary nodes are not involved in RREQ packets in inter-cluster communication Route maintenance Similar to route maintenance, cluster maintenance starts when a route fails within a cluster and is re-constructed locally using LRREQ and RREQ with 2-hop topology information. When LRREQ fails, an AODV procedure is used and the usual RERR is forwarded to source nodes for route reconstruction. The source node follows the same process to repair failed routes, first locally and then others. The processes involving a new node which joins and an existing node leaving are carried out based on hello messages from AODV. When CHs exchange neighborhood information with cluster members, a new node close by can register with a CH by using a RREQ message. A node acts as gateway when it registers with two CHs. When a node goes away from the present CH, it switches its role to that of an ordinary node, a gateway or will be undecided. It will be erased from the old CH and old members routing entries are updated accordingly.

14 SELFISH NODES In ad hoc networks, nodes are classified as failed, co operative, selfish and malicious nodes. A node can refrain from being active in a network when moving out of transmission range or when it is switched off by malfunctions. Failed nodes are unused during route discovery. Co-operative nodes are active in the network and participate in route discovery and packet forwarding. Selfish nodes actively involved in route discovery and actively send/receive own packets. But they are liable to drop other nodes data packets either fully or selectively to lower CPU processing to save battery power. Such nodes affect network performance greatly. But malicious nodes are also active in route discovery and could involve data packets transfer similar to selfish or co-operative nodes. However they also launch attacks on networks either to disrupt services or steal network data.. As mobile nodes are autonomous they join or leave the network freely and so nodes are unable to work out an effective system to prevent prospective malicious behavior from nodes it communicate with. This is because nodes behavioral diversity. Further, because of ad hoc network mobility a compromised node can and will frequently change attack target and indulge in malicious behavior with various network node, thereby making it difficult to track malicious behavior of a compromised node in a large ad hoc networks. Hence, threats from compromised nodes with networks are more dangerous than attacks from outsiders. Also such attacks are harder to detect as they are from compromised nodes, which behave correctly prior to being compromised. An example of such threats is from potential Byzantine failures seen in the routing protocol for MANET (Mishra et al 2004). Byzantine failure occurs when nodes are compromised so that incorrect/malicious behavior cannot be easily detected due to cooperation among compromised nodes when they indulge in malicious behavior. Such nodes may behave well,

15 113 but they may use flaws and inconsistencies in routing protocols to destroy routing network fabric without detection, generate and advertise new routing information containing nonexistent link, provide fake link state information and even flood other nodes with routing traffic. Such malicious behaviors are liable to be ignored by other nodes as compromised nodes cannot be recognized easily. One of the misbehavior which the malicious node exhibit is selfishness, wanting to preserve own resources while using the services of the other nodes in network and consuming their resources. Performance of ad hoc network protocol depends upon the cooperation of all the nodes in the network. Nodes transfer traffic by route detection and packet forwarding. As transferring traffic consumes energy, CPU time, memory and bandwidth, selfish nodes deny packet forwarding to other nodes but use the network resources to deliver its own data. Detection and exclusion mechanism is used to prevent selfishness in ad hoc networks. The selfish node saves its own resources as follow (Bruce 2000): 1. Not participating in routing: Selfish node do not relay the routing data such as route requests and route replies. Set hop limit or TTL value at the lowest in route request / reply. Selfish nodes modify routing data to modify route request, insert additional hops, declare own ID as external in source route. 2. Stop participation in current route: Do not participate in route request, create arbitrary RERR messages, not sending ACK messages. 3. Stop relaying data packets: Drop data packets.

16 EXPERIMENTAL SETUP The OPNET simulation tool is used to evaluate performance. Simulation parameters are the same as used in the previous chapter. Three scenarios are studied in this investigation, Nodes moving in constant speed To replicate real time scenario, experiments with 8 nodes moving at an average speed of 100 Kmph in a predefined circular route 4 nodes moving at an average speed of 65 Kmph in a predefined straight route. Balance nodes moving randomly about the network. To replicate real time scenario, selfish nodes are included in the network. Simulations are run using Fuzzy AODV, Proposed Fuzzy Clustered AODV and Proposed Fuzzy Clustered AODV with selfish nodes. The proposed AODV Clustering approach is evaluated for packet delivery ratio and end to end delay. 5.7 RESULTS AND DISCUSSION The experiments were conducted based on the above simulation parameters. Each data point in the graph represents an average of ten simulation runs. Figure 5.4 shows the packet delivery ratio for Nodes moving in constant speed. Figure 5.5 show the end-to-end delay in MANET. Table 5.1 tabulates the same.

17 115 Table 5.1 Packet delivery ratio and end-to-end delay for nodes moving in constant speed. Packet Delivery Ratio End to End Delay Node Mobility speed Fuzzy AODV Proposed Fuzzy Clustered AODV Fuzzy AODV Proposed Fuzzy Clustered AODV 10.8 Kmph Kmph Kmph Kmph Kmph Kmph Figure 5.4 Packet delivery ratio for nodes moving in constant speed

18 116 Figure 5.5 End-to-end delay nodes moving in constant speed From Figures 5.4 and 5.5, it is seen that when the nodes move in constant speed, the proposed Fuzzy clustered AODV performance is similar to Fuzzy AODV. In high speed, Fuzzy AODV performs better than the proposed clustered AODV. The increase in end to end delay is however negligible. Table 5.2 and Figure 5.6 shows the packet delivery ratio for Nodes moving in varying speed for Fuzzy AODV, Proposed Fuzzy Clustered AODV and Proposed Fuzzy Clustered AODV with selfish nodes. Table 5.3 and Figure 5.7 show the end-to-end delay in MANET.

19 117 Table 5.2 Packet delivery ratio for nodes moving in varying speed Time in sec Fuzzy AODV Proposed Fuzzy Clustered AODV Proposed Fuzzy Clustered AODV with selfish nodes

20 118 Figure 5.6 Packet delivery ratio for nodes moving in varying speed From figure 5.7 it can be seen that end to end delay is high for malicious nodes as newer routes need to be discovered due to the packet drop caused by selfish nodes. Figure 5.7 End-to-end delay for nodes moving in varying speed

21 119 Table 5.3 End-to-end delay for nodes moving in varying speed Time in sec Fuzzy AODV Proposed Fuzzy Clustered AODV Proposed Fuzzy Clustered AODV with selfish nodes

22 120 From Figures 5.6 and 5.7, it is seen that the proposed Fuzzy Clustered AODV performs better than Fuzzy AODV in terms of both packet delivery ratio and end-to-end delay. It is also seen that the performance of the network deteriorates considerably in the presence of selfish nodes. 5.8 CONCLUSIONS This work presents an AODV-based clustering and routing scheme for MANETs. The scheme is used for integrated routing and message delivery in clustered networks. The proposed clustering architecture was evaluated using simulation experiments. The simulation results show that the algorithm builds stable clusters achieving better packet delivery ratio and end-to-end delay. Further studies are required to address the deterioration in performance due to the presence of selfish nodes.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1

Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS..

INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH IN ENGINEERING AND TECHNOLOGY WINGS TO YOUR THOUGHTS.. INTERNATIONAL JOURNAL FOR ADVANCE RESEARCH An Overview of Mobile Ad-Hoc Networks: Architecture, Routing and Challenges Avadhesh Kumar 1 Sonali Yadav 2 Kamalesh Chandra Maurya 3 1 Assistant Professor, avadhesh@iul.ac.in

More information

Performance Evaluation of AODV and DSR routing protocols in MANET

Performance Evaluation of AODV and DSR routing protocols in MANET Performance Evaluation of AODV and DSR routing protocols in MANET Naresh Dobhal Diwakar Mourya ABSTRACT MANETs are wireless temporary adhoc networks that are being setup with no prior infrastructure and

More information

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS

PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS PERFORMANCE COMPARISON OF LINK, NODE AND ZONE DISJOINT MULTI-PATH ROUTING STRATEGIES AND MINIMUM HOP SINGLE PATH ROUTING FOR MOBILE AD HOC NETWORKS Natarajan Meghanathan Jackson State University, 1400

More information

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks Mehdi Jalili, Islamic Azad University, Shabestar Branch, Shabestar, Iran mehdijalili2000@gmail.com Mohammad Ali

More information

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks

Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

Mobile Communications. Ad-hoc and Mesh Networks

Mobile Communications. Ad-hoc and Mesh Networks Ad-hoc+mesh-net 1 Mobile Communications Ad-hoc and Mesh Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto Ad-hoc+mesh-net 2 What is an ad-hoc network? What are differences between

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types

Kapitel 5: Mobile Ad Hoc Networks. Characteristics. Applications of Ad Hoc Networks. Wireless Communication. Wireless communication networks types Kapitel 5: Mobile Ad Hoc Networks Mobilkommunikation 2 WS 08/09 Wireless Communication Wireless communication networks types Infrastructure-based networks Infrastructureless networks Ad hoc networks Prof.

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network Journal of Computer Science 7 (5): 678-682, 2011 ISSN 1549-3636 2011 Science Publications Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network 1 V. Balaji and 2 V. Duraisamy

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK

ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Survey of Routing Protocols for Mobile Ad hoc Networks

Survey of Routing Protocols for Mobile Ad hoc Networks IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 8, Issue 1 (Nov-Dec. 2012), PP 34-40 Survey of Routing Protocols for Mobile Ad hoc Networks Ashima Batra 1, Abhishek

More information

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver

A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver 1 A Routing Protocol for Utilizing Multiple Channels in Multi-Hop Wireless Networks with a Single Transceiver Jungmin So Dept. of Computer Science, and Coordinated Science Laboratory University of Illinois

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network

Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network 1 Multipath Routing Protocol for Congestion Control in Mobile Ad-hoc Network Nilima Walde, Assistant Professor, Department of Information Technology, Army Institute of Technology, Pune, India Dhananjay

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

LECTURE 9. Ad hoc Networks and Routing

LECTURE 9. Ad hoc Networks and Routing 1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks

A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior

More information

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network) Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing

More information

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols

Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols www.ijcsi.org 551 Performance Evaluation of Two Reactive and Proactive Mobile Ad Hoc Routing Protocols Kashif Ibrahim Qazi Javed Ahmed Abdul Qudoos Mirza Aamir Mehmood Department of Computer Science, Balochistan

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based

More information

A Survey on Cross-Layer Reliable Routing Protocols in MANETs

A Survey on Cross-Layer Reliable Routing Protocols in MANETs A Survey on Cross-Layer Reliable Routing Protocols in MANETs Chintan Bhavsar Assistant Professor, Computer Engineering Department, G. H Patel College of, V.V Nagar, Gujarat, India Abstract: A Mobile Ad

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks

An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks An Efficient Scheme for Detecting Malicious Nodes in Mobile ad Hoc Networks December 1. 2006 Jong Oh Choi Department of Computer Science Yonsei University jochoi@emerald.yonsei.ac.kr Contents Motivation

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Investigation on OLSR Routing Protocol Efficiency

Investigation on OLSR Routing Protocol Efficiency Investigation on OLSR Routing Protocol Efficiency JIRI HOSEK 1, KAROL MOLNAR 2 Department of Telecommunications Faculty of Electrical Engineering and Communication, Brno University of Technology Purkynova

More information

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks Jayanta Biswas and Mukti Barai and S. K. Nandy CAD Lab, Indian Institute of Science Bangalore, 56, India {jayanta@cadl, mbarai@cadl,

More information

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA)

6. Node Disjoint Split Multipath Protocol for Unified. Multicasting through Announcements (NDSM-PUMA) 103 6. Node Disjoint Split Multipath Protocol for Unified Multicasting through Announcements (NDSM-PUMA) 6.1 Introduction It has been demonstrated in chapter 3 that the performance evaluation of the PUMA

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

A Survey - Energy Efficient Routing Protocols in MANET

A Survey - Energy Efficient Routing Protocols in MANET , pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram

More information

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords:

Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Abstract Keywords: Volume-9 Number-1 Jan -June 2017 pp. 16-21 available online at www.csjournalss.com Simulation and Comparative Analysis of AODV, DSR, DSDV and OLSR Routing Protocol in MANET Sachin Lalar, Arun Kumar Yadav

More information

Performance Analysis of Aodv Protocol under Black Hole Attack

Performance Analysis of Aodv Protocol under Black Hole Attack International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS

A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS A REVERSE AND ENHANCED AODV ROUTING PROTOCOL FOR MANETS M. Sanabani 1, R. Alsaqour 2 and S. Kurkushi 1 1 Faculty of Computer Science and Information Systems, Thamar University, Thamar, Republic of Yemen

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks

Appointed BrOadcast (ABO): Reducing Routing Overhead in. IEEE Mobile Ad Hoc Networks Appointed BrOadcast (ABO): Reducing Routing Overhead in IEEE 802.11 Mobile Ad Hoc Networks Chun-Yen Hsu and Shun-Te Wang Computer Network Lab., Department of Electronic Engineering National Taiwan University

More information

CMPE 257: Wireless and Mobile Networking

CMPE 257: Wireless and Mobile Networking CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 6 CMPE 257 Winter'11 1 Announcements Project proposals. Student presentations. 10 students so

More information

Defending MANET against Blackhole Attackusing Modified AODV

Defending MANET against Blackhole Attackusing Modified AODV IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B. IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach

Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach ISSN : 2050-3021 Emergence of Ad-hoc On-demand Distance Vector Protocol (AODV) as an Efficient On-demand Routing Protocol (EORP) Using Bayesian Approach Dr. Anubhuti Khare 1, Manish Saxena 2, Raghav Shrivastava*

More information

2014, IJARCSSE All Rights Reserved Page 597

2014, IJARCSSE All Rights Reserved Page 597 Volume 4, Issue 12, December 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Mobility Based

More information

Secure Routing and Transmission Protocols for Ad Hoc Networks

Secure Routing and Transmission Protocols for Ad Hoc Networks MobiHoc 2002 Working Session on Security in Ad Hoc Networks Secure Routing and Transmission Protocols for Ad Hoc Networks Zygmunt J. Haas and P. Papadimitratos (Panos) Cornell University Wireless Networks

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

Effects of Caching on the Performance of DSR Protocol

Effects of Caching on the Performance of DSR Protocol IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks

A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile Ad Hoc Networks IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 6 (Jul. - Aug. 2013), PP 01-09 A Novel Rebroadcast Technique for Reducing Routing Overhead In Mobile

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,

More information

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I

Outline. CS5984 Mobile Computing. Taxonomy of Routing Protocols AODV 1/2. Dr. Ayman Abdel-Hamid. Routing Protocols in MANETs Part I CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part I Outline Routing Protocols for Ad hoc Networks Example of a reactive routing protocol AODV: Ad hoc On-demand

More information

Comparative Study of Routing Protocols in MANET

Comparative Study of Routing Protocols in MANET Comparative Study of Routing Protocols in MANET First Author-PrernaYadav 1 Student,Second Author-ShubhraSaxena 2 Professor Abstract-An ad hoc network is basically a collection of wireless nodes not having

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

A Literature survey on Improving AODV protocol through cross layer design in MANET

A Literature survey on Improving AODV protocol through cross layer design in MANET A Literature survey on Improving AODV protocol through cross layer design in MANET Nidhishkumar P. Modi 1, Krunal J. Panchal 2 1 Department of Computer Engineering, LJIET, Gujarat, India 2 Asst.Professor,

More information

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique

Performance Evaluation in MANET by Using NCPR Scheme with Cluster Technique International Journal of Emerging Engineering Research and Technology Volume 3, Issue 7, July 2015, PP 22-31 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Performance Evaluation in MANET by Using NCPR

More information

Security in DOA routing protocol for Mobile Adhoc Networks

Security in DOA routing protocol for Mobile Adhoc Networks Security in DOA routing protocol for Mobile Adhoc Networks Vanitha.M 1, Deepak.S 2, Ayesha.N 3 1,2,3 Department of Electronics and Communication Engineering, Sriram Engineering College Abstract One of

More information

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols.

MANET TECHNOLOGY. Keywords: MANET, Wireless Nodes, Ad-Hoc Network, Mobile Nodes, Routes Protocols. MANET TECHNOLOGY Dharna 1, Varsha Saroha 2, R. B. Dubey 3 1,2,3 Department of Electronics and Communication Engineering, Hindu College of Engineering, Sonepat, Haryana,(India) ABSTRACT Wireless technology

More information

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS S. P. Manikandan 1, R. Manimegalai 2 and S. Kalimuthu 3 1 Department of Computer Science and Engineering, Sri Venkateshwara

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

Caching Strategies in MANET Routing Protocols

Caching Strategies in MANET Routing Protocols International Journal of Scientific and Research Publications, Volume 2, Issue 9, September 2012 1 Caching Strategies in MANET Routing Protocols Narinderjeet Kaur, Maninder Singh Punjabi university, Department

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

THE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (ECRP)

THE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (ECRP) THE EXTENDED CLUSTERING AD HOC ROUTING PROTOCOL (P) 1 Buthayna Al-Sharaa 1 Department of Electrical Engineering, Al Balqa Applied University, Jordan buthayna74@hotmail.com Abstract Ad hoc networks are

More information

A Review Paper on Routing Protocols in Wireless Sensor Networks

A Review Paper on Routing Protocols in Wireless Sensor Networks A Review Paper on Routing Protocols in Wireless Sensor Networks Seema Pahal 1, Kusum Dalal 2 1,2 ECE Department, DCRUST MURTHAL, Haryana Abstract- This paper presents a literature review on WSN networks,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Broch et al Presented by Brian Card 1 Outline Introduction NS enhancements Protocols: DSDV TORA DRS AODV Evaluation Conclusions

More information

Performance Evaluation and Comparison of AODV and AOMDV

Performance Evaluation and Comparison of AODV and AOMDV Performance Evaluation and Comparison of AODV and AOMDV S. R. Biradar 1, Koushik Majumder 2, Subir Kumar Sarkar 3, Puttamadappa C 4 1 Sikkim Manipal Institute of Technology, Majitar -737 132 2 WBUT, Kolkata

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

An Extended AODV Protocol for Multipath Routing in MANETs

An Extended AODV Protocol for Multipath Routing in MANETs IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 21 An Extended Protocol for Multipath Routing in MANETs N.Jaisankar 1 and R.Saravanan 2 Abstract Mobile ad hoc networks (MANETs)

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV

Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through OLSR & AODV MIT International Journal of Electrical and Instrumentation Engineering, Vol. 3, No. 2, August 2013, pp. 57 61 57 Performance Analysis of Proactive and Reactive Routing Protocols for QOS in MANET through

More information

A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks

A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks A Hybrid Multi Meshed Tree Routing Protocol for Wireless Ad hoc Networks Scott Pudlewski, Nirmala Shenoy, Yamin Al-Mousa, Yin Pan, John Fischer Rochester Institute of Technology, Rochester, NY Abstract

More information

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments

Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Investigation of the AODV And the SDWCA QoS Handling At Different Utilisation Levels In Adaptive Clustering Environments Al-Baadani, Faris., Yousef, S., Tapaswi, S., Patnaik, K. K., and Cole, M Faculty

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze

SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze 80 SIMPLE MODEL FOR TRANSMISSION CONTROL PROTOCOL (TCP) Irma Aslanishvili, Tariel Khvedelidze Abstract: Ad hoc Networks are complex distributed systems that consist of wireless mobile or static nodes that

More information

Recent Researches in Communications, Information Science and Education

Recent Researches in Communications, Information Science and Education AODV Based Multi-path Local Repairing Scheme for Mobile Ad Hoc Networks Eman Shaaban, PhD Computer Systems Dept. Faculty of computer and information science Ain-Shams university, Cairo, Egypt Eman.shaaban@cis.asu.edu.eg

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks

More information